Add files using upload-large-folder tool
Browse filesThis view is limited to 50 files because it contains too many changes.
See raw diff
- -dAzT4oBgHgl3EQfFfqG/content/2301.01012v1.pdf +3 -0
- -dAzT4oBgHgl3EQfFfqG/vector_store/index.faiss +3 -0
- -dAzT4oBgHgl3EQfFfqG/vector_store/index.pkl +3 -0
- .gitattributes +98 -0
- 09FRT4oBgHgl3EQflTce/content/tmp_files/2301.13598v1.pdf.txt +900 -0
- 09FRT4oBgHgl3EQflTce/content/tmp_files/load_file.txt +420 -0
- 0dFQT4oBgHgl3EQfDjUj/content/2301.13234v1.pdf +3 -0
- 0dFQT4oBgHgl3EQfDjUj/vector_store/index.pkl +3 -0
- 2tFRT4oBgHgl3EQfnjcF/content/tmp_files/2301.13605v1.pdf.txt +1888 -0
- 2tFRT4oBgHgl3EQfnjcF/content/tmp_files/load_file.txt +0 -0
- 39E0T4oBgHgl3EQfvAGt/vector_store/index.faiss +3 -0
- 39E0T4oBgHgl3EQfvAGt/vector_store/index.pkl +3 -0
- 49E2T4oBgHgl3EQfOgYr/content/tmp_files/2301.03748v1.pdf.txt +1371 -0
- 49E2T4oBgHgl3EQfOgYr/content/tmp_files/load_file.txt +0 -0
- 4NE0T4oBgHgl3EQfeQCD/content/2301.02388v1.pdf +3 -0
- 4tE0T4oBgHgl3EQfegAX/content/2301.02390v1.pdf +3 -0
- 4tE0T4oBgHgl3EQfegAX/vector_store/index.faiss +3 -0
- 4tE0T4oBgHgl3EQfegAX/vector_store/index.pkl +3 -0
- 5dE2T4oBgHgl3EQf6wiO/content/tmp_files/2301.04203v1.pdf.txt +945 -0
- 5dE2T4oBgHgl3EQf6wiO/content/tmp_files/load_file.txt +0 -0
- 5tFKT4oBgHgl3EQfSy3E/content/tmp_files/2301.11777v1.pdf.txt +849 -0
- 5tFKT4oBgHgl3EQfSy3E/content/tmp_files/load_file.txt +0 -0
- 69AyT4oBgHgl3EQfcvd4/content/2301.00289v1.pdf +3 -0
- 69AyT4oBgHgl3EQfcvd4/vector_store/index.faiss +3 -0
- 69AyT4oBgHgl3EQfcvd4/vector_store/index.pkl +3 -0
- 6NFAT4oBgHgl3EQfnR2x/content/2301.08628v1.pdf +3 -0
- 6NFAT4oBgHgl3EQfnR2x/vector_store/index.faiss +3 -0
- 6NFAT4oBgHgl3EQfnR2x/vector_store/index.pkl +3 -0
- 6tAzT4oBgHgl3EQfEvoZ/content/2301.00997v1.pdf +3 -0
- 6tAzT4oBgHgl3EQfEvoZ/vector_store/index.faiss +3 -0
- 6tAzT4oBgHgl3EQfEvoZ/vector_store/index.pkl +3 -0
- 7tAyT4oBgHgl3EQfQvZV/content/tmp_files/2301.00051v1.pdf.txt +2553 -0
- 7tAyT4oBgHgl3EQfQvZV/content/tmp_files/load_file.txt +0 -0
- 9NE1T4oBgHgl3EQf7wX0/content/2301.03539v1.pdf +3 -0
- 9NE1T4oBgHgl3EQf7wX0/vector_store/index.faiss +3 -0
- 9NE1T4oBgHgl3EQf7wX0/vector_store/index.pkl +3 -0
- 9NE2T4oBgHgl3EQflwcz/content/2301.03991v1.pdf +3 -0
- 9NE2T4oBgHgl3EQflwcz/vector_store/index.faiss +3 -0
- 9NE2T4oBgHgl3EQflwcz/vector_store/index.pkl +3 -0
- AdE1T4oBgHgl3EQf9Aai/vector_store/index.faiss +3 -0
- D9E1T4oBgHgl3EQf-QZ6/content/tmp_files/2301.03566v1.pdf.txt +0 -0
- D9E1T4oBgHgl3EQf-QZ6/content/tmp_files/load_file.txt +0 -0
- F9E5T4oBgHgl3EQfVg_E/content/2301.05552v1.pdf +3 -0
- F9E5T4oBgHgl3EQfVg_E/vector_store/index.faiss +3 -0
- F9E5T4oBgHgl3EQfVg_E/vector_store/index.pkl +3 -0
- H9FLT4oBgHgl3EQfIi9F/content/tmp_files/2301.12000v1.pdf.txt +488 -0
- H9FLT4oBgHgl3EQfIi9F/content/tmp_files/load_file.txt +267 -0
- HdE2T4oBgHgl3EQf_Alo/content/tmp_files/2301.04244v1.pdf.txt +470 -0
- HdE2T4oBgHgl3EQf_Alo/content/tmp_files/load_file.txt +312 -0
- HdFJT4oBgHgl3EQfFCyj/content/2301.11440v1.pdf +3 -0
-dAzT4oBgHgl3EQfFfqG/content/2301.01012v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:64e6268c939ee4e099630476dc79101c24cc86f1a86819e1d237b1b94d12fa66
|
3 |
+
size 623616
|
-dAzT4oBgHgl3EQfFfqG/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:e35ea8454db0febcda9286b3ee194099423653848b182859a58049f214f6a35d
|
3 |
+
size 6815789
|
-dAzT4oBgHgl3EQfFfqG/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:648ec77d7b640fbc52420fc54f83988c524baa340baaf09b14bf1f47f321d403
|
3 |
+
size 235464
|
.gitattributes
CHANGED
@@ -1493,3 +1493,101 @@ wdE0T4oBgHgl3EQf-ALu/content/2301.02810v1.pdf filter=lfs diff=lfs merge=lfs -tex
|
|
1493 |
AdE1T4oBgHgl3EQf9Aai/content/2301.03552v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1494 |
xdE3T4oBgHgl3EQflgqp/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1495 |
kNE1T4oBgHgl3EQfgQS0/content/2301.03228v1.pdf filter=lfs diff=lfs merge=lfs -text
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1493 |
AdE1T4oBgHgl3EQf9Aai/content/2301.03552v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1494 |
xdE3T4oBgHgl3EQflgqp/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1495 |
kNE1T4oBgHgl3EQfgQS0/content/2301.03228v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1496 |
+
r9E3T4oBgHgl3EQfMwkD/content/2301.04375v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1497 |
+
zdE1T4oBgHgl3EQf4QX8/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1498 |
+
ltE2T4oBgHgl3EQfJAY7/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1499 |
+
OdAyT4oBgHgl3EQf7PpY/content/2301.00835v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1500 |
+
zdE1T4oBgHgl3EQfkgRW/content/2301.03274v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1501 |
+
YNA0T4oBgHgl3EQfFf_E/content/2301.02034v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1502 |
+
4tE0T4oBgHgl3EQfegAX/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1503 |
+
ntE2T4oBgHgl3EQfzgi3/content/2301.04132v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1504 |
+
ldFKT4oBgHgl3EQfDS1x/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1505 |
+
QNFPT4oBgHgl3EQfojUh/content/2301.13134v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1506 |
+
AdE1T4oBgHgl3EQf9Aai/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1507 |
+
UNFAT4oBgHgl3EQf2x7k/content/2301.08717v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1508 |
+
4tE0T4oBgHgl3EQfegAX/content/2301.02390v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1509 |
+
OtAzT4oBgHgl3EQfIftM/content/2301.01062v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1510 |
+
stE1T4oBgHgl3EQf3QW2/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1511 |
+
dNFRT4oBgHgl3EQfTjeD/content/2301.13533v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1512 |
+
ntE5T4oBgHgl3EQfjg_f/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1513 |
+
ydE4T4oBgHgl3EQfxw3J/content/2301.05261v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1514 |
+
ntE5T4oBgHgl3EQfjg_f/content/2301.05657v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1515 |
+
x9AzT4oBgHgl3EQfQvs-/content/2301.01203v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1516 |
+
0dFQT4oBgHgl3EQfDjUj/content/2301.13234v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1517 |
+
ktE5T4oBgHgl3EQfGw6j/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1518 |
+
ttAzT4oBgHgl3EQfPfvn/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1519 |
+
dtE3T4oBgHgl3EQfegpr/content/2301.04544v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1520 |
+
PNFJT4oBgHgl3EQfIiwq/content/2301.11456v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1521 |
+
ltAyT4oBgHgl3EQfYfdr/content/2301.00204v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1522 |
+
OtAzT4oBgHgl3EQfIftM/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1523 |
+
zNAyT4oBgHgl3EQfO_a9/content/2301.00017v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1524 |
+
dtE3T4oBgHgl3EQfegpr/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1525 |
+
9NE2T4oBgHgl3EQflwcz/content/2301.03991v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1526 |
+
qtE5T4oBgHgl3EQflQ8e/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1527 |
+
4NE0T4oBgHgl3EQfeQCD/content/2301.02388v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1528 |
+
PNFJT4oBgHgl3EQfIiwq/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1529 |
+
zdE1T4oBgHgl3EQfkgRW/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1530 |
+
qtE5T4oBgHgl3EQflQ8e/content/2301.05669v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1531 |
+
9NE1T4oBgHgl3EQf7wX0/content/2301.03539v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1532 |
+
9NE1T4oBgHgl3EQf7wX0/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1533 |
+
dNFRT4oBgHgl3EQfTjeD/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1534 |
+
zNAyT4oBgHgl3EQfO_a9/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1535 |
+
hNAzT4oBgHgl3EQf4f5B/content/2301.01844v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1536 |
+
x9AzT4oBgHgl3EQfQvs-/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1537 |
+
NtFQT4oBgHgl3EQfWjbh/content/2301.13305v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1538 |
+
hNAzT4oBgHgl3EQf4f5B/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1539 |
+
HdFJT4oBgHgl3EQfFCyj/content/2301.11440v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1540 |
+
F9E5T4oBgHgl3EQfVg_E/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1541 |
+
F9E5T4oBgHgl3EQfVg_E/content/2301.05552v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1542 |
+
ktE5T4oBgHgl3EQfGw6j/content/2301.05434v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1543 |
+
HdFJT4oBgHgl3EQfFCyj/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1544 |
+
ydE4T4oBgHgl3EQfxw3J/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1545 |
+
l9FRT4oBgHgl3EQfZjdA/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1546 |
+
9NE2T4oBgHgl3EQflwcz/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1547 |
+
XdE0T4oBgHgl3EQfmgEE/content/2301.02498v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1548 |
+
NtFQT4oBgHgl3EQfWjbh/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1549 |
+
ZNFIT4oBgHgl3EQfkSuq/content/2301.11300v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1550 |
+
6tAzT4oBgHgl3EQfEvoZ/content/2301.00997v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1551 |
+
UdE4T4oBgHgl3EQfMAzo/content/2301.04944v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1552 |
+
l9FRT4oBgHgl3EQfZjdA/content/2301.13553v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1553 |
+
6tAzT4oBgHgl3EQfEvoZ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1554 |
+
-dAzT4oBgHgl3EQfFfqG/content/2301.01012v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1555 |
+
6NFAT4oBgHgl3EQfnR2x/content/2301.08628v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1556 |
+
UdFKT4oBgHgl3EQfli6N/content/2301.11854v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1557 |
+
39E0T4oBgHgl3EQfvAGt/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1558 |
+
gNE3T4oBgHgl3EQffgrq/content/2301.04554v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1559 |
+
V9E2T4oBgHgl3EQfYAcW/content/2301.03849v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1560 |
+
69AyT4oBgHgl3EQfcvd4/content/2301.00289v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1561 |
+
gNE3T4oBgHgl3EQffgrq/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1562 |
+
-dAzT4oBgHgl3EQfFfqG/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1563 |
+
qNAzT4oBgHgl3EQfq_3c/content/2301.01639v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1564 |
+
69AyT4oBgHgl3EQfcvd4/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1565 |
+
6NFAT4oBgHgl3EQfnR2x/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1566 |
+
d9AyT4oBgHgl3EQfjfgx/content/2301.00414v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1567 |
+
htE3T4oBgHgl3EQfgQqz/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1568 |
+
qNAzT4oBgHgl3EQfq_3c/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1569 |
+
UdFKT4oBgHgl3EQfli6N/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1570 |
+
_NFKT4oBgHgl3EQfUi2J/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1571 |
+
V9E2T4oBgHgl3EQfYAcW/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1572 |
+
UdE4T4oBgHgl3EQfMAzo/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1573 |
+
SdFLT4oBgHgl3EQfPS8r/content/2301.12027v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1574 |
+
_NFKT4oBgHgl3EQfUi2J/content/2301.11784v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1575 |
+
XdE0T4oBgHgl3EQfmgEE/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1576 |
+
ZNAyT4oBgHgl3EQfWveE/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1577 |
+
k9E_T4oBgHgl3EQf6BwH/content/2301.08361v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1578 |
+
ZNFIT4oBgHgl3EQfkSuq/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1579 |
+
QdE0T4oBgHgl3EQfkQFh/content/2301.02470v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1580 |
+
ttAyT4oBgHgl3EQf0flC/content/2301.00718v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1581 |
+
ZNAyT4oBgHgl3EQfWveE/content/2301.00169v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1582 |
+
QdE0T4oBgHgl3EQfkQFh/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1583 |
+
SdFLT4oBgHgl3EQfPS8r/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1584 |
+
btFAT4oBgHgl3EQf5R5J/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1585 |
+
mtAzT4oBgHgl3EQfN_t_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1586 |
+
rNE1T4oBgHgl3EQf2wV_/content/2301.03482v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1587 |
+
WdE4T4oBgHgl3EQfNAwx/content/2301.04952v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1588 |
+
mtAzT4oBgHgl3EQfN_t_/content/2301.01158v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1589 |
+
dtE3T4oBgHgl3EQfGwnT/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1590 |
+
QNFPT4oBgHgl3EQfojUh/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
1591 |
+
btFAT4oBgHgl3EQf5R5J/content/2301.08732v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1592 |
+
gNFKT4oBgHgl3EQftS6b/content/2301.11886v1.pdf filter=lfs diff=lfs merge=lfs -text
|
1593 |
+
WdE4T4oBgHgl3EQfNAwx/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
09FRT4oBgHgl3EQflTce/content/tmp_files/2301.13598v1.pdf.txt
ADDED
@@ -0,0 +1,900 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Economic Predictive Control with Periodic
|
2 |
+
Horizon for Water Distribution Networks
|
3 |
+
Mirhan ¨Urkmez ∗ Carsten Kallesøe ∗ Jan Dimon Bendtsen ∗
|
4 |
+
John Leth ∗
|
5 |
+
∗ Aalborg University, Fredrik Bajers Vej 7c, DK-9220 Aalborg,
|
6 |
+
Denmark
|
7 |
+
(e-mail: {mu,csk,dimon,jjl}@es.aau.dk)
|
8 |
+
Abstract: This paper deals with the control of pumps in large-scale water distribution networks
|
9 |
+
with the aim of minimizing economic costs while satisfying operational constraints. Finding a
|
10 |
+
control algorithm in combination with a model that can be applied in real-time is a challenging
|
11 |
+
problem due to the nonlinearities presented by the pipes and the network sizes. We propose
|
12 |
+
a predictive control algorithm with a periodic horizon. The method provides a way for the
|
13 |
+
economic operation of large water networks with a small linear model. Economic Predictive
|
14 |
+
control with a periodic horizon and a terminal state constraint is constructed to keep the state
|
15 |
+
trajectories close to an optimal periodic trajectory. Barrier terms are also included in the cost
|
16 |
+
function to prevent constraint violations. The proposed method is tested on the EPANET
|
17 |
+
implementation of the water network of a medium size Danish town (Randers) and shown to
|
18 |
+
perform as intended under varying conditions.
|
19 |
+
Keywords: Water distribution networks, Pump Scheduling, Predictive control, Periodic
|
20 |
+
horizon, Economic model predictive control
|
21 |
+
1. INTRODUCTION
|
22 |
+
Water distribution networks (WDNs) deliver drinkable
|
23 |
+
water from water sources to consumers using elements
|
24 |
+
such as pumps, pipes, tanks etc. About 7% − 8% of the
|
25 |
+
world’s energy is used for water production and distribu-
|
26 |
+
tion (Sharif et al., 2019). Water pumps account for a sig-
|
27 |
+
nificant part of the energy required for water distribution
|
28 |
+
with their percentage ranging from 90% to 95% of the
|
29 |
+
total (Abdelsalam and Gabbar, 2021). There have been
|
30 |
+
many works to schedule the operation of the pumps in
|
31 |
+
WDNs with proper methods so as to reduce energy costs.
|
32 |
+
However, pump scheduling is not an easy task because
|
33 |
+
of the nonlinearities governing the network elements. The
|
34 |
+
problem gets complicated with increasing network size.
|
35 |
+
Also, there are constraints to be satisfied such as limits
|
36 |
+
on tank levels.
|
37 |
+
In the literature, WDNs with both constant and variable
|
38 |
+
speed pumps are studied extensively. The control input is
|
39 |
+
turning on and off the pump for constant speed pumps. In
|
40 |
+
Lindell Ormsbee (2009), a constant-speed pump schedul-
|
41 |
+
ing problem is posed as an optimization problem in which
|
42 |
+
the decision variables are the operation times of the pumps
|
43 |
+
and the objective is the energy cost. After observing that
|
44 |
+
the optimal solution would be not running the pumps at
|
45 |
+
all without the constraints, the authors try to find the
|
46 |
+
solution closest to the origin that also complies with the
|
47 |
+
constraints. The proposed way to find such a solution is
|
48 |
+
⋆ This work is funded by Independent Research Fund Denmark
|
49 |
+
(DFF). We acknowledge Verdo company, Peter Nordahn, and Steffen
|
50 |
+
Schmidt for providing us with the EPANET model and the network
|
51 |
+
information.
|
52 |
+
using a Genetic Algorithm (GA). In Bagirov et al. (2013),
|
53 |
+
the Hooke-Jeeves method is used for finding optimal pump
|
54 |
+
operating times for a similar problem. Then, network sim-
|
55 |
+
ulation algorithms are used to check if the constraints are
|
56 |
+
satisfied. In Castro-Gama et al. (2017), binary decision
|
57 |
+
variables are used to represent the opening and the closing
|
58 |
+
of each pump. The feasibility of the solution found with
|
59 |
+
GA is checked with EPANET, a WDN modeling software,
|
60 |
+
and a high cost is assigned to the infeasible solutions.
|
61 |
+
The number of open pumps is also taken as the input
|
62 |
+
to the system in some works, e.g., Wang et al. (2021).
|
63 |
+
The problem is then solved using mixed-integer nonlinear
|
64 |
+
programming. In Berkel et al. (2018), a network in which
|
65 |
+
pressure zones are connected via constant speed pumps
|
66 |
+
is considered. Each pressure zone is treated as a subsys-
|
67 |
+
tem and distributed model predictive control (DMPC) is
|
68 |
+
applied.
|
69 |
+
The flow rate of the pumps should be determined for
|
70 |
+
networks with variable speed pumps. In Pour et al. (2019),
|
71 |
+
Linear Parameter Varying (LPV) system modeling is used
|
72 |
+
to replace the nonlinear part of the network, and an
|
73 |
+
Economic Model Predictive Control (EMPC) is applied
|
74 |
+
on top of the LPV system to find the optimal flow rates.
|
75 |
+
In Kallesøe et al. (2017), a network structure with an
|
76 |
+
elevated reservoir is considered. Available data is used
|
77 |
+
for the identification of a reduced system model. Then,
|
78 |
+
EMPC is applied to the model. In the EMPC formulation,
|
79 |
+
node pressures are not constrained. It is assumed that the
|
80 |
+
pressures would be in the accepted range because there is
|
81 |
+
an elevated reservoir. Relaxation of the original problem
|
82 |
+
into a simpler one is commonly used because of the large
|
83 |
+
network sizes. The relaxation is generally achieved by
|
84 |
+
arXiv:2301.13598v1 [eess.SY] 31 Jan 2023
|
85 |
+
|
86 |
+
approximating the nonlinear pipe equations with some
|
87 |
+
sort of linear equations or inequalities. In Baunsgaard
|
88 |
+
et al. (2016), pipe equations are linearized around an
|
89 |
+
operating point, and model predictive control (MPC) is
|
90 |
+
applied. In Wang et al. (2018), an EMPC is applied to a
|
91 |
+
network where the nonlinear pipe equations are relaxed
|
92 |
+
into a set of linear inequalities. Before simplifying the
|
93 |
+
system model, the network structure is also simplified in
|
94 |
+
Fiedler et al. (2020). A hierarchical clustering method is
|
95 |
+
used to represent the original network with a smaller one
|
96 |
+
which originally had 378 junctions. A system model is
|
97 |
+
derived from the simplified structure using a Deep Neural
|
98 |
+
Network (DNN) structure. Lagrangian relaxation is used
|
99 |
+
to approximate the original problem in Ghaddar et al.
|
100 |
+
(2015).
|
101 |
+
In this paper, a way for optimal pump scheduling of large-
|
102 |
+
scale WDNs is presented. To control the pumps, a linear
|
103 |
+
model of the system is derived. Then, a predictive control
|
104 |
+
method with a periodic horizon is constructed. Barrier
|
105 |
+
functions are utilized to prevent constraint violation due
|
106 |
+
to the model-plant mismatch. With the introduction of
|
107 |
+
the periodic horizon and the terminal state constraint,
|
108 |
+
the chance of finding a feasible solution is increased by
|
109 |
+
keeping trajectories close to an optimal periodic trajectory.
|
110 |
+
The method is applied to a medium-sized Danish town’s
|
111 |
+
network (Randers).
|
112 |
+
The outline of the rest of the paper is as follows. The
|
113 |
+
network model is given in Section 2. The proposed control
|
114 |
+
method is explained in Section 3. The experimental results
|
115 |
+
are presented in Section 4. The paper is concluded with
|
116 |
+
final remarks in Section 5.
|
117 |
+
2. NETWORK MODEL
|
118 |
+
A typical water distribution network consists of pipes,
|
119 |
+
pumps, tanks, junction nodes and reservoirs. Water in
|
120 |
+
the network flows from high hydraulic head to low head.
|
121 |
+
Hydraulic head is a measure of the fluid pressure and is
|
122 |
+
equal to the height of a fluid in a static column at a point.
|
123 |
+
Hydraulic head loss occurring in a pipe can be approxi-
|
124 |
+
mated by the Hazen-Williams Equation as
|
125 |
+
∆h = h1 − h2 = Kq|q|0.852
|
126 |
+
(1)
|
127 |
+
where K is the pipe resistance that depends on the physical
|
128 |
+
features of a pipe such as diameter and length, q is the flow
|
129 |
+
rate, and h1 and h2 are the heads at the two ends of the
|
130 |
+
pipe.
|
131 |
+
At each node j, the mass conservation law is satisfied. It
|
132 |
+
can be expressed as
|
133 |
+
�
|
134 |
+
i∈Nj
|
135 |
+
qij = dj
|
136 |
+
(2)
|
137 |
+
where qij is the flow entering the node j from node i and
|
138 |
+
dj is the demand at node j, which is the water requested
|
139 |
+
by the user at node j. The symbol Nj denotes the set of
|
140 |
+
neighbor nodes of node j. Note that qij is positive if the
|
141 |
+
flow is from node i to the neighbor node j and negative
|
142 |
+
vice versa.
|
143 |
+
Tanks are storage elements that provide water to the users.
|
144 |
+
In the network, tanks are elevated so that water can be
|
145 |
+
pressurized enough to be delivered to the consumers. The
|
146 |
+
change in the water level of a tank is dependent on the
|
147 |
+
flow coming from neighbor nodes and can be written for
|
148 |
+
the tank j as
|
149 |
+
Aj ˙hj =
|
150 |
+
�
|
151 |
+
i∈Nj
|
152 |
+
qij
|
153 |
+
(3)
|
154 |
+
where Aj is the cross-sectional area, hj is the level of the
|
155 |
+
tank. Tank levels change according to the flow passing
|
156 |
+
through the pipes connected to the tanks. Those flows
|
157 |
+
are determined by a set of pipe head loss equations (1),
|
158 |
+
and mass balance equations (2) throughout the whole
|
159 |
+
network. As Equation (1) is nonlinear, flow through pipes
|
160 |
+
connected to the tanks are nonlinear functions fi of the
|
161 |
+
demand at each node, tank levels, and the amount of water
|
162 |
+
coming from the pumps. Explicit forms of those nonlinear
|
163 |
+
functions could be derived if the vector d = [d1, d2...]T
|
164 |
+
containing the demands of all the nodes is known, which is
|
165 |
+
not possible unless demand data for all nodes are available.
|
166 |
+
In our work, we assume that the total demand of the zones
|
167 |
+
that are supplied by the pumps can be estimated through
|
168 |
+
available data with time series analysis methods, but not
|
169 |
+
require d vector to be known. Since fi functions can not be
|
170 |
+
found without d vector, we approximate them using linear
|
171 |
+
models and write tank level change equations as
|
172 |
+
˙h(t) = Ah(t) + B1u(t) + B2da(t)
|
173 |
+
(4)
|
174 |
+
where h(t) ∈ Rn includes tank levels, A ∈ Rn×n, B1 ∈
|
175 |
+
Rn×m, B2 ∈ Rn×1 are constant system matrices and da(t)
|
176 |
+
is the aggregated demand of controlled zone at time t,
|
177 |
+
u(t) ∈ Rm is the input containing pump flows. The reason
|
178 |
+
we chose a linear model is to increase the chance of finding
|
179 |
+
a feasible solution for the controller which is posed as
|
180 |
+
an optimization problem in the next section. Although
|
181 |
+
capturing the full dynamics of a large-scale network is not
|
182 |
+
possible with a linear model, the proposed control method
|
183 |
+
is designed to compensate for model inaccuracies and we
|
184 |
+
have observed that it was enough to control the system
|
185 |
+
while satisfying the constraints.
|
186 |
+
3. PERIODIC HORIZON CONTROL
|
187 |
+
In this section, a predictive control algorithm for pump
|
188 |
+
scheduling is presented to minimize the economical costs.
|
189 |
+
The aim is to run the pumps when the electricity price is
|
190 |
+
low and let tanks deliver water when the price is high while
|
191 |
+
also satisfying input and output constraints. The problem
|
192 |
+
at time t is posed as
|
193 |
+
min
|
194 |
+
ut
|
195 |
+
0,ut
|
196 |
+
1···ut
|
197 |
+
N(t)−1
|
198 |
+
N(t)−1
|
199 |
+
�
|
200 |
+
j=0
|
201 |
+
J(ht
|
202 |
+
j, ut
|
203 |
+
j)
|
204 |
+
(5a)
|
205 |
+
ht
|
206 |
+
j = Adht
|
207 |
+
j−1 + Bd1ut
|
208 |
+
j−1 + Bd2da(j − 1)
|
209 |
+
(5b)
|
210 |
+
ht
|
211 |
+
0 = h(t)
|
212 |
+
(5c)
|
213 |
+
ut
|
214 |
+
j ∈ U ⊆ Rm
|
215 |
+
(5d)
|
216 |
+
ht
|
217 |
+
j ∈ H ⊆ Rn
|
218 |
+
(5e)
|
219 |
+
ht
|
220 |
+
N(t) ∈ Htf ⊆ Rn
|
221 |
+
(5f)
|
222 |
+
where J(ht
|
223 |
+
j, ut
|
224 |
+
j) is the economic cost function, ht
|
225 |
+
=
|
226 |
+
[ht
|
227 |
+
1 · · · ht
|
228 |
+
N(t)] ∈ Rn×N(t) is the predicted future states, ut
|
229 |
+
j is
|
230 |
+
the input vector, N(t) is the prediction horizon, U ⊆ Rm
|
231 |
+
and H ⊆ Rn denotes the input and state constraints
|
232 |
+
respectively and Htf ⊆ Rn is the terminal state set. The
|
233 |
+
continuous system (4) is discretized and (5b) is obtained.
|
234 |
+
|
235 |
+
The optimization problem (5) is solved at every time step
|
236 |
+
separated by ∆t and the first term ut
|
237 |
+
0 of the optimal input
|
238 |
+
sequence ut = [ut
|
239 |
+
0 · · · ut
|
240 |
+
N(t)−1] ∈ Rm×N(t) is applied to the
|
241 |
+
system.
|
242 |
+
Input constraints come from the physical limitations and
|
243 |
+
working principles of the pumps. A pump can not provide
|
244 |
+
water in the opposite direction and it can deliver a maxi-
|
245 |
+
mum amount of water per unit of time. These conditions
|
246 |
+
are expressed as
|
247 |
+
U = {[u1, · · · um] ∈ Rm | 0 ≤ u1 ≤ u1, · · · 0 ≤ um ≤ um}
|
248 |
+
(6)
|
249 |
+
where u1 · · · um are upper flow limits. Tank levels are also
|
250 |
+
constrained so that there is always enough water in the
|
251 |
+
tanks in case of an emergency and there is no overflow of
|
252 |
+
water. The set H can be defined as
|
253 |
+
H = {[h1, · · · h2] ∈ Rn | ˜h1 ≤ h1 ≤ h1, · · · ˜hn ≤ hn ≤ hn}
|
254 |
+
(7)
|
255 |
+
The cost function includes the electricity costs of the
|
256 |
+
pumps. The power provided to the network by the pump
|
257 |
+
i is equal to qpi(pout
|
258 |
+
i
|
259 |
+
− pin
|
260 |
+
i ), where qpi is the pump flow,
|
261 |
+
pi
|
262 |
+
out and pi
|
263 |
+
in are the outlet and inlet pressures of the pump
|
264 |
+
i. The inlet pressures pin = [pin
|
265 |
+
1 , pin
|
266 |
+
2 ] are the pressures of
|
267 |
+
the related reservoirs and are assumed to be constant. The
|
268 |
+
outlet pressures pout = [pout
|
269 |
+
1
|
270 |
+
, pout
|
271 |
+
2
|
272 |
+
] are given as the output
|
273 |
+
of the linear model
|
274 |
+
pout(t) = Aph(t) + Bpu(t)
|
275 |
+
(8)
|
276 |
+
where Ap and Bp are found using system identification
|
277 |
+
on data generated by the EPANET model. Electricity
|
278 |
+
cost at time t is then found by multiplying total power
|
279 |
+
consumption u(t)T (pout(t) − pin(t)) with the electricity
|
280 |
+
price c(t).
|
281 |
+
We acknowledge a certain degree of model-plant mismatch
|
282 |
+
by using a linear model (4) to represent the whole network.
|
283 |
+
This causes actual states h(t) to be different than the
|
284 |
+
predicted states ht. We know that the predicted states
|
285 |
+
satisfy the state constraints (7) since they are the solution
|
286 |
+
to the optimization problem 5, but the actual states
|
287 |
+
might violate them. To ensure the satisfaction of the state
|
288 |
+
constraints with the model-plant mismatch, we introduce
|
289 |
+
new terms to the cost function. First, we rewrite state
|
290 |
+
constraints (7) as
|
291 |
+
Ci(h) ≤ 0,
|
292 |
+
i = 0, 1, · · · 2 × n − 1
|
293 |
+
(9)
|
294 |
+
where C0(h) = ˜h1 −h1 and the rest of the Ci functions are
|
295 |
+
chosen in a similar manner. The cost function terms are
|
296 |
+
then defined as
|
297 |
+
Jhi(h) = eai(Ci(h)+bi)
|
298 |
+
i = 0, 1, · · · 2 × n − 1
|
299 |
+
(10)
|
300 |
+
where ai, bi ∈ R>0. This can be seen as an exponential
|
301 |
+
barrier function. The parameters ai, bi determine a danger-
|
302 |
+
ous region close to the boundaries of the state constraints
|
303 |
+
where cost function Jhi attains high values. The predicted
|
304 |
+
optimal state trajectories ht do not enter the dangerous
|
305 |
+
region if possible because of the high cost values in the
|
306 |
+
dangerous region. Then, the actual states h(t) do not
|
307 |
+
violate the state constraints (7) assuming the difference
|
308 |
+
between the predicted state and the actual state is small.
|
309 |
+
If the state trajectory enters one of the dangerous regions
|
310 |
+
at any step due to the model-plant mismatch, then the
|
311 |
+
cost function will try to drive the trajectory out of the
|
312 |
+
region.
|
313 |
+
∆t
|
314 |
+
N(t)∆t
|
315 |
+
N(t + ∆t)∆t
|
316 |
+
h(t)
|
317 |
+
h(t + ∆t)
|
318 |
+
ht
|
319 |
+
1
|
320 |
+
ut
|
321 |
+
0
|
322 |
+
ut+∆t
|
323 |
+
0
|
324 |
+
ht+∆t
|
325 |
+
ht
|
326 |
+
Br(h∗
|
327 |
+
Tday/∆t)
|
328 |
+
Fig. 1. Predicted state trajectories ht, ht+∆t at times
|
329 |
+
t, t + ∆t. Sampling time ∆t, prediction horizons
|
330 |
+
N(t), N(t + ∆t) and the applied inputs ut
|
331 |
+
0, ut+∆t
|
332 |
+
0
|
333 |
+
are
|
334 |
+
shown. The true state h(t + ∆t) and the predicted
|
335 |
+
state ht
|
336 |
+
1 are indicated to emphasize the deviation from
|
337 |
+
the prediction. The terminal set Br(h∗
|
338 |
+
Tday/∆t) is also
|
339 |
+
illustrated.
|
340 |
+
The overall cost function includes both the electricity
|
341 |
+
expense term and the constraint barrier functions and it
|
342 |
+
can be expressed as
|
343 |
+
J(h(t), u(t)) = c(t)u(t)T (pout(t)−pin(t))+
|
344 |
+
2×n−1
|
345 |
+
�
|
346 |
+
i=0
|
347 |
+
Jhi(h(t))
|
348 |
+
(11)
|
349 |
+
Both electricity price c(t) and total water demand da(t)
|
350 |
+
signals can be viewed as consisting of a periodic signal
|
351 |
+
with a period of 1 day and a relatively small deviation
|
352 |
+
signal. This can be leveraged to find a feasible controller.
|
353 |
+
Suppose a sequence of inputs can be found for some
|
354 |
+
initial tank levels such that levels after 1 day are equal
|
355 |
+
to initial levels. In that case, the problem after 1 day is
|
356 |
+
the same as in the beginning assuming deviation signals
|
357 |
+
of the electricity price and the demand are zero, hence
|
358 |
+
they are periodic. Then, the input sequence from the
|
359 |
+
previous day could be applied and produce the same
|
360 |
+
path for tank levels. Taking into account the deviation
|
361 |
+
signals and supposing that a solution exists such that
|
362 |
+
levels after 1 day are close to initial levels, the input
|
363 |
+
sequence from the previous day could be a good point of
|
364 |
+
start to search for a feasible solution if the map from the
|
365 |
+
initial conditions and the demand profile to the optimal
|
366 |
+
input sequences is continuous. Therefore, we choose a
|
367 |
+
terminal state constraint for the end of each day to
|
368 |
+
increase the chance of finding a feasible solution. Now, the
|
369 |
+
remaining problem is to decide which tank levels should
|
370 |
+
the trajectories turn back to at the end of each day. We
|
371 |
+
define the optimal periodic trajectory of the system as the
|
372 |
+
solution of
|
373 |
+
(u∗, h∗) = arg min
|
374 |
+
ui,hi
|
375 |
+
(Tday/∆t)−1
|
376 |
+
�
|
377 |
+
i=0
|
378 |
+
J(hi, ui)
|
379 |
+
(12a)
|
380 |
+
hi = Adhi−1 + Bd1ui−1 + Bd2d∗
|
381 |
+
a(i − 1)
|
382 |
+
(12b)
|
383 |
+
ui ∈ U ⊆ Rm
|
384 |
+
(12c)
|
385 |
+
hi ∈ H ⊆ Rn
|
386 |
+
(12d)
|
387 |
+
h0 = hTday/∆t
|
388 |
+
(12e)
|
389 |
+
where Tday is the duration of a whole day, d∗
|
390 |
+
a is the
|
391 |
+
average daily demand profile obtained from the past
|
392 |
+
measurements. The resulting state trajectory h∗
|
393 |
+
=
|
394 |
+
[h∗
|
395 |
+
0 · · · h∗
|
396 |
+
Tday/∆t] ∈ Rn×(Tday/∆t+1) is the optimal periodic
|
397 |
+
trajectory because of the constraint (12e). The terminal
|
398 |
+
set Htf and the prediction horizon N(t) is chosen to make
|
399 |
+
tank levels at the end of each day close to h∗
|
400 |
+
Tday/∆t. At
|
401 |
+
|
402 |
+
High Zone
|
403 |
+
Low Zone
|
404 |
+
Fig. 2. Water Distribution Network of Randers. The pump-
|
405 |
+
ing stations to be controlled are shown in red. Tanks
|
406 |
+
are shown with a ’T’ shaped symbol in yellow.
|
407 |
+
any time t, t + N(t)∆t should be equal to the end of the
|
408 |
+
day. Htf and N(t) could be written as
|
409 |
+
Htf = Br(h∗
|
410 |
+
Tday/∆t)
|
411 |
+
(13a)
|
412 |
+
N(t) = (Tday − t mod Tday)/∆t
|
413 |
+
(13b)
|
414 |
+
where Br(h∗
|
415 |
+
Tday/∆t) is the open ball centered at h∗
|
416 |
+
Tday/∆t
|
417 |
+
with radius r. Note that N(t) changes so that t + N(t)∆t
|
418 |
+
is the end of the day for all t. With these definitions, the
|
419 |
+
condition (13a) will translate to tank levels at the end of
|
420 |
+
the day being close to the final point in optimal periodic
|
421 |
+
trajectory h∗
|
422 |
+
Tday/∆t as shown in Figure 1. Therefore, not
|
423 |
+
only chance of finding a feasible solution is increased but
|
424 |
+
also the solutions are kept around the optimal periodic
|
425 |
+
trajectory h∗. If the problem (5) becomes infeasible at
|
426 |
+
any time step t, we apply the second term of the input
|
427 |
+
sequence from the previous step ut−∆t
|
428 |
+
1
|
429 |
+
. The reason behind
|
430 |
+
this choice is as follows: If we apply the optimal control
|
431 |
+
input ut−∆t
|
432 |
+
0
|
433 |
+
to the network model (4) at time t − ∆t,
|
434 |
+
then the optimal sequence in the next time step will be
|
435 |
+
ut = [ut−∆t
|
436 |
+
1
|
437 |
+
· · · ut−∆t
|
438 |
+
N(t−∆t)−1] following Bellman’s principle
|
439 |
+
of optimality. Then, at time t, ut−∆t
|
440 |
+
1
|
441 |
+
will be applied to
|
442 |
+
the system as calculated at t − ∆t. Assuming the model-
|
443 |
+
plant mismatch is small enough, ut−∆t
|
444 |
+
1
|
445 |
+
is still a good input
|
446 |
+
candidate if the problem is infeasible at time t.
|
447 |
+
4. APPLICATION
|
448 |
+
The presented method is applied to WDN of Randers, a
|
449 |
+
Danish city, which is shown in Figure 2. The network con-
|
450 |
+
sists of 4549 nodes and 4905 links connecting them. There
|
451 |
+
are 8 pumping stations in the network, 6 of which are
|
452 |
+
shown in the figure whereas the other 2 are stationed where
|
453 |
+
tanks are placed. The goal is to derive the schedules for
|
454 |
+
2 of the pumping stations while other pumps are already
|
455 |
+
working according to some predetermined strategies. The
|
456 |
+
stations to be controlled are shown in red in the figure.
|
457 |
+
Their task is to deliver water mostly to the High Zone (HZ)
|
458 |
+
and Low Zone (LZ). However, connections exist between
|
459 |
+
HZ-LZ and the rest of the city, so we can not think of the
|
460 |
+
system as composed of isolated networks entirely. There
|
461 |
+
are also 3 tanks in the HZ. While 2 of them are directly
|
462 |
+
connected via pipes, the third one stands alone as shown
|
463 |
+
in the figure.
|
464 |
+
The overall structure of the Randers WDN with tanks and
|
465 |
+
pumps to be controlled are given in Figure 3. There are 3
|
466 |
+
water tanks in the network, 2 of which have been connected
|
467 |
+
Fig. 3. Structure of the WDN.
|
468 |
+
with a pipe directly. The tank level changes can be written
|
469 |
+
by applying the mass conservation law (3) to the tanks in
|
470 |
+
Figure 3 as
|
471 |
+
A1 ˙h1 = q1down + q1up + qinter
|
472 |
+
(14a)
|
473 |
+
= f1(h1, h2, h3, qp1, qp2, d),
|
474 |
+
A2 ˙h2 = q2down + q2up − qinter
|
475 |
+
(14b)
|
476 |
+
= f2(h1, h2, h3, qp1, qp2, d),
|
477 |
+
A3 ˙h3 = q3 = f3(h1, h2, h3, qp1, qp2, d),
|
478 |
+
(14c)
|
479 |
+
where d is the vector containing the demands of all the
|
480 |
+
nodes, qp1, qp2 are the pump flows, A1, A2, A3 are the cross
|
481 |
+
sectional areas of the tanks and f1, f2, f3 are nonlinear
|
482 |
+
flow functions. Water levels at the two connected tanks are
|
483 |
+
almost equal h1 ≈ h2 all the time since the pipe connecting
|
484 |
+
respective tanks is big enough to oppose the water flows
|
485 |
+
coming from neighbor nodes. That enables us to consider
|
486 |
+
h1, h2 together as
|
487 |
+
(A1 + A2)˙h1,2 ≈ q1down + q2down + qup = f1 + f2.
|
488 |
+
(15)
|
489 |
+
We have used the EPANET model of the network to
|
490 |
+
generate the data required for approximating f1 + f2
|
491 |
+
and f3. The model is simulated with various tank level
|
492 |
+
initial conditions and flow rates of 2 pumping stations
|
493 |
+
to be controlled. The control laws for the remaining
|
494 |
+
pumping stations are already defined in the EPANET
|
495 |
+
model. Then, the linear model (4) is fitted to simulation
|
496 |
+
data using least squares. The state variables for the model
|
497 |
+
are h(t) = [h1,2(t), h3(t)] ∈ R2 and the inputs are u(t) =
|
498 |
+
[qp1(t), qp2(t)] ∈ R2. The total demand of High and Low
|
499 |
+
Zone is used as aggregated demand da in the model since
|
500 |
+
mainly those areas are supplied by the controlled pumps.
|
501 |
+
4.1 Simulation Results
|
502 |
+
The proposed control method is tested on EPANET model
|
503 |
+
of Randers water network. Epanet-Matlab toolkit Eliades
|
504 |
+
et al. (2016) is used to set the flow of the 2 pumps at
|
505 |
+
each time step and simulate the network. The remaining
|
506 |
+
pumps are controlled with rule-based control laws that are
|
507 |
+
previously defined on EPANET.
|
508 |
+
The parameters of exponential barrier functions Jhi are
|
509 |
+
chosen as ai = 80, bi = 0.3 for all i. It is assumed
|
510 |
+
that the electricity prices are known in advance during
|
511 |
+
the test. Tank levels h1, h2 have a maximum value of 3m
|
512 |
+
while h3 has 2.8m. Tanks are required to be at least half
|
513 |
+
full. Maximum pump flows are set to 100. Sampling time
|
514 |
+
∆t is set to 1 hour in the experiments, so the control
|
515 |
+
input is recalculated at each hour. We assume that total
|
516 |
+
demand da(t) of HZ and LZ can be estimated up to 1 day
|
517 |
+
from available data. Although we do not have historical
|
518 |
+
|
519 |
+
qup
|
520 |
+
qiup
|
521 |
+
q2up
|
522 |
+
h1
|
523 |
+
h2
|
524 |
+
h3
|
525 |
+
qinter
|
526 |
+
q1down
|
527 |
+
2down
|
528 |
+
q3
|
529 |
+
Pump 1
|
530 |
+
Pump 2
|
531 |
+
9p1
|
532 |
+
qp2data on the demand, we imitate this behaviour by using
|
533 |
+
a slightly perturbed version of the real demand used
|
534 |
+
in EPANET simulation during MPC calculations. The
|
535 |
+
perturbations are adapted from a real demand data set of
|
536 |
+
a small Danish facility. Normalized difference between the
|
537 |
+
average demand and the demand of a random day in data
|
538 |
+
set is added to EPANET demand to replicate estimated
|
539 |
+
demand. In each experiment a different day from the data
|
540 |
+
set is used, so the assumed estimated demand is different
|
541 |
+
each time.
|
542 |
+
The simulation results when the presented method is
|
543 |
+
applied to the EPANET model are given in Figure 4. The
|
544 |
+
initial tank levels are equal to h∗
|
545 |
+
Tday/∆t in the simulation.
|
546 |
+
The top plot shows the evolution of tank levels along
|
547 |
+
with the upper and lower thresholds. It is seen that the
|
548 |
+
thresholds are not violated and moreover tank levels are
|
549 |
+
not getting too close to them, which was the idea behind
|
550 |
+
exponential barrier functions. Both the real demand and
|
551 |
+
the assumed estimated demand of HZ and LZ are in the
|
552 |
+
figure below. Total applied pump flows and electricity
|
553 |
+
prices are in the following figures. The expected result is
|
554 |
+
pump flows being higher when electricity prices are low,
|
555 |
+
and lower when they are high, which seems to be the case
|
556 |
+
as can be seen in the plot. Pump flows drop significantly
|
557 |
+
when prices are at the peak and they reach their highest
|
558 |
+
value at the end of the day when prices are low. A more
|
559 |
+
aggressive controller can be obtained by picking a smaller
|
560 |
+
bi value for barrier functions at the expense of risking
|
561 |
+
constraint violation. In Figure 5, the tank level simulation
|
562 |
+
results and control inputs for different initial conditions
|
563 |
+
and different assumed estimated demands are given. The
|
564 |
+
electricity price profile is the same as before. It is seen that
|
565 |
+
the algorithm is able to control the network on various
|
566 |
+
cases while satisfying the constraints. Regardless of initial
|
567 |
+
tank levels, the pumping profiles have a similar profile:
|
568 |
+
high pump flows close to midnight and in the middle of
|
569 |
+
the day. The only exception is the bottom plot. In the
|
570 |
+
beginning, prices are low but pump flows are not high.
|
571 |
+
This can be attributed to water levels h1, h2 being close to
|
572 |
+
the upper thresholds and water demand being low in the
|
573 |
+
beginning.
|
574 |
+
The assumption that the optimal input sequences U(t)
|
575 |
+
would not diverge a lot from the one found in previous
|
576 |
+
step U(t − ∆t) is the reason we apply ut−∆t
|
577 |
+
1
|
578 |
+
at time t if
|
579 |
+
the problem (5) is infeasible at time t. This assumption is
|
580 |
+
tested with initial conditions h1,2,3 = h∗
|
581 |
+
Tday/∆t. In figure
|
582 |
+
6, total pump flow [1, 1]T ut
|
583 |
+
i, i = 0 · · · N(t) − 1 of the
|
584 |
+
found optimal input sequences U(t), t = 0, ∆t · · · Tday−∆t,
|
585 |
+
except when the problem were infeasible, are given. It can
|
586 |
+
be seen that ut−∆t
|
587 |
+
1
|
588 |
+
is close to the ut
|
589 |
+
0 for all t, which shows
|
590 |
+
that our assumption is valid at least for this experiment.
|
591 |
+
Finally, the ability of the algorithm to decrease economic
|
592 |
+
costs is tested with various initial conditions. For each
|
593 |
+
case, a demand follower pumping strategy is used as a
|
594 |
+
benchmark. The flow of the 2 pumps is adjusted with trial
|
595 |
+
and error for each demand follower such that the total flow
|
596 |
+
of the 2 pumps is equal to water demand at each time step
|
597 |
+
and tank levels satisfy the terminal constraint (13a). The
|
598 |
+
demand follower is a natural candidate to be a benchmark
|
599 |
+
method since providing as much water as demand is an
|
600 |
+
intuitive idea and the constraints in (5) can be satisfied
|
601 |
+
(a)
|
602 |
+
(b)
|
603 |
+
(c)
|
604 |
+
(d)
|
605 |
+
Fig. 4. Sample simulation. (a) evolution of tank levels
|
606 |
+
through 1 day with upper and lower level thresholds;
|
607 |
+
(b) real total demand of HZ and LZ used in EPANET
|
608 |
+
simulation and the demand used in MPC calculations;
|
609 |
+
(c) total flow provided by the 2 pumps; (d) electricity
|
610 |
+
price.
|
611 |
+
Proposed Method
|
612 |
+
Demand Follower
|
613 |
+
0.5967
|
614 |
+
1
|
615 |
+
0.5745
|
616 |
+
1
|
617 |
+
0.5826
|
618 |
+
1
|
619 |
+
0.5558
|
620 |
+
1
|
621 |
+
Table 1. Relative economic costs of the pro-
|
622 |
+
posed method and demand follower strategy
|
623 |
+
for various demand profiles
|
624 |
+
with manual adjustments of pump flows. The economic
|
625 |
+
costs are presented relatively in Table 1 As it is seen, the
|
626 |
+
proposed algorithm saves between 40% and 45% of the
|
627 |
+
cost with different demand profiles.
|
628 |
+
5. CONCLUSION
|
629 |
+
We have presented a predictive control algorithm with a
|
630 |
+
periodic horizon for WDNs. The aim is to minimize the
|
631 |
+
|
632 |
+
3.5
|
633 |
+
h1
|
634 |
+
h2
|
635 |
+
upper threshold
|
636 |
+
3
|
637 |
+
h3
|
638 |
+
3 upper threshold
|
639 |
+
Tank Levels
|
640 |
+
1.5
|
641 |
+
1
|
642 |
+
0
|
643 |
+
5
|
644 |
+
10
|
645 |
+
15
|
646 |
+
20
|
647 |
+
25140
|
648 |
+
120
|
649 |
+
100
|
650 |
+
80
|
651 |
+
60
|
652 |
+
40
|
653 |
+
Real Demand
|
654 |
+
Known Demand
|
655 |
+
20
|
656 |
+
0
|
657 |
+
5
|
658 |
+
10
|
659 |
+
15
|
660 |
+
20
|
661 |
+
25200
|
662 |
+
Total Pump Flow
|
663 |
+
150
|
664 |
+
100
|
665 |
+
50
|
666 |
+
0
|
667 |
+
0
|
668 |
+
5
|
669 |
+
10
|
670 |
+
15
|
671 |
+
20
|
672 |
+
251.2
|
673 |
+
Price
|
674 |
+
0.8
|
675 |
+
lectricity
|
676 |
+
0.6
|
677 |
+
0.4
|
678 |
+
E
|
679 |
+
0.2
|
680 |
+
0
|
681 |
+
0
|
682 |
+
5
|
683 |
+
10
|
684 |
+
15
|
685 |
+
20
|
686 |
+
25
|
687 |
+
HoursFig. 5. Tank levels and pump flows for different initial
|
688 |
+
conditions
|
689 |
+
Fig. 6. Evolution of found input sequences U(t) through 1
|
690 |
+
day. It can be seen that the solutions remain close to
|
691 |
+
the initial optimal sequence U(0).
|
692 |
+
economic cost and satisfy the operational constraints. A
|
693 |
+
linear model is used to represent Randers WDN to increase
|
694 |
+
the chance of finding a solution to the problem (5) at
|
695 |
+
expense of a model-plant mismatch. Periodic horizon is
|
696 |
+
introduced to the predictive control formulation to keep
|
697 |
+
the resulting state trajectories around the optimal periodic
|
698 |
+
trajectory. Barrier functions are used to prevent constraint
|
699 |
+
violation since there is a model-plant mismatch.
|
700 |
+
The presented algorithm is tested on Randers WDN using
|
701 |
+
EPANET. It is shown in various situations that the
|
702 |
+
method is able to find an economic solution where pump
|
703 |
+
flows are adjusted according to electricity prices. Also,
|
704 |
+
it is shown that the system trajectories do not enter
|
705 |
+
dangerous zones introduced by barrier functions as long
|
706 |
+
as the predicted demand and the actual demand are
|
707 |
+
somewhat close.
|
708 |
+
As future work, we plan to work on theoretical guarantees
|
709 |
+
of the existence of solutions to the proposed method. Also,
|
710 |
+
the robustness of periodic horizon control of periodical
|
711 |
+
systems with barrier functions will be investigated.
|
712 |
+
REFERENCES
|
713 |
+
Abdelsalam, A.A. and Gabbar, H.A. (2021). Energy saving
|
714 |
+
and management of water pumping networks. Heliyon,
|
715 |
+
7(8), e07820. doi:https://doi.org/10.1016/j.heliyon.20
|
716 |
+
21.e07820.
|
717 |
+
Bagirov, A.M., Barton, A., Mala-Jetmarova, H., Nuaimat,
|
718 |
+
A.A., Ahmed, S.T., Sultanova, N., and Yearwood, J.
|
719 |
+
(2013). An algorithm for minimization of pumping costs
|
720 |
+
in water distribution systems using a novel approach to
|
721 |
+
pump scheduling. Math. Comput. Model., 57, 873–886.
|
722 |
+
Baunsgaard, K.M.H., Ravn, O., Kallesøe, C.S., and
|
723 |
+
Poulsen, N.K. (2016).
|
724 |
+
Mpc control of water supply
|
725 |
+
networks.
|
726 |
+
2016 European Control Conference (ECC),
|
727 |
+
1770–1775.
|
728 |
+
Berkel, F., Caba, S., Bleich, J., and Liu, S. (2018).
|
729 |
+
A
|
730 |
+
modeling and distributed mpc approach for water dis-
|
731 |
+
tribution networks. Control Engineering Practice.
|
732 |
+
Castro-Gama, M.E., Pan, Q., Lanfranchi, E.A., Jonoski,
|
733 |
+
A., and Solomatine, D.P. (2017). Pump scheduling for a
|
734 |
+
large water distribution network. milan, italy. Procedia
|
735 |
+
Engineering, 186, 436–443.
|
736 |
+
Eliades, D.G., Kyriakou, M., Vrachimis, S., and Polycar-
|
737 |
+
pou, M.M. (2016).
|
738 |
+
Epanet-matlab toolkit: An open-
|
739 |
+
source software for interfacing epanet with matlab. In
|
740 |
+
Proc. 14th International Conference on Computing and
|
741 |
+
Control for the Water Industry (CCWI), 8. The Nether-
|
742 |
+
lands. doi:10.5281/zenodo.831493.
|
743 |
+
Fiedler, F., Cominola, A., and Lucia, S. (2020).
|
744 |
+
Eco-
|
745 |
+
nomic nonlinear predictive control of water distribution
|
746 |
+
networks based on surrogate modeling and automatic
|
747 |
+
clustering. IFAC-PapersOnLine, 53, 16636–16643.
|
748 |
+
Ghaddar, B., Naoum-Sawaya, J., Kishimoto, A., Taheri,
|
749 |
+
N., and Eck, B. (2015).
|
750 |
+
A lagrangian decomposition
|
751 |
+
approach for the pump scheduling problem in water
|
752 |
+
networks. Eur. J. Oper. Res., 241, 490–501.
|
753 |
+
Kallesøe, C.S., Jensen, T.N., and Bendtsen, J.D. (2017).
|
754 |
+
Plug-and-play model predictive control for water supply
|
755 |
+
networks with storage. IFAC-PapersOnLine, 50, 6582–
|
756 |
+
6587.
|
757 |
+
Lindell Ormsbee, Srini Lingireddy, D.C. (2009). Optimal
|
758 |
+
pump scheduling for water distribution systems. URL
|
759 |
+
http://www.uky.edu/WDST/PDFs/[73.3]%20Ormsbee%
|
760 |
+
20Optimal%20Pump%20Scheduling%20Paper.pdf.
|
761 |
+
Pour, F.K., Puig, V., and Cembra˜no, G. (2019). Economic
|
762 |
+
mpc-lpv control for the operational management of
|
763 |
+
water distribution networks. IFAC-PapersOnLine.
|
764 |
+
Sharif, N., Haider, H., Farahat, A., Hewage, K., and Sadiq,
|
765 |
+
R. (2019). Water energy nexus for water distribution
|
766 |
+
systems: A literature review. Environmental Reviews,
|
767 |
+
27. doi:10.1139/er-2018-0106.
|
768 |
+
Wang, Y., Alamo, T., Puig, V., and Cembra˜no, G. (2018).
|
769 |
+
Economic model predictive control with nonlinear con-
|
770 |
+
straint relaxation for the operational management of
|
771 |
+
water distribution networks. Energies, 11, 991.
|
772 |
+
Wang, Y., Yok, K.T., Wu, W., Simpson, A.R., Weyer, E.,
|
773 |
+
and Manzie, C. (2021).
|
774 |
+
Minimizing pumping energy
|
775 |
+
cost in real-time operations of water distribution sys-
|
776 |
+
tems using economic model predictive control. ArXiv,
|
777 |
+
abs/2010.07477.
|
778 |
+
|
779 |
+
200
|
780 |
+
Total Pump Flow
|
781 |
+
150
|
782 |
+
100
|
783 |
+
50
|
784 |
+
0
|
785 |
+
0
|
786 |
+
5
|
787 |
+
10
|
788 |
+
15
|
789 |
+
20
|
790 |
+
253.5
|
791 |
+
h1
|
792 |
+
h2
|
793 |
+
upperthreshold
|
794 |
+
h3
|
795 |
+
3 upper threshold
|
796 |
+
Tank Levels
|
797 |
+
2.5
|
798 |
+
1.5
|
799 |
+
1
|
800 |
+
0
|
801 |
+
5
|
802 |
+
10
|
803 |
+
15
|
804 |
+
20
|
805 |
+
25250
|
806 |
+
Total Pump Flow
|
807 |
+
200
|
808 |
+
150
|
809 |
+
100
|
810 |
+
50
|
811 |
+
0
|
812 |
+
0
|
813 |
+
5
|
814 |
+
10
|
815 |
+
15
|
816 |
+
20
|
817 |
+
253.5
|
818 |
+
h1
|
819 |
+
h2
|
820 |
+
upper threshold
|
821 |
+
3
|
822 |
+
h3
|
823 |
+
upper threshold
|
824 |
+
Tank Levels
|
825 |
+
1.5
|
826 |
+
1
|
827 |
+
0
|
828 |
+
5
|
829 |
+
10
|
830 |
+
15
|
831 |
+
20
|
832 |
+
25200
|
833 |
+
Total Pump Flow
|
834 |
+
150
|
835 |
+
100
|
836 |
+
50
|
837 |
+
0
|
838 |
+
0
|
839 |
+
5
|
840 |
+
10
|
841 |
+
15
|
842 |
+
20
|
843 |
+
25200
|
844 |
+
U(0)
|
845 |
+
150
|
846 |
+
Flow
|
847 |
+
100
|
848 |
+
U(1)
|
849 |
+
50
|
850 |
+
0
|
851 |
+
0
|
852 |
+
5
|
853 |
+
10
|
854 |
+
15
|
855 |
+
20
|
856 |
+
25
|
857 |
+
Hours3.5
|
858 |
+
h1
|
859 |
+
h2
|
860 |
+
upperthreshold
|
861 |
+
3
|
862 |
+
h3
|
863 |
+
3 upper threshold
|
864 |
+
Tank Levels
|
865 |
+
2.5
|
866 |
+
1.5
|
867 |
+
1
|
868 |
+
0
|
869 |
+
5
|
870 |
+
10
|
871 |
+
15
|
872 |
+
20
|
873 |
+
25250
|
874 |
+
Total Pump Flow
|
875 |
+
200
|
876 |
+
150
|
877 |
+
100
|
878 |
+
50
|
879 |
+
0
|
880 |
+
0
|
881 |
+
5
|
882 |
+
10
|
883 |
+
15
|
884 |
+
20
|
885 |
+
253.5
|
886 |
+
h1
|
887 |
+
h2
|
888 |
+
upperthreshold
|
889 |
+
3
|
890 |
+
h3
|
891 |
+
3 upper threshold
|
892 |
+
Tank Levels
|
893 |
+
1.5
|
894 |
+
1
|
895 |
+
0
|
896 |
+
5
|
897 |
+
10
|
898 |
+
15
|
899 |
+
20
|
900 |
+
25
|
09FRT4oBgHgl3EQflTce/content/tmp_files/load_file.txt
ADDED
@@ -0,0 +1,420 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf,len=419
|
2 |
+
page_content='Economic Predictive Control with Periodic Horizon for Water Distribution Networks Mirhan ¨Urkmez ∗ Carsten Kallesøe ∗ Jan Dimon Bendtsen ∗ John Leth ∗ ∗ Aalborg University, Fredrik Bajers Vej 7c, DK-9220 Aalborg, Denmark (e-mail: {mu,csk,dimon,jjl}@es.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
3 |
+
page_content='aau.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
4 |
+
page_content='dk) Abstract: This paper deals with the control of pumps in large-scale water distribution networks with the aim of minimizing economic costs while satisfying operational constraints.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
5 |
+
page_content=' Finding a control algorithm in combination with a model that can be applied in real-time is a challenging problem due to the nonlinearities presented by the pipes and the network sizes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
6 |
+
page_content=' We propose a predictive control algorithm with a periodic horizon.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
7 |
+
page_content=' The method provides a way for the economic operation of large water networks with a small linear model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
8 |
+
page_content=' Economic Predictive control with a periodic horizon and a terminal state constraint is constructed to keep the state trajectories close to an optimal periodic trajectory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
9 |
+
page_content=' Barrier terms are also included in the cost function to prevent constraint violations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
10 |
+
page_content=' The proposed method is tested on the EPANET implementation of the water network of a medium size Danish town (Randers) and shown to perform as intended under varying conditions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
11 |
+
page_content=' Keywords: Water distribution networks, Pump Scheduling, Predictive control, Periodic horizon, Economic model predictive control 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
12 |
+
page_content=' INTRODUCTION Water distribution networks (WDNs) deliver drinkable water from water sources to consumers using elements such as pumps, pipes, tanks etc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
13 |
+
page_content=' About 7% − 8% of the world’s energy is used for water production and distribu- tion (Sharif et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
14 |
+
page_content=', 2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
15 |
+
page_content=' Water pumps account for a sig- nificant part of the energy required for water distribution with their percentage ranging from 90% to 95% of the total (Abdelsalam and Gabbar, 2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
16 |
+
page_content=' There have been many works to schedule the operation of the pumps in WDNs with proper methods so as to reduce energy costs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
17 |
+
page_content=' However, pump scheduling is not an easy task because of the nonlinearities governing the network elements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
18 |
+
page_content=' The problem gets complicated with increasing network size.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
19 |
+
page_content=' Also, there are constraints to be satisfied such as limits on tank levels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
20 |
+
page_content=' In the literature, WDNs with both constant and variable speed pumps are studied extensively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
21 |
+
page_content=' The control input is turning on and off the pump for constant speed pumps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
22 |
+
page_content=' In Lindell Ormsbee (2009), a constant-speed pump schedul- ing problem is posed as an optimization problem in which the decision variables are the operation times of the pumps and the objective is the energy cost.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
23 |
+
page_content=' After observing that the optimal solution would be not running the pumps at all without the constraints, the authors try to find the solution closest to the origin that also complies with the constraints.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
24 |
+
page_content=' The proposed way to find such a solution is ⋆ This work is funded by Independent Research Fund Denmark (DFF).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
25 |
+
page_content=' We acknowledge Verdo company, Peter Nordahn, and Steffen Schmidt for providing us with the EPANET model and the network information.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
26 |
+
page_content=' using a Genetic Algorithm (GA).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
27 |
+
page_content=' In Bagirov et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
28 |
+
page_content=' (2013), the Hooke-Jeeves method is used for finding optimal pump operating times for a similar problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
29 |
+
page_content=' Then, network sim- ulation algorithms are used to check if the constraints are satisfied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
30 |
+
page_content=' In Castro-Gama et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
31 |
+
page_content=' (2017), binary decision variables are used to represent the opening and the closing of each pump.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
32 |
+
page_content=' The feasibility of the solution found with GA is checked with EPANET, a WDN modeling software, and a high cost is assigned to the infeasible solutions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
33 |
+
page_content=' The number of open pumps is also taken as the input to the system in some works, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
34 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
35 |
+
page_content=', Wang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
36 |
+
page_content=' (2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
37 |
+
page_content=' The problem is then solved using mixed-integer nonlinear programming.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
38 |
+
page_content=' In Berkel et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
39 |
+
page_content=' (2018), a network in which pressure zones are connected via constant speed pumps is considered.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
40 |
+
page_content=' Each pressure zone is treated as a subsys- tem and distributed model predictive control (DMPC) is applied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
41 |
+
page_content=' The flow rate of the pumps should be determined for networks with variable speed pumps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
42 |
+
page_content=' In Pour et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
43 |
+
page_content=' (2019), Linear Parameter Varying (LPV) system modeling is used to replace the nonlinear part of the network, and an Economic Model Predictive Control (EMPC) is applied on top of the LPV system to find the optimal flow rates.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
44 |
+
page_content=' In Kallesøe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
45 |
+
page_content=' (2017), a network structure with an elevated reservoir is considered.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
46 |
+
page_content=' Available data is used for the identification of a reduced system model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
47 |
+
page_content=' Then, EMPC is applied to the model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
48 |
+
page_content=' In the EMPC formulation, node pressures are not constrained.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
49 |
+
page_content=' It is assumed that the pressures would be in the accepted range because there is an elevated reservoir.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
50 |
+
page_content=' Relaxation of the original problem into a simpler one is commonly used because of the large network sizes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
51 |
+
page_content=' The relaxation is generally achieved by arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
52 |
+
page_content='13598v1 [eess.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
53 |
+
page_content='SY] 31 Jan 2023 approximating the nonlinear pipe equations with some sort of linear equations or inequalities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
54 |
+
page_content=' In Baunsgaard et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
55 |
+
page_content=' (2016), pipe equations are linearized around an operating point, and model predictive control (MPC) is applied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
56 |
+
page_content=' In Wang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
57 |
+
page_content=' (2018), an EMPC is applied to a network where the nonlinear pipe equations are relaxed into a set of linear inequalities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
58 |
+
page_content=' Before simplifying the system model, the network structure is also simplified in Fiedler et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
59 |
+
page_content=' (2020).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
60 |
+
page_content=' A hierarchical clustering method is used to represent the original network with a smaller one which originally had 378 junctions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
61 |
+
page_content=' A system model is derived from the simplified structure using a Deep Neural Network (DNN) structure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
62 |
+
page_content=' Lagrangian relaxation is used to approximate the original problem in Ghaddar et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
63 |
+
page_content=' (2015).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
64 |
+
page_content=' In this paper, a way for optimal pump scheduling of large- scale WDNs is presented.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
65 |
+
page_content=' To control the pumps, a linear model of the system is derived.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
66 |
+
page_content=' Then, a predictive control method with a periodic horizon is constructed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
67 |
+
page_content=' Barrier functions are utilized to prevent constraint violation due to the model-plant mismatch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
68 |
+
page_content=' With the introduction of the periodic horizon and the terminal state constraint, the chance of finding a feasible solution is increased by keeping trajectories close to an optimal periodic trajectory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
69 |
+
page_content=' The method is applied to a medium-sized Danish town’s network (Randers).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
70 |
+
page_content=' The outline of the rest of the paper is as follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
71 |
+
page_content=' The network model is given in Section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
72 |
+
page_content=' The proposed control method is explained in Section 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
73 |
+
page_content=' The experimental results are presented in Section 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
74 |
+
page_content=' The paper is concluded with final remarks in Section 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
75 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
76 |
+
page_content=' NETWORK MODEL A typical water distribution network consists of pipes, pumps, tanks, junction nodes and reservoirs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
77 |
+
page_content=' Water in the network flows from high hydraulic head to low head.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
78 |
+
page_content=' Hydraulic head is a measure of the fluid pressure and is equal to the height of a fluid in a static column at a point.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
79 |
+
page_content=' Hydraulic head loss occurring in a pipe can be approxi- mated by the Hazen-Williams Equation as ∆h = h1 − h2 = Kq|q|0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
80 |
+
page_content='852 (1) where K is the pipe resistance that depends on the physical features of a pipe such as diameter and length, q is the flow rate, and h1 and h2 are the heads at the two ends of the pipe.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
81 |
+
page_content=' At each node j, the mass conservation law is satisfied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
82 |
+
page_content=' It can be expressed as � i∈Nj qij = dj (2) where qij is the flow entering the node j from node i and dj is the demand at node j, which is the water requested by the user at node j.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
83 |
+
page_content=' The symbol Nj denotes the set of neighbor nodes of node j.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
84 |
+
page_content=' Note that qij is positive if the flow is from node i to the neighbor node j and negative vice versa.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
85 |
+
page_content=' Tanks are storage elements that provide water to the users.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
86 |
+
page_content=' In the network, tanks are elevated so that water can be pressurized enough to be delivered to the consumers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
87 |
+
page_content=' The change in the water level of a tank is dependent on the flow coming from neighbor nodes and can be written for the tank j as Aj ˙hj = � i∈Nj qij (3) where Aj is the cross-sectional area, hj is the level of the tank.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
88 |
+
page_content=' Tank levels change according to the flow passing through the pipes connected to the tanks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
89 |
+
page_content=' Those flows are determined by a set of pipe head loss equations (1), and mass balance equations (2) throughout the whole network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
90 |
+
page_content=' As Equation (1) is nonlinear, flow through pipes connected to the tanks are nonlinear functions fi of the demand at each node, tank levels, and the amount of water coming from the pumps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
91 |
+
page_content=' Explicit forms of those nonlinear functions could be derived if the vector d = [d1, d2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
92 |
+
page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
93 |
+
page_content=']T containing the demands of all the nodes is known, which is not possible unless demand data for all nodes are available.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
94 |
+
page_content=' In our work, we assume that the total demand of the zones that are supplied by the pumps can be estimated through available data with time series analysis methods, but not require d vector to be known.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
95 |
+
page_content=' Since fi functions can not be found without d vector, we approximate them using linear models and write tank level change equations as ˙h(t) = Ah(t) + B1u(t) + B2da(t) (4) where h(t) ∈ Rn includes tank levels, A ∈ Rn×n, B1 ∈ Rn×m, B2 ∈ Rn×1 are constant system matrices and da(t) is the aggregated demand of controlled zone at time t, u(t) ∈ Rm is the input containing pump flows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
96 |
+
page_content=' The reason we chose a linear model is to increase the chance of finding a feasible solution for the controller which is posed as an optimization problem in the next section.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
97 |
+
page_content=' Although capturing the full dynamics of a large-scale network is not possible with a linear model, the proposed control method is designed to compensate for model inaccuracies and we have observed that it was enough to control the system while satisfying the constraints.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
98 |
+
page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
99 |
+
page_content=' PERIODIC HORIZON CONTROL In this section, a predictive control algorithm for pump scheduling is presented to minimize the economical costs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
100 |
+
page_content=' The aim is to run the pumps when the electricity price is low and let tanks deliver water when the price is high while also satisfying input and output constraints.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
101 |
+
page_content=' The problem at time t is posed as min ut 0,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
102 |
+
page_content='ut 1···ut N(t)−1 N(t)−1 � j=0 J(ht j,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
103 |
+
page_content=' ut j) (5a) ht j = Adht j−1 + Bd1ut j−1 + Bd2da(j − 1) (5b) ht 0 = h(t) (5c) ut j ∈ U ⊆ Rm (5d) ht j ∈ H ⊆ Rn (5e) ht N(t) ∈ Htf ⊆ Rn (5f) where J(ht j,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
104 |
+
page_content=' ut j) is the economic cost function,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
105 |
+
page_content=' ht = [ht 1 · · · ht N(t)] ∈ Rn×N(t) is the predicted future states,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
106 |
+
page_content=' ut j is the input vector,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
107 |
+
page_content=' N(t) is the prediction horizon,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
108 |
+
page_content=' U ⊆ Rm and H ⊆ Rn denotes the input and state constraints respectively and Htf ⊆ Rn is the terminal state set.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
109 |
+
page_content=' The continuous system (4) is discretized and (5b) is obtained.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
110 |
+
page_content=' The optimization problem (5) is solved at every time step separated by ∆t and the first term ut 0 of the optimal input sequence ut = [ut 0 · · · ut N(t)−1] ∈ Rm×N(t) is applied to the system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
111 |
+
page_content=' Input constraints come from the physical limitations and working principles of the pumps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
112 |
+
page_content=' A pump can not provide water in the opposite direction and it can deliver a maxi- mum amount of water per unit of time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
113 |
+
page_content=' These conditions are expressed as U = {[u1, · · · um] ∈ Rm | 0 ≤ u1 ≤ u1, · · · 0 ≤ um ≤ um} (6) where u1 · · · um are upper flow limits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
114 |
+
page_content=' Tank levels are also constrained so that there is always enough water in the tanks in case of an emergency and there is no overflow of water.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
115 |
+
page_content=' The set H can be defined as H = {[h1, · · · h2] ∈ Rn | ˜h1 ≤ h1 ≤ h1, · · · ˜hn ≤ hn ≤ hn} (7) The cost function includes the electricity costs of the pumps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
116 |
+
page_content=' The power provided to the network by the pump i is equal to qpi(pout i − pin i ), where qpi is the pump flow, pi out and pi in are the outlet and inlet pressures of the pump i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
117 |
+
page_content=' The inlet pressures pin = [pin 1 , pin 2 ] are the pressures of the related reservoirs and are assumed to be constant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
118 |
+
page_content=' The outlet pressures pout = [pout 1 , pout 2 ] are given as the output of the linear model pout(t) = Aph(t) + Bpu(t) (8) where Ap and Bp are found using system identification on data generated by the EPANET model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
119 |
+
page_content=' Electricity cost at time t is then found by multiplying total power consumption u(t)T (pout(t) − pin(t)) with the electricity price c(t).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
120 |
+
page_content=' We acknowledge a certain degree of model-plant mismatch by using a linear model (4) to represent the whole network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
121 |
+
page_content=' This causes actual states h(t) to be different than the predicted states ht.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
122 |
+
page_content=' We know that the predicted states satisfy the state constraints (7) since they are the solution to the optimization problem 5, but the actual states might violate them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
123 |
+
page_content=' To ensure the satisfaction of the state constraints with the model-plant mismatch, we introduce new terms to the cost function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
124 |
+
page_content=' First, we rewrite state constraints (7) as Ci(h) ≤ 0, i = 0, 1, · · · 2 × n − 1 (9) where C0(h) = ˜h1 −h1 and the rest of the Ci functions are chosen in a similar manner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
125 |
+
page_content=' The cost function terms are then defined as Jhi(h) = eai(Ci(h)+bi) i = 0, 1, · · · 2 × n − 1 (10) where ai, bi ∈ R>0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
126 |
+
page_content=' This can be seen as an exponential barrier function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
127 |
+
page_content=' The parameters ai, bi determine a danger- ous region close to the boundaries of the state constraints where cost function Jhi attains high values.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
128 |
+
page_content=' The predicted optimal state trajectories ht do not enter the dangerous region if possible because of the high cost values in the dangerous region.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
129 |
+
page_content=' Then, the actual states h(t) do not violate the state constraints (7) assuming the di��erence between the predicted state and the actual state is small.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
130 |
+
page_content=' If the state trajectory enters one of the dangerous regions at any step due to the model-plant mismatch, then the cost function will try to drive the trajectory out of the region.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
131 |
+
page_content=' ∆t N(t)∆t N(t + ∆t)∆t h(t) h(t + ∆t) ht 1 ut 0 ut+∆t 0 ht+∆t ht Br(h∗ Tday/∆t) Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
132 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
133 |
+
page_content=' Predicted state trajectories ht, ht+∆t at times t, t + ∆t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
134 |
+
page_content=' Sampling time ∆t, prediction horizons N(t), N(t + ∆t) and the applied inputs ut 0, ut+∆t 0 are shown.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
135 |
+
page_content=' The true state h(t + ∆t) and the predicted state ht 1 are indicated to emphasize the deviation from the prediction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
136 |
+
page_content=' The terminal set Br(h∗ Tday/∆t) is also illustrated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
137 |
+
page_content=' The overall cost function includes both the electricity expense term and the constraint barrier functions and it can be expressed as J(h(t), u(t)) = c(t)u(t)T (pout(t)−pin(t))+ 2×n−1 � i=0 Jhi(h(t)) (11) Both electricity price c(t) and total water demand da(t) signals can be viewed as consisting of a periodic signal with a period of 1 day and a relatively small deviation signal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
138 |
+
page_content=' This can be leveraged to find a feasible controller.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
139 |
+
page_content=' Suppose a sequence of inputs can be found for some initial tank levels such that levels after 1 day are equal to initial levels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
140 |
+
page_content=' In that case, the problem after 1 day is the same as in the beginning assuming deviation signals of the electricity price and the demand are zero, hence they are periodic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
141 |
+
page_content=' Then, the input sequence from the previous day could be applied and produce the same path for tank levels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
142 |
+
page_content=' Taking into account the deviation signals and supposing that a solution exists such that levels after 1 day are close to initial levels, the input sequence from the previous day could be a good point of start to search for a feasible solution if the map from the initial conditions and the demand profile to the optimal input sequences is continuous.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
143 |
+
page_content=' Therefore, we choose a terminal state constraint for the end of each day to increase the chance of finding a feasible solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
144 |
+
page_content=' Now, the remaining problem is to decide which tank levels should the trajectories turn back to at the end of each day.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
145 |
+
page_content=' We define the optimal periodic trajectory of the system as the solution of (u∗, h∗) = arg min ui,hi (Tday/∆t)−1 � i=0 J(hi, ui) (12a) hi = Adhi−1 + Bd1ui−1 + Bd2d∗ a(i − 1) (12b) ui ∈ U ⊆ Rm (12c) hi ∈ H ⊆ Rn (12d) h0 = hTday/∆t (12e) where Tday is the duration of a whole day, d∗ a is the average daily demand profile obtained from the past measurements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
146 |
+
page_content=' The resulting state trajectory h∗ = [h∗ 0 · · · h∗ Tday/∆t] ∈ Rn×(Tday/∆t+1) is the optimal periodic trajectory because of the constraint (12e).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
147 |
+
page_content=' The terminal set Htf and the prediction horizon N(t) is chosen to make tank levels at the end of each day close to h∗ Tday/∆t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
148 |
+
page_content=' At High Zone Low Zone Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
149 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
150 |
+
page_content=' Water Distribution Network of Randers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
151 |
+
page_content=' The pump- ing stations to be controlled are shown in red.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
152 |
+
page_content=' Tanks are shown with a ’T’ shaped symbol in yellow.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
153 |
+
page_content=' any time t, t + N(t)∆t should be equal to the end of the day.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
154 |
+
page_content=' Htf and N(t) could be written as Htf = Br(h∗ Tday/∆t) (13a) N(t) = (Tday − t mod Tday)/∆t (13b) where Br(h∗ Tday/∆t) is the open ball centered at h∗ Tday/∆t with radius r.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
155 |
+
page_content=' Note that N(t) changes so that t + N(t)∆t is the end of the day for all t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
156 |
+
page_content=' With these definitions, the condition (13a) will translate to tank levels at the end of the day being close to the final point in optimal periodic trajectory h∗ Tday/∆t as shown in Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
157 |
+
page_content=' Therefore, not only chance of finding a feasible solution is increased but also the solutions are kept around the optimal periodic trajectory h∗.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
158 |
+
page_content=' If the problem (5) becomes infeasible at any time step t, we apply the second term of the input sequence from the previous step ut−∆t 1 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
159 |
+
page_content=' The reason behind this choice is as follows: If we apply the optimal control input ut−∆t 0 to the network model (4) at time t − ∆t, then the optimal sequence in the next time step will be ut = [ut−∆t 1 · · ut−∆t N(t−∆t)−1] following Bellman’s principle of optimality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
160 |
+
page_content=' Then, at time t, ut−∆t 1 will be applied to the system as calculated at t − ∆t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
161 |
+
page_content=' Assuming the model- plant mismatch is small enough, ut−∆t 1 is still a good input candidate if the problem is infeasible at time t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
162 |
+
page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
163 |
+
page_content=' APPLICATION The presented method is applied to WDN of Randers, a Danish city, which is shown in Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
164 |
+
page_content=' The network con- sists of 4549 nodes and 4905 links connecting them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
165 |
+
page_content=' There are 8 pumping stations in the network, 6 of which are shown in the figure whereas the other 2 are stationed where tanks are placed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
166 |
+
page_content=' The goal is to derive the schedules for 2 of the pumping stations while other pumps are already working according to some predetermined strategies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
167 |
+
page_content=' The stations to be controlled are shown in red in the figure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
168 |
+
page_content=' Their task is to deliver water mostly to the High Zone (HZ) and Low Zone (LZ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
169 |
+
page_content=' However, connections exist between HZ-LZ and the rest of the city, so we can not think of the system as composed of isolated networks entirely.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
170 |
+
page_content=' There are also 3 tanks in the HZ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
171 |
+
page_content=' While 2 of them are directly connected via pipes, the third one stands alone as shown in the figure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
172 |
+
page_content=' The overall structure of the Randers WDN with tanks and pumps to be controlled are given in Figure 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
173 |
+
page_content=' There are 3 water tanks in the network, 2 of which have been connected Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
174 |
+
page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
175 |
+
page_content=' Structure of the WDN.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
176 |
+
page_content=' with a pipe directly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
177 |
+
page_content=' The tank level changes can be written by applying the mass conservation law (3) to the tanks in Figure 3 as A1 ˙h1 = q1down + q1up + qinter (14a) = f1(h1, h2, h3, qp1, qp2, d), A2 ˙h2 = q2down + q2up − qinter (14b) = f2(h1, h2, h3, qp1, qp2, d), A3 ˙h3 = q3 = f3(h1, h2, h3, qp1, qp2, d), (14c) where d is the vector containing the demands of all the nodes, qp1, qp2 are the pump flows, A1, A2, A3 are the cross sectional areas of the tanks and f1, f2, f3 are nonlinear flow functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
178 |
+
page_content=' Water levels at the two connected tanks are almost equal h1 ≈ h2 all the time since the pipe connecting respective tanks is big enough to oppose the water flows coming from neighbor nodes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
179 |
+
page_content=' That enables us to consider h1, h2 together as (A1 + A2)˙h1,2 ≈ q1down + q2down + qup = f1 + f2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
180 |
+
page_content=' (15) We have used the EPANET model of the network to generate the data required for approximating f1 + f2 and f3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
181 |
+
page_content=' The model is simulated with various tank level initial conditions and flow rates of 2 pumping stations to be controlled.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
182 |
+
page_content=' The control laws for the remaining pumping stations are already defined in the EPANET model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
183 |
+
page_content=' Then, the linear model (4) is fitted to simulation data using least squares.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
184 |
+
page_content=' The state variables for the model are h(t) = [h1,2(t), h3(t)] ∈ R2 and the inputs are u(t) = [qp1(t), qp2(t)] ∈ R2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
185 |
+
page_content=' The total demand of High and Low Zone is used as aggregated demand da in the model since mainly those areas are supplied by the controlled pumps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
186 |
+
page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
187 |
+
page_content='1 Simulation Results The proposed control method is tested on EPANET model of Randers water network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
188 |
+
page_content=' Epanet-Matlab toolkit Eliades et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
189 |
+
page_content=' (2016) is used to set the flow of the 2 pumps at each time step and simulate the network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
190 |
+
page_content=' The remaining pumps are controlled with rule-based control laws that are previously defined on EPANET.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
191 |
+
page_content=' The parameters of exponential barrier functions Jhi are chosen as ai = 80, bi = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
192 |
+
page_content='3 for all i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
193 |
+
page_content=' It is assumed that the electricity prices are known in advance during the test.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
194 |
+
page_content=' Tank levels h1, h2 have a maximum value of 3m while h3 has 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
195 |
+
page_content='8m.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
196 |
+
page_content=' Tanks are required to be at least half full.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
197 |
+
page_content=' Maximum pump flows are set to 100.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
198 |
+
page_content=' Sampling time ∆t is set to 1 hour in the experiments, so the control input is recalculated at each hour.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
199 |
+
page_content=' We assume that total demand da(t) of HZ and LZ can be estimated up to 1 day from available data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
200 |
+
page_content=' Although we do not have historical qup qiup q2up h1 h2 h3 qinter q1down 2down q3 Pump 1 Pump 2 9p1 qp2data on the demand, we imitate this behaviour by using a slightly perturbed version of the real demand used in EPANET simulation during MPC calculations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
201 |
+
page_content=' The perturbations are adapted from a real demand data set of a small Danish facility.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
202 |
+
page_content=' Normalized difference between the average demand and the demand of a random day in data set is added to EPANET demand to replicate estimated demand.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
203 |
+
page_content=' In each experiment a different day from the data set is used, so the assumed estimated demand is different each time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
204 |
+
page_content=' The simulation results when the presented method is applied to the EPANET model are given in Figure 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
205 |
+
page_content=' The initial tank levels are equal to h∗ Tday/∆t in the simulation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
206 |
+
page_content=' The top plot shows the evolution of tank levels along with the upper and lower thresholds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
207 |
+
page_content=' It is seen that the thresholds are not violated and moreover tank levels are not getting too close to them, which was the idea behind exponential barrier functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
208 |
+
page_content=' Both the real demand and the assumed estimated demand of HZ and LZ are in the figure below.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
209 |
+
page_content=' Total applied pump flows and electricity prices are in the following figures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
210 |
+
page_content=' The expected result is pump flows being higher when electricity prices are low, and lower when they are high, which seems to be the case as can be seen in the plot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
211 |
+
page_content=' Pump flows drop significantly when prices are at the peak and they reach their highest value at the end of the day when prices are low.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
212 |
+
page_content=' A more aggressive controller can be obtained by picking a smaller bi value for barrier functions at the expense of risking constraint violation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
213 |
+
page_content=' In Figure 5, the tank level simulation results and control inputs for different initial conditions and different assumed estimated demands are given.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
214 |
+
page_content=' The electricity price profile is the same as before.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
215 |
+
page_content=' It is seen that the algorithm is able to control the network on various cases while satisfying the constraints.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
216 |
+
page_content=' Regardless of initial tank levels, the pumping profiles have a similar profile: high pump flows close to midnight and in the middle of the day.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
217 |
+
page_content=' The only exception is the bottom plot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
218 |
+
page_content=' In the beginning, prices are low but pump flows are not high.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
219 |
+
page_content=' This can be attributed to water levels h1, h2 being close to the upper thresholds and water demand being low in the beginning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
220 |
+
page_content=' The assumption that the optimal input sequences U(t) would not diverge a lot from the one found in previous step U(t − ∆t) is the reason we apply ut−∆t 1 at time t if the problem (5) is infeasible at time t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
221 |
+
page_content=' This assumption is tested with initial conditions h1,2,3 = h∗ Tday/∆t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
222 |
+
page_content=' In figure 6, total pump flow [1, 1]T ut i, i = 0 · · · N(t) − 1 of the found optimal input sequences U(t), t = 0, ∆t · · · Tday−∆t, except when the problem were infeasible, are given.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
223 |
+
page_content=' It can be seen that ut−∆t 1 is close to the ut 0 for all t, which shows that our assumption is valid at least for this experiment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
224 |
+
page_content=' Finally, the ability of the algorithm to decrease economic costs is tested with various initial conditions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
225 |
+
page_content=' For each case, a demand follower pumping strategy is used as a benchmark.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
226 |
+
page_content=' The flow of the 2 pumps is adjusted with trial and error for each demand follower such that the total flow of the 2 pumps is equal to water demand at each time step and tank levels satisfy the terminal constraint (13a).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
227 |
+
page_content=' The demand follower is a natural candidate to be a benchmark method since providing as much water as demand is an intuitive idea and the constraints in (5) can be satisfied (a) (b) (c) (d) Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
228 |
+
page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
229 |
+
page_content=' Sample simulation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
230 |
+
page_content=' (a) evolution of tank levels through 1 day with upper and lower level thresholds;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
231 |
+
page_content=' (b) real total demand of HZ and LZ used in EPANET simulation and the demand used in MPC calculations;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
232 |
+
page_content=' (c) total flow provided by the 2 pumps;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
233 |
+
page_content=' (d) electricity price.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
234 |
+
page_content=' Proposed Method Demand Follower 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
235 |
+
page_content='5967 1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
236 |
+
page_content='5745 1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
237 |
+
page_content='5826 1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
238 |
+
page_content='5558 1 Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
239 |
+
page_content=' Relative economic costs of the pro- posed method and demand follower strategy for various demand profiles with manual adjustments of pump flows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
240 |
+
page_content=' The economic costs are presented relatively in Table 1 As it is seen, the proposed algorithm saves between 40% and 45% of the cost with different demand profiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
241 |
+
page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
242 |
+
page_content=' CONCLUSION We have presented a predictive control algorithm with a periodic horizon for WDNs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
243 |
+
page_content=' The aim is to minimize the 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
244 |
+
page_content='5 h1 h2 upper threshold 3 h3 3 upper threshold Tank Levels 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
245 |
+
page_content='5 1 0 5 10 15 20 25140 120 100 80 60 40 Real Demand Known Demand 20 0 5 10 15 20 25200 Total Pump Flow 150 100 50 0 0 5 10 15 20 251.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
246 |
+
page_content='2 Price 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
247 |
+
page_content='8 lectricity 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
248 |
+
page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
249 |
+
page_content='4 E 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
250 |
+
page_content='2 0 0 5 10 15 20 25 HoursFig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
251 |
+
page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
252 |
+
page_content=' Tank levels and pump flows for different initial conditions Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
253 |
+
page_content=' 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
254 |
+
page_content=' Evolution of found input sequences U(t) through 1 day.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
255 |
+
page_content=' It can be seen that the solutions remain close to the initial optimal sequence U(0).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
256 |
+
page_content=' economic cost and satisfy the operational constraints.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
257 |
+
page_content=' A linear model is used to represent Randers WDN to increase the chance of finding a solution to the problem (5) at expense of a model-plant mismatch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
258 |
+
page_content=' Periodic horizon is introduced to the predictive control formulation to keep the resulting state trajectories around the optimal periodic trajectory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
259 |
+
page_content=' Barrier functions are used to prevent constraint violation since there is a model-plant mismatch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
260 |
+
page_content=' The presented algorithm is tested on Randers WDN using EPANET.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
261 |
+
page_content=' It is shown in various situations that the method is able to find an economic solution where pump flows are adjusted according to electricity prices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
262 |
+
page_content=' Also, it is shown that the system trajectories do not enter dangerous zones introduced by barrier functions as long as the predicted demand and the actual demand are somewhat close.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
263 |
+
page_content=' As future work, we plan to work on theoretical guarantees of the existence of solutions to the proposed method.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
264 |
+
page_content=' Also, the robustness of periodic horizon control of periodical systems with barrier functions will be investigated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
265 |
+
page_content=' REFERENCES Abdelsalam, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
266 |
+
page_content='A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
267 |
+
page_content=' and Gabbar, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
268 |
+
page_content='A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
269 |
+
page_content=' (2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
270 |
+
page_content=' Energy saving and management of water pumping networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
271 |
+
page_content=' Heliyon, 7(8), e07820.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
272 |
+
page_content=' doi:https://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
273 |
+
page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
274 |
+
page_content='1016/j.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
275 |
+
page_content='heliyon.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
276 |
+
page_content='20 21.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
277 |
+
page_content='e07820.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
278 |
+
page_content=' Bagirov, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
279 |
+
page_content='M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
280 |
+
page_content=', Barton, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
281 |
+
page_content=', Mala-Jetmarova, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
282 |
+
page_content=', Nuaimat, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
283 |
+
page_content='A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
284 |
+
page_content=', Ahmed, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
285 |
+
page_content='T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
286 |
+
page_content=', Sultanova, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
287 |
+
page_content=', and Yearwood, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
288 |
+
page_content=' (2013).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
289 |
+
page_content=' An algorithm for minimization of pumping costs in water distribution systems using a novel approach to pump scheduling.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
290 |
+
page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
291 |
+
page_content=' Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
292 |
+
page_content=' Model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
293 |
+
page_content=', 57, 873–886.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
294 |
+
page_content=' Baunsgaard, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
295 |
+
page_content='M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
296 |
+
page_content='H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
297 |
+
page_content=', Ravn, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
298 |
+
page_content=', Kallesøe, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
299 |
+
page_content='S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
300 |
+
page_content=', and Poulsen, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
301 |
+
page_content='K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
302 |
+
page_content=' (2016).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
303 |
+
page_content=' Mpc control of water supply networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
304 |
+
page_content=' 2016 European Control Conference (ECC), 1770–1775.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
305 |
+
page_content=' Berkel, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
306 |
+
page_content=', Caba, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
307 |
+
page_content=', Bleich, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
308 |
+
page_content=', and Liu, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
309 |
+
page_content=' (2018).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
310 |
+
page_content=' A modeling and distributed mpc approach for water dis- tribution networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
311 |
+
page_content=' Control Engineering Practice.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
312 |
+
page_content=' Castro-Gama, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
313 |
+
page_content='E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
314 |
+
page_content=', Pan, Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
315 |
+
page_content=', Lanfranchi, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
316 |
+
page_content='A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
317 |
+
page_content=', Jonoski, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
318 |
+
page_content=', and Solomatine, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
319 |
+
page_content='P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
320 |
+
page_content=' (2017).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
321 |
+
page_content=' Pump scheduling for a large water distribution network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
322 |
+
page_content=' milan, italy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
323 |
+
page_content=' Procedia Engineering, 186, 436–443.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
324 |
+
page_content=' Eliades, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
325 |
+
page_content='G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
326 |
+
page_content=', Kyriakou, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
327 |
+
page_content=', Vrachimis, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
328 |
+
page_content=', and Polycar- pou, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
329 |
+
page_content='M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
330 |
+
page_content=' (2016).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
331 |
+
page_content=' Epanet-matlab toolkit: An open- source software for interfacing epanet with matlab.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
332 |
+
page_content=' In Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
333 |
+
page_content=' 14th International Conference on Computing and Control for the Water Industry (CCWI), 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
334 |
+
page_content=' The Nether- lands.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
335 |
+
page_content=' doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
336 |
+
page_content='5281/zenodo.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
337 |
+
page_content='831493.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
338 |
+
page_content=' Fiedler, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
339 |
+
page_content=', Cominola, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
340 |
+
page_content=', and Lucia, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
341 |
+
page_content=' (2020).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
342 |
+
page_content=' Eco- nomic nonlinear predictive control of water distribution networks based on surrogate modeling and automatic clustering.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
343 |
+
page_content=' IFAC-PapersOnLine, 53, 16636–16643.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
344 |
+
page_content=' Ghaddar, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
345 |
+
page_content=', Naoum-Sawaya, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
346 |
+
page_content=', Kishimoto, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
347 |
+
page_content=', Taheri, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
348 |
+
page_content=', and Eck, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
349 |
+
page_content=' (2015).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
350 |
+
page_content=' A lagrangian decomposition approach for the pump scheduling problem in water networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
351 |
+
page_content=' Eur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
352 |
+
page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
353 |
+
page_content=' Oper.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
354 |
+
page_content=' Res.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
355 |
+
page_content=', 241, 490–501.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
356 |
+
page_content=' Kallesøe, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
357 |
+
page_content='S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
358 |
+
page_content=', Jensen, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
359 |
+
page_content='N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
360 |
+
page_content=', and Bendtsen, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
361 |
+
page_content='D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
362 |
+
page_content=' (2017).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
363 |
+
page_content=' Plug-and-play model predictive control for water supply networks with storage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
364 |
+
page_content=' IFAC-PapersOnLine, 50, 6582– 6587.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
365 |
+
page_content=' Lindell Ormsbee, Srini Lingireddy, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
366 |
+
page_content='C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
367 |
+
page_content=' (2009).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
368 |
+
page_content=' Optimal pump scheduling for water distribution systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
369 |
+
page_content=' URL http://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
370 |
+
page_content='uky.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
371 |
+
page_content='edu/WDST/PDFs/[73.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
372 |
+
page_content='3]%20Ormsbee% 20Optimal%20Pump%20Scheduling%20Paper.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
373 |
+
page_content='pdf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
374 |
+
page_content=' Pour, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
375 |
+
page_content='K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
376 |
+
page_content=', Puig, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
377 |
+
page_content=', and Cembra˜no, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
378 |
+
page_content=' (2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
379 |
+
page_content=' Economic mpc-lpv control for the operational management of water distribution networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
380 |
+
page_content=' IFAC-PapersOnLine.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
381 |
+
page_content=' Sharif, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
382 |
+
page_content=', Haider, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
383 |
+
page_content=', Farahat, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
384 |
+
page_content=', Hewage, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
385 |
+
page_content=', and Sadiq, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
386 |
+
page_content=' (2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
387 |
+
page_content=' Water energy nexus for water distribution systems: A literature review.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
388 |
+
page_content=' Environmental Reviews, 27.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
389 |
+
page_content=' doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
390 |
+
page_content='1139/er-2018-0106.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
391 |
+
page_content=' Wang, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
392 |
+
page_content=', Alamo, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
393 |
+
page_content=', Puig, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
394 |
+
page_content=', and Cembra˜no, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
395 |
+
page_content=' (2018).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
396 |
+
page_content=' Economic model predictive control with nonlinear con- straint relaxation for the operational management of water distribution networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
397 |
+
page_content=' Energies, 11, 991.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
398 |
+
page_content=' Wang, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
399 |
+
page_content=', Yok, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
400 |
+
page_content='T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
401 |
+
page_content=', Wu, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
402 |
+
page_content=', Simpson, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
403 |
+
page_content='R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
404 |
+
page_content=', Weyer, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
405 |
+
page_content=', and Manzie, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
406 |
+
page_content=' (2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
407 |
+
page_content=' Minimizing pumping energy cost in real-time operations of water distribution sys- tems using economic model predictive control.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
408 |
+
page_content=' ArXiv, abs/2010.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
409 |
+
page_content='07477.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
410 |
+
page_content=' 200 Total Pump Flow 150 100 50 0 0 5 10 15 20 253.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
411 |
+
page_content='5 h1 h2 upperthreshold h3 3 upper threshold Tank Levels 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
412 |
+
page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
413 |
+
page_content='5 1 0 5 10 15 20 25250 Total Pump Flow 200 150 100 50 0 0 5 10 15 20 253.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
414 |
+
page_content='5 h1 h2 upper threshold 3 h3 upper threshold Tank Levels 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
415 |
+
page_content='5 1 0 5 10 15 20 25200 Total Pump Flow 150 100 50 0 0 5 10 15 20 25200 U(0) 150 Flow 100 U(1) 50 0 0 5 10 15 20 25 Hours3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
416 |
+
page_content='5 h1 h2 upperthreshold 3 h3 3 upper threshold Tank Levels 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
417 |
+
page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
418 |
+
page_content='5 1 0 5 10 15 20 25250 Total Pump Flow 200 150 100 50 0 0 5 10 15 20 253.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
419 |
+
page_content='5 h1 h2 upperthreshold 3 h3 3 upper threshold Tank Levels 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
420 |
+
page_content='5 1 0 5 10 15 20 25' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
|
0dFQT4oBgHgl3EQfDjUj/content/2301.13234v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:51249b5fc41f9a97c8e7566e185f3285d951856eb881e30e68b2c8df14fa5957
|
3 |
+
size 1568062
|
0dFQT4oBgHgl3EQfDjUj/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:ddc8cc46935c44fd582a200a8b60689e2a774e4a804602ae618b31c3c694599a
|
3 |
+
size 1249100
|
2tFRT4oBgHgl3EQfnjcF/content/tmp_files/2301.13605v1.pdf.txt
ADDED
@@ -0,0 +1,1888 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
IMSc/2023/02
|
2 |
+
Aspects of the map from Exact RG to Holographic RG in
|
3 |
+
AdS and dS
|
4 |
+
Pavan Dharanipragada ∗1, 2, Semanti Dutta †3, and B. Sathiapalan ‡1,2
|
5 |
+
1Institute of Mathematical Sciences,CIT Campus, Tharamani, Chennai
|
6 |
+
600113, India
|
7 |
+
2Homi Bhabha National Institute, Training School Complex, Anushakti
|
8 |
+
Nagar, Mumbai 400085, India
|
9 |
+
3Centre for High Energy Physics, Indian Institute of Science, C.V. Raman
|
10 |
+
Avenue, Bangalore 560012, India
|
11 |
+
February 1, 2023
|
12 |
+
Abstract
|
13 |
+
In earlier work the evolution operator for the exact RG equation was mapped to a
|
14 |
+
field theory in Euclidean AdS. This gives a simple way of understanding AdS/CFT. We
|
15 |
+
explore aspects of this map by studying a simple example of a Schroedinger equation for
|
16 |
+
a free particle with time dependent mass. This is an analytic continuation of an ERG
|
17 |
+
like equation. We show for instance that it can be mapped to a harmonic oscillator. We
|
18 |
+
show that the same techniques can lead to an understanding of dS/CFT too.
|
19 |
+
Contents
|
20 |
+
1
|
21 |
+
Introduction
|
22 |
+
3
|
23 |
+
2
|
24 |
+
Mapping Free Particle with Time Dependent Mass to a Harmonic Oscillator
|
25 |
+
3
|
26 |
+
2.1
|
27 |
+
Mapping Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
28 |
+
4
|
29 |
+
2.1.1
|
30 |
+
Lorentzian Case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
31 |
+
4
|
32 |
+
2.1.2
|
33 |
+
Euclidean Case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
34 |
+
5
|
35 |
+
2.2
|
36 |
+
Mapping Schrodinger Equations . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
37 |
+
6
|
38 |
+
2.2.1
|
39 |
+
Lorentzian . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
40 |
+
6
|
41 |
+
2.2.2
|
42 |
+
Euclidean . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
43 |
+
7
|
44 |
+
2.2.3
|
45 |
+
Analytic Continuation
|
46 |
+
. . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
47 |
+
7
|
48 |
+
2.3
|
49 |
+
Semiclassical Treatment
|
50 |
+
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
51 |
+
8
|
52 |
+
2.3.1
|
53 |
+
Using Harmonic Oscillator Formulation . . . . . . . . . . . . . . . . . . .
|
54 |
+
8
|
55 |
+
2.3.2
|
56 |
+
Using ERG formulation
|
57 |
+
. . . . . . . . . . . . . . . . . . . . . . . . . . .
|
58 |
+
9
|
59 | |
60 | |
61 | |
62 |
+
1
|
63 |
+
arXiv:2301.13605v1 [hep-th] 31 Jan 2023
|
64 |
+
|
65 |
+
3
|
66 |
+
ERG to field theory in dS
|
67 |
+
10
|
68 |
+
3.1
|
69 |
+
Analytic Continuation
|
70 |
+
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
71 |
+
10
|
72 |
+
3.1.1
|
73 |
+
Analytic Continuation of the Action
|
74 |
+
. . . . . . . . . . . . . . . . . . . .
|
75 |
+
10
|
76 |
+
3.2
|
77 |
+
Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
78 |
+
11
|
79 |
+
3.2.1
|
80 |
+
Mapping from Quantum Mechanics . . . . . . . . . . . . . . . . . . . . .
|
81 |
+
11
|
82 |
+
3.2.2
|
83 |
+
Mapping from ERG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
84 |
+
13
|
85 |
+
3.3
|
86 |
+
Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
87 |
+
13
|
88 |
+
3.4
|
89 |
+
dS-CFT correspondence
|
90 |
+
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
|
91 |
+
14
|
92 |
+
4
|
93 |
+
Obtaining Bulk field from ERG
|
94 |
+
16
|
95 |
+
5
|
96 |
+
Summary and Conclusions
|
97 |
+
20
|
98 |
+
2
|
99 |
+
|
100 |
+
1
|
101 |
+
Introduction
|
102 |
+
It has been recognized from the early days of the AdS/CFT correspondence [1, 2, 3, 4] that
|
103 |
+
the radial coordinate of the AdS space behaves like a scale for the boundary field theory. This
|
104 |
+
observation follows directly from the form of the AdS metric in Poincare coordinates:
|
105 |
+
ds2 = R2dz2 + dxµdxµ
|
106 |
+
z2
|
107 |
+
(1.1)
|
108 |
+
This leads naturally to the idea of the “Holographic” renormalization group: If the AdS/CFT
|
109 |
+
conjecture is correct then radial evolution in the bulk must correspond to RG evolution in the
|
110 |
+
boundary theory [[9]-[25]].
|
111 |
+
In [5, 6, 7] a mathematically precise connection was made between the exact RG (ERG)
|
112 |
+
equation of a boundary theory and holographic RG equations of a bulk theory in Euclidean
|
113 |
+
AdS (EAdS) space. It was shown that the ERG evolution operator of the boundary theory
|
114 |
+
can be mapped by a field redefinition to a functional integral of a field theory in the bulk
|
115 |
+
AdS space. This guarantees the existence of an EAdS bulk dual of a boundary CFT without
|
116 |
+
invoking the AdS/CFT conjecture 1
|
117 |
+
Given that the crucial ingredient in this connection with ERG is the form of the metric
|
118 |
+
(1.1) with the factor z2 in the denominator, one is naturally led to ask if similar mappings can
|
119 |
+
be done for the dS metric
|
120 |
+
ds2 = L2−dη2 + dxµdxµ
|
121 |
+
η2
|
122 |
+
(1.2)
|
123 |
+
It too has a scaling form. The difference is that the scale is a time like coordinate - so RG
|
124 |
+
evolution seems to be related to a real time evolution. In fact this metric is related to the
|
125 |
+
EAdS metric by an analytic continuation: iη = z, iL = R. Thus real time evolution should be
|
126 |
+
related to RG evolution by analytic continuation. These points have been discussed in many
|
127 |
+
of the early papers on de Sitter holography [[30]-[43]], (see also [44] for more recent work and
|
128 |
+
further references.)
|
129 |
+
This paper is an attempt to address the question of whether the mapping of [5] can be
|
130 |
+
generalised to include for instance dS-CFT. One is also led to explore other kinds of mapping
|
131 |
+
in an effort to understand the nature of this map better. In [5] the map was first introduced in
|
132 |
+
the case of 0-dimensional field theory in the boundary, which gave a one dimensional bulk field
|
133 |
+
theory or equivalently a point particle quantum mechanical system. In this paper therefore we
|
134 |
+
start by exploring maps for point particle quantum mechanical systems. In Section 2 we show
|
135 |
+
that the dynamics of a free particle with a time dependent mass can be mapped to a harmonic
|
136 |
+
oscillator. The Euclidean version of this is relevant for the ERG equation. In Section 3 the case
|
137 |
+
of mapping a field theory ERG equation to de Sitter space is considered by starting with the
|
138 |
+
analytically continued form. This complements the discussion of earlier papers where dS-CFT
|
139 |
+
is described as an analytic continuation of EAdS-CFT. In Section 4 we give some examples
|
140 |
+
of two point functions obtained using the techniques of [5] being analytically continued to dS
|
141 |
+
space. Section 5 contains a summary and conclusions.
|
142 |
+
2
|
143 |
+
Mapping Free Particle with Time Dependent Mass to
|
144 |
+
a Harmonic Oscillator
|
145 |
+
In this section we reconsider the construction of [5] where the action for a free field theory
|
146 |
+
in D + 1 dimension with a non standard kinetic term was mapped to a free field in AdSD+1.
|
147 |
+
1There is still the open question of the locality properties of interaction terms in this bulk field theory. For
|
148 |
+
the case of the O(N) model some aspects of this issue were discussed in [7].
|
149 |
+
3
|
150 |
+
|
151 |
+
When D = 0 this is just a particle: we will map a free particle with time dependent mass to a
|
152 |
+
harmonic oscillator.
|
153 |
+
2.1
|
154 |
+
Mapping Actions
|
155 |
+
2.1.1
|
156 |
+
Lorentzian Case
|
157 |
+
Consider the following action. It defines an evolution operator for free particle (with time
|
158 |
+
dependent mass) wave function.
|
159 |
+
S = 1
|
160 |
+
2
|
161 |
+
� tf
|
162 |
+
ti
|
163 |
+
dt M(t) ˙x2
|
164 |
+
(2.3)
|
165 |
+
Ψ(x,t) =
|
166 |
+
�
|
167 |
+
dxi
|
168 |
+
�
|
169 |
+
x(ti)
|
170 |
+
=
|
171 |
+
xi
|
172 |
+
x(t)
|
173 |
+
=
|
174 |
+
x
|
175 |
+
Dx ei 1
|
176 |
+
2
|
177 |
+
� t
|
178 |
+
ti M(t′) ˙x2dt′Ψ(xi, ti)
|
179 |
+
(2.4)
|
180 |
+
Let x(t) = f(t)y(t) with f 2(t) =
|
181 |
+
1
|
182 |
+
M(t). Substitute this in (2.3).
|
183 |
+
S = 1
|
184 |
+
2
|
185 |
+
�
|
186 |
+
dt ( ˙y2 + (
|
187 |
+
˙f
|
188 |
+
f )2y2 + 2
|
189 |
+
˙f
|
190 |
+
f ˙yy)
|
191 |
+
= 1
|
192 |
+
2
|
193 |
+
�
|
194 |
+
dt [ ˙y2 + (d ln f
|
195 |
+
dt )2y2 − ( d2
|
196 |
+
dt2 ln f)y2] + 1
|
197 |
+
2
|
198 |
+
�
|
199 |
+
dt d
|
200 |
+
dt(d ln f
|
201 |
+
dt y2)
|
202 |
+
Thus, upto the boundary term, the action is
|
203 |
+
S = 1
|
204 |
+
2
|
205 |
+
�
|
206 |
+
dt [ ˙y2 + eln f( d2
|
207 |
+
dt2e− ln f)y2]
|
208 |
+
(2.5)
|
209 |
+
Now choose
|
210 |
+
eln f( d2
|
211 |
+
dt2e− ln f) = −ω2
|
212 |
+
0
|
213 |
+
(2.6)
|
214 |
+
and we get
|
215 |
+
¯S = 1
|
216 |
+
2
|
217 |
+
�
|
218 |
+
dt [ ˙y2 − ω2
|
219 |
+
0y2]
|
220 |
+
(2.7)
|
221 |
+
which is the action for a harmonic oscillator. And we define ¯Ψ by absorbing the contribution
|
222 |
+
from the boundary term:
|
223 |
+
e− 1
|
224 |
+
2 i d ln f(t)
|
225 |
+
dt
|
226 |
+
y2(t)Ψ(f(t)y, t)
|
227 |
+
�
|
228 |
+
��
|
229 |
+
�
|
230 |
+
¯Ψ(y,t)
|
231 |
+
=
|
232 |
+
�
|
233 |
+
dyi
|
234 |
+
�
|
235 |
+
y(ti)
|
236 |
+
=
|
237 |
+
yi
|
238 |
+
y(t)
|
239 |
+
=
|
240 |
+
y
|
241 |
+
Dy ei 1
|
242 |
+
2
|
243 |
+
� t
|
244 |
+
ti[ ˙y2−ω2
|
245 |
+
0y2]dt′ e− 1
|
246 |
+
2 i d ln f(ti)
|
247 |
+
dt
|
248 |
+
y2(ti)Ψ(f(ti)yi, ti)
|
249 |
+
�
|
250 |
+
��
|
251 |
+
�
|
252 |
+
¯Ψ(yi,ti)
|
253 |
+
(2.8)
|
254 |
+
¯S thus defines an evolution operator for the harmonic oscillator wave function ¯Ψ. f satisfies
|
255 |
+
d2
|
256 |
+
dt2
|
257 |
+
1
|
258 |
+
f = −ω2
|
259 |
+
0
|
260 |
+
1
|
261 |
+
f
|
262 |
+
(2.9)
|
263 |
+
y obeys the same equation.
|
264 |
+
Thus we can take
|
265 |
+
1
|
266 |
+
f = a cos ω0(t − t0)
|
267 |
+
(2.10)
|
268 |
+
4
|
269 |
+
|
270 |
+
which requires
|
271 |
+
M(t) = a2cos2ω0(t − t0)
|
272 |
+
Note that one can do more general cases if one is willing to reparametrize time [26, 27].
|
273 |
+
Thus let
|
274 |
+
dτ =
|
275 |
+
dt
|
276 |
+
Mf 2
|
277 |
+
(2.11)
|
278 |
+
Then one gets (2.7), (2.9) and (2.10) with τ replacing t. In terms of t, (2.9) becomes
|
279 |
+
d
|
280 |
+
dt(M ˙f) =
|
281 |
+
ω2
|
282 |
+
0
|
283 |
+
Mf 3
|
284 |
+
(2.12)
|
285 |
+
Very interestingly, as pointed out in [26], it is clear from (2.7) that the energy of the
|
286 |
+
harmonic oscillator given by
|
287 |
+
E = 1
|
288 |
+
2( ˙y2 + ω2
|
289 |
+
0y2)
|
290 |
+
is a conerved quantity. In terms of the original variables this is
|
291 |
+
E = 1
|
292 |
+
2(( ˙xf − x ˙f
|
293 |
+
f 2
|
294 |
+
)2 + ω2
|
295 |
+
0(x
|
296 |
+
f )2)
|
297 |
+
These are known as Ermakov-Lewis invariants - see [26] for references to the literature on these
|
298 |
+
invariants - and we see a nice interpretation for them.
|
299 |
+
2.1.2
|
300 |
+
Euclidean Case
|
301 |
+
In the Euclidean case the functional integral is
|
302 |
+
Ψ(x,τ) =
|
303 |
+
�
|
304 |
+
dxi
|
305 |
+
�
|
306 |
+
x(τi)
|
307 |
+
=
|
308 |
+
xi
|
309 |
+
x(τ)
|
310 |
+
=
|
311 |
+
x
|
312 |
+
Dx e− 1
|
313 |
+
2
|
314 |
+
� τ
|
315 |
+
τi M(τ ′) ˙x2dτ ′Ψ(xi, τi)
|
316 |
+
(2.13)
|
317 |
+
Ψ in this case is not a wave function. It was shown in [5] that the evolution operator for
|
318 |
+
a D-dimensional Euclidean field theory is of this form if we take ME(τ) = −
|
319 |
+
1
|
320 |
+
˙G(τ) and D = 0.
|
321 |
+
In this case Ψ can be taken to be e−H[xi,τi] where H is a Hamiltonian or Euclideanized action.
|
322 |
+
Alternatively (depending on what ME(τ) is) it can also be eW[J] - a generating functional or
|
323 |
+
partition function.
|
324 |
+
Setting x = fy with f 2 =
|
325 |
+
1
|
326 |
+
ME(τ), one goes through the same manipulations but replacing
|
327 |
+
(2.6) by
|
328 |
+
eln f( d2
|
329 |
+
dτ 2e− ln f) = +ω2
|
330 |
+
0
|
331 |
+
(2.14)
|
332 |
+
and (2.7),(2.8) and (2.9) are replaced by
|
333 |
+
¯S = 1
|
334 |
+
2
|
335 |
+
�
|
336 |
+
dτ [ ˙y2 + ω2
|
337 |
+
0y2]
|
338 |
+
(2.15)
|
339 |
+
¯Ψ(y, τ) =
|
340 |
+
�
|
341 |
+
dyi
|
342 |
+
�
|
343 |
+
y(τi)
|
344 |
+
=
|
345 |
+
yi
|
346 |
+
y(τ)
|
347 |
+
=
|
348 |
+
y
|
349 |
+
Dy e− 1
|
350 |
+
2
|
351 |
+
� τ
|
352 |
+
τi[ ˙y2+ω2
|
353 |
+
0y2]dτ ′ ¯Ψ(yi, τi)
|
354 |
+
(2.16)
|
355 |
+
and
|
356 |
+
d2
|
357 |
+
dτ 2
|
358 |
+
1
|
359 |
+
f = ω2
|
360 |
+
0
|
361 |
+
1
|
362 |
+
f
|
363 |
+
(2.17)
|
364 |
+
5
|
365 |
+
|
366 |
+
The solutions are of the form
|
367 |
+
f = A sech ω0(τ − τ0)
|
368 |
+
(2.18)
|
369 |
+
which means ME(τ) =
|
370 |
+
1
|
371 |
+
A2cosh2ω0(τ − τ0).
|
372 |
+
(2.16) has a τ independent action. In this case there are well known physical interpretations
|
373 |
+
for the Euclidean theory. The evolution operator, K(y, τ; yi, 0), where
|
374 |
+
K(y, τ; yi, 0) =
|
375 |
+
�
|
376 |
+
y(0)
|
377 |
+
=
|
378 |
+
yi
|
379 |
+
y(τ)
|
380 |
+
=
|
381 |
+
y
|
382 |
+
Dy e− 1
|
383 |
+
2
|
384 |
+
� τ
|
385 |
+
0 [ ˙y2+ω2
|
386 |
+
0y2]dτ ′
|
387 |
+
(2.19)
|
388 |
+
is the density operator of a QM harmonic oscillator in equilibrium at temperature specified by
|
389 |
+
β = τ.
|
390 |
+
Less well known is that the evolution operator of the Fokker-Planck equation in stochastic
|
391 |
+
quantization can be written in the form given in (2.16). ¯Ψ is then related to the probability
|
392 |
+
function (see, for instance, [29] for a nice discussion).
|
393 |
+
In the next section we discuss the mappings directly for the Schroedinger equation, rather
|
394 |
+
than its evolution operator.
|
395 |
+
2.2
|
396 |
+
Mapping Schrodinger Equations
|
397 |
+
2.2.1
|
398 |
+
Lorentzian
|
399 |
+
Let us consider the same mapping from the point of view of the Schroedinger equation for the
|
400 |
+
free particle wave function.
|
401 |
+
Schrodinger’s equation for the free particle is
|
402 |
+
i∂Ψ(x, t)
|
403 |
+
∂t
|
404 |
+
= −
|
405 |
+
1
|
406 |
+
2M(t)
|
407 |
+
∂2Ψ(x, t)
|
408 |
+
∂x2
|
409 |
+
(2.20)
|
410 |
+
Ψ given by (2.4) obeys this equation.
|
411 |
+
We make a coordinate transformation and a wave function redefinition. Both can be un-
|
412 |
+
derstood as canonical transformations [28].
|
413 |
+
Let x = f(t)y with f 2 =
|
414 |
+
1
|
415 |
+
M(t). We take f, M to be dimensionless. We treat this as a 0 + 1
|
416 |
+
dimensional field theory where x has the canonical dimension of − 1
|
417 |
+
2. So x = L
|
418 |
+
1
|
419 |
+
2X would define
|
420 |
+
a dimensionless X. L is some length scale.
|
421 |
+
∂Ψ(x, t)
|
422 |
+
∂t
|
423 |
+
= ∂Ψ(f(t)y, t)
|
424 |
+
∂t
|
425 |
+
−
|
426 |
+
˙fy
|
427 |
+
f
|
428 |
+
∂Ψ(f(t)y, t)
|
429 |
+
∂y
|
430 |
+
Let
|
431 |
+
Ψ(f(t)y, t) = e− 1
|
432 |
+
2 αy2 ¯Ψ(y, t)
|
433 |
+
∂Ψ
|
434 |
+
∂t = e− 1
|
435 |
+
2 αy2(−1
|
436 |
+
2 ˙αy2 + ∂
|
437 |
+
∂t)¯Ψ(y, t)
|
438 |
+
−i
|
439 |
+
˙fy
|
440 |
+
f
|
441 |
+
∂Ψ(f(t)y, t)
|
442 |
+
∂y
|
443 |
+
= ie− 1
|
444 |
+
2 αy2(α
|
445 |
+
˙f
|
446 |
+
f y2 −
|
447 |
+
˙f
|
448 |
+
f y ∂
|
449 |
+
∂y)¯Ψ(y, t)
|
450 |
+
1
|
451 |
+
M
|
452 |
+
1
|
453 |
+
2
|
454 |
+
∂2
|
455 |
+
∂x2Ψ = 1
|
456 |
+
2
|
457 |
+
∂2
|
458 |
+
∂y2e− 1
|
459 |
+
2 αy2 ¯Ψ = (1
|
460 |
+
2e− 1
|
461 |
+
2 αy2(α2y2 − 2αy ∂
|
462 |
+
∂y − α + ∂2
|
463 |
+
∂y2)¯Ψ)
|
464 |
+
Collecting all the terms one finds that (2.20) becomes:
|
465 |
+
i∂ ¯Ψ
|
466 |
+
∂t = (1
|
467 |
+
2i ˙α − iα
|
468 |
+
˙f
|
469 |
+
f − 1
|
470 |
+
2α2)y2 ¯Ψ + (i
|
471 |
+
˙f
|
472 |
+
f y ∂
|
473 |
+
∂y + αy ∂
|
474 |
+
∂y)¯Ψ + 1
|
475 |
+
2αΨ − 1
|
476 |
+
2
|
477 |
+
∂2
|
478 |
+
∂y2 ¯Ψ
|
479 |
+
(2.21)
|
480 |
+
6
|
481 |
+
|
482 |
+
We choose α = −i
|
483 |
+
˙f
|
484 |
+
f to get rid of the second term on the RHS. We get
|
485 |
+
i∂ ¯Ψ
|
486 |
+
∂t = [(1
|
487 |
+
2
|
488 |
+
d2 ln f
|
489 |
+
dt2
|
490 |
+
− 1
|
491 |
+
2(d ln f
|
492 |
+
dt )2)y2 + 1
|
493 |
+
2α − 1
|
494 |
+
2
|
495 |
+
∂2
|
496 |
+
∂y2]¯Ψ
|
497 |
+
As before it can be rewritten as
|
498 |
+
i∂ ¯Ψ
|
499 |
+
∂t = 1
|
500 |
+
2[−eln f( d2
|
501 |
+
dt2e− ln f)y2 − ∂2
|
502 |
+
∂y2 + α]¯Ψ
|
503 |
+
(2.22)
|
504 |
+
Set
|
505 |
+
d2
|
506 |
+
dt2
|
507 |
+
1
|
508 |
+
f = −ω2
|
509 |
+
0
|
510 |
+
1
|
511 |
+
f
|
512 |
+
again as before to get
|
513 |
+
i∂ ¯Ψ
|
514 |
+
∂t = 1
|
515 |
+
2[− ∂2
|
516 |
+
∂y2 + ω2
|
517 |
+
0y2 + α]¯Ψ
|
518 |
+
(2.23)
|
519 |
+
The term 1
|
520 |
+
2α generates a scale transformation e− 1
|
521 |
+
2 ln f(t)
|
522 |
+
f(ti) for ¯Ψ.
|
523 |
+
2.2.2
|
524 |
+
Euclidean
|
525 |
+
The Euclidean version is
|
526 |
+
∂Ψ(x, τ)
|
527 |
+
∂τ
|
528 |
+
=
|
529 |
+
1
|
530 |
+
2ME(τ)
|
531 |
+
∂2Ψ(x, τ)
|
532 |
+
∂x2
|
533 |
+
(2.24)
|
534 |
+
As mentioned above, this is of the form of a Polchinski ERG equation (with
|
535 |
+
1
|
536 |
+
2ME(τ) = − ˙G(τ))
|
537 |
+
for H defined by Ψ ≡ e−H. Going through the same steps one finds, with f 2 =
|
538 |
+
1
|
539 |
+
ME(τ),
|
540 |
+
∂ ¯Ψ
|
541 |
+
∂τ = (1
|
542 |
+
2 ˙α − α
|
543 |
+
˙f
|
544 |
+
f + 1
|
545 |
+
2α2)y2 ¯Ψ + (
|
546 |
+
˙f
|
547 |
+
f y ∂
|
548 |
+
∂y − αy ∂
|
549 |
+
∂y)¯Ψ − 1
|
550 |
+
2αΨ + 1
|
551 |
+
2
|
552 |
+
∂2
|
553 |
+
∂y2 ¯Ψ
|
554 |
+
(2.25)
|
555 |
+
the condition α =
|
556 |
+
˙f
|
557 |
+
f and the equation becomes
|
558 |
+
∂ ¯Ψ
|
559 |
+
∂t = 1
|
560 |
+
2[− eln f( d2
|
561 |
+
dt2e− ln f)
|
562 |
+
�
|
563 |
+
��
|
564 |
+
�
|
565 |
+
= ω2
|
566 |
+
0
|
567 |
+
y2 + ∂2
|
568 |
+
∂y2 − α]¯Ψ
|
569 |
+
(2.26)
|
570 |
+
Thus
|
571 |
+
∂ ¯Ψ
|
572 |
+
∂τ = 1
|
573 |
+
2[ ∂2
|
574 |
+
∂y2 − ω2
|
575 |
+
0y2 − α]¯Ψ
|
576 |
+
(2.27)
|
577 |
+
And f obeys
|
578 |
+
d2
|
579 |
+
dt2
|
580 |
+
1
|
581 |
+
f = ω2
|
582 |
+
0
|
583 |
+
1
|
584 |
+
f
|
585 |
+
(2.28)
|
586 |
+
This is a Euclidean harmonic oscillator equation.
|
587 |
+
Various physical interpretations of this
|
588 |
+
equation were given in the last section. The term α in (2.27) provides a multiplicative scaling
|
589 |
+
e− 1
|
590 |
+
2
|
591 |
+
� t
|
592 |
+
ti dt′ ∂t′ ln f = ( f(ti)
|
593 |
+
f(t) )
|
594 |
+
1
|
595 |
+
2 of ¯Ψ.
|
596 |
+
2.2.3
|
597 |
+
Analytic Continuation
|
598 |
+
If we set it = τ, (2.20) becomes (2.24) provided M(−iτ) = ME(τ). Similarly (2.23) becomes
|
599 |
+
(2.27). Note that in (2.23) α = −i
|
600 |
+
˙f
|
601 |
+
f . This analytically continues to
|
602 |
+
˙f
|
603 |
+
f as required.
|
604 |
+
7
|
605 |
+
|
606 |
+
2.3
|
607 |
+
Semiclassical Treatment
|
608 |
+
Most of the AdS/CFT calculations invoke large N to do a semiclassical treatment of the bulk
|
609 |
+
theory- one can evaluate boundary Green’s function. The analysis in [5, 7] did this for the
|
610 |
+
ERG treatment - the evolution of the Wilson action/Generating functional were calculated. In
|
611 |
+
[32] a semiclassical treatment was used to obtain the ground state wave function in dS space.
|
612 |
+
For completeness we do the same for the simple systems discussed in this paper. This
|
613 |
+
illustrates the connection between ERG and dS.
|
614 |
+
2.3.1
|
615 |
+
Using Harmonic Oscillator Formulation
|
616 |
+
Since
|
617 |
+
Ψ(x, t) =
|
618 |
+
�
|
619 |
+
dxi
|
620 |
+
�
|
621 |
+
x(ti)
|
622 |
+
=
|
623 |
+
xi
|
624 |
+
x(t)
|
625 |
+
=
|
626 |
+
x
|
627 |
+
Dx ei
|
628 |
+
� t
|
629 |
+
ti L(x(t′), ˙x(t′),t′)dt′Ψ(xi, ti)
|
630 |
+
(2.29)
|
631 |
+
solves Schroedinger’s equation. For the Harmonic Oscillator
|
632 |
+
L = 1
|
633 |
+
2( ˙x2 − ω0x2)
|
634 |
+
(2.30)
|
635 |
+
for the Lorentzian version.
|
636 |
+
One can evaluate the path integral semiclassically by plugging in a classical solution with
|
637 |
+
some regular boundary condition. We choose x = 0 at t = −∞. The initial state wave function
|
638 |
+
is thus a delta function. Classical solution of the EOM is of the form
|
639 |
+
x(t) = ae−iω0t + a∗eiω0t
|
640 |
+
Since a should annihilate the vacuum state in the far past we would like the solution to look
|
641 |
+
like
|
642 |
+
x(t) → eiω0t
|
643 |
+
in order to ensure that we are in the ground state.
|
644 |
+
x(t) = xfe−iω0(tf−t)
|
645 |
+
(2.31)
|
646 |
+
At t = −∞ we assume that the solution vanishes. This is justified by an infinitesimal rotation
|
647 |
+
t → t + iϵt. Evaluated on this solution, the action becomes
|
648 |
+
Sclassical = 1
|
649 |
+
2x(t) ˙x(t)|
|
650 |
+
tf
|
651 |
+
−∞
|
652 |
+
We get
|
653 |
+
Sclassical = 1
|
654 |
+
2iω0x2
|
655 |
+
f
|
656 |
+
(2.32)
|
657 |
+
Plugging (2.31) into (2.29) we obtain
|
658 |
+
Ψ(xf) ≈ e− 1
|
659 |
+
2 ω0x2
|
660 |
+
f
|
661 |
+
(2.33)
|
662 |
+
If we repeat this for the free field in dS space we get the ground state wave functional [32].
|
663 |
+
8
|
664 |
+
|
665 |
+
2.3.2
|
666 |
+
Using ERG formulation
|
667 |
+
For the Euclidean version, we set it = τ and we write
|
668 |
+
Ψ(x, τ) =
|
669 |
+
�
|
670 |
+
dxi
|
671 |
+
�
|
672 |
+
x(τi)
|
673 |
+
=
|
674 |
+
xi
|
675 |
+
x(τ)
|
676 |
+
=
|
677 |
+
x
|
678 |
+
Dx e−
|
679 |
+
� τ
|
680 |
+
τi LE(x(τ ′), ˙x(τ ′),τ ′)dτ ′Ψ(xi, τi)
|
681 |
+
(2.34)
|
682 |
+
It is well known that if one does the semiclassical analysis for the Euclidean case with general
|
683 |
+
boundary condition one recovers the thermal density matrix. This is for the time independent
|
684 |
+
Hamiltonian - such as the harmonic oscillator. We will not do this here. Instead we proceed
|
685 |
+
directly to the ERG interpretation of the calculation. Here the Hamiltonian is time dependent.
|
686 |
+
In [5] the analysis given below was applied to W[J]. We repeat it here for the Wilson action.
|
687 |
+
Our starting action in this case is (Note ˙G < 0):
|
688 |
+
S = −1
|
689 |
+
2
|
690 |
+
� τf
|
691 |
+
τi
|
692 |
+
˙x2
|
693 |
+
˙G
|
694 |
+
(2.35)
|
695 |
+
EOM is given by,
|
696 |
+
∂τ( ˙x
|
697 |
+
˙G
|
698 |
+
) = 0
|
699 |
+
˙x
|
700 |
+
˙G
|
701 |
+
= b =⇒ x = bG + c
|
702 |
+
We choose G so that it vanishes at τ = ∞ .
|
703 |
+
For the Euclidean Harmonic oscillator case G has then to be
|
704 |
+
G = − 1
|
705 |
+
ω0
|
706 |
+
(tanh ω(τ − τi) − 1)
|
707 |
+
Also x → 0 as τ → ∞. So c = 0.
|
708 |
+
x = bG
|
709 |
+
(2.36)
|
710 |
+
x(τ) = − b
|
711 |
+
ω0
|
712 |
+
(tanh ω(τ − τi) − 1)
|
713 |
+
On shell
|
714 |
+
S = −1
|
715 |
+
2
|
716 |
+
� τf
|
717 |
+
τi
|
718 |
+
dτ
|
719 |
+
d
|
720 |
+
dτ (x ˙x
|
721 |
+
G )
|
722 |
+
= 1
|
723 |
+
2(x(τf) − x(τi))b = 1
|
724 |
+
2[x(τf)x(τf)
|
725 |
+
G(τf)
|
726 |
+
− x(τi)x(τi)
|
727 |
+
G(τi)
|
728 |
+
]
|
729 |
+
If we add this change to the initial Wilson action 1
|
730 |
+
2
|
731 |
+
x(τi)x(τi)
|
732 |
+
G(τi)
|
733 |
+
we get the final Wilson action
|
734 |
+
Hf = 1
|
735 |
+
2
|
736 |
+
x(τf)x(τf)
|
737 |
+
G(τf)
|
738 |
+
If, for instance, we are interested in evaluating H semiclassically at τ = τi.
|
739 |
+
x(τi) = b
|
740 |
+
ω0
|
741 |
+
=⇒ b = x(τi)ω0
|
742 |
+
x(τ) = −x(0)(tanh ω(τ − τi) − 1)
|
743 |
+
˙x(τ) = −x(0)ω0sech2ω0(τ − τi)
|
744 |
+
9
|
745 |
+
|
746 |
+
The classical action is
|
747 |
+
Sclassical = 1
|
748 |
+
2ω0x(τi)2
|
749 |
+
Thus since G(τi) =
|
750 |
+
1
|
751 |
+
ω0, H evaluated semiclassically is:
|
752 |
+
H[x, τi] ≈ 1
|
753 |
+
2ω0x(τi)2
|
754 |
+
(2.37)
|
755 |
+
Then
|
756 |
+
Ψ = e−H[x,τi] = e−ω0x(τi)2
|
757 |
+
which coincides with the ground state wave function of the harmonic oscillator. This is essen-
|
758 |
+
tially the Hartle Hawking prescription [45]. This also motivates the dS-CFT correspondence
|
759 |
+
statement [30, 31, 32] that ΨdS = ZCFT
|
760 |
+
This concludes the discussion of the mapping of ERG equation to a Euclidean harmonic
|
761 |
+
oscillator. In higher dimensions this gives free field theory in flat space. We now return to the
|
762 |
+
case of interest, namely dS space.
|
763 |
+
3
|
764 |
+
ERG to field theory in dS
|
765 |
+
We first map the system to Euclidean AdS. Then analytically continue and obtain dS results.
|
766 |
+
Alternatively, one can analytically continue the ERG equation to the Schroedinger equation
|
767 |
+
(when D = 0 this is a free particle with a time dependent mass) and then map to de Sitter
|
768 |
+
space. This is all exactly as was done for the harmonic oscillator.
|
769 |
+
3.1
|
770 |
+
Analytic Continuation
|
771 |
+
The EAdS metric in Poincare coordinates is
|
772 |
+
ds2 = R2[dxidxi + dz2
|
773 |
+
z2
|
774 |
+
]
|
775 |
+
(3.38)
|
776 |
+
The dS metric in Poincare coordinates is:
|
777 |
+
ds2 = L2[dxidxi − dη2
|
778 |
+
η2
|
779 |
+
]
|
780 |
+
(3.39)
|
781 |
+
The metrics are related by analytic continuation:
|
782 |
+
iη = z,
|
783 |
+
iL = R
|
784 |
+
3.1.1
|
785 |
+
Analytic Continuation of the Action
|
786 |
+
The action generically is
|
787 |
+
S = −1
|
788 |
+
2
|
789 |
+
�
|
790 |
+
dD+1x√g[gµν∂µφ∂νφ + m2φ2]
|
791 |
+
(3.40)
|
792 |
+
10
|
793 |
+
|
794 |
+
de Sitter
|
795 |
+
In this case we write √−g since g is negative: g = −( L2
|
796 |
+
η2 )D+1. Also g00 = − η2
|
797 |
+
L2
|
798 |
+
and gij = δij η2
|
799 |
+
L2.
|
800 |
+
Thus
|
801 |
+
SdS =
|
802 |
+
�
|
803 |
+
dDx
|
804 |
+
� ∞
|
805 |
+
0
|
806 |
+
dη (L
|
807 |
+
η )D+1[ η2
|
808 |
+
L2∂ηφ∂ηφ − η2
|
809 |
+
L2∂iφ∂iφ − m2φ2]
|
810 |
+
(3.41)
|
811 |
+
In momentum space:
|
812 |
+
SdS =
|
813 |
+
�
|
814 |
+
dDp
|
815 |
+
(2π)D
|
816 |
+
� ∞
|
817 |
+
0
|
818 |
+
dη (L
|
819 |
+
η )D+1[ η2
|
820 |
+
L2∂ηφ(p)∂ηφ(−p) − ( η2
|
821 |
+
L2p2 + m2)φ(p)φ(−p)]
|
822 |
+
(3.42)
|
823 |
+
The functional integral description of the quantum mechanical evolution operator for the
|
824 |
+
wave functional of the fields in dS space-time is
|
825 |
+
¯Ψ[φ(p), t] =
|
826 |
+
�
|
827 |
+
dφi(p)
|
828 |
+
�
|
829 |
+
φ(p, ti)
|
830 |
+
=
|
831 |
+
φi(p)
|
832 |
+
φ(p, t)
|
833 |
+
=
|
834 |
+
φ(p)
|
835 |
+
Dφ(p, t) ei 1
|
836 |
+
2
|
837 |
+
� t
|
838 |
+
ti[ ˙φ(p,t′)2−ω2
|
839 |
+
0φ(p,t′)2]dt′ ¯Ψ[φi(p), ti]
|
840 |
+
(3.43)
|
841 |
+
Euclidean Anti de Sitter
|
842 |
+
g = ( R2
|
843 |
+
z2 )D+1. Also g00 = z2
|
844 |
+
R2 and gij = δij z2
|
845 |
+
R2.
|
846 |
+
SEAdS =
|
847 |
+
�
|
848 |
+
dDx
|
849 |
+
� ∞
|
850 |
+
0
|
851 |
+
dz (R
|
852 |
+
z )D+1[ z2
|
853 |
+
R2∂zφ∂zφ + z2
|
854 |
+
R2∂iφ∂iφ + m2φ2]
|
855 |
+
(3.44)
|
856 |
+
In momentum space
|
857 |
+
SEAdS =
|
858 |
+
�
|
859 |
+
dDp
|
860 |
+
(2π)D
|
861 |
+
� ∞
|
862 |
+
0
|
863 |
+
dz (R
|
864 |
+
z )D+1[ z2
|
865 |
+
R2∂zφ(p)∂zφ(−p) + ( z2
|
866 |
+
R2p2 + m2)φ(p)φ(−p)]
|
867 |
+
(3.45)
|
868 |
+
If we set iη = z and iL = R we see that the functional integral (3.43) becomes
|
869 |
+
¯Ψ[φ(p), t] =
|
870 |
+
�
|
871 |
+
dφi(p)
|
872 |
+
�
|
873 |
+
φ(p, ti)
|
874 |
+
=
|
875 |
+
φi(p)
|
876 |
+
φ(p, t)
|
877 |
+
=
|
878 |
+
φ(p)
|
879 |
+
Dφ(p, t) e− 1
|
880 |
+
2
|
881 |
+
� t
|
882 |
+
ti[ ˙φ(p,t′)2+ω2
|
883 |
+
0φ(p,t′)2]dt′ ¯Ψ[φi(p), ti] (3.46)
|
884 |
+
In holograhic RG this is interpreted as a Euclidean functional integral giving the evolution in
|
885 |
+
the radial direction. ¯Ψ is to be interpreted as e−SI[φ(p),t] where SI is the Wilson action. It was
|
886 |
+
shown in [5] (see below) that this can be obtained by mapping an ERG evolution operator.
|
887 |
+
The dS functional integral (3.43) above is thus an analytically continued version of this.
|
888 |
+
3.2
|
889 |
+
Mapping
|
890 |
+
3.2.1
|
891 |
+
Mapping from Quantum Mechanics
|
892 |
+
Let us go back to Section (2.1) and consider the mapping from the Quantum Mechanics of a
|
893 |
+
free particle with time dependent mass. We think of it as a 0 + 1 dimensional field theory.
|
894 |
+
M(t) is taken to be dimensionless and x has canonical dimensions of − 1
|
895 |
+
2.
|
896 |
+
S = 1
|
897 |
+
2
|
898 |
+
�
|
899 |
+
dt M(t) ˙x2
|
900 |
+
(3.47)
|
901 |
+
(In the ERG version M(t) = 1
|
902 |
+
˙G)
|
903 |
+
The path integral is
|
904 |
+
�
|
905 |
+
Dx eiS
|
906 |
+
(3.48)
|
907 |
+
11
|
908 |
+
|
909 |
+
As before x(t) = f(t)y(t) with f 2(t) =
|
910 |
+
1
|
911 |
+
M(t). Substitute this in (3.47) and go through the
|
912 |
+
same steps to obtain:
|
913 |
+
S = 1
|
914 |
+
2
|
915 |
+
�
|
916 |
+
dt [ ˙y2 + eln f( d2
|
917 |
+
dt2e− ln f)y2]
|
918 |
+
(3.49)
|
919 |
+
Now choose
|
920 |
+
eln f( d2
|
921 |
+
dt2e− ln f) = −( η2
|
922 |
+
L2p2 + m2)
|
923 |
+
(3.50)
|
924 |
+
where η = Le
|
925 |
+
t
|
926 |
+
L. to obtain SdS
|
927 |
+
SdS = 1
|
928 |
+
2
|
929 |
+
�
|
930 |
+
dt [ ˙y2 − ( η2
|
931 |
+
L2p2 + m2)y2]
|
932 |
+
= 1
|
933 |
+
2
|
934 |
+
�
|
935 |
+
dη (L
|
936 |
+
η )[ η2
|
937 |
+
L2∂ηy∂ηy − ( η2
|
938 |
+
L2p2 + m2)y2]
|
939 |
+
(3.51)
|
940 |
+
p, m here are just some parameters. When D > 0 they will stand for momentum and mass
|
941 |
+
of the field respectively. So starting from a free particle with time dependent mass we obtain
|
942 |
+
the free field action in de Sitter space dSD+1 with D = 0.
|
943 |
+
Schroedinger Equation:
|
944 |
+
i∂Ψ(x, t)
|
945 |
+
∂t
|
946 |
+
= −
|
947 |
+
1
|
948 |
+
2M(t)
|
949 |
+
∂2Ψ(x, t)
|
950 |
+
∂x2
|
951 |
+
(3.52)
|
952 |
+
Using the same mapping as in Section (2.2.1), x = fy
|
953 |
+
Ψ(f(t)y, t) = e− 1
|
954 |
+
2 αy2 ¯Ψ(y, t)
|
955 |
+
with α = −i
|
956 |
+
˙f
|
957 |
+
f one obtains
|
958 |
+
i∂ ¯Ψ
|
959 |
+
∂t = [(1
|
960 |
+
2
|
961 |
+
d2 ln f
|
962 |
+
dt2
|
963 |
+
− 1
|
964 |
+
2(d ln f
|
965 |
+
dt )2)y2 + 1
|
966 |
+
2α − 1
|
967 |
+
2
|
968 |
+
∂2
|
969 |
+
∂y2]¯Ψ
|
970 |
+
Using (3.50) this becomes
|
971 |
+
i η
|
972 |
+
L
|
973 |
+
∂ ¯Ψ
|
974 |
+
∂η = [−1
|
975 |
+
2
|
976 |
+
∂2
|
977 |
+
∂y2 + 1
|
978 |
+
2( η2
|
979 |
+
L2p2 + m2)y2 + 1
|
980 |
+
2α]¯Ψ
|
981 |
+
(3.53)
|
982 |
+
If we construct the Schroedinger equation corresponding to the action (3.51) one obtains
|
983 |
+
i η
|
984 |
+
L
|
985 |
+
∂ ¯Ψ
|
986 |
+
∂η = [−1
|
987 |
+
2
|
988 |
+
∂2
|
989 |
+
∂y2 + 1
|
990 |
+
2( η2
|
991 |
+
L2p2 + m2)y2]¯Ψ
|
992 |
+
(3.54)
|
993 |
+
which barring the field independent term α is exactly the same as (3.53). This term as we
|
994 |
+
have seen provides an overall field independent scaling for all wave functions. It is a consequence
|
995 |
+
of the ordering ambiguity in going from classical to quantum treatment. (3.54) (or its extension
|
996 |
+
to D > 0) describes the quantum mechanical time evolution of the matter field wave functional
|
997 |
+
in de Sitter space.
|
998 |
+
12
|
999 |
+
|
1000 |
+
3.2.2
|
1001 |
+
Mapping from ERG
|
1002 |
+
Action
|
1003 |
+
We now consider the Euclidean version of (3.47), which is the Polchinski ERG
|
1004 |
+
equation. This is what was done in [5]. Thus we replace M(t) by − 1
|
1005 |
+
˙G.
|
1006 |
+
S = −1
|
1007 |
+
2
|
1008 |
+
�
|
1009 |
+
dτ ˙x2
|
1010 |
+
˙G
|
1011 |
+
(3.55)
|
1012 |
+
The path integral is ( ˙G < 0)
|
1013 |
+
�
|
1014 |
+
Dx e
|
1015 |
+
1
|
1016 |
+
2
|
1017 |
+
�
|
1018 |
+
dτ
|
1019 |
+
˙x2
|
1020 |
+
˙G
|
1021 |
+
(3.56)
|
1022 |
+
which can be obtained from (3.52) by setting it = τ. We take z = Re
|
1023 |
+
τ
|
1024 |
+
R If we let iη = z, iL =
|
1025 |
+
R, it = τ then this can be obtained from the corresponding Minkowski case.
|
1026 |
+
As before x(τ) = f(τ)y(τ) with f 2(τ) = ˙G. Substitute this in (3.55) and go through the
|
1027 |
+
same steps to obtain:
|
1028 |
+
S = 1
|
1029 |
+
2
|
1030 |
+
�
|
1031 |
+
dτ [ ˙y2 + eln f( d2
|
1032 |
+
dτ 2e− ln f)y2]
|
1033 |
+
(3.57)
|
1034 |
+
Now choose
|
1035 |
+
eln f( d2
|
1036 |
+
dτ 2e− ln f) = ( z2
|
1037 |
+
R2p2 + m2)
|
1038 |
+
(3.58)
|
1039 |
+
where z = Re
|
1040 |
+
τ
|
1041 |
+
R. to obtain SEAdS
|
1042 |
+
SEAdS =
|
1043 |
+
�
|
1044 |
+
dz (R
|
1045 |
+
z )[ z2
|
1046 |
+
R2∂zy∂zy + ( z2
|
1047 |
+
R2p2 + m2)y2]
|
1048 |
+
(3.59)
|
1049 |
+
ERG Equation
|
1050 |
+
By analogy with the Schroedinger equation we can see that (3.56) is the
|
1051 |
+
evolution operator corresponding to the ERG equation
|
1052 |
+
∂Ψ(x, τ)
|
1053 |
+
∂τ
|
1054 |
+
= −1
|
1055 |
+
2
|
1056 |
+
˙G∂2Ψ(x, τ)
|
1057 |
+
∂x2
|
1058 |
+
(3.60)
|
1059 |
+
By the same series of transformations as in the de Sitter case, but using (3.58), one obtains
|
1060 |
+
z
|
1061 |
+
R
|
1062 |
+
∂ ¯Ψ
|
1063 |
+
∂z = [1
|
1064 |
+
2
|
1065 |
+
∂2
|
1066 |
+
∂y2 − ( z2
|
1067 |
+
R2p2 + m2)y2 − 1
|
1068 |
+
2α]¯Ψ
|
1069 |
+
(3.61)
|
1070 |
+
with α =
|
1071 |
+
˙f
|
1072 |
+
f generating an overall scale transformation for ¯Ψ.
|
1073 |
+
In the ERG context ¯Ψ
|
1074 |
+
represents eW[J] upto a quadratic term. This equation is the holographic RG equation in the
|
1075 |
+
AdS/CFT correspondence for an elementary scalar field [5].
|
1076 |
+
3.3
|
1077 |
+
Connections
|
1078 |
+
Let us summarize the various connections obtained above.
|
1079 |
+
• We start with the quantum mechanics of a free particle having a time dependent mass.
|
1080 |
+
The Schroedinger equation (SE) for this is (2.20). Analytical continuation of this equation
|
1081 |
+
(generalized to higher dimensions) gives the Polchinski ERG equation (2.24).
|
1082 |
+
• The free particle SE (2.20) can be mapped to a SE for a harmonic oscillator (2.23). The
|
1083 |
+
ERG equation (2.24) can similarly be mapped to a Euclidean harmonic oscillator (2.27)-
|
1084 |
+
analytically continued version of (2.23).
|
1085 |
+
13
|
1086 |
+
|
1087 |
+
• The evolution operators for the above equations are defined in terms of path integrals
|
1088 |
+
over some actions. The same mapping function f maps the corresponding actions to each
|
1089 |
+
other. Thus the evolution operator for the free particle Schroedinger equation is given by
|
1090 |
+
the action in (2.3) which is mapped to a harmonic oscillator action (2.7). The analytical
|
1091 |
+
continuation of these are the Euclidean ERG evolution operator (2.13) mapped to a
|
1092 |
+
harmonic oscillator Hamiltonian (2.16). These steps are summarized in the flow diagram
|
1093 |
+
in Figure 1.
|
1094 |
+
• The mapping function f was originally chosen in [5] to map the free particle ERG action
|
1095 |
+
(3.55) to an action for free fields in EAdS0+1 given in (3.60). The analytical continuation
|
1096 |
+
of this problem to real time gives us an action in dS0+1 (3.51).
|
1097 |
+
• One can also repeat these steps for the corresponding “wave” equations. The Polchinski
|
1098 |
+
ERG equation for eW[J] gets mapped to an equation in EAdS for eW[J] which is nothing but
|
1099 |
+
the holographic RG equations. Analytically continuing this, the Schroedinger equation
|
1100 |
+
for a wave functional is mapped to a Schroedinger equation for wave functionals of fields
|
1101 |
+
in dS.
|
1102 |
+
These are summarized in the figure below (Fig.2). The analytic continuation can be done
|
1103 |
+
before the map with f is applied or after as shown in the figure. It can be done both for the
|
1104 |
+
actions as well as for the equations.
|
1105 |
+
ERG
|
1106 |
+
Equation
|
1107 |
+
Holographic RG:
|
1108 |
+
Radial evolution
|
1109 |
+
in EAdS
|
1110 |
+
Schroedinger
|
1111 |
+
Equation
|
1112 |
+
Real time QM
|
1113 |
+
evolution
|
1114 |
+
In dS
|
1115 |
+
Map “f”
|
1116 |
+
Map “f”
|
1117 |
+
Analytic
|
1118 |
+
Continuation
|
1119 |
+
Analytic
|
1120 |
+
Continuation
|
1121 |
+
ERG
|
1122 |
+
Equation
|
1123 |
+
Evolution equation
|
1124 |
+
For Euclidean
|
1125 |
+
Harmonic Oscillator
|
1126 |
+
QM Schroedinger
|
1127 |
+
Equation
|
1128 |
+
Real time QM
|
1129 |
+
Schroedinger
|
1130 |
+
Equation for
|
1131 |
+
Harmonic Oscillator
|
1132 |
+
Map “f”
|
1133 |
+
Map “f”
|
1134 |
+
Analytic
|
1135 |
+
Continuation
|
1136 |
+
Analytic
|
1137 |
+
Continuation
|
1138 |
+
ERG
|
1139 |
+
Equation
|
1140 |
+
Holographic RG:
|
1141 |
+
Radial evolution
|
1142 |
+
in EAdS
|
1143 |
+
Schroedinger
|
1144 |
+
Equation
|
1145 |
+
Real time QM
|
1146 |
+
evolution
|
1147 |
+
In dS
|
1148 |
+
Map “f”
|
1149 |
+
Map “f”
|
1150 |
+
Analytic
|
1151 |
+
Continuation
|
1152 |
+
Analytic
|
1153 |
+
Continuation
|
1154 |
+
Euclidean Action
|
1155 |
+
For ERG evolution
|
1156 |
+
By Feynman
|
1157 |
+
Path Integral
|
1158 |
+
Euclidean action for
|
1159 |
+
Harmonic Oscillator
|
1160 |
+
Path Integral
|
1161 |
+
Lorentzian
|
1162 |
+
Action for QM
|
1163 |
+
Evolution by
|
1164 |
+
Path Integral
|
1165 |
+
QM evolution:
|
1166 |
+
Action for
|
1167 |
+
Harmonic Oscillator
|
1168 |
+
Path Integral
|
1169 |
+
Map “f”
|
1170 |
+
Map “f”
|
1171 |
+
Analytic
|
1172 |
+
Continuation
|
1173 |
+
Analytic
|
1174 |
+
Continuation
|
1175 |
+
Flow of equations-Harmonic Oscillator
|
1176 |
+
Flow of actions – Harmonic Oscillator
|
1177 |
+
Figure 1: Mapping ERG to Harmonic Oscillator
|
1178 |
+
3.4
|
1179 |
+
dS-CFT correspondence
|
1180 |
+
The connections with ERG mentioned above should, if pursued, provide some insights into
|
1181 |
+
dS-CFT correspondence. We restrict ourselves to some preliminary observations in this paper.
|
1182 |
+
14
|
1183 |
+
|
1184 |
+
ERG
|
1185 |
+
Equation
|
1186 |
+
Holographic RG:
|
1187 |
+
Radial evolution
|
1188 |
+
in EAdS
|
1189 |
+
Schroedinger
|
1190 |
+
Equation
|
1191 |
+
Real time QM
|
1192 |
+
evolution
|
1193 |
+
In dS
|
1194 |
+
Map “f”
|
1195 |
+
Map “f”
|
1196 |
+
Analytic
|
1197 |
+
Continuation
|
1198 |
+
Analytic
|
1199 |
+
Continuation
|
1200 |
+
ERG
|
1201 |
+
Equation
|
1202 |
+
Holographic RG:
|
1203 |
+
Radial evolution
|
1204 |
+
equation in EAdS
|
1205 |
+
QM Schroedinger
|
1206 |
+
Equation
|
1207 |
+
Real time QM
|
1208 |
+
Schroedinger
|
1209 |
+
equation
|
1210 |
+
in dS
|
1211 |
+
Map “f”
|
1212 |
+
Map “f”
|
1213 |
+
Analytic
|
1214 |
+
Continuation
|
1215 |
+
Analytic
|
1216 |
+
Continuation
|
1217 |
+
ERG
|
1218 |
+
Equation
|
1219 |
+
Holographic RG:
|
1220 |
+
Radial evolution
|
1221 |
+
in EAdS
|
1222 |
+
Schroedinger
|
1223 |
+
Equation
|
1224 |
+
Real time QM
|
1225 |
+
evolution
|
1226 |
+
In dS
|
1227 |
+
Map “f”
|
1228 |
+
Map “f”
|
1229 |
+
Analytic
|
1230 |
+
Continuation
|
1231 |
+
Analytic
|
1232 |
+
Continuation
|
1233 |
+
Euclidean Action
|
1234 |
+
For ERG evolution
|
1235 |
+
by functional integral
|
1236 |
+
Holographic RG:
|
1237 |
+
Action in EadS
|
1238 |
+
for functional
|
1239 |
+
integral
|
1240 |
+
Lorentzian
|
1241 |
+
Action for QM
|
1242 |
+
evolution
|
1243 |
+
QM evolution by
|
1244 |
+
Functional integral:
|
1245 |
+
Action in dS
|
1246 |
+
Map “f”
|
1247 |
+
Map “f”
|
1248 |
+
Analytic
|
1249 |
+
Continuation
|
1250 |
+
Analytic
|
1251 |
+
Continuation
|
1252 |
+
Flow of equations
|
1253 |
+
Flow of actions
|
1254 |
+
Figure 2: Mapping ERG to Holographic RG
|
1255 |
+
The idea of dS-CFT correspondence was suggested in [30, 31, 32]. This has been investigated
|
1256 |
+
further by many authors, e.g. [33, 34, 38, 39, 35, 37, 36].
|
1257 |
+
What we see from the above analysis is that considering the relation between the evolution
|
1258 |
+
equations, one can say that
|
1259 |
+
Ψ[φ, J]wave−functional in dS = {Z[φ, J]CFT}analytically continued
|
1260 |
+
(3.62)
|
1261 |
+
Thus we see that the dS-CFT correspondence suggested by this analysis is one between an
|
1262 |
+
ERG equation for a CFT generating functional and a real time quantum mechanical evolution
|
1263 |
+
of a wave functional in dS space time.
|
1264 |
+
The LHS of (3.62) is a QM wave functional of fields on a D-dimensional spatial slice of
|
1265 |
+
a D + 1 dimensional dS spacetime. The RHS is the analytically continued partition function
|
1266 |
+
of a D-dimensional Euclidean CFT - more precisely, either eWΛ[J] or e−SI,Λ[φ]. The precise
|
1267 |
+
statement has to involve some statement of the boundary conditions. In the next section we
|
1268 |
+
give a concrete example with boundary conditions specified.
|
1269 |
+
Note that the LHS is a complex probability amplitude. Expectation values will involve Ψ∗Ψ
|
1270 |
+
and were calculated first in [30, 31, 32].
|
1271 |
+
One can proceed to ask whether the expectations on the spatial slice calculated using Ψ∗Ψ
|
1272 |
+
also correspond to some other Euclidean CFT on the spatial slice. This was explored further
|
1273 |
+
in [38]. We do not address this question here.
|
1274 |
+
In the next section we give some examples that explicitly illustrate the connection made by
|
1275 |
+
(3.62).
|
1276 |
+
15
|
1277 |
+
|
1278 |
+
4
|
1279 |
+
Obtaining Bulk field from ERG
|
1280 |
+
The ERG formulation stated in this paper starts with the boundary fields. The evolution
|
1281 |
+
operator for this involves bulk fields but with a non standard action. When this action is
|
1282 |
+
mapped to EAdS action one can interpret the newly mapped field as the EAdS bulk field. This
|
1283 |
+
analysis for Euclidean AdS is well defined and has been done in [5, 7]. However, this treatment
|
1284 |
+
does not have a natural interpretation in the context in dS space. We have elaborated that in
|
1285 |
+
this section.
|
1286 |
+
Bulk scalar field in Euclidean AdS and dS
|
1287 |
+
There are conceptual barriers if one tries to do similar analysis to map the ERG evolution
|
1288 |
+
operator directly to Lorentzian dS. First of all, it is not clear as in EAdS whether the function
|
1289 |
+
G(t) a.k.a f 2(t) = ˙G(t) is the Green’s function of the dual field theory of dS. It has an oscillatory
|
1290 |
+
cutoff function. Therefore we analytically continue the ERG action to a Lorentzian action first,
|
1291 |
+
and then do the mapping.
|
1292 |
+
The result thus obtained (4.74) matches with the value found in [39] where the authors have
|
1293 |
+
found the bulk field in semicalssical approximation from dS bulk action. For the Lorentzian dS
|
1294 |
+
analysis presented here the RG interpretation is not clearly understood - except as an anlytic
|
1295 |
+
continuation. We have presented it here for sake of completeness.
|
1296 |
+
Euclidean AdS
|
1297 |
+
The Euclidean action of the ERG evolution operator in momentum space,
|
1298 |
+
S = −1
|
1299 |
+
2
|
1300 |
+
�
|
1301 |
+
dτ
|
1302 |
+
�
|
1303 |
+
p
|
1304 |
+
˙φ2
|
1305 |
+
˙G
|
1306 |
+
(4.63)
|
1307 |
+
is mapped to
|
1308 |
+
SEAdS =
|
1309 |
+
�
|
1310 |
+
dDp
|
1311 |
+
(2π)D
|
1312 |
+
� ∞
|
1313 |
+
ϵEAdS
|
1314 |
+
dz (R
|
1315 |
+
z )d+1[ z2
|
1316 |
+
R2∂zyEAdS(p)∂zyEAdS(−p)+( z2
|
1317 |
+
R2p2+m2)yEAdS(p)yEAdS(−p)]
|
1318 |
+
(4.64)
|
1319 |
+
with z = Re
|
1320 |
+
τ
|
1321 |
+
R as described in [5]. We have rescaled the field as φ = fyEAdS where f is
|
1322 |
+
related to the boundary Green’s function G as f 2 = −
|
1323 |
+
� z
|
1324 |
+
R
|
1325 |
+
�−d ˙G.
|
1326 |
+
The constraint on 1
|
1327 |
+
f is given by,
|
1328 |
+
∂
|
1329 |
+
∂z{
|
1330 |
+
� z
|
1331 |
+
R
|
1332 |
+
�−d+1 ∂
|
1333 |
+
∂z
|
1334 |
+
1
|
1335 |
+
f } =
|
1336 |
+
� z
|
1337 |
+
R
|
1338 |
+
�−d+1 �
|
1339 |
+
p2 + m2R2
|
1340 |
+
z2
|
1341 |
+
� 1
|
1342 |
+
f
|
1343 |
+
(4.65)
|
1344 |
+
The solutions are zd/2Kα(pz) and zd/2Iα(pz) where α2 = m2R2 + d2
|
1345 |
+
4 .
|
1346 |
+
So 1
|
1347 |
+
f can be taken as,
|
1348 |
+
1
|
1349 |
+
f(p, z) = (z)d/2 (AKα(pz) + BIα(pz))
|
1350 |
+
(4.66)
|
1351 |
+
The Green’s function is
|
1352 |
+
G(p, z) = CKα(pz) + DIα(pz)
|
1353 |
+
AKα(pz) + BIα(pz)
|
1354 |
+
(4.67)
|
1355 |
+
The large argument asymptotic form of the Modified Bessel function Iα(z) and Kα(z) are
|
1356 |
+
given by,
|
1357 |
+
Iα(z) ∼
|
1358 |
+
ez
|
1359 |
+
√
|
1360 |
+
2πz
|
1361 |
+
�
|
1362 |
+
1 + O(1
|
1363 |
+
z)
|
1364 |
+
�
|
1365 |
+
for |arg z| < π
|
1366 |
+
2
|
1367 |
+
16
|
1368 |
+
|
1369 |
+
Kα(z) ∼
|
1370 |
+
� π
|
1371 |
+
2ze−z
|
1372 |
+
�
|
1373 |
+
1 + O(1
|
1374 |
+
z)
|
1375 |
+
�
|
1376 |
+
for |arg z| < 3π
|
1377 |
+
2
|
1378 |
+
Putting two constraints on G- i)G(pz → ∞) = 0 ii)G(pz → 0) = γEAdS p−2α, we get,
|
1379 |
+
D = 0; C(p) = γEAdS p−α; B(p) = −
|
1380 |
+
1
|
1381 |
+
γEAdS
|
1382 |
+
pα
|
1383 |
+
In semiclassical approximation the bulk field yEAdS = bEAdS
|
1384 |
+
G
|
1385 |
+
f . If yEAdS satisfies yEAdS
|
1386 |
+
0
|
1387 |
+
the
|
1388 |
+
bulk field is given by,
|
1389 |
+
yEAdS = yEAdS
|
1390 |
+
0
|
1391 |
+
zd/2
|
1392 |
+
ϵd/2
|
1393 |
+
Kα(pz)
|
1394 |
+
Kα(pϵ)
|
1395 |
+
(4.68)
|
1396 |
+
Now let’s check by analytic continuation iη = z and iL = R. First of all, α becomes ν. ϵ
|
1397 |
+
is replaced by iϵ. We get,
|
1398 |
+
yEAdS|z=iη, R=iL = yEAdS
|
1399 |
+
0
|
1400 |
+
|z=iη, R=iL
|
1401 |
+
(iη)d/2
|
1402 |
+
(iϵ)d/2
|
1403 |
+
Kν(ipη)
|
1404 |
+
Kν(ipϵ)
|
1405 |
+
(4.69)
|
1406 |
+
As,
|
1407 |
+
yEAdS
|
1408 |
+
0
|
1409 |
+
= bEAdS ϵd/2
|
1410 |
+
EAdS
|
1411 |
+
γEAdS Kα(pϵ)
|
1412 |
+
pα
|
1413 |
+
(4.70)
|
1414 |
+
de Sitter
|
1415 |
+
We would like to do the same analysis as above for the Lorentzian case.
|
1416 |
+
The Lorentzian action obtained from (4.63) by analytic continuation, in momentum space,
|
1417 |
+
S = −
|
1418 |
+
�
|
1419 |
+
dt
|
1420 |
+
�
|
1421 |
+
dDp
|
1422 |
+
(2π)D
|
1423 |
+
1
|
1424 |
+
2 ˙G(p)
|
1425 |
+
˙φ(p) ˙φ(−p)
|
1426 |
+
and needs to be mapped to
|
1427 |
+
= 1
|
1428 |
+
2
|
1429 |
+
� ∞
|
1430 |
+
ϵdS
|
1431 |
+
dη
|
1432 |
+
�
|
1433 |
+
dDp
|
1434 |
+
(2π)D
|
1435 |
+
��L
|
1436 |
+
η
|
1437 |
+
�D−1
|
1438 |
+
{(∂ηydS)2 − p2ydS2 − m2L2
|
1439 |
+
η2
|
1440 |
+
ydS2}
|
1441 |
+
�
|
1442 |
+
Here η = Le
|
1443 |
+
t
|
1444 |
+
L. We do the field redefinition of boundary field
|
1445 |
+
φ = fydS
|
1446 |
+
f is a scale dependent quantity which is related to Green’s function G as f 2 = −
|
1447 |
+
� η
|
1448 |
+
L
|
1449 |
+
�−D ˙G.
|
1450 |
+
Performing the same manipulations as in [5], one can get the constraint on f as,
|
1451 |
+
� η
|
1452 |
+
L
|
1453 |
+
�d−1 �� η
|
1454 |
+
L
|
1455 |
+
�−d+1 d
|
1456 |
+
dη
|
1457 |
+
�2
|
1458 |
+
e− ln f =
|
1459 |
+
� η
|
1460 |
+
L
|
1461 |
+
�−d+1 �
|
1462 |
+
−p2 − m2L2
|
1463 |
+
η2
|
1464 |
+
�
|
1465 |
+
e− ln f
|
1466 |
+
−d + 1
|
1467 |
+
η
|
1468 |
+
∂
|
1469 |
+
∂η
|
1470 |
+
1
|
1471 |
+
f + ∂2
|
1472 |
+
∂η2
|
1473 |
+
1
|
1474 |
+
f =
|
1475 |
+
�
|
1476 |
+
−p2 − m2L2
|
1477 |
+
η2
|
1478 |
+
� 1
|
1479 |
+
f
|
1480 |
+
The solutions are
|
1481 |
+
� η
|
1482 |
+
L
|
1483 |
+
�d/2 H(1)
|
1484 |
+
ν (pη) and
|
1485 |
+
� η
|
1486 |
+
L
|
1487 |
+
�d/2 H(2)
|
1488 |
+
ν (pη) with ν2 = d2
|
1489 |
+
4 − m2L2.
|
1490 |
+
The 1
|
1491 |
+
f can be written in general as( note f is dimensionless),
|
1492 |
+
1
|
1493 |
+
f(p, η) =
|
1494 |
+
� η
|
1495 |
+
L
|
1496 |
+
�d/2 �
|
1497 |
+
AH(1)
|
1498 |
+
ν (pη) + BH(2)
|
1499 |
+
ν (pη)
|
1500 |
+
�
|
1501 |
+
(4.71)
|
1502 |
+
17
|
1503 |
+
|
1504 |
+
and the Green’s function is 2
|
1505 |
+
G(pη) = CH(1)
|
1506 |
+
ν (pη) + DH(2)
|
1507 |
+
ν (pη)
|
1508 |
+
AH(1)
|
1509 |
+
ν (pη) + BH(2)
|
1510 |
+
ν (pη)
|
1511 |
+
Physically one can expect G(pη → ∞) = 0 which yields,
|
1512 |
+
CH(1)
|
1513 |
+
ν (pη) + DH(2)
|
1514 |
+
ν (pη) = 0
|
1515 |
+
(4.72)
|
1516 |
+
The asymptotic forms of Hankel functions of both kind for large arguments are,
|
1517 |
+
H(1)
|
1518 |
+
ν (z) ∼
|
1519 |
+
�
|
1520 |
+
2
|
1521 |
+
πzei(z− νπ
|
1522 |
+
2 − π
|
1523 |
+
4 )
|
1524 |
+
− π < arg z < 2π
|
1525 |
+
H(2)
|
1526 |
+
ν (z) ∼
|
1527 |
+
�
|
1528 |
+
2
|
1529 |
+
πze−i(z− νπ
|
1530 |
+
2 − π
|
1531 |
+
4 )
|
1532 |
+
− 2π < arg z < π
|
1533 |
+
The presence of the oscillatory functions will not let eq.4.72 to be satisfied.
|
1534 |
+
Hence we
|
1535 |
+
analytically continue the argument of Green’s function G. The choice of direction of the analytic
|
1536 |
+
continuation is based on the anticipation that the bulk field will have positive frequency. Hence
|
1537 |
+
we take
|
1538 |
+
η = −iz
|
1539 |
+
(4.73)
|
1540 |
+
which prompts us to make C = 0. Also, from the constraint AD − BC = 1 we get A = 1
|
1541 |
+
D.
|
1542 |
+
Hence the Green’s function now takes the form,
|
1543 |
+
G(pz) =
|
1544 |
+
DH(2)
|
1545 |
+
ν (ipz)
|
1546 |
+
1
|
1547 |
+
DH(1)
|
1548 |
+
ν (ipz) + BH(2)
|
1549 |
+
ν (ipz)
|
1550 |
+
Next another constraint will come from the fact that boundary Green’s function is γdS p−2ν.
|
1551 |
+
So in the limit of z → 0 using the formulae,
|
1552 |
+
H(1)
|
1553 |
+
ν (z) = iYν(z); H(2)
|
1554 |
+
ν (z) = −iYν(z); Yν(z) = −Γ(ν)
|
1555 |
+
π
|
1556 |
+
�2
|
1557 |
+
z
|
1558 |
+
�ν
|
1559 |
+
One can get,
|
1560 |
+
−iD
|
1561 |
+
i
|
1562 |
+
D − iB = γdS p−2ν
|
1563 |
+
On the other side, f should become a p independent constant at boundary x = 0 so that
|
1564 |
+
it does not modify the boundary Green’s function, also ydS and f should become same field in
|
1565 |
+
boundary field theory. This gives,
|
1566 |
+
i
|
1567 |
+
D − iB = pν
|
1568 |
+
Finally we get,
|
1569 |
+
D = iγdS p−ν ; B = i
|
1570 |
+
�
|
1571 |
+
1 − 1
|
1572 |
+
γdS
|
1573 |
+
�
|
1574 |
+
pν
|
1575 |
+
The bulk field ydS is given by,
|
1576 |
+
2We use the term Green function by analogy with the EAdS case, where G is the propagator of the boundary
|
1577 |
+
CFT. Also see for instance [39].
|
1578 |
+
18
|
1579 |
+
|
1580 |
+
ydS = bdS
|
1581 |
+
G
|
1582 |
+
f = bdS(iγp−ν) 1
|
1583 |
+
Ld/2xd/2H(2)
|
1584 |
+
ν (ipx)
|
1585 |
+
If we analytically continue back to η we get,
|
1586 |
+
ydS = bdS(iγp−ν) 1
|
1587 |
+
Ld/2(−iη)d/2H(2)
|
1588 |
+
ν (pη)
|
1589 |
+
If the field ydS satisfies ydS
|
1590 |
+
0
|
1591 |
+
at η = ϵdS then,
|
1592 |
+
ydS = ydS
|
1593 |
+
0
|
1594 |
+
ηd/2
|
1595 |
+
ϵd/2
|
1596 |
+
dS
|
1597 |
+
H(2)
|
1598 |
+
ν (pη)
|
1599 |
+
H(2)
|
1600 |
+
ν (pϵdS)
|
1601 |
+
(4.74)
|
1602 |
+
ydS satisfies Bunch-Davies condition.
|
1603 |
+
Relation between bulk fields in EAdS and dS
|
1604 |
+
The bulk field in EAdS space is given
|
1605 |
+
by,
|
1606 |
+
yEAdS = yEAdS
|
1607 |
+
0
|
1608 |
+
zd/2
|
1609 |
+
ϵd/2
|
1610 |
+
Kα(pz)
|
1611 |
+
Kα(pϵ)
|
1612 |
+
(4.75)
|
1613 |
+
Let’s apply the analytic continuation continuation iη = z and iL = R. First of all, α becomes
|
1614 |
+
ν. ϵ is replaced by iϵ. We get,
|
1615 |
+
yEAdS|z=iη, R=iL = yEAdS
|
1616 |
+
0
|
1617 |
+
|z=iη, R=iL
|
1618 |
+
(iη)d/2
|
1619 |
+
(iϵ)d/2
|
1620 |
+
Kν(ipη)
|
1621 |
+
Kν(ipϵ)
|
1622 |
+
(4.76)
|
1623 |
+
As,
|
1624 |
+
yEAdS
|
1625 |
+
0
|
1626 |
+
= bEAdS ϵd/2
|
1627 |
+
EAdS
|
1628 |
+
γEAdS Kα(pϵ)
|
1629 |
+
pα
|
1630 |
+
(4.77)
|
1631 |
+
Using the relation between Kα(x) and Hα(x),
|
1632 |
+
Kα(x) = π
|
1633 |
+
2 iα+1H(1)
|
1634 |
+
α (ix); − π < arg x ≤ π
|
1635 |
+
2
|
1636 |
+
= π
|
1637 |
+
2 (−i)α+1H(2)
|
1638 |
+
α (−ix); − π
|
1639 |
+
2 < arg x ≤ π
|
1640 |
+
(4.78)
|
1641 |
+
Here also we want to ensure the bulk field to be of positive frequency, hence choosing
|
1642 |
+
H(2)(x).
|
1643 |
+
yEAdS
|
1644 |
+
0
|
1645 |
+
|z=iη, R=iL = π
|
1646 |
+
2 (i)d/2+α+1bEAdSϵd/2γEAdS
|
1647 |
+
H(2)
|
1648 |
+
α (pϵ)
|
1649 |
+
pα
|
1650 |
+
= bEAdS
|
1651 |
+
bdS
|
1652 |
+
γEAdS
|
1653 |
+
γdS
|
1654 |
+
π
|
1655 |
+
2 (i)d/2+α+1ydS
|
1656 |
+
0
|
1657 |
+
Hence,
|
1658 |
+
yEAdS|z=iη, R=iL =bEAdS
|
1659 |
+
bdS
|
1660 |
+
γEAdS
|
1661 |
+
γdS
|
1662 |
+
π
|
1663 |
+
2 (i)d/2+α+1ydS
|
1664 |
+
0
|
1665 |
+
ηd/2
|
1666 |
+
ϵd/2
|
1667 |
+
H(2)
|
1668 |
+
α (pη)
|
1669 |
+
H(2)
|
1670 |
+
α (pϵ)
|
1671 |
+
= bEAdS
|
1672 |
+
bdS
|
1673 |
+
γEAdS
|
1674 |
+
γdS
|
1675 |
+
π
|
1676 |
+
2 (i)d/2+α+1ydS
|
1677 |
+
(4.79)
|
1678 |
+
Upto various normalization constants we see that they agree.
|
1679 |
+
19
|
1680 |
+
|
1681 |
+
5
|
1682 |
+
Summary and Conclusions
|
1683 |
+
In [5, 6] an evolution operator for an ERG equation of a perturbed D-dimensional free field
|
1684 |
+
theory in flat space was mapped to a field theory action in AdSD+1. Similar mappings were done
|
1685 |
+
subsequently for the interacting O(N) model at both the free fixed point and at the Wilson-
|
1686 |
+
Fisher fixed point [7]. The main aim of this paper was to understand better the mapping used
|
1687 |
+
in these papers and to see if there are other examples. A related question was that of analytic
|
1688 |
+
continuation of these theories. These questions can posed, both for the ERG equation and its
|
1689 |
+
evolution operator.
|
1690 |
+
It was shown that a mapping of this type can map the ERG evolution operator of a (zero-
|
1691 |
+
dimensional) field theory to the action of a Euclidean harmonic oscillator. Furthermore the
|
1692 |
+
analytic continuation of the ERG evolution operator action gives the path integral for a free
|
1693 |
+
particle with a time dependent mass. A similar mapping takes this to a harmonic oscillator.
|
1694 |
+
This method also gives new way of obtaining the Ermakov-Lewis invariants for the original
|
1695 |
+
theory.
|
1696 |
+
The analytically continued ERG equation is a Schroedinger like equation for a free field
|
1697 |
+
theory wave functional. This gets mapped to the Schroedinger equation for a wave functional
|
1698 |
+
of a free field theory in de Sitter space. These are summarized in Figures 1,2. This is one
|
1699 |
+
version of the dS-CFT correspondence. From this point of view, the QM evolution of dS field
|
1700 |
+
theory is also an ERG evolution of a field theory, but accompanied by an analytic continuation.
|
1701 |
+
An example was worked out to illustrate this correspondence.
|
1702 |
+
To understand these issues further it would be useful to apply these techniques to the O(N)
|
1703 |
+
model ERG equation written in [7]. This ERG equation has extra terms and thus the theory
|
1704 |
+
naturally has interaction terms in the EAdS bulk action.
|
1705 |
+
Similarly it would be interesting to study the connection between bulk Green functions
|
1706 |
+
and the QM correlation functions on the space-like time slice of these theories, as considered
|
1707 |
+
originally in [30, 31, 32].
|
1708 |
+
Acknowledgements
|
1709 |
+
SD would like to thank IMSc,Chennai where part of the work was done.
|
1710 |
+
20
|
1711 |
+
|
1712 |
+
References
|
1713 |
+
[1] J. M. Maldacena, “The Large N limit of superconformal field theories and supergrav-
|
1714 |
+
ity,” Int. J. Theor. Phys. 38, 1113 (1999) [Adv. Theor. Math. Phys. 2, 231 (1998)]
|
1715 |
+
doi:10.1023/A:1026654312961 arXiv:hep-th/9711200.
|
1716 |
+
[2] S. S. Gubser, I. R. Klebanov, and A. M. Polyakov, “Gauge theory correlators from non-
|
1717 |
+
critical string theory,” Phys. Lett. B428 (1998) 105-114, arXiv:hep-th/9802109.
|
1718 |
+
[3] E. Witten, “Anti-de Sitter space and holography,” Adv. Theor. Math. Phys. 2 (1998)
|
1719 |
+
253-291, arXiv:hep-th/9802150.
|
1720 |
+
[4] E. Witten, “Anti-de Sitter space, thermal phase transition, and confinement in gauge
|
1721 |
+
theories,” Adv. Theor. Math. Phys. 2, 505 (1998) arXiv:hep-th/9803131.
|
1722 |
+
[5] B. Sathiapalan and H. Sonoda, “A Holographic form for Wilson’s RG,” Nucl. Phys. B
|
1723 |
+
924, 603 (2017) doi:10.1016/j.nuclphysb.2017.09.018 [arXiv:1706.03371 [hep-th]].
|
1724 |
+
[6] B. Sathiapalan and H. Sonoda, “Holographic Wilson’s RG,” Nucl. Phys. B 948, 114767
|
1725 |
+
(2019) doi:10.1016/j.nuclphysb.2019.114767 [arXiv:1902.02486 [hep-th]].
|
1726 |
+
[7] B. Sathiapalan, “Holographic RG and Exact RG in O(N) Model,” Nucl. Phys. B 959,
|
1727 |
+
115142 (2020) doi:10.1016/j.nuclphysb.2020.115142 [arXiv:2005.10412 [hep-th]].
|
1728 |
+
[8] L.
|
1729 |
+
Susskind,
|
1730 |
+
“The
|
1731 |
+
World
|
1732 |
+
as
|
1733 |
+
a
|
1734 |
+
hologram,”
|
1735 |
+
J.
|
1736 |
+
Math.
|
1737 |
+
Phys.
|
1738 |
+
36,
|
1739 |
+
6377
|
1740 |
+
(1995)
|
1741 |
+
doi:10.1063/1.531249 [hep-th/9409089].
|
1742 |
+
[9] E. T. Akhmedov, “A Remark on the AdS / CFT correspondence and the renormalization
|
1743 |
+
group flow,” Phys. Lett. B442 (1998) 152-158, arXiv:hep-th/9806217 [hep-th].
|
1744 |
+
[10] E. T. Akhmedov, “Notes on multitrace operators and holographic renormalization group”.
|
1745 |
+
Talk given at 30 Years of Supersymmetry, Minneapolis, Minnesota, 13-27 Oct 2000, and
|
1746 |
+
at Workshop on Integrable Models, Strings and Quantum Gravity, Chennai, India, 15-19
|
1747 |
+
Jan 2002. arXiv:
|
1748 |
+
hep-th/0202055
|
1749 |
+
[11] E. T. Akhmedov, I.B. Gahramanov, E.T. Musaev,“ Hints on integrability in the Wilso-
|
1750 |
+
nian/holographic renormalization group”
|
1751 |
+
arXiv:1006.1970 [hep-th]
|
1752 |
+
[12] E. Alvarez and C. Gomez, “Geometric holography, the renormalization group and the c
|
1753 |
+
theorem,” Nucl.Phys. B541 (1999) 441-460, arXiv:hep-th/9807226 [hep-th].
|
1754 |
+
[13] V. Balasubramanian and P. Kraus, “Space-time and the holographic renormalization
|
1755 |
+
group,” Phys. Rev. Lett. 83 (1999) 3605-3608, arXiv:hep-th/9903190 [hep-th].
|
1756 |
+
[14] D. Freedman, S. Gubser, K. Pilch, and N. Warner, “Renormalization group flows from
|
1757 |
+
holography supersymmetry and a c theorem,” Adv. Theor. Math. Phys. 3 (1999) 363-417,
|
1758 |
+
arXiv:hep-th/9904017 [hep-th].
|
1759 |
+
[15] J. de Boer, E. P. Verlinde, and H. L. Verlinde, “On the holographic renormalization group,”
|
1760 |
+
JHEP 08 (2000) 003, arXiv:hep-th/9912012.
|
1761 |
+
[16] J. de Boer, “The Holographic renormalization group,” Fortsch. Phys. 49 (2001) 339-358,
|
1762 |
+
arXiv:hep-th/0101026 [hep-th].
|
1763 |
+
21
|
1764 |
+
|
1765 |
+
[17] T.
|
1766 |
+
Faulkner,
|
1767 |
+
H.
|
1768 |
+
Liu,
|
1769 |
+
and
|
1770 |
+
M.
|
1771 |
+
Rangamani,
|
1772 |
+
“Integrating
|
1773 |
+
out
|
1774 |
+
geometry:
|
1775 |
+
Holo-
|
1776 |
+
graphic Wilsonian RG and the membrane paradigm,”
|
1777 |
+
JHEP 1108,
|
1778 |
+
051 (2011)
|
1779 |
+
doi:10.1007/JHEP08(2011)051 arXiv:1010.4036 [hep-th].
|
1780 |
+
[18] I. R. Klebanov and E. Witten, “AdS / CFT correspondence and symmetry breaking,”
|
1781 |
+
Nucl. Phys. B556, 89 (1999) doi:10.1016/S0550-3213(99)00387-9 arXiv:hep-th/9905104.
|
1782 |
+
[19] I. Heemskerk and J. Polchinski, “Holographic and Wilsonian Renormalization Groups,”
|
1783 |
+
JHEP 1106, 031 (2011) doi:10.1007/JHEP06(2011)031 arXiv:1010.1264 [hep-th].
|
1784 |
+
[20] J. M. Lizana, T. R. Morris, and M. Perez-Victoria, “Holographic renormalisation group
|
1785 |
+
flows and renormalisation from a Wilsonian perspective,” JHEP 1603, 198 (2016)
|
1786 |
+
doi:10.1007/JHEP03(2016)198 arXiv:1511.04432 [hep-th].
|
1787 |
+
[21] A.
|
1788 |
+
Bzowski,
|
1789 |
+
P.
|
1790 |
+
McFadden,
|
1791 |
+
and
|
1792 |
+
K.
|
1793 |
+
Skenderis,
|
1794 |
+
“Scalar
|
1795 |
+
3-point
|
1796 |
+
functions
|
1797 |
+
in
|
1798 |
+
CFT: renormalisation,
|
1799 |
+
beta functions and anomalies,”
|
1800 |
+
JHEP 1603,
|
1801 |
+
066 (2016)
|
1802 |
+
doi:10.1007/JHEP03(2016)066 arXiv:1510.08442 [hep-th].
|
1803 |
+
[22] S. de Haro, S. N. Solodukhin, and K. Skenderis, “Holographic reconstruction of space-time
|
1804 |
+
and renormalization in the AdS / CFT correspondence,” Comm. Math. Phys. 217, 595
|
1805 |
+
(2001) doi:10.1007/s002200100381 arXiv:hep-th/0002230.
|
1806 |
+
[23] S.-S. Lee, “Holographic description of quantum field theory”, Nuclear Physics B 832 (Jun,
|
1807 |
+
2010) 567585, arXiv:0912.5223.
|
1808 |
+
[24] “ S.-S. Lee, Background independent holographic description: from matrix field the-
|
1809 |
+
ory to quantum gravity”, Journal of High Energy Physics 2012 (Oct, 2012) 160,
|
1810 |
+
arXiv:1204.1780.
|
1811 |
+
[25] J. F. Meloa and J. E. Santosa,“Developing local RG: quantum RG and BFSS”,
|
1812 |
+
arxiv:1910.09559.
|
1813 |
+
[26] T. Padmanabhan, “Demystifying the constancy of the Ermakov–Lewis invariant for
|
1814 |
+
a time-dependent oscillator,”
|
1815 |
+
Mod. Phys. Lett. A 33,
|
1816 |
+
no.07n08,
|
1817 |
+
1830005 (2018)
|
1818 |
+
doi:10.1142/S0217732318300057 [arXiv:1712.07328 [physics.class-ph]].
|
1819 |
+
[27] Ramos-Prieto, I., Espinosa-Zu˜niga, A., Fern´andez-Guasti, M., and Moya-Cessa, H. M.
|
1820 |
+
(2018). Quantum harmonic oscillator with time-dependent mass. Modern Physics Letters
|
1821 |
+
B, 32(20), 1850235. doi:10.1142/s0217984918502354
|
1822 |
+
[28] A. Anderson, “Canonical Transformations in Quantum Mechanics,” Annals Phys. 232,
|
1823 |
+
292-331 (1994) doi:10.1006/aphy.1994.1055 [arXiv:hep-th/9305054 [hep-th]].
|
1824 |
+
[29] “Stochastic Quantization”, P.H.Damgaard and H. Huffel Phys. Rep. 152, Nos. 5 and 6
|
1825 |
+
(1987) 227—398
|
1826 |
+
[30] E. Witten, “Quantum gravity in de Sitter space,” [arXiv:hep-th/0106109 [hep-th]].
|
1827 |
+
[31] A. Strominger, “The dS / CFT correspondence,” JHEP 10, 034 (2001) doi:10.1088/1126-
|
1828 |
+
6708/2001/10/034 [arXiv:hep-th/0106113 [hep-th]].
|
1829 |
+
[32] J. M. Maldacena, “Non-Gaussian features of primordial fluctuations in single field infla-
|
1830 |
+
tionary models,” JHEP 05, 013 (2003) doi:10.1088/1126-6708/2003/05/013 [arXiv:astro-
|
1831 |
+
ph/0210603 [astro-ph]].
|
1832 |
+
22
|
1833 |
+
|
1834 |
+
[33] R. Bousso, A. Maloney and A. Strominger, “Conformal vacua and entropy in de Sitter
|
1835 |
+
space,” Phys. Rev. D 65, 104039 (2002) doi:10.1103/PhysRevD.65.104039 [arXiv:hep-
|
1836 |
+
th/0112218 [hep-th]].
|
1837 |
+
[34] M. Spradlin and A. Volovich, “Vacuum states and the S matrix in dS / CFT,” Phys. Rev.
|
1838 |
+
D 65, 104037 (2002) doi:10.1103/PhysRevD.65.104037 [arXiv:hep-th/0112223 [hep-th]].
|
1839 |
+
[35] D. Anninos, T. Hartman and A. Strominger, “Higher Spin Realization of the dS/CFT
|
1840 |
+
Correspondence,”
|
1841 |
+
Class. Quant. Grav. 34,
|
1842 |
+
no.1,
|
1843 |
+
015009 (2017) doi:10.1088/1361-
|
1844 |
+
6382/34/1/015009 [arXiv:1108.5735 [hep-th]].
|
1845 |
+
[36] D. Anninos, T. Anous, D. Z. Freedman and G. Konstantinidis, “Late-time Structure
|
1846 |
+
of the Bunch-Davies De Sitter Wavefunction,” JCAP 11, 048 (2015) doi:10.1088/1475-
|
1847 |
+
7516/2015/11/048 [arXiv:1406.5490 [hep-th]].
|
1848 |
+
[37] D. Anninos, S. A. Hartnoll and D. M. Hofman, “Static Patch Solipsism: Conformal Sym-
|
1849 |
+
metry of the de Sitter Worldline,” Class. Quant. Grav. 29, 075002 (2012) doi:10.1088/0264-
|
1850 |
+
9381/29/7/075002 [arXiv:1109.4942 [hep-th]].
|
1851 |
+
[38] D. Harlow and D. Stanford, “Operator Dictionaries and Wave Functions in AdS/CFT and
|
1852 |
+
dS/CFT,” [arXiv:1104.2621 [hep-th]].
|
1853 |
+
[39] D. Das, S. R. Das and G. Mandal, “Double Trace Flows and Holographic RG in dS/CFT
|
1854 |
+
correspondence,” JHEP 11, 186 (2013) doi:10.1007/JHEP11(2013)186 [arXiv:1306.0336
|
1855 |
+
[hep-th]].
|
1856 |
+
[40] V. Balasubramanian, J. de Boer and D. Minic, “Notes on de Sitter space and holography,”
|
1857 |
+
Class. Quant. Grav. 19, 5655-5700 (2002) doi:10.1016/S0003-4916(02)00020-9 [arXiv:hep-
|
1858 |
+
th/0207245 [hep-th]].
|
1859 |
+
[41] A. Strominger, “Inflation and the dS / CFT correspondence,” JHEP 11, 049 (2001)
|
1860 |
+
doi:10.1088/1126-6708/2001/11/049 [arXiv:hep-th/0110087 [hep-th]].
|
1861 |
+
[42] F. Larsen, J. P. van der Schaar and R. G. Leigh, “De Sitter holography and the cos-
|
1862 |
+
mic microwave background,” JHEP 04, 047 (2002) doi:10.1088/1126-6708/2002/04/047
|
1863 |
+
[arXiv:hep-th/0202127 [hep-th]].
|
1864 |
+
[43] J. P. van der Schaar, “Inflationary perturbations from deformed CFT,” JHEP 01, 070
|
1865 |
+
(2004) doi:10.1088/1126-6708/2004/01/070 [arXiv:hep-th/0307271 [hep-th]].
|
1866 |
+
[44] H. Nastase and K. Skenderis, “Holography for the very early Universe and the clas-
|
1867 |
+
sic puzzles of Hot Big Bang cosmology,” Phys. Rev. D 101, no.2, 021901 (2020)
|
1868 |
+
doi:10.1103/PhysRevD.101.021901 [arXiv:1904.05821 [hep-th]].
|
1869 |
+
[45] J. B. Hartle and S. W. Hawking, “Wave Function of the Universe,” Phys. Rev. D 28,
|
1870 |
+
2960-2975 (1983) doi:10.1103/PhysRevD.28.2960
|
1871 |
+
[46] J. B. Hartle and S. W. Hawking, “Path Integral Derivation of Black Hole Radiance,” Phys.
|
1872 |
+
Rev. D 13, 2188-2203 (1976) doi:10.1103/PhysRevD.13.2188
|
1873 |
+
[47] G. W. Gibbons and S. W. Hawking, “Action Integrals and Partition Functions in Quantum
|
1874 |
+
Gravity,” Phys. Rev. D 15, 2752-2756 (1977) doi:10.1103/PhysRevD.15.2752
|
1875 |
+
[48] E. Mottola, “Particle Creation in de Sitter Space,” Phys. Rev. D 31, 754 (1985)
|
1876 |
+
doi:10.1103/PhysRevD.31.754
|
1877 |
+
23
|
1878 |
+
|
1879 |
+
[49] B. Allen,
|
1880 |
+
“Vacuum States in de Sitter Space,”
|
1881 |
+
Phys. Rev. D 32,
|
1882 |
+
3136 (1985)
|
1883 |
+
doi:10.1103/PhysRevD.32.3136
|
1884 |
+
[50] U. H. Danielsson, “Inflation, holography, and the choice of vacuum in de Sitter space,”
|
1885 |
+
JHEP 07, 040 (2002) doi:10.1088/1126-6708/2002/07/040 [arXiv:hep-th/0205227 [hep-
|
1886 |
+
th]].
|
1887 |
+
24
|
1888 |
+
|
2tFRT4oBgHgl3EQfnjcF/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
39E0T4oBgHgl3EQfvAGt/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:75bb257484981961e4bf343413c276bda44d5e330c9a4225f759fc91176ac741
|
3 |
+
size 6357037
|
39E0T4oBgHgl3EQfvAGt/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:4d27220b86478651fa912481887fa1a45ee83aa0ab358d87076f9778372e8034
|
3 |
+
size 221683
|
49E2T4oBgHgl3EQfOgYr/content/tmp_files/2301.03748v1.pdf.txt
ADDED
@@ -0,0 +1,1371 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Nonlinear Dynamics
|
2 |
+
|
3 |
+
Harmonic-Gaussian double-well potential stochastic resonance with its application to
|
4 |
+
enhance weak fault characteristics of machinery
|
5 |
+
--Manuscript Draft--
|
6 |
+
|
7 |
+
Manuscript Number:
|
8 |
+
NODY-D-22-01167R2
|
9 |
+
Full Title:
|
10 |
+
Harmonic-Gaussian double-well potential stochastic resonance with its application to
|
11 |
+
enhance weak fault characteristics of machinery
|
12 |
+
Article Type:
|
13 |
+
Original Research
|
14 |
+
Keywords:
|
15 |
+
The benefits of noise, weak signature enhancement, fault identification, fault diagnosis
|
16 |
+
Corresponding Author:
|
17 |
+
Zijian Qiao, Ph.D.
|
18 |
+
Ningbo University
|
19 |
+
Ningbo, CHINA
|
20 |
+
Corresponding Author Secondary
|
21 |
+
Information:
|
22 |
+
Corresponding Author's Institution:
|
23 |
+
Ningbo University
|
24 |
+
Corresponding Author's Secondary
|
25 |
+
Institution:
|
26 |
+
First Author:
|
27 |
+
Zijian Qiao, Ph.D.
|
28 |
+
First Author Secondary Information:
|
29 |
+
Order of Authors:
|
30 |
+
Zijian Qiao, Ph.D.
|
31 |
+
Shuai Chen
|
32 |
+
Zhihui Lai
|
33 |
+
Shengtong Zhou
|
34 |
+
Miguel A. F. Sanjuán
|
35 |
+
Order of Authors Secondary Information:
|
36 |
+
Funding Information:
|
37 |
+
Foundation of the State Key Laboratory of
|
38 |
+
Performance Monitoring and Protecting of
|
39 |
+
Rail Transit Infrastructure of East China
|
40 |
+
Jiaotong University
|
41 |
+
(HJGZ2021114)
|
42 |
+
Dr. Zijian Qiao
|
43 |
+
Zhejiang Provincial Natural Science
|
44 |
+
Foundation of China
|
45 |
+
(LQ22E050003)
|
46 |
+
Dr. Zijian Qiao
|
47 |
+
National Natural Science Foundation of
|
48 |
+
China
|
49 |
+
(62001210, 51905349)
|
50 |
+
Dr. Zhihui Lai
|
51 |
+
The Spanish State Research Agency
|
52 |
+
(AEI) and the European Regional
|
53 |
+
Development Fund (ERDF)
|
54 |
+
(PID2019-105554GB-I00)
|
55 |
+
Dr. Miguel A. F. Sanjuán
|
56 |
+
Abstract:
|
57 |
+
Noise would give rise to incorrect filtering frequency-band selection in signal filtering-
|
58 |
+
based methods including fast kurtogram, teager energy operators and wavelet packet
|
59 |
+
transform filters and meanwhile would result in incorrect selection of useful
|
60 |
+
components and even mode mixing, end effects and etc. in signal decomposition-
|
61 |
+
based methods including empirical mode decomposition, singular value decomposition
|
62 |
+
and local mean decomposition. On the contrary, noise in stochastic resonance (SR) is
|
63 |
+
beneficial to enhance weak signals of interest embedded in signals with strong
|
64 |
+
background noise. Taking into account that nonlinear systems are crucial ingredients
|
65 |
+
to activate the SR, here we investigate the SR in the cases of overdamped and
|
66 |
+
underdamped harmonic-Gaussian double-well potential systems subjected to noise
|
67 |
+
and a periodic signal. We derive and measure the analytic expression of the output
|
68 |
+
signal-to-noise ratio (SNR) and the steady-state probability density (SPD) function
|
69 |
+
Powered by Editorial Manager® and ProduXion Manager® from Aries Systems Corporation
|
70 |
+
|
71 |
+
under approximate adiabatic conditions. When the harmonic-Gaussian double-well
|
72 |
+
potential loses its stability, we can observe the antiresonance phenomenon, whereas
|
73 |
+
adding the damped factor into the overdamped system can change the stability of the
|
74 |
+
harmonic-Gaussian double-well potential, resulting that the antiresonance behavior
|
75 |
+
disappears in the underdamped system. Then, we use the overdamped and
|
76 |
+
underdamped harmonic-Gaussian double-well potential SR to enhance weak useful
|
77 |
+
characteristics for diagnosing incipient rotating machinery failures. Theoretical and
|
78 |
+
experimental results show that adjusting both noise intensity and system parameters
|
79 |
+
can activate overdamped and underdamped harmonic-Gaussian double-well potential
|
80 |
+
SR in which there is a bell-shaped peak for the SNR. Additionally, the underdamped
|
81 |
+
harmonic-Gaussian double-well potential SR is independent of frequency-shifted and
|
82 |
+
rescaling transform to process large machine parameter signals and outperforms the
|
83 |
+
overdamped one. Finally, comparing the advanced robust local mean decomposition
|
84 |
+
(RLMD) method based on signal decomposition and the wavelet transform method
|
85 |
+
based on noise cancellation or infogram method based on signal filtering, the
|
86 |
+
overdamped or underdamped harmonic-Gaussian double-well potential SR methods
|
87 |
+
characterize a better performance to detect a weak signal. Fault characteristics in the
|
88 |
+
early stage of failures are successful in improving the incipient fault characteristic
|
89 |
+
identification of rolling element bearings.
|
90 |
+
Response to Reviewers:
|
91 |
+
Please see the attached "response to reviewers".
|
92 |
+
Order of Authors (with Contributor Roles): Zijian Qiao, Ph.D. (Funding acquisition: Supporting; Validation: Lead; Writing – original
|
93 |
+
draft: Lead)
|
94 |
+
Shuai Chen (Data curation: Equal; Visualization: Lead)
|
95 |
+
Zhihui Lai (Investigation: Equal; Visualization: Equal; Writing – review & editing:
|
96 |
+
Supporting)
|
97 |
+
Shengtong Zhou (Data curation: Lead; Formal analysis: Equal; Investigation: Equal;
|
98 |
+
Writing – review & editing: Equal)
|
99 |
+
Miguel A. F. Sanjuán (Formal analysis: Equal; Funding acquisition: Equal;
|
100 |
+
Methodology: Equal; Writing – review & editing: Lead)
|
101 |
+
Powered by Editorial Manager® and ProduXion Manager® from Aries Systems Corporation
|
102 |
+
|
103 |
+
1 / 27
|
104 |
+
|
105 |
+
Harmonic-Gaussian double-well potential stochastic resonance with
|
106 |
+
its application to enhance weak fault characteristics of machinery
|
107 |
+
|
108 |
+
Zijian Qiao1,2,3,4, , Shuai Chen1, Zhihui Lai5, Shengtong Zhou2, Miguel A. F. Sanjuán6
|
109 |
+
1 School of Mechanical Engineering and Mechanics, Ningbo University, Ningbo 315211, China
|
110 |
+
2. State Key Laboratory of Performance Monitoring and Protecting of Rail Transit Infrastructure, East China
|
111 |
+
Jiaotong University, Nanchang 330013, China
|
112 |
+
3. Laboratory of Yangjiang Offshore Wind Power, Yangjiang 529599, Guangdong, China
|
113 |
+
4. Zhejiang Provincial Key Laboratory of Part Rolling Technology, Ningbo 315211, China
|
114 |
+
5. Guangdong Provincial Key Laboratory of Micro/Nano Optomechatronics Engineering, College of Mechatronics
|
115 |
+
and Control Engineering, Shenzhen University, Shenzhen 518060, China
|
116 |
+
6. Nonlinear Dynamics, Chaos and Complex Systems Group, Departamento de Física, Universidad Rey Juan
|
117 |
+
Carlos, Tulipán s/n, Móstoles, 28933, Madrid, Spain
|
118 |
+
|
119 |
+
Abstract:
|
120 |
+
Noise would give rise to incorrect filtering frequency-band selection in signal
|
121 |
+
filtering-based methods including fast kurtogram, teager energy operators and wavelet
|
122 |
+
packet transform filters and meanwhile would result in incorrect selection of useful
|
123 |
+
components
|
124 |
+
and
|
125 |
+
even
|
126 |
+
mode
|
127 |
+
mixing,
|
128 |
+
end
|
129 |
+
effects
|
130 |
+
and
|
131 |
+
etc.
|
132 |
+
in
|
133 |
+
signal
|
134 |
+
decomposition-based methods including empirical mode decomposition, singular
|
135 |
+
value decomposition and local mean decomposition. On the contrary, noise in
|
136 |
+
stochastic resonance (SR) is beneficial to enhance weak signals of interest embedded
|
137 |
+
in signals with strong background noise. Taking into account that nonlinear systems
|
138 |
+
are crucial ingredients to activate the SR, here we investigate the SR in the cases of
|
139 |
+
overdamped and underdamped harmonic-Gaussian double-well potential systems
|
140 |
+
subjected to noise and a periodic signal. We derive and measure the analytic
|
141 |
+
expression of the output signal-to-noise ratio (SNR) and the steady-state probability
|
142 |
+
|
143 |
+
Corresponding author.
|
144 |
+
E-mail address: [email protected], [email protected] (Z. Qiao).
|
145 |
+
Manuscript
|
146 |
+
Click here to access/download;Manuscript;Manuscript.docx
|
147 |
+
Click here to view linked References
|
148 |
+
|
149 |
+
2 / 27
|
150 |
+
|
151 |
+
density (SPD) function under approximate adiabatic conditions. When the
|
152 |
+
harmonic-Gaussian double-well potential loses its stability, we can observe the
|
153 |
+
antiresonance phenomenon, whereas adding the damped factor into the overdamped
|
154 |
+
system can change the stability of the harmonic-Gaussian double-well potential,
|
155 |
+
resulting that the antiresonance behavior disappears in the underdamped system. Then,
|
156 |
+
we use the overdamped and underdamped harmonic-Gaussian double-well potential
|
157 |
+
SR to enhance weak useful characteristics for diagnosing incipient rotating machinery
|
158 |
+
failures. Theoretical and experimental results show that adjusting both noise intensity
|
159 |
+
and
|
160 |
+
system
|
161 |
+
parameters
|
162 |
+
can
|
163 |
+
activate
|
164 |
+
overdamped
|
165 |
+
and
|
166 |
+
underdamped
|
167 |
+
harmonic-Gaussian double-well potential SR in which there is a bell-shaped peak for
|
168 |
+
the SNR. Additionally, the underdamped harmonic-Gaussian double-well potential SR
|
169 |
+
is independent of frequency-shifted and rescaling transform to process large machine
|
170 |
+
parameter signals and outperforms the overdamped one. Finally, comparing the
|
171 |
+
advanced robust local mean decomposition (RLMD) method based on signal
|
172 |
+
decomposition and the wavelet transform method based on noise cancellation or
|
173 |
+
infogram method based on signal filtering, the overdamped or underdamped
|
174 |
+
harmonic-Gaussian double-well potential SR methods characterize a better
|
175 |
+
performance to detect a weak signal. Fault characteristics in the early stage of failures
|
176 |
+
are successful in improving the incipient fault characteristic identification of rolling
|
177 |
+
element bearings.
|
178 |
+
|
179 |
+
Key words: The benefits of noise, weak signature enhancement, fault identification,
|
180 |
+
fault diagnosis
|
181 |
+
|
182 |
+
1. Introduction
|
183 |
+
Noise is ubiquitous but unwanted in detecting weak signals [1], but noise in
|
184 |
+
biological systems can be used to amplify weak signals embedded by a strong
|
185 |
+
background noise. Such an ingenious phenomenon is observed in a bistable nonlinear
|
186 |
+
system, namely stochastic resonance (SR) [2]. SR is a kind of synchronization
|
187 |
+
mechanism among the nonlinear systems, noise and a weak periodic signal, which
|
188 |
+
|
189 |
+
3 / 27
|
190 |
+
|
191 |
+
takes place to activate the SR for amplifying weak useful signals [3].
|
192 |
+
SR has been investigated from theory to engineering application widely [4-6].
|
193 |
+
Among three ingredients for activating SR including noise, nonlinear systems and
|
194 |
+
weak useful signals, nonlinear systems are crucial ingredients for extracting weak
|
195 |
+
useful signals and moreover can harvest the energy of noise located at the whole
|
196 |
+
frequency band of a noisy signal to enhance or amplify a weak useful signal. For this
|
197 |
+
purpose, most of scholars pay attention to exploring the behaviors of SR in novel
|
198 |
+
nonlinear systems from bistable [7] to multistable ones [8-10], from overdamped [11]
|
199 |
+
and underdamped [12] to fractional-order [13] ones, and even from cascaded [14] and
|
200 |
+
coupled [15, 16] to time-delayed feedback [17] ones and biological systems [18, 19].
|
201 |
+
Because the bistable system is most classical among them, it has been investigated,
|
202 |
+
such as classical bistable potential overdamped systems, noisy confined bistable
|
203 |
+
potential overdamped systems [20], asymmetric bistable potential overdamped
|
204 |
+
systems [21], classical bistable potential underdamped systems, noisy bistable
|
205 |
+
potential fractional-order systems [22] and E-exponential potential underdamped
|
206 |
+
systems [23, 24]. The E-exponential potential named by the references [23, 24] is a
|
207 |
+
narrow version of the harmonic-Gaussian double-well potential. The references above
|
208 |
+
show that overdamped and underdamped harmonic-Gaussian double-well potential
|
209 |
+
SR has not been studied systematically in theory and further applied to enhance
|
210 |
+
incipient fault identification of machinery for providing a tutorial of other readers and
|
211 |
+
researchers on the SR in the overdamped and underdamped systems with novel
|
212 |
+
generalized double-well potentials yet. Even, the comparison between overdamped
|
213 |
+
and underdamped harmonic-Gaussian double-well potential SR has not been made in
|
214 |
+
theory and engineering applications. Therefore, this paper attempts to investigate the
|
215 |
+
SR in the overdamped and underdamped harmonic-Gaussian double-well potential
|
216 |
+
systems theoretically and then apply it to enhance weak fault characteristics and
|
217 |
+
diagnose incipient faults of machinery. Additionally, some comparisons with other
|
218 |
+
advanced signal processing techniques including signal decomposition-based and
|
219 |
+
noise cancellation or signal filtering-based methods for enhancing weak fault
|
220 |
+
characteristics of machinery are given.
|
221 |
+
|
222 |
+
4 / 27
|
223 |
+
|
224 |
+
The remainder of this paper is organized as follows. Section 2 and Section 3
|
225 |
+
investigate the overdamped and underdamped harmonic-Gaussian double-well
|
226 |
+
potential SR by deriving the analytic expressions of signal-to-noise ratio (SNR) and
|
227 |
+
steady-state probability density (SPD) functions, respectively. In Section 4, we apply
|
228 |
+
the overdamped and underdamped harmonic-Gaussian double-well potential SR to
|
229 |
+
enhance weak fault characteristics and incipient fault identification of rolling element
|
230 |
+
bearings. Finally, conclusions are drawn in Section 5.
|
231 |
+
|
232 |
+
2. Overdamped harmonic-Gaussian double-well potential SR
|
233 |
+
The overdamped Langevin equation driven by a harmonic-Gaussian double-well
|
234 |
+
potential under the action of random noise and a periodic signal can be described as
|
235 |
+
[25]
|
236 |
+
d𝑦
|
237 |
+
d𝑥 = −
|
238 |
+
𝜕𝑈(𝑥)
|
239 |
+
𝜕𝑥
|
240 |
+
+ 𝐴 cos(𝜔0𝑡) + 𝜀(𝑡) (1)
|
241 |
+
where 𝐴 and ω0 are the amplitude and angular frequency of the periodic signal
|
242 |
+
respectively, and 𝜀(𝑡) is the Gaussian white noise with mean zero and variance 𝐷
|
243 |
+
i.e. noise intensity.
|
244 |
+
The harmonic-Gaussian double-well potential which is a variant of a double-well
|
245 |
+
potential can be expressed as [26]
|
246 |
+
𝑈(𝑥) =
|
247 |
+
𝑘
|
248 |
+
2 𝑥2 + 𝛼exp(−𝛽𝑥2) (2)
|
249 |
+
where two stable states and one unstable state are located at 𝑥± = ±√ln(2𝛼𝛽 𝑘
|
250 |
+
⁄ ) 𝛽
|
251 |
+
⁄
|
252 |
+
and
|
253 |
+
𝑥𝑢 = 0
|
254 |
+
respectively,
|
255 |
+
and
|
256 |
+
the
|
257 |
+
barrier
|
258 |
+
height
|
259 |
+
is
|
260 |
+
∆𝑈 = α −
|
261 |
+
𝑘[1 + ln(2𝛼𝛽 𝑘
|
262 |
+
⁄ )] (2𝛽)
|
263 |
+
⁄
|
264 |
+
. To ensure the stability of the harmonic-Gaussian
|
265 |
+
double-well potential, this condition ln(2𝛼𝛽 𝑘
|
266 |
+
⁄ ) > 0 must be satisfied, further 𝑘 <
|
267 |
+
2αβ. When 𝑘 = 1 , Fig. 1(a) shows the harmonic-Gaussian double-well potential
|
268 |
+
under different system parameter sets (𝛼, 𝛽), while Fig. 1(b) depicts those with
|
269 |
+
varying 𝑘. It is seen from Fig. 1(a) that adjusting the system parameter 𝛽 controls
|
270 |
+
the potential-well width whereas the potential-barrier height nearly keeps unchanged,
|
271 |
+
but varying 𝛼 changes the potential-barrier height whereas the potential-well width
|
272 |
+
nearly remains unchanged. Such a behavior is helpful to tune the potential-well width
|
273 |
+
|
274 |
+
5 / 27
|
275 |
+
|
276 |
+
and depth individually to activate the optimal harmonic-Gaussian double-well
|
277 |
+
potential SR. Meanwhile, it is found from Fig. 1(b) that adjusting 𝑘 can also change
|
278 |
+
the slope of the harmonic-Gaussian double-well potential.
|
279 |
+
|
280 |
+
Fig. 1 Harmonic-Gaussian double-well potentials under different parameter sets (a)
|
281 |
+
(𝛼, 𝛽) and (b) (𝛼, 𝛽, 𝑘).
|
282 |
+
The Langevin equation in Eq. (1) can be transformed as further [27]
|
283 |
+
∂ρ(𝑥,𝑡)
|
284 |
+
∂𝑡
|
285 |
+
= −
|
286 |
+
𝜕
|
287 |
+
𝜕𝑥 [−𝑘𝑥 + 2𝛼𝛽𝑥exp(−𝛽𝑥2) + 𝐴 cos(𝜔0𝑡)]𝜌(𝑥, 𝑡) + 𝐷
|
288 |
+
𝜕2
|
289 |
+
𝜕𝑥2 𝜌(𝑥, 𝑡) (3)
|
290 |
+
where 𝜌(𝑥, 𝑡) is the probability density function (PDF) of the stochastic process
|
291 |
+
𝑥(𝑡) which denotes the transition trajectory of Brownian particles in the
|
292 |
+
harmonic-Gaussian double-well potential as time varies. The corresponding SPD
|
293 |
+
function can be denoted as
|
294 |
+
𝜌𝑠(𝑥, 𝑡) =
|
295 |
+
𝑁(𝑡)
|
296 |
+
√𝐷 exp [−
|
297 |
+
∅(𝑥,𝑡)
|
298 |
+
𝐷 ] (4)
|
299 |
+
where 𝑁(𝑡) is the normalization constant and 𝑁(𝑡) = √𝐷 ∫
|
300 |
+
exp[−∅(𝑥, 𝑡) 𝐷
|
301 |
+
⁄ ]d𝑥
|
302 |
+
∞
|
303 |
+
−∞
|
304 |
+
⁄
|
305 |
+
,
|
306 |
+
and ∅(𝑥, 𝑡) is the generalized potential
|
307 |
+
∅(𝑥, 𝑡) = 𝑈(𝑥) − 𝑥𝐴 cos(𝜔0𝑡) . (5)
|
308 |
+
Assuming that the periodic signal 𝐴 cos(𝜔0𝑡) can satisfy the requirement of small
|
309 |
+
parameters under approximate adiabatic conditions, i.e., 𝜔0 is larger than the
|
310 |
+
characteristic relaxation time in double potential wells [28]. Then, the transition rates
|
311 |
+
between the two stable states are given by the Kramers-like formulas [29]
|
312 |
+
𝑊±(𝑥, 𝑡) =
|
313 |
+
√|𝑈′′(𝑥±,𝑡)𝑈′′(𝑥𝑢,𝑡)|
|
314 |
+
2π
|
315 |
+
exp [
|
316 |
+
∅(𝑥±,𝑡)−∅(𝑥𝑢,𝑡)
|
317 |
+
𝐷
|
318 |
+
] (6)
|
319 |
+
where the notation | ∙ | denotes the absolute value and
|
320 |
+
(a)
|
321 |
+
(b)
|
322 |
+
|
323 |
+
6 / 27
|
324 |
+
|
325 |
+
𝑈′′(𝑥, 𝑡) = 𝑘 − 2𝛼𝛽exp(−𝛽𝑥2)(1 − 2𝛽𝑥2)
|
326 |
+
𝑈′′(𝑥𝑢, 𝑡) = 𝑘 − 2𝛼𝛽
|
327 |
+
𝑈′′(𝑥±, 𝑡) = 2𝑘ln (
|
328 |
+
2𝛼𝛽
|
329 |
+
𝑘 ) (7)
|
330 |
+
∅(𝑥𝑢, 𝑡) = 𝑈(𝑥𝑢, 𝑡) − 𝑥𝑢𝐴 cos(𝜔0𝑡) = 𝛼
|
331 |
+
∅(𝑥±, 𝑡) = 𝑈(𝑥±, 𝑡)−𝑥±𝐴 cos(𝜔0𝑡) = 𝑘
|
332 |
+
2𝛽 (1 + ln 2𝛼𝛽
|
333 |
+
𝑘 ) ∓ 𝐴 cos(𝜔0𝑡) √ln(2𝛼𝛽 𝑘
|
334 |
+
⁄ )
|
335 |
+
𝛽
|
336 |
+
|
337 |
+
When we introduce Eq. (7) into Eq. (6), we can obtain
|
338 |
+
𝑊±(𝑥, 𝑡) = √𝑘(2𝛼𝛽 − 𝑘)ln(2𝛼𝛽 𝑘
|
339 |
+
⁄ )
|
340 |
+
√2π
|
341 |
+
|
342 |
+
× exp [−
|
343 |
+
𝛼
|
344 |
+
𝐷 +
|
345 |
+
𝑘(1+ln(2𝛼𝛽 𝑘
|
346 |
+
⁄ ))
|
347 |
+
2𝛽𝐷
|
348 |
+
∓ 𝐴 cos(𝜔0𝑡) √
|
349 |
+
ln(2𝛼𝛽 𝑘
|
350 |
+
⁄ )
|
351 |
+
𝛽𝐷2
|
352 |
+
] (8)
|
353 |
+
Furthermore, Eq. (8) can be transformed as
|
354 |
+
𝑊±(𝑥, 𝑡) = 𝑓(𝜇 ± 𝜂0 cos(𝜔0𝑡)) (9)
|
355 |
+
where
|
356 |
+
𝜇 =
|
357 |
+
𝛼
|
358 |
+
𝐷 −
|
359 |
+
𝑘
|
360 |
+
2𝛽𝐷 (1 + ln
|
361 |
+
2𝛼𝛽
|
362 |
+
𝑘 ) (10)
|
363 |
+
𝜂0 =
|
364 |
+
𝐴
|
365 |
+
𝐷 √
|
366 |
+
ln(2𝛼𝛽 𝑘
|
367 |
+
⁄ )
|
368 |
+
𝛽
|
369 |
+
(11)
|
370 |
+
Thus, we can simplify Eq. (8) as
|
371 |
+
𝑊±(𝑥, 𝑡) = 𝑓(𝜇 ± 𝜂0 cos(𝜔0𝑡)) =
|
372 |
+
√2𝑘(2𝛼𝛽−𝑘)ln2𝛼𝛽
|
373 |
+
𝑘
|
374 |
+
2π
|
375 |
+
exp[−(𝜇 ± 𝜂0 cos(𝜔0𝑡))] (12)
|
376 |
+
The response of the nonlinear system in Eq. (1) can be quantified using a classical
|
377 |
+
measure, i.e., SNR [30]. To derive its analytic expression, the power spectral density
|
378 |
+
of the system response can be described as
|
379 |
+
𝑆(Ω) = [1 −
|
380 |
+
𝛼12𝜂02
|
381 |
+
2(𝛼02+𝜔02)] (
|
382 |
+
4𝑐2𝛼0
|
383 |
+
𝛼02+𝜔02) +
|
384 |
+
π𝑐2𝜂02𝛼12
|
385 |
+
𝛼02+Ω2 [𝛿(Ω − 𝜔0) + 𝛿(Ω + 𝜔0)] (13)
|
386 |
+
where
|
387 |
+
𝑐 = √
|
388 |
+
ln(2𝛼𝛽 𝑘
|
389 |
+
⁄ )
|
390 |
+
𝛽
|
391 |
+
(14)
|
392 |
+
𝛼1 = 𝛼0 =
|
393 |
+
√2𝑘ln(2𝛼𝛽 𝑘
|
394 |
+
⁄ )(2𝛼𝛽−𝑘)
|
395 |
+
π
|
396 |
+
exp(−𝜇) (15)
|
397 |
+
Finally, the output SNR of the response of the overdamped harmonic-Gaussian
|
398 |
+
double-well potential system can be derived as
|
399 |
+
|
400 |
+
7 / 27
|
401 |
+
|
402 |
+
SNR =
|
403 |
+
π𝑐2𝛼12𝜂02
|
404 |
+
𝛼02+Ω2 |Ω=𝜔0 ×
|
405 |
+
𝛼02+𝜔02
|
406 |
+
4𝑐2𝛼0 [1 −
|
407 |
+
𝛼12𝜂02
|
408 |
+
2(𝛼02+𝜔02)]
|
409 |
+
−1
|
410 |
+
=
|
411 |
+
π𝛼1𝜂02
|
412 |
+
4
|
413 |
+
[1 −
|
414 |
+
𝛼12𝜂02
|
415 |
+
2(𝛼02+𝜔02)]
|
416 |
+
−1
|
417 |
+
(16)
|
418 |
+
Therefore, we can analyze the function between the output SNR and system
|
419 |
+
parameters using the analytic expression in Eq. (16). Figure 2 shows the output SNR
|
420 |
+
of overdamped harmonic-Gaussian double-well potential SR as system parameters
|
421 |
+
and noise intensity vary. It can be seen from Fig. 2(a) that the output SNR is a
|
422 |
+
nonmonotonic function of noise intensity 𝐷 under different 𝑘 and the peak value of
|
423 |
+
output SNR increases when 𝑘 raises, suggesting that adjusting 𝑘 is able to activate
|
424 |
+
the SR in the overdamped harmonic-Gaussian double-well potential system for
|
425 |
+
improving the output SNR. Similarly, adjusting 𝛼 and 𝛽 can also maximize the
|
426 |
+
output SNR, and the peak value of the output SNR declines as 𝛼 or 𝛽 increases but
|
427 |
+
the resonant noise intensity at the peak value becomes larger, as shown in Fig. 2(b)
|
428 |
+
and Fig. 2(c), respectively. We visualize the two-dimensional function among SNR
|
429 |
+
and two of system parameters (𝛼, 𝛽, 𝑘), as shown in Fig. 2(d), Fig. 2(c) and Fig. 2(d).
|
430 |
+
One can observe from Fig. 2(d) that a moderate parameter set (𝛼, 𝑘) can improve the
|
431 |
+
SNR of a given signal, whereas there exists a negative output SNR because the
|
432 |
+
harmonic-Gaussian double-well potential loses its stability when 𝑘 ≥ 2𝛼𝛽, resulting
|
433 |
+
in an antiresonance phenomenon. Meanwhile, we fix 𝑘 to express the output SNR as
|
434 |
+
a function of (𝛼, 𝛽) in Fig. 2(e), indicating that only an optimal matching between 𝛼
|
435 |
+
and 𝛽 can activate the overdamped harmonic-Gaussian double-well potential SR to
|
436 |
+
enhance the weak periodic signal embedded by a strong background noise. Similarly,
|
437 |
+
Fig. 2(f) also demonstrates that such a parameter matching is necessary to activate the
|
438 |
+
overdamped harmonic-Gaussian double-well potential SR. When 𝑘 ≥ 2𝛼𝛽, one can
|
439 |
+
also see the antiresonance from Fig. 2(e) and 2(f), respectively. The above results
|
440 |
+
demonstrate that the optimal parameter matching among 𝑘, 𝛼 and 𝛽 is able to
|
441 |
+
maximize the SR.
|
442 |
+
|
443 |
+
8 / 27
|
444 |
+
|
445 |
+
|
446 |
+
Fig. 2 SNR of overdamped harmonic-Gaussian double-well potential SR varies with
|
447 |
+
system parameters and noise intensity: SNR as a function of noise intensity under
|
448 |
+
different 𝑘 in (a), 𝛽 in (b) and 𝛼 in (c); SNR as a two-dimensional function of
|
449 |
+
(𝑘, 𝛼) in (d), (𝛽, 𝛼) in (e) and (𝑘, 𝛽) in (f).
|
450 |
+
Figure 3 depicts the SPD function and the corresponding system responses. The
|
451 |
+
SPD indicates the probability of Brownian particles to reside in double potential wells.
|
452 |
+
It is found from Fig. 3(a) that when 𝐷 = 0.3 the particles oscillate at the right
|
453 |
+
potential well located at 𝑥+ = √ln(2𝛼𝛽 𝑘
|
454 |
+
⁄ ) 𝛽
|
455 |
+
⁄ for activating intra-well SR, which is
|
456 |
+
demonstrated by the system response in Fig. 3(b) further. When we increase the noise
|
457 |
+
intensity 𝐷, the particles can jump across the potential barrier to go back and forth in
|
458 |
+
double wells for activating the inter-well SR marked in red in Fig. 3(a), whose system
|
459 |
+
response characterizes the eye-catching period marked in red in Fig. 3(b). When the
|
460 |
+
noise intensity is fixed as 𝐷 = 3, two peaks of SPD decline and the corresponding
|
461 |
+
(a)
|
462 |
+
(b)
|
463 |
+
(c)
|
464 |
+
(d)
|
465 |
+
(e)
|
466 |
+
(f)
|
467 |
+
|
468 |
+
9 / 27
|
469 |
+
|
470 |
+
system response marked in green becomes noisy.
|
471 |
+
|
472 |
+
Fig. 3 SPD functions and the corresponding system responses of overdamped
|
473 |
+
harmonic-Gaussian double-well potential SR under different noise intensity: (a) the
|
474 |
+
SPD functions and (b) the corresponding system responses.
|
475 |
+
|
476 |
+
3. Underdamped harmonic-Gaussian double-well potential SR
|
477 |
+
The underdamped harmonic-Gaussian double-well potential system subjected to a
|
478 |
+
periodic signal and noise can be described as [31]
|
479 |
+
d2𝑥
|
480 |
+
d𝑡2 + 𝛾
|
481 |
+
d𝑥
|
482 |
+
d𝑡 = −
|
483 |
+
𝜕𝑈(𝑥)
|
484 |
+
𝜕𝑥
|
485 |
+
+ 𝐴 cos(𝜔0𝑡) + 𝜉(𝑡) (17)
|
486 |
+
where 𝛾 is the damped factor and 𝛾 > 0. Equation (17) can be transformed as [32]
|
487 |
+
{
|
488 |
+
d𝑥
|
489 |
+
d𝑡 = 𝑦
|
490 |
+
d𝑦
|
491 |
+
d𝑡 = −𝛾𝑦 − 𝑘𝑥 + 2𝛼𝛽𝑥exp(−𝛽𝑥2) + 𝐴 cos(𝜔0𝑡) + 𝜉(𝑡)
|
492 |
+
(18)
|
493 |
+
Supposing that 𝐴 = 0, 𝐷 = 0, d𝑥 d𝑡
|
494 |
+
⁄
|
495 |
+
= 0 and d𝑥 d𝑡 = 0
|
496 |
+
⁄
|
497 |
+
, we can obtain three
|
498 |
+
singular points
|
499 |
+
(𝑥±
|
500 |
+
𝑦±) = (±√
|
501 |
+
ln(2𝛼𝛽 𝑘
|
502 |
+
⁄ )
|
503 |
+
𝛽
|
504 |
+
0
|
505 |
+
) , (𝑥𝑢
|
506 |
+
𝑦𝑢) = (0
|
507 |
+
0) (19)
|
508 |
+
Let
|
509 |
+
𝜕𝑈(𝑥, 𝑦) 𝜕𝑥
|
510 |
+
⁄
|
511 |
+
and
|
512 |
+
𝜕𝑈(𝑥, 𝑦) 𝜕𝑦
|
513 |
+
⁄
|
514 |
+
mark
|
515 |
+
as
|
516 |
+
𝑈𝑥(𝑥, 𝑦) and
|
517 |
+
𝑈𝑦(𝑥, 𝑦)
|
518 |
+
respectively, and then Eq. (18) can be rewritten as
|
519 |
+
{
|
520 |
+
𝑈𝑥(𝑥, 𝑦) = 𝑦
|
521 |
+
𝑈𝑦(𝑥, 𝑦) = −𝛾𝑦 − 𝑘𝑥 + 2𝛼𝛽𝑥exp(−𝛽𝑥2) + 𝐴 cos(𝜔0𝑡) + 𝜉(𝑡) (20)
|
522 |
+
The linearization matrix of Eq. (18) can be calculated as
|
523 |
+
(𝑈𝑥𝑥(𝑥, 𝑦)
|
524 |
+
𝑈𝑥𝑦(𝑥, 𝑦)
|
525 |
+
𝑈𝑦𝑥(𝑥, 𝑦)
|
526 |
+
𝑈𝑦𝑦(𝑥, 𝑦)) = (
|
527 |
+
0
|
528 |
+
1
|
529 |
+
−𝑘 + 2𝛼𝛽exp(−𝛽𝑥2)[1 − 2𝛽𝑥2exp(−𝛽𝑥2)]
|
530 |
+
−𝛾)
|
531 |
+
(a)
|
532 |
+
(b)
|
533 |
+
|
534 |
+
10 / 27
|
535 |
+
|
536 |
+
(21)
|
537 |
+
Further, the linearization matrix at the singular points (±√ln(2𝛼𝛽 𝑘
|
538 |
+
⁄ ) 𝛽
|
539 |
+
⁄
|
540 |
+
, 0) can
|
541 |
+
be denoted as
|
542 |
+
(𝑈𝑥𝑥(𝑥, 𝑦)
|
543 |
+
𝑈𝑥𝑦(𝑥, 𝑦)
|
544 |
+
𝑈𝑦𝑥(𝑥, 𝑦)
|
545 |
+
𝑈𝑦𝑦(𝑥, 𝑦)) |
|
546 |
+
𝑥=±√ln(2𝛼𝛽 𝑘
|
547 |
+
⁄ )
|
548 |
+
𝛽
|
549 |
+
,𝑦=0 = (
|
550 |
+
0
|
551 |
+
1
|
552 |
+
−
|
553 |
+
𝑘2
|
554 |
+
𝛼𝛽 ln (
|
555 |
+
2𝛼𝛽
|
556 |
+
𝑘 )
|
557 |
+
−𝛾) (22)
|
558 |
+
By solving Eq. (22), the corresponding eigenvalues are calculated as
|
559 |
+
𝛽1,2 =
|
560 |
+
−𝛾±√𝛾2−4𝑘2
|
561 |
+
𝛼𝛽 ln(2𝛼𝛽
|
562 |
+
𝑘 )
|
563 |
+
2
|
564 |
+
(23)
|
565 |
+
Similarly, the linearization matrix at the singular point (0,0) is
|
566 |
+
(𝑈𝑥𝑥(𝑥, 𝑦)
|
567 |
+
𝑈𝑥𝑦(𝑥, 𝑦)
|
568 |
+
𝑈𝑦𝑥(𝑥, 𝑦)
|
569 |
+
𝑈𝑦𝑦(𝑥, 𝑦)) |𝑥=0,𝑦=0 = (
|
570 |
+
0
|
571 |
+
1
|
572 |
+
−𝑘 + 2𝛼𝛽
|
573 |
+
−𝛾) (24)
|
574 |
+
The corresponding eigenvalues to the linearization matrix in Eq. (24) are
|
575 |
+
𝜆1,2 =
|
576 |
+
−𝛾±√𝛾2+4(2𝛼𝛽−𝑘)
|
577 |
+
2
|
578 |
+
(25)
|
579 |
+
Assuming that 𝜌(𝑥, 𝑦, 𝑡) is the PDF of the stochastic process in Eq. (18), the
|
580 |
+
corresponding the Fokker-Planck equation is [33]
|
581 |
+
𝜕𝜌(𝑥,𝑦,𝑡)
|
582 |
+
𝜕𝑡
|
583 |
+
= −
|
584 |
+
𝜕𝑦
|
585 |
+
𝜕𝑥 𝜌(𝑥, 𝑦, 𝑡) −
|
586 |
+
𝜕
|
587 |
+
𝜕𝑦 [−𝛾𝑦 − 𝑘𝑥 + 2𝛼𝛽𝑥exp(−𝛽𝑥2) +
|
588 |
+
𝐴 cos(𝜔0𝑡)]𝜌(𝑥, 𝑦, 𝑡) + 𝛾𝐷
|
589 |
+
𝜕2
|
590 |
+
𝜕𝑦2 𝜌(𝑥, 𝑦, 𝑡) (26)
|
591 |
+
Then, the corresponding SPD function to Eq. (18) can be denoted as
|
592 |
+
𝜌s(𝑥, 𝑦, 𝑡) = 𝑁(𝑡)exp [−
|
593 |
+
1
|
594 |
+
𝐷 (
|
595 |
+
1
|
596 |
+
2 𝑦2 +
|
597 |
+
𝑘
|
598 |
+
2 𝑥2 + 𝛼exp(−𝛽𝑥2) − 𝑥𝐴 cos(𝜔0𝑡))] (27)
|
599 |
+
where 𝑁(𝑡) stands for the normalization constant [34]
|
600 |
+
𝑁(𝑡) =
|
601 |
+
1
|
602 |
+
∫
|
603 |
+
∫
|
604 |
+
exp[−𝑈̂(𝑥,𝑦,𝑡)
|
605 |
+
𝐷
|
606 |
+
]d𝑥d𝑦
|
607 |
+
∞
|
608 |
+
−∞
|
609 |
+
∞
|
610 |
+
−∞
|
611 |
+
(28)
|
612 |
+
in which 𝑈̂(𝑥, 𝑦, 𝑡) denotes the generalized potential
|
613 |
+
𝑈̂(𝑥, 𝑦, 𝑡) =
|
614 |
+
1
|
615 |
+
2 𝑦2 +
|
616 |
+
𝑘
|
617 |
+
2 𝑥2 + 𝛼exp(−𝛽𝑥2) − 𝑥𝐴 cos(𝜔0𝑡) (29)
|
618 |
+
The
|
619 |
+
transition
|
620 |
+
rates
|
621 |
+
of
|
622 |
+
particles
|
623 |
+
at
|
624 |
+
the
|
625 |
+
singular
|
626 |
+
points
|
627 |
+
(𝑥±, 𝑦±) =
|
628 |
+
(±√ln(2𝛼𝛽 𝑘
|
629 |
+
⁄ ) 𝛽
|
630 |
+
⁄
|
631 |
+
, 0) can be calculated as [35]
|
632 |
+
𝑊±(𝑡) =
|
633 |
+
√𝛽1𝛽2
|
634 |
+
2π
|
635 |
+
√−
|
636 |
+
𝜆1
|
637 |
+
𝜆2 exp [
|
638 |
+
1
|
639 |
+
𝐷 (
|
640 |
+
𝑘
|
641 |
+
2𝛽 (1 + ln (
|
642 |
+
2𝛼𝛽
|
643 |
+
𝑘 )) − 𝛼 ∓ √
|
644 |
+
ln(2𝛼𝛽 𝑘
|
645 |
+
⁄ )
|
646 |
+
𝛽
|
647 |
+
𝐴 cos(𝜔0𝑡))]
|
648 |
+
(30)
|
649 |
+
|
650 |
+
11 / 27
|
651 |
+
|
652 |
+
Finally, the analytic expression of the output SNR of the response of the
|
653 |
+
underdamped harmonic-Gaussian double-well potential system in Eq. (17) is derived
|
654 |
+
as
|
655 |
+
SNR =
|
656 |
+
π𝑐2𝛼12𝜂02
|
657 |
+
𝛼02+Ω2 |Ω=𝜔0 ×
|
658 |
+
𝛼02+𝜔02
|
659 |
+
4𝑐2𝛼0 [1 −
|
660 |
+
𝛼12𝜂02
|
661 |
+
2(𝛼02+𝜔02)]
|
662 |
+
−1
|
663 |
+
=
|
664 |
+
π𝛼1𝜂02
|
665 |
+
4
|
666 |
+
[1 −
|
667 |
+
𝛼12𝜂02
|
668 |
+
2(𝛼02+𝜔02)]
|
669 |
+
−1
|
670 |
+
(31)
|
671 |
+
where
|
672 |
+
𝛼1 = 𝛼0 =
|
673 |
+
√𝛽1𝛽2
|
674 |
+
π
|
675 |
+
√−
|
676 |
+
𝜆1
|
677 |
+
𝜆2 exp(−𝑢) (32)
|
678 |
+
Figures 4(a)-4(d) show the output SNR as noise intensity 𝐷 varies under different
|
679 |
+
system parameters. It is found from Fig. 4(a) that the output SNR increases and then
|
680 |
+
decreases as noise intensity increases, suggesting that a noise-induced underdamped
|
681 |
+
harmonic-Gaussian double-well potential SR happens. Moreover, increasing 𝑘 can
|
682 |
+
maximize the output SNR. Like this, adjusting 𝛾, 𝛼 and 𝛽 can also improve the
|
683 |
+
output SNR as shown in Fig. 4(b), Fig. 4(c) and Fig. 4(d) respectively, where the peak
|
684 |
+
value of output SNR and the resonant noise intensity are changed. Figures 4(e)-4(h)
|
685 |
+
show the output SNR as the function of system parameters for a given signal.
|
686 |
+
Adjusting the system parameters can activate the underdamped harmonic-Gaussian
|
687 |
+
double-well potential SR, as shown in Fig. 4(e)-4(h). Different from the overdamped
|
688 |
+
harmonic-Gaussian double-well potential SR, it is noticed from Fig. 4(e)-4(h) that the
|
689 |
+
antiresonance disappears in the underdamped one. That is because the damped factor
|
690 |
+
changes the stability of the nonlinear system.
|
691 |
+
|
692 |
+
12 / 27
|
693 |
+
|
694 |
+
|
695 |
+
Fig. 4 SNR of underdamped harmonic-Gaussian double-well potential SR varies with
|
696 |
+
system parameters and noise intensity: SNR as a function of noise intensity under
|
697 |
+
different 𝑘 in (a), 𝛾 in (b) and 𝛼 in (c), 𝛽 in (d); SNR as a two-dimensional
|
698 |
+
function of (𝛽, 𝛼) in (e), (𝛽, 𝑘) in (f), (𝛾, 𝑘) in (g) and (𝛾, 𝛼) in (h).
|
699 |
+
Figure 5 shows the SPD functions and the corresponding system responses. In Fig.
|
700 |
+
5(a), the SPD functions vary from asymmetrical peaks into two symmetrical ones as
|
701 |
+
noise intensity raises, suggesting that the underdamped harmonic-Gaussian
|
702 |
+
double-well potential SR changes from intra-well SR into inter-well one. In Fig. 5(b),
|
703 |
+
a weak period occurs when intra-well SR happens, and then the system response
|
704 |
+
(a)
|
705 |
+
(b)
|
706 |
+
(c)
|
707 |
+
(e)
|
708 |
+
(f)
|
709 |
+
(g)
|
710 |
+
(d)
|
711 |
+
(h)
|
712 |
+
|
713 |
+
13 / 27
|
714 |
+
|
715 |
+
becomes chaotic when the particles jump randomly between double wells and finally
|
716 |
+
is periodic when the inter-well SR takes place.
|
717 |
+
|
718 |
+
Fig. 5 SPD functions and the corresponding system responses of underdamped
|
719 |
+
harmonic-Gaussian double-well potential SR under different noise intensity: (a) the
|
720 |
+
SPD functions and (b) the corresponding system responses.
|
721 |
+
|
722 |
+
4. Application of harmonic-Gaussian double-well potential SR to enhance weak
|
723 |
+
fault characteristics of machinery
|
724 |
+
Rotating components of machinery including bearings, gears and rotors are more
|
725 |
+
prone to failures than fixed components due to contact fatigue, uneven lubrication,
|
726 |
+
misalignment and so on [36-38]. Therefore, how to detect weak fault characteristics of
|
727 |
+
rotating components in the early stage becomes a challenge [39]. Lots of scholars
|
728 |
+
have attempted to cancel or suppress the noise embedded in a signal to extract weak
|
729 |
+
fault characteristics further [40, 41]. On the contrary, we would apply
|
730 |
+
harmonic-Gaussian double-well potential SR to enhance weak fault characteristics of
|
731 |
+
machinery by using noise.
|
732 |
+
Four Rexnord ZA-2115 double row bearing run-to-failure experiments under the
|
733 |
+
rotating speed 2000 rpm and radial load 6000 lbs were performed to acquire the
|
734 |
+
bearing failure data by using accelerometers and a data acquisition card. The bearing
|
735 |
+
parameters are listed as below: the ball number 16, the pitch diameter 2.815 inches,
|
736 |
+
the contact angle 15.17 degrees and rolling element diameter 0.331 inches. The
|
737 |
+
bearing experimental rig is shown in Fig. 6(a) and the corresponding sensor
|
738 |
+
placement is illustrated in Fig. 6(b). This experimental rig is composed of four tested
|
739 |
+
bearings, an AC motor and rub belts [42]. In the bearing run-to-failure experiment, the
|
740 |
+
(a)
|
741 |
+
(b)
|
742 |
+
|
743 |
+
14 / 27
|
744 |
+
|
745 |
+
sampling frequency is 20 kHz and the sampling time is 1.024 seconds.
|
746 |
+
|
747 |
+
Fig. 6 Bearing test rigs and sensor placement illustration: (a) bearing test rigs and (b)
|
748 |
+
sensor placement illustration.
|
749 |
+
All failures occurred after exceeding designed life time of the bearing which is
|
750 |
+
more than 100 million revolutions. The data set describes a test-to-failure experiment
|
751 |
+
and consists of individual files that are 1.024-seconds vibration signal snapshots
|
752 |
+
recorded at 10-minutes intervals. The recording duration is from February 12, 2004
|
753 |
+
10:32:39 to February 19, 2004 06:22:39. At the end of the test-to-failure experiment,
|
754 |
+
outer race failure occurred in the tested bearing 1. The root mean square (RMS), an
|
755 |
+
effective health indicator, is often used to reflect the vibration intensity and monitor
|
756 |
+
the health state of bearings further. Therefore, RMS of bearing run-to-failure
|
757 |
+
experimental vibration data is calculated and depicted in Fig. 7 to observe the
|
758 |
+
degradation trend of the tested bearing 1. The degradation trend changes slowly with
|
759 |
+
slight fluctuation in the range of 0~88 hours and then raises into the larger RMS for
|
760 |
+
degradation marked in red dot in the zoomed RMS plot, suggesting that a tiny outer
|
761 |
+
race failure occurs in the early stage of the tested bearing 1. As time went on, it can be
|
762 |
+
seen from Fig. 7 that RMS keeps increasing, indicating that the outer race failure
|
763 |
+
becomes more and more severe. Finally, this test-to-failure experiment was stopped
|
764 |
+
because of strong vibration. In the test-to-failure experiment, the health state of the
|
765 |
+
tested bearing varies from normal to the early failure to severe failure to end of life,
|
766 |
+
which is consistent with the degradation trend reflected by RMS.
|
767 |
+
(a)
|
768 |
+
Accelerometers
|
769 |
+
Bearing 1
|
770 |
+
Bearing 2
|
771 |
+
Bearing 3
|
772 |
+
Bearing 4
|
773 |
+
Motor
|
774 |
+
Rub belts
|
775 |
+
(b)
|
776 |
+
|
777 |
+
15 / 27
|
778 |
+
|
779 |
+
|
780 |
+
Fig. 7 RMS of the bearing run-to-failure vibration signals.
|
781 |
+
The raw vibration signal at the 88.83th hour marked in red dot and its frequency
|
782 |
+
and envelope spectrum are depicted in Fig. 8. We cannot observe the eye-catching
|
783 |
+
spectral peaks at the theoretical outer race/inner race/roller/cage fault characteristic
|
784 |
+
frequency and its harmonics from both the frequency spectrum in Fig. 8(b) and the
|
785 |
+
zoomed envelope spectrum in Fig. 8(c), which are submerged by other spectral peaks
|
786 |
+
from background noise and excited by other normal components. Although we have
|
787 |
+
completed the bearing run-to-failure experiment and observed that a failure occurred
|
788 |
+
at the outer race of the tested bearing 1 by disassembling four tested bearings, we
|
789 |
+
cannot judge what time a tiny failure occurs at the outer race of the tested bearing 1
|
790 |
+
by virtue of the raw vibration signal and its spectrum in Fig. 8, which is very
|
791 |
+
important for early fault diagnosis and remaining useful life prediction.
|
792 |
+
|
793 |
+
16 / 27
|
794 |
+
|
795 |
+
Fig. 8 The vibration signal and its spectrum of outer race failure bearing at the early
|
796 |
+
stage: (a) the raw signal, (b) its frequency spectrum and (c) zoomed envelope
|
797 |
+
spectrum.
|
798 |
+
We apply the overdamped harmonic-Gaussian double-well potential SR to enhance
|
799 |
+
the weak fault characteristics in the early stage of the tested bearing 1. Figure 9 shows
|
800 |
+
the enhanced results of weak fault characteristics embedded in the raw vibration
|
801 |
+
signal, where the system parameters are given as 𝑘 = 1.1, 𝛼 = 1.2, 𝛽 = 0.24 and
|
802 |
+
the integral step is ℎ=0.035. The overdamped SR cannot be used to process
|
803 |
+
large-parameter signals directly and frequency-shifted and rescaling transform is
|
804 |
+
widely to solve it. Three key parameters of frequency-shifted and rescaling transform
|
805 |
+
in the overdamped harmonic-Gaussian double-well potential SR are given as below
|
806 |
+
by virtue of the theoretical outer race fault characteristic frequency 236.4 Hz that can
|
807 |
+
be calculated according to the structural parameters and rotating speed of the tested
|
808 |
+
bearing 1: the pass-band cut-off frequency 220 Hz, the stop-band cut-off frequency
|
809 |
+
200 Hz and the carrier frequency 200 Hz. These parameters in the frequency-shifted
|
810 |
+
and rescaling transform could be selected according to the reference [43]. One can
|
811 |
+
|
812 |
+
17 / 27
|
813 |
+
|
814 |
+
observe from Fig. 9 that the enhanced signal characterizes strong impacts and
|
815 |
+
dominant spectral peaks are at the outer race fault characteristic frequency and its
|
816 |
+
second harmonic of the tested bearing 1, suggesting that a tiny failure occurs at the
|
817 |
+
outer race of the tested bearing 1. However, the overdamped harmonic-Gaussian
|
818 |
+
double-well potential SR depends on the high-pass filter to perform the
|
819 |
+
frequency-shifted and rescaling transform, whose parameters are given artificially.
|
820 |
+
In the overdamped harmonic-Gaussian double-well potential SR-based enhanced
|
821 |
+
results, the low-frequency components of the raw vibration signal (<200Hz) have
|
822 |
+
been removed by using the frequency-shifted and rescaling transform. Moreover, the
|
823 |
+
overdamped harmonic-Gaussian double-well potential SR method would suppress the
|
824 |
+
components beyond the nonlinear filtering frequency band of overdamped
|
825 |
+
harmonic-Gaussian
|
826 |
+
double-well
|
827 |
+
potential
|
828 |
+
SR.
|
829 |
+
Although
|
830 |
+
overdamped
|
831 |
+
harmonic-Gaussian double-well potential SR method is able to utilize the noise
|
832 |
+
located in the nonlinear filtering frequency band of overdamped harmonic-Gaussian
|
833 |
+
double-well potential SR for enhancing weak fault characteristics, a part of noise is
|
834 |
+
removed. Therefore, the amplitude of the detected result in Fig. 9 is smaller than that
|
835 |
+
in Fig. 8.
|
836 |
+
|
837 |
+
Fig. 9 Overdamped harmonic-Gaussian double-well potential SR-based enhanced
|
838 |
+
results: (a) the enhanced signal and (b) its zoomed frequency spectrum.
|
839 |
+
fouter
|
840 |
+
2fouter
|
841 |
+
|
842 |
+
18 / 27
|
843 |
+
|
844 |
+
Further, we apply the underdamped harmonic-Gaussian double-well potential SR to
|
845 |
+
enhance weak fault characteristics embedded in the raw vibration signal, as shown in
|
846 |
+
Fig. 10 whose system parameters are given as 𝑘=1.2, 𝛼=1.1, 𝛽=0.24, 𝛾=0.33 and
|
847 |
+
ℎ =0.035. There are obvious repetitive transients in the enhanced signal and
|
848 |
+
eye-catching spectral peaks at the outer race fault characteristic frequency and its
|
849 |
+
second harmonic in the zoomed frequency spectrum as shown in Fig. 10(b).
|
850 |
+
Compared with the overdamped harmonic-Gaussian double-well potential SR-based
|
851 |
+
results, the underdamped one characterizes the higher spectral peaks at the outer race
|
852 |
+
fault characteristic frequency and its second harmonic in the zoomed frequency
|
853 |
+
spectrum.
|
854 |
+
|
855 |
+
Fig. 10 Underdamped harmonic-Gaussian double-well potential SR-based enhanced
|
856 |
+
results: (a) the enhanced signal and (b) its zoomed frequency spectrum.
|
857 |
+
For a comparison, we use the advanced robust local mean decomposition (RLMD)
|
858 |
+
[44, 45] to decompose the raw vibration signal of the tested bearing 1 into the product
|
859 |
+
functions (PFs) and a residual component (Res) for extracting weak fault
|
860 |
+
characteristics. The product functions and their zoomed envelope spectrum are shown
|
861 |
+
in Fig. 11(a) and Fig. 11(b), respectively. One cannot observe the obvious spectral
|
862 |
+
peaks at the outer race fault characteristic frequency and its harmonics from the
|
863 |
+
zoomed envelope spectrum.
|
864 |
+
fouter
|
865 |
+
2fouter
|
866 |
+
Rotating frequency
|
867 |
+
and its harmonics
|
868 |
+
|
869 |
+
19 / 27
|
870 |
+
|
871 |
+
|
872 |
+
Fig. 11 RLMD-based results: (a) product functions and (b) their zoomed envelope
|
873 |
+
spectrum.
|
874 |
+
In addition to signal decomposition methods, signal denoising or signal filtering
|
875 |
+
methods also have been widely applied to extract weak fault characteristics of
|
876 |
+
machinery. Among them, wavelet transform [46, 47] is typical to obtain a denoised
|
877 |
+
version of the raw signal by thresholding the wavelet coefficients. Here, the maximal
|
878 |
+
overlap discrete wavelet transform is used to denoise the signal with soft thresholding,
|
879 |
+
level 3 and db4 wavelet. The denoised signal and its zoomed envelope spectrum are
|
880 |
+
shown in Fig. 12 and Fig. 13, respectively. It is found from Fig. 12 that the wavelet
|
881 |
+
transform can cancel strong background noise, but we cannot see any fault
|
882 |
+
characteristics at the first sight from the zoomed envelope spectrum in Fig. 13.
|
883 |
+
(a)
|
884 |
+
(b)
|
885 |
+
PF1
|
886 |
+
PF2
|
887 |
+
PF3
|
888 |
+
PF4
|
889 |
+
PF5
|
890 |
+
Res
|
891 |
+
PF1
|
892 |
+
PF2
|
893 |
+
PF3
|
894 |
+
PF4
|
895 |
+
PF5
|
896 |
+
Res
|
897 |
+
Time [s]
|
898 |
+
Frequency [Hz]
|
899 |
+
Amplitude [g]
|
900 |
+
|
901 |
+
0.2
|
902 |
+
h
|
903 |
+
0
|
904 |
+
0.2
|
905 |
+
0
|
906 |
+
0.2
|
907 |
+
0.4
|
908 |
+
0.6
|
909 |
+
0.8
|
910 |
+
0.1
|
911 |
+
0
|
912 |
+
-0.1
|
913 |
+
0
|
914 |
+
0.2
|
915 |
+
0.4
|
916 |
+
0.6
|
917 |
+
0.8
|
918 |
+
1
|
919 |
+
0.05
|
920 |
+
0.05
|
921 |
+
0
|
922 |
+
0.2
|
923 |
+
0.4
|
924 |
+
0.6
|
925 |
+
0.8
|
926 |
+
0.02
|
927 |
+
-0.02
|
928 |
+
0
|
929 |
+
0.2
|
930 |
+
0.4
|
931 |
+
0.6
|
932 |
+
0.8
|
933 |
+
×10-3
|
934 |
+
?>>
|
935 |
+
-5
|
936 |
+
-10
|
937 |
+
0
|
938 |
+
0.2
|
939 |
+
0.4
|
940 |
+
0.6
|
941 |
+
0.8
|
942 |
+
X10-3
|
943 |
+
5
|
944 |
+
0
|
945 |
+
-5
|
946 |
+
0
|
947 |
+
0.2
|
948 |
+
0.4
|
949 |
+
0.6
|
950 |
+
0.8 20 / 27
|
951 |
+
|
952 |
+
|
953 |
+
Fig. 12 Undecimated wavelet transform-based denoised signals.
|
954 |
+
|
955 |
+
Fig. 13 The zoomed envelope spectrum of undecimated wavelet transform-based
|
956 |
+
denoised signals.
|
957 |
+
A classical symptom of rotating machines failures in vibration signals is the
|
958 |
+
presence of repetitive transients. Antoni [48] proposed an infogram method to capture
|
959 |
+
the signature of repetitive transients in time domain, which is the variant of classical
|
960 |
+
fast kurtogram method. This method is used to process the raw vibration signal for
|
961 |
+
extracting repetitive transients in time domain. The corresponding results are shown
|
962 |
+
in Fig. 14. Although it can see the slight repetitive transients from the filtered signal in
|
963 |
+
Fig. 14(b), it is difficult for us to identify the period of repetitive transients because of
|
964 |
+
strong background noise and other normal vibration components. The above
|
965 |
+
conclusion could be further confirmed by the squared envelope amplitude sepctrum of
|
966 |
+
|
967 |
+
21 / 27
|
968 |
+
|
969 |
+
the filtered signal in Fig. 14(b), in which we cannot see the eye-catching spectral
|
970 |
+
peaks at the outer race fault characteristic frequency and its harmonics.
|
971 |
+
|
972 |
+
Fig. 14 The detected results using infogram: (a) infogram and (b) the filtered signal
|
973 |
+
and its squared envelope amplitude sepctrum.
|
974 |
+
|
975 |
+
5. Conclusions
|
976 |
+
The overdamped and underdamped harmonic-Gaussian double-well potential SR
|
977 |
+
are investigated by deriving the output SNR and SPD functions. It is found that both
|
978 |
+
noise-induced SR and parameter-induced SR can be activated in the overdamped and
|
979 |
+
underdamped harmonic-Gaussian double-well potential systems. Moreover, since the
|
980 |
+
harmonic-Gaussian double-well potential in the range of 𝑘 ≥ 2𝛼𝛽 loses the stability,
|
981 |
+
we can observe the antiresonance, whereas adding the damped factor into the
|
982 |
+
overdamped harmonic-Gaussian double-well potential system can change the stability,
|
983 |
+
resulting that the antiresonance disappears. Above conclusion is applicable under all
|
984 |
+
parameters.
|
985 |
+
Finally,
|
986 |
+
we
|
987 |
+
apply
|
988 |
+
both
|
989 |
+
the
|
990 |
+
overdamped
|
991 |
+
and
|
992 |
+
underdamped
|
993 |
+
harmonic-Gaussian double-well potential SR to enhance weak fault characteristics of
|
994 |
+
bearings for incipient fault identification, where the corresponding parameters would
|
995 |
+
be adjusted or optimized instead of all parameters are applicable to activate the
|
996 |
+
optimal SR. The weak fault characteristics are enhanced successfully to identify the
|
997 |
+
early failure of bearings, which somewhat outperforms to the RLMD, wavelet
|
998 |
+
transform and infogram-based results. But the SR-based methods depend on the prior
|
999 |
+
knowledge of the signals to be detected or structural parameters and rotating speeds of
|
1000 |
+
bearings, and cannot detect unknown multiple-frequency and multiple-component
|
1001 |
+
(a)
|
1002 |
+
(b)
|
1003 |
+
|
1004 |
+
22 / 27
|
1005 |
+
|
1006 |
+
coupled signals without any prior knowledge. Therefore, we would study the
|
1007 |
+
SR-based signal decomposition method by using noise to decouple and detect
|
1008 |
+
unknown
|
1009 |
+
multiple-frequency
|
1010 |
+
and
|
1011 |
+
multiple-component
|
1012 |
+
signals,
|
1013 |
+
especially
|
1014 |
+
time-varying nonstationary signals in the future.
|
1015 |
+
|
1016 |
+
Acknowledgments
|
1017 |
+
This research was supported by Foundation of the State Key Laboratory of
|
1018 |
+
Performance Monitoring and Protecting of Rail Transit Infrastructure of East China
|
1019 |
+
Jiaotong University (HJGZ2021114), Laboratory of Yangjiang Offshore Wind Power
|
1020 |
+
(YJOFWD-OF-2022A08), Zhejiang Provincial Natural Science Foundation of China
|
1021 |
+
(LQ22E050003), National Natural Science Foundation of China (52205569), Ningbo
|
1022 |
+
Science and Technology Major Project (2020Z110, 2022Z057, 2022Z002), National
|
1023 |
+
Natural Science Foundation of China (51905349, 62001210, U2013603), Natural
|
1024 |
+
Science Foundation of Guangdong Province (2022A1515010126, 2020A1515011509),
|
1025 |
+
Ningbo Natural Science Foundation (2022J098) and also sponsored by K.C. Wong
|
1026 |
+
Magna Fund in Ningbo University. The Spanish State Research Agency (AEI) and the
|
1027 |
+
European
|
1028 |
+
Regional
|
1029 |
+
Development
|
1030 |
+
Fund
|
1031 |
+
(ERDF)
|
1032 |
+
under
|
1033 |
+
Project
|
1034 |
+
No.
|
1035 |
+
PID2019-105554GB-I00 is also aknowledged.
|
1036 |
+
|
1037 |
+
Conflicct of Interest
|
1038 |
+
The authors declare that they have no conflict of interest.
|
1039 |
+
|
1040 |
+
Data availability
|
1041 |
+
The datasets generated during and/or analysed during the current study are
|
1042 |
+
available from the corresponding author on reasonable request.
|
1043 |
+
|
1044 |
+
References
|
1045 |
+
[1] Rai A, Upadhyay S H. A review on signal processing techniques utilized in the
|
1046 |
+
fault diagnosis of rolling element bearings, Tribology International, 2016, 96:
|
1047 |
+
289-306.
|
1048 |
+
|
1049 |
+
23 / 27
|
1050 |
+
|
1051 |
+
[2] Benzi R, Sutera A, Vulpiani A. The mechanism of stochastic resonance, Journal
|
1052 |
+
of Physics A: Mathematical and General, 1981, 14(11): L453-L457.
|
1053 |
+
[3] Gammaitoni L, Hanggi P, Jung P, et al. Stochastic resonance, Reviews of Modern
|
1054 |
+
Physics, 1998, 70(1): 223-287.
|
1055 |
+
[4] Qiao Z, Lei Y, Li N. Applications of stochastic resonance to machinery fault
|
1056 |
+
detection: A review and tutorial, Mechanical Systems and Signal Processing,
|
1057 |
+
2019, 122: 502-536.
|
1058 |
+
[5] Moss F, Ward L M, Sannita W G. Stochastic resonance and sensory information
|
1059 |
+
processing: A tutorial and review of application, Clinical Neurophysiology, 2004,
|
1060 |
+
115(2): 267-281.
|
1061 |
+
[6] Dong H, Shen X, He K, et al. Nonlinear filtering effects of intrawell matched
|
1062 |
+
stochastic resonance with barrier constrainted duffing system for ship radiated
|
1063 |
+
line signature extraction, Chaos, Solitons and Fractals, 2020, 141: 110428.
|
1064 |
+
[7] Fu Y, Kang Y, Liu R. Novel bearing fault diagnosis algorithm based on the
|
1065 |
+
method of moments for stochastic resonant systems, IEEE Transactions on
|
1066 |
+
Instrumentation and Measurement, 2020, 70: 1-10.
|
1067 |
+
[8] Xu P, Jin Y. Stochastic resonance in an asymmetric tristable system driven by
|
1068 |
+
correlated noises, Applied Matheatical Modelling, 2020, 77: 408-425.
|
1069 |
+
[9] Lei Y, Qiao Z, Xu X, et al. An underdamped stochastic resonance method with
|
1070 |
+
stable-state matching for incipient fault diagnosis of rolling element bearings,
|
1071 |
+
Mechanical Systems and Signal Processing, 2017, 94: 148-164.
|
1072 |
+
[10] Li J, Chen X, He Z. Multi-stable stochastic resonance and its application research
|
1073 |
+
on mechanical fault diagnosis, Journal of Sound and Vibration, 2013, 332(22):
|
1074 |
+
5999-6015.
|
1075 |
+
[11] Li F, Duan F, Chapeau-Blondeau F, et al. Signal estimation and filtering from
|
1076 |
+
quantized observations via adaptive stochastic resonance, Physical Review E,
|
1077 |
+
2021, 103(5): 052108.
|
1078 |
+
[12] Rebolledo-Herrera L, Guillermo E FV. Quartic double-well system modulation
|
1079 |
+
for under-damped stochastic resonance tuning, Digital Signal Processing, 2016,
|
1080 |
+
52: 55-63.
|
1081 |
+
|
1082 |
+
24 / 27
|
1083 |
+
|
1084 |
+
[13] Qiao Z, Elhattab A, Shu X, et al. A second-order stochastic resonance method
|
1085 |
+
enhanced by fractional-order derivative for mechanical fault detection, Nonlinear
|
1086 |
+
Dynamics, 2021, 106(1): 707-723.
|
1087 |
+
[14] Guo W, Zhou Z, Chen C, et al. Multi-frequency weak signal detection based on
|
1088 |
+
multi-segment
|
1089 |
+
cascaded
|
1090 |
+
stochastic
|
1091 |
+
resonance
|
1092 |
+
for
|
1093 |
+
rolling
|
1094 |
+
bearings,
|
1095 |
+
Microelectronics Reliability, 2017, 75: 239-252.
|
1096 |
+
[15] Zhong S, Lv W, Ma H, et al. Collective stochastic resonance behavior in the
|
1097 |
+
globally coupled fractional oscillator, Nonlinear Dynamics, 2018, 94(2): 905-923.
|
1098 |
+
[16] Nicolis C, Nicolis G. Coupling-enhanced stochastic resonance, Physical Review
|
1099 |
+
E, 2017, 96(4): 042214.
|
1100 |
+
[17] Wadop Ngouongo Y J, Djolieu Funaye M, Djuidjé Kenmoé G, et al. Stochastic
|
1101 |
+
resonance in deformable potential with time-delayed feedback, Philosophical
|
1102 |
+
Transactions of the Royal Society A, 2021, 379(2192): 20200234.
|
1103 |
+
[18] Qiao Z, Shu X. Coupled neurons with multi-objective optimization benefit
|
1104 |
+
incipient fault identification of machinery, Chaos, Solitons and Fractals, 2021,
|
1105 |
+
145: 110813.
|
1106 |
+
[19] Petracchi D, Gebeshuber I C, DeFelice L J, et al. Stochastic resonance in
|
1107 |
+
biological systems, Chaos Solitons and Fractals, 2000, 11(12): 1819-1822.
|
1108 |
+
[20] Xu L, Yu T, Lai L, et al. Stochastic resonance and superharmonic resonance of a
|
1109 |
+
noisy confined overdamped bistable system, Communications in Nonlinear
|
1110 |
+
Science and Numerical Simulation, 2020, 83: 105133.
|
1111 |
+
[21] Liu J, Cao J, Wang Y, et al. Asymmetric stochastic resonance in a bistable system
|
1112 |
+
driven by non-Gaussian colored noise, Physica A, 2019, 517: 321-336.
|
1113 |
+
[22] Yang J, Sanjuan M A, Liu H, et al. Stochastic P-bifurcation and stochastic
|
1114 |
+
resonance in a noisy bastable fractional-order system, Communications in
|
1115 |
+
Nonlinear Science and Numerical Simulation, 2016, 41: 104-117.
|
1116 |
+
[23] Liu S, Sun Y, Kang Y. A novel E-exponential stochastic resonance model and
|
1117 |
+
weak signal detection method for steel wire rope, IEEE Transactions on Industrial
|
1118 |
+
Electronics, 2022, 69(7): 7428-7440.
|
1119 |
+
[24] Zhang G, Zhang Y, Zhang T, et al. Stochastic resonance in second-order
|
1120 |
+
|
1121 |
+
25 / 27
|
1122 |
+
|
1123 |
+
underdamped system with exponential bistable potential for bearing fault
|
1124 |
+
diagnosis, IEEE Access, 2018, 6: 42431-42444.
|
1125 |
+
[25] Monifi F, Zhang J, Qzdemir S K, et al. Optomechanically induced stochastic
|
1126 |
+
resonance and chaos transfer between optical fields, Nature Photonics, 2016,
|
1127 |
+
10(6): 399-405.
|
1128 |
+
[26] Cheng K, Wang P. Analysis of multiscale quantum harmonic oscillator algorithm
|
1129 |
+
based on a new multimode objective function[J]. IEEE Access, 2019, 7:
|
1130 |
+
46295-46305.
|
1131 |
+
[27] Hu G, Nicolis G, Nicolis C. Periodically forced Fokker-Planck equation and
|
1132 |
+
stochastic resonance, Physical Review A, 1990, 42(4): 2030.
|
1133 |
+
[28] Leng Y G, Leng Y S, Wang T Y, et al. Numerical analysis and engineering
|
1134 |
+
application of large parameter stochastic resonance, Journal of Sound and
|
1135 |
+
Vibration, 2006, 292(3-5): 788-801.
|
1136 |
+
[29] Bouzat S, Wio H S. Stochastic resonance in extended bistable systems: The role
|
1137 |
+
of potential symmetry, Physical Review E, 1999, 59(5): 5142.
|
1138 |
+
[30] Guo Y, Shen Y, Tan J. Stochastic resonance in a piecewise nonlinear model driven
|
1139 |
+
by multiplicative non-Gaussian noise and additive white noise, Communications
|
1140 |
+
in Nonlinear Science and Numerical Simulation, 2016, 38: 257-266.
|
1141 |
+
[31] Huang D, Yang J, Zhou D, et al. Recovering an unkonwn signal completely
|
1142 |
+
submegred in strong noise by a new stochastic resonance method,
|
1143 |
+
Communication in Nonlinear Science and Numerical Simulation, 2019, 66:
|
1144 |
+
156-166.
|
1145 |
+
[32] He C, Niu P, Yang R, et al. Incipient rolling element bearing weak fault feature
|
1146 |
+
extraction based on adaptive second-order stochastic resonance incorporated by
|
1147 |
+
mode decomposition, Measurement, 2019, 145: 687-701.
|
1148 |
+
[33] Zhang H, Yang T, Xu W, et al. Effects of non-Gaussian noise on logical stochastic
|
1149 |
+
resonance in a triple-well potential system, Nonlinear Dynamics, 2014, 76(1):
|
1150 |
+
649-656.
|
1151 |
+
[34] Gang H, Nicolis G, Nicolis C. Periodically forced Fokker-Planck equation and
|
1152 |
+
stochastic resonance, Physical Review A, 1990, 42(4): 2030.
|
1153 |
+
|
1154 |
+
26 / 27
|
1155 |
+
|
1156 |
+
[35] Jia Y, Yu S, Li J. Stochastic resonance in a bistable system subject to
|
1157 |
+
multiplicative and additive noise, Physical Review E, 2000, 62(2): 1869.
|
1158 |
+
[36] Wei S, Wang D, Peng Z, et al. Variational nonlinear component decomposition
|
1159 |
+
for fault diagnosis of planetary gearboxes under variable speed conditions,
|
1160 |
+
Mechanical Systems and Signal Processing, 2022, 162: 108016.
|
1161 |
+
[37] He Y, Fu Y, Qiao Z, et al. Chaotic resonance in a fractional-order oscillator
|
1162 |
+
system with application to mechanical fault diagnosis, Chaos, Solitons and
|
1163 |
+
Fractals, 2021, 142: 110536.
|
1164 |
+
[38] Yuan J, Wang Y, Peng Y, et al. Weak fault detection and health degradation
|
1165 |
+
monitoring using customized standard multiwavelets, Mechanical Systems and
|
1166 |
+
Signal Processing, 2017, 94: 384-399.
|
1167 |
+
[39] Qiao W, Lu D. A survey on wind turbine condition monitoring and fault
|
1168 |
+
diagnosis—Part II: Signals and signal processing methods, IEEE Transactions on
|
1169 |
+
Industrial Electronics, 2015, 62(10): 6546-6557.
|
1170 |
+
[40] He Z, Shao H, Ding Z, et al. Modified deep auto-encoder driven by multi-source
|
1171 |
+
parameters for fault transfer prognosis of aero-engine, IEEE Transactions on
|
1172 |
+
Industrial Electronics, 2022, 69(1): 845-855.
|
1173 |
+
[41] Wang T, Han Q, Chu F, et al. Vibration based condition monitoring and fault
|
1174 |
+
diagnosis of wind turbine planetary gearbox: A review, Mechanical Systems and
|
1175 |
+
Signal Processing, 2019, 126: 662-685.
|
1176 |
+
[42] Qiu H, Lee J, Lin J, et al. Wavelet filter-based weak signature detection method
|
1177 |
+
and its application on rolling element bearing prognostics, Journal of Sound and
|
1178 |
+
Vibration, 2006, 289(4-5): 1066-1090.
|
1179 |
+
[43] Tan J, Chen X, Wang J, et al. Study of frequency-shifted and re-scaling stochastic
|
1180 |
+
resonance and its application to fault diagnosis, Mechanical Systems and Signal
|
1181 |
+
Processing, 2009, 23(3): 811-822.
|
1182 |
+
[44] Liu Z, Jin Y, Zuo M J, et al. Time-frequency representation based on robust local
|
1183 |
+
mean decomposition for multi-component AM-FM signal analysis, Mechanical
|
1184 |
+
Systems and Signal Processing, 2017, 95: 468-487.
|
1185 |
+
[45] Smith J S. The local mean decomposition and its application to EEG perception
|
1186 |
+
|
1187 |
+
27 / 27
|
1188 |
+
|
1189 |
+
data, Journal of the Royal Society Interface, 2005, 2(5): 443-454.
|
1190 |
+
[46] Chen J, Li Z, Pan J, et al. Wavelet transform based on inner product in fault
|
1191 |
+
diagnosis of rotating machinery: A review, Mechanical Systems and Signal
|
1192 |
+
Processing, 2016, 70: 1-35.
|
1193 |
+
[47] Abbasion S, Rafsanjani A, Farshidianfar A, et al. Rolling element bearings
|
1194 |
+
multi-fault classification based on the wavelet denoising and support vector
|
1195 |
+
machine, Mechanical Systems and Signal Processing, 2007, 21(7): 2933-2945.
|
1196 |
+
[48] Antoni J. The infogram: Entropic evidence of the signature of repetitive transients,
|
1197 |
+
Mechanical Systems and Signal Processing, 2016, 74: 73-94.
|
1198 |
+
|
1199 |
+
|
1200 |
+
|
1201 |
+
|
1202 |
+
|
1203 |
+
|
1204 |
+
|
1205 |
+
|
1206 |
+
Zhejiang Provincial Key Laboratory of Part Rolling Technology
|
1207 |
+
|
1208 |
+
School of Mechanical Engineering and Mechanics • Ningbo University
|
1209 |
+
|
1210 |
+
Ningbo University
|
1211 |
+
|
1212 |
+
|
1213 |
+
July 24, 2022
|
1214 |
+
|
1215 |
+
RE: “Harmonic-Gaussian double-well potential stochastic resonance with its
|
1216 |
+
application to enhance weak fault characteristics of machinery” by Zijian Qiao, Shuai
|
1217 |
+
Chen, Zhihui Lai, Shengtong Zhou and Miguel A. F. Sanjuán (Manuscript Number:
|
1218 |
+
NODY-D-22-01167)
|
1219 |
+
|
1220 |
+
|
1221 |
+
|
1222 |
+
Dear Editor,
|
1223 |
+
|
1224 |
+
We have carefully revised our paper taking into account your suggestions and the
|
1225 |
+
comments of the reviewers. We have uploaded the revised version and the revision
|
1226 |
+
notes. Thank you very much for processing our paper.
|
1227 |
+
|
1228 |
+
We appreciate very much the constructive comments and suggestions provided by the
|
1229 |
+
reviewers. They have been incorporated in the revised version of this paper. Major
|
1230 |
+
changes made in the paper are marked in blue. The following summarizes our
|
1231 |
+
response to each point raised by each reviewer.
|
1232 |
+
|
1233 |
+
We would like to thank the three reviewers for their valuable comments and
|
1234 |
+
constructive suggestions to improve the quality of this paper. We have fully
|
1235 |
+
considered their comments and suggestions and made revisions accordingly. The
|
1236 |
+
major revisions are highlighted by BLUE color. The point-to-point explanations and
|
1237 |
+
revisions are listed as follow.
|
1238 |
+
|
1239 |
+
We have taken into full consideration all comments of the three referees and made a
|
1240 |
+
thorough revision of the paper.
|
1241 |
+
|
1242 |
+
|
1243 |
+
|
1244 |
+
Sincerely yours,
|
1245 |
+
|
1246 |
+
Zijian Qiao Ph.D
|
1247 |
+
Shuai Chen M.S.
|
1248 |
+
Zhihui Lai Ph.D
|
1249 |
+
Shengtong Zhou Ph.D
|
1250 |
+
Miguel A. F. Sanjuán Ph.D
|
1251 |
+
Cover Letter
|
1252 |
+
Click here to access/download;attachment to
|
1253 |
+
manuscript;Cover Letter.doc
|
1254 |
+
Click here to view linked References
|
1255 |
+
|
1256 |
+
波
|
1257 |
+
大
|
1258 |
+
漢
|
1259 |
+
Page 1 of 1
|
1260 |
+
Highlights
|
1261 |
+
|
1262 |
+
RE: “Harmonic-Gaussian double-well potential stochastic resonance with its application to
|
1263 |
+
enhance weak fault characteristics of machinery” by Zijian Qiao, Shuai Chen, Zhihui Lai,
|
1264 |
+
Shengtong Zhou and Miguel A. F. Sanjuán
|
1265 |
+
|
1266 |
+
Harmonic-Gaussian double-well potential SR is investigated by deriving and measuring
|
1267 |
+
the output SNR.
|
1268 |
+
Steady-state probability density functions are used to evaluate the transition rates of
|
1269 |
+
particles in the harmonic-Gaussian double-well potential.
|
1270 |
+
Parameter-induced SR, noise-induced SR and antiresonance are observed by analyzing
|
1271 |
+
the output SNR.
|
1272 |
+
Harmonic-Gaussian double-well potential SR is applied to enhance weak fault
|
1273 |
+
characteristics of machinery successfully.
|
1274 |
+
Highlights
|
1275 |
+
Click here to access/download;attachment to
|
1276 |
+
manuscript;Highlights.doc
|
1277 |
+
Click here to view linked References
|
1278 |
+
|
1279 |
+
Declaration of Interest Statement
|
1280 |
+
The authors declare that they have no conflict of interest.
|
1281 |
+
Declaration of Interest Statement
|
1282 |
+
Click here to access/download;attachment to
|
1283 |
+
manuscript;Declaration of Interest Statement.docx
|
1284 |
+
Click here to view linked References
|
1285 |
+
|
1286 |
+
Manuscript Number: NODY-D-22-01167R1
|
1287 |
+
Title: Harmonic-Gaussian double-well potential stochastic resonance with its application to enhance
|
1288 |
+
weak fault characteristics of machinery
|
1289 |
+
Response to Editor
|
1290 |
+
There are still some minor comments raised by one of the reviewers needed to be addressed. A minor
|
1291 |
+
revision is recommended.
|
1292 |
+
Response: We appreciate the constructive comments from two reviewers. According to their
|
1293 |
+
comments and suggestions, we have made a thorough revision for the manuscript and have addressed
|
1294 |
+
all points raised by each reviewer. The major changes made in the manuscript are marked in BLUE
|
1295 |
+
color. We also include the major changes of the manuscript into the response point by point. For
|
1296 |
+
convenient review, the page numbers or paragraph numbers of the revision in the manuscript are
|
1297 |
+
cited below.
|
1298 |
+
We hope that this revised submission is satisfactory. The authors thank editors and anonymous
|
1299 |
+
reviewers for their valuable and helpful comments to revise and improve our manuscript.
|
1300 |
+
Compressed File
|
1301 |
+
Click here to access/download;Compressed File;Response to
|
1302 |
+
Reviewers.docx
|
1303 |
+
|
1304 |
+
Manuscript Number: NODY-D-22-01167R1
|
1305 |
+
Title: Harmonic-Gaussian double-well potential stochastic resonance with its application to enhance
|
1306 |
+
weak fault characteristics of machinery
|
1307 |
+
Response to Reviewer #3
|
1308 |
+
The authors have correctly taken into consideration the reviewers comments.
|
1309 |
+
Response: Thanks for your recommendation.
|
1310 |
+
|
1311 |
+
|
1312 |
+
Manuscript Number: NODY-D-22-01167R1
|
1313 |
+
Title: Harmonic-Gaussian double-well potential stochastic resonance with its application to enhance
|
1314 |
+
weak fault characteristics of machinery
|
1315 |
+
Response to Reviewer #5
|
1316 |
+
The paper presents that the overdamped or underdamped harmonic Gaussian double-well potential
|
1317 |
+
SR methods characterize a better performance to detect a weak signal. The work is organized in a
|
1318 |
+
clear form, but the technical content looks not high and there are important aspects that are not
|
1319 |
+
discussed.
|
1320 |
+
1. Whether the analysis conclusion obtained is the conclusion under these special parameters or
|
1321 |
+
whether all parameters are applicable? Please give some explanations.
|
1322 |
+
Response: According to the comments of the reviewer #5, we think that two analysis conclusion
|
1323 |
+
obtained could be illustrated whether under these special parameters or all parameters.
|
1324 |
+
In Sections 2 and 3: Overdamped and underdamped harmonic-Gaussian double-well
|
1325 |
+
potential SR
|
1326 |
+
We investigate the SR in the cases of overdamped and underdamped harmonic-Gaussian
|
1327 |
+
double-well potential systems subjected to noise and a periodic signal. We derive and measure the
|
1328 |
+
analytic expression of the output signal-to-noise ratio (SNR) and the steady-state probability density
|
1329 |
+
(SPD) function under approximate adiabatic conditions. When the harmonic-Gaussian double-well
|
1330 |
+
potential loses its stability, we can observe the antiresonance phenomenon, whereas adding the
|
1331 |
+
damped factor into the overdamped system can change the stability of the harmonic-Gaussian
|
1332 |
+
double-well potential, resulting that the antiresonance behavior disappears in the underdamped
|
1333 |
+
system. Although above analysis conclusion is obtained under these special parameters, other
|
1334 |
+
parameters would depict the same findings. As a result, the analysis conclusion obtained in two
|
1335 |
+
|
1336 |
+
sections is applicable under all parameters.
|
1337 |
+
In Section 4: Application of harmonic-Gaussian double-well potential SR to enhance weak
|
1338 |
+
fault characteristics of machinery
|
1339 |
+
Harmonic-Gaussian double-well potential stochastic resonance is a typical nonlinear filter with the
|
1340 |
+
adjusting parameters in which the noise embedded in a signal is able to be utilized to enhance weak
|
1341 |
+
useful information by activating the stochastic resonance phenomenon. The stochastic resonance
|
1342 |
+
phenomenon could be activated when the optimal matching among the weak useful information,
|
1343 |
+
noise and these parameters of stochastic resonance. For a different signal, therefore, these parameters
|
1344 |
+
of the harmonic-Gaussian double-well potential stochastic resonance must be tuned to activate the
|
1345 |
+
stochastic resonance phenomenon for enhancing weak useful information by using noise. As a result,
|
1346 |
+
applying harmonic-Gaussian double-well potential stochastic resonance to enhance weak fault
|
1347 |
+
characteristics of machinery, these parameters of harmonic-Gaussian double-well potential stochastic
|
1348 |
+
resonance would be adjusted or optimized instead of all parameters are applicable to activate the
|
1349 |
+
optimal stochastic resonance phenomenon. (See the conclusion in Section 5 page 21, which is
|
1350 |
+
marked in BLUE)
|
1351 |
+
|
1352 |
+
2. "Noise is ubiquitous and unwanted in detecting weak signals", This sentence is repeated and can
|
1353 |
+
be deleted.
|
1354 |
+
Response: Thanks for your suggestions. We have deleted it in Abstract. (See the abstract in page 1,
|
1355 |
+
which is marked in BLUE)
|
1356 |
+
|
1357 |
+
|
1358 |
+
3 "Key words" write too long.
|
1359 |
+
Response: Thanks for your suggestions. We have reduced the key words as below: The benefits of
|
1360 |
+
noise, weak signature enhancement, fault identification, fault diagnosis. (See the key words in page 2,
|
1361 |
+
which is marked in BLUE)
|
1362 |
+
|
1363 |
+
4 "The recording duration is from February 12, 2004 10:32:39 to February 19, 2004 06:22:39".
|
1364 |
+
Why was it 18 years ago?
|
1365 |
+
Response: That is because Four Rexnord ZA-2115 double row bearing run-to-failure experiments
|
1366 |
+
under the rotating speed 2000 rpm and radial load 6000 lbs were performed in 2004 year. In future
|
1367 |
+
work, we would perform and conduct new bearing run-to-failure experiments. Now, our team is
|
1368 |
+
designing the new experimental platform and project to acquire new bearing and gear vibration data.
|
1369 |
+
Thanks for your understanding.
|
1370 |
+
|
1371 |
+
|
49E2T4oBgHgl3EQfOgYr/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
4NE0T4oBgHgl3EQfeQCD/content/2301.02388v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:3525913eea0d18c39cec2e721f87c36e2e17299085cf24c71daedcbe74cca666
|
3 |
+
size 4835472
|
4tE0T4oBgHgl3EQfegAX/content/2301.02390v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:d84be0bbea59cfe92b4cda9ee4373356888df5fc4bfd8adb61f15786162af0be
|
3 |
+
size 261179
|
4tE0T4oBgHgl3EQfegAX/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:105e3ded907e680dd154e5c625b6eace99d4544980fcb0282c9bd2adc86a5049
|
3 |
+
size 1114157
|
4tE0T4oBgHgl3EQfegAX/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:bbbf63601e1c3d717415e0dffd9a814e3102a129336e5820f8f7b8a546c57a52
|
3 |
+
size 45690
|
5dE2T4oBgHgl3EQf6wiO/content/tmp_files/2301.04203v1.pdf.txt
ADDED
@@ -0,0 +1,945 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
arXiv:2301.04203v1 [math.CV] 10 Jan 2023
|
2 |
+
ZERO DISTRIBUTION OF RANDOM BERNOULLI POLYNOMIAL MAPPINGS
|
3 |
+
TURGAY BAYRAKTAR & C¸˙I˘GDEM C¸EL˙IK
|
4 |
+
ABSTRACT. In this note, we study asymptotic zero distribution of multivariable full sys-
|
5 |
+
tem of random polynomials with independent Bernoulli coefficients. We prove that with
|
6 |
+
overwhelming probability their simultaneous zeros sets are discrete and the associated
|
7 |
+
normalized empirical measure of zeros asymptotic to the Haar measure on the unit torus.
|
8 |
+
1. INTRODUCTION
|
9 |
+
A random Kac polynomial on the complex plane is of the form
|
10 |
+
(1.1)
|
11 |
+
fd(z) =
|
12 |
+
d
|
13 |
+
�
|
14 |
+
j=0
|
15 |
+
ajzj
|
16 |
+
where the coefficients aj are independent copies of the (real or complex) standard Gauss-
|
17 |
+
ian. A classical result due to Kac, Hammersley and Shepp & Vanderbei [20, 16, 23] asserts
|
18 |
+
that almost surely the normalized empirical measure of zeros δZ(fd) := 1
|
19 |
+
d
|
20 |
+
�
|
21 |
+
fd(ζ)=0 δζ, con-
|
22 |
+
verges to normalized arc length measure on S1 := {|z| = 1} as d → ∞. Asymptotic
|
23 |
+
zero distribution of Kac polynomials with i.i.d. discrete random coefficients have also
|
24 |
+
been studied extensively (see eg. [22, 14]). More recently, Ibragimov and Zaporozhets
|
25 |
+
[19] proved that the empirical measure of zeros δZ(fd) almost surely converges to the the
|
26 |
+
normalized arc length measure if and only if the moment condition E[log(1 + |ai|)] < ∞
|
27 |
+
holds. This property can be considered as a global universality property of the zeros of
|
28 |
+
random polynomials (see also [27] for a local version).
|
29 |
+
Building upon the work of Shiffman and Zelditch [26], equilibrium distribution of
|
30 |
+
random systems of polynomials with Gaussian coefficients was obtained by Bloom &
|
31 |
+
Shiffman [9] and Shiffman [24]. More recently, these results were generalized for inde-
|
32 |
+
pendent identically distributed (i.i.d.) random coefficients with bounded density [1, 2].
|
33 |
+
We refer the reader to the survey [4] and references therein for the state of the art. On
|
34 |
+
the other hand, asymptotic zero distribution of random polynomial mappings with dis-
|
35 |
+
crete random coefficients remained open (cf. [3, 8, 5]). In this note, we study asymptotic
|
36 |
+
zero distribution of multivariable full system of random polynomials with independent
|
37 |
+
Bernoulli coefficients.
|
38 |
+
1.1. Statement of the results. A random Bernoulli polynomial is of the form
|
39 |
+
fd,i(x) =
|
40 |
+
�
|
41 |
+
|J|≤d
|
42 |
+
αi,JxJ ∈ C [x1, . . . , xn]
|
43 |
+
T.B. and C¸.C¸. are partially supported by T¨UB˙ITAK grant ARDEB-1001/119F184.
|
44 |
+
1
|
45 |
+
|
46 |
+
where xJ = xj1
|
47 |
+
1 . . . xjn
|
48 |
+
n and αi,J are ±1 Bernoulli random variables. Throughout this work,
|
49 |
+
we consider systems (fd,1, . . . , fd,n) of random Bernoulli polynomials with independent
|
50 |
+
coefficients. We write f d = (fd,1, . . . , fd,n) for short. We denote the collection of all
|
51 |
+
systems of polynomials in n variables and of degree d by Polyn,d that is endowed with
|
52 |
+
the product probability measure Probd.
|
53 |
+
Theorem 1.1. Let f d = (fd,1, . . . , fd,n) be a system of random polynomials with independent
|
54 |
+
±1 valued Bernoulli coefficients. Then there exists a dimensional constant K = K(n) >
|
55 |
+
0 and an exceptional set En,d ⊂ Polyn,d such that Probd(En,d) ≤ K/d and for all f d ∈
|
56 |
+
Polyn,d(A)\En,d the simultaneous solutions of the system f d are isolated with #Z(f d) = dn.
|
57 |
+
For a system f d ∈ Polyn,d, if the simultaneous zeros Z(f d) are isolated we denote
|
58 |
+
the corresponding normalized empirical measure by δZ(f d). That is δZ(fd) is a probabil-
|
59 |
+
ity measure supported on the isolated zeros. We also let νHaar denote the Haar measure
|
60 |
+
of (S1)n of total mass 1. As an application of Theorem 1.1 together with a determinis-
|
61 |
+
tic equidistribution result [13, Theorem 1.7], we obtain asymptotic zero distribution of
|
62 |
+
random Bernoulli polynomial mappings:
|
63 |
+
Corollary 1.2. Let f d = (fd,1, . . . , fd,n) be system of random polynomials with independent
|
64 |
+
±1 valued Bernoulli coefficients and En,d ⊂ Polyn,d be as in Theorem 1.1. Then for each
|
65 |
+
sequence f d ∈ Polyn,d \ En,d we have
|
66 |
+
lim
|
67 |
+
d→∞ δZ(fd) = νHaar.
|
68 |
+
in weak topology. In particular, δZ(f d) → νHaar in probability Probd as d → ∞.
|
69 |
+
Finally, we consider the measure valued random variables
|
70 |
+
(1.2)
|
71 |
+
�Z(f d) =
|
72 |
+
��
|
73 |
+
ξi∈Z(f d) δ(ξi)
|
74 |
+
for f d ∈ Polyn,d \ En,d
|
75 |
+
0
|
76 |
+
otherwise.
|
77 |
+
and define the expected zero measure by
|
78 |
+
(1.3)
|
79 |
+
�
|
80 |
+
E[ �Z(f d)], ϕ
|
81 |
+
�
|
82 |
+
=
|
83 |
+
�
|
84 |
+
P olyn,d\En,d
|
85 |
+
�
|
86 |
+
ξi∈Z(f d)
|
87 |
+
ϕ(ξi) dProbd(f d)
|
88 |
+
where ϕ is a continuous function with compact support in Cn and En,d denote the excep-
|
89 |
+
tional set given by Theorem 1.1.
|
90 |
+
Theorem 1.3. Let f d = (fd,1, . . . , fd,n) be a system of random polynomials with independent
|
91 |
+
±1 valued Bernoulli coefficients. Then
|
92 |
+
lim
|
93 |
+
d→∞ d−nE[Z(f d)] = νHaar
|
94 |
+
in weak topology.
|
95 |
+
The outline of this work as follows. In §2, we introduce some algebraic background
|
96 |
+
on resultants. In particular, we recall multi-polynomial resultant and sparse resultant for
|
97 |
+
polynomial systems [15, 11] as well as directional resultant [12]. In §3, we prove the
|
98 |
+
main result Theorem 1.1. Finally, in §4 we prove Theorem 1.3.
|
99 |
+
2
|
100 |
+
|
101 |
+
2. PRELIMINARIES
|
102 |
+
In this section, we collect some basic facts and algebraic background related to our
|
103 |
+
results. More precisely, we discuss the multi-homogenous (classical) resultant and the
|
104 |
+
sparse eliminant as well as the relation of these two notions. For a detailed account of the
|
105 |
+
subject and proofs we refer the reader to [15, 11]. We also discuss the sparse resultant
|
106 |
+
introduced by D’Andrea and Sombra, and corresponding directional sparse resultants
|
107 |
+
[13, 12].
|
108 |
+
2.1. Lattice points, polytopes. For a nonempty subset P ⊂ Rn, we denote its convex
|
109 |
+
hull in Rn by conv(P). For two nonempty convex sets Q1, Q2, their Minkowski sum is
|
110 |
+
defined as
|
111 |
+
Q1 + Q2 := {q1 + q2 : q1 ∈ Q1, q2 ∈ Q2}
|
112 |
+
and for λ ∈ R, the scaled polytope is of the form
|
113 |
+
λQ := {λq : q ∈ Q}.
|
114 |
+
It is well known that V oln(d1Q1 + . . . + dnQn) is a homogenous polynomial of degree n in
|
115 |
+
the variables d1, . . . , dn ∈ Z+ where V oln denotes the normalized volume of the subsets
|
116 |
+
in Rn with respect to the Lebesgue measure. The coefficient of the monomial d1 . . . dn
|
117 |
+
is called the mixed volume of Q1, . . . , Qn and denoted by MV (Q1, . . . , Qn). One can use
|
118 |
+
the polarization formula to compute the mixed volume of the convex sets Q1, . . . , Qn.
|
119 |
+
Namely,
|
120 |
+
MVn(Q1, . . . , Qn) =
|
121 |
+
n
|
122 |
+
�
|
123 |
+
k=1
|
124 |
+
�
|
125 |
+
1≤j1≤...≤jk≤n
|
126 |
+
(−1)n−kV oln(Qj1 + . . . + Qjk).
|
127 |
+
In particular, if Q = Q1 = . . . = Qn then
|
128 |
+
MVn(Q) := MVn(Q, . . . , Q) = n!V oln(Q).
|
129 |
+
For a convex set Q ⊂ Rn its support function sQ : Rn → R is defined by
|
130 |
+
(2.1)
|
131 |
+
sQ(v) := inf
|
132 |
+
q∈Q ⟨q, v⟩
|
133 |
+
where ⟨·, ·⟩ represents the Euclidean inner product of Rn. Then the equation
|
134 |
+
⟨q, v⟩ = sQ(v)
|
135 |
+
defines supporting hyperplane of Q and v is called an inward pointing normal. The inter-
|
136 |
+
section of Q with the supporting hyperplane in the direction v ∈ Rn is denoted by
|
137 |
+
(2.2)
|
138 |
+
Qv := {q ∈ Q : ⟨q, v⟩ = sQ(v)}.
|
139 |
+
Qv is called the face of Q determined by v. If Qv has codimension 1, it is called a facet of
|
140 |
+
Q.
|
141 |
+
3
|
142 |
+
|
143 |
+
2.2. Resultant of polynomial systems.
|
144 |
+
2.2.1. Multipolynomial Resultant. We consider homogenous polynomials of degree di
|
145 |
+
Fi(t0, . . . , tn) =
|
146 |
+
�
|
147 |
+
|J|=di
|
148 |
+
ui,JtJ
|
149 |
+
for i = 0, . . . , n where J is a multi-index (j0, . . . , jn) and tJ indicates the monomial
|
150 |
+
tj0
|
151 |
+
0 · · · tjn
|
152 |
+
n which is of degree |J| = �n
|
153 |
+
i=0 ji. One can see that the homogenous polynomi-
|
154 |
+
als of degree di form an affine space by identifying �
|
155 |
+
|J|=di ui,JtJ with point (ui,J)|J|=di ∈
|
156 |
+
CN(di), where N(di) =
|
157 |
+
�n+di−1
|
158 |
+
n−1
|
159 |
+
�
|
160 |
+
.
|
161 |
+
Letting N := �n
|
162 |
+
i=0 N(di), recall that the incidence variety is defined by
|
163 |
+
W =
|
164 |
+
�
|
165 |
+
(a, t) ∈ CN × Pn : F0(a0, t) = · · · = Fn(an, t) = 0
|
166 |
+
�
|
167 |
+
.
|
168 |
+
We let π : CN × Pn → CN be the projection onto first coordinate. By Projective Extension
|
169 |
+
Theorem (see eg. [11]) the image π(W) forms a variety in the affine space CN.
|
170 |
+
Definition 2.1. The multipolynomial resultant Resd0,...,dn is defined as the irreducible unique
|
171 |
+
(up to a sign) polynomial in Z[a0, . . . , an] which is the defining equation of the variety π(W).
|
172 |
+
The resultant of the homogeneous polynomials F0, . . . , Fn is the evaluation of Resd0,...,dn at
|
173 |
+
the coefficients of F0, . . . , Fn and it is denoted by Resd0,...,dn(F0, . . . , Fn).
|
174 |
+
Note that if d0 = . . . = dn = 1, then the evaluation of multipolynomial resultant
|
175 |
+
Resd0,...,dn at the coefficients of F0, . . . , Fn is the determinant of the coefficient matrix. For
|
176 |
+
more general cases, we have the following result:
|
177 |
+
Theorem 2.2 ([15],[11]). Let F0, . . . , Fn ∈ C[x0, . . . , xn] be homogenous polynomials of
|
178 |
+
positive total degrees d0, . . . , dn. Then the system F0 = . . . = Fn = 0 has a solution in the
|
179 |
+
complex projective space Pn if and only if Resd0...,dn(F0, . . . , Fn) = 0.
|
180 |
+
Theorem 2.2 gives a characterization to determine the existence of nontrivial solutions
|
181 |
+
for the systems of homogenous polynomials based on the coefficients of the polynomials
|
182 |
+
in the system. However, not all the systems of equations are homogenous, and in the
|
183 |
+
power series expansions not all the monomial terms appear. Hence, we need to introduce
|
184 |
+
a more general version of the multi-homogenous resultant.
|
185 |
+
2.2.2. Sparse Eliminant. Following [15], we will recall the definition of sparse resultant.
|
186 |
+
Let A0, . . . , An be a non-empty finite subsets of Zn, and let ui = {ui,a}a∈Ai be a group of
|
187 |
+
#Ai variables, i = 0, . . . , n and set u = {u0, . . . , un} . For each i, the general Laurent
|
188 |
+
polynomial fi with support supp(fi) = Ai given by
|
189 |
+
f(x) =
|
190 |
+
�
|
191 |
+
a∈Ai
|
192 |
+
ui,axa ∈ C[u][x±1
|
193 |
+
1 , . . . , x±1
|
194 |
+
n ].
|
195 |
+
We let A = (A0, . . . , An) and consider the incidence variety in this setting defined by
|
196 |
+
(2.3)
|
197 |
+
WA =
|
198 |
+
�
|
199 |
+
(u, x) ∈
|
200 |
+
n
|
201 |
+
�
|
202 |
+
i=0
|
203 |
+
P(CAi) × (C∗)n : f0(ui, x) = · · · = fn(un, x) = 0
|
204 |
+
�
|
205 |
+
.
|
206 |
+
4
|
207 |
+
|
208 |
+
Consider the canonical projection on the first coordinate
|
209 |
+
πA :
|
210 |
+
n
|
211 |
+
�
|
212 |
+
i=0
|
213 |
+
P(CAi) × (C∗)n →
|
214 |
+
n
|
215 |
+
�
|
216 |
+
i=0
|
217 |
+
P(CAi)
|
218 |
+
and let πA(WA) denote the Zariski closure of WA under the projection π.
|
219 |
+
Definition 2.3. The sparse eliminant, denoted by ResA, is defined as follows: if the variety
|
220 |
+
πA(WA) has codimension 1, then the sparse eliminant is the unique (up to sign) irreducible
|
221 |
+
polynomial in Z[u] which is the defining equation of πA(WA). If codim(πA(WA)) ≥ 2, then
|
222 |
+
ResA is defined to be the constant polynomial 1. The expression
|
223 |
+
ResA(f0, . . . , fn)
|
224 |
+
is the evaluation of ResA at the coefficients of f0, . . . , fn.
|
225 |
+
Example 2.4. For A0 = {0} , A1 = {0, 1} ⊂ Z, we have that ResA0,A1 = ±u00.
|
226 |
+
The classical resultant Resd0,...,dn is the special case of the sparse eliminant. Indeed, let
|
227 |
+
Ai be the set of all integer points in the di-simplex, i.e., Ai = diΣn ∩ Zn and Σn is the
|
228 |
+
standard unit simplex, that is,
|
229 |
+
diΣn := {(a0, . . . , an) ∈ Rn+1 : aj ≥ 0,
|
230 |
+
�
|
231 |
+
j
|
232 |
+
aj ≤ di}.
|
233 |
+
Following [11] and [15], for simplicity let all the sparse polynomials f0, . . . , fn have the
|
234 |
+
same support Ad = dΣn ∩ Zn for some positive integer d and consider the system
|
235 |
+
(2.4)
|
236 |
+
|
237 |
+
|
238 |
+
|
239 |
+
f0 = u01xα1 + . . . + u0dxαn = 0
|
240 |
+
...
|
241 |
+
fn = un1xα1 + . . . + undxαn = 0
|
242 |
+
We also let t0, . . . , tn be the homogenous coordinates which are related to x1, . . . , xn by
|
243 |
+
xi = ti/t0. Then we define the homogenous polynomials
|
244 |
+
(2.5)
|
245 |
+
Fi(t0, . . . , tn) = td
|
246 |
+
0fi(t1/t0, . . . , tn/t0) = td
|
247 |
+
0fi(x1, . . . , xn),
|
248 |
+
for 0 ≤ i ≤ n. This method gives n+1 homogenous polynomials of total degree d in
|
249 |
+
the variables t0, . . . , tn and this procedure is independent of the choice of homogeneous
|
250 |
+
coordinates.
|
251 |
+
Proposition 2.5 ([11]). Let Ad = dΣn ∩Zn and consider the systems of polynomials F and
|
252 |
+
f as above. Then
|
253 |
+
ResA(f0, . . . , fn) = ±Resd,...,d(F0, . . . , Fn),
|
254 |
+
where A = (Ad, . . . , Ad).
|
255 |
+
Using the above proposition, we can give a version of Theorem 2.2 as follows.
|
256 |
+
5
|
257 |
+
|
258 |
+
Corollary 2.6. Let f = (f1, . . . , fn) be a system of polynomials with supp(fi) = Ad for
|
259 |
+
i = 1, . . . , n. Assume that the system F = (F0, . . . , Fn) consists the homogenizations of fi
|
260 |
+
according to process in (2.5) and denote the set of simultaneous nonzero solutions of F by
|
261 |
+
Z(F ). Suppose that Z(F ) ∩ H∞(t0) = ∅ where H∞(t0) is the hyperplane at infinity for t0 =
|
262 |
+
0. Then the system of polynomials f = 0 has no solution if and only if ResAd(f0, . . . , fn) ̸= 0.
|
263 |
+
Proof. If ResAd(f0, . . . , fn) ̸= 0, then by definition of the sparse resultant the system
|
264 |
+
f0(x) = . . . = fn(x) = 0
|
265 |
+
has no solution. Conversely, letting Fi be the homogenization of fi as in (2.5) with the
|
266 |
+
corresponding variable t = (t0, . . . , tn), i.e. Fi(t) = td
|
267 |
+
0fi(x). If the system of polynomials
|
268 |
+
f = 0 has no solution then Fi(t) = 0 for i = 1, . . . , n if and only if t0 = 0 which contradicts
|
269 |
+
our assumption. Hence, by Theorem 2.2 we have
|
270 |
+
±ResAd(f0, . . . , fn) = Resd0,...,dn(F0, . . . , Fn) ̸= 0.
|
271 |
+
□
|
272 |
+
2.2.3. Sparse Resultant. In spite of being a generalization of the multipolynomial resul-
|
273 |
+
tant and involving considerable large amount of the system of polynomials, the sparse
|
274 |
+
eliminant does not satisfy some essential properties which is necessary in many applica-
|
275 |
+
tions, such as additivity property and Poisson formula. In 2014, D’Andrea and Sombra
|
276 |
+
[12] introduced the following version of the sparse resultant which has the desired fea-
|
277 |
+
tures.
|
278 |
+
Definition 2.7. The sparse resultant, denoted by ResA, is defined as any primitive poly-
|
279 |
+
nomial in Z[u] that is the defining equation of the direct image of WA, (πA)∗(WA) =
|
280 |
+
deg(πA|WA)πA(WA) if this variety has codimension one, and otherwise we set ResA = 1.
|
281 |
+
The expression
|
282 |
+
ResA(f0, . . . , fn)
|
283 |
+
is the evaluation of ResA at the coefficients of f0, . . . , fn.
|
284 |
+
According to this definition, the sparse resultant is not irreducible but it is a power of
|
285 |
+
the irreducible sparse eliminant, i.e.,
|
286 |
+
ResA = ±Res
|
287 |
+
deg(πA|WA)
|
288 |
+
A
|
289 |
+
where deg(πA|WA) is the degree of the projection πA. We also remark that ResA ̸= 1
|
290 |
+
whenever ResA ̸= 1. For more details we refer the reader to the manuscripts [12] and
|
291 |
+
[13].
|
292 |
+
Example 2.8. Let A0 = A1 = A2 = {(0, 0), (2, 0), (0, 2)}. Then ResA = det(ui,j) and
|
293 |
+
ResA = ±[det(ui,j)]4.
|
294 |
+
6
|
295 |
+
|
296 |
+
2.2.4. Directional Resultant. For a subset B ⊂ Zn and a polynomial f(x) = �
|
297 |
+
b∈B βbxb
|
298 |
+
with support B, we write
|
299 |
+
Bv := {b ∈ B : ⟨b, v⟩ = sQ(v)}
|
300 |
+
and
|
301 |
+
f v(x) =
|
302 |
+
�
|
303 |
+
b∈Bv
|
304 |
+
βbxb
|
305 |
+
where Q = conv(B) and v ∈ Rn and sconv(B)(v) is defined as equation (2.1).
|
306 |
+
Definition 2.9. Let A1, . . . , An ⊂ Zn be a family of n non-empty finite subsets, v ∈ Zn\{0},
|
307 |
+
and v⊥ ⊂ Rn the orthogonal subspace. Then there exists bi,v ∈ Zn such that
|
308 |
+
Av
|
309 |
+
i − bi,v ⊂ Zn ∩ v⊥
|
310 |
+
for i = 1, . . . , n. The resultant of A1, . . . , An in the direction of v, denoted ResAv
|
311 |
+
1 ,...,Avn is
|
312 |
+
defined as the resultant of the family of the finite subsets Av
|
313 |
+
i − bi,v.
|
314 |
+
Let fi ∈ C[x±1
|
315 |
+
1 , . . . , x±1
|
316 |
+
n ] be Laurent polynomials with support supp(fi) ⊂ Ai i = 1, . . . , n.
|
317 |
+
For each i = 1, . . . , n, we write f v
|
318 |
+
i = xbi,vgi,v for a Laurent polynomial gi,v ∈ C[Zn ∩ v⊥] ≃
|
319 |
+
C[y±1
|
320 |
+
1 , . . . , y±1
|
321 |
+
n−1] with supp(gi,v) ⊂ Av
|
322 |
+
i − bi,v. The expression
|
323 |
+
ResAv
|
324 |
+
1 ,...,Avn(f v
|
325 |
+
1 , . . . , f v
|
326 |
+
n)
|
327 |
+
is defined as the evaluation of this resultant at the coefficients of the gi,v.
|
328 |
+
We remark that the definition of directional resultant is independent of the choice of
|
329 |
+
the vector bi,v (see [12, Proposition 3.3]). Moreover, the directional resultant ResAv
|
330 |
+
1 ,...,Avn ̸=
|
331 |
+
1 only if the direction vector v is an inward pointing normal to a facet of the Minkowski
|
332 |
+
sum �n
|
333 |
+
i=1 conv(Ai). Therefore, the nontrivial directional resultants of the family A1, . . . , An
|
334 |
+
is finitely many.
|
335 |
+
Example 2.10. Let f(x) = a0 + . . . + anxn ∈ C[x] be a polynomial of degree n. Then the
|
336 |
+
nontrivial directional resultants are
|
337 |
+
ResA(f v) =
|
338 |
+
�
|
339 |
+
±a0
|
340 |
+
if
|
341 |
+
v = 1,
|
342 |
+
±an
|
343 |
+
if
|
344 |
+
v = −1
|
345 |
+
for the polytope conv(A) = [0, n] ⊂ R.
|
346 |
+
3. EQUIDISTRIBUTION OF ZEROS
|
347 |
+
3.1. Random Polynomial Systems. First, we recall a theorem of Kozma and Zeitouni
|
348 |
+
[21] asserts that overdetermined random Bernoulli polynomial systems have no common
|
349 |
+
zeros with overwhelming probability:
|
350 |
+
Theorem 3.1. Let f1, . . . , fn+1 ∈ Z[x1, . . . , xn] be n + 1 independent random Bernoulli
|
351 |
+
polynomials of degree d and
|
352 |
+
P(d, n) := Probd{∃x ∈ Cn : fi(x) = 0 for i = 1 . . . , n + 1}
|
353 |
+
denote the probability that the system f1 = . . . = fn+1 = 0 has a common solution. Then
|
354 |
+
there exists a dimensional constant K = K(n) < ∞ such that
|
355 |
+
P(d, n) ≤ K/d
|
356 |
+
7
|
357 |
+
|
358 |
+
for all d ∈ Z+.
|
359 |
+
Next, we prove our main result:
|
360 |
+
Proof of Theorem 1. Let fd,i be a random Bernoulli polynomial of the form
|
361 |
+
(3.1)
|
362 |
+
fd,i =
|
363 |
+
�
|
364 |
+
|J|≤d
|
365 |
+
αi,JxJ ∈ Z[x1, . . . , xn],
|
366 |
+
where {αi,J} is a family of independent Bernoulli random variables for i = 1, . . . , n.
|
367 |
+
We investigate the directional resultants of the system f for all nonzero primitive di-
|
368 |
+
rection vectors v ∈ Zn. By [12, Proposition 3.3] it is enough to check the inward normals
|
369 |
+
to the Minkowski sum of the supports ndΣn which has n + 1 facets with n + 1 inward
|
370 |
+
normals given by vm = em for m = 1, . . . , n and vn+1 = − �n
|
371 |
+
m=1 em where {em}n
|
372 |
+
m=1 is
|
373 |
+
the standard basis of Rn.
|
374 |
+
For vm = em the intersection of a support A with the supporting hyperplane in the
|
375 |
+
direction em is of the form
|
376 |
+
(3.2)
|
377 |
+
Avm =
|
378 |
+
�
|
379 |
+
(j1, . . . , jn) ∈ A : jm = 0,
|
380 |
+
n
|
381 |
+
�
|
382 |
+
l=1
|
383 |
+
jl ≤ d
|
384 |
+
�
|
385 |
+
m = 1, . . . , n. Hence, the polynomials f vm
|
386 |
+
i
|
387 |
+
can be written as
|
388 |
+
(3.3)
|
389 |
+
f vm
|
390 |
+
i
|
391 |
+
:=
|
392 |
+
�
|
393 |
+
J∈Avm
|
394 |
+
αi,JxJ
|
395 |
+
for i = 1, . . . , n. Note that polynomials f vm
|
396 |
+
i
|
397 |
+
depend on n − 1 variables. Following the
|
398 |
+
Definition 2.9, if we choose the vector bi,vm = 0 such that Avm − bi,vm ⊂ Zn ∩ vm⊥,
|
399 |
+
we see that the functions gi,vm := f vm
|
400 |
+
i
|
401 |
+
satisfies the equation f vm
|
402 |
+
i
|
403 |
+
= xbi,vmgi,vm for each
|
404 |
+
i = 1, . . . , n.
|
405 |
+
Recall that for two univariate polynomials h1, h2 ∈ C[x], their resultant Res(h1, h2) is
|
406 |
+
zero if and only if h1 and h2 have a common solution in C. Therefore, if n = 2 the
|
407 |
+
necessary and sufficient condition for g1,vm and g2,vm have zero resultant is that they
|
408 |
+
have a common zero. Theorem 3.1 implies that there exists a constant Km which is
|
409 |
+
independent of d so that the aforementioned event has probability at most Km/d.
|
410 |
+
On the other hand, when n > 2, we perform the homogenization process to each (n−1)
|
411 |
+
variable polynomial gi,vm for i = 1, . . . , n as described in equation (2.5). We obtain the n
|
412 |
+
variable homogenous polynomials Gi,vm of the form
|
413 |
+
(3.4)
|
414 |
+
Gi,vm(t, x) =
|
415 |
+
�
|
416 |
+
J∈Avm
|
417 |
+
αi,Jtd−|J|xJ.
|
418 |
+
In order to compare the sparse resultant of the polynomials gi,vm and the multipolynomial
|
419 |
+
resultant of the homogeneous polynomials Gi,vm, we check the conditions of Corollary
|
420 |
+
2.6. Let Z(G) be the set of nontrivial solutions of the system G = (G1,vm, . . . , Gn,vm)
|
421 |
+
and suppose that G has a solution ξ = (t, ξ2, . . . , ξn) in the hyperplane at infinity H∞(t).
|
422 |
+
Evaluating these homogeneous polynomials at t = 0, we obtain the top degree homoge-
|
423 |
+
neous part of the polynomials gi,vm for i = 1, . . . , n. Since ξ ∈ H∞(t), it has a nonzero
|
424 |
+
coordinate ξk for some k ∈ {2, . . . , n}. For simplicity, let us assume k = 2 and define the
|
425 |
+
8
|
426 |
+
|
427 |
+
new variables zi := ξi+2/ξ2 for i = 1, . . . , n − 2. Applying this change of variables, we
|
428 |
+
obtained
|
429 |
+
(3.5)
|
430 |
+
�Gi,vm(z1, . . . , zn−2) =
|
431 |
+
�
|
432 |
+
|J|≤d
|
433 |
+
αi,Jzϕ(J)
|
434 |
+
where ϕ : Rn → Rn−2 with ϕ(j1, . . . , jn) = (j3, . . . , jn). This gives n random Bernoulli
|
435 |
+
polynomials of degree d in n − 2 variables. Hence by Theorem 3.1, there exists a pos-
|
436 |
+
itive constant Ci, depending only the dimension n such that the probability that the
|
437 |
+
overdetermined system of Bernoulli polynomials �Gi,vm(z1, . . . , zn−2) have a common so-
|
438 |
+
lution is less than Ci/d. We infer that the system of homogenized polynomials Gi,vm
|
439 |
+
has no common zero at hyperplane at infinity H∞(t) except a set that has probability
|
440 |
+
at most Ci/d. Then by Corollary 2.6, outside of a set of small probability, the system of
|
441 |
+
polynomials consisting gi,vm has a common solution if and only if the directional resul-
|
442 |
+
tant ResAvm
|
443 |
+
1
|
444 |
+
,...,Avn(f v
|
445 |
+
1 , . . . , f v
|
446 |
+
n ) = 0. Now, since the system of Bernoulli polynomials gi,vm
|
447 |
+
contains n polynomials in n − 1 variables, by Theorem 3.1, there is a dimensional con-
|
448 |
+
stant ˜Ci so that the probability that this system has common solution is at most ˜Ci/d.
|
449 |
+
Hence outside of a set that has probability Ki/d := Ci/d + ˜Ci/d , the directional resultant
|
450 |
+
ResAvmf vm
|
451 |
+
d
|
452 |
+
̸= 0 for all vm for m = 1, . . . , n.
|
453 |
+
Next, for the inward normal vector vn+1 = − �n
|
454 |
+
m=1 em, we find the minimal weight in
|
455 |
+
this direction as Avn+1 = {J ∈ A : |J| = d}. Hence the polynomials in this directions are
|
456 |
+
of the form
|
457 |
+
(3.6)
|
458 |
+
f vn+1
|
459 |
+
i
|
460 |
+
=
|
461 |
+
�
|
462 |
+
|J|=d
|
463 |
+
αi,JxJ
|
464 |
+
In this case Avn+1 is not a subspace of Zn ∩ v⊥
|
465 |
+
n+1, hence we need to translate it by sub-
|
466 |
+
tracting a suitable vector bi,vn+1. For Laurent polynomial systems, the sparse resultant is
|
467 |
+
invariant under translations of supports (see [12], Proposition 3.3). Since the polynomi-
|
468 |
+
als fd,i are not Laurent, we need to determine the effects of this translations. Consider
|
469 |
+
the system of Bernoulli polynomials f d and set of its simultaneous zeros Z(f d). For a
|
470 |
+
solution x = (x1, . . . , xn) ∈ Z(f d) and assume that x1 = 0. In order to examine the
|
471 |
+
incidence of this case, we evaluate the system f d at x1 = 0 and we obtain a new system
|
472 |
+
of n Bernoulli polynomials with n − 1 variables. By Theorem 3.1, there exists a constant
|
473 |
+
C1 which is independent of d such that this system has a common solution with proba-
|
474 |
+
bility at most C1/d. Therefore the probability of the event that x1 = 0 is less than C1/d.
|
475 |
+
Hence there is no harm of translation of supports outside of a set that has probability at
|
476 |
+
most C/d, where C := �n
|
477 |
+
i=1 Ci. Now, choosing the vector bi,vn+1 = (d, 0, . . . , 0) so that
|
478 |
+
Avn+1 − bi,vn+1 ⊂ Zn ∩ v⊥
|
479 |
+
n+1, we obtain the polynomials of the form
|
480 |
+
(3.7)
|
481 |
+
gi,vn+1 =
|
482 |
+
�
|
483 |
+
J∈Avn+1−bi,vn+1
|
484 |
+
αi,Jxw(J)
|
485 |
+
with w : Rn → Rn satisfying (j1, j2, . . . , jn) �→ (−d + j1, j2, . . . , jn). We substitute the new
|
486 |
+
variables yi := xi+1/x1 into gi,vn+1, i = 1, . . . , n − 1 and obtain
|
487 |
+
9
|
488 |
+
|
489 |
+
(3.8)
|
490 |
+
gi,vn+1(y) =
|
491 |
+
�
|
492 |
+
|J|≤d
|
493 |
+
αi,Jyσ(J)
|
494 |
+
for y ∈ Cn−1 and σ : Rn → Rn with σ(j1, j2, . . . , jn) = (0, j2, . . . , jn). The system con-
|
495 |
+
taining the polynomials gi,vn+1(y), i = 1, . . . , n contains n random Bernoulli polynomials
|
496 |
+
with n − 1 random variable as in the cases vm = em. By applying the same steps, it can
|
497 |
+
be shown that ResAvn+1f vn+1
|
498 |
+
d
|
499 |
+
̸= 0 outside of a set that has probability at most Ki+1/d.
|
500 |
+
Now, we define the exceptional set En,d as a subset of Polyn,d which contains the sys-
|
501 |
+
tems f d that has a zero directional resultant for some nonzero primitive vector v or the
|
502 |
+
systems f d have a common solution x ∈ Cn with xi = 0 for some i = 1, . . . , n. More
|
503 |
+
precisely, letting
|
504 |
+
En,d := {f d ∈ Polyn,d : ∃ v ∈ Zn \ {0} ∋ ResAvf v
|
505 |
+
d = 0}
|
506 |
+
(3.9)
|
507 |
+
�
|
508 |
+
{f d ∈ Polyn,d : ∃ x ∈ Z(f d) ∋
|
509 |
+
�
|
510 |
+
xi = 0}.
|
511 |
+
we see that there exists a positive constant K which is independent of d such that
|
512 |
+
Prob{En,d} ≤ d−1K
|
513 |
+
where K := �n+1
|
514 |
+
i=1 Ki + C.
|
515 |
+
□
|
516 |
+
Next, we recall a deterministic equidistribution results for the solutions of systems of
|
517 |
+
integer coefficient polynomials [13]. For a polynomial f ∈ C[x1, . . . , xn], the supremum
|
518 |
+
norm of f on the unit torus is defined as
|
519 |
+
∥f∥sup :=
|
520 |
+
sup
|
521 |
+
|w1|=...=|wn|=1
|
522 |
+
|f(w1, . . . , wn)| .
|
523 |
+
Let νHaar be the Haar measure on Cn with support (S1)n and of total mass 1. Assume that
|
524 |
+
f ∈ Polyn,d be a polynomial mapping such that the set of simultaneous zeros Z(f) is a
|
525 |
+
discrete set. We denote by denote the discrete probability measure on Cn associated to
|
526 |
+
the Z(f) by δZ(f). The following result gives the asymptotic distribution of the zeros of
|
527 |
+
such a system f if the coefficients are integer:
|
528 |
+
Theorem 3.2. [13] Let f = (f1, . . . , fn) be a polynomial mapping with fi ∈ Z[x1, . . . , xn]
|
529 |
+
of degree d ≥ 1 for each i = 1, . . . , n. Assume that ResAv
|
530 |
+
1 ,...,Avn(f v
|
531 |
+
1 , . . . , f v
|
532 |
+
n) ̸= 0 for all
|
533 |
+
v ∈ Zn \ {0} and log ||fi||sup = o(d). Then
|
534 |
+
lim
|
535 |
+
d→∞ δZ(f) = νHaar.
|
536 |
+
As a corollary of Theorem 1.1 and Theorem 3.2, we have the following equidistribution
|
537 |
+
result for random Bernoulli polynomial mappings:
|
538 |
+
Proof of Corollary 1.2. Consider the system of Bernoulli polynomials f d = (fd,1, . . . , fd,n).
|
539 |
+
Since all the coefficients are 1 or −1, by triangle inequality
|
540 |
+
(3.10)
|
541 |
+
∥fd,i∥sup =
|
542 |
+
sup
|
543 |
+
|w1|=...=|wn|=1
|
544 |
+
|fd,i(w1, . . . , wn)| ≤
|
545 |
+
�n + d
|
546 |
+
d
|
547 |
+
�
|
548 |
+
= O(dn)
|
549 |
+
10
|
550 |
+
|
551 |
+
which implies that log ∥fd,i∥sup = o(d). Moreover, by Theorem 1.1 for each sequence
|
552 |
+
f d ∈ Polyn,d \ En,d we have
|
553 |
+
ResAv
|
554 |
+
1 ,...,Avn(f v
|
555 |
+
1 , . . . , f v
|
556 |
+
n ) ̸= 0
|
557 |
+
for all v ∈ Zn \ {0}. Hence, by Theorem 3.2
|
558 |
+
lim
|
559 |
+
d→∞ δZ(f d) = νHaar
|
560 |
+
in weak topology. In particular, δZ(f d) → νHaar in probability since Prob{En,d} → 0 as
|
561 |
+
d → ∞.
|
562 |
+
□
|
563 |
+
4. EXPECTED ZERO DISTRIBUTION
|
564 |
+
In this section, we introduce radial and angle discrepancies for random Bernoulli poly-
|
565 |
+
nomial mappings in order to study asymptotics of expected zero measures. We adapt
|
566 |
+
these concepts from [13] and refer the reader to the manuscript [13] and references
|
567 |
+
therein for a detailed account of the preliminary results this section.
|
568 |
+
Let Z be a 0-dimensional effective cycle in Cn that is there is a non-empty finite col-
|
569 |
+
lection of points ξ = (ξ1, . . . , ξn) ∈ Cn and mξ ∈ N, called the multiplicity of ξ, such
|
570 |
+
that Z = �
|
571 |
+
ξ mξ[ξ]. The degree of Z is defined by deg(Z) = �
|
572 |
+
ξ mξ which is a positive
|
573 |
+
number.
|
574 |
+
Definition 4.1. [13] Let Z be a 0-dimensional effective cycle in Cn. For each α = (α1, . . . , αn)
|
575 |
+
and β = (β1, . . . , βn) ∈ Rn such that −π ≤ αj < βj ≤ π, j = 1, . . . , n we consider the cycle
|
576 |
+
Zα,β :=
|
577 |
+
�
|
578 |
+
{ξ∈Z:αj<arg(ξj)≤βj}
|
579 |
+
mξ[ξ].
|
580 |
+
The angle discrepancy of Z is defined as
|
581 |
+
∆ang(Z) := sup
|
582 |
+
α,β
|
583 |
+
�����
|
584 |
+
deg(Zα,β)
|
585 |
+
deg(Z)
|
586 |
+
−
|
587 |
+
n
|
588 |
+
�
|
589 |
+
j=1
|
590 |
+
βj − αj
|
591 |
+
2π
|
592 |
+
����� .
|
593 |
+
For 0 < ε < 1 we consider the cycle
|
594 |
+
Zε :=
|
595 |
+
�
|
596 |
+
{ξ∈Z:1−ε<|ξj|<(1−ε)−1}
|
597 |
+
mξ[ξ].
|
598 |
+
The radius discrepancy of Z with respect to ε is defined as
|
599 |
+
∆rad(Z, ε) := 1 − deg(Zε)
|
600 |
+
deg(Z) .
|
601 |
+
Note that 0 < ∆ang(Z) ≤ 1 and 0 ≤ ∆rad(Z, ε) ≤ 1. Observe that the angle discrepancy
|
602 |
+
and the radial discrepancy are generalizations of their one dimensional versions defined
|
603 |
+
in [14, 17].
|
604 |
+
Let A1, . . . , An ⊂ Zn be a collection of finite sets and let Qi = conv(Ai) for each
|
605 |
+
i = 1, . . . , n. Throughout this section we assume that D := MVRn(Q1, . . . , Qn) ≥ 1.
|
606 |
+
For a vector w ∈ Sn−1 in the unit sphere in Rn, let w⊥ be its orthogonal subspace and
|
607 |
+
11
|
608 |
+
|
609 |
+
πw⊥ : Rn → w⊥ be the corresponding orthogonal projection. We let MVw⊥ denote the
|
610 |
+
mixed volume of the convex bodies in w⊥ induced by the Euclidean measure on w⊥. We
|
611 |
+
also denote
|
612 |
+
Dw,i = MVw⊥ (πw(Q1), . . . , πw(Qi−1), πw(Qi+1), . . . , πw(Qn)) .
|
613 |
+
Let f = (f1, . . . , fn) be a mapping such that the coordinates fi are Laurent polynomials
|
614 |
+
with supp(fi) = Ai for i = 1, . . . , n. Following [13], we define the Erd¨os-Tur´an size of f
|
615 |
+
by
|
616 |
+
(4.1)
|
617 |
+
η(f) := 1
|
618 |
+
D
|
619 |
+
sup
|
620 |
+
w∈Sn−1 log
|
621 |
+
�
|
622 |
+
�n
|
623 |
+
i=1 ||f||
|
624 |
+
Dw,i
|
625 |
+
sup
|
626 |
+
�
|
627 |
+
v |ResAv
|
628 |
+
1 ,...,Avn(f v
|
629 |
+
1 , . . . , f vn )|
|
630 |
+
|⟨v,w⟩|
|
631 |
+
2
|
632 |
+
�
|
633 |
+
,
|
634 |
+
where ⟨·, ·⟩ is the standard inner product in Rn and the product in the denominator
|
635 |
+
is taken over all primitive vectors v ∈ Zn. We remark that the Erd¨os-Tur´an size of a
|
636 |
+
polynomial mapping f coincides with the bound in the Erd¨os-Tur´an Theorem [14] for
|
637 |
+
univariate polynomials.
|
638 |
+
The next result gives an upper bound for the Erd¨os-Tur´an size of polynomial systems f
|
639 |
+
with integer coefficients.
|
640 |
+
Proposition 4.2. [13, Proposition 3.15] Let A1, . . . , An be a non-empty finite subsets of
|
641 |
+
Zn and set Qi = conv(Ai) with MVRn(Q1, . . . , Qn) ≥ 1. Let di ∈ Z≥1 and bi ∈ Zn so that
|
642 |
+
diΣn + bi, i = 1, . . . , n. Suppose that f1, . . . , fn ∈ Z[x±1
|
643 |
+
1 , . . . , x±1
|
644 |
+
n ] with supp(fi) ⊆ Ai and
|
645 |
+
such that ResAv
|
646 |
+
1 ,...,Avn(f v
|
647 |
+
d,1, . . . , f v
|
648 |
+
d,n) ̸= 0 for all v ∈ Zn \ {0}. Then
|
649 |
+
η(f) ≤
|
650 |
+
1
|
651 |
+
MVRn(Q1, . . . , Qn)
|
652 |
+
�
|
653 |
+
�
|
654 |
+
n + √n
|
655 |
+
�
|
656 |
+
� n
|
657 |
+
�
|
658 |
+
i=1
|
659 |
+
di
|
660 |
+
�
|
661 |
+
n
|
662 |
+
�
|
663 |
+
i=1
|
664 |
+
log ∥fi∥sup
|
665 |
+
di
|
666 |
+
�
|
667 |
+
.
|
668 |
+
The following theorem gives bounds for angle discrepancy and radius discrepancy of
|
669 |
+
Z(f) in terms of the Erd¨os-Tur´an size of f. For one dimensional version see for instance
|
670 |
+
[14] and [17].
|
671 |
+
Theorem 4.3. [13] Let A1, . . . , An be a non-empty finite subsets of Zn such that
|
672 |
+
MVRn(Q1, . . . , Qn) ≥ 1
|
673 |
+
with Qi = conv(Ai) for n ≥ 2. Let f1, . . . , fn ∈ C[x±1
|
674 |
+
1 , . . . , x±1
|
675 |
+
n ] with supp(fi) ⊆ Ai and such
|
676 |
+
that ResAv
|
677 |
+
1 ,...,Avn(f v
|
678 |
+
d,1, . . . , f v
|
679 |
+
d,n) ̸= 0 for all v ∈ Zn \ {0}. Then
|
680 |
+
(4.2)
|
681 |
+
∆ang(Z(f)) ≤ 66n2n(18 + log+(η(f)−1))
|
682 |
+
2
|
683 |
+
3(n−1)η(f)
|
684 |
+
1
|
685 |
+
3.
|
686 |
+
Moreover, for 0 < ε < 1,
|
687 |
+
(4.3)
|
688 |
+
∆rad(Z(f), ε) ≤ 2n
|
689 |
+
ε η(f).
|
690 |
+
For a random Bernoulli polynomial mapping f d we let Z(f d) be the set of simultaneous
|
691 |
+
zeros of f d. We define the angle discrepancy ∆ang(Z(f)) and the radius discrepancy
|
692 |
+
∆rad(Z(f), ε) as above whenever Z(f d) is a discrete set of points. Otherwise, we set
|
693 |
+
∆rad(Z(f), ε) = ∆ang(Z(f)) = 1. Note that as our probability space (Polyn,d, Prob) is
|
694 |
+
discrete, measurability of these random variables is not an issue in this setting. Next, we
|
695 |
+
estimate the asymptotic expected discrepancies:
|
696 |
+
12
|
697 |
+
|
698 |
+
Proposition 4.4. Let f d = (fd,1, . . . , fd,n) be a random Bernoulli polynomial mapping of
|
699 |
+
degree d ≥ 1. Then
|
700 |
+
(4.4)
|
701 |
+
lim
|
702 |
+
d→∞ E[∆ang(Z(f d))] = 0
|
703 |
+
and
|
704 |
+
lim
|
705 |
+
d→∞ E[∆rad(Z(f d))] = 0.
|
706 |
+
Proof. We adapt the argument in [[13], Theorem 4.9] to our setting. Consider the ex-
|
707 |
+
pected value of the angular discrepancy which is
|
708 |
+
(4.5)
|
709 |
+
E[Z(f d)] =
|
710 |
+
�
|
711 |
+
P olyn,d
|
712 |
+
∆ang(Z(f d))dProbd(f d).
|
713 |
+
Let En,d be the exceptional set which contains all the systems in Polyn,d with zero direc-
|
714 |
+
tional resultants for some nonzero primitive vector v ∈ Zn as described in the proof of
|
715 |
+
Theorem 1.1. Since 0 < ∆ang(Z(f d)) ≤ 1 there exist constants K1 which is independent
|
716 |
+
of d such that
|
717 |
+
(4.6)
|
718 |
+
0 ≤
|
719 |
+
�
|
720 |
+
En,d
|
721 |
+
∆ang(Z(f d))dProb(fd) ≤ Prob{En,d} ≤ K1d−1.
|
722 |
+
Hence,
|
723 |
+
�
|
724 |
+
En,d
|
725 |
+
∆ang(Z(f d))dProbd(f d) → 0
|
726 |
+
as d → ∞.
|
727 |
+
Let f d ∈ Polyn,d \ En,d, then by Proposition 4.2
|
728 |
+
η(f d) ≤ 1
|
729 |
+
dn
|
730 |
+
�
|
731 |
+
dn−1(n + √n)
|
732 |
+
n
|
733 |
+
�
|
734 |
+
i=1
|
735 |
+
log ||fd,i||sup
|
736 |
+
�
|
737 |
+
(4.7)
|
738 |
+
≤ 1
|
739 |
+
dn
|
740 |
+
�
|
741 |
+
dn−1(n + √n)
|
742 |
+
n
|
743 |
+
�
|
744 |
+
i=1
|
745 |
+
log(d + 1)
|
746 |
+
�
|
747 |
+
(4.8)
|
748 |
+
≤ K2
|
749 |
+
log d
|
750 |
+
d
|
751 |
+
(4.9)
|
752 |
+
for a constant K2 which is independent of d. On the other hand, by Theorem 4.3 for
|
753 |
+
f d ∈ Polyn,d \ En,d there exists constants K3, K4, K5 and K6 such that
|
754 |
+
∆ang(Z(f d)) ≤ K3η(f d)
|
755 |
+
1
|
756 |
+
3 log
|
757 |
+
� K4
|
758 |
+
η(f d)
|
759 |
+
� 2
|
760 |
+
3(n−1)
|
761 |
+
(4.10)
|
762 |
+
≤ K5
|
763 |
+
�log d
|
764 |
+
d
|
765 |
+
� 1
|
766 |
+
3
|
767 |
+
log
|
768 |
+
�
|
769 |
+
d
|
770 |
+
log d
|
771 |
+
� 2
|
772 |
+
3 (n−1)
|
773 |
+
�� K6
|
774 |
+
log d
|
775 |
+
2n
|
776 |
+
3 − 1
|
777 |
+
3
|
778 |
+
d
|
779 |
+
1
|
780 |
+
3
|
781 |
+
.
|
782 |
+
(4.11)
|
783 |
+
since the function t
|
784 |
+
1
|
785 |
+
3 log( a
|
786 |
+
t )
|
787 |
+
n−1
|
788 |
+
3
|
789 |
+
is increasing for small values of t > 0. Combining the
|
790 |
+
equations (4.9) and (4.11), we deduce that lim
|
791 |
+
d→∞ E[∆ang(Z(f d))] = 0.
|
792 |
+
The proof of the second assertion is analogous and we omit it.
|
793 |
+
□
|
794 |
+
Proof of Theorem 1.3. We adapt the argument in [13, Theorem 1.8] to our setting. Let us
|
795 |
+
denote νd := E[ �Z(f d)]
|
796 |
+
dn
|
797 |
+
, where E[ �Z(f d)] is the expected zero measure and νHaar be the Haar
|
798 |
+
probability on (S1)n. We need to show that for each continuous function ϕ with compact
|
799 |
+
13
|
800 |
+
|
801 |
+
support in Cn we have
|
802 |
+
�
|
803 |
+
ϕdνd →
|
804 |
+
�
|
805 |
+
ϕdνHaar as d → ∞. To this end, it is enough to prove
|
806 |
+
the claim for characteristic functions ϕU of the open sets
|
807 |
+
(4.12)
|
808 |
+
U := {(z1, . . . , zn) ∈ Cn : r1,j < |zj| < r2,j and αj < arg(zj) < βj}
|
809 |
+
where 0 ≤ r1,j < r2,j ≤ ∞, ri,j ̸= 1 for i = 1, 2 and −π < αj < βj ≤ π.
|
810 |
+
First, we consider the case when U ∩ (S1)n = ∅. Then one can find an 0 < ε < 1 such
|
811 |
+
that U is disjoint from the set
|
812 |
+
(4.13)
|
813 |
+
{(ξ1, . . . , ξn) ∈ Cn : 1 − ε < |ξj| < (1 − ε)−1 for all j}.
|
814 |
+
Let En,d be the exceptional set as in the proof of Theorem 1.1. If f d ∈ Polyn,d \ En,d then
|
815 |
+
Z(f d) is discrete and
|
816 |
+
#{U ∩ Z(f d)} ≤ deg(Z(f d))∆rad(f d, ε) ≤ dn∆rad(f d, ε).
|
817 |
+
On the other hand, if f d ∈ En,d then by definition deg( �Z(f d)|U) = 0. Hence,
|
818 |
+
νd(U) ≤ E[∆rad( �Z(f d, ε))]
|
819 |
+
and by Proposition 4.4,
|
820 |
+
lim
|
821 |
+
d→∞
|
822 |
+
�
|
823 |
+
P olyn,d
|
824 |
+
ϕUdνd = 0 = νHaar(U).
|
825 |
+
If U ∩ (S1)n ̸= ∅ let
|
826 |
+
(4.14)
|
827 |
+
�U = {z : αj ≤ arg(zj) ≤ βj for all j }.
|
828 |
+
Then we have
|
829 |
+
νd(U) −
|
830 |
+
n
|
831 |
+
�
|
832 |
+
j=1
|
833 |
+
βj − αj
|
834 |
+
2π
|
835 |
+
=
|
836 |
+
�
|
837 |
+
νd(�U) −
|
838 |
+
n
|
839 |
+
�
|
840 |
+
j=1
|
841 |
+
βj − αj
|
842 |
+
2π
|
843 |
+
�
|
844 |
+
− νd(�U \ U).
|
845 |
+
By Theorem 1.1 we have
|
846 |
+
�����νd(�U) −
|
847 |
+
n
|
848 |
+
�
|
849 |
+
j=1
|
850 |
+
βj − αj
|
851 |
+
2π
|
852 |
+
����� =
|
853 |
+
�
|
854 |
+
P olyn,d\En,d
|
855 |
+
�����
|
856 |
+
deg(Z(fd)α,β)
|
857 |
+
dn
|
858 |
+
−
|
859 |
+
n
|
860 |
+
�
|
861 |
+
j=1
|
862 |
+
βj − αj
|
863 |
+
2π
|
864 |
+
����� dProbd(f d) + Kn
|
865 |
+
d
|
866 |
+
≤
|
867 |
+
�
|
868 |
+
P olyn,d\En,d
|
869 |
+
∆ang(Z(f d))dProbd(f d) + Kn
|
870 |
+
d .
|
871 |
+
(4.15)
|
872 |
+
Note that the set �U \U is a union of a finite number of subsets Um of the form (4.12) such
|
873 |
+
that Um ∩ (S1)n = ∅ for all m, we have limd→∞ νd(Um) = 0 by previous case and hence
|
874 |
+
limd→∞ νd(U \ U) = 0. Therefore, by Proposition 4.4 and (4.15),
|
875 |
+
lim
|
876 |
+
d→∞ νd(U) = lim
|
877 |
+
d→∞(�U) =
|
878 |
+
n
|
879 |
+
�
|
880 |
+
j=1
|
881 |
+
βj − αj
|
882 |
+
2π
|
883 |
+
= νHaar(U)
|
884 |
+
which completes the proof.
|
885 |
+
□
|
886 |
+
14
|
887 |
+
|
888 |
+
REFERENCES
|
889 |
+
[1] T. Bayraktar, Equidistribution of Zeros of Random Holomorphic Sections, Indiana Univ. Math. J., 5
|
890 |
+
(2016), 1759-1793.
|
891 |
+
[2] T. Bayraktar, Zero distribution of random sparse polynomials, Michigan Math. J. 66 (2017), 389-419
|
892 |
+
[3] T. Bayraktar, Global universality of random zeros, Hacet. J. Math. 48 (2019),384-398.
|
893 |
+
[4] T. Bayraktar, D. Coman, H. Herrmann and G. Marinescu. A survey on zeros of random holomorphic
|
894 |
+
sections, Dolomit. Res. Notes Approx. 11 (2018), 1-20.
|
895 |
+
[5] T. Bayraktar, T. Bloom and N. Levenberg. Zeros of Random Polynomial Mappings in Several Complex
|
896 |
+
Variables, arXiv preprint arXiv:2112.00880.
|
897 |
+
[6] D.N. Bernstein, The number of roots of a system of equations, Funktsional. Anal. , Prilozhen. 9 (1975),
|
898 |
+
no.3, 1-4.
|
899 |
+
[7] T. Bloom, Random polynomials and (pluri)potential theory, Ann. Polon. Math. 91 (2007), 131-141.
|
900 |
+
[8] T. Bloom and D. Dauvergne, Asymptotic zero distribution of random orthogonal polynomials, The An-
|
901 |
+
nals of Probability, 47(5) 2019, pp.3202-3230.
|
902 |
+
[9] T. Bloom and B. Shiffman, Zeros of random polynomials on Cm, Math. Res. Lett.14 (2007), 469-479.
|
903 |
+
[10] T. Bloom, N. Levenberg, Random Polynomials and Pluripotential Theoretic Extremal Functions, Poten-
|
904 |
+
tial. Anal. , 42, (2015), 311-334.
|
905 |
+
[11] D.A. Cox, J. Little, and D. O’Shea, Using Algebraic Geometry, second edition, Grad. Texts in Math.,
|
906 |
+
185, Springer, New York, 2005.
|
907 |
+
[12] C. D’Andrea and M. Sombra, A Poisson Formula for the Sparse Resultant Proc. Lond. Math. Soc. (3)
|
908 |
+
110 (2015), no. 4, 932–964.
|
909 |
+
[13] C. D’Andrea and A. Galligo and M. Sombra, Quantitative equidistribution for the solutions of systems
|
910 |
+
of sparse polynomial equations, Amer. J. of Math., 136 (2014), 1543-1579.
|
911 |
+
[14] P. Erd¨os and P. Tur´an, On the distribution of roots of polynomials, Ann. of Math. 2 (1950), 105-119.
|
912 |
+
[15] I. M. Gelfand, M. M. Kapranov, A. V. Zelevinsky, Discriminants, Resultants, and Multidimensional
|
913 |
+
Determinants, Birkh¨ause, 1994.
|
914 |
+
[16] J.M. Hammersley, The zeros of random polynomials, Proceedings of the third Berkeley symposium on
|
915 |
+
the mathematical statistics and probability, 1954-1955, vol. II, pp. 89-111.
|
916 |
+
[17] C. P. Hughes and A. Nikeghbali, The zeros of random polynomials cluster uniformly near the unit circle,
|
917 |
+
Compos. Math. 144 (2008), no. 212, 1541-1555.
|
918 |
+
[18] I. Ibragimov and O. Zeitouni, On roosts of random polynomials, Trans.Amer. Soc. 6, (1997), 2427-
|
919 |
+
2441.
|
920 |
+
[19] I. Ibragimov and D. Zaporozhets, On Distribution of Random Polynomials in Complex Plane, Prokhorov
|
921 |
+
and Contemporary Probability Theory, Springer Proc. Math. Stat., 33, Springer, Heidelberg, (2013),
|
922 |
+
303–323.
|
923 |
+
[20] M. Kac, On the average number of real roots of a random algebraic equations, Bull. Amer. Math. Soc.
|
924 |
+
49 (1943), 314-320.
|
925 |
+
[21] G. Kozma and I. Zeitoni, On Common Roots of Random Bernoulli Polynomials, Int. Math. Res. Not. 18
|
926 |
+
(2013), 4334-4347.
|
927 |
+
[22] J. E. Littlewood and A. C. Offord, On the number of real roots of a random algebraic equation. III, Rec.
|
928 |
+
Math. [Mat. Sbornik] N.S. 12(54) (1943), 277–286.
|
929 |
+
[23] L. A. Shepp and R. J. Vanderbei, The complex zeros of random polynomials, Trans. Amer. Math. Soc.
|
930 |
+
347 (1995), no. 11, 4365–4384.
|
931 |
+
[24] B. Shiffman, Convergence of random zeros on complex manifolds, Science in China, no.4 Vol 51, (2008),
|
932 |
+
707-720.
|
933 |
+
[25] B. Shiffman and S. Zelditch, Equilibrium distribution of zeros of random polynomials, Int. Math. Res.
|
934 |
+
Not. 1 (2003), 25-49.
|
935 |
+
[26] B. Shiffman and S. Zelditch, Distribution of zeros of random and quantum chaotic sections of positive
|
936 |
+
line bundles, Comm. Math. Phys. 200(3):661–683, 1999.
|
937 |
+
15
|
938 |
+
|
939 |
+
[27] T. Tao and V. Vu, Local Universality of Random Polynomials, Int. Math. Res. Not. IMRN, (2015), 5053-
|
940 |
+
5139.
|
941 |
+
FACULTY OF ENGINEERING AND NATURAL SCIENCES, SABANCI UNIVERSITY, ˙ISTANBUL, TURKEY
|
942 |
+
Email address: [email protected]
|
943 |
+
Email address: [email protected]
|
944 |
+
16
|
945 |
+
|
5dE2T4oBgHgl3EQf6wiO/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
5tFKT4oBgHgl3EQfSy3E/content/tmp_files/2301.11777v1.pdf.txt
ADDED
@@ -0,0 +1,849 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Interpreting learning in biological neural networks as
|
2 |
+
zero-order optimization method
|
3 |
+
Johannes Schmidt-Hieber∗
|
4 |
+
Abstract
|
5 |
+
Recently, significant progress has been made regarding the statistical understanding
|
6 |
+
of artificial neural networks (ANNs). ANNs are motivated by the functioning of the
|
7 |
+
brain, but differ in several crucial aspects. In particular, it is biologically implausible
|
8 |
+
that the learning of the brain is based on gradient descent. In this work we look at
|
9 |
+
the brain as a statistical method for supervised learning. The main contribution is to
|
10 |
+
relate the local updating rule of the connection parameters in biological neural networks
|
11 |
+
(BNNs) to a zero-order optimization method.
|
12 |
+
Keywords:
|
13 |
+
Biological neural networks, zero-order optimization, derivative-free methods,
|
14 |
+
supervised learning.
|
15 |
+
1
|
16 |
+
Introduction
|
17 |
+
Compared to artificial neural networks (ANNs), the brain learns faster, generalizes better
|
18 |
+
to new situations and consumes much less energy. A child only requires a few examples to
|
19 |
+
learn to discriminate a dog from a cat. And people only need a few hours to learn how to
|
20 |
+
drive a car. AI systems, however, need thousands of training samples for image recognition
|
21 |
+
tasks. And the self-driving car is still under development, despite the availability of data
|
22 |
+
for millions of kilometers of test drives and billions of kilometers of simulated drives. The
|
23 |
+
∗University of Twente, Drienerlolaan 5, 7522 NB Enschede, The Netherlands.
|
24 |
+
Email: [email protected]
|
25 |
+
This work has tremendously profited from several discussions with Wouter Koolen. The author is moreover
|
26 |
+
extremely grateful for helpful suggestions and several interesting remarks that were brought up by Matus
|
27 |
+
Telgarsky. The research has been supported by the NWO/STAR grant 613.009.034b and the NWO Vidi
|
28 |
+
grant VI.Vidi.192.021.
|
29 |
+
1
|
30 |
+
arXiv:2301.11777v1 [cs.LG] 27 Jan 2023
|
31 |
+
|
32 |
+
Figure 1:
|
33 |
+
Artificial neurons receive and output numbers, biological neurons receive and
|
34 |
+
output spike trains.
|
35 |
+
superhuman performance of AI for some tasks [30, 33, 5] has to be related to the huge
|
36 |
+
databases and the enormous computing power required for the training.
|
37 |
+
When identifying the causes for the differences in statistical behavior, it is important to
|
38 |
+
emphasize that although ANNs are inspired by the functioning of the brain, they are very
|
39 |
+
different from biological neural networks (BNNs). Each biological neuron emits a so called
|
40 |
+
spike train that can be modelled as a stochastic process or, more precisely, as a point process
|
41 |
+
[8, 9] and all computations in BNNs, including the updating of the network parameters, are
|
42 |
+
local. The signal in ANNs, however, is passed instantaneously through the whole network
|
43 |
+
without a time component such as a spike train structure. In conclusion, ANNs generate
|
44 |
+
functions and BNNs point processes.
|
45 |
+
Another difference between ANNs and BNNs is the learning. Fitting the network param-
|
46 |
+
eters in large ANNs is based on variations of stochastic gradient descent (SGD) using the
|
47 |
+
backpropagation algorithm. The parameter update at each network weight is global in the
|
48 |
+
sense that every component of the gradient depends, in general, on all the other, possibly
|
49 |
+
millions of network weights in the whole network. This means that SGD methods require
|
50 |
+
knowledge of the state of the whole network to update one parameter. This is also known
|
51 |
+
as the weight transportation problem [14]. As neurons in a biological network do not have
|
52 |
+
the capacity to transport all the information about the state of the other weights, learning
|
53 |
+
in BNNs cannot be driven by gradient descent [19]. In [7], Francis Crick writes: ”Neverthe-
|
54 |
+
less, as far as the learning process is concerned, it is unlikely that the brain actually uses
|
55 |
+
backpropagation.”
|
56 |
+
In this work, we link the local updating rule for the parameters in a BNN to a derivative-free
|
57 |
+
(or more specifically, a zero-order) optimization method that does not require evaluation
|
58 |
+
of the gradient. Theorem 1 shows that, in expectation, this scheme does approximately
|
59 |
+
gradient descent.
|
60 |
+
2
|
61 |
+
|
62 |
+
ARTIEICIALNEURON
|
63 |
+
BIOLOGICALNEURON
|
64 |
+
OUTPUT
|
65 |
+
a (W,X, +W,X2 + ... + W.Xd)
|
66 |
+
OUTPUT
|
67 |
+
W1
|
68 |
+
W.
|
69 |
+
W1
|
70 |
+
Wd
|
71 |
+
W2
|
72 |
+
W2
|
73 |
+
INPUT
|
74 |
+
INPUT
|
75 |
+
Wd
|
76 |
+
W2
|
77 |
+
W2
|
78 |
+
W1
|
79 |
+
W,2
|
80 |
+
A brief introduction to biological neural networks (BNNs)
|
81 |
+
Using graph theory terminology, a BNN is a directed
|
82 |
+
Figure 2:
|
83 |
+
Receiving three spike
|
84 |
+
trains, the biological neuron su-
|
85 |
+
perimposes them and releases
|
86 |
+
spikes, whenever the threshold
|
87 |
+
value (in red) is exceeded.
|
88 |
+
graph, with nodes representing neurons. The nodes/
|
89 |
+
neurons can receive spikes via incoming edges and
|
90 |
+
emit spikes via outgoing edges. In the directed graph,
|
91 |
+
parent nodes are also called presynaptic neurons and
|
92 |
+
children nodes are called postsynaptic neurons.
|
93 |
+
A
|
94 |
+
simple, first model is to think of a spike that is emit-
|
95 |
+
ted at time τ as a signal or function t �→ eτ−t1(t ≥ τ)
|
96 |
+
with 1(·) the indicator function. If neuron i emits a
|
97 |
+
spike at time τ and is connected to neuron j, then
|
98 |
+
neuron j receives the signal wijeτ−t1(t ≥ τ), where
|
99 |
+
wij is the weight parameter measuring the strength
|
100 |
+
of the connection between the neurons i and j. Due
|
101 |
+
to the exponential decay, the signal fades out quickly.
|
102 |
+
When does neuron j fire/emits a spike?
|
103 |
+
Suppose
|
104 |
+
neuron j has incoming edges from neurons i1, . . . , im.
|
105 |
+
These neurons will occasionally send spikes to j and
|
106 |
+
the overall received signal/potential at j is the su-
|
107 |
+
perposition of the weighted incoming signals. If the
|
108 |
+
combined signal exceeds a threshold S, j fires and
|
109 |
+
all children nodes (postsynaptic neurons) of j receive a signal from j. The generation of
|
110 |
+
the spike trains is illustrated in Figure 2 for m = 3. The three incoming spike trains were
|
111 |
+
chosen for illustrative purposes as triggering a spike in a BNN requires between 20 to 50
|
112 |
+
incoming spikes within a short time period [12], p.10. After a spike, neuron j enters a short
|
113 |
+
rest phase before it gets back to its normal state. Although this rest phase might play a
|
114 |
+
role in the learning, it will be ignored in the analysis.
|
115 |
+
The parameters in the BNN are the non-negative weights measuring the strength of the
|
116 |
+
connections. Plasticity is the neuroscience term to describe the changes of the network
|
117 |
+
parameters. Spike time dependent plasticity (STDP) predicts that the parameter wij mea-
|
118 |
+
suring the signal strength between the neurons i and j is decreased if a spike is sent from
|
119 |
+
i to j and increased if neuron j emits a spike [21, 2, 42, 34]. The increase becomes bigger
|
120 |
+
if the time lag between the arrived spike and the firing of neuron j gets smaller. This
|
121 |
+
is known as ”fire together, wire together” and is the main principle underlying Hebbian
|
122 |
+
learning [15, 32].
|
123 |
+
3
|
124 |
+
|
125 |
+
threshold
|
126 |
+
received signal
|
127 |
+
emitted signalAmong specific forms for the updating formula, as simple but realistic model is to assume
|
128 |
+
that if the spike from neuron i to neuron j arrives at time τ, the weight is decreased by
|
129 |
+
A−(wij)Ce−c(τ−T−) at time τ and increased by A+(wij)Ce−c(T+−τ) at time T+, where c, C
|
130 |
+
are constants and T−, T+ are the last/first spike time of neuron j before/after τ. Regarding
|
131 |
+
the amplitude functions, A±(wij), different choices are possible, see Section 19.2.2 in [12]
|
132 |
+
From now on we will study the case that A±(x) = x. For C ≤ 1, this choice guarantees that
|
133 |
+
the change of the weight is always smaller than the weight itself. Thus positive weights
|
134 |
+
remain positive and the network topology does not change during learning. Combining
|
135 |
+
both updating steps into one formula, we have
|
136 |
+
wij ← wij + wijC(−e−c(τ−T−) + e−c(T+−τ)).
|
137 |
+
(2.1)
|
138 |
+
As a reward for how well the task has been completed compared to earlier trials and also
|
139 |
+
accounting for the total number of trials, a neurotransmitter such as dopamine is released.
|
140 |
+
The higher the reward, the more the parameters are changed.
|
141 |
+
If the brain performed
|
142 |
+
poorly in the past and suddenly manages to solve a task well, much more neurotransmitter
|
143 |
+
is released than if the same task has already been completed equally well in the past. To
|
144 |
+
take this into account, it has been argued in the neural coding literature that the realized
|
145 |
+
reward is the objective reward, how well the task has been completed, minus the expected
|
146 |
+
reward measuring how well the brain anticipated to do this task [11]. Denote by R the
|
147 |
+
reward and let R be a measure for the anticipated reward. The reward-based synaptic
|
148 |
+
plasticity updating rule becomes then
|
149 |
+
wij ← wij + (R − R)wijC
|
150 |
+
�
|
151 |
+
− e−c(τ−T−) + e−c(T+−τ)�
|
152 |
+
.
|
153 |
+
(2.2)
|
154 |
+
The reward is only released after the prediction has been made. In the meantime, several
|
155 |
+
spikes could have been sent from neuron i to neuron j. This requires that the system has a
|
156 |
+
short-term memory, [28].
|
157 |
+
If the brain has to complete a similar task more frequently, it becomes less exciting over
|
158 |
+
time, resulting in a smaller reward. This can be incorporated into the dynamics by including
|
159 |
+
a learning rate α > 0,
|
160 |
+
wij ← wij + α(R − R)wijC
|
161 |
+
�
|
162 |
+
− e−c(τ−T−) + e−c(T+−τ)�
|
163 |
+
.
|
164 |
+
(2.3)
|
165 |
+
Supervised learning is more commonly formulated in loss functions than rewards. Because a
|
166 |
+
high reward corresponds to a small loss and vice versa, L := −R is a loss function, L = −R
|
167 |
+
4
|
168 |
+
|
169 |
+
is the anticipated loss, and the updating formula becomes
|
170 |
+
wij ← wij + α(L − L)wijC
|
171 |
+
�
|
172 |
+
e−c(τ−T−) − e−c(T+−τ)�
|
173 |
+
.
|
174 |
+
(2.4)
|
175 |
+
A key observation is that these updating formulas are derivative-free in the sense that they
|
176 |
+
involve the reward (or loss) but not its gradient.
|
177 |
+
Hebbian learning rules, such as (2.4), model the updating of individual weights, but do not
|
178 |
+
explain how the brain can learn a task. A brief overview about relevant existing ideas on
|
179 |
+
learning in BNNs is given in Section 5
|
180 |
+
3
|
181 |
+
Zero-order optimization
|
182 |
+
Suppose we want to fit a d-dimensional parameter vector θ to the data and write L(θ)
|
183 |
+
for the (training) loss incurred by parameter θ. Derivative-free optimization procedures
|
184 |
+
do not require computation of the gradient of the loss. A simple iterative derivative-free
|
185 |
+
scheme would be to randomly pick in each round a new candidate parameter and update
|
186 |
+
the parameter if the loss is decreased. Standard references for derivative-free optimization
|
187 |
+
include [36, 6, 10, 16, 20].
|
188 |
+
Zero-order methods (sometimes also called zero-th order methods) are specific derivative-
|
189 |
+
free optimization procedures. To explain the concept, recall that standard gradient descent
|
190 |
+
is an iterative procedure aiming to minimize the loss function θ �→ L(θ) by the iterative
|
191 |
+
scheme
|
192 |
+
θk+1 = θk − αk+1∇L(θk),
|
193 |
+
k = 0, 1, . . .
|
194 |
+
where the initial values θ0 are chosen in some way, αk+1 > 0 is the learning rate and ∇L(θk)
|
195 |
+
denotes the gradient of the loss function at θk. In contrast, zero-order methods are only
|
196 |
+
allowed to access the loss function but not the gradient of the loss. From the loss, one
|
197 |
+
can build, however, an estimator for the gradient of the loss. 1-point zero-order methods
|
198 |
+
replace −∇L(θk) by
|
199 |
+
βL(θk + ξk)ξk
|
200 |
+
with ξk a d-dimensional random vector and β a constant. To see how this relates to the
|
201 |
+
gradient, consider the specific case that ξk is multivariate normal with zero mean vector
|
202 |
+
and covariance matrix σ2Id, where Id denotes the d × d identity matrix. The multivariate
|
203 |
+
5
|
204 |
+
|
205 |
+
version of Stein’s lemma [38] states that
|
206 |
+
E[L(θk + ξk)ξk] = σ2E[∇L(θk + ξk)]
|
207 |
+
(3.1)
|
208 |
+
under weak regularity conditions ensuring that all expectations are well-defined.
|
209 |
+
This
|
210 |
+
means that σ−2L(θk + ξk)ξk estimates the gradient at θk + ξk, that is, ∇L(θk + ξk) =
|
211 |
+
∇L(θk)+errork. The hope is that over many iterations the noise contributions cancel out
|
212 |
+
such that in the long-run, the 1-point zero-order dynamics behaves similarly as gradient
|
213 |
+
descent. The argument above can be extended to general symmetric distributions of ξk
|
214 |
+
that are not necessarily Gaussian.
|
215 |
+
Unfortunately, the variance of the 1-point zero-order gradient estimator (3.1) can be ex-
|
216 |
+
tremely large and often scales quadratically in the number of parameters d. As an example,
|
217 |
+
suppose that the data are stored in a d-dimensional vector Y = (Y1, . . . , Yd)⊤ and con-
|
218 |
+
sider the least squares loss L(θ) = ∥Y − θ∥2
|
219 |
+
2. Taking ξk = (ξk1, . . . , ξkd) ∼ N(0, σ2Id) and
|
220 |
+
β = σ−2, as above, we have for the j-th component of βL(θk + ξk)ξk that
|
221 |
+
σ−2��Y − θk − ξk
|
222 |
+
��2
|
223 |
+
2ξkj = σ−2�
|
224 |
+
Yj − θkj − ξkj
|
225 |
+
�2ξkj + σ−2 �
|
226 |
+
ℓ:ℓ̸=j
|
227 |
+
�
|
228 |
+
Yℓ − θkℓ − ξkℓ
|
229 |
+
�2ξkj.
|
230 |
+
The second term on the right hand side has zero mean. It is pure noise and does not help
|
231 |
+
to estimate the gradient. This sum is over d − 1 summands and its variance scales with
|
232 |
+
O(d2) in the number of parameters d.
|
233 |
+
Due to the large variance, there are many scenarios for which 1-point zero-order dynamics
|
234 |
+
quickly diverges to infinity. Indeed if one iterate θk is already far away from the minimum,
|
235 |
+
the large loss can result in a parameter update θk+1 which is much further away from the
|
236 |
+
minimizer than θk, leading to an even larger loss and an exponential growth of the loss as
|
237 |
+
the number of iterations is further increased.
|
238 |
+
Regarding theory of zero-order methods, [10] studies a related zero-order methods and
|
239 |
+
mirror descent. Assuming that the parameter vector lies in an Euclidean ball, they obtain
|
240 |
+
in their Corollary 1 the rate
|
241 |
+
�
|
242 |
+
d/k with k the number of iterations and also provide a
|
243 |
+
corresponding lower bound proving that this rate is optimal (their Proposition 1). The
|
244 |
+
large noise causes the factor
|
245 |
+
√
|
246 |
+
d in the rate, suggesting slow convergence in the high-
|
247 |
+
dimensional regime. [25] also finds a suboptimality of order d if zero-order methods are
|
248 |
+
compared to gradient descent. Table 1 in [20] shows that the factor
|
249 |
+
√
|
250 |
+
d or d occurs in all
|
251 |
+
known convergence rates unless second-order information is used.
|
252 |
+
Due to the large noise, derivative-free methods are in general thought to be inferior com-
|
253 |
+
pared to gradient descent.
|
254 |
+
This is for instance remarked in [6], Section 1.3: ”Finally,
|
255 |
+
6
|
256 |
+
|
257 |
+
we want to make a strong statement that often councils against the use of derivative-free
|
258 |
+
methods: if you can obtain clean derivatives (even if it requires considerable effort) and the
|
259 |
+
functions defining your problem are smooth and free of noise you should not use derivative-
|
260 |
+
free methods.”
|
261 |
+
Zero-order methods are also not necessarily much faster to compute than gradient descent
|
262 |
+
iterates. For the gradient-based backpropagation of ANNs, the number of operations re-
|
263 |
+
quired for the forward pass is of the same order as the number of operations required for
|
264 |
+
the backwards pass. Evaluation of the loss is therefore not substantially cheaper than com-
|
265 |
+
puting the gradient and zero-order methods cannot be computed at a faster order than
|
266 |
+
backpropagation.
|
267 |
+
Despite these rather discouraging remarks, there is a rapidly increasing interest in derivative-
|
268 |
+
free methods and they are successfully applied in practice, for example by Google [13].
|
269 |
+
4
|
270 |
+
Hebbian learning as zero-order optimization method
|
271 |
+
The updating formula (2.4) allows to address supervised learning tasks, where we want to
|
272 |
+
learn the functional relationship between inputs and outputs given observations (or training
|
273 |
+
data) from input-output pairs (X1, Y1), (X2, Y2), . . . that are all generated from the same,
|
274 |
+
unknown distribution as the vector (X, Y ). Well-known examples for this framework are
|
275 |
+
classification and regression. For instance to classify cat and dog images, Xi is the i-th
|
276 |
+
image containing all the pixel values of the i-th cat image and Yi is the corresponding label
|
277 |
+
”cat” or ”dog”, coded as 0 or 1.
|
278 |
+
Consider now a feedforward biological neural network (BNN) with m neurons. This means
|
279 |
+
that the neurons/nodes form a directed acyclic graph (DAG) with input neurons receiving
|
280 |
+
information from the data Xi and possibly several output neurons. For the subsequent
|
281 |
+
analysis, we neither have to specify a layered structure as commonly done for ANNs nor
|
282 |
+
conversion rules how vector valued inputs are converted into spike trains or output spike
|
283 |
+
trains are cast into response variables, such as conversion into labels in a classification
|
284 |
+
problem.
|
285 |
+
In the k-th instance, we feed the k-th input vector Xk in the BNN, let the BNN run and
|
286 |
+
receive then as output the predicted response �Yk. The loss at this round is a measure for the
|
287 |
+
difference between the predicted response �Yk and the real response Yk. It will be denoted
|
288 |
+
by L(�Yk, Yk) in the following. The anticipated loss that occurs in (2.4) could be modelled
|
289 |
+
by a (weighted) average over past iterations. Here we use the loss of the previous iterate
|
290 |
+
L(�Yk−1, Yk−1).
|
291 |
+
7
|
292 |
+
|
293 |
+
During each instance, several spikes can be sent between any two connected neurons. We
|
294 |
+
impose the (strong) assumption that for every run, and any connection, exactly one spike
|
295 |
+
will be released.
|
296 |
+
Number the m nodes, that represent the neurons in the graph, by 1, . . . , m and denote the
|
297 |
+
edge set by T . A pair (i, j) is in T if and only if neuron i is a presynaptic neuron for neuron
|
298 |
+
j. Equivalently, (i, j) ∈ T iff there is an arrow from i to j in the underlying DAG. We
|
299 |
+
consider the case that the BNN topology is static, that is, the edge set T does not change
|
300 |
+
during learning.
|
301 |
+
If w(k)
|
302 |
+
ij
|
303 |
+
is the BNN weight after the k-th round, it is then updated in the (k +1)-st iteration
|
304 |
+
according to (2.4)
|
305 |
+
w(k+1)
|
306 |
+
ij
|
307 |
+
(4.1)
|
308 |
+
= w(k)
|
309 |
+
ij + αk+1
|
310 |
+
�
|
311 |
+
L(�Yk, Yk) − L(�Yk−1, Yk−1)
|
312 |
+
�
|
313 |
+
w(k)
|
314 |
+
ij C
|
315 |
+
�
|
316 |
+
e−c(τ (k)
|
317 |
+
ij −T (k)
|
318 |
+
−,j) − e−c(T (k)
|
319 |
+
+,j−τ (k)
|
320 |
+
ij )�
|
321 |
+
,
|
322 |
+
for all (i, j) ∈ T and αk+1 > 0 the learning rate. Here T (k)
|
323 |
+
−,j and T (k)
|
324 |
+
+,j are the closest spike
|
325 |
+
times of the j-th neuron before/after the arrival time τ (k)
|
326 |
+
ij
|
327 |
+
of the spike that is sent from
|
328 |
+
neuron i to neuron j. The constant C can be integrated into the loss function and is from
|
329 |
+
now on set to one.
|
330 |
+
For the updating, the location of τ (k)
|
331 |
+
ij
|
332 |
+
is important within the interval [T (k)
|
333 |
+
−,j, T (k)
|
334 |
+
+,j], while the
|
335 |
+
interval length seems to play a minor role. Therefore, we assume that the interval length
|
336 |
+
is constant and set A := (T (k)
|
337 |
+
+,j − T (k)
|
338 |
+
−,j)/2. We assume moreover that the arrival time of the
|
339 |
+
spike from neuron i to neuron j has a negligible influence on the spike times of neuron j,
|
340 |
+
that the spike times τ (k)
|
341 |
+
ij
|
342 |
+
are all independent of each other, and follow a uniform distribution
|
343 |
+
on the interval [T (k)
|
344 |
+
−,j, T (k)
|
345 |
+
+,j]. As mentioned before, to trigger a spike, it needs of the order of
|
346 |
+
20 − 50 presynaptic neurons to fire in a short time interval. The influence of an individual
|
347 |
+
neuron seems therefore rather minor, justifying the previous assumption. The assumptions
|
348 |
+
above show that the random variable U (k)
|
349 |
+
ij
|
350 |
+
:= τ (k)
|
351 |
+
ij
|
352 |
+
− 1
|
353 |
+
2(T (k)
|
354 |
+
+,j + T (k)
|
355 |
+
−,j) are jointly independent
|
356 |
+
and uniformly distributed on [−A, A]. Hence, (4.1) becomes
|
357 |
+
w(k+1)
|
358 |
+
ij
|
359 |
+
= w(k)
|
360 |
+
ij + αk+1
|
361 |
+
�
|
362 |
+
L(�Yk, Yk) − L(�Yk−1, Yk−1)
|
363 |
+
�
|
364 |
+
w(k)
|
365 |
+
ij
|
366 |
+
�
|
367 |
+
e−c(A+U(k)
|
368 |
+
i,j ) − e−c(A−U(k)
|
369 |
+
i,j )�
|
370 |
+
,
|
371 |
+
for all (i, j) ∈ T . The factor e−cA can be absorbed into the loss function and the constant c
|
372 |
+
can be absorbed into the hyperparameter A. By reparametrization, we obtain the updating
|
373 |
+
formula
|
374 |
+
w(k+1)
|
375 |
+
ij
|
376 |
+
= w(k)
|
377 |
+
ij + αk+1
|
378 |
+
�
|
379 |
+
L(�Yk, Yk) − L(�Yk−1, Yk−1)
|
380 |
+
�
|
381 |
+
w(k)
|
382 |
+
ij
|
383 |
+
�
|
384 |
+
e−U(k)
|
385 |
+
i,j − eU(k)
|
386 |
+
i,j
|
387 |
+
�
|
388 |
+
,
|
389 |
+
(4.2)
|
390 |
+
8
|
391 |
+
|
392 |
+
for all (i, j) ∈ T .
|
393 |
+
To further analyze this scheme, it is important to understand how the predicted response
|
394 |
+
�Yk depends on the parameters. We now argue that, under the same assumptions as before,
|
395 |
+
�Yk is a function of the variables w(k)
|
396 |
+
ij + eU(k)
|
397 |
+
i,j . The high-level rationale is that in this neural
|
398 |
+
model, all the information that is further transmitted in the BNN about the parameter
|
399 |
+
w(k)
|
400 |
+
ij
|
401 |
+
sits in the spike times of neuron j and the interarrival spike times only depend on w(k)
|
402 |
+
ij
|
403 |
+
through w(k)
|
404 |
+
ij + eU(k)
|
405 |
+
i,j . To see this, fix neuron j. The only information that this node/neuron
|
406 |
+
releases to its descendants in the DAG are the spike times of this neuron. This means that
|
407 |
+
from all the incoming information that neuron j receives from presynaptic neurons (parent
|
408 |
+
nodes) only the part is transmitted that affects the spike times of neuron j. As mentioned in
|
409 |
+
Section 2, a spike arriving at neuron j from neuron i at time τ (k)
|
410 |
+
ij
|
411 |
+
causes the potential t �→
|
412 |
+
w(k)
|
413 |
+
ij eτ (k)
|
414 |
+
ij −t1(t ≥ τ (k)
|
415 |
+
ij ) at node j. If every incoming neuron spikes once, the overall potential
|
416 |
+
of neuron j is �
|
417 |
+
i:(i,j)∈T w(k)
|
418 |
+
ij eτ (k)
|
419 |
+
ij −t1(t ≥ τ (k)
|
420 |
+
ij ). If S denotes the threshold value for the
|
421 |
+
potential at which a neuron spikes, then at the spike time T (k)
|
422 |
+
+,j of the j-th neuron, we have
|
423 |
+
by the definition of U (k)
|
424 |
+
ij , S = �
|
425 |
+
i:(i,j)∈T w(k)
|
426 |
+
ij eτ (k)
|
427 |
+
ij −T (k)
|
428 |
+
+,j = �
|
429 |
+
i:(i,j)∈T w(k)
|
430 |
+
ij eU(k)
|
431 |
+
ij − 1
|
432 |
+
2 (T (k)
|
433 |
+
+,j−T (k)
|
434 |
+
−,j).
|
435 |
+
Rearranging this equation shows that the interarrival spike time T (k)
|
436 |
+
+,j−T (k)
|
437 |
+
−,j can be expressed
|
438 |
+
in terms of the variables w(k)
|
439 |
+
ij eU(k)
|
440 |
+
ij . Introduce wk := (w(k)
|
441 |
+
ij )(i,j)∈T , Uk := (U (k)
|
442 |
+
ij )(i,j)∈T and
|
443 |
+
write wkeUk for (w(k)
|
444 |
+
ij eU(k)
|
445 |
+
i,j )(i,j)∈T . The previous argument indicates that the predictor �Yk
|
446 |
+
is a function of wkeUk and Xk. Thus, the loss L(�Yk, Yk) can be written as a function of the
|
447 |
+
form L
|
448 |
+
�
|
449 |
+
wkeUk, Xk, Yk
|
450 |
+
�
|
451 |
+
and (4.2) becomes
|
452 |
+
w(k+1)
|
453 |
+
ij
|
454 |
+
(4.3)
|
455 |
+
= w(k)
|
456 |
+
ij + αk+1
|
457 |
+
�
|
458 |
+
L
|
459 |
+
�
|
460 |
+
wkeUk, Xk, Yk
|
461 |
+
�
|
462 |
+
− L
|
463 |
+
�
|
464 |
+
wk−1eUk−1, Xk−1, Yk−1
|
465 |
+
��
|
466 |
+
w(k)
|
467 |
+
ij
|
468 |
+
�
|
469 |
+
e−U(k)
|
470 |
+
i,j − eU(k)
|
471 |
+
i,j
|
472 |
+
�
|
473 |
+
.
|
474 |
+
In a BNN, the parameters w(k)
|
475 |
+
ij are non-negative. We now introduce the real-valued variables
|
476 |
+
θ(k)
|
477 |
+
ij
|
478 |
+
= log(w(k)
|
479 |
+
ij ) and θk = (θ(k)
|
480 |
+
ij )(i,j)∈T . This means that w(k)
|
481 |
+
ij
|
482 |
+
= eθ(k)
|
483 |
+
ij . A first order Taylor
|
484 |
+
expansion shows that for real numbers u, v, ∆ such that e−v∆ is small, eu = ev + ∆ gives
|
485 |
+
u = log(ev + ∆) = v + log(1 + e−v∆) ≈ v + e−v∆. Working with this approximation, we
|
486 |
+
can rewrite the formula (4.3) in terms of the θ’s as
|
487 |
+
θ(k+1)
|
488 |
+
ij
|
489 |
+
(4.4)
|
490 |
+
= θ(k)
|
491 |
+
ij + αk+1
|
492 |
+
�
|
493 |
+
L
|
494 |
+
�
|
495 |
+
θk + Uk, Xk, Yk
|
496 |
+
�
|
497 |
+
− L
|
498 |
+
�
|
499 |
+
θk−1 + Uk−1, Xk−1, Yk−1
|
500 |
+
���
|
501 |
+
e−U(k)
|
502 |
+
i,j − eU(k)
|
503 |
+
i,j
|
504 |
+
�
|
505 |
+
.
|
506 |
+
Relating this formula to gradient descent and the weight transportation problem mentioned
|
507 |
+
in the introduction, we see that the update of one parameter only depends on all the other
|
508 |
+
9
|
509 |
+
|
510 |
+
parameters through the value of the loss function.
|
511 |
+
In vector notation, the previous equality becomes
|
512 |
+
θk+1
|
513 |
+
(4.5)
|
514 |
+
= θk + αk+1
|
515 |
+
�
|
516 |
+
L(θk + Uk, Xk, Yk) − L(θk−1 + Uk−1, Xk−1, Yk−1)
|
517 |
+
��
|
518 |
+
e−Uk − eUk�
|
519 |
+
,
|
520 |
+
where eUk and e−Uk should be understood as componentwise applying the functions x �→ ex
|
521 |
+
and x �→ e−x to the vector Uk. In particular, the loss is always a scalar and eUk, e−Uk are
|
522 |
+
d-dimensional vectors.
|
523 |
+
So far, we have not specified any initial conditions. From now on, we assume that the
|
524 |
+
initial values θ0, θ−1 are given and that all the other parameter updates are determined by
|
525 |
+
(4.5) for k = 0, 1, . . . with U−1, U0, U1, U2, . . . drawn i.i.d. from the uniform distribution
|
526 |
+
U([−A, A]d).
|
527 |
+
As an analogue of (3.1), the next result shows that in average, this dynamic can also be
|
528 |
+
understood as a gradient descent method with gradient evaluated not exactly at θk but at
|
529 |
+
a random perturbation θk + Uk.
|
530 |
+
Theorem 1. Write Uk = (Uk1, . . . , Ukd)⊤ and let (eA −eUk)(eA −e−Uk) be the vector with
|
531 |
+
components (eA − eUkj)(eA − e−Ukj). Denoting by ⊙ the Hadamard product (componentwise
|
532 |
+
product) of two matrices/vectors of the same dimension(s), we have
|
533 |
+
E
|
534 |
+
�
|
535 |
+
θk+1
|
536 |
+
�
|
537 |
+
= E
|
538 |
+
�
|
539 |
+
θk
|
540 |
+
�
|
541 |
+
− αk+1e−AE
|
542 |
+
�
|
543 |
+
∇θkL(θk + Uk, Xk, Yk) ⊙
|
544 |
+
�
|
545 |
+
eA − eUk��
|
546 |
+
eA − e−Uk��
|
547 |
+
. (4.6)
|
548 |
+
Instead of taking the expectation over all randomness, the statement is also true if we only
|
549 |
+
take the expectation with respect to Uk, which is the same as the conditional expectation
|
550 |
+
E[·|U−1, U0, U1, . . . , Uk−1, (Xℓ, Yℓ)ℓ≥1].
|
551 |
+
Note that (eA − eUkj)(eA − e−Ukj) is non-negative. Thus fA(x) = C(A)−1(eA − ex)(eA −
|
552 |
+
e−x)1(−A ≤ x ≤ A) defines a probability density function for the positive normalization
|
553 |
+
constant C(A) = 2A(e2A + 1) + 2 − 2e2A =
|
554 |
+
� A
|
555 |
+
−A(eA − ex)(eA − e−x) dx.
|
556 |
+
Denoting by
|
557 |
+
∂jL(v, Xk, Yk) the partial derivative of L with respect to the j-th component of v, we can
|
558 |
+
state the previous result componentwise as
|
559 |
+
E
|
560 |
+
�
|
561 |
+
θk+1,j
|
562 |
+
�
|
563 |
+
= E
|
564 |
+
�
|
565 |
+
θkj
|
566 |
+
�
|
567 |
+
− αk+1e−AC(A)E
|
568 |
+
�
|
569 |
+
∂jL(θk + U(j)
|
570 |
+
k , Xk, Yk)
|
571 |
+
�
|
572 |
+
,
|
573 |
+
(4.7)
|
574 |
+
for a random vector U(j)
|
575 |
+
k
|
576 |
+
= (Uk1, . . . , Uk,j−1, Vkj, Uk,j+1, . . . , Ukd)⊤, with jointly indepen-
|
577 |
+
dent random variables Vkj ∼ fA and Ukℓ ∼ U[−A, A], ℓ = 1, . . . , j − 1, j + 1, . . . , d.
|
578 |
+
10
|
579 |
+
|
580 |
+
Proof of Theorem 1. Throughout the proof, we omit the dependence of the loss function L
|
581 |
+
on the data. By conditioning on (U−1, U0, . . . , Uk−1, (Xℓ, Yℓ)ℓ≥1) and the fact that e−Uk
|
582 |
+
and eUk have the same distribution, it follows that
|
583 |
+
E
|
584 |
+
�
|
585 |
+
L(θk−1 + Uk−1)
|
586 |
+
�
|
587 |
+
e−Uk − eUk��
|
588 |
+
= E
|
589 |
+
�
|
590 |
+
L(θk−1 + Uk−1)E
|
591 |
+
��
|
592 |
+
e−Uk − eUk� ��� U−1, U0, . . . , Uk−1, (Xℓ, Yℓ)ℓ≥1
|
593 |
+
��
|
594 |
+
= 0.
|
595 |
+
(4.8)
|
596 |
+
With u = (u1, . . . , ud)⊤, the j-th component of e−AE[∇θkL(θk+Uk)⊙(eA−eUk)(eA−e−Uk)]
|
597 |
+
is
|
598 |
+
e−A
|
599 |
+
(2A)d
|
600 |
+
�
|
601 |
+
[−A,A]d ∂jL(θk + u)
|
602 |
+
�
|
603 |
+
eA − euj��
|
604 |
+
eA − e−uj�
|
605 |
+
du
|
606 |
+
= e−A
|
607 |
+
(2A)d
|
608 |
+
�
|
609 |
+
[−A,A]d−1
|
610 |
+
� A
|
611 |
+
−A
|
612 |
+
∂jL(θk + u)
|
613 |
+
�
|
614 |
+
eA − euj��
|
615 |
+
eA − e−uj�
|
616 |
+
dujdu1 . . . duj−1duj+1 . . . dud,
|
617 |
+
Observe that (eA − euj)(eA − e−uj) vanishes at the boundaries uj ∈ {−A, A} and ∂uj(eA −
|
618 |
+
euj)(eA − e−uj) = eA−uj − eA+uj. Thus, applying integration by parts formula to the inner
|
619 |
+
integral yields
|
620 |
+
� A
|
621 |
+
−A
|
622 |
+
∂jL(θk + u)
|
623 |
+
�
|
624 |
+
eA − euj��
|
625 |
+
eA − e−uj�
|
626 |
+
duj = −eA
|
627 |
+
� A
|
628 |
+
−A
|
629 |
+
L(θk + u)
|
630 |
+
�
|
631 |
+
e−uj − euj�
|
632 |
+
duj
|
633 |
+
and therefore
|
634 |
+
e−A
|
635 |
+
(2A)d
|
636 |
+
�
|
637 |
+
[−A,A]d ∂jL(θk + u)
|
638 |
+
�
|
639 |
+
eA − euj��
|
640 |
+
eA − e−uj�
|
641 |
+
du
|
642 |
+
= −
|
643 |
+
1
|
644 |
+
(2A)d
|
645 |
+
�
|
646 |
+
[−A,A]d L(θk + u)
|
647 |
+
�
|
648 |
+
e−uj − euj�
|
649 |
+
du
|
650 |
+
= −E
|
651 |
+
�
|
652 |
+
L(θk + Uk)
|
653 |
+
�
|
654 |
+
e−Ukj − eUkj��
|
655 |
+
.
|
656 |
+
This holds for all j = 1, . . . , d. The minus on the right hand side cancels out the first minus
|
657 |
+
in (4.6). Together with (4.8), the claim follows.
|
658 |
+
Equation (4.8) in the proof shows that the theorem still holds if the term L(θk−1 +
|
659 |
+
Uk−1, Xk−1, Yk−1) in (4.5) is replaced by zero or any other value that is independent of
|
660 |
+
Uk.
|
661 |
+
To obtain a proper zero-order method, a crucial assumption is to choose the amplitude
|
662 |
+
functions A+, A− in (2.1) to be the same. In the brain, these functions are close, but some
|
663 |
+
11
|
664 |
+
|
665 |
+
authors argue that there is a slight difference [34]. Such differences would lead to additional,
|
666 |
+
small contributions in the iterations that cannot be linked to the gradient.
|
667 |
+
A statistical analysis of the zero-order method (4.5) is challenging, even for simple models
|
668 |
+
such as data generated from the linear regression model.
|
669 |
+
Another open problem is to
|
670 |
+
determine whether the convergence rate of (4.5) scales in the number of parameters d in
|
671 |
+
the same way as other zero-order methods.
|
672 |
+
5
|
673 |
+
Literature on learning with BNNs
|
674 |
+
This literature survey is aimed to give a quick overview. For a more detailed summary of
|
675 |
+
related literature, see [37, 41].
|
676 |
+
To train BNNs on data, a natural idea is to ignore Hebbian learning and to fit BNNs via
|
677 |
+
gradient descent. Similar as backpropagation efficiently computes the gradient in ANNs,
|
678 |
+
SpikeProp [3, 4] is an algorithm to compute the gradient for spiking neural networks.
|
679 |
+
The weight transportation problem is caused by the parameter dependence in the backwards
|
680 |
+
pass of the backpropagation algorithm. Feedback alignment [18, 26, 17, 1, 19] avoids this
|
681 |
+
by using the backpropagation algorithm with random weights. In a network, the feedback
|
682 |
+
could be then transmitted via specific feedback neurons.
|
683 |
+
If the brain does a version of backpropagation, the difficulty is always the feedback from
|
684 |
+
the output backwards to the neurons. Contrastive Hebbian learning [27] assumes that there
|
685 |
+
are two different phases. During the first phase the network does prediction and the second
|
686 |
+
phase starts after the prediction error is revealed. In one of the phases the learning is
|
687 |
+
Hebbian and in the other one, the learning is anti-Hebbian. Anti-Hebbian learning means
|
688 |
+
that if two neurons fire together, the connecting weight parameter is decreased instead of
|
689 |
+
increased. Equilibrium propagation [29] overcomes the two types of learning in the different
|
690 |
+
phases but requires again the computation of a gradient.
|
691 |
+
For a biologically more plausible implementation of the weight transportation problem,
|
692 |
+
predictive coding [40, 41, 35, 22, 23] uses two types of neurons, named error nodes and value
|
693 |
+
nodes. These two nodes are associated to each other and process forward and backward
|
694 |
+
information locally.
|
695 |
+
[31] proposes the concept of a ”hedonistic synapse” that follows a Hebbian learning rule
|
696 |
+
and takes the global reward into account. For the learning, a hedonistic synapse has to be
|
697 |
+
able to store information from previous trials in a so-called eligibility trace.
|
698 |
+
Closest to our approach is weight perturbation [39]. Weight perturbation adds random
|
699 |
+
12
|
700 |
+
|
701 |
+
noise to the parameters or the outputs and compares the loss with and without added
|
702 |
+
noise to estimate the gradient. Whereas the cause of the noise perturbation is not entirely
|
703 |
+
clear in the weight perturbation framework, we have shown in this work, how the spike
|
704 |
+
train structure in BNNs implies a random perturbation of the parameters in the loss with
|
705 |
+
uniformly distributed noise and how this leads to a specific derivative-free updating formula
|
706 |
+
for the weights that also involves the difference of the loss function evaluated for different
|
707 |
+
instance of the noisy parameters.
|
708 |
+
A more statistical approach is [24] considering unsupervised classification using a small
|
709 |
+
BNN. This work identifies a closer link between a Hebbian learning rule and the EM-
|
710 |
+
algorithm for mixtures of multinomial distributions.
|
711 |
+
Some other ideas on unsupervised
|
712 |
+
learning in BNNs are moreover provided in [12], Section 19.3.
|
713 |
+
To summarize, there are various theories that are centered around the idea that the learning
|
714 |
+
in BNNs should be linked to gradient descent. All of these approaches, however, contain
|
715 |
+
still biological implausibilities and lack a theoretical analysis.
|
716 |
+
References
|
717 |
+
[1] Bartunov, S., Santoro, A., Richards, B., Marris, L., Hinton, G. E., and
|
718 |
+
Lillicrap, T. Assessing the scalability of biologically-motivated deep learning al-
|
719 |
+
gorithms and architectures. In Advances in Neural Information Processing Systems
|
720 |
+
(2018), S. Bengio, H. Wallach, H. Larochelle, K. Grauman, N. Cesa-Bianchi, and
|
721 |
+
R. Garnett, Eds., vol. 31, Curran Associates, Inc.
|
722 |
+
[2] Bi, G.-q., and Poo, M.-m. Synaptic modifications in cultured hippocampal neurons:
|
723 |
+
Dependence on spike timing, synaptic strength, and postsynaptic cell type. Journal of
|
724 |
+
Neuroscience 18, 24 (1998), 10464–10472.
|
725 |
+
[3] Bohte, S. M., Kok, J. N., and La Poutr´e, H. Error-backpropagation in tempo-
|
726 |
+
rally encoded networks of spiking neurons. Neurocomputing 48, 1 (2002), 17–37.
|
727 |
+
[4] Booij, O., and tat Nguyen, H. A gradient descent rule for spiking neurons emitting
|
728 |
+
multiple spikes. Information Processing Letters 95, 6 (2005), 552–558.
|
729 |
+
[5] Brown, N., and Sandholm, T. Superhuman AI for heads-up no-limit poker: Li-
|
730 |
+
bratus beats top professionals. Science 359, 6374 (2018), 418–424.
|
731 |
+
[6] Conn, A. R., Scheinberg, K., and Vicente, L. N. Introduction to derivative-free
|
732 |
+
optimization, vol. 8 of MPS/SIAM Series on Optimization. Society for Industrial and
|
733 |
+
13
|
734 |
+
|
735 |
+
Applied Mathematics (SIAM), Philadelphia, PA; Mathematical Programming Society
|
736 |
+
(MPS), Philadelphia, PA, 2009.
|
737 |
+
[7] Crick, F. The recent excitement about neural networks. Nature 337, 6203 (1989),
|
738 |
+
129–132.
|
739 |
+
[8] Daley, D. J., and Vere-Jones, D. An introduction to the theory of point processes.
|
740 |
+
Vol. I, second ed. Probability and its Applications (New York). Springer-Verlag, New
|
741 |
+
York, 2003. Elementary theory and methods.
|
742 |
+
[9] Daley, D. J., and Vere-Jones, D. An introduction to the theory of point processes.
|
743 |
+
Vol. II, second ed. Probability and its Applications (New York). Springer, New York,
|
744 |
+
2008. General theory and structure.
|
745 |
+
[10] Duchi, J. C., Jordan, M. I., Wainwright, M. J., and Wibisono, A. Optimal
|
746 |
+
rates for zero-order convex optimization: The power of two function evaluations. IEEE
|
747 |
+
Transactions on Information Theory 61, 5 (2015), 2788–2806.
|
748 |
+
[11] Fr´emaux, N., Sprekeler, H., and Gerstner, W. Functional requirements for
|
749 |
+
reward-modulated spike-timing-dependent plasticity. Journal of Neuroscience 30, 40
|
750 |
+
(2010), 13326–13337.
|
751 |
+
[12] Gerstner, W., Kistler, W. M., Naud, R., and Paninski, L. Neuronal Dynam-
|
752 |
+
ics: From Single Neurons to Networks and Models of Cognition. Cambridge University
|
753 |
+
Press, 2014.
|
754 |
+
[13] Golovin, D., Solnik, B., Moitra, S., Kochanski, G., Karro, J. E., and
|
755 |
+
Sculley, D., Eds. Google Vizier: A Service for Black-Box Optimization (2017).
|
756 |
+
[14] Grossberg, S. Competitive learning: From interactive activation to adaptive reso-
|
757 |
+
nance. Cognitive Science 11, 1 (1987), 23–63.
|
758 |
+
[15] Hebb, D.
|
759 |
+
The Organization of Behavior: A Neuropsychological Theory (1st ed.).
|
760 |
+
Psychology Press, 2002.
|
761 |
+
[16] Larson, J., Menickelly, M., and Wild, S. M. Derivative-free optimization meth-
|
762 |
+
ods. Acta Numer. 28 (2019), 287–404.
|
763 |
+
[17] Liao, Q., Leibo, J., and Poggio, T. How important is weight symmetry in back-
|
764 |
+
propagation?
|
765 |
+
Proceedings of the AAAI Conference on Artificial Intelligence 30, 1
|
766 |
+
(2016).
|
767 |
+
14
|
768 |
+
|
769 |
+
[18] Lillicrap, T. P., Cownden, D., Tweed, D. B., and Akerman, C. J. Random
|
770 |
+
synaptic feedback weights support error backpropagation for deep learning. Nature
|
771 |
+
Communications 7, 1 (2016), 13276.
|
772 |
+
[19] Lillicrap, T. P., Santoro, A., Marris, L., Akerman, C. J., and Hinton, G.
|
773 |
+
Backpropagation and the brain. Nature Reviews Neuroscience 21, 6 (2020), 335–346.
|
774 |
+
[20] Liu, S., Chen, P.-Y., Kailkhura, B., Zhang, G., Hero III, A. O., and Varsh-
|
775 |
+
ney, P. K. A primer on zeroth-order optimization in signal processing and machine
|
776 |
+
learning: Principals, recent advances, and applications. IEEE Signal Processing Mag-
|
777 |
+
azine 37, 5 (2020), 43–54.
|
778 |
+
[21] Markram, H., L¨ubke, J., Frotscher, M., and Sakmann, B.
|
779 |
+
Regulation of
|
780 |
+
synaptic efficacy by coincidence of postsynaptic APs and EPSPs. Science, 275 (1997),
|
781 |
+
213–215.
|
782 |
+
[22] Millidge, B., Seth, A., and Buckley, C. L. Predictive coding: a theoretical and
|
783 |
+
experimental review. arXiv e-prints (July 2021), arXiv:2107.12979.
|
784 |
+
[23] Millidge, B., Tschantz, A., and Buckley, C. L. Predictive coding approximates
|
785 |
+
backprop along arbitrary computation graphs. Neural Computation 34, 6 (05 2022),
|
786 |
+
1329–1368.
|
787 |
+
[24] Nessler, B., Pfeiffer, M., and Maass, W. STDP enables spiking neurons to
|
788 |
+
detect hidden causes of their inputs. In Advances in Neural Information Processing
|
789 |
+
Systems (2009), Y. Bengio, D. Schuurmans, J. Lafferty, C. Williams, and A. Culotta,
|
790 |
+
Eds., vol. 22, Curran Associates, Inc.
|
791 |
+
[25] Nesterov, Y., and Spokoiny, V. Random gradient-free minimization of convex
|
792 |
+
functions. Found. Comput. Math. 17, 2 (2017), 527–566.
|
793 |
+
[26] Nøkland, A. Direct feedback alignment provides learning in deep neural networks.
|
794 |
+
In Advances in Neural Information Processing Systems (2016), D. Lee, M. Sugiyama,
|
795 |
+
U. Luxburg, I. Guyon, and R. Garnett, Eds., vol. 29, Curran Associates, Inc.
|
796 |
+
[27] O’Reilly, R. C. Biologically plausible error-driven learning using local activation
|
797 |
+
differences: The generalized recirculation algorithm. Neural Computation 8, 5 (1996),
|
798 |
+
895–938.
|
799 |
+
[28] Pawlak, V., Wickens, J., Kirkwood, A., and Kerr, J. Timing is not everything:
|
800 |
+
Neuromodulation opens the STDP gate. Front Synaptic Neurosci. 2 (2010), 146.
|
801 |
+
15
|
802 |
+
|
803 |
+
[29] Scellier, B., and Bengio, Y. Equilibrium propagation: Bridging the gap between
|
804 |
+
energy-based models and backpropagation. Frontiers in Computational Neuroscience
|
805 |
+
11 (2017).
|
806 |
+
[30] Schmidhuber, J. Deep learning in neural networks: An overview. Neural Networks
|
807 |
+
61 (2015), 85–117.
|
808 |
+
[31] Seung, H. S.
|
809 |
+
Learning in spiking neural networks by reinforcement of stochastic
|
810 |
+
synaptic transmission. Neuron 40, 6 (2023/01/05 2003), 1063–1073.
|
811 |
+
[32] Shatz, C. J. The developing brain. Scientific American 267, 3 (1992), 60–67.
|
812 |
+
[33] Silver, D., Huang, A., Maddison, C. J., Guez, A., Sifre, L., van den Driess-
|
813 |
+
che, G., Schrittwieser, J., Antonoglou, I., Panneershelvam, V., Lanctot,
|
814 |
+
M., Dieleman, S., Grewe, D., Nham, J., Kalchbrenner, N., Sutskever, I.,
|
815 |
+
Lillicrap, T., Leach, M., Kavukcuoglu, K., Graepel, T., and Hassabis, D.
|
816 |
+
Mastering the game of Go with deep neural networks and tree search. Nature 529,
|
817 |
+
7587 (2016), 484–489.
|
818 |
+
[34] Song, S., Miller, K. D., and Abbott, L. F.
|
819 |
+
Competitive Hebbian learning
|
820 |
+
through spike-timing-dependent synaptic plasticity. Nature Neuroscience 3, 9 (2000),
|
821 |
+
919–926.
|
822 |
+
[35] Song, Y., Lukasiewicz, T., Xu, Z., and Bogacz, R. Can the brain do back-
|
823 |
+
propagation? — exact implementation of backpropagation in predictive coding net-
|
824 |
+
works. In Advances in Neural Information Processing Systems (2020), H. Larochelle,
|
825 |
+
M. Ranzato, R. Hadsell, M. Balcan, and H. Lin, Eds., vol. 33, Curran Associates, Inc.,
|
826 |
+
pp. 22566–22579.
|
827 |
+
[36] Spall, J. C. Introduction to stochastic search and optimization. Wiley-Interscience
|
828 |
+
Series in Discrete Mathematics and Optimization. Wiley-Interscience [John Wiley &
|
829 |
+
Sons], Hoboken, NJ, 2003. Estimation, simulation, and control.
|
830 |
+
[37] Tavanaei, A., Ghodrati, M., Kheradpisheh, S. R., Masquelier, T., and
|
831 |
+
Maida, A. Deep learning in spiking neural networks. Neural Networks 111 (2019),
|
832 |
+
47–63.
|
833 |
+
[38] Tsybakov, A. B. Introduction to nonparametric estimation. Springer Series in Statis-
|
834 |
+
tics. Springer, New York, 2009. Revised and extended from the 2004 French original,
|
835 |
+
Translated by Vladimir Zaiats.
|
836 |
+
[39] Werfel, J., Xie, X., and Seung, H. S. Learning curves for stochastic gradient
|
837 |
+
descent in linear feedforward networks. In NIPS (2003), pp. 1197–1204.
|
838 |
+
16
|
839 |
+
|
840 |
+
[40] Whittington, J. C. R., and Bogacz, R. An approximation of the error backpropa-
|
841 |
+
gation algorithm in a predictive coding network with local Hebbian synaptic plasticity.
|
842 |
+
Neural Computation 29, 5 (2017), 1229–1262.
|
843 |
+
[41] Whittington, J. C. R., and Bogacz, R. Theories of error back-propagation in
|
844 |
+
the brain. Trends in Cognitive Sciences 23, 3 (2019), 235–250.
|
845 |
+
[42] Zhang, L. I., Tao, H. W., Holt, C. E., Harris, W. A., and Poo, M.-m. A crit-
|
846 |
+
ical window for cooperation and competition among developing retinotectal synapses.
|
847 |
+
Nature 395, 6697 (1998), 37–44.
|
848 |
+
17
|
849 |
+
|
5tFKT4oBgHgl3EQfSy3E/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
69AyT4oBgHgl3EQfcvd4/content/2301.00289v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:5dd79f9674b538610012f0a31c5101752dfa03f1edbca5d926e88cc1ba2c8b61
|
3 |
+
size 255460
|
69AyT4oBgHgl3EQfcvd4/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:1f99301af4c8b96217936422dcced8fc46736f07c7af89066e50f9a2ff381880
|
3 |
+
size 1048621
|
69AyT4oBgHgl3EQfcvd4/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:7dbcf28c61965df31969528de23ab38a62a229a134e881be5711ec0ec5048fdc
|
3 |
+
size 41234
|
6NFAT4oBgHgl3EQfnR2x/content/2301.08628v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:4433c9a4442ce20aa537cc399c1ed3ddc27981a31216159366475b940e76124f
|
3 |
+
size 6864968
|
6NFAT4oBgHgl3EQfnR2x/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:9aff6d6e1d12eb69a5fd01627ff5fb225191afcdec1046f7c2c3ea1a8664f155
|
3 |
+
size 8650797
|
6NFAT4oBgHgl3EQfnR2x/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:29e172e701236b3491547410195aa5877e1ef45a7ebef71f20d052efe96604c7
|
3 |
+
size 316984
|
6tAzT4oBgHgl3EQfEvoZ/content/2301.00997v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:9164a57341f3b71bb9b614b178f7ab7096b73a72635d04f4c4605d7cbc172445
|
3 |
+
size 1687901
|
6tAzT4oBgHgl3EQfEvoZ/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:5ba7dd8be19eeb3d0751a4411444cca22cdd0405c0e73c2591451961e343c220
|
3 |
+
size 1572909
|
6tAzT4oBgHgl3EQfEvoZ/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:bee5948cb46a49405ceb5b828833aef74461e61a91965a475f84080f47afb095
|
3 |
+
size 61462
|
7tAyT4oBgHgl3EQfQvZV/content/tmp_files/2301.00051v1.pdf.txt
ADDED
@@ -0,0 +1,2553 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
IEEE ROBOTICS AND AUTOMATION LETTERS. PREPRINT VERSION. ACCEPTED DEC, 2022
|
2 |
+
1
|
3 |
+
Learning from Guided Play:
|
4 |
+
Improving Exploration for Adversarial Imitation
|
5 |
+
Learning with Simple Auxiliary Tasks
|
6 |
+
Trevor Ablett1, Bryan Chan2, and Jonathan Kelly1
|
7 |
+
Abstract—Adversarial imitation learning (AIL) has become a
|
8 |
+
popular alternative to supervised imitation learning that reduces
|
9 |
+
the distribution shift suffered by the latter. However, AIL requires
|
10 |
+
effective exploration during an online reinforcement learning
|
11 |
+
phase. In this work, we show that the standard, na¨ıve approach
|
12 |
+
to exploration can manifest as a suboptimal local maximum
|
13 |
+
if a policy learned with AIL sufficiently matches the expert
|
14 |
+
distribution without fully learning the desired task. This can
|
15 |
+
be particularly catastrophic for manipulation tasks, where the
|
16 |
+
difference between an expert and a non-expert state-action pair
|
17 |
+
is often subtle. We present Learning from Guided Play (LfGP),
|
18 |
+
a framework in which we leverage expert demonstrations of
|
19 |
+
multiple exploratory, auxiliary tasks in addition to a main task.
|
20 |
+
The addition of these auxiliary tasks forces the agent to explore
|
21 |
+
states and actions that standard AIL may learn to ignore.
|
22 |
+
Additionally, this particular formulation allows for the reusability
|
23 |
+
of expert data between main tasks. Our experimental results in
|
24 |
+
a challenging multitask robotic manipulation domain indicate
|
25 |
+
that LfGP significantly outperforms both AIL and behaviour
|
26 |
+
cloning, while also being more expert sample efficient than these
|
27 |
+
baselines. To explain this performance gap, we provide further
|
28 |
+
analysis of a toy problem that highlights the coupling between
|
29 |
+
a local maximum and poor exploration, and also visualize the
|
30 |
+
differences between the learned models from AIL and LfGP.3
|
31 |
+
Index Terms—Imitation Learning, Reinforcement Learning,
|
32 |
+
Transfer Learning
|
33 |
+
I. INTRODUCTION
|
34 |
+
E
|
35 |
+
XPLORATION is a crucial part of effective reinforce-
|
36 |
+
ment learning (RL). A variety of methods have attempted
|
37 |
+
to optimize the exploration-exploitation trade-off of RL agents
|
38 |
+
[1]–[3], but the development of a technique that generalizes
|
39 |
+
across domains remains an open research problem. A simple,
|
40 |
+
well-known approach to reduce the need for random explo-
|
41 |
+
ration is to provide a dense, or “shaped,” reward to learn from,
|
42 |
+
but this can be very challenging to design appropriately [4].
|
43 |
+
Furthermore, the environment may not directly provide the
|
44 |
+
low-level state information required for such a reward. An
|
45 |
+
alternative to providing a dense reward is to learn a reward
|
46 |
+
Manuscript received: Nov. 3, 2022; Accepted: Dec. 18, 2022.
|
47 |
+
This paper was recommended for publication by Editor Jens Kober upon
|
48 |
+
evaluation of the Associate Editor and Reviewers’ comments.
|
49 |
+
1Authors are with the Space & Terrestrial Autonomous Robotic Systems
|
50 |
+
(STARS) Laboratory at the University of Toronto Institute for Aerospace
|
51 |
+
Studies (UTIAS), Toronto, Ontario, Canada, M3H 5T6. Email: <first
|
52 |
+
name>.<last name>@robotics.utias.utoronto.ca
|
53 |
+
2Author is with the Department of Computing Science at the Uni-
|
54 |
+
versity
|
55 |
+
of
|
56 |
+
Alberta,
|
57 |
+
Edmonton,
|
58 |
+
Alberta,
|
59 |
+
Canada,
|
60 |
+
T6G
|
61 |
+
2E8.
|
62 |
+
Email:
|
63 | |
64 |
+
Digital Object Identifier (DOI): see top of this page.
|
65 |
+
3Code, Blog, Appendix: https://papers.starslab.ca/lfgp
|
66 |
+
Fig. 1: Learning from Guided Play (LfGP) finds an effective stacking
|
67 |
+
policy by learning to compose multiple simple auxiliary tasks (only
|
68 |
+
Reach is shown, for this episode) along with stacking. Discrim-
|
69 |
+
inator Actor-Critic (DAC) [7], or off-policy AIL, reaches a local
|
70 |
+
maximum action-value function and policy, failing to solve the task.
|
71 |
+
Arrow direction indicates mean policy velocity action, red-to-yellow
|
72 |
+
(background) indicates low-to-high learned value, while arrow colour
|
73 |
+
indicates probability of closing (green) or opening (blue) the gripper.
|
74 |
+
function from expert demonstrations of a task, in a process
|
75 |
+
known as inverse RL (IRL) [5]. Many modern approaches
|
76 |
+
to IRL are part of the adversarial imitation learning (AIL)
|
77 |
+
family [6]. In AIL, rather than learning a reward function
|
78 |
+
directly, the policy and a learned discriminator form a two-
|
79 |
+
player min-max optimization problem, where the policy aims
|
80 |
+
to confuse the discriminator by producing expert-like data,
|
81 |
+
while the discriminator attempts to classify expert and non-
|
82 |
+
expert data.
|
83 |
+
Although AIL has been shown to be more expert sample
|
84 |
+
efficient than supervised imitation learning (also known as be-
|
85 |
+
havioural cloning, or BC) in continuous-control environments
|
86 |
+
[6]–[8], its application to long-horizon robotic manipulation
|
87 |
+
tasks with a wide distribution of possible initial configurations
|
88 |
+
remains challenging [7], [9]. In this work, we investigate the
|
89 |
+
use of AIL in a multitask robotic manipulation domain. We
|
90 |
+
find that a state-of-the-art AIL method, in which off-policy
|
91 |
+
learning is used to maximize environment sample efficiency [7]
|
92 |
+
(i.e., reduce the quantity of environment interaction required
|
93 |
+
from the online RL portion of AIL), is outperformed by BC
|
94 |
+
arXiv:2301.00051v1 [cs.LG] 30 Dec 2022
|
95 |
+
|
96 |
+
LfGP
|
97 |
+
DAC
|
98 |
+
Reach
|
99 |
+
Stack
|
100 |
+
Pre-Grasp
|
101 |
+
Post-Grasp2
|
102 |
+
IEEE ROBOTICS AND AUTOMATION LETTERS. PREPRINT VERSION. ACCEPTED DEC, 2022
|
103 |
+
Multitask Environment
|
104 |
+
Reach
|
105 |
+
Lift
|
106 |
+
Bring
|
107 |
+
Together
|
108 |
+
Insert
|
109 |
+
Stack
|
110 |
+
Guided Expert Play
|
111 |
+
Guide
|
112 |
+
Expert
|
113 |
+
bring_0
|
114 |
+
together
|
115 |
+
stack_01
|
116 |
+
Multitask Environment
|
117 |
+
Reach( )
|
118 |
+
Lift( )
|
119 |
+
Bring( )
|
120 |
+
Insert( )
|
121 |
+
Stack( )
|
122 |
+
Multitask Environment
|
123 |
+
Reach
|
124 |
+
Lift
|
125 |
+
Bring
|
126 |
+
Together
|
127 |
+
Insert
|
128 |
+
Stack
|
129 |
+
Guided Expert Play
|
130 |
+
Expert
|
131 |
+
lift( )
|
132 |
+
Guide
|
133 |
+
Guide
|
134 |
+
stack( )
|
135 |
+
Guided Agent Play
|
136 |
+
Move( )
|
137 |
+
RESET
|
138 |
+
NEXT
|
139 |
+
Expert
|
140 |
+
lift( )
|
141 |
+
Sched
|
142 |
+
( )
|
143 |
+
stack( )
|
144 |
+
Sched
|
145 |
+
(lift( ))
|
146 |
+
Agent
|
147 |
+
Multitask AIL
|
148 |
+
Update
|
149 |
+
Fig. 2: The main components of our system for learning from guided play. In a multitask environment, a guide prompts an expert for a mix
|
150 |
+
of multitask demonstrations, after which we learn a multitask policy through scheduled hierarchical AIL.
|
151 |
+
with an equivalent amount of expert data, contradicting previ-
|
152 |
+
ous results [6]–[8]. Through a simplified example, simulated
|
153 |
+
robotic experiments, and learned model analysis, we show
|
154 |
+
that this outcome occurs because a model learned with expert
|
155 |
+
data and a discriminator is susceptible to the deceptive reward
|
156 |
+
problem [10]. In other words, while AIL, and more generally
|
157 |
+
IRL, can provide something akin to a dense reward, this reward
|
158 |
+
is not necessarily optimal for teaching, and AIL alone does
|
159 |
+
not enforce sufficiently diverse exploration to escape locally
|
160 |
+
optimal but globally poor models. A locally-optimal policy has
|
161 |
+
converged to match a subset of the expert data, but in doing
|
162 |
+
so, avoids crucial states and actions (e.g., in Fig. 1, grasping
|
163 |
+
the blue block) required to globally match the full expert set.
|
164 |
+
To overcome this limitation of AIL, we present Learning
|
165 |
+
from Guided Play (LfGP),4 in which we combine AIL with a
|
166 |
+
scheduled approach to hierarchical RL (HRL) [12], allowing
|
167 |
+
an agent to ‘play’ in the environment with an expert guide.
|
168 |
+
Using expert demonstrations of multiple relevant auxiliary
|
169 |
+
tasks (e.g., Reach, Lift, Move-Object), along with a main task
|
170 |
+
(e.g., Stack, Bring, Insert), our scheduled hierarchical agent
|
171 |
+
is able to learn tasks where AIL alone fails. Crucially, our
|
172 |
+
formulation also allows auxiliary expert data to be reused
|
173 |
+
between main tasks, further emphasizing the expert sample
|
174 |
+
efficiency of our method.
|
175 |
+
We use the word play to describe an agent that simulta-
|
176 |
+
neously attempts and learns numerous tasks at once, freely
|
177 |
+
composing them together, inspired by the playful (as opposed
|
178 |
+
to goal-directed) phase of learning experienced by children
|
179 |
+
[12]. In our case, guided represents two separate but related
|
180 |
+
ideas: first, that the expert guides this play, as opposed to
|
181 |
+
requiring hand-crafted sparse rewards as in [12] (right side
|
182 |
+
of Fig. 2), and second, that the expert gathering of multitask,
|
183 |
+
semi-structured demonstrations is guided by uniform-random
|
184 |
+
task selection (middle of Fig. 2), rather than requiring the
|
185 |
+
expert to choose transitions between goals, as in [13], [14].
|
186 |
+
Our specific contributions are the following:
|
187 |
+
1) A novel application of a hierarchical framework [12] to
|
188 |
+
AIL that learns a reward and policy for a challenging
|
189 |
+
4Originally presented as a non-archival workshop paper [11].
|
190 |
+
main task by simultaneously learning rewards and poli-
|
191 |
+
cies for auxiliary tasks.
|
192 |
+
2) Manipulation experiments in which we demonstrate that
|
193 |
+
AIL fails, while LfGP significantly outperforms both
|
194 |
+
AIL and BC.
|
195 |
+
3) A thorough ablation study to examine the effects of
|
196 |
+
various design choices for LfGP and our baselines.
|
197 |
+
4) Empirical analysis, including a simplified representative
|
198 |
+
example and visualization of the learned models of LfGP
|
199 |
+
and AIL, to better understand why AIL fails and how
|
200 |
+
LfGP improves upon it.
|
201 |
+
II. PROBLEM FORMULATION
|
202 |
+
A Markov decision process (MDP) is defined as M =
|
203 |
+
⟨S, A, R, P, ρ0, γ⟩, where the sets S and A are respectively
|
204 |
+
the state and action space, R : S×A → R is a reward function,
|
205 |
+
P is the state-transition environment dynamics distribution, ρ0
|
206 |
+
is the initial state distribution, and γ is the discount factor.
|
207 |
+
Actions are sampled from a stochastic policy π(a|s). The
|
208 |
+
policy π interacts with the environment to yield experience
|
209 |
+
(st, at, rt, st+1) for t = 0, . . . , ∞, where s0 ∼ ρ0(·), at ∼
|
210 |
+
π(·|st), st+1 ∼ P(·|st, at), rt = R(st, at). When referring to
|
211 |
+
finite-horizon tasks, t = T indicates the final timestep of a
|
212 |
+
trajectory.
|
213 |
+
For notational convenience, we assume infinite-horizon,
|
214 |
+
non-terminating environments where t is unbounded, but
|
215 |
+
the extension to the finite-horizon case is trivial. We aim
|
216 |
+
to learn a policy π that maximizes the expected return
|
217 |
+
J(π)
|
218 |
+
=
|
219 |
+
Eπ [G(τ0:∞)]
|
220 |
+
=
|
221 |
+
Eπ [�∞
|
222 |
+
t=0 γtR(st, at)], where
|
223 |
+
τt:∞ = {(st, at), . . . } is the trajectory starting with (st, at),
|
224 |
+
and G(τt:∞) is the return of trajectory τ.
|
225 |
+
In this work, we focus on imitation learning (IL), where
|
226 |
+
R is unknown and instead we are given a finite set of expert
|
227 |
+
demonstration (s, a) pairs BE =
|
228 |
+
�
|
229 |
+
(s, a)E, . . .
|
230 |
+
�
|
231 |
+
. In AIL, we
|
232 |
+
attempt to simultaneously learn π and a discriminator D : S ×
|
233 |
+
A → [0, 1] that differentiates between expert samples (s, a)E
|
234 |
+
and policy samples (s, a)π and subsequently define R using D
|
235 |
+
[6], [7]. To accommodate hierarchical learning, we augment
|
236 |
+
M to contain auxiliary tasks, where Taux = {T1, . . . , TK} are
|
237 |
+
separate MDPs that share S, A, P, ρ0 and γ with the main
|
238 |
+
task Tmain but have their own reward functions, Rk. With this
|
239 |
+
|
240 |
+
ABLETT et al.: LEARNING FROM GUIDED PLAY
|
241 |
+
3
|
242 |
+
Fig. 3: An MDP, analogous to stacking, with an expert demonstration.
|
243 |
+
Poor exploration can lead AIL to learn a suboptimal policy.
|
244 |
+
modification, we refer to entities in our model that are specific
|
245 |
+
to task T ∈ Tall, Tall = Taux ∪ {Tmain}, as (·)T . We assume
|
246 |
+
that we have a set of expert data BE
|
247 |
+
T for each task.
|
248 |
+
III. LOCAL MAXIMUM WITH OFF-POLICY AIL
|
249 |
+
In this section, we provide a representative example of how
|
250 |
+
AIL can fail by reaching a locally maximum policy due to a
|
251 |
+
learned deceptive reward [10] coupled with poor exploration.
|
252 |
+
A simple six-state MDP is shown in Fig. 3, with ten state-
|
253 |
+
conditional actions. We refer to actions as at = anm and states
|
254 |
+
as st = sn where t, n and m refer to the current timestep,
|
255 |
+
current state, and next state, respectively. The reward function
|
256 |
+
is R(s5, a55) = +1, R(s1, a15) = −5 and 0 for all other state-
|
257 |
+
action pairs. The initial state s1 is always s1, the fixed horizon
|
258 |
+
length is 5, and no discounting is used.
|
259 |
+
The MDP is meant to be roughly analogous to a stacking
|
260 |
+
manipulation task: s2, s3, s4 and s6 represent the first block
|
261 |
+
being reached, grasped, lifted, and dropped respectively. State
|
262 |
+
s5 represents the gripper hovering over the second block
|
263 |
+
(whether the first block has been stacked or not), while s1 is
|
264 |
+
the reset state, and a15 represents reaching s5 without grasping
|
265 |
+
the first block. Taking action a15 results in a total return of
|
266 |
+
-1 (because R(s1, a15) = −5), since the first block has not
|
267 |
+
actually been grasped. In our case, the agent does not receive
|
268 |
+
any reward, and instead an expert demonstration of the optimal
|
269 |
+
trajectory is provided. We will assume access to a learned
|
270 |
+
(perfect) discriminator, and will use the AIRL [8] reward, so
|
271 |
+
state-action pairs in the expert set receive +1 reward and all
|
272 |
+
others receive -1.
|
273 |
+
We define the action-value Q(st, at) as the expected
|
274 |
+
value of taking action at in state st, and initialize it to
|
275 |
+
zero for all (s, a) pairs. We define our update rule as the
|
276 |
+
standard Q-Learning update [1], Q(st, at) = Q(st, at) +
|
277 |
+
α (R(st, at) + maxa Q(st+1, a) − Q(st, at)), with α = 0.1.
|
278 |
+
The agent uses ϵ-greedy exploration, storing each (st, at, st+1)
|
279 |
+
tuple into a buffer. After each episode, all Q values are updated
|
280 |
+
to convergence using the whole buffer.
|
281 |
+
After the first complete episode of {a15, a55, a55, a55, a55},
|
282 |
+
Q(s1, a15)
|
283 |
+
=
|
284 |
+
2.7, and Q(s1, a12)
|
285 |
+
=
|
286 |
+
0. In the second
|
287 |
+
({a12, a26, a61, a15, a55}) and third ({a12, a23, a36, a61, a15})
|
288 |
+
episodes, the agent initially moves in the correct direction, but
|
289 |
+
ultimately still fails. The final Q values in s1 are Q(s1, a15) =
|
290 |
+
0.49 and Q(s1, a12) = 0.13.5
|
291 |
+
A policy maximizing Q, having simultaneously learned to
|
292 |
+
avoid s6 (by avoiding s2 and s3) and exploiting the (s5, a55)
|
293 |
+
expert pair, will choose a1 = a15, giving a final return of
|
294 |
+
-1 in the real MDP. This behaviour matches what we see in
|
295 |
+
Fig. 1: due to the large negative reward from dropping the
|
296 |
+
block, AIL learns a policy that avoids stacking altogether and
|
297 |
+
merely reaches the second block, just as AIL here learns to
|
298 |
+
skip s2 and s3 and exploit a55. In both cases, poor initial
|
299 |
+
exploration leads to a deceptive reward, which exacerbates
|
300 |
+
poor exploration.
|
301 |
+
IV. LEARNING FROM GUIDED PLAY (LFGP)
|
302 |
+
We now introduce Learning from Guided Play (LfGP). Our
|
303 |
+
primary goal is to learn a policy πTmain that can solve the main
|
304 |
+
task Tmain, with a secondary goal of also learning auxiliary task
|
305 |
+
policies πT1, . . . , πTK that are used for improved exploration.
|
306 |
+
More specifically, we derive a hierarchical learning objective
|
307 |
+
that is decomposed into three parts: i) recovering the reward
|
308 |
+
function of each task with expert demonstrations, ii) training
|
309 |
+
all policies to achieve their respective goals, and iii) using all
|
310 |
+
policies for effective exploration in Tmain. For a summary of
|
311 |
+
the algorithm, see supplementary material link in Footnote 3.
|
312 |
+
A. Learning the Reward Function
|
313 |
+
We first describe how to recover the reward functions from
|
314 |
+
expert demonstrations. For each task T ∈ Tall, we learn a dis-
|
315 |
+
criminator DT (s, a) that is used to define the reward function
|
316 |
+
for policy optimization. We construct the joint discriminator
|
317 |
+
loss following [7] to train each discriminator in an off-policy
|
318 |
+
manner:
|
319 |
+
L(D) = −
|
320 |
+
�
|
321 |
+
T ∈Tall
|
322 |
+
EB [log (1 − DT (s, a))]
|
323 |
+
+EBE
|
324 |
+
T [log (DT (s, a))] .
|
325 |
+
(1)
|
326 |
+
Each resulting discriminator DT attempts to differentiate the
|
327 |
+
occupancy measure between the distributions induced by BE
|
328 |
+
T
|
329 |
+
and B. We can use DT to define various reward functions [7];
|
330 |
+
following [8], we define the reward function for each task T
|
331 |
+
to be RT (st, at) = log (DT (st, at)) − log (1 − DT (st, at)).
|
332 |
+
B. Learning the Hierarchical Agent
|
333 |
+
We adapt Scheduled Auxiliary Control (SAC-X) [12] to
|
334 |
+
learn the hierarchical agent. The agent includes low-level
|
335 |
+
intention policies (equivalently referred to as intentions), a
|
336 |
+
high-level scheduler policy, as well as the Q-functions and the
|
337 |
+
discriminators. The intentions aim to solve their corresponding
|
338 |
+
tasks (i.e., the intention πT aims to maximize the task return
|
339 |
+
J(πT )), whereas the scheduler aims to maximize the expected
|
340 |
+
return for Tmain by selecting a sequence of intentions to interact
|
341 |
+
with the environment. For the remainder of the paper, when
|
342 |
+
we refer to a policy, we are referring to an intention policy,
|
343 |
+
as opposed to the scheduler, unless otherwise specified.
|
344 |
+
5See six_state_mdp.py from open source code to reproduce.
|
345 |
+
|
346 |
+
Legend
|
347 |
+
2
|
348 |
+
S
|
349 |
+
-5
|
350 |
+
MDP
|
351 |
+
C
|
352 |
+
2
|
353 |
+
3
|
354 |
+
S
|
355 |
+
S
|
356 |
+
S
|
357 |
+
6
|
358 |
+
S
|
359 |
+
a5
|
360 |
+
Expert Demo
|
361 |
+
a4
|
362 |
+
a1
|
363 |
+
2
|
364 |
+
S
|
365 |
+
S
|
366 |
+
a2
|
367 |
+
a3
|
368 |
+
S
|
369 |
+
a1
|
370 |
+
a2-5
|
371 |
+
Suboptimal AIL Policy
|
372 |
+
S4
|
373 |
+
IEEE ROBOTICS AND AUTOMATION LETTERS. PREPRINT VERSION. ACCEPTED DEC, 2022
|
374 |
+
1) Learning the Intentions: We learn each intention using
|
375 |
+
Soft Actor-Critic (SAC) [15], an actor-critic algorithm that
|
376 |
+
maximizes the entropy-regularized objective, though any off-
|
377 |
+
policy RL algorithm would suffice. The objective is
|
378 |
+
J(πT ) = EπT
|
379 |
+
� ∞
|
380 |
+
�
|
381 |
+
t=0
|
382 |
+
γt (RT (st, at) + αH(πT (·|st)))
|
383 |
+
�
|
384 |
+
,
|
385 |
+
(2)
|
386 |
+
where the learned temperature α determines the importance
|
387 |
+
of the entropy term and H(πT (·|st)) is the entropy of the
|
388 |
+
intention πT at state st. The soft Q-function is
|
389 |
+
QT (st, at) = RT (st, at)
|
390 |
+
+ EπT
|
391 |
+
� ∞
|
392 |
+
�
|
393 |
+
t=0
|
394 |
+
γt(RT (st+1, at+1) + αH(πT (·|st+1)))
|
395 |
+
�
|
396 |
+
.
|
397 |
+
(3)
|
398 |
+
The intentions maximize the joint policy objective
|
399 |
+
L(πint) =
|
400 |
+
�
|
401 |
+
T ∈Tall
|
402 |
+
Es∼Ball,a∼πT (·|s) [QT (s, a) − α log πT (a|s)] ,
|
403 |
+
(4)
|
404 |
+
where πint refers to the set of intentions {πTmain, πT1, . . . , πTK}
|
405 |
+
and Ball refers to buffer containing every transition from
|
406 |
+
interactions and demonstrations, as is done in [16], [17].
|
407 |
+
For policy evaluation, the soft Q-functions QT for each πT
|
408 |
+
minimize the joint soft Bellman residual
|
409 |
+
L(Q) =
|
410 |
+
�
|
411 |
+
T ∈Tall
|
412 |
+
E(s,a,s′)∼Ball,a′∼πT (·|s′)
|
413 |
+
�
|
414 |
+
(QT (s, a) − δT )2�
|
415 |
+
,
|
416 |
+
(5)
|
417 |
+
δT = RT (s, a) + γ (QT (s′, a′) − α log πT (a′|s′)) .
|
418 |
+
(6)
|
419 |
+
Crucially, because each task shares the common S, A, P, ρ0,
|
420 |
+
and γ, and we are using off-policy learning, all tasks can learn
|
421 |
+
from all data, as in [12].
|
422 |
+
2) The Scheduler: SAC-X formulates learning the sched-
|
423 |
+
uler by maximizing the expected return of the main task
|
424 |
+
[12]. In particular, let H be the number of possible intention
|
425 |
+
switches within an episode and let each chosen intention
|
426 |
+
execute for ξ timesteps. The H intention choices made within
|
427 |
+
the episode are defined as T 0:H−1 =
|
428 |
+
�
|
429 |
+
T (0), . . . , T (H−1)�
|
430 |
+
,
|
431 |
+
where T (h) ∈ Tall. The return of the main task, given chosen
|
432 |
+
intentions, is then defined as
|
433 |
+
GTmain(T 0:H−1) =
|
434 |
+
H−1
|
435 |
+
�
|
436 |
+
h=0
|
437 |
+
(h+1)ξ−1
|
438 |
+
�
|
439 |
+
t=hξ
|
440 |
+
γtRTmain(st, at),
|
441 |
+
(7)
|
442 |
+
where at ∼ πT (h)(·|st) is the action taken at timestep t,
|
443 |
+
sampled from the chosen intention T (h) in the hth scheduler
|
444 |
+
period. The scheduler for the hth period P h
|
445 |
+
S aims to maxi-
|
446 |
+
mize the expected main task return: E
|
447 |
+
�
|
448 |
+
GTmain(T h:H−1)|P h
|
449 |
+
S
|
450 |
+
�
|
451 |
+
.
|
452 |
+
Although SAC-X describes a method to learn the scheduler
|
453 |
+
[12], we find that a combination of two simple task-agnostic
|
454 |
+
heuristics performs similarly in practice (see Section V-C2).
|
455 |
+
Specifically, we use a weighted random scheduler (WRS)
|
456 |
+
combined with handcrafted trajectories (HC). The WRS forms
|
457 |
+
a prior categorical distribution over the set of tasks, with a
|
458 |
+
higher probability mass pTmain for the main task and
|
459 |
+
pTmain
|
460 |
+
K
|
461 |
+
for
|
462 |
+
all other tasks. This approach is comparable to the uniform
|
463 |
+
scheduler from [12], with a bias towards the main task. The
|
464 |
+
HC component is a small set of handcrafted trajectories of
|
465 |
+
tasks that are sampled half of the time, forcing the scheduler
|
466 |
+
to explore trajectories that would clearly be beneficial for
|
467 |
+
completing the main task. The chosen handcrafted trajectories
|
468 |
+
can be found in our code and in our supplementary material.
|
469 |
+
C. Breaking Out of Local Maxima with LfGP
|
470 |
+
Returning to the discussion in Section III, resolving the
|
471 |
+
local maximum problem with LfGP is straightforward. Sup-
|
472 |
+
pose we include a go-right auxiliary task with BE
|
473 |
+
go-right =
|
474 |
+
{(s1, a12), (s2, a23), (s3, a34)}. When the scheduler chooses
|
475 |
+
the go-right intention, the agent does not exploit the a55 action
|
476 |
+
because the go-right discriminator learns that R(s5, a55) =
|
477 |
+
−1. Since the transitions are stored in the shared buffer that
|
478 |
+
the main intention also samples from, the agent can quickly
|
479 |
+
obtain the correct, optimal value.
|
480 |
+
D. Expert Data Collection
|
481 |
+
We assume that each T ∈ Tall has, for evaluation purposes
|
482 |
+
only, a binary indicator of success. In single-task imitation
|
483 |
+
learning where this assumption is valid, expert data is typically
|
484 |
+
collected by allowing the expert to control the agent until
|
485 |
+
success conditions are met. At that point, the environment is
|
486 |
+
reset following ρ0 and collection is repeated for a fixed number
|
487 |
+
of episodes or (s, a) pairs. We collect our expert data in this
|
488 |
+
way for each T separately.
|
489 |
+
V. EXPERIMENTS
|
490 |
+
In this work, we are interested in answering the following
|
491 |
+
questions about LfGP:
|
492 |
+
1) How does the performance of LfGP compare with BC
|
493 |
+
and AIL in challenging manipulation tasks, in terms of
|
494 |
+
success rate and expert sample efficiency?
|
495 |
+
2) What parts of LfGP are necessary for success?
|
496 |
+
3) How do the policies and action value functions differ
|
497 |
+
between AIL and LfGP?
|
498 |
+
A. Experimental Setup
|
499 |
+
We complete experiments in a simulation environment con-
|
500 |
+
taining a Franka Emika Panda manipulator, one green and
|
501 |
+
one blue block in a tray, fixed zones corresponding to the
|
502 |
+
green and blue blocks, and one slot in each zone with < 1mm
|
503 |
+
Fig. 4: Example successful runs of our four main tasks. Top to
|
504 |
+
bottom: Stack, Unstack-Stack, Bring, Insert.
|
505 |
+
|
506 |
+
ABLETT et al.: LEARNING FROM GUIDED PLAY
|
507 |
+
5
|
508 |
+
0.5
|
509 |
+
1.0
|
510 |
+
1.5
|
511 |
+
2.0
|
512 |
+
0.0
|
513 |
+
0.2
|
514 |
+
0.4
|
515 |
+
0.6
|
516 |
+
0.8
|
517 |
+
1.0
|
518 |
+
Stack
|
519 |
+
0.5
|
520 |
+
1.0
|
521 |
+
1.5
|
522 |
+
2.0
|
523 |
+
0.0
|
524 |
+
0.2
|
525 |
+
0.4
|
526 |
+
0.6
|
527 |
+
0.8
|
528 |
+
1.0
|
529 |
+
Unstack-Stack
|
530 |
+
0.5
|
531 |
+
1.0
|
532 |
+
1.5
|
533 |
+
2.0
|
534 |
+
0.0
|
535 |
+
0.2
|
536 |
+
0.4
|
537 |
+
0.6
|
538 |
+
0.8
|
539 |
+
1.0
|
540 |
+
Bring
|
541 |
+
1
|
542 |
+
2
|
543 |
+
3
|
544 |
+
4
|
545 |
+
0.0
|
546 |
+
0.2
|
547 |
+
0.4
|
548 |
+
0.6
|
549 |
+
0.8
|
550 |
+
1.0
|
551 |
+
Insert
|
552 |
+
0.0
|
553 |
+
0.2
|
554 |
+
0.4
|
555 |
+
0.6
|
556 |
+
0.8
|
557 |
+
1.0
|
558 |
+
Updates/steps (millions)
|
559 |
+
0.0
|
560 |
+
0.2
|
561 |
+
0.4
|
562 |
+
0.6
|
563 |
+
0.8
|
564 |
+
1.0
|
565 |
+
Success Rate
|
566 |
+
LfGP (multi)
|
567 |
+
BC (multi)
|
568 |
+
DAC (single)
|
569 |
+
BC (single)
|
570 |
+
Expert
|
571 |
+
Fig. 5: Performance results for LfGP, multitask BC, single-task BC, and DAC on all four tasks considered in this work. The x-axis corresponds
|
572 |
+
to both gradient updates and environments steps for LfGP and DAC, and gradient updates only for both versions of BC. The shaded area
|
573 |
+
corresponds to standard deviation across five seeds. LfGP significantly outperforms the baselines on all tasks, and even in Bring where it is
|
574 |
+
matched by single-task BC, it is far more expert sample efficient.
|
575 |
+
tolerance for fitting the blocks (see bottom right of Fig. 4).
|
576 |
+
The robot is controlled via delta-position commands, and the
|
577 |
+
blocks and end-effector can both be reset anywhere above the
|
578 |
+
tray. The environment is designed such that several different
|
579 |
+
challenging tasks can be completed within a common observa-
|
580 |
+
tion and action space. The main tasks that we investigate are
|
581 |
+
Stack, Unstack-Stack, Bring, and Insert (see Fig. 4). For more
|
582 |
+
details on our environment and definitions of task success, see
|
583 |
+
supplementary material link in Footnote 3. We also define a set
|
584 |
+
of auxiliary tasks: Open-Gripper, Close-Gripper, Reach, Lift,
|
585 |
+
Move-Object, and Bring (Bring is both a main task and an
|
586 |
+
auxiliary task for Insert), all of which are reusable between
|
587 |
+
main tasks.
|
588 |
+
We compare our method to several standard multitask and
|
589 |
+
single-task baselines. A multitask algorithm simultaneously
|
590 |
+
learns to complete a main task as well as auxiliary tasks,
|
591 |
+
while the single-task algorithms only learn to complete the
|
592 |
+
main task. In general, we consider a multitask algorithm to be
|
593 |
+
more useful than a single-task algorithm, given the potential
|
594 |
+
to reuse expert data and trained models for learning new tasks.
|
595 |
+
To ensure a fair comparison, we provide single-task algorithms
|
596 |
+
with an equivalent amount of total expert data as our multitask
|
597 |
+
methods, as shown in Table I.
|
598 |
+
In our main experiments, we compare LfGP to a mul-
|
599 |
+
titask variant of behavioural cloning (BC), single-task BC,
|
600 |
+
and Discriminator-Actor-Critic (DAC) [7], a state-of-the-art
|
601 |
+
approach to AIL. We train multitask BC with a multitask mean
|
602 |
+
squared error objective,
|
603 |
+
L(πint) =
|
604 |
+
�
|
605 |
+
T ∈Tall
|
606 |
+
�
|
607 |
+
(s,a)∈BE
|
608 |
+
T
|
609 |
+
(πT (s) − a)2 ,
|
610 |
+
(8)
|
611 |
+
while BC is trained with the corresponding single task version.
|
612 |
+
Following recent trends in improving BC performance, we
|
613 |
+
train our BC baselines with the same number of gradient
|
614 |
+
updates as LfGP and DAC, evaluating the policies at the same
|
615 |
+
frequency. This adjustment has been shown to dramatically
|
616 |
+
increase the performance of BC [18], [19], particularly com-
|
617 |
+
pared to the more common practice of using early stopping,
|
618 |
+
as is done in [6], [7]. We validate that this change signifi-
|
619 |
+
cantly improves BC performance in our ablation study (see
|
620 |
+
Section V-C4).
|
621 |
+
We gather expert data by first training an expert policy using
|
622 |
+
Scheduled Auxiliary Control (SAC-X) [12]. We then run the
|
623 |
+
Task
|
624 |
+
Dataset Sizes
|
625 |
+
Reuse
|
626 |
+
Single Total
|
627 |
+
Multi
|
628 |
+
Stack
|
629 |
+
SOCRLM: 1k/task
|
630 |
+
5k
|
631 |
+
1k
|
632 |
+
6k
|
633 |
+
task
|
634 |
+
U-Stack
|
635 |
+
UOCRLM: 1k/task
|
636 |
+
5k
|
637 |
+
1k
|
638 |
+
6k
|
639 |
+
Bring
|
640 |
+
BOCRLM: 1k/task
|
641 |
+
6k
|
642 |
+
0
|
643 |
+
6k
|
644 |
+
Insert
|
645 |
+
IBOCRLM: 1k/task
|
646 |
+
6k
|
647 |
+
1k
|
648 |
+
7k
|
649 |
+
Single
|
650 |
+
Stack
|
651 |
+
S: 6k
|
652 |
+
0
|
653 |
+
6k
|
654 |
+
6k
|
655 |
+
Task
|
656 |
+
U-Stack
|
657 |
+
U: 6k
|
658 |
+
0
|
659 |
+
6k
|
660 |
+
6k
|
661 |
+
Bring
|
662 |
+
B: 6k
|
663 |
+
0
|
664 |
+
6k
|
665 |
+
6k
|
666 |
+
Insert
|
667 |
+
I: 6k
|
668 |
+
0
|
669 |
+
7k
|
670 |
+
7k
|
671 |
+
TABLE I: The number of (s, a) pairs used for each main and auxiliary
|
672 |
+
task. The table illustrates the reusability of the expert data used to
|
673 |
+
generate the performance results described in Section V-B. Each letter
|
674 |
+
under “Dataset Sizes” is the first letter of a single (auxiliary) task,
|
675 |
+
and bolded letters indicate that a dataset was reused for more than
|
676 |
+
one main task (e.g., Open-Gripper was used for all four main tasks).
|
677 |
+
Multitask methods (e.g., LfGP) are able to reuse a large portion of the
|
678 |
+
expert data, while single-task methods (e.g., single-task BC) cannot.
|
679 |
+
expert policies to collect various amounts of expert data as
|
680 |
+
described in Section IV-D and Table I. We also collect an extra
|
681 |
+
200 expert (sT , 0) pairs per auxiliary task, where T refers to
|
682 |
+
the final timestep of an individual episode and 0 is an action
|
683 |
+
of all zeros. This is equivalent to adding example data, as is
|
684 |
+
done in example-based RL [20]. This addition improved final
|
685 |
+
task performance, likely because it biases the reward towards
|
686 |
+
completing the final task. It is worth noting that, in the real
|
687 |
+
world, final states are easier to collect than full demonstrations,
|
688 |
+
and LfGP does not require any modifications to accommodate
|
689 |
+
these extra examples. Finally, even without this addition, LfGP
|
690 |
+
still outperforms the baselines (see Section V-C1).
|
691 |
+
B. Performance Results
|
692 |
+
Performance results for all methods and main tasks are
|
693 |
+
shown in Fig. 5. We freeze the policies every 100k steps
|
694 |
+
and evaluate those policies for 50 randomized episodes, using
|
695 |
+
only the mean action outputs for stochastic policies. For all
|
696 |
+
algorithms, we test across five seeds and report the mean and
|
697 |
+
standard deviation of all seeds.
|
698 |
+
In Stack, Unstack-Stack, and Insert, LfGP achieves expert
|
699 |
+
performance, while the baselines all perform significantly
|
700 |
+
worse. In Bring, LfGP does not quite achieve expert per-
|
701 |
+
formance, and is matched by single-task BC. However, we
|
702 |
+
note that LfGP is much more expert data efficient than single-
|
703 |
+
task BC because it reuses auxiliary task data (see Table I).
|
704 |
+
A more direct comparison is multitask BC, which performs
|
705 |
+
|
706 |
+
6
|
707 |
+
IEEE ROBOTICS AND AUTOMATION LETTERS. PREPRINT VERSION. ACCEPTED DEC, 2022
|
708 |
+
0.5
|
709 |
+
1.0
|
710 |
+
1.5
|
711 |
+
2.0
|
712 |
+
0.0
|
713 |
+
0.2
|
714 |
+
0.4
|
715 |
+
0.6
|
716 |
+
0.8
|
717 |
+
1.0
|
718 |
+
Stack (no ablations)
|
719 |
+
0.5
|
720 |
+
1.0
|
721 |
+
1.5
|
722 |
+
2.0
|
723 |
+
0.0
|
724 |
+
0.2
|
725 |
+
0.4
|
726 |
+
0.6
|
727 |
+
0.8
|
728 |
+
1.0
|
729 |
+
0.5|BE
|
730 |
+
orig|
|
731 |
+
0.5
|
732 |
+
1.0
|
733 |
+
1.5
|
734 |
+
2.0
|
735 |
+
0.0
|
736 |
+
0.2
|
737 |
+
0.4
|
738 |
+
0.6
|
739 |
+
0.8
|
740 |
+
1.0
|
741 |
+
1.5|BE
|
742 |
+
orig|
|
743 |
+
0.5
|
744 |
+
1.0
|
745 |
+
1.5
|
746 |
+
2.0
|
747 |
+
0.0
|
748 |
+
0.2
|
749 |
+
0.4
|
750 |
+
0.6
|
751 |
+
0.8
|
752 |
+
1.0
|
753 |
+
Subsampled BE
|
754 |
+
0.5
|
755 |
+
1.0
|
756 |
+
1.5
|
757 |
+
2.0
|
758 |
+
0.0
|
759 |
+
0.2
|
760 |
+
0.4
|
761 |
+
0.6
|
762 |
+
0.8
|
763 |
+
1.0No Extra Final Examples
|
764 |
+
0.0
|
765 |
+
0.2
|
766 |
+
0.4
|
767 |
+
0.6
|
768 |
+
0.8
|
769 |
+
1.0
|
770 |
+
Updates/steps (millions)
|
771 |
+
0.0
|
772 |
+
0.2
|
773 |
+
0.4
|
774 |
+
0.6
|
775 |
+
0.8
|
776 |
+
1.0
|
777 |
+
Success Rate
|
778 |
+
LfGP (multi)
|
779 |
+
BC (multi)
|
780 |
+
DAC (single)
|
781 |
+
BC (single)
|
782 |
+
Expert
|
783 |
+
Fig. 6: Various dataset ablations for LfGP and all baselines, including dataset size, subsampling of expert dataset, and replacement of extra
|
784 |
+
(sT , 0) pairs with an equivalent amount of regular trajectory (s, a) pairs. In all cases, LfGP still significantly outperforms all baselines.
|
785 |
+
1
|
786 |
+
2
|
787 |
+
0.0
|
788 |
+
0.2
|
789 |
+
0.4
|
790 |
+
0.6
|
791 |
+
0.8
|
792 |
+
1.0
|
793 |
+
LfGP Scheduler
|
794 |
+
0.0
|
795 |
+
0.5
|
796 |
+
1.0
|
797 |
+
Updates/steps (millions)
|
798 |
+
0.0
|
799 |
+
0.2
|
800 |
+
0.4
|
801 |
+
0.6
|
802 |
+
0.8
|
803 |
+
1.0
|
804 |
+
Success Rate
|
805 |
+
WRS + HC
|
806 |
+
WRS only
|
807 |
+
Learned
|
808 |
+
No Sched.
|
809 |
+
Expert
|
810 |
+
1
|
811 |
+
2
|
812 |
+
0.0
|
813 |
+
0.2
|
814 |
+
0.4
|
815 |
+
0.6
|
816 |
+
0.8
|
817 |
+
1.0
|
818 |
+
Expert Sampling
|
819 |
+
0.0
|
820 |
+
0.5
|
821 |
+
1.0
|
822 |
+
Updates/steps (millions)
|
823 |
+
0.0
|
824 |
+
0.2
|
825 |
+
0.4
|
826 |
+
0.6
|
827 |
+
0.8
|
828 |
+
1.0
|
829 |
+
Success Rate
|
830 |
+
LfGP
|
831 |
+
LfGP (BE
|
832 |
+
for D only)
|
833 |
+
LfGP (No
|
834 |
+
(sT , 0) bias)
|
835 |
+
DAC
|
836 |
+
DAC (BE
|
837 |
+
for D only)
|
838 |
+
DAC (No
|
839 |
+
(sT , 0) bias)
|
840 |
+
Expert
|
841 |
+
1
|
842 |
+
2
|
843 |
+
0.0
|
844 |
+
0.2
|
845 |
+
0.4
|
846 |
+
0.6
|
847 |
+
0.8
|
848 |
+
1.0
|
849 |
+
BC/DAC Alternatives
|
850 |
+
0.0
|
851 |
+
0.5
|
852 |
+
1.0
|
853 |
+
Updates/steps (millions)
|
854 |
+
0.0
|
855 |
+
0.2
|
856 |
+
0.4
|
857 |
+
0.6
|
858 |
+
0.8
|
859 |
+
1.0
|
860 |
+
Success Rate
|
861 |
+
BC (multi)
|
862 |
+
BC (multi,
|
863 |
+
early stop)
|
864 |
+
DAC
|
865 |
+
GAIL
|
866 |
+
BC
|
867 |
+
BC (early
|
868 |
+
stop)
|
869 |
+
Expert
|
870 |
+
Fig. 7: Left: Scheduler ablations for training LfGP, WRS is weighted random scheduler, HC is handcraft; Middle: Expert sampling ablations
|
871 |
+
for training LfGP/DAC; Right: Baseline ablations for training BC/DAC.
|
872 |
+
much more poorly than LfGP across all tasks, including Bring.
|
873 |
+
Intriguingly, DAC also performs very poorly on all tasks, a
|
874 |
+
phenomenon that we further explore in Section VI.
|
875 |
+
C. Ablation Study
|
876 |
+
While the fundamental idea of LfGP is relatively straight-
|
877 |
+
forward, it is worth considering alternatives to some of the
|
878 |
+
specific choices made for our experiments. In this section,
|
879 |
+
we complete an ablation study where we vary (a) the expert
|
880 |
+
dataset, including size, subsampling, and inclusion of extra
|
881 |
+
(sT , 0) pairs; (b) the type of scheduler used for LfGP (see
|
882 |
+
Section IV-B2); (c) the sampling strategy used for expert data;
|
883 |
+
and (d) the method for training our baselines. To reduce the
|
884 |
+
computational load of completing these experiments, all of
|
885 |
+
these variations were carried out exclusively for our Stack task.
|
886 |
+
All ablation results are shown in Fig. 6 and Fig. 7.
|
887 |
+
1) Dataset Ablations: We tested the following dataset vari-
|
888 |
+
ations: (a) half and one and a half times the original expert
|
889 |
+
dataset size; (b) subsampling BE, taking only every 20th
|
890 |
+
timestep, as is done in [6], [7]; and (c) replacing the 200 extra
|
891 |
+
(sT , 0) pairs in each buffer with 200 regular trajectory (s, a)
|
892 |
+
pairs. Notably, even in the challenging regimes of halving
|
893 |
+
and subsampling the dataset, LfGP still learns an expert-level
|
894 |
+
policy (albeit more slowly).
|
895 |
+
2) Scheduler Ablations: We tested the following scheduler
|
896 |
+
variations: (a) Weighted Random Scheduler (WRS) only, re-
|
897 |
+
moving the Handcrafted (HC) addition; (b) a learned sched-
|
898 |
+
uler, as is used in [12]; and (c) no scheduler, in which only the
|
899 |
+
main task is attempted, akin to the Intentional Unintentional
|
900 |
+
Agent [12], [21]. Both WRS versions learn slightly faster than
|
901 |
+
the learned scheduler, but all three methods outperform the No
|
902 |
+
Scheduler ablation, replicating results from [12] demonstrating
|
903 |
+
the importance of actually exploring all auxiliary tasks. Per-
|
904 |
+
haps surprisingly, the HC modification made little difference
|
905 |
+
compared with WRS only, but it is possible that for even more
|
906 |
+
complex tasks, this could change.
|
907 |
+
3) Expert Sampling Ablations: For our main performance
|
908 |
+
experiments, we modified standard AIL in two ways: (a) we
|
909 |
+
added expert buffer sampling to π and Q updates, in addition
|
910 |
+
to the D updates, as is done in [16], [17]; and (b) we biased the
|
911 |
+
sampling of BE when training D to be 95% final (sT , 0) pairs.
|
912 |
+
We tested both LfGP and DAC without these additions. For
|
913 |
+
LfGP, although these modifications improve learning speed,
|
914 |
+
they are not required to generate an expert policy. For DAC,
|
915 |
+
performance is quite poor regardless of these adjustments.
|
916 |
+
4) Baseline Ablations: To verify that we evaluated against
|
917 |
+
fair baselines, we tested two alternatives to those used for our
|
918 |
+
main performance experiments: (a) an early stopping variation
|
919 |
+
of BC, in which each expert buffer is divided into a 70%/30%
|
920 |
+
train/validation split, taking the policy after validation error has
|
921 |
+
not improved for 100 epochs; and (b) the on-policy variant
|
922 |
+
of DAC, also known as Generative Adversarial Imitation
|
923 |
+
Learning (GAIL) [6]. Notably, the early stopping variants of
|
924 |
+
BC, commonly used as baselines in other AIL work [6], [7],
|
925 |
+
[22] perform dramatically more poorly than those used in our
|
926 |
+
experiments, verifying recent trends [18], [19].
|
927 |
+
VI. LEARNED MODEL ANALYSIS
|
928 |
+
In this section, we further examine the learned Stack models
|
929 |
+
of LfGP and DAC. We take snapshots of the average per-
|
930 |
+
forming models from LfGP and DAC at four points during
|
931 |
+
learning: 200k, 400k, 600k, and 800k model updates and
|
932 |
+
environment steps. Although the initial gripper and block
|
933 |
+
positions are randomized between episodes during learning,
|
934 |
+
for each snapshot, we reset the stacking environment to a
|
935 |
+
single set of representative initial conditions. We then run the
|
936 |
+
|
937 |
+
ABLETT et al.: LEARNING FROM GUIDED PLAY
|
938 |
+
7
|
939 |
+
LfGP – Open-Gripper
|
940 |
+
LfGP – Close-Gripper
|
941 |
+
LfGP – Reach
|
942 |
+
LfGP – Lift
|
943 |
+
LfGP – Move-Object
|
944 |
+
LfGP – Stack
|
945 |
+
DAC – Stack
|
946 |
+
Fig. 8: The policy outputs (arrows) and Q values (background) for each LfGP task and for DAC at 200k environment steps. The arrows show
|
947 |
+
velocity direction/magnitude, blue → green indicates open-gripper → close-gripper. For Q values, red → yellow indicates low → high. The
|
948 |
+
LfGP policies and Q functions are reasonable for all tasks, while DAC has only learned to reach toward and above the green block.
|
949 |
+
snapshot policies for a single exploratory trajectory, using the
|
950 |
+
stochastic outputs of each policy as well as, for LfGP, the
|
951 |
+
WRS+HC scheduler. Trajectories from these runs are shown
|
952 |
+
in Fig. 9.
|
953 |
+
DAC is unable to learn to grasp or even reach the blue
|
954 |
+
block and ultimately settles on a policy that learns to reach
|
955 |
+
and hover near the green block. This is understandable—DAC
|
956 |
+
learns a deceptive reward for hovering above the green block
|
957 |
+
regardless of the position of the blue block, because it has not
|
958 |
+
sufficiently explored the alternative of first grasping the blue
|
959 |
+
block. Even if hovering above the green block does not fully
|
960 |
+
match the expert data, the DAC policy receives some reward
|
961 |
+
for doing so, as evidenced by the learned Q value on the right
|
962 |
+
side of Fig. 8.
|
963 |
+
In comparison, even after only 200k environment steps,
|
964 |
+
LfGP learns to reach and push the blue block, and by 600k
|
965 |
+
steps, grasp, move, and nearly stack it. By enforcing explo-
|
966 |
+
ration of sub-tasks that are crucial to completing the main task,
|
967 |
+
LfGP ensures that the distribution of expert stacking data is
|
968 |
+
fully matched.
|
969 |
+
VII. RELATED WORK
|
970 |
+
Imitation learning is often divided into two main categories:
|
971 |
+
behavioural cloning (BC) [23], [24] and inverse reinforcement
|
972 |
+
learning (IRL) [5], [25]. BC recovers the expert policy via
|
973 |
+
supervised learning, but it suffers from compounding errors
|
974 |
+
due to covariate shift [23], [26]. Alternatively, IRL partially
|
975 |
+
alleviates the covariate shift problem by estimating the reward
|
976 |
+
function and then applying RL using the learned reward.
|
977 |
+
A popular approach to IRL is adversarial imitation learning
|
978 |
+
(AIL) [6], [7], [27], in which the expert policy is recovered
|
979 |
+
by matching the occupancy measure between the generated
|
980 |
+
data and the demonstration data. Our proposed method en-
|
981 |
+
hances existing AIL algorithms by enabling exploration of
|
982 |
+
Fig. 9: LfGP and DAC trajectories of the gripper, blue block, and
|
983 |
+
green block for four stack episodes with consistent initial conditions
|
984 |
+
throughout the learning process. The LfGP episodes, each including
|
985 |
+
auxiliary task sub-trajectories, demonstrate significantly more variety
|
986 |
+
than the DAC trajectories.
|
987 |
+
key auxiliary tasks via the use of a scheduled multitask model,
|
988 |
+
simultaneously resolving the susceptibility of AIL to deceptive
|
989 |
+
rewards.
|
990 |
+
Agents learned via hierarchical reinforcement learning
|
991 |
+
(HRL), which act over multiple levels of temporal abstractions
|
992 |
+
in long planning horizon tasks, are shown to provide more
|
993 |
+
effective exploration than agents operating over only a single
|
994 |
+
level of abstraction [12], [28], [29]. Our approach for learning
|
995 |
+
agents most closely resembles hierarchical AIL methods that
|
996 |
+
attempt to combine AIL with HRL [27], [30]–[32]. Existing
|
997 |
+
work [30]–[32] often formulates the hierarchical agent using
|
998 |
+
the Options framework [28] and learns the reward function
|
999 |
+
with AIL [6]. Both [30] and [32] leverage task-specific expert
|
1000 |
+
demonstrations to learn options using mixture-of-experts and
|
1001 |
+
expectation-maximization strategies, respectively. In contrast,
|
1002 |
+
our work focuses on expert demonstrations that include multi-
|
1003 |
+
ple reusable auxiliary tasks, each of which has clear semantic
|
1004 |
+
meaning.
|
1005 |
+
In the multitask setting, [27] and [31] leverage unsegmented,
|
1006 |
+
multitask expert demonstrations to learn low-level policies via
|
1007 |
+
a latent variable model. Other work has used a large corpus
|
1008 |
+
of unsegmented but semantically meaningful “play” expert
|
1009 |
+
data to bootstrap policy learning [13], [14]. We define our
|
1010 |
+
expert dataset as being derived from guided play, in that the
|
1011 |
+
expert completes semantically meaningful auxiliary tasks with
|
1012 |
+
provided transitions, reducing the burden on the expert to
|
1013 |
+
generate these data arbitrarily and simultaneously providing
|
1014 |
+
auxiliary task labels. Compared with learning from unseg-
|
1015 |
+
mented demonstrations, the use of segmented demonstrations,
|
1016 |
+
as in [33], ensures that we know which auxiliary tasks our
|
1017 |
+
model will be learning, and opens up the possibility of expert
|
1018 |
+
data reuse and also transfer learning. Finally, we deviate from
|
1019 |
+
the Options framework and build upon Scheduled Auxiliary
|
1020 |
+
Control (SAC-X) to train our hierarchical agent, since SAC-
|
1021 |
+
X has been shown to work well for challenging manipulation
|
1022 |
+
tasks [12].
|
1023 |
+
VIII. LIMITATIONS
|
1024 |
+
Our approach is not without limitations. While we were
|
1025 |
+
able to use LfGP in six and seven-task settings, the number
|
1026 |
+
of tasks for which this method would become intractable is
|
1027 |
+
unclear. LfGP needs access to segmented expert data as well;
|
1028 |
+
in many cases, this is reasonable, and is also required to
|
1029 |
+
be able to reuse auxiliary task data between main tasks, but
|
1030 |
+
it does necessitate extra care during expert data collection.
|
1031 |
+
Also, LfGP requires pre-defined auxiliary tasks: while this is
|
1032 |
+
a common approach to hierarchical RL (see [34], Section 3.1,
|
1033 |
+
for numerous examples), choosing these tasks may sometimes
|
1034 |
+
present a challenge. Finally, compared with methods that use
|
1035 |
+
offline data exclusively (e.g., BC), for our tasks, LfGP requires
|
1036 |
+
|
1037 |
+
200k
|
1038 |
+
400k
|
1039 |
+
600k
|
1040 |
+
800k
|
1041 |
+
LfGP
|
1042 |
+
DAC8
|
1043 |
+
IEEE ROBOTICS AND AUTOMATION LETTERS. PREPRINT VERSION. ACCEPTED DEC, 2022
|
1044 |
+
many online environment steps to learn a high-quality policy.
|
1045 |
+
This data gathering could be costly if human supervision was
|
1046 |
+
necessary. It is worth noting that, because LfGP is already a
|
1047 |
+
multitask method, this final point could be partially resolved
|
1048 |
+
through the use of multitask reset-free RL [35].
|
1049 |
+
IX. CONCLUSION
|
1050 |
+
We have shown how adversarial imitation learning can fail
|
1051 |
+
at challenging manipulation tasks because it learns deceptive
|
1052 |
+
rewards. We demonstrated that this can be resolved with
|
1053 |
+
Learning from Guided Play (LfGP), in which we introduce
|
1054 |
+
auxiliary tasks and the corresponding expert data, guiding the
|
1055 |
+
agent to playfully explore parts of the state and action space
|
1056 |
+
that would have been avoided otherwise. We demonstrated that
|
1057 |
+
our method dramatically outperforms both BC and AIL base-
|
1058 |
+
lines, particularly in the case of AIL. Furthermore, our method
|
1059 |
+
can leverage reusable expert data, making it significantly more
|
1060 |
+
expert sample efficient than the highest-performing baseline,
|
1061 |
+
and its learned auxiliary task models can be applied to transfer
|
1062 |
+
learning. In future work, we intend to investigate transfer
|
1063 |
+
learning to determine if overall policy learning time can be
|
1064 |
+
reduced.
|
1065 |
+
ACKNOWLEDGEMENTS
|
1066 |
+
We gratefully acknowledge the Digital Research Alliance of
|
1067 |
+
Canada and NVIDIA Inc., who provided the GPUs used in this
|
1068 |
+
work through their Resources for Research Groups Program
|
1069 |
+
and their Hardware Grant Program, respectively.
|
1070 |
+
REFERENCES
|
1071 |
+
[1] R. S. Sutton and A. G. Barto, Reinforcement Learning: An Introduction,
|
1072 |
+
2nd ed.
|
1073 |
+
MIT press, 2018.
|
1074 |
+
[2] M. Bellemare, S. Srinivasan, G. Ostrovski, T. Schaul, D. Saxton, and
|
1075 |
+
R. Munos, “Unifying Count-Based Exploration and Intrinsic Motiva-
|
1076 |
+
tion,” in Conf. Neural Inf. Processing Systems, vol. 29, Dec. 2016.
|
1077 |
+
[3] A. Nair, B. McGrew, M. Andrychowicz, W. Zaremba, and P. Abbeel,
|
1078 |
+
“Overcoming Exploration in Reinforcement Learning with Demon-
|
1079 |
+
strations,” in Proc. 2018 IEEE Int. Conf. Robotics and Automation
|
1080 |
+
(ICRA’18), Brisbane, Australia, May 2018, pp. 6292–6299.
|
1081 |
+
[4] A. Y. Ng and M. I. Jordan, “Shaping and policy search in reinforcement
|
1082 |
+
learning,” Ph.D. dissertation, University of California, Berkeley, 2003.
|
1083 |
+
[5] A. Ng and S. Russell, “Algorithms for inverse reinforcement learning,”
|
1084 |
+
in Int. Conf. Machine Learning (ICML’00), July 2000, pp. 663–670.
|
1085 |
+
[6] J. Ho and S. Ermon, “Generative Adversarial Imitation Learning,” in
|
1086 |
+
Conf. Neural Inf. Processing Systems, Barcelona, Spain, Dec. 5–11 2016,
|
1087 |
+
pp. 4565–4573.
|
1088 |
+
[7] I. Kostrikov, K. K. Agrawal, D. Dwibedi, S. Levine, and J. Tomp-
|
1089 |
+
son, “Discriminator-Actor-Critic: Addressing Sample Inefficiency and
|
1090 |
+
Reward Bias in Adversarial Imitation Learning,” in Proc. Int. Conf.
|
1091 |
+
Learning Representations (ICLR’19), New Orleans, USA, May 2019.
|
1092 |
+
[8] J. Fu, K. Luo, and S. Levine, “Learning Robust Rewards with Ad-
|
1093 |
+
verserial inverse Reinforcement Learning,” in Proc. Int. Conf. Learning
|
1094 |
+
Representations (ICLR’18), Vancouver, Canada, Apr. 30–May 3 2018.
|
1095 |
+
[9] M. Orsini, et al., “What Matters for Adversarial Imitation Learning?”
|
1096 |
+
in Conf. Neural Inf. Processing Systems, June 2021.
|
1097 |
+
[10] A. Ecoffet, J. Huizinga, J. Lehman, K. O. Stanley, and J. Clune, “First
|
1098 |
+
return, then explore,” Nature, vol. 590, no. 7847, pp. 580–586, Feb.
|
1099 |
+
2021.
|
1100 |
+
[11] T. Ablett, B. Chan, and J. Kelly, “Learning from Guided Play: A
|
1101 |
+
Scheduled Hierarchical Approach for Improving Exploration in Ad-
|
1102 |
+
versarial Imitation Learning,” in Proc. Neural Inf. Processing Systems
|
1103 |
+
(NeurIPS’21) Deep Reinforcement Learning Workshop, Dec. 2021.
|
1104 |
+
[12] M. Riedmiller, et al., “Learning by Playing Solving Sparse Reward Tasks
|
1105 |
+
from Scratch,” in Proc. 35th Int. Conf. Machine Learning (ICML’18),
|
1106 |
+
Stockholm, Sweden, July 2018, pp. 4344–4353.
|
1107 |
+
[13] C. Lynch, et al., “Learning Latent Plans from Play,” in Conf. Robot
|
1108 |
+
Learning (CoRL’19), 2019.
|
1109 |
+
[14] A. Gupta, V. Kumar, C. Lynch, S. Levine, and K. Hausman, “Relay
|
1110 |
+
Policy Learning: Solving Long Horizon Tasks Via Imitation and Rein-
|
1111 |
+
forcement Learning,” in Conf. Robot Learning (CoRL’19), 2019.
|
1112 |
+
[15] T. Haarnoja, A. Zhou, P. Abbeel, and S. Levine, “Soft Actor-Critic:
|
1113 |
+
Off-Policy Maximum Entropy Deep Reinforcement Learning with a
|
1114 |
+
Stochastic Actor,” in Proc. 35th Int. Conf. Machine Learning (ICML’18),
|
1115 |
+
Stockholm, Sweden, July 2018, pp. 1861–1870.
|
1116 |
+
[16] M. Vecerik, et al., “Leveraging Demonstrations for Deep Reinforcement
|
1117 |
+
Learning on Robotics Problems with Sparse Rewards,” Oct. 2018.
|
1118 |
+
[17] D. Kalashnikov, et al., “QT-Opt: Scalable Deep Reinforcement Learning
|
1119 |
+
for Vision-Based Robotic Manipulation,” arXiv:1806.10293 [cs, stat],
|
1120 |
+
June 2018.
|
1121 |
+
[18] A. Mandlekar, et al., “What Matters in Learning from Offline Human
|
1122 |
+
Demonstrations for Robot Manipulation,” in Conf. Robot Learning, Nov.
|
1123 |
+
2021.
|
1124 |
+
[19] L. Hussenot, et al., “Hyperparameter Selection for Imitation Learning,”
|
1125 |
+
in Proc. 38th Int. Conf. Machine Learning (ICML’21), July 2021, pp.
|
1126 |
+
4511–4522.
|
1127 |
+
[20] J. Fu, A. Singh, D. Ghosh, L. Yang, and S. Levine, “Variational Inverse
|
1128 |
+
Control with Events: A General Framework for Data-Driven Reward
|
1129 |
+
Definition,” in Conf. Neural Inf. Processing Systems, Montreal, Canada,
|
1130 |
+
Dec. 2018.
|
1131 |
+
[21] S. Cabi, et al., “The Intentional Unintentional Agent: Learning to
|
1132 |
+
Solve Many Continuous Control Tasks Simultaneously,” in Conf. Robot
|
1133 |
+
Learning (CoRL’17), Mountain View, USA, Nov. 2017.
|
1134 |
+
[22] K. Zolna, et al., “Task-Relevant Adversarial Imitation Learning,” in
|
1135 |
+
Proc. 2020 Conf. Robot Learning, Oct. 2021, pp. 247–263.
|
1136 |
+
[23] S. Ross, G. J. Gordon, and D. Bagnell, “A Reduction of Imitation
|
1137 |
+
Learning and Structured Prediction to No-Regret Online Learning,” in
|
1138 |
+
Proc. 14th Int. Conf. Artificial Intelligence and Statistics (AISTATS’11),
|
1139 |
+
Fort Lauderdale, USA, Apr. 2011, pp. 627–635.
|
1140 |
+
[24] T. Ablett, Y. Zhai, and J. Kelly, “Seeing All the Angles: Learning
|
1141 |
+
Multiview Manipulation Policies for Contact-Rich Tasks from Demon-
|
1142 |
+
strations,” in Proc. IEEE/RSJ Int. Conf. Intelligent Robots and Systems
|
1143 |
+
(IROS’21), Prague, Czech Republic, Sep. 2021.
|
1144 |
+
[25] P. Abbeel and A. Y. Ng, “Apprenticeship learning via inverse reinforce-
|
1145 |
+
ment learning,” in Int. Conf. Machine Learning (ICML’04).
|
1146 |
+
Banff,
|
1147 |
+
Canada: ACM Press, 2004.
|
1148 |
+
[26] T. Ablett, F. Mari´c, and J. Kelly, “Fighting Failures with FIRE: Failure
|
1149 |
+
Identification to Reduce Expert Burden in Intervention-Based Learning,”
|
1150 |
+
arXiv:2007.00245 [cs], Aug. 2020.
|
1151 |
+
[27] K. Hausman, Y. Chebotar, S. Schaal, G. Sukhatme, and J. Lim, “Multi-
|
1152 |
+
Modal Imitation Learning from Unstructured Demonstrations using
|
1153 |
+
Generative Adversarial Nets,” in Conf. Neural Inf. Processing Systems,
|
1154 |
+
May 2017.
|
1155 |
+
[28] R. S. Sutton, D. Precup, and S. Singh, “Between MDPs and Semi-MDPs:
|
1156 |
+
A Framework for Temporal Abstraction in Reinforcement Learning,”
|
1157 |
+
Artificial Intelligence, vol. 112, no. 1-2, pp. 181–211, Aug. 1999.
|
1158 |
+
[29] O. Nachum, H. Tang, X. Lu, S. Gu, H. Lee, and S. Levine, “Why Does
|
1159 |
+
Hierarchy (Sometimes) Work So Well in Reinforcement Learning?” in
|
1160 |
+
Proc. Neural Inf. Processing Systems (NeurIPS’19) Deep Reinforcement
|
1161 |
+
Learning Workshop, Sep. 2019.
|
1162 |
+
[30] P. Henderson, W.-D. Chang, P.-L. Bacon, D. Meger, J. Pineau, and
|
1163 |
+
D. Precup, “OptionGAN: Learning Joint Reward-Policy Options Using
|
1164 |
+
Generative Adversarial Inverse Reinforcement Learning,” in Proc. AAAI
|
1165 |
+
Conf. Artificial Intelligence (AAAI’18), no. 1, Apr. 2018.
|
1166 |
+
[31] M. Sharma, A. Sharma, N. Rhinehart, and K. M. Kitani, “Directed-Info
|
1167 |
+
GAIL: Learning Hierarchical Policies from Unsegmented Demonstra-
|
1168 |
+
tions using Directed Information,” in Int. Conf. Learning Representations
|
1169 |
+
(ICLR’19), May 2019.
|
1170 |
+
[32] M. Jing, et al., “Adversarial Option-Aware Hierarchical Imitation Learn-
|
1171 |
+
ing,” in Proc. 38th Int. Conf. Machine Learning (ICML’21), July 2021,
|
1172 |
+
pp. 5097–5106.
|
1173 |
+
[33] F. Codevilla, M. M¨uller, A. L´opez, V. Koltun, and A. Dosovitskiy, “End-
|
1174 |
+
to-End Driving Via Conditional Imitation Learning,” in Proc. IEEE Int.
|
1175 |
+
Conf. Robotics and Automation (ICRA’18), Brisbane, Australia, May
|
1176 |
+
21–25 2018, pp. 4693–4700.
|
1177 |
+
[34] S. Pateria, B. Subagdja, A.-h. Tan, and C. Quek, “Hierarchical Re-
|
1178 |
+
inforcement Learning: A Comprehensive Survey,” ACM Computing
|
1179 |
+
Surveys, vol. 54, no. 5, pp. 109:1–109:35, June 2021.
|
1180 |
+
[35] A. Gupta, et al., “Reset-Free Reinforcement Learning via Multi-Task
|
1181 |
+
Learning: Learning Dexterous Manipulation Behaviors without Human
|
1182 |
+
Intervention,” in Proc. 2021 IEEE Int. Conf. Robotics and Automation
|
1183 |
+
(ICRA’21), Apr. 2021.
|
1184 |
+
|
1185 |
+
ABLETT et al.: LEARNING FROM GUIDED PLAY
|
1186 |
+
9
|
1187 |
+
APPENDIX A
|
1188 |
+
LEARNING FROM GUIDED PLAY ALGORITHM
|
1189 |
+
The complete pseudo-code is given in Algorithm 1. Our
|
1190 |
+
implementation builds on RL Sandbox [36], an open-source
|
1191 |
+
PyTorch [37] framework for RL algorithms. For learning
|
1192 |
+
the discriminators, we follow DAC and apply a gradient
|
1193 |
+
penalty for regularization [7], [38]. We optimize the intentions
|
1194 |
+
via the reparameterization trick [40]. As is commonly done
|
1195 |
+
in deep RL, we use the Clipped Double Q-Learning trick
|
1196 |
+
[41] to mitigate overestimation bias [42] and use a target
|
1197 |
+
network to mitigate learning instability [43] when training
|
1198 |
+
the policies and Q-functions. We also learn the temperature
|
1199 |
+
parameter αT separately for each task T (see Section 5 of [44]
|
1200 |
+
for more details on learning α). For Generative Adversarial
|
1201 |
+
Imitation Learning (GAIL), we use a common open-source
|
1202 |
+
PyTorch implementation [45]. The hyperparameters chosen for
|
1203 |
+
all methods are provided in Section G. Please see videos at
|
1204 |
+
papers.starslab.ca/lfgp for examples of what LfGP looks like
|
1205 |
+
in practice.
|
1206 |
+
Algorithm 1 Learning from Guided Play (LfGP)
|
1207 |
+
Input: Expert replay buffers BE
|
1208 |
+
main, BE
|
1209 |
+
1 , . . . , BE
|
1210 |
+
K, scheduler
|
1211 |
+
period ξ, sample batch size N
|
1212 |
+
Parameters: Intentions πT with corresponding Q-functions
|
1213 |
+
QT and discriminators DT , and scheduler πS (e.g. with Q-
|
1214 |
+
table QS)
|
1215 |
+
1: Initialize replay buffer B
|
1216 |
+
2: for t = 1, . . . , do
|
1217 |
+
3:
|
1218 |
+
# Interact with environment
|
1219 |
+
4:
|
1220 |
+
For every ξ steps, select intention πT using πS
|
1221 |
+
5:
|
1222 |
+
Select action at using πT
|
1223 |
+
6:
|
1224 |
+
Execute action at and observe next state s′
|
1225 |
+
t
|
1226 |
+
7:
|
1227 |
+
Store transition ⟨st, at, s′
|
1228 |
+
t⟩ in B
|
1229 |
+
8:
|
1230 |
+
9:
|
1231 |
+
# Update discriminator DT ′ for each task T ′
|
1232 |
+
10:
|
1233 |
+
Sample {(si, ai)}N
|
1234 |
+
i=1 ∼ B
|
1235 |
+
11:
|
1236 |
+
for each task T ′ do
|
1237 |
+
12:
|
1238 |
+
Sample {(s′
|
1239 |
+
i, a′
|
1240 |
+
i)}B
|
1241 |
+
i=1 ∼ BE
|
1242 |
+
k
|
1243 |
+
13:
|
1244 |
+
Update DT ′ following Eq. (1) using GAN + Gradient
|
1245 |
+
Penalty
|
1246 |
+
14:
|
1247 |
+
end for
|
1248 |
+
15:
|
1249 |
+
16:
|
1250 |
+
# Update intentions πT ′ and Q-functions QT ′ for each
|
1251 |
+
task T ′
|
1252 |
+
17:
|
1253 |
+
Sample {(si, ai)}N
|
1254 |
+
i=1 ∼ B
|
1255 |
+
18:
|
1256 |
+
Compute reward DT ′(si, ai) for each task T ′
|
1257 |
+
19:
|
1258 |
+
Update π and Q following Eq. (4) and Eq. (5)
|
1259 |
+
20:
|
1260 |
+
21:
|
1261 |
+
# Optional Update learned scheduler πS
|
1262 |
+
22:
|
1263 |
+
if at the end of effective horizon then
|
1264 |
+
23:
|
1265 |
+
Compute main task return GTmain using reward esti-
|
1266 |
+
mate from Dmain
|
1267 |
+
24:
|
1268 |
+
Update πS
|
1269 |
+
(e.g. update Q-table QS
|
1270 |
+
following
|
1271 |
+
Eq. (A.3) and recompute Boltzmann distribution)
|
1272 |
+
25:
|
1273 |
+
end if
|
1274 |
+
26: end for
|
1275 |
+
A. Scheduler Details
|
1276 |
+
1) Learning the Scheduler: As stated in our paper, our
|
1277 |
+
main experiments used a simple weighted random scheduler
|
1278 |
+
with handcrafted trajectories. In this section, we provide the
|
1279 |
+
details of our learned scheduler. Following [12], let H be the
|
1280 |
+
total number of possible intention switches within an episode
|
1281 |
+
and let each chosen intention execute for ξ timesteps. The
|
1282 |
+
H intention choices made within the episode are defined as
|
1283 |
+
T 0:H−1 =
|
1284 |
+
�
|
1285 |
+
T (0), . . . , T (H−1)�
|
1286 |
+
, where T (h) ∈ Tall. The main
|
1287 |
+
task’s return given chosen intentions is then defined as
|
1288 |
+
GTmain(T 0:H−1) =
|
1289 |
+
H−1
|
1290 |
+
�
|
1291 |
+
h=0
|
1292 |
+
(h+1)ξ−1
|
1293 |
+
�
|
1294 |
+
t=hξ
|
1295 |
+
γtRTmain(st, at),
|
1296 |
+
(A.1)
|
1297 |
+
where
|
1298 |
+
at
|
1299 |
+
∼
|
1300 |
+
πT (h)(·|st)
|
1301 |
+
is
|
1302 |
+
the
|
1303 |
+
action
|
1304 |
+
taken
|
1305 |
+
at
|
1306 |
+
timestep
|
1307 |
+
t,
|
1308 |
+
sampled
|
1309 |
+
from
|
1310 |
+
the
|
1311 |
+
chosen
|
1312 |
+
intention
|
1313 |
+
T (h)
|
1314 |
+
in
|
1315 |
+
the
|
1316 |
+
hth
|
1317 |
+
scheduler
|
1318 |
+
period.
|
1319 |
+
We
|
1320 |
+
further
|
1321 |
+
define
|
1322 |
+
the
|
1323 |
+
Q-function
|
1324 |
+
for
|
1325 |
+
the
|
1326 |
+
scheduler
|
1327 |
+
as
|
1328 |
+
QS(T 0:h−1, T (h))
|
1329 |
+
=
|
1330 |
+
ET h:H−1∼P h:H−1
|
1331 |
+
S
|
1332 |
+
�
|
1333 |
+
GTmain(T h:H−1)|T 0:h−1�
|
1334 |
+
and represent the
|
1335 |
+
scheduler for the hth period as a softmax distribution P h
|
1336 |
+
S over
|
1337 |
+
{QS(T 0:h−1, Tmain), QS(T 0:h−1, T1), . . . , QS(T 0:h−1, TK)}.
|
1338 |
+
The scheduler maximizes the expected return of the main
|
1339 |
+
task following the scheduler:
|
1340 |
+
L(S) = ET (0)∼P 0
|
1341 |
+
S
|
1342 |
+
�
|
1343 |
+
QS(∅, T (0))
|
1344 |
+
�
|
1345 |
+
.
|
1346 |
+
(A.2)
|
1347 |
+
We use Monte Carlo returns to estimate QS, estimating the
|
1348 |
+
expected return using the exponential moving average:
|
1349 |
+
QS(T 0:h−1, T (h)) = (1 − φ)QS(T 0:h−1, T (h))
|
1350 |
+
+φ GTmain(T h:H),
|
1351 |
+
(A.3)
|
1352 |
+
where φ ∈ [0, 1] represents the amount of discounting on older
|
1353 |
+
returns and GTmain(T h:H) is the cumulative discounted return
|
1354 |
+
of the trajectory starting at timestep hξ.
|
1355 |
+
B. Weighted Random Scheduler Plus Handcrafted Trajectories
|
1356 |
+
As stated in our paper, the main experiments were com-
|
1357 |
+
pleted with the described weighted random scheduler (WRS)
|
1358 |
+
combined with some simple handcrafted trajectories (HC)
|
1359 |
+
that we expected to be beneficial for learning each of
|
1360 |
+
the main tasks. In this section, we provide further de-
|
1361 |
+
tails of these handcrafted scheduler trajectories. Given a
|
1362 |
+
chosen proportion hyperparameter (0.5 in our experiments),
|
1363 |
+
we randomly sampled full trajectories from the lists below
|
1364 |
+
at the beginning of training episodes, and otherwise sam-
|
1365 |
+
pled from the regular WRS. For all four tasks Main =
|
1366 |
+
{Stack, Unstack-Stack, Bring, Insert}, we provided the fol-
|
1367 |
+
lowing set of trajectories:
|
1368 |
+
1) Reach, Lift, Main, Open-Gripper, Reach, Lift, Main,
|
1369 |
+
Open-Gripper.
|
1370 |
+
2) Reach, Lift, Move-Object, Main, Open-Gripper, Reach,
|
1371 |
+
Lift, Move-Object.
|
1372 |
+
3) Lift, Main, Open-Gripper, Lift, Main, Open-Gripper,
|
1373 |
+
Lift, Main.
|
1374 |
+
4) Main, Open-Gripper, Main, Open-Gripper, Main, Open-
|
1375 |
+
Gripper, Main, Open-Gripper.
|
1376 |
+
|
1377 |
+
10
|
1378 |
+
IEEE ROBOTICS AND AUTOMATION LETTERS. PREPRINT VERSION. ACCEPTED DEC, 2022
|
1379 |
+
TABLE II: The components used in our environment observations,
|
1380 |
+
common to all tasks. Grip finger position is a continuous value from
|
1381 |
+
0 (closed) to 1 (open).
|
1382 |
+
Component
|
1383 |
+
Dim
|
1384 |
+
Unit
|
1385 |
+
Privileged?
|
1386 |
+
Extra info
|
1387 |
+
EE pos.
|
1388 |
+
3
|
1389 |
+
m
|
1390 |
+
No
|
1391 |
+
rel. to base
|
1392 |
+
EE velocity
|
1393 |
+
3
|
1394 |
+
m/s
|
1395 |
+
No
|
1396 |
+
rel. to base
|
1397 |
+
Grip finger pos.
|
1398 |
+
6
|
1399 |
+
[0, 1]
|
1400 |
+
No
|
1401 |
+
current, last 2
|
1402 |
+
Block pos.
|
1403 |
+
6
|
1404 |
+
m
|
1405 |
+
Yes
|
1406 |
+
both blocks
|
1407 |
+
Block rot.
|
1408 |
+
8
|
1409 |
+
quat
|
1410 |
+
Yes
|
1411 |
+
both blocks
|
1412 |
+
Block trans vel.
|
1413 |
+
6
|
1414 |
+
m/s
|
1415 |
+
Yes
|
1416 |
+
rel. to base
|
1417 |
+
Block rot vel.
|
1418 |
+
6
|
1419 |
+
rad/s
|
1420 |
+
Yes
|
1421 |
+
rel. to base
|
1422 |
+
Block rel to EE
|
1423 |
+
6
|
1424 |
+
m
|
1425 |
+
Yes
|
1426 |
+
both blocks
|
1427 |
+
Block rel to block
|
1428 |
+
3
|
1429 |
+
m
|
1430 |
+
Yes
|
1431 |
+
in base frame
|
1432 |
+
Block rel to slot
|
1433 |
+
6
|
1434 |
+
m
|
1435 |
+
Yes
|
1436 |
+
both blocks
|
1437 |
+
Force-torque
|
1438 |
+
6
|
1439 |
+
N,Nm
|
1440 |
+
No
|
1441 |
+
at wrist
|
1442 |
+
Total
|
1443 |
+
59
|
1444 |
+
5) Move-Object, Main, Open-Gripper, Move-Object, Main,
|
1445 |
+
Open-Gripper, Move-Object, Main.
|
1446 |
+
For insert, in addition to the trajectories listed above, we added
|
1447 |
+
two more trajectories to specifically accommodate Bring as an
|
1448 |
+
auxiliary task:
|
1449 |
+
1) Bring,
|
1450 |
+
Insert,
|
1451 |
+
Open-Gripper,
|
1452 |
+
Bring,
|
1453 |
+
Insert,
|
1454 |
+
Open-
|
1455 |
+
Gripper, Bring, Insert.
|
1456 |
+
2) Reach, Lift, Bring, Insert, Open-Gripper, Reach, Lift,
|
1457 |
+
Bring.
|
1458 |
+
APPENDIX B
|
1459 |
+
ENVIRONMENT DETAILS
|
1460 |
+
Fig. 10: An image of our multitask environment immediately after a
|
1461 |
+
reset has been carried out.
|
1462 |
+
A screenshot of our environment, simulated in PyBullet
|
1463 |
+
[47], is shown in Fig. 10. We chose this environment because
|
1464 |
+
we desired tasks that a) have a large distribution of possible
|
1465 |
+
initial states, representative of manipulation in the real world,
|
1466 |
+
b) have a shared observation/action space with several other
|
1467 |
+
tasks, allowing the use of auxiliary tasks and transfer learning,
|
1468 |
+
and c) require a reasonably long horizon and significant use of
|
1469 |
+
contact to solve. The environment contains a tray with sloped
|
1470 |
+
edges (to keep the blocks within the reachable workspace of
|
1471 |
+
the end-effector), as well as a green and a blue block, each
|
1472 |
+
of which is 4 cm × 4 cm × 4 cm and has a mass of 100 g.
|
1473 |
+
The dimensions of the lower part of the tray, before reaching
|
1474 |
+
the sloped edges, are 30 cm × 30 cm. The dimensions of the
|
1475 |
+
‘bring’ boundaries (shaded blue and green regions) are 8 cm
|
1476 |
+
× 8 cm, while the dimensions of the insertion slots, which
|
1477 |
+
are directly in the center of each shaded region, are 4.1 cm ×
|
1478 |
+
4.1 cm × 1 cm. The boundaries for end-effector movement,
|
1479 |
+
relative to the tool center point that is directly between the
|
1480 |
+
gripper fingers, are a 30 cm × 30 cm × 14.5 cm box, where
|
1481 |
+
the bottom boundary is low enough to allow the gripper to
|
1482 |
+
interact with objects, but not to collide with the bottom of the
|
1483 |
+
tray.
|
1484 |
+
See Table II for a summary of our environment observations.
|
1485 |
+
In this work, we use privileged state information (e.g., block
|
1486 |
+
poses), but adapting our method to exclusively use image-
|
1487 |
+
based data is straightforward since we do not use hand-crafted
|
1488 |
+
reward functions as in [12].
|
1489 |
+
The environment movement actions are 3-DOF translational
|
1490 |
+
position changes, where the position change is relative to the
|
1491 |
+
current end-effector position. We leverage PyBullet’s built-in
|
1492 |
+
position-based inverse kinematics function to generate joint
|
1493 |
+
commands. Our actions also contain a fourth dimension that
|
1494 |
+
corresponds to actuating the gripper. To allow for the use
|
1495 |
+
of policy models with exclusively continuous outputs, this
|
1496 |
+
dimension accepts any real number, with any value greater
|
1497 |
+
than 0 commanding the gripper to open, and any number less
|
1498 |
+
than 0 commanding it to close. Actions are supplied at a rate
|
1499 |
+
of 20 Hz, and each training episode is limited to 18 seconds,
|
1500 |
+
corresponding to 360 time steps per episode. For play-based
|
1501 |
+
expert data collection, we also reset the environment manually
|
1502 |
+
every 360 time steps. Between episodes, block positions are
|
1503 |
+
randomized to any pose within the tray, and the end-effector
|
1504 |
+
is randomized to any position between 5 and 14.5 cm above
|
1505 |
+
the tray, within the earlier stated end-effector bounds, with
|
1506 |
+
the gripper fully opened. The only exception to these initial
|
1507 |
+
conditions is during expert data collection and agent training
|
1508 |
+
of the Unstack-Stack task: in this case, the green block is
|
1509 |
+
manually set to be on top of the blue block at the start of the
|
1510 |
+
episode.
|
1511 |
+
APPENDIX C
|
1512 |
+
PERFORMANCE RESULTS FOR AUXILIARY TASKS
|
1513 |
+
The performance results for all multitask methods and
|
1514 |
+
all auxiliary tasks are shown in Fig. 11. Multitask BC has
|
1515 |
+
gradually decreasing performance on many of the auxiliary
|
1516 |
+
tasks as the number of updates increases, which is consistent
|
1517 |
+
with mild overfitting. Intriguingly, however, multitask BC
|
1518 |
+
does achieve quite reasonable performance on many of the
|
1519 |
+
auxiliary tasks (such as Lift) without needing any of the extra
|
1520 |
+
environment interactions required by an online method such
|
1521 |
+
as LfGP or DAC. An interesting direction for future work is to
|
1522 |
+
determine whether pretraining via multitask BC could provide
|
1523 |
+
|
1524 |
+
ABLETT et al.: LEARNING FROM GUIDED PLAY
|
1525 |
+
11
|
1526 |
+
0.5
|
1527 |
+
1.0
|
1528 |
+
1.5
|
1529 |
+
2.0
|
1530 |
+
0.0
|
1531 |
+
0.5
|
1532 |
+
1.0
|
1533 |
+
Stack
|
1534 |
+
Stack
|
1535 |
+
0.5
|
1536 |
+
1.0
|
1537 |
+
1.5
|
1538 |
+
2.0
|
1539 |
+
0.0
|
1540 |
+
0.5
|
1541 |
+
1.0
|
1542 |
+
Open
|
1543 |
+
0.5
|
1544 |
+
1.0
|
1545 |
+
1.5
|
1546 |
+
2.0
|
1547 |
+
0.0
|
1548 |
+
0.5
|
1549 |
+
1.0
|
1550 |
+
Close
|
1551 |
+
0.5
|
1552 |
+
1.0
|
1553 |
+
1.5
|
1554 |
+
2.0
|
1555 |
+
0.0
|
1556 |
+
0.5
|
1557 |
+
1.0
|
1558 |
+
Lift
|
1559 |
+
0.5
|
1560 |
+
1.0
|
1561 |
+
1.5
|
1562 |
+
2.0
|
1563 |
+
0.0
|
1564 |
+
0.5
|
1565 |
+
1.0
|
1566 |
+
Reach
|
1567 |
+
0.5
|
1568 |
+
1.0
|
1569 |
+
1.5
|
1570 |
+
2.0
|
1571 |
+
0.0
|
1572 |
+
0.5
|
1573 |
+
1.0
|
1574 |
+
Move
|
1575 |
+
0.5
|
1576 |
+
1.0
|
1577 |
+
1.5
|
1578 |
+
2.0
|
1579 |
+
0.0
|
1580 |
+
0.5
|
1581 |
+
1.0
|
1582 |
+
Unstack-Stack
|
1583 |
+
Unstack-Stack
|
1584 |
+
0.5
|
1585 |
+
1.0
|
1586 |
+
1.5
|
1587 |
+
2.0
|
1588 |
+
0.0
|
1589 |
+
0.5
|
1590 |
+
1.0
|
1591 |
+
Open
|
1592 |
+
0.5
|
1593 |
+
1.0
|
1594 |
+
1.5
|
1595 |
+
2.0
|
1596 |
+
0.0
|
1597 |
+
0.5
|
1598 |
+
1.0
|
1599 |
+
Close
|
1600 |
+
0.5
|
1601 |
+
1.0
|
1602 |
+
1.5
|
1603 |
+
2.0
|
1604 |
+
0.0
|
1605 |
+
0.5
|
1606 |
+
1.0
|
1607 |
+
Lift
|
1608 |
+
0.5
|
1609 |
+
1.0
|
1610 |
+
1.5
|
1611 |
+
2.0
|
1612 |
+
0.0
|
1613 |
+
0.5
|
1614 |
+
1.0
|
1615 |
+
Reach
|
1616 |
+
0.5
|
1617 |
+
1.0
|
1618 |
+
1.5
|
1619 |
+
2.0
|
1620 |
+
0.0
|
1621 |
+
0.5
|
1622 |
+
1.0
|
1623 |
+
Move
|
1624 |
+
0.5
|
1625 |
+
1.0
|
1626 |
+
1.5
|
1627 |
+
2.0
|
1628 |
+
0.0
|
1629 |
+
0.5
|
1630 |
+
1.0
|
1631 |
+
Bring
|
1632 |
+
Bring
|
1633 |
+
0.5
|
1634 |
+
1.0
|
1635 |
+
1.5
|
1636 |
+
2.0
|
1637 |
+
0.0
|
1638 |
+
0.5
|
1639 |
+
1.0
|
1640 |
+
Open
|
1641 |
+
0.5
|
1642 |
+
1.0
|
1643 |
+
1.5
|
1644 |
+
2.0
|
1645 |
+
0.0
|
1646 |
+
0.5
|
1647 |
+
1.0
|
1648 |
+
Close
|
1649 |
+
0.5
|
1650 |
+
1.0
|
1651 |
+
1.5
|
1652 |
+
2.0
|
1653 |
+
0.0
|
1654 |
+
0.5
|
1655 |
+
1.0
|
1656 |
+
Lift
|
1657 |
+
0.5
|
1658 |
+
1.0
|
1659 |
+
1.5
|
1660 |
+
2.0
|
1661 |
+
0.0
|
1662 |
+
0.5
|
1663 |
+
1.0
|
1664 |
+
Reach
|
1665 |
+
0.5
|
1666 |
+
1.0
|
1667 |
+
1.5
|
1668 |
+
2.0
|
1669 |
+
0.0
|
1670 |
+
0.5
|
1671 |
+
1.0
|
1672 |
+
Move
|
1673 |
+
1
|
1674 |
+
2
|
1675 |
+
3
|
1676 |
+
4
|
1677 |
+
0.0
|
1678 |
+
0.5
|
1679 |
+
1.0
|
1680 |
+
Insert
|
1681 |
+
Insert
|
1682 |
+
1
|
1683 |
+
2
|
1684 |
+
3
|
1685 |
+
4
|
1686 |
+
0.0
|
1687 |
+
0.5
|
1688 |
+
1.0
|
1689 |
+
Open
|
1690 |
+
1
|
1691 |
+
2
|
1692 |
+
3
|
1693 |
+
4
|
1694 |
+
0.0
|
1695 |
+
0.5
|
1696 |
+
1.0
|
1697 |
+
Close
|
1698 |
+
1
|
1699 |
+
2
|
1700 |
+
3
|
1701 |
+
4
|
1702 |
+
0.0
|
1703 |
+
0.5
|
1704 |
+
1.0
|
1705 |
+
Bring
|
1706 |
+
1
|
1707 |
+
2
|
1708 |
+
3
|
1709 |
+
4
|
1710 |
+
0.0
|
1711 |
+
0.5
|
1712 |
+
1.0
|
1713 |
+
Lift
|
1714 |
+
1
|
1715 |
+
2
|
1716 |
+
3
|
1717 |
+
4
|
1718 |
+
0.0
|
1719 |
+
0.5
|
1720 |
+
1.0
|
1721 |
+
Reach
|
1722 |
+
1
|
1723 |
+
2
|
1724 |
+
3
|
1725 |
+
4
|
1726 |
+
0.0
|
1727 |
+
0.5
|
1728 |
+
1.0
|
1729 |
+
Move
|
1730 |
+
0.0
|
1731 |
+
0.2
|
1732 |
+
0.4
|
1733 |
+
0.6
|
1734 |
+
0.8
|
1735 |
+
1.0
|
1736 |
+
Updates/steps (millions)
|
1737 |
+
0.0
|
1738 |
+
0.2
|
1739 |
+
0.4
|
1740 |
+
0.6
|
1741 |
+
0.8
|
1742 |
+
1.0
|
1743 |
+
Success Rate
|
1744 |
+
LfGP (multi)
|
1745 |
+
BC (multi)
|
1746 |
+
DAC (single)
|
1747 |
+
BC (single)
|
1748 |
+
Fig. 11: Performance for LfGP and the multitask baselines across all tasks, shaded area corresponds to standard deviation.
|
1749 |
+
any improvements in environment sample efficiency. We did
|
1750 |
+
attempt to do this, but found that it resulted in poorer final
|
1751 |
+
performance than training from scratch.
|
1752 |
+
APPENDIX D
|
1753 |
+
PROCEDURE FOR OBTAINING EXPERTS
|
1754 |
+
As stated, we used SAC-X [12] to train models that we
|
1755 |
+
used for generating expert data. We used the same hyperpa-
|
1756 |
+
rameters that we used for LfGP (see Table III), apart from
|
1757 |
+
the discriminator, which, of course, does not exist in SAC-X.
|
1758 |
+
See Section E for details on the hand-crafted rewards that we
|
1759 |
+
used for training these models. For an example of gathering
|
1760 |
+
play-based expert data, please see our attached video.
|
1761 |
+
We made two modifications to regular SAC-X to speed up
|
1762 |
+
learning. First, we pre-trained a Move-Object model before
|
1763 |
+
transferring this model to each of our main tasks, as we did
|
1764 |
+
in Section 5.3 of our main paper, since we found that SAC-X
|
1765 |
+
would plateau when we tried to learn the more challenging
|
1766 |
+
tasks from scratch. The need for this modification demon-
|
1767 |
+
strates another noteworthy benefit of LfGP—when training
|
1768 |
+
LfGP, main tasks could be learned from scratch, and generally
|
1769 |
+
in fewer time steps, than it took to train our experts. Second,
|
1770 |
+
during transfer to the main tasks, we used what we called a
|
1771 |
+
conditional weighted scheduler instead of a Q-Table: we de-
|
1772 |
+
fined weights for every combination of tasks, so that the sched-
|
1773 |
+
uler would pick each task with probability P(T (h)|T (h−1)),
|
1774 |
+
ensuring that ∀T ′ ∈ Tall, �
|
1775 |
+
T ∈Tall P(T |T ′) = 1. The weights
|
1776 |
+
that we used were fairly consistent between main tasks, and
|
1777 |
+
can be found in our packaged code. The conditional weighted
|
1778 |
+
scheduler ensured that every task was still explored throughout
|
1779 |
+
the learning process, so that we would have high-quality
|
1780 |
+
experts for every auxiliary task in addition to the main task.
|
1781 |
+
This scheduler can be considered as a more complex alter-
|
1782 |
+
native to the weighted random scheduler or the addition with
|
1783 |
+
handcrafted trajectories from our main paper, and again shows
|
1784 |
+
the flexibility of using a semantically-meaningful multitask
|
1785 |
+
policy with a common observation and action space.
|
1786 |
+
APPENDIX E
|
1787 |
+
EVALUATION
|
1788 |
+
As stated in our paper, we evaluated all algorithms by
|
1789 |
+
testing the mean output of the main task policy head in
|
1790 |
+
our environment and determining a success rate based on 50
|
1791 |
+
randomly selected resets. These evaluation episodes were run
|
1792 |
+
for 360 time steps to match our training process, and if a
|
1793 |
+
condition for success was met within that time, they were
|
1794 |
+
recorded as a success. The rest of this section describes in
|
1795 |
+
detail how we evaluated ‘success’ for each of our main and
|
1796 |
+
auxiliary tasks.
|
1797 |
+
As previously stated, we trained experts using a modified
|
1798 |
+
SAC-X [12] that required us to define a set of reward functions
|
1799 |
+
for each task, which we include in this section. The authors
|
1800 |
+
of [12] focused on sparse rewards but also showed a few
|
1801 |
+
experiments in which dense rewards reduced the time to learn
|
1802 |
+
adequate policies, so we chose to use dense rewards. We note
|
1803 |
+
that many of these reward functions are particularly com-
|
1804 |
+
plex and required significant manual shaping effort, further
|
1805 |
+
motivating the use of an imitation learning scheme like the
|
1806 |
+
one presented in our paper. It is possible that we could have
|
1807 |
+
made do with sparse rewards, such as those used in [12], but
|
1808 |
+
our compute resources made this impractical—for example,
|
1809 |
+
in [12], their agent took 5000 episodes × 36 actors × 360
|
1810 |
+
time steps = 64.8 M time steps to learn their stacking task,
|
1811 |
+
which would have taken over a month of wall clock time on
|
1812 |
+
our fastest machine. To see the specific values used for the
|
1813 |
+
rewards and success conditions described in these sections,
|
1814 |
+
please review our code.
|
1815 |
+
Unless otherwise stated, each of the success conditions in
|
1816 |
+
this section had to be held for 10 time steps, or 0.5 seconds,
|
1817 |
+
before being registered as a success. This choice was made
|
1818 |
+
to prevent registering a success when, for example, the blue
|
1819 |
+
block slipped off the green block during the Stack task.
|
1820 |
+
|
1821 |
+
12
|
1822 |
+
IEEE ROBOTICS AND AUTOMATION LETTERS. PREPRINT VERSION. ACCEPTED DEC, 2022
|
1823 |
+
A. Common
|
1824 |
+
For each of these functions, we use the following common
|
1825 |
+
labels:
|
1826 |
+
• pb: blue block position,
|
1827 |
+
• vb: blue block velocity,
|
1828 |
+
• ab: blue block acceleration,
|
1829 |
+
• pg: green block position,
|
1830 |
+
• pe: end-effector tool center point position (TCP),
|
1831 |
+
• ps: center of a block pushed into one of the slots,
|
1832 |
+
• g1: (scalar) gripper finger 1 position,
|
1833 |
+
• g2: (scalar) gripper finger 2 position, and
|
1834 |
+
• ag: (scalar) gripper open/close action.
|
1835 |
+
A block is flat on the tray when pb,z = 0 or pg,z = 0. To
|
1836 |
+
further reduce training time for SAC-X experts, all rewards
|
1837 |
+
were set to 0 if ∥pb −pe∥ > 0.1 and ∥pg −pe∥ > 0.1 (i.e., the
|
1838 |
+
TCP must be within 10 cm of either block). During training
|
1839 |
+
while using the Unstack-Stack variation of our environment,
|
1840 |
+
a penalty of -0.1 was added to each reward if ∥pg,z∥ > 0.001
|
1841 |
+
(i.e., there was a penalty to all rewards if the green block was
|
1842 |
+
not flat on the tray).
|
1843 |
+
B. Stack/Unstack-Stack
|
1844 |
+
The evaluation conditions for Stack and Unstack-Stack are
|
1845 |
+
identical, but in our Unstack-Stack experiments, the environ-
|
1846 |
+
ment is manually set to have the green block start on top of
|
1847 |
+
the blue block.
|
1848 |
+
1) Success: Using internal PyBullet commands, we check
|
1849 |
+
to see whether the blue block is in contact with the green
|
1850 |
+
block and is not in contact with either the tray or the gripper.
|
1851 |
+
2) Reward: We include a term for checking the distance
|
1852 |
+
between the blue block and the spot above the the green block,
|
1853 |
+
a term for rewarding increasing distance between the block and
|
1854 |
+
the TCP once the block is stacked, a term for shaping lifting
|
1855 |
+
behaviour, a term to reward closing the gripper when the block
|
1856 |
+
is within a tight reaching tolerance, and a term for rewarding
|
1857 |
+
the opening the gripper once the block is stacked.
|
1858 |
+
C. Bring/Insert
|
1859 |
+
We use the same success and reward calculations for Bring
|
1860 |
+
and Insert, but for Bring the threshold for success is 3 cm,
|
1861 |
+
and for insert, it is 2.5 mm.
|
1862 |
+
1) Success: We check that the distance between pb and
|
1863 |
+
ps is less than the defined threshold, that the blue block is
|
1864 |
+
touching the tray, and that the end-effector is not touching the
|
1865 |
+
block. For Insert, the block can only be within 2.5 mm of the
|
1866 |
+
insertion target if it is correctly inserted.
|
1867 |
+
2) Reward: We include a term for checking the distance
|
1868 |
+
between the pb and ps and a term for rewarding increas-
|
1869 |
+
ing distance between pb and pe once the blue block is
|
1870 |
+
brought/inserted.
|
1871 |
+
D. Open-Gripper/Close-Gripper
|
1872 |
+
We use the same success and reward calculations for Open-
|
1873 |
+
Gripper and Close-Gripper, apart from inverting the condition.
|
1874 |
+
1) Success: For Open-Gripper and Close-Gripper, we check
|
1875 |
+
to see if ag < 0 or ag > 0 respectively.
|
1876 |
+
2) Reward: We include a term for checking the action, as
|
1877 |
+
we do in the success condition, and also include a shaping term
|
1878 |
+
that discourages high magnitudes of the movement action.
|
1879 |
+
E. Lift
|
1880 |
+
1) Success: We check to see if pb,z > 0.06.
|
1881 |
+
2) Reward: We add a dense reward for checking the height
|
1882 |
+
of the block, but specifically also check that the gripper
|
1883 |
+
positions correspond to being closed around the block, so that
|
1884 |
+
the block does not simply get pushed up the edges of the tray.
|
1885 |
+
We also include a shaping term for encouraging the gripper
|
1886 |
+
to close when the block is reached.
|
1887 |
+
F. Reach
|
1888 |
+
1) Success: We check to see if ∥pe − pb∥ < 0.015.
|
1889 |
+
2) Reward: We have a single dense term to check the
|
1890 |
+
distance between pe and pb.
|
1891 |
+
G. Move-Object
|
1892 |
+
For Move-Object, we changed the required holding time for
|
1893 |
+
success to 1 second, or 20 time steps.
|
1894 |
+
1) Success: We check to see if the vb > 0.05 and ab < 5.
|
1895 |
+
The acceleration condition ensures that the arm has learned to
|
1896 |
+
move the block by following a smooth trajectory, rather than
|
1897 |
+
vigorously shaking it or continuously picking up and dropping
|
1898 |
+
it.
|
1899 |
+
2) Reward: We include a velocity term and an acceleration
|
1900 |
+
penalty, as in the success condition, but also include a dense
|
1901 |
+
bonus for lifting the block.
|
1902 |
+
APPENDIX F
|
1903 |
+
RETURN PLOTS
|
1904 |
+
As previously stated, we generated hand-crafted reward
|
1905 |
+
functions for each of our tasks for the purpose of training
|
1906 |
+
our SAC-X experts. Given that we have these rewards, we
|
1907 |
+
can also generate return plots corresponding to our results
|
1908 |
+
to add extra insight (see Fig. 12 and Fig. 13). The patterns
|
1909 |
+
displayed in these plots are, for the most part, quite similar
|
1910 |
+
to the success rate plots. One notable exception is that there
|
1911 |
+
is an eventual increase in performance when training DAC on
|
1912 |
+
Insert, indicating that, perhaps for certain tasks, DAC alone
|
1913 |
+
can eventually make progress. Nevertheless, it is clear that
|
1914 |
+
LfGP improves learning efficiency, and it is unclear whether
|
1915 |
+
DAC would plateau even if it was trained for a longer period.
|
1916 |
+
APPENDIX G
|
1917 |
+
MODEL ARCHITECTURES AND HYPERPARAMETERS
|
1918 |
+
All the single-task models share the same network architec-
|
1919 |
+
tures and all the multitask models share the same network
|
1920 |
+
architectures. All layers are initialized using the PyTorch
|
1921 |
+
default methods [37].
|
1922 |
+
For the single-task variant, the policy is a fully-connected
|
1923 |
+
network with two hidden layers followed by ReLU activation.
|
1924 |
+
Each hidden layer consists of 256 hidden units. The output of
|
1925 |
+
the policy for LfGP and DAC is split into two vectors, mean
|
1926 |
+
ˆµ and variance ˆσ2. For both variants of BC, only the mean ˆµ
|
1927 |
+
|
1928 |
+
ABLETT et al.: LEARNING FROM GUIDED PLAY
|
1929 |
+
13
|
1930 |
+
0.5
|
1931 |
+
1.0
|
1932 |
+
1.5
|
1933 |
+
2.0
|
1934 |
+
0
|
1935 |
+
200
|
1936 |
+
400
|
1937 |
+
600
|
1938 |
+
Stack
|
1939 |
+
0.5
|
1940 |
+
1.0
|
1941 |
+
1.5
|
1942 |
+
2.0
|
1943 |
+
0
|
1944 |
+
200
|
1945 |
+
400
|
1946 |
+
600
|
1947 |
+
800
|
1948 |
+
1000
|
1949 |
+
Unstack-Stack
|
1950 |
+
0.5
|
1951 |
+
1.0
|
1952 |
+
1.5
|
1953 |
+
2.0
|
1954 |
+
0
|
1955 |
+
100
|
1956 |
+
200
|
1957 |
+
300
|
1958 |
+
400
|
1959 |
+
500
|
1960 |
+
Bring
|
1961 |
+
0
|
1962 |
+
1
|
1963 |
+
2
|
1964 |
+
3
|
1965 |
+
4
|
1966 |
+
100
|
1967 |
+
200
|
1968 |
+
300
|
1969 |
+
400
|
1970 |
+
500
|
1971 |
+
Insert
|
1972 |
+
0.0
|
1973 |
+
0.2
|
1974 |
+
0.4
|
1975 |
+
0.6
|
1976 |
+
0.8
|
1977 |
+
1.0
|
1978 |
+
Updates/steps (millions)
|
1979 |
+
0.0
|
1980 |
+
0.2
|
1981 |
+
0.4
|
1982 |
+
0.6
|
1983 |
+
0.8
|
1984 |
+
1.0
|
1985 |
+
Episode Return
|
1986 |
+
LfGP (multi)
|
1987 |
+
BC (multi)
|
1988 |
+
DAC (single)
|
1989 |
+
BC (single)
|
1990 |
+
Expert
|
1991 |
+
Fig. 12: Episode return for LfGP compared with all baselines. Shaded area corresponds to standard deviation.
|
1992 |
+
0.5
|
1993 |
+
1.0
|
1994 |
+
1.5
|
1995 |
+
2.0
|
1996 |
+
0
|
1997 |
+
200
|
1998 |
+
400
|
1999 |
+
600
|
2000 |
+
Stack
|
2001 |
+
Stack
|
2002 |
+
0.5
|
2003 |
+
1.0
|
2004 |
+
1.5
|
2005 |
+
2.0
|
2006 |
+
200
|
2007 |
+
250
|
2008 |
+
300
|
2009 |
+
Open
|
2010 |
+
0.5
|
2011 |
+
1.0
|
2012 |
+
1.5
|
2013 |
+
2.0
|
2014 |
+
100
|
2015 |
+
150
|
2016 |
+
200
|
2017 |
+
250
|
2018 |
+
300
|
2019 |
+
Close
|
2020 |
+
0.5
|
2021 |
+
1.0
|
2022 |
+
1.5
|
2023 |
+
2.0
|
2024 |
+
0
|
2025 |
+
200
|
2026 |
+
400
|
2027 |
+
Lift
|
2028 |
+
0.5
|
2029 |
+
1.0
|
2030 |
+
1.5
|
2031 |
+
2.0
|
2032 |
+
100
|
2033 |
+
150
|
2034 |
+
200
|
2035 |
+
250
|
2036 |
+
300
|
2037 |
+
Reach
|
2038 |
+
0.5
|
2039 |
+
1.0
|
2040 |
+
1.5
|
2041 |
+
2.0
|
2042 |
+
0
|
2043 |
+
200
|
2044 |
+
400
|
2045 |
+
Move
|
2046 |
+
0.5
|
2047 |
+
1.0
|
2048 |
+
1.5
|
2049 |
+
2.0
|
2050 |
+
0
|
2051 |
+
200
|
2052 |
+
400
|
2053 |
+
600
|
2054 |
+
800
|
2055 |
+
Unstack-Stack
|
2056 |
+
Unstack-Stack
|
2057 |
+
0.5
|
2058 |
+
1.0
|
2059 |
+
1.5
|
2060 |
+
2.0
|
2061 |
+
200
|
2062 |
+
250
|
2063 |
+
300
|
2064 |
+
Open
|
2065 |
+
0.5
|
2066 |
+
1.0
|
2067 |
+
1.5
|
2068 |
+
2.0
|
2069 |
+
150
|
2070 |
+
200
|
2071 |
+
250
|
2072 |
+
300
|
2073 |
+
Close
|
2074 |
+
0.5
|
2075 |
+
1.0
|
2076 |
+
1.5
|
2077 |
+
2.0
|
2078 |
+
0
|
2079 |
+
200
|
2080 |
+
400
|
2081 |
+
Lift
|
2082 |
+
0.5
|
2083 |
+
1.0
|
2084 |
+
1.5
|
2085 |
+
2.0
|
2086 |
+
0
|
2087 |
+
100
|
2088 |
+
200
|
2089 |
+
Reach
|
2090 |
+
0.5
|
2091 |
+
1.0
|
2092 |
+
1.5
|
2093 |
+
2.0
|
2094 |
+
0
|
2095 |
+
200
|
2096 |
+
400
|
2097 |
+
Move
|
2098 |
+
0.5
|
2099 |
+
1.0
|
2100 |
+
1.5
|
2101 |
+
2.0
|
2102 |
+
0
|
2103 |
+
100
|
2104 |
+
200
|
2105 |
+
300
|
2106 |
+
400
|
2107 |
+
Bring
|
2108 |
+
Bring
|
2109 |
+
0.5
|
2110 |
+
1.0
|
2111 |
+
1.5
|
2112 |
+
2.0
|
2113 |
+
200
|
2114 |
+
250
|
2115 |
+
300
|
2116 |
+
Open
|
2117 |
+
0.5
|
2118 |
+
1.0
|
2119 |
+
1.5
|
2120 |
+
2.0
|
2121 |
+
100
|
2122 |
+
200
|
2123 |
+
300
|
2124 |
+
Close
|
2125 |
+
0.5
|
2126 |
+
1.0
|
2127 |
+
1.5
|
2128 |
+
2.0
|
2129 |
+
0
|
2130 |
+
200
|
2131 |
+
400
|
2132 |
+
Lift
|
2133 |
+
0.5
|
2134 |
+
1.0
|
2135 |
+
1.5
|
2136 |
+
2.0
|
2137 |
+
100
|
2138 |
+
200
|
2139 |
+
300
|
2140 |
+
Reach
|
2141 |
+
0.5
|
2142 |
+
1.0
|
2143 |
+
1.5
|
2144 |
+
2.0
|
2145 |
+
0
|
2146 |
+
200
|
2147 |
+
400
|
2148 |
+
Move
|
2149 |
+
1
|
2150 |
+
2
|
2151 |
+
3
|
2152 |
+
4
|
2153 |
+
200
|
2154 |
+
400
|
2155 |
+
Insert
|
2156 |
+
Insert
|
2157 |
+
1
|
2158 |
+
2
|
2159 |
+
3
|
2160 |
+
4
|
2161 |
+
250
|
2162 |
+
275
|
2163 |
+
300
|
2164 |
+
325
|
2165 |
+
Open
|
2166 |
+
1
|
2167 |
+
2
|
2168 |
+
3
|
2169 |
+
4
|
2170 |
+
100
|
2171 |
+
200
|
2172 |
+
300
|
2173 |
+
Close
|
2174 |
+
1
|
2175 |
+
2
|
2176 |
+
3
|
2177 |
+
4
|
2178 |
+
100
|
2179 |
+
200
|
2180 |
+
300
|
2181 |
+
400
|
2182 |
+
500
|
2183 |
+
Bring
|
2184 |
+
1
|
2185 |
+
2
|
2186 |
+
3
|
2187 |
+
4
|
2188 |
+
0
|
2189 |
+
200
|
2190 |
+
400
|
2191 |
+
Lift
|
2192 |
+
1
|
2193 |
+
2
|
2194 |
+
3
|
2195 |
+
4
|
2196 |
+
0
|
2197 |
+
100
|
2198 |
+
200
|
2199 |
+
300
|
2200 |
+
Reach
|
2201 |
+
1
|
2202 |
+
2
|
2203 |
+
3
|
2204 |
+
4
|
2205 |
+
0
|
2206 |
+
200
|
2207 |
+
400
|
2208 |
+
Move
|
2209 |
+
0.0
|
2210 |
+
0.2
|
2211 |
+
0.4
|
2212 |
+
0.6
|
2213 |
+
0.8
|
2214 |
+
1.0
|
2215 |
+
Updates/steps (millions)
|
2216 |
+
0.0
|
2217 |
+
0.2
|
2218 |
+
0.4
|
2219 |
+
0.6
|
2220 |
+
0.8
|
2221 |
+
1.0
|
2222 |
+
Episode Return
|
2223 |
+
LfGP (multi)
|
2224 |
+
BC (multi)
|
2225 |
+
DAC (single)
|
2226 |
+
BC (single)
|
2227 |
+
Fig. 13: Episode return for LfGP compared with multitask baselines on all tasks. Shaded area corresponds to standard deviation.
|
2228 |
+
output is used. The vectors define a Gaussian distribution (i.e.
|
2229 |
+
N(ˆµ, ˆσ2I), where I is the identity matrix). When computing
|
2230 |
+
actions, we squash the samples using the tanh function and
|
2231 |
+
bound the actions to be in range [−1, 1], as done in SAC
|
2232 |
+
[44]. The variance ˆσ2 is computed by applying a softplus
|
2233 |
+
function followed by a sum with an epsilon ϵ = 1e-7 to
|
2234 |
+
prevent underflow: ˆσi = softplus(ˆxi) + ϵ. The Q-functions
|
2235 |
+
are fully-connected networks with two hidden layers followed
|
2236 |
+
by ReLU activations. Each hidden layer consists of 256 units.
|
2237 |
+
The output of the Q-function is a scalar corresponding to the
|
2238 |
+
value estimate given the current state-action pair. Finally, the
|
2239 |
+
discriminator is a fully-connected network with two hidden
|
2240 |
+
layers followed by tanh activations. Each hidden layer consists
|
2241 |
+
of 256 units. The output of the discriminator is a scalar logit
|
2242 |
+
to be used as an input to the sigmoid function. The sigmoid
|
2243 |
+
function output can be viewed as the probability of the current
|
2244 |
+
state-action pair coming from the expert distribution.
|
2245 |
+
For multitask variant, the policies and the Q-functions share
|
2246 |
+
their initial layers. There are two shared, fully-connected
|
2247 |
+
layers followed by ReLU activations. Each layer consists of
|
2248 |
+
256 units. The output of the last shared layer is then fed into
|
2249 |
+
the policies and Q-functions. Each policy head and Q-function
|
2250 |
+
head corresponds to one task and has the same architecture:
|
2251 |
+
a two-layered fully-connected network followed by ReLU
|
2252 |
+
activations. The output of the policy head corresponds to the
|
2253 |
+
parameters of a Gaussian distribution, as described previously.
|
2254 |
+
Similarly, the output of the Q-function head corresponds to the
|
2255 |
+
value estimate. Finally, the discriminator is a fully-connected
|
2256 |
+
network with two hidden layers followed by tanh activations.
|
2257 |
+
Each hidden layer consists of 256 units. The output of the
|
2258 |
+
discriminator is a vector, where the ith entry corresponds to
|
2259 |
+
the logit input to the sigmoid function for task Ti. The ith
|
2260 |
+
sigmoid function output corresponds to the probability of the
|
2261 |
+
current state-action pair coming from the expert distribution
|
2262 |
+
in task Ti.
|
2263 |
+
The hyperparameters for our experiments are listed in
|
2264 |
+
Table III and Table V. In the early-stopping variant of BC,
|
2265 |
+
overfit tolerance refers to the number of full dataset training
|
2266 |
+
epochs without an improvement in validation error before we
|
2267 |
+
stop training. All models are optimized using Adam Optimizer
|
2268 |
+
[48] with PyTorch default values, unless specified otherwise.
|
2269 |
+
APPENDIX H
|
2270 |
+
OPEN-ACTION AND CLOSE-ACTION
|
2271 |
+
|
2272 |
+
14
|
2273 |
+
IEEE ROBOTICS AND AUTOMATION LETTERS. PREPRINT VERSION. ACCEPTED DEC, 2022
|
2274 |
+
TABLE III: Hyperparameters for AIL algorithms across all tasks.
|
2275 |
+
Parameters that do not appear in the original version of DAC are
|
2276 |
+
shown in blue.
|
2277 |
+
Algorithm
|
2278 |
+
LfGP
|
2279 |
+
DAC
|
2280 |
+
Total Interactions
|
2281 |
+
2M (4M for Insert)
|
2282 |
+
Buffer Size
|
2283 |
+
2M (4M for Insert)
|
2284 |
+
Buffer Warmup
|
2285 |
+
25k
|
2286 |
+
Initial Exploration
|
2287 |
+
50k
|
2288 |
+
Evaluations per task
|
2289 |
+
50
|
2290 |
+
Evaluation frequency
|
2291 |
+
100k interactions
|
2292 |
+
Intention
|
2293 |
+
γ
|
2294 |
+
0.99
|
2295 |
+
Batch Size
|
2296 |
+
256
|
2297 |
+
Q Update Freq.
|
2298 |
+
1
|
2299 |
+
Target Q Update Freq.
|
2300 |
+
1
|
2301 |
+
π Update Freq.
|
2302 |
+
1
|
2303 |
+
Polyak Averaging
|
2304 |
+
1e-4
|
2305 |
+
Q Learning Rate
|
2306 |
+
3e-4
|
2307 |
+
π Learning Rate
|
2308 |
+
1e-5
|
2309 |
+
α Learning Rate
|
2310 |
+
3e-4
|
2311 |
+
Initial α
|
2312 |
+
1e-2
|
2313 |
+
Target Entropy
|
2314 |
+
−dim(a) = −4
|
2315 |
+
Max. Gradient Norm
|
2316 |
+
10
|
2317 |
+
π Weight Decay
|
2318 |
+
1e-2
|
2319 |
+
Q Weight Decay
|
2320 |
+
1e-2
|
2321 |
+
BE sampling proportion
|
2322 |
+
0.1
|
2323 |
+
BE sampling decay
|
2324 |
+
0.99999
|
2325 |
+
Discriminator
|
2326 |
+
Learning Rate
|
2327 |
+
3e-4
|
2328 |
+
Batch Size
|
2329 |
+
256
|
2330 |
+
Gradient Penalty λ
|
2331 |
+
10
|
2332 |
+
Weight Decay
|
2333 |
+
1e-2
|
2334 |
+
(sT , 0) sampling bias
|
2335 |
+
0.95
|
2336 |
+
TABLE IV: Hyperparameters for LfGP schedulers.
|
2337 |
+
Scheduler
|
2338 |
+
Learned
|
2339 |
+
WRS
|
2340 |
+
WRS + HC
|
2341 |
+
ξ
|
2342 |
+
45
|
2343 |
+
N/A
|
2344 |
+
N/A
|
2345 |
+
φ
|
2346 |
+
0.6
|
2347 |
+
N/A
|
2348 |
+
N/A
|
2349 |
+
Initial Temp.
|
2350 |
+
360
|
2351 |
+
N/A
|
2352 |
+
N/A
|
2353 |
+
Temp. Decay
|
2354 |
+
0.9995
|
2355 |
+
N/A
|
2356 |
+
N/A
|
2357 |
+
Min. Temp.
|
2358 |
+
0.1
|
2359 |
+
N/A
|
2360 |
+
N/A
|
2361 |
+
Main Task Rate
|
2362 |
+
N/A
|
2363 |
+
0.5
|
2364 |
+
0.5
|
2365 |
+
Handcraft Rate
|
2366 |
+
N/A
|
2367 |
+
N/A
|
2368 |
+
0.5
|
2369 |
+
DISTRIBUTION MATCHING
|
2370 |
+
There was one exception to the method we used for col-
|
2371 |
+
lecting our expert data. Specifically, our Open-Gripper and
|
2372 |
+
Close-Gripper tasks required additional considerations. It is
|
2373 |
+
worth reminding the reader that our Open-Gripper and Close-
|
2374 |
+
Gripper tasks were meant to simply open or close the gripper,
|
2375 |
+
respectively, while remaining reasonably close to either block.
|
2376 |
+
If we were to use the approach described above verbatim,
|
2377 |
+
the Open-Gripper and Close-Gripper data would contain no
|
2378 |
+
(s, a) pairs where the gripper actually released or grasped
|
2379 |
+
the block, instead immediately opening or closing the gripper
|
2380 |
+
while simply hovering near the blocks. Perhaps unsurprisingly,
|
2381 |
+
this was detrimental to our algorithm’s performance: as one
|
2382 |
+
example, an agent attempting to learn Stack would, if Open-
|
2383 |
+
Gripper was selected while the blue block was held above
|
2384 |
+
TABLE V: Hyperparameters for BC algorithms (both single-task and
|
2385 |
+
multitask) across all tasks.
|
2386 |
+
Version
|
2387 |
+
Main Results
|
2388 |
+
Early Stopping
|
2389 |
+
Batch Size
|
2390 |
+
256
|
2391 |
+
Learning Rate
|
2392 |
+
1e-5
|
2393 |
+
Weight Decay
|
2394 |
+
1e-2
|
2395 |
+
Total Updates
|
2396 |
+
2M (4M for Insert)
|
2397 |
+
N/A
|
2398 |
+
Overfit Tolerance
|
2399 |
+
N/A
|
2400 |
+
100
|
2401 |
+
the green block, move the grasped blue block away from the
|
2402 |
+
green block before dropping it on the tray. This behaviour, of
|
2403 |
+
course, is not what we would want, but it better matches an
|
2404 |
+
expert distribution when the environment is reset in between
|
2405 |
+
each task execution.
|
2406 |
+
To mitigate this, our Open-Gripper data actually contain a
|
2407 |
+
mix of each of the other sub-tasks called for the first 45 time
|
2408 |
+
steps, followed by a switch to Open-Gripper, ensuring that
|
2409 |
+
the expert dataset contains some degree of block-releasing,
|
2410 |
+
with the trade-off being that 50% of the Open-Gripper expert
|
2411 |
+
data is specific to whatever the main task happens to be. We
|
2412 |
+
left this additional detail out of our main paper for clarity,
|
2413 |
+
since it corresponds to only a small portion of the expert
|
2414 |
+
data (every other auxiliary task was fully reused). Similarly,
|
2415 |
+
the Close-Gripper data calls Lift for 15 time steps before
|
2416 |
+
switching to Close-Gripper, ensuring that the Close-gripper
|
2417 |
+
dataset will contain a large proportion of data where the block
|
2418 |
+
is actually grasped. For the Closer-gripper data, however, this
|
2419 |
+
modification did still allow data to be reused between main
|
2420 |
+
tasks.
|
2421 |
+
APPENDIX I
|
2422 |
+
ATTEMPTED AND FAILED EXPERIMENTS
|
2423 |
+
In this section, we provide a list of experiments and modi-
|
2424 |
+
fications that did not improve performance, in addition to the
|
2425 |
+
alternatives that did.
|
2426 |
+
1) Pretraining with BC: We attempted to pretrain LfGP
|
2427 |
+
using multitask BC, and then to transition to online
|
2428 |
+
learning with LfGP, but we found that this tended to
|
2429 |
+
produce significantly poorer final performance. Some
|
2430 |
+
existing work [49], [50] has investigated transitioning
|
2431 |
+
from BC to online RL, but achieving this consistently,
|
2432 |
+
especially with off-policy RL, remains an open research
|
2433 |
+
problem.
|
2434 |
+
2) Handcrafted Open-Gripper/Close-Gripper policies:
|
2435 |
+
Given the simplicity of designing a reward function in
|
2436 |
+
these two cases, a natural question is whether Open-
|
2437 |
+
Gripper and Close-Gripper could use hand-crafted re-
|
2438 |
+
ward functions, or even hand-crafted policies, instead of
|
2439 |
+
these specialized datasets. In our experiments, both of
|
2440 |
+
these alternatives proved to be quite detrimental to our
|
2441 |
+
algorithm.
|
2442 |
+
3) Penalizing Q values: In our early experiments, we
|
2443 |
+
found that LfGP training progress was harmed by ex-
|
2444 |
+
ploding Q values. This problem was particularly exac-
|
2445 |
+
erbated when we added BE sampling to our Q and π
|
2446 |
+
updates. It appears that this occurs because, at the begin-
|
2447 |
+
ning of training, the differences between discriminator
|
2448 |
+
|
2449 |
+
ABLETT et al.: LEARNING FROM GUIDED PLAY
|
2450 |
+
15
|
2451 |
+
outputs for expert data and non-expert data are so large
|
2452 |
+
that the bootstrap Q updates quickly jump to unrealistic
|
2453 |
+
values. We attempted to use various forms of Q penalties
|
2454 |
+
to resolve this, akin to Conservative Q Learning (CQL)
|
2455 |
+
[51], but found that all of our modifications ultimately
|
2456 |
+
harmed final performance. Some of the things we tried,
|
2457 |
+
in addition to the CQL loss, were reducing γ (.95, .9),
|
2458 |
+
clipping Q losses to -5, +5, smooth L1 loss, huber loss,
|
2459 |
+
increased gradient penalty λ for D (50, 100), decreased
|
2460 |
+
reward scaling (.1), more discriminator updates per π/Q
|
2461 |
+
update (10), and weight decay in D only (as is done
|
2462 |
+
in [9]). We ultimately resolved exploding Q values by
|
2463 |
+
i) decreasing polyak averaging to a significantly lower
|
2464 |
+
value than is used in much other work (1e-4 as opposed
|
2465 |
+
to the SAC default of 5e-3), and ii) adding in weight
|
2466 |
+
decay (with a significantly higher value used than is
|
2467 |
+
used in other work) to π, Q, and D training (which was
|
2468 |
+
required to not overfit with the reduced polyak averaging
|
2469 |
+
value). Without the added weight decay, performance
|
2470 |
+
started to plateau and eventually to decrease.
|
2471 |
+
4) Higher Update-to-Data (UTD) Ratio: Recent work in
|
2472 |
+
RL has started increasing the UTD ratio (i.e., increas-
|
2473 |
+
ing the number of policy/Q updates per environment
|
2474 |
+
interaction), with the goal of improving environment
|
2475 |
+
sample efficiency [53]. We were actually able to increase
|
2476 |
+
this from 1 to 2 and achieve a marginal improvement
|
2477 |
+
in environment sample efficiency, but this also nearly
|
2478 |
+
doubled the running time of our experiments, so we
|
2479 |
+
opted not to include this modification in our final results.
|
2480 |
+
Higher values of the UTD ratio also caused our Q values
|
2481 |
+
to explode.
|
2482 |
+
APPENDIX J
|
2483 |
+
EXPERIMENTAL HARDWARE
|
2484 |
+
For a list of the software we used in this work, see our code
|
2485 |
+
and instructions. We used a number of different computers and
|
2486 |
+
GPUs when completing our experiments:
|
2487 |
+
1) GPU: NVidia Quadro RTX 8000, CPU: AMD - Ryzen
|
2488 |
+
5950x 3.4 GHz 16-core 32-thread, RAM: 64GB, OS:
|
2489 |
+
Ubuntu 20.04.
|
2490 |
+
2) GPU: NVidia V100 SXM2, CPU: Intel Gold 6148
|
2491 |
+
Skylake @ 2.4 GHz (only used 4 threads), RAM: 32GB,
|
2492 |
+
OS: CentOS 7.
|
2493 |
+
3) GPU: Nvidia GeForce RTX 2070, CPU: RYZEN
|
2494 |
+
Threadripper 2990WX, RAM: 32GB, OS: Ubuntu 20.04.
|
2495 |
+
REFERENCES
|
2496 |
+
[36] B. Chan, “RL sandbox,” https://github.com/chanb/rl sandbox public,
|
2497 |
+
2020.
|
2498 |
+
[37] A. Paszke, et al., “PyTorch: An imperative style, high-performance deep
|
2499 |
+
learning library,” in Advances in Neural Inf. Processing Systems 32,
|
2500 |
+
H. Wallach, H. Larochelle, A. Beygelzimer, F. dAlch´e-Buc, E. Fox, and
|
2501 |
+
R. Garnett, Eds.
|
2502 |
+
Curran Associates, Inc., 2019, pp. 8024–8035.
|
2503 |
+
[38] I. Gulrajani, F. Ahmed, M. Arjovsky, V. Dumoulin, and A. C. Courville,
|
2504 |
+
“Improved Training of Wasserstein GANs,” in Conf. Neural Inf. Pro-
|
2505 |
+
cessing Systems, I. Guyon, et al., Eds.
|
2506 |
+
Long Beach, USA: Curran
|
2507 |
+
Associates, Inc., Dec. 2017, pp. 5767–5777.
|
2508 |
+
[39] I. Kostrikov, K. K. Agrawal, D. Dwibedi, S. Levine, and J. Tomp-
|
2509 |
+
son, “Discriminator-Actor-Critic: Addressing Sample Inefficiency and
|
2510 |
+
Reward Bias in Adversarial Imitation Learning,” in Proc. Int. Conf.
|
2511 |
+
Learning Representations (ICLR’19), New Orleans, USA, May 2019.
|
2512 |
+
[40] D. P. Kingma and M. Welling, “Auto-Encoding Variational Bayes,”
|
2513 |
+
arXiv:1312.6114 [cs, stat], Dec. 2013.
|
2514 |
+
[41] S. Fujimoto, H. van Hoof, and D. Meger, “Addressing Function Ap-
|
2515 |
+
proximation Error in Actor-Critic Methods,” in Proc. 35th Int. Conf.
|
2516 |
+
Machine Learning (ICML’18), Stockholm, Sweden, Jul. 10–15 2018,
|
2517 |
+
pp. 1582–1591.
|
2518 |
+
[42] H. van Hasselt, A. Guez, and D. Silver, “Deep Reinforcement Learning
|
2519 |
+
with Double Q-learning,” in AAAI Conf. Artificial Intelligence, Pheonix,
|
2520 |
+
USA, Feb. 2016.
|
2521 |
+
[43] V. Mnih, et al., “Human-level control through deep reinforcement
|
2522 |
+
learning,” Nature, vol. 518, no. 7540, pp. 529–533, Feb. 2015.
|
2523 |
+
[44] T. Haarnoja, et al., “Soft Actor-Critic Algorithms and Applications,”
|
2524 |
+
arXiv:1812.05905 [cs, stat], Jan. 2019.
|
2525 |
+
[45] I. Kostrikov, “PyTorch Implementations of Reinforcement Learn-
|
2526 |
+
ing
|
2527 |
+
Algorithms,”
|
2528 |
+
https://github.com/ikostrikov/pytorch-a2c-ppo-acktr-
|
2529 |
+
gail, 2018.
|
2530 |
+
[46] M. Riedmiller, et al., “Learning by Playing Solving Sparse Reward Tasks
|
2531 |
+
from Scratch,” in Proc. 35th Int. Conf. Machine Learning (ICML’18),
|
2532 |
+
Stockholm, Sweden, July 2018, pp. 4344–4353.
|
2533 |
+
[47] E. Coumans and Y. Bai, “PyBullet, a Python module for physics
|
2534 |
+
simulation for games, robotics and machine learning,” http://pybullet.org,
|
2535 |
+
2016.
|
2536 |
+
[48] D. P. Kingma and J. Ba, “Adam: A Method for Stochastic Optimization,”
|
2537 |
+
in Proc. Int. Conf. Learning Representations (ICLR’15), San Diego,
|
2538 |
+
USA, May 7–9 2015.
|
2539 |
+
[49] A. Rajeswaran*, et al., “Learning Complex Dexterous Manipulation with
|
2540 |
+
Deep Reinforcement Learning and Demonstrations,” in Proc. Robotics:
|
2541 |
+
Science and Systems (RSS’18), Pittsburgh, USA, Jun. 26–30 2018.
|
2542 |
+
[50] Y. Wu, M. Mozifian, and F. Shkurti, “Shaping Rewards for Rein-
|
2543 |
+
forcement Learning with Imperfect Demonstrations using Generative
|
2544 |
+
Models,” arXiv:2011.01298 [cs], Nov. 2020.
|
2545 |
+
[51] A. Kumar, A. Zhou, G. Tucker, and S. Levine, “Conservative Q-Learning
|
2546 |
+
for Offline Reinforcement Learning,” arXiv:2006.04779 [cs, stat], Aug.
|
2547 |
+
2020.
|
2548 |
+
[52] M. Orsini, et al., “What Matters for Adversarial Imitation Learning?”
|
2549 |
+
in Conf. Neural Inf. Processing Systems, June 2021.
|
2550 |
+
[53] X. Chen, C. Wang, Z. Zhou, and K. Ross, “Randomized Ensembled
|
2551 |
+
Double Q-Learning: Learning Fast Without a Model,” arXiv:2101.05982
|
2552 |
+
[cs], Mar. 2021.
|
2553 |
+
|
7tAyT4oBgHgl3EQfQvZV/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
9NE1T4oBgHgl3EQf7wX0/content/2301.03539v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:6395cdc2dbe044252cb39d6bae4ed980dfc183811e352dd0e65e616fd3a347f2
|
3 |
+
size 997265
|
9NE1T4oBgHgl3EQf7wX0/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:af319944417615ee0945906c3292b60f296d5dfdb46671364837ce278d59a87f
|
3 |
+
size 4063277
|
9NE1T4oBgHgl3EQf7wX0/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:5946fd42879000d701b5f67107d516c44034e1c6f063d84165ff0ddba31606bd
|
3 |
+
size 165080
|
9NE2T4oBgHgl3EQflwcz/content/2301.03991v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:fbd23e010f9be3687da98f36a132be98f8d643a86fc74bbc90dac9ee6407090f
|
3 |
+
size 1170305
|
9NE2T4oBgHgl3EQflwcz/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:57dee23fc26f59ad3a74188b19f8e369ad32cdc5a9c1a4af2b057ab8433d22f9
|
3 |
+
size 3538989
|
9NE2T4oBgHgl3EQflwcz/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:da121927b70df4571aef243da2aa2e3ce2022edd60e7f0f17f9e4bba4953cc6d
|
3 |
+
size 122840
|
AdE1T4oBgHgl3EQf9Aai/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:77dac29dab0f7429fce3565786614cdf3f6c236a35f0d6fb1a021bd6955886fa
|
3 |
+
size 2949165
|
D9E1T4oBgHgl3EQf-QZ6/content/tmp_files/2301.03566v1.pdf.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
D9E1T4oBgHgl3EQf-QZ6/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
F9E5T4oBgHgl3EQfVg_E/content/2301.05552v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:cab6e19960ac8db9ef37e97e28a0e896acb647c77696cafe26fb030422cc5dfe
|
3 |
+
size 4396506
|
F9E5T4oBgHgl3EQfVg_E/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:45205112ebf2575fa2cb9da3c9acf9c4bedfdbb1d34e9f904e4a8edf3f767b80
|
3 |
+
size 6160429
|
F9E5T4oBgHgl3EQfVg_E/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:ad6dd6ab8e780b890cc3e5675de8d82d366dfbbd3e06ffba80953d2db80d5695
|
3 |
+
size 216964
|
H9FLT4oBgHgl3EQfIi9F/content/tmp_files/2301.12000v1.pdf.txt
ADDED
@@ -0,0 +1,488 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Chapter 1
|
2 |
+
Beyond Classroom:
|
3 |
+
Making a Difference in
|
4 |
+
Diversity in Tech
|
5 |
+
Barbora Buhnova
|
6 |
+
With all the opportunities and risks that technology holds in connection to our safe and sus-
|
7 |
+
tainable future, it is becoming increasingly important to involve a larger portion of our society in
|
8 |
+
becoming active co-creators of our digitalized future—moving from the passenger seat to the
|
9 |
+
driver seat. Yet, despite extensive efforts around the world, little progress has been made in
|
10 |
+
growing the representation of certain communities and groups in software engineering. This
|
11 |
+
chapter shares one successful project, called Czechitas, triggering a major social change in
|
12 |
+
Czechia, involving 1 000+ volunteers to support 50 000+ women on their way towards software
|
13 |
+
engineering education and career.
|
14 |
+
arXiv:2301.12000v1 [cs.SE] 27 Jan 2023
|
15 |
+
|
16 |
+
CHAPTER 1
|
17 |
+
Introduction
|
18 |
+
The past decade has witnessed the emergence of hundreds of initiatives around the world
|
19 |
+
supporting various underrepresented groups on their pathway towards software engineering,
|
20 |
+
whether connected to universities [13], companies [15], or run as independent non-profit or-
|
21 |
+
ganizations [14]. Although the initiatives often start with a great vision and high volunteering
|
22 |
+
commitment, after a few years into the activities, it becomes challenging to sustain the volun-
|
23 |
+
teering energy and commitment in face of the very slow progress towards the better. In those
|
24 |
+
moments, the success cases by others can be what helps us keep going.
|
25 |
+
The initiative featured in this chapter, called Czechitas [6], started in 2014 in Czechia, with
|
26 |
+
a simple idea to bring tech closer to girls and girls closer to tech, in reaction to the strong
|
27 |
+
under-representation of women in tech in the country (see Figure 1.1). The prompt snowball
|
28 |
+
effect helped us to build a community around the joint vision to empower and encourage girls
|
29 |
+
and women to engage in computing education and career transition, and to show them that
|
30 |
+
software engineering is an interesting career direction that is not necessarily difficult nor limited
|
31 |
+
to one gender. Initially established to provide women in Czechia with an opportunity to put their
|
32 |
+
hands on programming, it now contributes to a major social change in the country.
|
33 |
+
Over time, Czechitas has become a movement that has attracted a strong community of
|
34 |
+
tech-professional volunteers (over 1 000) and companies (over 100), and given rise to a portfo-
|
35 |
+
lio of women-tailored courses in various areas of software engineering, such as programming,
|
36 |
+
Figure 1.1: Women ICT Professional (Eurostat, 2019 data) [8].
|
37 |
+
2
|
38 |
+
|
39 |
+
30%
|
40 |
+
25%
|
41 |
+
20%
|
42 |
+
EU = 17.9%
|
43 |
+
15%
|
44 |
+
10%
|
45 |
+
5%
|
46 |
+
0%CHAPTER 1
|
47 |
+
web development, mobile app development, data science, cybersecurity or testing (over 1 300
|
48 |
+
courses delivered so far). We have influenced over 50 000 women (over 30 000 via live events
|
49 |
+
and over 20 000 via online tutorials) who graduated from our courses to use their new tech
|
50 |
+
skills to change their education path or advance their careers.
|
51 |
+
Czechitas Mission: We inspire, train and guide new talents towards stronger
|
52 |
+
diversity and competitiveness in tech.
|
53 |
+
Thanks to the success of our education activities with hundreds of events a year (each
|
54 |
+
receiving more registrations than its capacity), we have become recognized as the leading
|
55 |
+
platform in Czechia actively addressing gender diversity in tech. In this chapter, we share
|
56 |
+
the lessons we learned about the low representation of women in tech, effective strategies in
|
57 |
+
supporting women on their way to software engineering, discuss the ingredients that helped us
|
58 |
+
succeed, the obstacles and challenges we faced, and the progress yet to be made.
|
59 |
+
Why are There so Few Women in Tech?
|
60 |
+
Across Europe, only 19.1% of tech professionals are women (according to 2021 data) [8], with
|
61 |
+
Czechia being the last on the list. The major reasons behind the trend in our region according
|
62 |
+
to our recent study (with 70% of participants from Czechia and Germany) [9] are:
|
63 |
+
1. Access. The first hole in the leaky pipeline on girls’ pathway towards software engi-
|
64 |
+
neering is linked to the missing access to encouragement and support, together with the
|
65 |
+
missing access to suitable education that would be able to build on the interests of girls
|
66 |
+
that often span across multiple disciplines.
|
67 |
+
2. Stereotypes. The ability to see herself as a software engineer is then challenged by the
|
68 |
+
perception of the software engineering as a field not leading to a purpose the girl would
|
69 |
+
like to dedicate her future to. Often, the close family and friends step-in in this moment
|
70 |
+
to direct girls away from software engineering with the intention to protect them from
|
71 |
+
a future where they cannot really imagine the girls becoming successful. Interestingly,
|
72 |
+
3
|
73 |
+
|
74 |
+
CHAPTER 1
|
75 |
+
the intentions are meant well, to protect the girls, which shows how crucial it is to help
|
76 |
+
parents (and mainly mothers) to understand that software engineering can be a great
|
77 |
+
career choice for their daughters.
|
78 |
+
3. Confidence. The next hole on the leaky pipeline comes when girls find themselves in
|
79 |
+
the classroom, often surrounded by more-experienced learners (typically boys). For the
|
80 |
+
little girls who often excel in other subjects, it can be hard to fall in the category of a slow
|
81 |
+
novice learner. The girls often mention frustrations of low self-efficacy, inadequacy and
|
82 |
+
missing experience of success in presence of a classroom dynamic being monopolized
|
83 |
+
by the earlier technology adopters.
|
84 |
+
4. Sense of Belonging. The girls who resist through the earlier three challenges and find
|
85 |
+
themselves on the education pathway towards software engineering, find themselves in
|
86 |
+
classrooms surrounded predominantly by boys. While this is a comfortable environment
|
87 |
+
for some, many in the study reported not feeling comfortable to express themselves, fac-
|
88 |
+
ing sexism or unwanted attention and missing relatable role models and mentors, which
|
89 |
+
led them to reconsider whether this is the environment they would be willing to spend the
|
90 |
+
rest of their lives in.
|
91 |
+
5. Feeling Valued. The last hole in the leaky pipeline challenges the women who entered
|
92 |
+
software engineering careers, as some of them emphasize the struggle of not feeling
|
93 |
+
valued at workplace. The reasons are different for the women with stereotypical talent
|
94 |
+
spectrum (that matches the talent spectrum typical among their men colleagues, typically
|
95 |
+
being very technical) and non-stereotypical talent spectrum (bringing not-that-common
|
96 |
+
talents to the table, typically more multidisciplinary and human-oriented). While the first
|
97 |
+
group feels ”tired of proving them wrong”, the second group feel frustrated from their
|
98 |
+
strengths viewed as second class and from missing appreciation.
|
99 |
+
Supporting Women on their Way to Tech
|
100 |
+
In Czechitas, we understand that plumbing the leaky pipeline can hardly be done by isolated
|
101 |
+
and uncoordinated efforts. This section discusses the interlinked pillars of our activities (see
|
102 |
+
Figure 1.2), listing examples of the activities and events we delivered in 2022.
|
103 |
+
4
|
104 |
+
|
105 |
+
CHAPTER 1
|
106 |
+
Czechitas Pillar I – Awareness
|
107 |
+
One of the crucial success factors for a change towards improving gender balance in soft-
|
108 |
+
ware engineering is the actual understanding that we are in a disbalanced state that further
|
109 |
+
reinforces itself due to the factors discussed earlier. The efforts towards encouraging women
|
110 |
+
to join software engineering cannot make a difference unless the society, education system
|
111 |
+
and corporate environment welcomes and supports the change (understanding it as a push
|
112 |
+
towards the real equilibrium, not a push out of it).
|
113 |
+
In Czechitas, we are investing substantial effort in awareness around the topic. In 2022
|
114 |
+
alone, we participated in over 20 conferences and panel discussions, gave numerous inter-
|
115 |
+
views in TV, radio and other media, organized talks to students and teachers at high schools,
|
116 |
+
and to tech professionals in our partner companies. We were visible with a booth at 15 festivals
|
117 |
+
and family days across Czechia. Over 2022, Czechitas was mentioned in 508 articles, reach-
|
118 |
+
ing major part of Czech population. In 2021, we also launched a Czechitas podcast, which in
|
119 |
+
2022 reached over 14 676 listens. Furthermore, our website was in 2022 visited by 123 785
|
120 |
+
unique visitors, and our newsletter was followed by 25 983 subscribers.
|
121 |
+
The next step in raising awareness among the general public is to make it as easy as
|
122 |
+
possible to get the first exposure to coding in a fun, enjoyable and community way. To this end,
|
123 |
+
we for instance organize an Advent Christmas Coding campaign (following the tradition of an
|
124 |
+
advent calendar, in which instead of a sweet treat, each day holds a coding assignment along a
|
125 |
+
story of bringing Mr. Gingerbread home for Christmas), which is being followed by hundreds of
|
126 |
+
Figure 1.2: The Pillars of Czechitas Activities.
|
127 |
+
5
|
128 |
+
|
129 |
+
CAREER
|
130 |
+
AWARENESS
|
131 |
+
TRAINING
|
132 |
+
TRANSITION
|
133 |
+
COMMUNITYCHAPTER 1
|
134 |
+
people. Furthermore, in collaboration with the Ministry of Education, Youth and Sports, we e.g.
|
135 |
+
co-organized the #DIGIEDUHACK hackathon. And in collaboration with Czech universities, we
|
136 |
+
run the Czechitas Thesis Award to give visibility to exceptional bachelor theses authored by
|
137 |
+
girls. All these activities typically repeat every year.
|
138 |
+
Czechitas Pillar II – Training
|
139 |
+
Since the start of our activities in 2014, we are improving the education design of our courses
|
140 |
+
to reflect the needs of our audience—women and girls who are very often later technology
|
141 |
+
adopters or career changers—with an emphasis on providing suitable first contact with soft-
|
142 |
+
ware engineering, creating safe and supportive environment for novice learners, accommodat-
|
143 |
+
ing differences in the learning speed of each student, building self-confidence, and supporting
|
144 |
+
sustaining long-term interest, which we also publish [2, 10]. In 2022, we delivered 242 live
|
145 |
+
software-engineering courses with 15 316 participants, with the courses around web develop-
|
146 |
+
ment and data science scoring as the most popular ones.
|
147 |
+
Although most of the training is targeted to women and girls, we are also investing in training
|
148 |
+
Figure 1.3: Czechitas-participation (Data as of June 2022).
|
149 |
+
6
|
150 |
+
|
151 |
+
21,767
|
152 |
+
1.482+
|
153 |
+
57.683+
|
154 |
+
8,686
|
155 |
+
educational
|
156 |
+
participants
|
157 |
+
events
|
158 |
+
428
|
159 |
+
10
|
160 |
+
11,763
|
161 |
+
299
|
162 |
+
3,752
|
163 |
+
8,268
|
164 |
+
238
|
165 |
+
418
|
166 |
+
13,081
|
167 |
+
5,821
|
168 |
+
3,969
|
169 |
+
145
|
170 |
+
141
|
171 |
+
4,271
|
172 |
+
295
|
173 |
+
102
|
174 |
+
6
|
175 |
+
8,011
|
176 |
+
84
|
177 |
+
2,654
|
178 |
+
45
|
179 |
+
135
|
180 |
+
1,873
|
181 |
+
1,266
|
182 |
+
4,299
|
183 |
+
2015
|
184 |
+
2016
|
185 |
+
2017
|
186 |
+
2018
|
187 |
+
2019
|
188 |
+
2020
|
189 |
+
2021
|
190 |
+
2022*
|
191 |
+
2015
|
192 |
+
2016
|
193 |
+
2017
|
194 |
+
2018
|
195 |
+
2019
|
196 |
+
2020
|
197 |
+
2021
|
198 |
+
2022*
|
199 |
+
Number of educational events
|
200 |
+
Number of video tutorials
|
201 |
+
Educational events participants
|
202 |
+
Educational video tutorials participantsCHAPTER 1
|
203 |
+
elementary-school and high-school teachers (irrespective of gender). And some mixed-gender
|
204 |
+
activities were organized also for children (7 week-long summer camps in the summer of 2022,
|
205 |
+
besides others) and high-school kids, although in case of high schools, it is already important
|
206 |
+
to offer also girl-only courses (3 week-long summer schools for high-school girls were given
|
207 |
+
in 2022). Besides, training courses for mixed audience are also provided on events such as
|
208 |
+
Family Days (we were present at over 20 such events in 2022).
|
209 |
+
Czechitas Pillar III – Career Transition
|
210 |
+
As many women in our community intend to enter software engineering as their future profes-
|
211 |
+
sion, some of our activities are intentionally designed to facilitate this journey, whether software
|
212 |
+
engineering is to become their first job or they intend to change their career [3].
|
213 |
+
In cooperation with our partner companies, we have identified three career pathways that
|
214 |
+
appear to be the most suitable entry points to software engineering in Czechia. These are
|
215 |
+
(1) web development (including courses on JavaScript, React, HTML/CSS, Bootstrap, Git,
|
216 |
+
UX design, and others), (2) data analytics (including courses on Python, databases, SQL,
|
217 |
+
statistics, Power BI, and others), (3) testing (including courses on requirements engineering,
|
218 |
+
agile processes, manual testing, issue tracking, regression testing, smoke testing, basics of
|
219 |
+
automated testing, browsers, API, databases, version control, and others).
|
220 |
+
For the three directions, we have developed a complex career-transition support within so-
|
221 |
+
called Digital Academies. A Digital Academy is a four-month program for a group of 30 women
|
222 |
+
(and involving around 5-15 partner companies), which besides individual courses covering the
|
223 |
+
topics outlined above and taking place 3-4 times a week (evenings on working days, full days
|
224 |
+
on weekends) includes also pairing of the students with mentors from the companies to support
|
225 |
+
them in developing their own projects, a hackathon, career support, and further events offered
|
226 |
+
by the partner companies. In 2022, we have run 10 Digital Academies across four major cities
|
227 |
+
in Czechia, with over 60% of the graduates receiving a job offer within three months from
|
228 |
+
graduating from the academy.
|
229 |
+
To facilitate the career transition also for the women who opt to customize their training
|
230 |
+
journey (not attending a Digital Academy), our career consultants provide hundreds of career
|
231 |
+
consultations each year (327 in 2022), and we twice a year organize a Czechitas Job Fair,
|
232 |
+
7
|
233 |
+
|
234 |
+
CHAPTER 1
|
235 |
+
where our graduates can meet the representatives of our partner companies (each Job Fair
|
236 |
+
attended by about 350 graduates and 30 companies).
|
237 |
+
Czechitas Foundation – Community
|
238 |
+
The foundation that supports all our activities is the community, which involves the participants
|
239 |
+
and graduates of our courses, tech professionals who teach with us, mentors, course facili-
|
240 |
+
tators, and our partner companies. The fact that many members in our community are men
|
241 |
+
helps us not only engage more tech-professional allies in our vision, but also influence a more
|
242 |
+
supportive environment in tech companies where our graduates land. To support the blending
|
243 |
+
of the community and increasing the sense of belonging of our graduates also in the mixed-
|
244 |
+
gender environment, we regularly engage in organization of Tech Meet-ups and Hackathons,
|
245 |
+
as well as informal CzechiPubs that regularly take place in 10 different cities across Czechia.
|
246 |
+
Making a Difference
|
247 |
+
The positive influence of Czechitas activities in Czechia is already visible in the shifted percep-
|
248 |
+
tion of software engineering as an education pathway and career choice to be considered by
|
249 |
+
any gender. That not only motivates many girls to consider software engineering in their choice
|
250 |
+
of a university study field (with the representation of women among ICT students changing from
|
251 |
+
12% in 2016 to 17% in 2021 in Czechia [7, 5], moving the country closer to the European av-
|
252 |
+
erage, see Figure 1.4) but is likely also having secondary influence on all who so far hesitated
|
253 |
+
to join software engineering.
|
254 |
+
What Helped us Succeed
|
255 |
+
Building Czechitas was only possible thanks to a coordinated effort of hundreds of people (90
|
256 |
+
employees and over 1,000 volunteers). Over the past eight years of our existence, we came to
|
257 |
+
understand the ingredients without which this would not be possible:
|
258 |
+
• Great leadership and love for what we do is giving us the sense of purpose, energy and
|
259 |
+
direction, holding us together and keeping us focused. Mentors from partner companies
|
260 |
+
8
|
261 |
+
|
262 |
+
CHAPTER 1
|
263 |
+
Figure 1.4: Women ICT Students (Czech Statistical Office, 2021 data) [5].
|
264 |
+
and beyond have been of great help to guide us through the design of our leadership and
|
265 |
+
expansion strategy.
|
266 |
+
• Visual and playful communication is giving us the fresh flavour of fun and joy that we
|
267 |
+
all (students as well as trainers and volunteers) enjoy joining even after a tiring day at
|
268 |
+
school or work. The informal and visually attractive communication helps us to share the
|
269 |
+
love for our brand.
|
270 |
+
• Community and sense of belonging is crucial for connecting those who strive to learn
|
271 |
+
with those who strive to share and teach, and those who want to support the connection.
|
272 |
+
It helps our student to feel home and make it easier for them to keep going even when
|
273 |
+
learning gets hard.
|
274 |
+
• Inclusive environment and encouragement makes it safe for our students to make mis-
|
275 |
+
takes and experience success, have the opportunity to exchange knowledge, collaborate,
|
276 |
+
and get personalized feedback and guidance. Specific strategies and interventions we
|
277 |
+
have developed to support novice learners and their self-efficacy have been key in this
|
278 |
+
direction [2].
|
279 |
+
• Knowledge and understanding is crucial for us to design our activities with insight into
|
280 |
+
the frustrations steering women away from software engineering [9] and effective strate-
|
281 |
+
gies to support girls and women in tech education [10] and career transition [3]. We
|
282 |
+
9
|
283 |
+
|
284 |
+
30%
|
285 |
+
25%
|
286 |
+
EU = 20%
|
287 |
+
20%
|
288 |
+
15%
|
289 |
+
10%
|
290 |
+
5%
|
291 |
+
0%CHAPTER 1
|
292 |
+
invest our time in sharing the lessons we have learned [2, 9, 3], and learning from other
|
293 |
+
initiatives from across the world (e.g., within the EUGAIN network, see https://eugain.eu/).
|
294 |
+
• Creating and sharing stories helps us to inspire our students, bring them closer to
|
295 |
+
relatable role models, and to give them hope and confidence that with some work and
|
296 |
+
dedication, a transition into software engineering is possible. The stories (each featuring
|
297 |
+
an inspiring woman who changed her career towards tech) are published in our blog,
|
298 |
+
communicated via social networks, and used in media articles. These women inspire
|
299 |
+
others as speakers and panelists in our events, and as guests in Czechitas Podcast.
|
300 |
+
• Sustainable financial model helps us to sustain a team employed to run the organi-
|
301 |
+
zation. The model stands on financial participation of the students, partner companies,
|
302 |
+
foundations and individual donors, with an intention to reach out also to the government
|
303 |
+
level in the future. The most crucial pillar of our financial sustainability is the partner com-
|
304 |
+
panies, which are beside their yearly partnership contributions (depending on the level of
|
305 |
+
partnership) helping us to cover certain costs (e.g., offering their office spaces for events,
|
306 |
+
motivating their employees to volunteer as mentors), and opening doors towards further
|
307 |
+
funding opportunities (e.g. with global foundations connected to their company).
|
308 |
+
Obstacles and Challenges we Faced
|
309 |
+
As any organization that has substantially outgrown its own plans and expectations, Czechitas
|
310 |
+
has undergone numerous changes and readjustments over its course of existence. And al-
|
311 |
+
though we are trying to publish the effective setup that works for us now [2, 3, 4], our first steps
|
312 |
+
were highly organic and experimental, which was key to learning what works for the context
|
313 |
+
we were in. With our enthusiasm and ”always yes” spirit, we walked many paths that we failed
|
314 |
+
and rolled back, but we also faced numerous obstacles and challenges that we withstood.
|
315 |
+
• Scaling the organization. Turning a non-profit start-up into a scale-up is a challenge on
|
316 |
+
its own, as the means for achieving stability are different from traditional companies – be-
|
317 |
+
sides the discussed financial stability, also in terms of sustained volunteering involvement
|
318 |
+
and brand building. We needed to learn to manage the mix of the innovative and largely
|
319 |
+
self-sacrificing founding community with the necessary systematic and organized spirit of
|
320 |
+
10
|
321 |
+
|
322 |
+
CHAPTER 1
|
323 |
+
new employees. We needed to learn to prioritize and say no to some activities that the
|
324 |
+
team felt strongly for.
|
325 |
+
• Being misunderstood. As a large organization, we needed to learn to communicate
|
326 |
+
our mission well so that it is not misunderstood, knowing that anything that damages
|
327 |
+
the brand may sink the whole boat. Namely, we needed to help our partner companies
|
328 |
+
understand what level of expertise is realistic to achieve in our students, help our students
|
329 |
+
understand what time investment and commitment it takes to change direction towards
|
330 |
+
tech, and help our society understand why our focus on women is key to the success of
|
331 |
+
our society as a whole.
|
332 |
+
• Quantifying the impact of our activities. One of the important challenges that we are
|
333 |
+
still facing is our ability to quantify the impact of our individual interventions and activities,
|
334 |
+
as it is difficult to isolate the effects of each one of them. More so that the impact is often
|
335 |
+
very subtle and propagates over long periods of time (e.g., a woman making a few steps
|
336 |
+
towards tech education inspiring her friend to make a major shift towards tech, who then
|
337 |
+
inspires her daughter to study CS at university). So although we have a Data & Impact
|
338 |
+
team at Czechitas, with substantial data available, the numbers we have (e.g., the number
|
339 |
+
of women who change their career to tech each year) are still only the tip of the iceberg
|
340 |
+
of the real impact we strive for, which is the shift in the collective mindset of the entire
|
341 |
+
society, leading to a sustained change.
|
342 |
+
Progress yet to be Made
|
343 |
+
With the increasing number of Czechitas graduates who are joining software engineering in-
|
344 |
+
dustry, often as very junior (in terms of their software-engineering expertise) and diverse (in
|
345 |
+
terms of their talents and competencies) members, we find it crucial to assist the companies
|
346 |
+
to improve the inclusiveness of their environment to integrate and leverage the new diverse
|
347 |
+
talent. In 2020, we made the first step towards that goal via designing a Diversity Awareness
|
348 |
+
Training, which was since then delivered to over 300 managers (mostly from Central and East-
|
349 |
+
ern Europe) across some of our partner companies. The concepts that have shown to be the
|
350 |
+
most crucial to discuss and understand during these trainings are outlined below:
|
351 |
+
11
|
352 |
+
|
353 |
+
CHAPTER 1
|
354 |
+
Figure 1.5: Tuckman’s Model of Team Dynamics with an illustration of different dynamics
|
355 |
+
observed in homogeneous and heterogeneous teams.
|
356 |
+
• Diversity does not come easy, but it pays off. Avoiding diversity is natural to human in-
|
357 |
+
dividuals, but dangerous to humankind1. The same is true for corporate environment. We
|
358 |
+
need to acknowledge that diverse teams might have a harder time at start (as illustrated
|
359 |
+
with the Tuckman’s Model of Team Dynamics in Figure 1.5), but in long-term, diversity is
|
360 |
+
firmly correlated with higher performance [11, 12].
|
361 |
+
• We too often lose talented people by missing the talent in them. We are all talented,
|
362 |
+
in many diverse ways. It is the task of the manager to recognize and direct the talent to-
|
363 |
+
wards team success. The fact that a person uses a different talent spectrum (approaches
|
364 |
+
problems and situations differently) does not make them more/less suitable for software
|
365 |
+
engineering as such. There is no such thing as a second-class citizen when it comes to
|
366 |
+
the talents we need in software engineering.
|
367 |
+
• Biases evolved to help us navigate complexity, but they are not serving us well
|
368 |
+
when making assumptions about the potential in people. The dark side of biases is
|
369 |
+
that we tend to judge people’s potential based on how their talent spectrum matches the
|
370 |
+
talent of already-successful ones. Without realizing that the successful ones embody the
|
371 |
+
skills and conditions that worked when they joined the field (in the past) while we are now
|
372 |
+
choosing the software engineers for the future.
|
373 |
+
• Connection is built through communication. There are many unhealthy communica-
|
374 |
+
1Our quote inspired by the statement ”Diversity is the new Darwinism” by the Great British Diversity Experiment [1].
|
375 |
+
12
|
376 |
+
|
377 |
+
7
|
378 |
+
Forming
|
379 |
+
Strorming
|
380 |
+
Norming
|
381 |
+
Performing
|
382 |
+
Adjourning
|
383 |
+
个
|
384 |
+
Effectiveness
|
385 |
+
Homogenous
|
386 |
+
team
|
387 |
+
Heterogenous
|
388 |
+
team
|
389 |
+
TimeCHAPTER 1
|
390 |
+
tion patterns around diversity, which often go against the purpose of making us all feel
|
391 |
+
the sense of belonging. It is important to create safe space, in which we can learn to
|
392 |
+
communicate our differences but also ask about the differences of others. Mistakes are
|
393 |
+
part of that learning, and forgiveness of the mistakes shall be encouraged if the mistakes
|
394 |
+
were done in the process of learning and not repeated blindly. It is important to create a
|
395 |
+
safe space to acknowledge our biases and stop shaming one another for them.
|
396 |
+
• Avoid the quick fixes, remove the barriers instead. Encourage curiosity about why cer-
|
397 |
+
tain communities are under-represented in software engineering. What are the barriers
|
398 |
+
they face and what can we do to remove them or make their journey lighter in presence of
|
399 |
+
the barriers (e.g. the care-taking on the side of most women)? Avoiding the conversation
|
400 |
+
and looking away from the differences in our experiences might lead the community to as-
|
401 |
+
sume that the under-representation is the lower-fit problem, which is dangerous because
|
402 |
+
it leads to push-back on any diversity support one might try to introduce.
|
403 |
+
• Change takes time. Promoting I&D is more complex than it might seem at first. It is
|
404 |
+
crucial to know how to start to see the first positive effects soon and be able to use them
|
405 |
+
to get more people on board towards promoting I&D further. Choose your first steps well
|
406 |
+
and invest in them. The investment will pay off.
|
407 |
+
Conclusion
|
408 |
+
Making a difference in improving gender balance in software engineering on the scale of the
|
409 |
+
whole country is not easy, but is possible. And it is very rewarding to be part of such a move-
|
410 |
+
ment. In 2021, the social impact of Czechitas activities was recognized at the European Union
|
411 |
+
level via winning the EU Social Economy Award (over 180 organizations nominated) in the
|
412 |
+
Digitalisation and Skills category, and in 2022 winning the global Equals in Tech Award (155
|
413 |
+
organizations nominated) in the Skills category. We hope our example can inspire others,
|
414 |
+
which is also why we are eager to share the lessons learned from our journey.
|
415 |
+
13
|
416 |
+
|
417 |
+
Bibliography
|
418 |
+
[1] Amanda Bennett. Case study: The great British diversity experiment, 2016. FairPlay Ltd.
|
419 |
+
[2] Barbora Buhnova and Lucia Happe. Girl-friendly computer science classroom: Czechitas
|
420 |
+
experience report. In European Conference on Software Architecture, pages 125–137.
|
421 |
+
Springer, 2020.
|
422 |
+
[3] Barbora Buhnova, Lucie Jurystova, and Dita Prikrylova.
|
423 |
+
Assisting women in career
|
424 |
+
change towards software engineering: experience from czechitas ngo. In Proceedings of
|
425 |
+
the 13th European Conference on Software Architecture-Volume 2, pages 88–93, 2019.
|
426 |
+
[4] Barbora Buhnova and Dita Prikrylova.
|
427 |
+
Women want to learn tech: Lessons from the
|
428 |
+
czechitas education project. In 2019 IEEE/ACM 2nd International Workshop on Gender
|
429 |
+
Equality in Software Engineering (GE), pages 25–28. IEEE, 2019.
|
430 |
+
[5] Czech Statistical Office. Human resources in information technology, 2021. Available on-
|
431 |
+
line at URL https://www.czso.cz/documents/10180/165376696/063015-21.pdf/c7e96151-
|
432 |
+
b285-4388-9384-532e55f4a318?version=1.2.
|
433 |
+
[6] Czechitas.
|
434 |
+
Czechitas
|
435 |
+
annual
|
436 |
+
report
|
437 |
+
2021,
|
438 |
+
2022.
|
439 |
+
Available
|
440 |
+
online
|
441 |
+
at
|
442 |
+
URL
|
443 |
+
https://is.muni.cz/go/u6ji13.
|
444 |
+
[7] Eurostat.
|
445 |
+
Female students under-represented in ICT, 2016.
|
446 |
+
Available online at URL
|
447 |
+
https://ec.europa.eu/eurostat/web/products-eurostat-news/-/edn-20190425-1.
|
448 |
+
[8] Eurostat.
|
449 |
+
ICT
|
450 |
+
specialists
|
451 |
+
in
|
452 |
+
employment,
|
453 |
+
2022.
|
454 |
+
Available
|
455 |
+
online
|
456 |
+
at
|
457 |
+
URL
|
458 |
+
https://ec.europa.eu/eurostat/statistics-explained/index.php?title=ICT specialists in em-
|
459 |
+
ployment.
|
460 |
+
|
461 |
+
CHAPTER 1
|
462 |
+
[9] Lucia Happe and Barbora Buhnova. Frustrations steering women away from software
|
463 |
+
engineering. IEEE Software, 39(4):63–69, 2022.
|
464 |
+
[10] Lucia Happe, Barbora Buhnova, Anne Koziolek, and Ingo Wagner. Effective measures to
|
465 |
+
foster girls’ interest in secondary computer science education. Education and Information
|
466 |
+
Technologies, 26(3):2811–2829, 2021.
|
467 |
+
[11] Dame Vivian Hunt, Dennis Layton, and Sara Prince.
|
468 |
+
Why diversity matters, 2015.
|
469 |
+
McKinsey. Available online at URL https://www.mckinsey.com/capabilities/people-and-
|
470 |
+
organizational-performance/our-insights/why-diversity-matters.
|
471 |
+
[12] Rocio Lorenzo and Martin Reeves. How and where diversity drives financial performance.
|
472 |
+
Business Harward Review, 2018. Available online at URL https://hbr.org/2018/01/how-
|
473 |
+
and-where-diversity-drives-financial-performance.
|
474 |
+
[13] Minerva Informatics Equality Award. Best practices in supporting women, 2022. Available
|
475 |
+
online at URL https://www.informatics-europe.org/society/minerva-informatics-equality-
|
476 |
+
award/best-practices-in-supporting-women.html.
|
477 |
+
[14] Sarah K. White. 19 organizations advancing women in tech, 2022. Available online at
|
478 |
+
URL https://www.cio.com/article/215709/16-organizations-for-women-in-tech.html.
|
479 |
+
[15] Hannah Williams.
|
480 |
+
Best initiatives for women in tech, 2017.
|
481 |
+
Available online at URL
|
482 |
+
https://techmonitor.ai/technology/hardware/best-initiatives-women-tech.
|
483 |
+
Acknowledgement
|
484 |
+
This chapter was made possible thanks to the great dedication and support of the entire
|
485 |
+
Czechitas team. Besides, it has been supported by the COST Action CA19122 – European
|
486 |
+
Network for Gender Balance in Informatics (EUGAIN).
|
487 |
+
15
|
488 |
+
|
H9FLT4oBgHgl3EQfIi9F/content/tmp_files/load_file.txt
ADDED
@@ -0,0 +1,267 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf,len=266
|
2 |
+
page_content='Chapter 1 Beyond Classroom: Making a Difference in Diversity in Tech Barbora Buhnova With all the opportunities and risks that technology holds in connection to our safe and sus- tainable future, it is becoming increasingly important to involve a larger portion of our society in becoming active co-creators of our digitalized future—moving from the passenger seat to the driver seat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
3 |
+
page_content=' Yet, despite extensive efforts around the world, little progress has been made in growing the representation of certain communities and groups in software engineering.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
4 |
+
page_content=' This chapter shares one successful project, called Czechitas, triggering a major social change in Czechia, involving 1 000+ volunteers to support 50 000+ women on their way towards software engineering education and career.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
5 |
+
page_content=' arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
6 |
+
page_content='12000v1 [cs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
7 |
+
page_content='SE] 27 Jan 2023 CHAPTER 1 Introduction The past decade has witnessed the emergence of hundreds of initiatives around the world supporting various underrepresented groups on their pathway towards software engineering, whether connected to universities [13], companies [15], or run as independent non-profit or- ganizations [14].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
8 |
+
page_content=' Although the initiatives often start with a great vision and high volunteering commitment, after a few years into the activities, it becomes challenging to sustain the volun- teering energy and commitment in face of the very slow progress towards the better.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
9 |
+
page_content=' In those moments, the success cases by others can be what helps us keep going.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
10 |
+
page_content=' The initiative featured in this chapter, called Czechitas [6], started in 2014 in Czechia, with a simple idea to bring tech closer to girls and girls closer to tech, in reaction to the strong under-representation of women in tech in the country (see Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
11 |
+
page_content='1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
12 |
+
page_content=' The prompt snowball effect helped us to build a community around the joint vision to empower and encourage girls and women to engage in computing education and career transition, and to show them that software engineering is an interesting career direction that is not necessarily difficult nor limited to one gender.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
13 |
+
page_content=' Initially established to provide women in Czechia with an opportunity to put their hands on programming, it now contributes to a major social change in the country.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
14 |
+
page_content=' Over time, Czechitas has become a movement that has attracted a strong community of tech-professional volunteers (over 1 000) and companies (over 100), and given rise to a portfo- lio of women-tailored courses in various areas of software engineering, such as programming, Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
15 |
+
page_content='1: Women ICT Professional (Eurostat, 2019 data) [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
16 |
+
page_content=' 2 30% 25% 20% EU = 17.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
17 |
+
page_content='9% 15% 10% 5% 0%CHAPTER 1 web development, mobile app development, data science, cybersecurity or testing (over 1 300 courses delivered so far).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
18 |
+
page_content=' We have influenced over 50 000 women (over 30 000 via live events and over 20 000 via online tutorials) who graduated from our courses to use their new tech skills to change their education path or advance their careers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
19 |
+
page_content=' Czechitas Mission: We inspire, train and guide new talents towards stronger diversity and competitiveness in tech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
20 |
+
page_content=' Thanks to the success of our education activities with hundreds of events a year (each receiving more registrations than its capacity), we have become recognized as the leading platform in Czechia actively addressing gender diversity in tech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
21 |
+
page_content=' In this chapter, we share the lessons we learned about the low representation of women in tech, effective strategies in supporting women on their way to software engineering, discuss the ingredients that helped us succeed, the obstacles and challenges we faced, and the progress yet to be made.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
22 |
+
page_content=' Why are There so Few Women in Tech?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
23 |
+
page_content=' Across Europe, only 19.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
24 |
+
page_content='1% of tech professionals are women (according to 2021 data) [8], with Czechia being the last on the list.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
25 |
+
page_content=' The major reasons behind the trend in our region according to our recent study (with 70% of participants from Czechia and Germany) [9] are: 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
26 |
+
page_content=' Access.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
27 |
+
page_content=' The first hole in the leaky pipeline on girls’ pathway towards software engi- neering is linked to the missing access to encouragement and support, together with the missing access to suitable education that would be able to build on the interests of girls that often span across multiple disciplines.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
28 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
29 |
+
page_content=' Stereotypes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
30 |
+
page_content=' The ability to see herself as a software engineer is then challenged by the perception of the software engineering as a field not leading to a purpose the girl would like to dedicate her future to.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
31 |
+
page_content=' Often, the close family and friends step-in in this moment to direct girls away from software engineering with the intention to protect them from a future where they cannot really imagine the girls becoming successful.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
32 |
+
page_content=' Interestingly, 3 CHAPTER 1 the intentions are meant well, to protect the girls, which shows how crucial it is to help parents (and mainly mothers) to understand that software engineering can be a great career choice for their daughters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
33 |
+
page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
34 |
+
page_content=' Confidence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
35 |
+
page_content=' The next hole on the leaky pipeline comes when girls find themselves in the classroom, often surrounded by more-experienced learners (typically boys).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
36 |
+
page_content=' For the little girls who often excel in other subjects, it can be hard to fall in the category of a slow novice learner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
37 |
+
page_content=' The girls often mention frustrations of low self-efficacy, inadequacy and missing experience of success in presence of a classroom dynamic being monopolized by the earlier technology adopters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
38 |
+
page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
39 |
+
page_content=' Sense of Belonging.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
40 |
+
page_content=' The girls who resist through the earlier three challenges and find themselves on the education pathway towards software engineering, find themselves in classrooms surrounded predominantly by boys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
41 |
+
page_content=' While this is a comfortable environment for some, many in the study reported not feeling comfortable to express themselves, fac- ing sexism or unwanted attention and missing relatable role models and mentors, which led them to reconsider whether this is the environment they would be willing to spend the rest of their lives in.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
42 |
+
page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
43 |
+
page_content=' Feeling Valued.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
44 |
+
page_content=' The last hole in the leaky pipeline challenges the women who entered software engineering careers, as some of them emphasize the struggle of not feeling valued at workplace.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
45 |
+
page_content=' The reasons are different for the women with stereotypical talent spectrum (that matches the talent spectrum typical among their men colleagues, typically being very technical) and non-stereotypical talent spectrum (bringing not-that-common talents to the table, typically more multidisciplinary and human-oriented).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
46 |
+
page_content=' While the first group feels ”tired of proving them wrong”, the second group feel frustrated from their strengths viewed as second class and from missing appreciation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
47 |
+
page_content=' Supporting Women on their Way to Tech In Czechitas, we understand that plumbing the leaky pipeline can hardly be done by isolated and uncoordinated efforts.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
48 |
+
page_content=' This section discusses the interlinked pillars of our activities (see Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
49 |
+
page_content='2), listing examples of the activities and events we delivered in 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
50 |
+
page_content=' 4 CHAPTER 1 Czechitas Pillar I – Awareness One of the crucial success factors for a change towards improving gender balance in soft- ware engineering is the actual understanding that we are in a disbalanced state that further reinforces itself due to the factors discussed earlier.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
51 |
+
page_content=' The efforts towards encouraging women to join software engineering cannot make a difference unless the society, education system and corporate environment welcomes and supports the change (understanding it as a push towards the real equilibrium, not a push out of it).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
52 |
+
page_content=' In Czechitas, we are investing substantial effort in awareness around the topic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
53 |
+
page_content=' In 2022 alone, we participated in over 20 conferences and panel discussions, gave numerous inter- views in TV, radio and other media, organized talks to students and teachers at high schools, and to tech professionals in our partner companies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
54 |
+
page_content=' We were visible with a booth at 15 festivals and family days across Czechia.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
55 |
+
page_content=' Over 2022, Czechitas was mentioned in 508 articles, reach- ing major part of Czech population.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
56 |
+
page_content=' In 2021, we also launched a Czechitas podcast, which in 2022 reached over 14 676 listens.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
57 |
+
page_content=' Furthermore, our website was in 2022 visited by 123 785 unique visitors, and our newsletter was followed by 25 983 subscribers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
58 |
+
page_content=' The next step in raising awareness among the general public is to make it as easy as possible to get the first exposure to coding in a fun, enjoyable and community way.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
59 |
+
page_content=' To this end, we for instance organize an Advent Christmas Coding campaign (following the tradition of an advent calendar, in which instead of a sweet treat, each day holds a coding assignment along a story of bringing Mr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
60 |
+
page_content=' Gingerbread home for Christmas), which is being followed by hundreds of Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
61 |
+
page_content='2: The Pillars of Czechitas Activities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
62 |
+
page_content=' 5 CAREER AWARENESS TRAINING TRANSITION COMMUNITYCHAPTER 1 people.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
63 |
+
page_content=' Furthermore, in collaboration with the Ministry of Education, Youth and Sports, we e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
64 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
65 |
+
page_content=' co-organized the #DIGIEDUHACK hackathon.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
66 |
+
page_content=' And in collaboration with Czech universities, we run the Czechitas Thesis Award to give visibility to exceptional bachelor theses authored by girls.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
67 |
+
page_content=' All these activities typically repeat every year.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
68 |
+
page_content=' Czechitas Pillar II – Training Since the start of our activities in 2014,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
69 |
+
page_content=' we are improving the education design of our courses to reflect the needs of our audience—women and girls who are very often later technology adopters or career changers—with an emphasis on providing suitable first contact with soft- ware engineering,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
70 |
+
page_content=' creating safe and supportive environment for novice learners,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
71 |
+
page_content=' accommodat- ing differences in the learning speed of each student,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
72 |
+
page_content=' building self-confidence,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
73 |
+
page_content=' and supporting sustaining long-term interest,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
74 |
+
page_content=' which we also publish [2,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
75 |
+
page_content=' 10].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
76 |
+
page_content=' In 2022, we delivered 242 live software-engineering courses with 15 316 participants, with the courses around web develop- ment and data science scoring as the most popular ones.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
77 |
+
page_content=' Although most of the training is targeted to women and girls, we are also investing in training Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
78 |
+
page_content='3: Czechitas-participation (Data as of June 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
79 |
+
page_content=' 6 21,767 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
80 |
+
page_content='482+ 57.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
81 |
+
page_content='683+ 8,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
82 |
+
page_content='686 educational participants events 428 10 11,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
83 |
+
page_content='763 299 3,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
84 |
+
page_content='752 8,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
85 |
+
page_content='268 238 418 13,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
86 |
+
page_content='081 5,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
87 |
+
page_content='821 3,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
88 |
+
page_content='969 145 141 4,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
89 |
+
page_content='271 295 102 6 8,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
90 |
+
page_content='011 84 2,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
91 |
+
page_content='654 45 135 1,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
92 |
+
page_content='873 1,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
93 |
+
page_content='266 4,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
94 |
+
page_content='299 2015 2016 2017 2018 2019 2020 2021 2022* 2015 2016 2017 2018 2019 2020 2021 2022* Number of educational events Number of video tutorials Educational events participants Educational video tutorials participantsCHAPTER 1 elementary-school and high-school teachers (irrespective of gender).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
95 |
+
page_content=' And some mixed-gender activities were organized also for children (7 week-long summer camps in the summer of 2022, besides others) and high-school kids, although in case of high schools, it is already important to offer also girl-only courses (3 week-long summer schools for high-school girls were given in 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
96 |
+
page_content=' Besides, training courses for mixed audience are also provided on events such as Family Days (we were present at over 20 such events in 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
97 |
+
page_content=' Czechitas Pillar III – Career Transition As many women in our community intend to enter software engineering as their future profes- sion, some of our activities are intentionally designed to facilitate this journey, whether software engineering is to become their first job or they intend to change their career [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
98 |
+
page_content=' In cooperation with our partner companies, we have identified three career pathways that appear to be the most suitable entry points to software engineering in Czechia.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
99 |
+
page_content=' These are (1) web development (including courses on JavaScript, React, HTML/CSS, Bootstrap, Git, UX design, and others), (2) data analytics (including courses on Python, databases, SQL, statistics, Power BI, and others), (3) testing (including courses on requirements engineering, agile processes, manual testing, issue tracking, regression testing, smoke testing, basics of automated testing, browsers, API, databases, version control, and others).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
100 |
+
page_content=' For the three directions, we have developed a complex career-transition support within so- called Digital Academies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
101 |
+
page_content=' A Digital Academy is a four-month program for a group of 30 women (and involving around 5-15 partner companies), which besides individual courses covering the topics outlined above and taking place 3-4 times a week (evenings on working days, full days on weekends) includes also pairing of the students with mentors from the companies to support them in developing their own projects, a hackathon, career support, and further events offered by the partner companies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
102 |
+
page_content=' In 2022, we have run 10 Digital Academies across four major cities in Czechia, with over 60% of the graduates receiving a job offer within three months from graduating from the academy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
103 |
+
page_content=' To facilitate the career transition also for the women who opt to customize their training journey (not attending a Digital Academy), our career consultants provide hundreds of career consultations each year (327 in 2022), and we twice a year organize a Czechitas Job Fair, 7 CHAPTER 1 where our graduates can meet the representatives of our partner companies (each Job Fair attended by about 350 graduates and 30 companies).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
104 |
+
page_content=' Czechitas Foundation – Community The foundation that supports all our activities is the community, which involves the participants and graduates of our courses, tech professionals who teach with us, mentors, course facili- tators, and our partner companies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
105 |
+
page_content=' The fact that many members in our community are men helps us not only engage more tech-professional allies in our vision, but also influence a more supportive environment in tech companies where our graduates land.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
106 |
+
page_content=' To support the blending of the community and increasing the sense of belonging of our graduates also in the mixed- gender environment, we regularly engage in organization of Tech Meet-ups and Hackathons, as well as informal CzechiPubs that regularly take place in 10 different cities across Czechia.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
107 |
+
page_content=' Making a Difference The positive influence of Czechitas activities in Czechia is already visible in the shifted percep- tion of software engineering as an education pathway and career choice to be considered by any gender.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
108 |
+
page_content=' That not only motivates many girls to consider software engineering in their choice of a university study field (with the representation of women among ICT students changing from 12% in 2016 to 17% in 2021 in Czechia [7, 5], moving the country closer to the European av- erage, see Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
109 |
+
page_content='4) but is likely also having secondary influence on all who so far hesitated to join software engineering.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
110 |
+
page_content=' What Helped us Succeed Building Czechitas was only possible thanks to a coordinated effort of hundreds of people (90 employees and over 1,000 volunteers).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
111 |
+
page_content=' Over the past eight years of our existence, we came to understand the ingredients without which this would not be possible: Great leadership and love for what we do is giving us the sense of purpose, energy and direction, holding us together and keeping us focused.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
112 |
+
page_content=' Mentors from partner companies 8 CHAPTER 1 Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
113 |
+
page_content='4: Women ICT Students (Czech Statistical Office, 2021 data) [5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
114 |
+
page_content=' and beyond have been of great help to guide us through the design of our leadership and expansion strategy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
115 |
+
page_content=' Visual and playful communication is giving us the fresh flavour of fun and joy that we all (students as well as trainers and volunteers) enjoy joining even after a tiring day at school or work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
116 |
+
page_content=' The informal and visually attractive communication helps us to share the love for our brand.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
117 |
+
page_content=' Community and sense of belonging is crucial for connecting those who strive to learn with those who strive to share and teach, and those who want to support the connection.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
118 |
+
page_content=' It helps our student to feel home and make it easier for them to keep going even when learning gets hard.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
119 |
+
page_content=' Inclusive environment and encouragement makes it safe for our students to make mis- takes and experience success, have the opportunity to exchange knowledge, collaborate, and get personalized feedback and guidance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
120 |
+
page_content=' Specific strategies and interventions we have developed to support novice learners and their self-efficacy have been key in this direction [2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
121 |
+
page_content=' Knowledge and understanding is crucial for us to design our activities with insight into the frustrations steering women away from software engineering [9] and effective strate- gies to support girls and women in tech education [10] and career transition [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
122 |
+
page_content=' We 9 30% 25% EU = 20% 20% 15% 10% 5% 0%CHAPTER 1 invest our time in sharing the lessons we have learned [2, 9, 3], and learning from other initiatives from across the world (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
123 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
124 |
+
page_content=', within the EUGAIN network, see https://eugain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
125 |
+
page_content='eu/).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
126 |
+
page_content=' Creating and sharing stories helps us to inspire our students, bring them closer to relatable role models, and to give them hope and confidence that with some work and dedication, a transition into software engineering is possible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
127 |
+
page_content=' The stories (each featuring an inspiring woman who changed her career towards tech) are published in our blog, communicated via social networks, and used in media articles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
128 |
+
page_content=' These women inspire others as speakers and panelists in our events, and as guests in Czechitas Podcast.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
129 |
+
page_content=' Sustainable financial model helps us to sustain a team employed to run the organi- zation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
130 |
+
page_content=' The model stands on financial participation of the students, partner companies, foundations and individual donors, with an intention to reach out also to the government level in the future.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
131 |
+
page_content=' The most crucial pillar of our financial sustainability is the partner com- panies, which are beside their yearly partnership contributions (depending on the level of partnership) helping us to cover certain costs (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
132 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
133 |
+
page_content=', offering their office spaces for events, motivating their employees to volunteer as mentors), and opening doors towards further funding opportunities (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
134 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
135 |
+
page_content=' with global foundations connected to their company).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
136 |
+
page_content=' Obstacles and Challenges we Faced As any organization that has substantially outgrown its own plans and expectations, Czechitas has undergone numerous changes and readjustments over its course of existence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
137 |
+
page_content=' And al- though we are trying to publish the effective setup that works for us now [2, 3, 4], our first steps were highly organic and experimental, which was key to learning what works for the context we were in.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
138 |
+
page_content=' With our enthusiasm and ”always yes” spirit, we walked many paths that we failed and rolled back, but we also faced numerous obstacles and challenges that we withstood.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
139 |
+
page_content=' Scaling the organization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
140 |
+
page_content=' Turning a non-profit start-up into a scale-up is a challenge on its own, as the means for achieving stability are different from traditional companies – be- sides the discussed financial stability, also in terms of sustained volunteering involvement and brand building.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
141 |
+
page_content=' We needed to learn to manage the mix of the innovative and largely self-sacrificing founding community with the necessary systematic and organized spirit of 10 CHAPTER 1 new employees.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
142 |
+
page_content=' We needed to learn to prioritize and say no to some activities that the team felt strongly for.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
143 |
+
page_content=' Being misunderstood.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
144 |
+
page_content=' As a large organization, we needed to learn to communicate our mission well so that it is not misunderstood, knowing that anything that damages the brand may sink the whole boat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
145 |
+
page_content=' Namely, we needed to help our partner companies understand what level of expertise is realistic to achieve in our students, help our students understand what time investment and commitment it takes to change direction towards tech, and help our society understand why our focus on women is key to the success of our society as a whole.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
146 |
+
page_content=' Quantifying the impact of our activities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
147 |
+
page_content=' One of the important challenges that we are still facing is our ability to quantify the impact of our individual interventions and activities, as it is difficult to isolate the effects of each one of them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
148 |
+
page_content=' More so that the impact is often very subtle and propagates over long periods of time (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
149 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
150 |
+
page_content=', a woman making a few steps towards tech education inspiring her friend to make a major shift towards tech, who then inspires her daughter to study CS at university).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
151 |
+
page_content=' So although we have a Data & Impact team at Czechitas, with substantial data available, the numbers we have (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
152 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
153 |
+
page_content=', the number of women who change their career to tech each year) are still only the tip of the iceberg of the real impact we strive for, which is the shift in the collective mindset of the entire society, leading to a sustained change.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
154 |
+
page_content=' Progress yet to be Made With the increasing number of Czechitas graduates who are joining software engineering in- dustry, often as very junior (in terms of their software-engineering expertise) and diverse (in terms of their talents and competencies) members, we find it crucial to assist the companies to improve the inclusiveness of their environment to integrate and leverage the new diverse talent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
155 |
+
page_content=' In 2020, we made the first step towards that goal via designing a Diversity Awareness Training, which was since then delivered to over 300 managers (mostly from Central and East- ern Europe) across some of our partner companies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
156 |
+
page_content=' The concepts that have shown to be the most crucial to discuss and understand during these trainings are outlined below: 11 CHAPTER 1 Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
157 |
+
page_content='5: Tuckman’s Model of Team Dynamics with an illustration of different dynamics observed in homogeneous and heterogeneous teams.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
158 |
+
page_content=' Diversity does not come easy, but it pays off.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
159 |
+
page_content=' Avoiding diversity is natural to human in- dividuals, but dangerous to humankind1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
160 |
+
page_content=' The same is true for corporate environment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
161 |
+
page_content=' We need to acknowledge that diverse teams might have a harder time at start (as illustrated with the Tuckman’s Model of Team Dynamics in Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
162 |
+
page_content='5), but in long-term, diversity is firmly correlated with higher performance [11, 12].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
163 |
+
page_content=' We too often lose talented people by missing the talent in them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
164 |
+
page_content=' We are all talented, in many diverse ways.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
165 |
+
page_content=' It is the task of the manager to recognize and direct the talent to- wards team success.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
166 |
+
page_content=' The fact that a person uses a different talent spectrum (approaches problems and situations differently) does not make them more/less suitable for software engineering as such.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
167 |
+
page_content=' There is no such thing as a second-class citizen when it comes to the talents we need in software engineering.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
168 |
+
page_content=' Biases evolved to help us navigate complexity, but they are not serving us well when making assumptions about the potential in people.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
169 |
+
page_content=' The dark side of biases is that we tend to judge people’s potential based on how their talent spectrum matches the talent of already-successful ones.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
170 |
+
page_content=' Without realizing that the successful ones embody the skills and conditions that worked when they joined the field (in the past) while we are now choosing the software engineers for the future.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
171 |
+
page_content=' Connection is built through communication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
172 |
+
page_content=' There are many unhealthy communica- 1Our quote inspired by the statement ”Diversity is the new Darwinism” by the Great British Diversity Experiment [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
173 |
+
page_content=' 12 7 Forming Strorming Norming Performing Adjourning 个 Effectiveness Homogenous team Heterogenous team TimeCHAPTER 1 tion patterns around diversity, which often go against the purpose of making us all feel the sense of belonging.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
174 |
+
page_content=' It is important to create safe space, in which we can learn to communicate our differences but also ask about the differences of others.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
175 |
+
page_content=' Mistakes are part of that learning, and forgiveness of the mistakes shall be encouraged if the mistakes were done in the process of learning and not repeated blindly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
176 |
+
page_content=' It is important to create a safe space to acknowledge our biases and stop shaming one another for them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
177 |
+
page_content=' Avoid the quick fixes, remove the barriers instead.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
178 |
+
page_content=' Encourage curiosity about why cer- tain communities are under-represented in software engineering.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
179 |
+
page_content=' What are the barriers they face and what can we do to remove them or make their journey lighter in presence of the barriers (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
180 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
181 |
+
page_content=' the care-taking on the side of most women)?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
182 |
+
page_content=' Avoiding the conversation and looking away from the differences in our experiences might lead the community to as- sume that the under-representation is the lower-fit problem, which is dangerous because it leads to push-back on any diversity support one might try to introduce.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
183 |
+
page_content=' Change takes time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
184 |
+
page_content=' Promoting I&D is more complex than it might seem at first.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
185 |
+
page_content=' It is crucial to know how to start to see the first positive effects soon and be able to use them to get more people on board towards promoting I&D further.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
186 |
+
page_content=' Choose your first steps well and invest in them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
187 |
+
page_content=' The investment will pay off.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
188 |
+
page_content=' Conclusion Making a difference in improving gender balance in software engineering on the scale of the whole country is not easy, but is possible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
189 |
+
page_content=' And it is very rewarding to be part of such a move- ment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
190 |
+
page_content=' In 2021, the social impact of Czechitas activities was recognized at the European Union level via winning the EU Social Economy Award (over 180 organizations nominated) in the Digitalisation and Skills category, and in 2022 winning the global Equals in Tech Award (155 organizations nominated) in the Skills category.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
191 |
+
page_content=' We hope our example can inspire others, which is also why we are eager to share the lessons learned from our journey.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
192 |
+
page_content=' 13 Bibliography [1] Amanda Bennett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
193 |
+
page_content=' Case study: The great British diversity experiment, 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
194 |
+
page_content=' FairPlay Ltd.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
195 |
+
page_content=' [2] Barbora Buhnova and Lucia Happe.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
196 |
+
page_content=' Girl-friendly computer science classroom: Czechitas experience report.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
197 |
+
page_content=' In European Conference on Software Architecture, pages 125–137.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
198 |
+
page_content=' Springer, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
199 |
+
page_content=' [3] Barbora Buhnova, Lucie Jurystova, and Dita Prikrylova.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
200 |
+
page_content=' Assisting women in career change towards software engineering: experience from czechitas ngo.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
201 |
+
page_content=' In Proceedings of the 13th European Conference on Software Architecture-Volume 2, pages 88–93, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
202 |
+
page_content=' [4] Barbora Buhnova and Dita Prikrylova.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
203 |
+
page_content=' Women want to learn tech: Lessons from the czechitas education project.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
204 |
+
page_content=' In 2019 IEEE/ACM 2nd International Workshop on Gender Equality in Software Engineering (GE), pages 25–28.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
205 |
+
page_content=' IEEE, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
206 |
+
page_content=' [5] Czech Statistical Office.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
207 |
+
page_content=' Human resources in information technology, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
208 |
+
page_content=' Available on- line at URL https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
209 |
+
page_content='czso.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
210 |
+
page_content='cz/documents/10180/165376696/063015-21.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
211 |
+
page_content='pdf/c7e96151- b285-4388-9384-532e55f4a318?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
212 |
+
page_content='version=1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
213 |
+
page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
214 |
+
page_content=' [6] Czechitas.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
215 |
+
page_content=' Czechitas annual report 2021, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
216 |
+
page_content=' Available online at URL https://is.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
217 |
+
page_content='muni.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
218 |
+
page_content='cz/go/u6ji13.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
219 |
+
page_content=' [7] Eurostat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
220 |
+
page_content=' Female students under-represented in ICT, 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
221 |
+
page_content=' Available online at URL https://ec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
222 |
+
page_content='europa.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
223 |
+
page_content='eu/eurostat/web/products-eurostat-news/-/edn-20190425-1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
224 |
+
page_content=' [8] Eurostat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
225 |
+
page_content=' ICT specialists in employment, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
226 |
+
page_content=' Available online at URL https://ec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
227 |
+
page_content='europa.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
228 |
+
page_content='eu/eurostat/statistics-explained/index.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
229 |
+
page_content='php?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
230 |
+
page_content='title=ICT specialists in em- ployment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
231 |
+
page_content=' CHAPTER 1 [9] Lucia Happe and Barbora Buhnova.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
232 |
+
page_content=' Frustrations steering women away from software engineering.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
233 |
+
page_content=' IEEE Software, 39(4):63–69, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
234 |
+
page_content=' [10] Lucia Happe, Barbora Buhnova, Anne Koziolek, and Ingo Wagner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
235 |
+
page_content=' Effective measures to foster girls’ interest in secondary computer science education.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
236 |
+
page_content=' Education and Information Technologies, 26(3):2811–2829, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
237 |
+
page_content=' [11] Dame Vivian Hunt, Dennis Layton, and Sara Prince.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
238 |
+
page_content=' Why diversity matters, 2015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
239 |
+
page_content=' McKinsey.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
240 |
+
page_content=' Available online at URL https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
241 |
+
page_content='mckinsey.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
242 |
+
page_content='com/capabilities/people-and- organizational-performance/our-insights/why-diversity-matters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
243 |
+
page_content=' [12] Rocio Lorenzo and Martin Reeves.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
244 |
+
page_content=' How and where diversity drives financial performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
245 |
+
page_content=' Business Harward Review, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
246 |
+
page_content=' Available online at URL https://hbr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
247 |
+
page_content='org/2018/01/how- and-where-diversity-drives-financial-performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
248 |
+
page_content=' [13] Minerva Informatics Equality Award.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
249 |
+
page_content=' Best practices in supporting women, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
250 |
+
page_content=' Available online at URL https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
251 |
+
page_content='informatics-europe.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
252 |
+
page_content='org/society/minerva-informatics-equality- award/best-practices-in-supporting-women.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
253 |
+
page_content='html.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
254 |
+
page_content=' [14] Sarah K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
255 |
+
page_content=' White.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
256 |
+
page_content=' 19 organizations advancing women in tech, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
257 |
+
page_content=' Available online at URL https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
258 |
+
page_content='cio.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
259 |
+
page_content='com/article/215709/16-organizations-for-women-in-tech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
260 |
+
page_content='html.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
261 |
+
page_content=' [15] Hannah Williams.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
262 |
+
page_content=' Best initiatives for women in tech, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
263 |
+
page_content=' Available online at URL https://techmonitor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
264 |
+
page_content='ai/technology/hardware/best-initiatives-women-tech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
265 |
+
page_content=' Acknowledgement This chapter was made possible thanks to the great dedication and support of the entire Czechitas team.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
266 |
+
page_content=' Besides, it has been supported by the COST Action CA19122 – European Network for Gender Balance in Informatics (EUGAIN).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
267 |
+
page_content=' 15' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
|
HdE2T4oBgHgl3EQf_Alo/content/tmp_files/2301.04244v1.pdf.txt
ADDED
@@ -0,0 +1,470 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Elastic Cash
|
2 |
+
Anup Rao
|
3 |
+
University of Washington
|
4 | |
5 |
+
January 12, 2023
|
6 |
+
Abstract
|
7 |
+
Elastic Cash is a new decentralized mechanism for regulating the money supply. The mech-
|
8 |
+
anism operates by modifying the supply so that an interest rate determined by a public market
|
9 |
+
is kept approximately fixed. It can be incorporated into the conventional monetary system to
|
10 |
+
improve the elasticity of the US Dollar, and it can be used to design new elastic cryptocurrencies
|
11 |
+
that remain decentralized.
|
12 |
+
1
|
13 |
+
Introduction
|
14 |
+
Money is as old as recorded history, and yet it continues to evolve. Even the mighty US Dollar
|
15 |
+
has been repeatedly updated over the last 200 years. The recent emergence of Bitcoin and other
|
16 |
+
cryptocurrencies is another step in that evolution, and it prompts us to revisit the mechanisms
|
17 |
+
that ensure the desirable properties of money. An important property of money is its elasticity:
|
18 |
+
money is elastic if the money supply increases in response to demand. In this work, I present a
|
19 |
+
new decentralized mechanism to ensure the elasticity of money.
|
20 |
+
The US Dollar is elastic, but it uses a convoluted system to achieve its elasticity. The Dollar
|
21 |
+
system was not designed from first principles; it was iteratively amended in response to financial
|
22 |
+
crises. Elasticity is currently achieved by the combined actions of many institutions: banks and
|
23 |
+
non-banks, public and private, domestic and international. No single entity is entirely in charge
|
24 |
+
of the money supply, and a relatively small number of investor-owned institutions have undue
|
25 |
+
influence. I discuss the mechanics of the US Dollar system and its limitations in Section 2.
|
26 |
+
In contrast, Bitcoin was designed to be inelastic. Bitcoin caps the total possible supply at 21M,
|
27 |
+
and the available supply, currently about 19.2M, will slowly increase until it hits this limit. Satoshi
|
28 |
+
Nakamoto, the creator of Bitcoin, criticized conventional mechanisms for achieving elasticity in an
|
29 |
+
early forum post:
|
30 |
+
The root problem with conventional currency is all the trust that’s required to make
|
31 |
+
it work. The central bank must be trusted not to debase the currency, but the history
|
32 |
+
of fiat currencies is full of breaches of that trust. Banks must be trusted to hold our
|
33 |
+
money and transfer it electronically, but they lend it out in waves of credit bubbles with
|
34 |
+
barely a fraction in reserve.
|
35 |
+
Nakamoto eliminated the need for the kind of infrastructure used to ensure Dollar elasticity by
|
36 |
+
simply choosing to make Bitcoin inelastic. Additional technological innovations in Bitcoin further
|
37 |
+
eliminated the need for any trusted central authority to carry out transactions.
|
38 |
+
1
|
39 |
+
arXiv:2301.04244v1 [q-fin.GN] 10 Jan 2023
|
40 |
+
|
41 |
+
To illustrate the negative consequences of inelasticity, consider the trajectory of home prices
|
42 |
+
denominated in Bitcoin over a long period. As the population grows, the demand for houses is
|
43 |
+
sure to grow. Even if the supply of houses keeps pace, home prices must fall, because the supply of
|
44 |
+
Bitcoin cannot keep pace. Certainly, if the number of concurrent transactions involving home sales
|
45 |
+
grows and the prices of houses remain stable, the amount of Bitcoin involved in these transactions
|
46 |
+
would have to grow, yet it cannot grow beyond 21M. So, a fixed money supply leads to falling
|
47 |
+
prices in a growing economy, even if the underlying supply and demand of items keep pace with
|
48 |
+
each other.
|
49 |
+
At the other extreme, if the money supply is increased excessively, the currency is debased; the
|
50 |
+
excess supply leads to rising prices and inflation. So, a mechanism for correctly setting the money
|
51 |
+
supply is essential, because this is the foundation upon which stable prices are built. As much as
|
52 |
+
possible, prices should reflect the tension between the supply and demand for items, and nothing
|
53 |
+
else. But how much money is too much? It is not just a matter of trust, the problem is that the
|
54 |
+
appropriate supply is difficult for anyone to calculate! Is there a principled method to compute
|
55 |
+
the supply, and a fair way to create new money? This work gives my answers to these important
|
56 |
+
questions.
|
57 |
+
Ideally, a mechanism for achieving elasticity should be transparent.
|
58 |
+
It should not rely on
|
59 |
+
the judgment or integrity of small groups of people, or a few institutions. I will describe a new
|
60 |
+
decentralized mechanism called Elastic Cash that enjoys these features. Elastic Cash can replace
|
61 |
+
the role played by private institutions in providing elasticity for the US Dollar, and it can be
|
62 |
+
combined with the concept of blockchains to make new cryptocurrencies that are elastic, yet do
|
63 |
+
not require any trusted central authority.
|
64 |
+
Here I will give a high-level description of Elastic Cash; a full description is in Section 3. I will
|
65 |
+
refer to the central bank and the algorithm as cash authorities. At the heart of the mechanism is
|
66 |
+
a new financial contract issued by the cash authority called a cashbond, and a public market that
|
67 |
+
allows anyone to buy and sell cashbonds using public auctions in the market. Each cashbond can be
|
68 |
+
redeemed for $1 on a specific date, so it executes a risk-free loan from the holder of the cashbond to
|
69 |
+
the cash authority. The loans are risk-free because the cash authority can always create new money
|
70 |
+
to repay the loans. Perhaps it is counterintuitive, but the purpose of the market in cashbonds is
|
71 |
+
not to give the cash authority a way to borrow money; instead, the function of the market is to use
|
72 |
+
the trading activity of participants to compute the risk-free rate of interest, which can be computed
|
73 |
+
from the prices of cashbonds in the market. The mechanism requires that cashbonds can only be
|
74 |
+
transfered by selling and buying them in the market. For example, no entity should be permitted
|
75 |
+
to use cashbonds as collateral to borrow money. This forces participants to liquidate cashbonds
|
76 |
+
when they need money, and keeps the mechanism informed about the demands for money.
|
77 |
+
It is market participants that determine the money supply in Elastic Cash.
|
78 |
+
The supply is
|
79 |
+
increased or decreased according to transparent rules ensuring that the risk-free rate of interest
|
80 |
+
remains approximately fixed. Trade in cashbonds leads to fluctuations in the rate of interest, and
|
81 |
+
the mechanism responds by creating corresponding fluctuations in the money supply. Intuitively,
|
82 |
+
the risk-free rate of interest encodes the cost of renting money. By regulating the supply of money to
|
83 |
+
keep the cost fixed, the mechanism ensures that the supply stays in equilibrium with the demand for
|
84 |
+
liquidity. When the supply is increased, market participants acquire any newly-generated money.
|
85 |
+
The supply is decreased by incentivizing market participants to exchange their money for cashbonds.
|
86 |
+
Anyone can participate in this market, and money is distributed to or taken from participants
|
87 |
+
according to transparent rules, so no single entity can control the flow of money.
|
88 |
+
2
|
89 |
+
|
90 |
+
Source: Board of Governors of the Federal Reserve System (US)
|
91 |
+
fred.stlouisfed.org
|
92 |
+
Billions of Dollars
|
93 |
+
1960
|
94 |
+
1970
|
95 |
+
1980
|
96 |
+
1990
|
97 |
+
2000
|
98 |
+
2010
|
99 |
+
2020
|
100 |
+
0
|
101 |
+
4,000
|
102 |
+
8,000
|
103 |
+
12,000
|
104 |
+
16,000
|
105 |
+
20,000
|
106 |
+
24,000
|
107 |
+
M2
|
108 |
+
Figure 1: M2, a measure of the supply of US Dollars
|
109 |
+
Elastic Cash can be implemented within the framework of conventional currencies like the US
|
110 |
+
Dollar by creating regulations that require the central bank to implement the market for cashbonds
|
111 |
+
and generate money according to the rules of the mechanism.
|
112 |
+
It can be implemented in the
|
113 |
+
framework of cryptocurrencies by setting up a distributed algorithm to implement the market for
|
114 |
+
cashbonds using the blockchain. Money is generated by the algorithm according to the rules of the
|
115 |
+
mechanism. So, one can obtain the positive features of traditional currencies and cryptocurrencies
|
116 |
+
in addition to the elasticity of Elastic Cash.
|
117 |
+
Outline of this paper
|
118 |
+
In Section 2, I give more details about how the US Dollar achieves its
|
119 |
+
current elasticity, before turning to describe the new mechanism in Section 3. I discuss how the new
|
120 |
+
mechanism can be incorporated into the Dollar system in Section 4 and how it can be implemented
|
121 |
+
on the blockchain to give new cryptocurrencies in Section 7.
|
122 |
+
2
|
123 |
+
US Dollar elasticity: the Fed, banks, and shadow banks
|
124 |
+
Figure 1 shows how the supply of US Dollars held as deposits has changed over time. In this section
|
125 |
+
I briefly review the history and mechanics of the US Dollar system. I recommend the following
|
126 |
+
3
|
127 |
+
|
128 |
+
二Dexcellent sources for additional background on the history of the Dollar system [1, 4], and the book
|
129 |
+
[2] for a longer history of the technology of money.
|
130 |
+
The supply of US Dollars has consistently been deemed too important to be left entirely in
|
131 |
+
the control of a government agency. Instead, we have developed a system where money is created
|
132 |
+
by investor-owned private entities. These include banks and so-called shadow banks — non-bank
|
133 |
+
financial institutions that are able to create Dollars. This privately created money is then back-
|
134 |
+
stopped by the central bank, which is the Federal Reserve, or Fed in the US. The Fed is governed
|
135 |
+
by laws written by Congress, but these laws are somewhat ambiguous about the Fed’s powers, and
|
136 |
+
Congress has repeatedly made adjustments. The Fed has responded to various crises by incentiviz-
|
137 |
+
ing or directly making big changes to the money supply, and by sometimes deciding that a new
|
138 |
+
category of privately-issued financial instruments can be exchanged for US Dollars.
|
139 |
+
At this point, there are at least four kinds of financial institutions that are able to generate
|
140 |
+
financial instruments that are de facto US Dollars. It is helpful to view the evolution of the US
|
141 |
+
Dollar system according to the events that elevated these instruments to the stature of US Dollars:
|
142 |
+
Commercial bank deposits By the early 1900s, deposits of US Dollars were being issued by
|
143 |
+
a number of investor-owned private banks.
|
144 |
+
These deposits were treated by depositors as
|
145 |
+
equivalent to US Dollars, even though the banks were issuing loans by creating deposits that
|
146 |
+
did not correspond to cash reserves. This led to a run on the banks in 1907, and the Fed was
|
147 |
+
created in 1913 to solve the problem. The Fed was given the power to backstop the money
|
148 |
+
created by commercial banks by lending to the banks. This meant that deposits could always
|
149 |
+
be exchanged for money created by the Fed. This solved the problem of bank runs, but also
|
150 |
+
elevated bank deposits to the stature of cash issued by the Fed, and effectively meant that
|
151 |
+
commercial banks were given the authority to create legitimate US Dollars in the process of
|
152 |
+
issuing loans. Currently, about $17T is held in commercial bank deposits.
|
153 |
+
Reverse purchase agreements (repos) In the 1950s, broker dealers began to enter the banking
|
154 |
+
industry using a financial instrument called reverse purchase agreements, or repo. Repos allow
|
155 |
+
dealers to borrow money from cash providers using government securities as collateral. Cash
|
156 |
+
providers began to treat the repos they had purchased from dealers as equivalent to cash.
|
157 |
+
By itself, such an arrangement does not create any new money, because if repos crash in
|
158 |
+
value, then they cannot actually be exchanged for cash. However, the properties of repos
|
159 |
+
were substantially altered when the Fed decided to backstop dealers by giving them access to
|
160 |
+
overnight loans. This meant that the private holders of repos were guaranteed that repos could
|
161 |
+
always be exchanged for US Dollars via the Fed’s repo facility, and so repos were elevated to
|
162 |
+
the same stature as cash and bank deposits. In 1991, Congress reduced restrictions on the
|
163 |
+
Fed to make it even easier to backstop the repo market. Effectively, broker dealers were given
|
164 |
+
the power to create new US Dollars. Currently, the size of the repo market is about $4T.
|
165 |
+
Eurodollars Foreign companies including both banks and non-banks (e.g. insurance companies)
|
166 |
+
have been issuing financial instruments called eurodollars that can be redeemed for US Dollars.
|
167 |
+
These eurodollars were not initially backed by actual Dollars. The oil shock of 1973-1974 led
|
168 |
+
to problems in the eurodollar market that eventually brought down a domestic US bank. The
|
169 |
+
Fed responded by promising to backstop eurodollars by providing actual US Dollars in the
|
170 |
+
form of loans to the corresponding foreign central banks. Effectively, the Fed permitted the
|
171 |
+
banking systems of other countries to create deposits that could be exchanged for US Dollars.
|
172 |
+
The size of the eurodollar market was estimated at about $13T in 2016 [3].
|
173 |
+
4
|
174 |
+
|
175 |
+
Money market mutual funds These funds emerged in the 1970s as investments whose share
|
176 |
+
price was pegged at $1. In reality, these funds held assets whose value could drop below the
|
177 |
+
peg, and so it was not possible to guarantee the peg during a financial crisis. In response
|
178 |
+
to the great financial crisis of 2008, the Fed began to backstop these funds using its Money
|
179 |
+
Market Mutual Fund Liquidity Facility, and so elevated deposits in these funds to the stature
|
180 |
+
of US Dollars. Total assets in these funds is about $4.8T.
|
181 |
+
In addition to recognizing new forms of the US Dollar, the Fed has resorted to buying assets
|
182 |
+
in order to inject liquidity under the Quantitative Easing program. During the Great Financial
|
183 |
+
Crisis of 2008, the Fed kicked off this program by buying mortgage backed securities and treasuries,
|
184 |
+
which are loans to the US Treasury. Throughout the last decade, the Fed has continued to expand
|
185 |
+
its balance sheet, mostly with treasuries. In 2020 the Fed once again bought significant quantities
|
186 |
+
of these assets. Currently the Fed holds about $8.5T on its balance sheet.
|
187 |
+
The history of the US Dollar is full of ad hoc amendments to maintain stability in the face of
|
188 |
+
financial crises. At its heart, the problem is that there is currently no principled way to regulate
|
189 |
+
the supply of money. This becomes apparent during times of financial crises, but the imbalance in
|
190 |
+
supply is probably always brewing, even in normal times. By now, the pattern of Fed actions is
|
191 |
+
familiar, and it is inevitable that it will repeat. During times of crisis, the Fed must act to protect
|
192 |
+
money or face a significant crash in the entire system. Because private financial institutions know
|
193 |
+
that the Fed will protect their financial instruments from the most negative consequences of their
|
194 |
+
choices, they do not have the correct incentives.
|
195 |
+
Elastic Cash is meant to provide a clean, transparent, and principled mechanism to achieve
|
196 |
+
robust elasticity.
|
197 |
+
We do not need to cede control of the money supply to private institutions
|
198 |
+
or foreign banks. We do not need to elevate invented forms of money to the stature of the US
|
199 |
+
Dollar. Once Elastic Cash is adopted, I believe we can safely bar all private creation of Dollars.
|
200 |
+
The mechanism will generate new US Dollars when required, and financial institutions can obtain
|
201 |
+
liquidity by participating in the mechanism, just like everyone else.
|
202 |
+
Extricating ourselves from the current system and its vested interests is likely to be challenging,
|
203 |
+
to say the least. Nevertheless, I describe a path to incorporating the new mechanism in Section 4.
|
204 |
+
3
|
205 |
+
Elastic Cash: the details
|
206 |
+
Elastic Cash uses trade in cashbonds to determine a risk-free rate of interest. The money supply
|
207 |
+
is regulated to ensure that this interest rate remains approximately fixed. Cashbonds are issued
|
208 |
+
by the central bank (in the case of conventional currencies) or by the distributed algorithm (in the
|
209 |
+
case of cryptocurrencies). I refer to these entities as cash authorities.
|
210 |
+
The contract cashbond(d) promises that the cash authority will pay the holder of the contract $1
|
211 |
+
on the date d. Let us reserve d0 to denote the current date. On date d0, the cash authority pays each
|
212 |
+
holder of cashbond(d0) $1, and these contracts expire. Elastic Cash requires that the cash authority
|
213 |
+
implement a public market in cashbonds. On the date d0, contracts of the type cashbond(d) for
|
214 |
+
d > d0 will be available in the market for cashbonds maintained by the cash authority.
|
215 |
+
Cashbonds are a special class of asset, and they should not be treated like other securities.
|
216 |
+
Elastic Cash requires that cashbonds can be generated and traded only in the public market that
|
217 |
+
is administered by the cash authority. Cashbonds are not transferable, meaning they cannot be
|
218 |
+
exchanged outside of the public market, and they cannot be used as collateral for loans. Because of
|
219 |
+
5
|
220 |
+
|
221 |
+
these restrictions, cashbonds cannot themselves play the same role as money. The purpose of these
|
222 |
+
rules is to ensure that holders of cashbonds that desire liquidity will sell their cashbonds in the
|
223 |
+
market and so keep the mechanism informed about the demand for liquidity. For the same reasons,
|
224 |
+
trade in cashbonds should not be taxed. The transactions of buying and selling cashbonds should
|
225 |
+
be viewed as similar to transactions that move money between savings accounts paying varying
|
226 |
+
rates of interest, and treated similarly under the law.
|
227 |
+
3.1
|
228 |
+
Risk-free rate of interest
|
229 |
+
The price at which cashbonds trade implies interest rates for risk-free loans of varying durations.
|
230 |
+
Let rate(t) denote the interest rate for duration t. Let us write price(d) to denote the price at which
|
231 |
+
cashbond(d) last traded in the market. Then, if the current date is d0, the prices of cashbonds can
|
232 |
+
be used to compute implied interest rates according to the formula:
|
233 |
+
price(t + d0) · (1 + rate(t))t = 1,
|
234 |
+
which implies that the interest rate can be expressed as
|
235 |
+
rate(t) = price(t + d0)− 1
|
236 |
+
t − 1.
|
237 |
+
Because the loans executed by cashbonds are risk-free, the values rate(t) capture something about
|
238 |
+
the market’s belief about the opportunity cost of making risk-free loans for duration t. Generally,
|
239 |
+
one would expect rate(t) to be a monotone function of t, meaning that rate(t) > rate(t′) if t > t′,
|
240 |
+
because loans of longer duration usually command higher interest rates. Moreover, if t is much
|
241 |
+
larger than t′, then we might expect rate(t) to have higher variance than rate(t′), because predictions
|
242 |
+
about the distant future can diverge much more than predictions about the immediate future.
|
243 |
+
These rates encode important information about the demand for liquidity. The goal of the
|
244 |
+
mechanism is to regulate the money supply so that one of these rates is held approximately fixed.
|
245 |
+
It makes the most sense to pick a rate for a relatively short duration, because these rates are likely
|
246 |
+
to have the least variance. With that in mind, let τ denote a short time period, say 1 week. The
|
247 |
+
goal of the mechanism will be to keep
|
248 |
+
rate(τ) ≈ 0.02.
|
249 |
+
There is nothing special about 0.02, except that it is convention for central banks around the world
|
250 |
+
to use 2% as the target rate of longterm inflation.
|
251 |
+
Let us set
|
252 |
+
p− = (1 + 0.021)−τ,
|
253 |
+
and
|
254 |
+
p+ = (1 + 0.019)−τ.
|
255 |
+
The goal of the mechanism will be to regulate the money supply so that
|
256 |
+
p− ≤ price(τ + d0) ≤ p+,
|
257 |
+
where again d0 is the current date. This corresponds to keeping
|
258 |
+
0.019 ≤ rate(τ) ≤ 0.021.
|
259 |
+
6
|
260 |
+
|
261 |
+
3.2
|
262 |
+
Using the market to regulate the money supply
|
263 |
+
Participants in the cashbond market can put in orders to sell a specific number of cashbonds that
|
264 |
+
they hold at a specific price, and can also put in orders to buy a specific number of cashbond(d)
|
265 |
+
at a specific price. The cash authority acts as a market maker to match buy orders to sell orders
|
266 |
+
and so conduct transactions at a specific price between market participants. Ideally, the market
|
267 |
+
for cashbonds will support auctions1 for sellers to sell their cashbonds when needed.
|
268 |
+
The cash authority will itself participate in this public market by buying and selling cash bonds
|
269 |
+
in prescribed ways. The goal of the mechanism is to maintain rate(τ) approximately fixed, and to
|
270 |
+
keep the market in cashbonds sufficiently liquid, so that the money supply can be quickly adjusted
|
271 |
+
based on changes to rate(τ). Here is the proposed scheme for buying and selling cashbonds:
|
272 |
+
1. The cash authority will buy and sell cashbonds to keep rate(τ) ≈ 0.02. The cash authority
|
273 |
+
will place a standing order to buy an infinite number of contracts cashbond(τ + d0) at price
|
274 |
+
p−, and a separate standing order to sell an infinite number of cashbond(τ + d0) contracts at
|
275 |
+
price p+.
|
276 |
+
Because the cash authority is able to generate arbitrary amounts of both money and cash-
|
277 |
+
bonds, it will always be able to satisfy any of the resulting transactions. This ensures that
|
278 |
+
p− ≤ price(τ + d0) ≤ p+,
|
279 |
+
as discussed above.
|
280 |
+
2. When cashbonds are redeemed for money, the cash authority will need to sell new cashbonds
|
281 |
+
to restore the balance between money and cashbonds.
|
282 |
+
It makes sense to pick a particular target distribution on outstanding cashbonds that is
|
283 |
+
maintained during normal times. If the current date is d0, we say that cashbond(δ + d0) has
|
284 |
+
duration δ. For example, the cash authority might aim to maintain the invariant that at any
|
285 |
+
point in time, 1/4 of the outstanding cashbonds have duration between 0 and 1 month, 1/4
|
286 |
+
have duration between 1 month and 1 year, 1/4 have duration between 1 year and 4 years,
|
287 |
+
and 1/4 have duration between 4 years and 10 years.2.
|
288 |
+
Given such a target distribution, the redeemed cashbonds should be replaced by selling new
|
289 |
+
cashbonds at auction, picking the dates of the new cashbonds so that the overall distribution
|
290 |
+
on duration is maintained as much as possible.
|
291 |
+
3. When the demand for money is high, we are likely to reach the point where all of the available
|
292 |
+
bonds cashbond(τ + d0) have been purchased by the cash authority.
|
293 |
+
In such times, the
|
294 |
+
mechanism has run out of the means to inject money into the financial system at a fast enough
|
295 |
+
pace according to rule 1. This can be resolved by selling large quantities of cashbond(2τ +d0)
|
296 |
+
contracts at auction in the market. Market participants will be incentivized to buy these
|
297 |
+
cashbonds and then sell them back after time τ; at that time the cash authority itself will
|
298 |
+
be willing to buy the cashbonds at price p−. The net effect will be to inject money into the
|
299 |
+
system, while preserving the number of outstanding cashbonds.
|
300 |
+
1I will not commit to a specific style of auction here, though any implementation must carefully specifying how
|
301 |
+
the cash authority behaves as a market maker and what the rules of the auctions are.
|
302 |
+
2There are many considerations for how to choose the target distribution, but here I will not dwell on the choices
|
303 |
+
too much.
|
304 |
+
7
|
305 |
+
|
306 |
+
The number of cashbonds sold in this process is a design choice. The goal should be inject
|
307 |
+
significant liquidity, so I would favor an exponentially escalating volume of sales. For exam-
|
308 |
+
ple, the cash authority might first sell a quantity that corresponds to 1% of all outstanding
|
309 |
+
cashbonds, and a week later escalate it to 2%, then 4%, and so on until the cashbond market
|
310 |
+
returns to the state where market participants are no longer willing to sell back the cash-
|
311 |
+
bonds of duration τ to the cash authority at p−. These actions may temporarily distort the
|
312 |
+
distribution on the durations of outstanding cashbonds, but the distribution will be quickly
|
313 |
+
restored when the new cashbonds are redeemed and rule 2 is applied.
|
314 |
+
An actual implementation of Elastic Cash would need to resolve many smaller technical details.
|
315 |
+
Let me now make a few comments and observations about the Elastic Cash mechanism as I have
|
316 |
+
defined it.
|
317 |
+
3.3
|
318 |
+
Discussion
|
319 |
+
Elastic Cash is quite different from a system where the central bank simply allows deposits for
|
320 |
+
all with interest rate 2%—such a scheme does not give the central bank a method to inject large
|
321 |
+
amounts of money when the liquidity is needed. History has shown that the Fed needs a tool like
|
322 |
+
Elastic Cash to inject liquidity into the financial system, since interest rates have proven too weak
|
323 |
+
as a tool to inject large quantities of liquidity. As we discussed in Section 2, this has led to the
|
324 |
+
Fed buying assets or propping up assets that were liable to crash in value. In doing so, the Fed
|
325 |
+
is forced to pick and choose between market participants that get first access to the new liquidity
|
326 |
+
that it provides.
|
327 |
+
Central bankers should not be attempting to directly reason about the demands for liquidity;
|
328 |
+
they do not have enough data to make those decisions. But if they must take such dramatic actions,
|
329 |
+
the scheme of Elastic Cash at the very least gives a fair way to do it by trading cashbonds along
|
330 |
+
the lines I have suggested above. This removes the ability of the finance sector to control the flow
|
331 |
+
of the new money. It is also preferable to having the Fed buy treasuries, because it disentangles the
|
332 |
+
actions of the Fed from the needs of the Treasury. There is no need to tie increases in the money
|
333 |
+
supply to increases in government spending.
|
334 |
+
Cashbonds should not be confused with conventional government securities like US treasuries.
|
335 |
+
These instruments are significantly different from each other, and one cannot make inferences about
|
336 |
+
the cashbond market, which does not yet exist, based on the behavior of the US treasury market. Let
|
337 |
+
me highlight some key differences. The issuance of cashbonds is controlled by strict and transparent
|
338 |
+
rules, and is not tied to the spending of the US government. There is no analogue of debt ceilings,
|
339 |
+
or any chance that the central bank will default. Cashbonds cannot be used as collateral for loans,
|
340 |
+
cannot be transferred outside of the Elastic Cash market, and trade in cashbonds is not taxed.
|
341 |
+
It is important for the functioning of Elastic Cash to maintain a large volume of outstanding
|
342 |
+
cashbonds of varying durations. Ideally, we would like there to be broad participation in the cash-
|
343 |
+
bond market from all kinds of financial entities: banks, companies, pension funds, and individuals.
|
344 |
+
Because these participants will be willing to trade at different durations, participation will be in-
|
345 |
+
creased if a wide range of durations are available, and the market is liquid at all durations. Even
|
346 |
+
though the cash authority only regulates the interest rate for duration τ, this action will affect the
|
347 |
+
rates for all durations. One would expect that banks and other sophisticated players will trade
|
348 |
+
cashbonds of shorter duration, and perform the arbitrage necessary for information about demands
|
349 |
+
for liquidity of all durations to propagate to the shorter durations. I suspect that there is a prin-
|
350 |
+
8
|
351 |
+
|
352 |
+
cipled way to choose the ideal distribution on durations of outstanding cashbonds, but I have not
|
353 |
+
yet been able to convince myself about what it ought to be.
|
354 |
+
4
|
355 |
+
Adopting Elastic Cash in the US Dollar system
|
356 |
+
As discussed in Section 2, the Dollar system involves many different kinds of institutions that are
|
357 |
+
currently creating instruments that can be exchanged for US Dollars. Changing the system is not
|
358 |
+
going to be straightforward.
|
359 |
+
However, I do believe that there is a path to making the change
|
360 |
+
somewhat gradually, so that all the parties involved have time to adapt to the new system. Here
|
361 |
+
is a proposed sequence of steps to adopting Elastic Cash for the US Dollar:
|
362 |
+
1. The Fed begins to populate the cashbond market by gradually selling cashbonds of varying
|
363 |
+
duration. Cashbonds are held at accounts maintained by the Fed, which allows the Fed to
|
364 |
+
enforce that cashbonds cannot be transferred outside the cashbond market. At this point,
|
365 |
+
cashbonds that expire are replaced according to the rules of Elastic Cash, but the risk-free
|
366 |
+
rate of interest is allowed to float freely. I would expect this floating rate to converge close to
|
367 |
+
the current Fed funds rate.
|
368 |
+
2. Once the market for cashbonds is running at significant scale, regulations should be enacted to
|
369 |
+
curtail the private creation of US Dollars. This can be done gradually by raising the interest
|
370 |
+
rate at which the Fed lends to private entities through its discount window. At the same
|
371 |
+
time, the Fed should begin to put bounds on the risk-free rate determined by cashbond, by
|
372 |
+
trading in the cashbond market. Eventually, we should end up with a high rate for borrowing
|
373 |
+
from the Fed via the discount window, while the risk-free rate in the cashbond market should
|
374 |
+
be close to 2%. This will incentivize private entities to participate in the cashbond market
|
375 |
+
and raise money there. The current creators of US Dollars can be handled as follows:
|
376 |
+
(a) Commercial banks should be barred from creating new deposits that are not backed
|
377 |
+
by cash reserves. Banks should fund new lending activity by selling corporate bonds
|
378 |
+
instead.
|
379 |
+
(b) The Fed’s repo facility and money market fund facility should be closed.
|
380 |
+
(c) The eurodollar market is, perhaps, a bigger problem, both because of its size and the fact
|
381 |
+
that the institutions cannot be regulated by US law. Still, the Fed can wind down its
|
382 |
+
swap lines with foreign central banks gradually, until eurodollars lose their Fed backing.
|
383 |
+
Foreign central banks and governments should be allowed and encouraged to participate
|
384 |
+
in the cashbond market to obtain liquidity.
|
385 |
+
3. The inevitable tantrums in the financial sector should be treated with stoicism.
|
386 |
+
It is an understatement that moving from our current system of private money creation to
|
387 |
+
Elastic Cash would be a dramatic change. There are likely to be many challenges that need to
|
388 |
+
be overcome to implement it, not least the resistance of the finance industry, whose raison d’ˆetre
|
389 |
+
is to control the flow of money. Elastic Cash represents a significant loss of control for financial
|
390 |
+
firms, and a democratization of the flow of money. For these reasons, it is perhaps more easily
|
391 |
+
implemented in a cryptocurrency, as I discuss next.
|
392 |
+
9
|
393 |
+
|
394 |
+
5
|
395 |
+
Elastic Cash in cryptocurrencies
|
396 |
+
A major advantage of Elastic Cash over conventional mechanisms for elasticity is that it can be
|
397 |
+
implemented in a truly decentralized way, without any trusted central authority. Bitcoin made
|
398 |
+
a technological leap when it introduced the concept of a blockchain.
|
399 |
+
Since then, a number of
|
400 |
+
cryptocurrencies have emerged, with different ways to implement the blockchain. Any of these
|
401 |
+
systems can be used to implement Elastic Cash, so here I will keep the discussion at a high level, only
|
402 |
+
talking about how the blockchain can be utilized. Because Elastic Cash involves making significant
|
403 |
+
changes to the money supply, I do believe that implementing it requires new cryptocurrencies. I
|
404 |
+
do not think it can be implemented using a layer built on top of Bitcoin, for example.
|
405 |
+
Here is how one can implement Elastic Cash on a blockchain at a high level:
|
406 |
+
1. At any point in time, each user of the cryptocurrency is known to hold some amount of money,
|
407 |
+
as well as various cashbonds.
|
408 |
+
2. Users of the currency can announce transactions of money, as well as orders placed in the
|
409 |
+
cashbond market. The orders can be placed with a specific expiry date.
|
410 |
+
3. Miners will add both money transactions and orders in the cashbond market to the next block
|
411 |
+
of the blockchain. To implement the market in cashbonds:
|
412 |
+
(a) Miners will act as market makers to map buy orders to sell orders and so execute the
|
413 |
+
trade in cashbonds. There are some subtle issues that need to be addressed here. For
|
414 |
+
example, a miner may be incentivized to pick some orders over others to include on
|
415 |
+
the blockchain, and choose to ignore some orders when acting as a market maker. In
|
416 |
+
particular, miners should themselves be paid the spread between buy and sell orders as
|
417 |
+
a transaction fee to carry out their market making function. This removes the incentives
|
418 |
+
to manipulate the orders that are added to the most recent block.
|
419 |
+
(b) Miners will also execute the algorithm to simulate the activities of the cash authority in
|
420 |
+
the cashbond market. New money and cashbonds will be created according to the rules
|
421 |
+
of the mechanism, and these will be traded with users based on the orders that have
|
422 |
+
been added to the blockchain.
|
423 |
+
6
|
424 |
+
Conclusions and Questions
|
425 |
+
It is an exciting time to think about the technology of money. The US Dollar is experiencing a
|
426 |
+
once-in-a-lifetime contraction (see Figure 1), and the demands for a stable global currency have
|
427 |
+
never been larger. Elastic Cash is a broad scheme to enable elastic money. I have purposefully
|
428 |
+
left the mechanism underspecified, because I believe that more work is required to understand the
|
429 |
+
details and trade-offs involved in the particulars of the mechanism.
|
430 |
+
Here are some important questions that I feel remain unanswered:
|
431 |
+
1. How should the market maker behave in the cashbond market? In the context of conventional
|
432 |
+
currencies, can private entities function as market makers? In the context of cryptocurrencies,
|
433 |
+
how should the algorithm be set up so that miners do not have an incentive to behave
|
434 |
+
dishonestly when they are carrying out the role of market maker?
|
435 |
+
10
|
436 |
+
|
437 |
+
2. What style of auction would give the best results for the cashbond market?
|
438 |
+
3. What is the ideal target distribution on cashbonds? If the cashbonds are concentrated on
|
439 |
+
very short durations, this gives the most power for the mechanism to inject large quantities
|
440 |
+
of money, but it also means that the market loses information about the demand for liquidity
|
441 |
+
over long durations.
|
442 |
+
So, there is a trade-off between various choices for distributions on
|
443 |
+
durations.
|
444 |
+
4. How can we gradually transition the current US Dollar system to such a mechanism? The
|
445 |
+
steps I discussed in Section 4 are likely to be difficult to execute. Perhaps there is a way
|
446 |
+
to use cashbonds and incentivize the large players in the financial system to adopt Elastic
|
447 |
+
Cash without being forced to do it. What is needed is a mechanism to transition to the new
|
448 |
+
mechanism!
|
449 |
+
5. How should we expect the free floating rate curve rate(t) to behave as a function of t during
|
450 |
+
normal times? I would expect this function to be monotone, but I am not sure how to reason
|
451 |
+
about it beyond that.
|
452 |
+
7
|
453 |
+
Acknowledgements
|
454 |
+
Thanks to Paul Beame, Siddharth Iyer, Travis Kriplean, James Lee, Noam Nisan, Darcy Rao,
|
455 |
+
Eli Ben-Sasson, Oscar Sprumont, Michael Whitmeyer and Amir Yehudayoff for many helpful and
|
456 |
+
entertaining conversations about money.
|
457 |
+
References
|
458 |
+
[1] Fed history overview. https://www.federalreservehistory.org/time-period.
|
459 |
+
[2] Christine Desan.
|
460 |
+
Making Money: Coin, Currency, and the Coming of Capitalism.
|
461 |
+
Oxford
|
462 |
+
University Press, 2014.
|
463 |
+
[3] Neels Heyneke and Mehul Daya.
|
464 |
+
The rise and fall of the eurodollar system.
|
465 |
+
https:
|
466 |
+
//www.nedbank.co.za/content/dam/nedbank-crp/reports/Strategy/NeelsAndMehul/
|
467 |
+
2016/September/TheRiseAndFallOfTheEurodollarSystem_160907.pdf, 2016.
|
468 |
+
[4] Lev Menand. The Fed-Unbound: Central Banking in a Time of Crisis. 2022.
|
469 |
+
11
|
470 |
+
|
HdE2T4oBgHgl3EQf_Alo/content/tmp_files/load_file.txt
ADDED
@@ -0,0 +1,312 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf,len=311
|
2 |
+
page_content='Elastic Cash Anup Rao University of Washington anuprao@cs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
3 |
+
page_content='washington.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
4 |
+
page_content='edu January 12, 2023 Abstract Elastic Cash is a new decentralized mechanism for regulating the money supply.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
5 |
+
page_content=' The mech- anism operates by modifying the supply so that an interest rate determined by a public market is kept approximately fixed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
6 |
+
page_content=' It can be incorporated into the conventional monetary system to improve the elasticity of the US Dollar, and it can be used to design new elastic cryptocurrencies that remain decentralized.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
7 |
+
page_content=' 1 Introduction Money is as old as recorded history, and yet it continues to evolve.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
8 |
+
page_content=' Even the mighty US Dollar has been repeatedly updated over the last 200 years.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
9 |
+
page_content=' The recent emergence of Bitcoin and other cryptocurrencies is another step in that evolution, and it prompts us to revisit the mechanisms that ensure the desirable properties of money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
10 |
+
page_content=' An important property of money is its elasticity: money is elastic if the money supply increases in response to demand.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
11 |
+
page_content=' In this work, I present a new decentralized mechanism to ensure the elasticity of money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
12 |
+
page_content=' The US Dollar is elastic, but it uses a convoluted system to achieve its elasticity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
13 |
+
page_content=' The Dollar system was not designed from first principles;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
14 |
+
page_content=' it was iteratively amended in response to financial crises.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
15 |
+
page_content=' Elasticity is currently achieved by the combined actions of many institutions: banks and non-banks, public and private, domestic and international.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
16 |
+
page_content=' No single entity is entirely in charge of the money supply, and a relatively small number of investor-owned institutions have undue influence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
17 |
+
page_content=' I discuss the mechanics of the US Dollar system and its limitations in Section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
18 |
+
page_content=' In contrast, Bitcoin was designed to be inelastic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
19 |
+
page_content=' Bitcoin caps the total possible supply at 21M, and the available supply, currently about 19.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
20 |
+
page_content='2M, will slowly increase until it hits this limit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
21 |
+
page_content=' Satoshi Nakamoto, the creator of Bitcoin, criticized conventional mechanisms for achieving elasticity in an early forum post: The root problem with conventional currency is all the trust that’s required to make it work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
22 |
+
page_content=' The central bank must be trusted not to debase the currency, but the history of fiat currencies is full of breaches of that trust.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
23 |
+
page_content=' Banks must be trusted to hold our money and transfer it electronically, but they lend it out in waves of credit bubbles with barely a fraction in reserve.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
24 |
+
page_content=' Nakamoto eliminated the need for the kind of infrastructure used to ensure Dollar elasticity by simply choosing to make Bitcoin inelastic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
25 |
+
page_content=' Additional technological innovations in Bitcoin further eliminated the need for any trusted central authority to carry out transactions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
26 |
+
page_content=' 1 arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
27 |
+
page_content='04244v1 [q-fin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
28 |
+
page_content='GN] 10 Jan 2023 To illustrate the negative consequences of inelasticity, consider the trajectory of home prices denominated in Bitcoin over a long period.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
29 |
+
page_content=' As the population grows, the demand for houses is sure to grow.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
30 |
+
page_content=' Even if the supply of houses keeps pace, home prices must fall, because the supply of Bitcoin cannot keep pace.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
31 |
+
page_content=' Certainly, if the number of concurrent transactions involving home sales grows and the prices of houses remain stable, the amount of Bitcoin involved in these transactions would have to grow, yet it cannot grow beyond 21M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
32 |
+
page_content=' So, a fixed money supply leads to falling prices in a growing economy, even if the underlying supply and demand of items keep pace with each other.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
33 |
+
page_content=' At the other extreme, if the money supply is increased excessively, the currency is debased;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
34 |
+
page_content=' the excess supply leads to rising prices and inflation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
35 |
+
page_content=' So, a mechanism for correctly setting the money supply is essential, because this is the foundation upon which stable prices are built.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
36 |
+
page_content=' As much as possible, prices should reflect the tension between the supply and demand for items, and nothing else.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
37 |
+
page_content=' But how much money is too much?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
38 |
+
page_content=' It is not just a matter of trust, the problem is that the appropriate supply is difficult for anyone to calculate!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
39 |
+
page_content=' Is there a principled method to compute the supply, and a fair way to create new money?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
40 |
+
page_content=' This work gives my answers to these important questions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
41 |
+
page_content=' Ideally, a mechanism for achieving elasticity should be transparent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
42 |
+
page_content=' It should not rely on the judgment or integrity of small groups of people, or a few institutions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
43 |
+
page_content=' I will describe a new decentralized mechanism called Elastic Cash that enjoys these features.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
44 |
+
page_content=' Elastic Cash can replace the role played by private institutions in providing elasticity for the US Dollar, and it can be combined with the concept of blockchains to make new cryptocurrencies that are elastic, yet do not require any trusted central authority.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
45 |
+
page_content=' Here I will give a high-level description of Elastic Cash;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
46 |
+
page_content=' a full description is in Section 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
47 |
+
page_content=' I will refer to the central bank and the algorithm as cash authorities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
48 |
+
page_content=' At the heart of the mechanism is a new financial contract issued by the cash authority called a cashbond, and a public market that allows anyone to buy and sell cashbonds using public auctions in the market.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
49 |
+
page_content=' Each cashbond can be redeemed for $1 on a specific date, so it executes a risk-free loan from the holder of the cashbond to the cash authority.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
50 |
+
page_content=' The loans are risk-free because the cash authority can always create new money to repay the loans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
51 |
+
page_content=' Perhaps it is counterintuitive, but the purpose of the market in cashbonds is not to give the cash authority a way to borrow money;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
52 |
+
page_content=' instead, the function of the market is to use the trading activity of participants to compute the risk-free rate of interest, which can be computed from the prices of cashbonds in the market.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
53 |
+
page_content=' The mechanism requires that cashbonds can only be transfered by selling and buying them in the market.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
54 |
+
page_content=' For example, no entity should be permitted to use cashbonds as collateral to borrow money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
55 |
+
page_content=' This forces participants to liquidate cashbonds when they need money, and keeps the mechanism informed about the demands for money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
56 |
+
page_content=' It is market participants that determine the money supply in Elastic Cash.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
57 |
+
page_content=' The supply is increased or decreased according to transparent rules ensuring that the risk-free rate of interest remains approximately fixed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
58 |
+
page_content=' Trade in cashbonds leads to fluctuations in the rate of interest, and the mechanism responds by creating corresponding fluctuations in the money supply.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
59 |
+
page_content=' Intuitively, the risk-free rate of interest encodes the cost of renting money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
60 |
+
page_content=' By regulating the supply of money to keep the cost fixed, the mechanism ensures that the supply stays in equilibrium with the demand for liquidity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
61 |
+
page_content=' When the supply is increased, market participants acquire any newly-generated money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
62 |
+
page_content=' The supply is decreased by incentivizing market participants to exchange their money for cashbonds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
63 |
+
page_content=' Anyone can participate in this market, and money is distributed to or taken from participants according to transparent rules, so no single entity can control the flow of money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
64 |
+
page_content=' 2 Source: Board of Governors of the Federal Reserve System (US) fred.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
65 |
+
page_content='stlouisfed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
66 |
+
page_content='org Billions of Dollars 1960 1970 1980 1990 2000 2010 2020 0 4,000 8,000 12,000 16,000 20,000 24,000 M2 Figure 1: M2, a measure of the supply of US Dollars Elastic Cash can be implemented within the framework of conventional currencies like the US Dollar by creating regulations that require the central bank to implement the market for cashbonds and generate money according to the rules of the mechanism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
67 |
+
page_content=' It can be implemented in the framework of cryptocurrencies by setting up a distributed algorithm to implement the market for cashbonds using the blockchain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
68 |
+
page_content=' Money is generated by the algorithm according to the rules of the mechanism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
69 |
+
page_content=' So, one can obtain the positive features of traditional currencies and cryptocurrencies in addition to the elasticity of Elastic Cash.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
70 |
+
page_content=' Outline of this paper In Section 2, I give more details about how the US Dollar achieves its current elasticity, before turning to describe the new mechanism in Section 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
71 |
+
page_content=' I discuss how the new mechanism can be incorporated into the Dollar system in Section 4 and how it can be implemented on the blockchain to give new cryptocurrencies in Section 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
72 |
+
page_content=' 2 US Dollar elasticity: the Fed, banks, and shadow banks Figure 1 shows how the supply of US Dollars held as deposits has changed over time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
73 |
+
page_content=' In this section I briefly review the history and mechanics of the US Dollar system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
74 |
+
page_content=' I recommend the following 3 二Dexcellent sources for additional background on the history of the Dollar system [1, 4], and the book [2] for a longer history of the technology of money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
75 |
+
page_content=' The supply of US Dollars has consistently been deemed too important to be left entirely in the control of a government agency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
76 |
+
page_content=' Instead, we have developed a system where money is created by investor-owned private entities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
77 |
+
page_content=' These include banks and so-called shadow banks — non-bank financial institutions that are able to create Dollars.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
78 |
+
page_content=' This privately created money is then back- stopped by the central bank, which is the Federal Reserve, or Fed in the US.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
79 |
+
page_content=' The Fed is governed by laws written by Congress, but these laws are somewhat ambiguous about the Fed’s powers, and Congress has repeatedly made adjustments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
80 |
+
page_content=' The Fed has responded to various crises by incentiviz- ing or directly making big changes to the money supply, and by sometimes deciding that a new category of privately-issued financial instruments can be exchanged for US Dollars.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
81 |
+
page_content=' At this point, there are at least four kinds of financial institutions that are able to generate financial instruments that are de facto US Dollars.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
82 |
+
page_content=' It is helpful to view the evolution of the US Dollar system according to the events that elevated these instruments to the stature of US Dollars: Commercial bank deposits By the early 1900s, deposits of US Dollars were being issued by a number of investor-owned private banks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
83 |
+
page_content=' These deposits were treated by depositors as equivalent to US Dollars, even though the banks were issuing loans by creating deposits that did not correspond to cash reserves.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
84 |
+
page_content=' This led to a run on the banks in 1907, and the Fed was created in 1913 to solve the problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
85 |
+
page_content=' The Fed was given the power to backstop the money created by commercial banks by lending to the banks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
86 |
+
page_content=' This meant that deposits could always be exchanged for money created by the Fed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
87 |
+
page_content=' This solved the problem of bank runs, but also elevated bank deposits to the stature of cash issued by the Fed, and effectively meant that commercial banks were given the authority to create legitimate US Dollars in the process of issuing loans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
88 |
+
page_content=' Currently, about $17T is held in commercial bank deposits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
89 |
+
page_content=' Reverse purchase agreements (repos) In the 1950s, broker dealers began to enter the banking industry using a financial instrument called reverse purchase agreements, or repo.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
90 |
+
page_content=' Repos allow dealers to borrow money from cash providers using government securities as collateral.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
91 |
+
page_content=' Cash providers began to treat the repos they had purchased from dealers as equivalent to cash.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
92 |
+
page_content=' By itself, such an arrangement does not create any new money, because if repos crash in value, then they cannot actually be exchanged for cash.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
93 |
+
page_content=' However, the properties of repos were substantially altered when the Fed decided to backstop dealers by giving them access to overnight loans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
94 |
+
page_content=' This meant that the private holders of repos were guaranteed that repos could always be exchanged for US Dollars via the Fed’s repo facility, and so repos were elevated to the same stature as cash and bank deposits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
95 |
+
page_content=' In 1991, Congress reduced restrictions on the Fed to make it even easier to backstop the repo market.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
96 |
+
page_content=' Effectively, broker dealers were given the power to create new US Dollars.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
97 |
+
page_content=' Currently, the size of the repo market is about $4T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
98 |
+
page_content=' Eurodollars Foreign companies including both banks and non-banks (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
99 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
100 |
+
page_content=' insurance companies) have been issuing financial instruments called eurodollars that can be redeemed for US Dollars.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
101 |
+
page_content=' These eurodollars were not initially backed by actual Dollars.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
102 |
+
page_content=' The oil shock of 1973-1974 led to problems in the eurodollar market that eventually brought down a domestic US bank.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
103 |
+
page_content=' The Fed responded by promising to backstop eurodollars by providing actual US Dollars in the form of loans to the corresponding foreign central banks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
104 |
+
page_content=' Effectively, the Fed permitted the banking systems of other countries to create deposits that could be exchanged for US Dollars.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
105 |
+
page_content=' The size of the eurodollar market was estimated at about $13T in 2016 [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
106 |
+
page_content=' 4 Money market mutual funds These funds emerged in the 1970s as investments whose share price was pegged at $1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
107 |
+
page_content=' In reality, these funds held assets whose value could drop below the peg, and so it was not possible to guarantee the peg during a financial crisis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
108 |
+
page_content=' In response to the great financial crisis of 2008, the Fed began to backstop these funds using its Money Market Mutual Fund Liquidity Facility, and so elevated deposits in these funds to the stature of US Dollars.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
109 |
+
page_content=' Total assets in these funds is about $4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
110 |
+
page_content='8T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
111 |
+
page_content=' In addition to recognizing new forms of the US Dollar, the Fed has resorted to buying assets in order to inject liquidity under the Quantitative Easing program.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
112 |
+
page_content=' During the Great Financial Crisis of 2008, the Fed kicked off this program by buying mortgage backed securities and treasuries, which are loans to the US Treasury.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
113 |
+
page_content=' Throughout the last decade, the Fed has continued to expand its balance sheet, mostly with treasuries.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
114 |
+
page_content=' In 2020 the Fed once again bought significant quantities of these assets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
115 |
+
page_content=' Currently the Fed holds about $8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
116 |
+
page_content='5T on its balance sheet.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
117 |
+
page_content=' The history of the US Dollar is full of ad hoc amendments to maintain stability in the face of financial crises.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
118 |
+
page_content=' At its heart, the problem is that there is currently no principled way to regulate the supply of money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
119 |
+
page_content=' This becomes apparent during times of financial crises, but the imbalance in supply is probably always brewing, even in normal times.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
120 |
+
page_content=' By now, the pattern of Fed actions is familiar, and it is inevitable that it will repeat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
121 |
+
page_content=' During times of crisis, the Fed must act to protect money or face a significant crash in the entire system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
122 |
+
page_content=' Because private financial institutions know that the Fed will protect their financial instruments from the most negative consequences of their choices, they do not have the correct incentives.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
123 |
+
page_content=' Elastic Cash is meant to provide a clean, transparent, and principled mechanism to achieve robust elasticity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
124 |
+
page_content=' We do not need to cede control of the money supply to private institutions or foreign banks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
125 |
+
page_content=' We do not need to elevate invented forms of money to the stature of the US Dollar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
126 |
+
page_content=' Once Elastic Cash is adopted, I believe we can safely bar all private creation of Dollars.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
127 |
+
page_content=' The mechanism will generate new US Dollars when required, and financial institutions can obtain liquidity by participating in the mechanism, just like everyone else.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
128 |
+
page_content=' Extricating ourselves from the current system and its vested interests is likely to be challenging, to say the least.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
129 |
+
page_content=' Nevertheless, I describe a path to incorporating the new mechanism in Section 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
130 |
+
page_content=' 3 Elastic Cash: the details Elastic Cash uses trade in cashbonds to determine a risk-free rate of interest.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
131 |
+
page_content=' The money supply is regulated to ensure that this interest rate remains approximately fixed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
132 |
+
page_content=' Cashbonds are issued by the central bank (in the case of conventional currencies) or by the distributed algorithm (in the case of cryptocurrencies).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
133 |
+
page_content=' I refer to these entities as cash authorities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
134 |
+
page_content=' The contract cashbond(d) promises that the cash authority will pay the holder of the contract $1 on the date d.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
135 |
+
page_content=' Let us reserve d0 to denote the current date.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
136 |
+
page_content=' On date d0, the cash authority pays each holder of cashbond(d0) $1, and these contracts expire.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
137 |
+
page_content=' Elastic Cash requires that the cash authority implement a public market in cashbonds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
138 |
+
page_content=' On the date d0, contracts of the type cashbond(d) for d > d0 will be available in the market for cashbonds maintained by the cash authority.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
139 |
+
page_content=' Cashbonds are a special class of asset, and they should not be treated like other securities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
140 |
+
page_content=' Elastic Cash requires that cashbonds can be generated and traded only in the public market that is administered by the cash authority.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
141 |
+
page_content=' Cashbonds are not transferable, meaning they cannot be exchanged outside of the public market, and they cannot be used as collateral for loans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
142 |
+
page_content=' Because of 5 these restrictions, cashbonds cannot themselves play the same role as money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
143 |
+
page_content=' The purpose of these rules is to ensure that holders of cashbonds that desire liquidity will sell their cashbonds in the market and so keep the mechanism informed about the demand for liquidity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
144 |
+
page_content=' For the same reasons, trade in cashbonds should not be taxed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
145 |
+
page_content=' The transactions of buying and selling cashbonds should be viewed as similar to transactions that move money between savings accounts paying varying rates of interest, and treated similarly under the law.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
146 |
+
page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
147 |
+
page_content='1 Risk-free rate of interest The price at which cashbonds trade implies interest rates for risk-free loans of varying durations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
148 |
+
page_content=' Let rate(t) denote the interest rate for duration t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
149 |
+
page_content=' Let us write price(d) to denote the price at which cashbond(d) last traded in the market.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
150 |
+
page_content=' Then, if the current date is d0, the prices of cashbonds can be used to compute implied interest rates according to the formula: price(t + d0) · (1 + rate(t))t = 1, which implies that the interest rate can be expressed as rate(t) = price(t + d0)− 1 t − 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
151 |
+
page_content=' Because the loans executed by cashbonds are risk-free, the values rate(t) capture something about the market’s belief about the opportunity cost of making risk-free loans for duration t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
152 |
+
page_content=' Generally, one would expect rate(t) to be a monotone function of t, meaning that rate(t) > rate(t′) if t > t′, because loans of longer duration usually command higher interest rates.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
153 |
+
page_content=' Moreover, if t is much larger than t′, then we might expect rate(t) to have higher variance than rate(t′), because predictions about the distant future can diverge much more than predictions about the immediate future.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
154 |
+
page_content=' These rates encode important information about the demand for liquidity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
155 |
+
page_content=' The goal of the mechanism is to regulate the money supply so that one of these rates is held approximately fixed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
156 |
+
page_content=' It makes the most sense to pick a rate for a relatively short duration, because these rates are likely to have the least variance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
157 |
+
page_content=' With that in mind, let τ denote a short time period, say 1 week.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
158 |
+
page_content=' The goal of the mechanism will be to keep rate(τ) ≈ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
159 |
+
page_content='02.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
160 |
+
page_content=' There is nothing special about 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
161 |
+
page_content='02, except that it is convention for central banks around the world to use 2% as the target rate of longterm inflation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
162 |
+
page_content=' Let us set p− = (1 + 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
163 |
+
page_content='021)−τ, and p+ = (1 + 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
164 |
+
page_content='019)−τ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
165 |
+
page_content=' The goal of the mechanism will be to regulate the money supply so that p− ≤ price(τ + d0) ≤ p+, where again d0 is the current date.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
166 |
+
page_content=' This corresponds to keeping 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
167 |
+
page_content='019 ≤ rate(τ) ≤ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
168 |
+
page_content='021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
169 |
+
page_content=' 6 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
170 |
+
page_content='2 Using the market to regulate the money supply Participants in the cashbond market can put in orders to sell a specific number of cashbonds that they hold at a specific price, and can also put in orders to buy a specific number of cashbond(d) at a specific price.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
171 |
+
page_content=' The cash authority acts as a market maker to match buy orders to sell orders and so conduct transactions at a specific price between market participants.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
172 |
+
page_content=' Ideally, the market for cashbonds will support auctions1 for sellers to sell their cashbonds when needed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
173 |
+
page_content=' The cash authority will itself participate in this public market by buying and selling cash bonds in prescribed ways.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
174 |
+
page_content=' The goal of the mechanism is to maintain rate(τ) approximately fixed, and to keep the market in cashbonds sufficiently liquid, so that the money supply can be quickly adjusted based on changes to rate(τ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
175 |
+
page_content=' Here is the proposed scheme for buying and selling cashbonds: 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
176 |
+
page_content=' The cash authority will buy and sell cashbonds to keep rate(τ) ≈ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
177 |
+
page_content='02.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
178 |
+
page_content=' The cash authority will place a standing order to buy an infinite number of contracts cashbond(τ + d0) at price p−, and a separate standing order to sell an infinite number of cashbond(τ + d0) contracts at price p+.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
179 |
+
page_content=' Because the cash authority is able to generate arbitrary amounts of both money and cash- bonds, it will always be able to satisfy any of the resulting transactions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
180 |
+
page_content=' This ensures that p− ≤ price(τ + d0) ≤ p+, as discussed above.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
181 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
182 |
+
page_content=' When cashbonds are redeemed for money, the cash authority will need to sell new cashbonds to restore the balance between money and cashbonds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
183 |
+
page_content=' It makes sense to pick a particular target distribution on outstanding cashbonds that is maintained during normal times.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
184 |
+
page_content=' If the current date is d0, we say that cashbond(δ + d0) has duration δ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
185 |
+
page_content=' For example, the cash authority might aim to maintain the invariant that at any point in time, 1/4 of the outstanding cashbonds have duration between 0 and 1 month, 1/4 have duration between 1 month and 1 year, 1/4 have duration between 1 year and 4 years, and 1/4 have duration between 4 years and 10 years.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
186 |
+
page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
187 |
+
page_content=' Given such a target distribution, the redeemed cashbonds should be replaced by selling new cashbonds at auction, picking the dates of the new cashbonds so that the overall distribution on duration is maintained as much as possible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
188 |
+
page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
189 |
+
page_content=' When the demand for money is high, we are likely to reach the point where all of the available bonds cashbond(τ + d0) have been purchased by the cash authority.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
190 |
+
page_content=' In such times, the mechanism has run out of the means to inject money into the financial system at a fast enough pace according to rule 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
191 |
+
page_content=' This can be resolved by selling large quantities of cashbond(2τ +d0) contracts at auction in the market.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
192 |
+
page_content=' Market participants will be incentivized to buy these cashbonds and then sell them back after time τ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
193 |
+
page_content=' at that time the cash authority itself will be willing to buy the cashbonds at price p−.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
194 |
+
page_content=' The net effect will be to inject money into the system, while preserving the number of outstanding cashbonds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
195 |
+
page_content=' 1I will not commit to a specific style of auction here, though any implementation must carefully specifying how the cash authority behaves as a market maker and what the rules of the auctions are.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
196 |
+
page_content=' 2There are many considerations for how to choose the target distribution, but here I will not dwell on the choices too much.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
197 |
+
page_content=' 7 The number of cashbonds sold in this process is a design choice.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
198 |
+
page_content=' The goal should be inject significant liquidity, so I would favor an exponentially escalating volume of sales.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
199 |
+
page_content=' For exam- ple, the cash authority might first sell a quantity that corresponds to 1% of all outstanding cashbonds, and a week later escalate it to 2%, then 4%, and so on until the cashbond market returns to the state where market participants are no longer willing to sell back the cash- bonds of duration τ to the cash authority at p−.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
200 |
+
page_content=' These actions may temporarily distort the distribution on the durations of outstanding cashbonds, but the distribution will be quickly restored when the new cashbonds are redeemed and rule 2 is applied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
201 |
+
page_content=' An actual implementation of Elastic Cash would need to resolve many smaller technical details.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
202 |
+
page_content=' Let me now make a few comments and observations about the Elastic Cash mechanism as I have defined it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
203 |
+
page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
204 |
+
page_content='3 Discussion Elastic Cash is quite different from a system where the central bank simply allows deposits for all with interest rate 2%—such a scheme does not give the central bank a method to inject large amounts of money when the liquidity is needed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
205 |
+
page_content=' History has shown that the Fed needs a tool like Elastic Cash to inject liquidity into the financial system, since interest rates have proven too weak as a tool to inject large quantities of liquidity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
206 |
+
page_content=' As we discussed in Section 2, this has led to the Fed buying assets or propping up assets that were liable to crash in value.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
207 |
+
page_content=' In doing so, the Fed is forced to pick and choose between market participants that get first access to the new liquidity that it provides.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
208 |
+
page_content=' Central bankers should not be attempting to directly reason about the demands for liquidity;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
209 |
+
page_content=' they do not have enough data to make those decisions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
210 |
+
page_content=' But if they must take such dramatic actions, the scheme of Elastic Cash at the very least gives a fair way to do it by trading cashbonds along the lines I have suggested above.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
211 |
+
page_content=' This removes the ability of the finance sector to control the flow of the new money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
212 |
+
page_content=' It is also preferable to having the Fed buy treasuries, because it disentangles the actions of the Fed from the needs of the Treasury.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
213 |
+
page_content=' There is no need to tie increases in the money supply to increases in government spending.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
214 |
+
page_content=' Cashbonds should not be confused with conventional government securities like US treasuries.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
215 |
+
page_content=' These instruments are significantly different from each other, and one cannot make inferences about the cashbond market, which does not yet exist, based on the behavior of the US treasury market.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
216 |
+
page_content=' Let me highlight some key differences.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
217 |
+
page_content=' The issuance of cashbonds is controlled by strict and transparent rules, and is not tied to the spending of the US government.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
218 |
+
page_content=' There is no analogue of debt ceilings, or any chance that the central bank will default.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
219 |
+
page_content=' Cashbonds cannot be used as collateral for loans, cannot be transferred outside of the Elastic Cash market, and trade in cashbonds is not taxed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
220 |
+
page_content=' It is important for the functioning of Elastic Cash to maintain a large volume of outstanding cashbonds of varying durations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
221 |
+
page_content=' Ideally, we would like there to be broad participation in the cash- bond market from all kinds of financial entities: banks, companies, pension funds, and individuals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
222 |
+
page_content=' Because these participants will be willing to trade at different durations, participation will be in- creased if a wide range of durations are available, and the market is liquid at all durations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
223 |
+
page_content=' Even though the cash authority only regulates the interest rate for duration τ, this action will affect the rates for all durations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
224 |
+
page_content=' One would expect that banks and other sophisticated players will trade cashbonds of shorter duration, and perform the arbitrage necessary for information about demands for liquidity of all durations to propagate to the shorter durations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
225 |
+
page_content=' I suspect that there is a prin- 8 cipled way to choose the ideal distribution on durations of outstanding cashbonds, but I have not yet been able to convince myself about what it ought to be.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
226 |
+
page_content=' 4 Adopting Elastic Cash in the US Dollar system As discussed in Section 2, the Dollar system involves many different kinds of institutions that are currently creating instruments that can be exchanged for US Dollars.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
227 |
+
page_content=' Changing the system is not going to be straightforward.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
228 |
+
page_content=' However, I do believe that there is a path to making the change somewhat gradually, so that all the parties involved have time to adapt to the new system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
229 |
+
page_content=' Here is a proposed sequence of steps to adopting Elastic Cash for the US Dollar: 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
230 |
+
page_content=' The Fed begins to populate the cashbond market by gradually selling cashbonds of varying duration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
231 |
+
page_content=' Cashbonds are held at accounts maintained by the Fed, which allows the Fed to enforce that cashbonds cannot be transferred outside the cashbond market.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
232 |
+
page_content=' At this point, cashbonds that expire are replaced according to the rules of Elastic Cash, but the risk-free rate of interest is allowed to float freely.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
233 |
+
page_content=' I would expect this floating rate to converge close to the current Fed funds rate.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
234 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
235 |
+
page_content=' Once the market for cashbonds is running at significant scale, regulations should be enacted to curtail the private creation of US Dollars.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
236 |
+
page_content=' This can be done gradually by raising the interest rate at which the Fed lends to private entities through its discount window.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
237 |
+
page_content=' At the same time, the Fed should begin to put bounds on the risk-free rate determined by cashbond, by trading in the cashbond market.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
238 |
+
page_content=' Eventually, we should end up with a high rate for borrowing from the Fed via the discount window, while the risk-free rate in the cashbond market should be close to 2%.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
239 |
+
page_content=' This will incentivize private entities to participate in the cashbond market and raise money there.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
240 |
+
page_content=' The current creators of US Dollars can be handled as follows: (a) Commercial banks should be barred from creating new deposits that are not backed by cash reserves.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
241 |
+
page_content=' Banks should fund new lending activity by selling corporate bonds instead.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
242 |
+
page_content=' (b) The Fed’s repo facility and money market fund facility should be closed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
243 |
+
page_content=' (c) The eurodollar market is, perhaps, a bigger problem, both because of its size and the fact that the institutions cannot be regulated by US law.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
244 |
+
page_content=' Still, the Fed can wind down its swap lines with foreign central banks gradually, until eurodollars lose their Fed backing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
245 |
+
page_content=' Foreign central banks and governments should be allowed and encouraged to participate in the cashbond market to obtain liquidity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
246 |
+
page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
247 |
+
page_content=' The inevitable tantrums in the financial sector should be treated with stoicism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
248 |
+
page_content=' It is an understatement that moving from our current system of private money creation to Elastic Cash would be a dramatic change.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
249 |
+
page_content=' There are likely to be many challenges that need to be overcome to implement it, not least the resistance of the finance industry, whose raison d’ˆetre is to control the flow of money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
250 |
+
page_content=' Elastic Cash represents a significant loss of control for financial firms, and a democratization of the flow of money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
251 |
+
page_content=' For these reasons, it is perhaps more easily implemented in a cryptocurrency, as I discuss next.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
252 |
+
page_content=' 9 5 Elastic Cash in cryptocurrencies A major advantage of Elastic Cash over conventional mechanisms for elasticity is that it can be implemented in a truly decentralized way, without any trusted central authority.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
253 |
+
page_content=' Bitcoin made a technological leap when it introduced the concept of a blockchain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
254 |
+
page_content=' Since then, a number of cryptocurrencies have emerged, with different ways to implement the blockchain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
255 |
+
page_content=' Any of these systems can be used to implement Elastic Cash, so here I will keep the discussion at a high level, only talking about how the blockchain can be utilized.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
256 |
+
page_content=' Because Elastic Cash involves making significant changes to the money supply, I do believe that implementing it requires new cryptocurrencies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
257 |
+
page_content=' I do not think it can be implemented using a layer built on top of Bitcoin, for example.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
258 |
+
page_content=' Here is how one can implement Elastic Cash on a blockchain at a high level: 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
259 |
+
page_content=' At any point in time, each user of the cryptocurrency is known to hold some amount of money, as well as various cashbonds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
260 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
261 |
+
page_content=' Users of the currency can announce transactions of money, as well as orders placed in the cashbond market.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
262 |
+
page_content=' The orders can be placed with a specific expiry date.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
263 |
+
page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
264 |
+
page_content=' Miners will add both money transactions and orders in the cashbond market to the next block of the blockchain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
265 |
+
page_content=' To implement the market in cashbonds: (a) Miners will act as market makers to map buy orders to sell orders and so execute the trade in cashbonds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
266 |
+
page_content=' There are some subtle issues that need to be addressed here.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
267 |
+
page_content=' For example, a miner may be incentivized to pick some orders over others to include on the blockchain, and choose to ignore some orders when acting as a market maker.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
268 |
+
page_content=' In particular, miners should themselves be paid the spread between buy and sell orders as a transaction fee to carry out their market making function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
269 |
+
page_content=' This removes the incentives to manipulate the orders that are added to the most recent block.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
270 |
+
page_content=' (b) Miners will also execute the algorithm to simulate the activities of the cash authority in the cashbond market.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
271 |
+
page_content=' New money and cashbonds will be created according to the rules of the mechanism, and these will be traded with users based on the orders that have been added to the blockchain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
272 |
+
page_content=' 6 Conclusions and Questions It is an exciting time to think about the technology of money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
273 |
+
page_content=' The US Dollar is experiencing a once-in-a-lifetime contraction (see Figure 1), and the demands for a stable global currency have never been larger.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
274 |
+
page_content=' Elastic Cash is a broad scheme to enable elastic money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
275 |
+
page_content=' I have purposefully left the mechanism underspecified, because I believe that more work is required to understand the details and trade-offs involved in the particulars of the mechanism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
276 |
+
page_content=' Here are some important questions that I feel remain unanswered: 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
277 |
+
page_content=' How should the market maker behave in the cashbond market?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
278 |
+
page_content=' In the context of conventional currencies, can private entities function as market makers?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
279 |
+
page_content=' In the context of cryptocurrencies, how should the algorithm be set up so that miners do not have an incentive to behave dishonestly when they are carrying out the role of market maker?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
280 |
+
page_content=' 10 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
281 |
+
page_content=' What style of auction would give the best results for the cashbond market?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
282 |
+
page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
283 |
+
page_content=' What is the ideal target distribution on cashbonds?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
284 |
+
page_content=' If the cashbonds are concentrated on very short durations, this gives the most power for the mechanism to inject large quantities of money, but it also means that the market loses information about the demand for liquidity over long durations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
285 |
+
page_content=' So, there is a trade-off between various choices for distributions on durations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
286 |
+
page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
287 |
+
page_content=' How can we gradually transition the current US Dollar system to such a mechanism?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
288 |
+
page_content=' The steps I discussed in Section 4 are likely to be difficult to execute.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
289 |
+
page_content=' Perhaps there is a way to use cashbonds and incentivize the large players in the financial system to adopt Elastic Cash without being forced to do it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
290 |
+
page_content=' What is needed is a mechanism to transition to the new mechanism!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
291 |
+
page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
292 |
+
page_content=' How should we expect the free floating rate curve rate(t) to behave as a function of t during normal times?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
293 |
+
page_content=' I would expect this function to be monotone, but I am not sure how to reason about it beyond that.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
294 |
+
page_content=' 7 Acknowledgements Thanks to Paul Beame, Siddharth Iyer, Travis Kriplean, James Lee, Noam Nisan, Darcy Rao, Eli Ben-Sasson, Oscar Sprumont, Michael Whitmeyer and Amir Yehudayoff for many helpful and entertaining conversations about money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
295 |
+
page_content=' References [1] Fed history overview.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
296 |
+
page_content=' https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
297 |
+
page_content='federalreservehistory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
298 |
+
page_content='org/time-period.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
299 |
+
page_content=' [2] Christine Desan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
300 |
+
page_content=' Making Money: Coin, Currency, and the Coming of Capitalism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
301 |
+
page_content=' Oxford University Press, 2014.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
302 |
+
page_content=' [3] Neels Heyneke and Mehul Daya.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
303 |
+
page_content=' The rise and fall of the eurodollar system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
304 |
+
page_content=' https: //www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
305 |
+
page_content='nedbank.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
306 |
+
page_content='co.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
307 |
+
page_content='za/content/dam/nedbank-crp/reports/Strategy/NeelsAndMehul/ 2016/September/TheRiseAndFallOfTheEurodollarSystem_160907.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
308 |
+
page_content='pdf, 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
309 |
+
page_content=' [4] Lev Menand.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
310 |
+
page_content=' The Fed-Unbound: Central Banking in a Time of Crisis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
311 |
+
page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
312 |
+
page_content=' 11' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
|
HdFJT4oBgHgl3EQfFCyj/content/2301.11440v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:7e5c6b4c2082d0abbfa6f7c349a9e0b5187521da25771c9a88e595268edc15e4
|
3 |
+
size 960592
|