jackkuo commited on
Commit
357acb0
·
verified ·
1 Parent(s): 189f96f

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. -dAzT4oBgHgl3EQfFfqG/content/2301.01012v1.pdf +3 -0
  2. -dAzT4oBgHgl3EQfFfqG/vector_store/index.faiss +3 -0
  3. -dAzT4oBgHgl3EQfFfqG/vector_store/index.pkl +3 -0
  4. .gitattributes +98 -0
  5. 09FRT4oBgHgl3EQflTce/content/tmp_files/2301.13598v1.pdf.txt +900 -0
  6. 09FRT4oBgHgl3EQflTce/content/tmp_files/load_file.txt +420 -0
  7. 0dFQT4oBgHgl3EQfDjUj/content/2301.13234v1.pdf +3 -0
  8. 0dFQT4oBgHgl3EQfDjUj/vector_store/index.pkl +3 -0
  9. 2tFRT4oBgHgl3EQfnjcF/content/tmp_files/2301.13605v1.pdf.txt +1888 -0
  10. 2tFRT4oBgHgl3EQfnjcF/content/tmp_files/load_file.txt +0 -0
  11. 39E0T4oBgHgl3EQfvAGt/vector_store/index.faiss +3 -0
  12. 39E0T4oBgHgl3EQfvAGt/vector_store/index.pkl +3 -0
  13. 49E2T4oBgHgl3EQfOgYr/content/tmp_files/2301.03748v1.pdf.txt +1371 -0
  14. 49E2T4oBgHgl3EQfOgYr/content/tmp_files/load_file.txt +0 -0
  15. 4NE0T4oBgHgl3EQfeQCD/content/2301.02388v1.pdf +3 -0
  16. 4tE0T4oBgHgl3EQfegAX/content/2301.02390v1.pdf +3 -0
  17. 4tE0T4oBgHgl3EQfegAX/vector_store/index.faiss +3 -0
  18. 4tE0T4oBgHgl3EQfegAX/vector_store/index.pkl +3 -0
  19. 5dE2T4oBgHgl3EQf6wiO/content/tmp_files/2301.04203v1.pdf.txt +945 -0
  20. 5dE2T4oBgHgl3EQf6wiO/content/tmp_files/load_file.txt +0 -0
  21. 5tFKT4oBgHgl3EQfSy3E/content/tmp_files/2301.11777v1.pdf.txt +849 -0
  22. 5tFKT4oBgHgl3EQfSy3E/content/tmp_files/load_file.txt +0 -0
  23. 69AyT4oBgHgl3EQfcvd4/content/2301.00289v1.pdf +3 -0
  24. 69AyT4oBgHgl3EQfcvd4/vector_store/index.faiss +3 -0
  25. 69AyT4oBgHgl3EQfcvd4/vector_store/index.pkl +3 -0
  26. 6NFAT4oBgHgl3EQfnR2x/content/2301.08628v1.pdf +3 -0
  27. 6NFAT4oBgHgl3EQfnR2x/vector_store/index.faiss +3 -0
  28. 6NFAT4oBgHgl3EQfnR2x/vector_store/index.pkl +3 -0
  29. 6tAzT4oBgHgl3EQfEvoZ/content/2301.00997v1.pdf +3 -0
  30. 6tAzT4oBgHgl3EQfEvoZ/vector_store/index.faiss +3 -0
  31. 6tAzT4oBgHgl3EQfEvoZ/vector_store/index.pkl +3 -0
  32. 7tAyT4oBgHgl3EQfQvZV/content/tmp_files/2301.00051v1.pdf.txt +2553 -0
  33. 7tAyT4oBgHgl3EQfQvZV/content/tmp_files/load_file.txt +0 -0
  34. 9NE1T4oBgHgl3EQf7wX0/content/2301.03539v1.pdf +3 -0
  35. 9NE1T4oBgHgl3EQf7wX0/vector_store/index.faiss +3 -0
  36. 9NE1T4oBgHgl3EQf7wX0/vector_store/index.pkl +3 -0
  37. 9NE2T4oBgHgl3EQflwcz/content/2301.03991v1.pdf +3 -0
  38. 9NE2T4oBgHgl3EQflwcz/vector_store/index.faiss +3 -0
  39. 9NE2T4oBgHgl3EQflwcz/vector_store/index.pkl +3 -0
  40. AdE1T4oBgHgl3EQf9Aai/vector_store/index.faiss +3 -0
  41. D9E1T4oBgHgl3EQf-QZ6/content/tmp_files/2301.03566v1.pdf.txt +0 -0
  42. D9E1T4oBgHgl3EQf-QZ6/content/tmp_files/load_file.txt +0 -0
  43. F9E5T4oBgHgl3EQfVg_E/content/2301.05552v1.pdf +3 -0
  44. F9E5T4oBgHgl3EQfVg_E/vector_store/index.faiss +3 -0
  45. F9E5T4oBgHgl3EQfVg_E/vector_store/index.pkl +3 -0
  46. H9FLT4oBgHgl3EQfIi9F/content/tmp_files/2301.12000v1.pdf.txt +488 -0
  47. H9FLT4oBgHgl3EQfIi9F/content/tmp_files/load_file.txt +267 -0
  48. HdE2T4oBgHgl3EQf_Alo/content/tmp_files/2301.04244v1.pdf.txt +470 -0
  49. HdE2T4oBgHgl3EQf_Alo/content/tmp_files/load_file.txt +312 -0
  50. HdFJT4oBgHgl3EQfFCyj/content/2301.11440v1.pdf +3 -0
-dAzT4oBgHgl3EQfFfqG/content/2301.01012v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:64e6268c939ee4e099630476dc79101c24cc86f1a86819e1d237b1b94d12fa66
3
+ size 623616
-dAzT4oBgHgl3EQfFfqG/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:e35ea8454db0febcda9286b3ee194099423653848b182859a58049f214f6a35d
3
+ size 6815789
-dAzT4oBgHgl3EQfFfqG/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:648ec77d7b640fbc52420fc54f83988c524baa340baaf09b14bf1f47f321d403
3
+ size 235464
.gitattributes CHANGED
@@ -1493,3 +1493,101 @@ wdE0T4oBgHgl3EQf-ALu/content/2301.02810v1.pdf filter=lfs diff=lfs merge=lfs -tex
1493
  AdE1T4oBgHgl3EQf9Aai/content/2301.03552v1.pdf filter=lfs diff=lfs merge=lfs -text
1494
  xdE3T4oBgHgl3EQflgqp/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1495
  kNE1T4oBgHgl3EQfgQS0/content/2301.03228v1.pdf filter=lfs diff=lfs merge=lfs -text
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1493
  AdE1T4oBgHgl3EQf9Aai/content/2301.03552v1.pdf filter=lfs diff=lfs merge=lfs -text
1494
  xdE3T4oBgHgl3EQflgqp/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1495
  kNE1T4oBgHgl3EQfgQS0/content/2301.03228v1.pdf filter=lfs diff=lfs merge=lfs -text
1496
+ r9E3T4oBgHgl3EQfMwkD/content/2301.04375v1.pdf filter=lfs diff=lfs merge=lfs -text
1497
+ zdE1T4oBgHgl3EQf4QX8/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1498
+ ltE2T4oBgHgl3EQfJAY7/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1499
+ OdAyT4oBgHgl3EQf7PpY/content/2301.00835v1.pdf filter=lfs diff=lfs merge=lfs -text
1500
+ zdE1T4oBgHgl3EQfkgRW/content/2301.03274v1.pdf filter=lfs diff=lfs merge=lfs -text
1501
+ YNA0T4oBgHgl3EQfFf_E/content/2301.02034v1.pdf filter=lfs diff=lfs merge=lfs -text
1502
+ 4tE0T4oBgHgl3EQfegAX/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1503
+ ntE2T4oBgHgl3EQfzgi3/content/2301.04132v1.pdf filter=lfs diff=lfs merge=lfs -text
1504
+ ldFKT4oBgHgl3EQfDS1x/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1505
+ QNFPT4oBgHgl3EQfojUh/content/2301.13134v1.pdf filter=lfs diff=lfs merge=lfs -text
1506
+ AdE1T4oBgHgl3EQf9Aai/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1507
+ UNFAT4oBgHgl3EQf2x7k/content/2301.08717v1.pdf filter=lfs diff=lfs merge=lfs -text
1508
+ 4tE0T4oBgHgl3EQfegAX/content/2301.02390v1.pdf filter=lfs diff=lfs merge=lfs -text
1509
+ OtAzT4oBgHgl3EQfIftM/content/2301.01062v1.pdf filter=lfs diff=lfs merge=lfs -text
1510
+ stE1T4oBgHgl3EQf3QW2/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1511
+ dNFRT4oBgHgl3EQfTjeD/content/2301.13533v1.pdf filter=lfs diff=lfs merge=lfs -text
1512
+ ntE5T4oBgHgl3EQfjg_f/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1513
+ ydE4T4oBgHgl3EQfxw3J/content/2301.05261v1.pdf filter=lfs diff=lfs merge=lfs -text
1514
+ ntE5T4oBgHgl3EQfjg_f/content/2301.05657v1.pdf filter=lfs diff=lfs merge=lfs -text
1515
+ x9AzT4oBgHgl3EQfQvs-/content/2301.01203v1.pdf filter=lfs diff=lfs merge=lfs -text
1516
+ 0dFQT4oBgHgl3EQfDjUj/content/2301.13234v1.pdf filter=lfs diff=lfs merge=lfs -text
1517
+ ktE5T4oBgHgl3EQfGw6j/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1518
+ ttAzT4oBgHgl3EQfPfvn/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1519
+ dtE3T4oBgHgl3EQfegpr/content/2301.04544v1.pdf filter=lfs diff=lfs merge=lfs -text
1520
+ PNFJT4oBgHgl3EQfIiwq/content/2301.11456v1.pdf filter=lfs diff=lfs merge=lfs -text
1521
+ ltAyT4oBgHgl3EQfYfdr/content/2301.00204v1.pdf filter=lfs diff=lfs merge=lfs -text
1522
+ OtAzT4oBgHgl3EQfIftM/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1523
+ zNAyT4oBgHgl3EQfO_a9/content/2301.00017v1.pdf filter=lfs diff=lfs merge=lfs -text
1524
+ dtE3T4oBgHgl3EQfegpr/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1525
+ 9NE2T4oBgHgl3EQflwcz/content/2301.03991v1.pdf filter=lfs diff=lfs merge=lfs -text
1526
+ qtE5T4oBgHgl3EQflQ8e/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1527
+ 4NE0T4oBgHgl3EQfeQCD/content/2301.02388v1.pdf filter=lfs diff=lfs merge=lfs -text
1528
+ PNFJT4oBgHgl3EQfIiwq/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1529
+ zdE1T4oBgHgl3EQfkgRW/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1530
+ qtE5T4oBgHgl3EQflQ8e/content/2301.05669v1.pdf filter=lfs diff=lfs merge=lfs -text
1531
+ 9NE1T4oBgHgl3EQf7wX0/content/2301.03539v1.pdf filter=lfs diff=lfs merge=lfs -text
1532
+ 9NE1T4oBgHgl3EQf7wX0/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1533
+ dNFRT4oBgHgl3EQfTjeD/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1534
+ zNAyT4oBgHgl3EQfO_a9/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1535
+ hNAzT4oBgHgl3EQf4f5B/content/2301.01844v1.pdf filter=lfs diff=lfs merge=lfs -text
1536
+ x9AzT4oBgHgl3EQfQvs-/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1537
+ NtFQT4oBgHgl3EQfWjbh/content/2301.13305v1.pdf filter=lfs diff=lfs merge=lfs -text
1538
+ hNAzT4oBgHgl3EQf4f5B/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1539
+ HdFJT4oBgHgl3EQfFCyj/content/2301.11440v1.pdf filter=lfs diff=lfs merge=lfs -text
1540
+ F9E5T4oBgHgl3EQfVg_E/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1541
+ F9E5T4oBgHgl3EQfVg_E/content/2301.05552v1.pdf filter=lfs diff=lfs merge=lfs -text
1542
+ ktE5T4oBgHgl3EQfGw6j/content/2301.05434v1.pdf filter=lfs diff=lfs merge=lfs -text
1543
+ HdFJT4oBgHgl3EQfFCyj/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1544
+ ydE4T4oBgHgl3EQfxw3J/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1545
+ l9FRT4oBgHgl3EQfZjdA/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1546
+ 9NE2T4oBgHgl3EQflwcz/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1547
+ XdE0T4oBgHgl3EQfmgEE/content/2301.02498v1.pdf filter=lfs diff=lfs merge=lfs -text
1548
+ NtFQT4oBgHgl3EQfWjbh/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1549
+ ZNFIT4oBgHgl3EQfkSuq/content/2301.11300v1.pdf filter=lfs diff=lfs merge=lfs -text
1550
+ 6tAzT4oBgHgl3EQfEvoZ/content/2301.00997v1.pdf filter=lfs diff=lfs merge=lfs -text
1551
+ UdE4T4oBgHgl3EQfMAzo/content/2301.04944v1.pdf filter=lfs diff=lfs merge=lfs -text
1552
+ l9FRT4oBgHgl3EQfZjdA/content/2301.13553v1.pdf filter=lfs diff=lfs merge=lfs -text
1553
+ 6tAzT4oBgHgl3EQfEvoZ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1554
+ -dAzT4oBgHgl3EQfFfqG/content/2301.01012v1.pdf filter=lfs diff=lfs merge=lfs -text
1555
+ 6NFAT4oBgHgl3EQfnR2x/content/2301.08628v1.pdf filter=lfs diff=lfs merge=lfs -text
1556
+ UdFKT4oBgHgl3EQfli6N/content/2301.11854v1.pdf filter=lfs diff=lfs merge=lfs -text
1557
+ 39E0T4oBgHgl3EQfvAGt/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1558
+ gNE3T4oBgHgl3EQffgrq/content/2301.04554v1.pdf filter=lfs diff=lfs merge=lfs -text
1559
+ V9E2T4oBgHgl3EQfYAcW/content/2301.03849v1.pdf filter=lfs diff=lfs merge=lfs -text
1560
+ 69AyT4oBgHgl3EQfcvd4/content/2301.00289v1.pdf filter=lfs diff=lfs merge=lfs -text
1561
+ gNE3T4oBgHgl3EQffgrq/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1562
+ -dAzT4oBgHgl3EQfFfqG/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1563
+ qNAzT4oBgHgl3EQfq_3c/content/2301.01639v1.pdf filter=lfs diff=lfs merge=lfs -text
1564
+ 69AyT4oBgHgl3EQfcvd4/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1565
+ 6NFAT4oBgHgl3EQfnR2x/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1566
+ d9AyT4oBgHgl3EQfjfgx/content/2301.00414v1.pdf filter=lfs diff=lfs merge=lfs -text
1567
+ htE3T4oBgHgl3EQfgQqz/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1568
+ qNAzT4oBgHgl3EQfq_3c/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1569
+ UdFKT4oBgHgl3EQfli6N/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1570
+ _NFKT4oBgHgl3EQfUi2J/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1571
+ V9E2T4oBgHgl3EQfYAcW/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1572
+ UdE4T4oBgHgl3EQfMAzo/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1573
+ SdFLT4oBgHgl3EQfPS8r/content/2301.12027v1.pdf filter=lfs diff=lfs merge=lfs -text
1574
+ _NFKT4oBgHgl3EQfUi2J/content/2301.11784v1.pdf filter=lfs diff=lfs merge=lfs -text
1575
+ XdE0T4oBgHgl3EQfmgEE/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1576
+ ZNAyT4oBgHgl3EQfWveE/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1577
+ k9E_T4oBgHgl3EQf6BwH/content/2301.08361v1.pdf filter=lfs diff=lfs merge=lfs -text
1578
+ ZNFIT4oBgHgl3EQfkSuq/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1579
+ QdE0T4oBgHgl3EQfkQFh/content/2301.02470v1.pdf filter=lfs diff=lfs merge=lfs -text
1580
+ ttAyT4oBgHgl3EQf0flC/content/2301.00718v1.pdf filter=lfs diff=lfs merge=lfs -text
1581
+ ZNAyT4oBgHgl3EQfWveE/content/2301.00169v1.pdf filter=lfs diff=lfs merge=lfs -text
1582
+ QdE0T4oBgHgl3EQfkQFh/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1583
+ SdFLT4oBgHgl3EQfPS8r/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1584
+ btFAT4oBgHgl3EQf5R5J/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1585
+ mtAzT4oBgHgl3EQfN_t_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1586
+ rNE1T4oBgHgl3EQf2wV_/content/2301.03482v1.pdf filter=lfs diff=lfs merge=lfs -text
1587
+ WdE4T4oBgHgl3EQfNAwx/content/2301.04952v1.pdf filter=lfs diff=lfs merge=lfs -text
1588
+ mtAzT4oBgHgl3EQfN_t_/content/2301.01158v1.pdf filter=lfs diff=lfs merge=lfs -text
1589
+ dtE3T4oBgHgl3EQfGwnT/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1590
+ QNFPT4oBgHgl3EQfojUh/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
1591
+ btFAT4oBgHgl3EQf5R5J/content/2301.08732v1.pdf filter=lfs diff=lfs merge=lfs -text
1592
+ gNFKT4oBgHgl3EQftS6b/content/2301.11886v1.pdf filter=lfs diff=lfs merge=lfs -text
1593
+ WdE4T4oBgHgl3EQfNAwx/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
09FRT4oBgHgl3EQflTce/content/tmp_files/2301.13598v1.pdf.txt ADDED
@@ -0,0 +1,900 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Economic Predictive Control with Periodic
2
+ Horizon for Water Distribution Networks
3
+ Mirhan ¨Urkmez ∗ Carsten Kallesøe ∗ Jan Dimon Bendtsen ∗
4
+ John Leth ∗
5
+ ∗ Aalborg University, Fredrik Bajers Vej 7c, DK-9220 Aalborg,
6
+ Denmark
7
+ (e-mail: {mu,csk,dimon,jjl}@es.aau.dk)
8
+ Abstract: This paper deals with the control of pumps in large-scale water distribution networks
9
+ with the aim of minimizing economic costs while satisfying operational constraints. Finding a
10
+ control algorithm in combination with a model that can be applied in real-time is a challenging
11
+ problem due to the nonlinearities presented by the pipes and the network sizes. We propose
12
+ a predictive control algorithm with a periodic horizon. The method provides a way for the
13
+ economic operation of large water networks with a small linear model. Economic Predictive
14
+ control with a periodic horizon and a terminal state constraint is constructed to keep the state
15
+ trajectories close to an optimal periodic trajectory. Barrier terms are also included in the cost
16
+ function to prevent constraint violations. The proposed method is tested on the EPANET
17
+ implementation of the water network of a medium size Danish town (Randers) and shown to
18
+ perform as intended under varying conditions.
19
+ Keywords: Water distribution networks, Pump Scheduling, Predictive control, Periodic
20
+ horizon, Economic model predictive control
21
+ 1. INTRODUCTION
22
+ Water distribution networks (WDNs) deliver drinkable
23
+ water from water sources to consumers using elements
24
+ such as pumps, pipes, tanks etc. About 7% − 8% of the
25
+ world’s energy is used for water production and distribu-
26
+ tion (Sharif et al., 2019). Water pumps account for a sig-
27
+ nificant part of the energy required for water distribution
28
+ with their percentage ranging from 90% to 95% of the
29
+ total (Abdelsalam and Gabbar, 2021). There have been
30
+ many works to schedule the operation of the pumps in
31
+ WDNs with proper methods so as to reduce energy costs.
32
+ However, pump scheduling is not an easy task because
33
+ of the nonlinearities governing the network elements. The
34
+ problem gets complicated with increasing network size.
35
+ Also, there are constraints to be satisfied such as limits
36
+ on tank levels.
37
+ In the literature, WDNs with both constant and variable
38
+ speed pumps are studied extensively. The control input is
39
+ turning on and off the pump for constant speed pumps. In
40
+ Lindell Ormsbee (2009), a constant-speed pump schedul-
41
+ ing problem is posed as an optimization problem in which
42
+ the decision variables are the operation times of the pumps
43
+ and the objective is the energy cost. After observing that
44
+ the optimal solution would be not running the pumps at
45
+ all without the constraints, the authors try to find the
46
+ solution closest to the origin that also complies with the
47
+ constraints. The proposed way to find such a solution is
48
+ ⋆ This work is funded by Independent Research Fund Denmark
49
+ (DFF). We acknowledge Verdo company, Peter Nordahn, and Steffen
50
+ Schmidt for providing us with the EPANET model and the network
51
+ information.
52
+ using a Genetic Algorithm (GA). In Bagirov et al. (2013),
53
+ the Hooke-Jeeves method is used for finding optimal pump
54
+ operating times for a similar problem. Then, network sim-
55
+ ulation algorithms are used to check if the constraints are
56
+ satisfied. In Castro-Gama et al. (2017), binary decision
57
+ variables are used to represent the opening and the closing
58
+ of each pump. The feasibility of the solution found with
59
+ GA is checked with EPANET, a WDN modeling software,
60
+ and a high cost is assigned to the infeasible solutions.
61
+ The number of open pumps is also taken as the input
62
+ to the system in some works, e.g., Wang et al. (2021).
63
+ The problem is then solved using mixed-integer nonlinear
64
+ programming. In Berkel et al. (2018), a network in which
65
+ pressure zones are connected via constant speed pumps
66
+ is considered. Each pressure zone is treated as a subsys-
67
+ tem and distributed model predictive control (DMPC) is
68
+ applied.
69
+ The flow rate of the pumps should be determined for
70
+ networks with variable speed pumps. In Pour et al. (2019),
71
+ Linear Parameter Varying (LPV) system modeling is used
72
+ to replace the nonlinear part of the network, and an
73
+ Economic Model Predictive Control (EMPC) is applied
74
+ on top of the LPV system to find the optimal flow rates.
75
+ In Kallesøe et al. (2017), a network structure with an
76
+ elevated reservoir is considered. Available data is used
77
+ for the identification of a reduced system model. Then,
78
+ EMPC is applied to the model. In the EMPC formulation,
79
+ node pressures are not constrained. It is assumed that the
80
+ pressures would be in the accepted range because there is
81
+ an elevated reservoir. Relaxation of the original problem
82
+ into a simpler one is commonly used because of the large
83
+ network sizes. The relaxation is generally achieved by
84
+ arXiv:2301.13598v1 [eess.SY] 31 Jan 2023
85
+
86
+ approximating the nonlinear pipe equations with some
87
+ sort of linear equations or inequalities. In Baunsgaard
88
+ et al. (2016), pipe equations are linearized around an
89
+ operating point, and model predictive control (MPC) is
90
+ applied. In Wang et al. (2018), an EMPC is applied to a
91
+ network where the nonlinear pipe equations are relaxed
92
+ into a set of linear inequalities. Before simplifying the
93
+ system model, the network structure is also simplified in
94
+ Fiedler et al. (2020). A hierarchical clustering method is
95
+ used to represent the original network with a smaller one
96
+ which originally had 378 junctions. A system model is
97
+ derived from the simplified structure using a Deep Neural
98
+ Network (DNN) structure. Lagrangian relaxation is used
99
+ to approximate the original problem in Ghaddar et al.
100
+ (2015).
101
+ In this paper, a way for optimal pump scheduling of large-
102
+ scale WDNs is presented. To control the pumps, a linear
103
+ model of the system is derived. Then, a predictive control
104
+ method with a periodic horizon is constructed. Barrier
105
+ functions are utilized to prevent constraint violation due
106
+ to the model-plant mismatch. With the introduction of
107
+ the periodic horizon and the terminal state constraint,
108
+ the chance of finding a feasible solution is increased by
109
+ keeping trajectories close to an optimal periodic trajectory.
110
+ The method is applied to a medium-sized Danish town’s
111
+ network (Randers).
112
+ The outline of the rest of the paper is as follows. The
113
+ network model is given in Section 2. The proposed control
114
+ method is explained in Section 3. The experimental results
115
+ are presented in Section 4. The paper is concluded with
116
+ final remarks in Section 5.
117
+ 2. NETWORK MODEL
118
+ A typical water distribution network consists of pipes,
119
+ pumps, tanks, junction nodes and reservoirs. Water in
120
+ the network flows from high hydraulic head to low head.
121
+ Hydraulic head is a measure of the fluid pressure and is
122
+ equal to the height of a fluid in a static column at a point.
123
+ Hydraulic head loss occurring in a pipe can be approxi-
124
+ mated by the Hazen-Williams Equation as
125
+ ∆h = h1 − h2 = Kq|q|0.852
126
+ (1)
127
+ where K is the pipe resistance that depends on the physical
128
+ features of a pipe such as diameter and length, q is the flow
129
+ rate, and h1 and h2 are the heads at the two ends of the
130
+ pipe.
131
+ At each node j, the mass conservation law is satisfied. It
132
+ can be expressed as
133
+
134
+ i∈Nj
135
+ qij = dj
136
+ (2)
137
+ where qij is the flow entering the node j from node i and
138
+ dj is the demand at node j, which is the water requested
139
+ by the user at node j. The symbol Nj denotes the set of
140
+ neighbor nodes of node j. Note that qij is positive if the
141
+ flow is from node i to the neighbor node j and negative
142
+ vice versa.
143
+ Tanks are storage elements that provide water to the users.
144
+ In the network, tanks are elevated so that water can be
145
+ pressurized enough to be delivered to the consumers. The
146
+ change in the water level of a tank is dependent on the
147
+ flow coming from neighbor nodes and can be written for
148
+ the tank j as
149
+ Aj ˙hj =
150
+
151
+ i∈Nj
152
+ qij
153
+ (3)
154
+ where Aj is the cross-sectional area, hj is the level of the
155
+ tank. Tank levels change according to the flow passing
156
+ through the pipes connected to the tanks. Those flows
157
+ are determined by a set of pipe head loss equations (1),
158
+ and mass balance equations (2) throughout the whole
159
+ network. As Equation (1) is nonlinear, flow through pipes
160
+ connected to the tanks are nonlinear functions fi of the
161
+ demand at each node, tank levels, and the amount of water
162
+ coming from the pumps. Explicit forms of those nonlinear
163
+ functions could be derived if the vector d = [d1, d2...]T
164
+ containing the demands of all the nodes is known, which is
165
+ not possible unless demand data for all nodes are available.
166
+ In our work, we assume that the total demand of the zones
167
+ that are supplied by the pumps can be estimated through
168
+ available data with time series analysis methods, but not
169
+ require d vector to be known. Since fi functions can not be
170
+ found without d vector, we approximate them using linear
171
+ models and write tank level change equations as
172
+ ˙h(t) = Ah(t) + B1u(t) + B2da(t)
173
+ (4)
174
+ where h(t) ∈ Rn includes tank levels, A ∈ Rn×n, B1 ∈
175
+ Rn×m, B2 ∈ Rn×1 are constant system matrices and da(t)
176
+ is the aggregated demand of controlled zone at time t,
177
+ u(t) ∈ Rm is the input containing pump flows. The reason
178
+ we chose a linear model is to increase the chance of finding
179
+ a feasible solution for the controller which is posed as
180
+ an optimization problem in the next section. Although
181
+ capturing the full dynamics of a large-scale network is not
182
+ possible with a linear model, the proposed control method
183
+ is designed to compensate for model inaccuracies and we
184
+ have observed that it was enough to control the system
185
+ while satisfying the constraints.
186
+ 3. PERIODIC HORIZON CONTROL
187
+ In this section, a predictive control algorithm for pump
188
+ scheduling is presented to minimize the economical costs.
189
+ The aim is to run the pumps when the electricity price is
190
+ low and let tanks deliver water when the price is high while
191
+ also satisfying input and output constraints. The problem
192
+ at time t is posed as
193
+ min
194
+ ut
195
+ 0,ut
196
+ 1···ut
197
+ N(t)−1
198
+ N(t)−1
199
+
200
+ j=0
201
+ J(ht
202
+ j, ut
203
+ j)
204
+ (5a)
205
+ ht
206
+ j = Adht
207
+ j−1 + Bd1ut
208
+ j−1 + Bd2da(j − 1)
209
+ (5b)
210
+ ht
211
+ 0 = h(t)
212
+ (5c)
213
+ ut
214
+ j ∈ U ⊆ Rm
215
+ (5d)
216
+ ht
217
+ j ∈ H ⊆ Rn
218
+ (5e)
219
+ ht
220
+ N(t) ∈ Htf ⊆ Rn
221
+ (5f)
222
+ where J(ht
223
+ j, ut
224
+ j) is the economic cost function, ht
225
+ =
226
+ [ht
227
+ 1 · · · ht
228
+ N(t)] ∈ Rn×N(t) is the predicted future states, ut
229
+ j is
230
+ the input vector, N(t) is the prediction horizon, U ⊆ Rm
231
+ and H ⊆ Rn denotes the input and state constraints
232
+ respectively and Htf ⊆ Rn is the terminal state set. The
233
+ continuous system (4) is discretized and (5b) is obtained.
234
+
235
+ The optimization problem (5) is solved at every time step
236
+ separated by ∆t and the first term ut
237
+ 0 of the optimal input
238
+ sequence ut = [ut
239
+ 0 · · · ut
240
+ N(t)−1] ∈ Rm×N(t) is applied to the
241
+ system.
242
+ Input constraints come from the physical limitations and
243
+ working principles of the pumps. A pump can not provide
244
+ water in the opposite direction and it can deliver a maxi-
245
+ mum amount of water per unit of time. These conditions
246
+ are expressed as
247
+ U = {[u1, · · · um] ∈ Rm | 0 ≤ u1 ≤ u1, · · · 0 ≤ um ≤ um}
248
+ (6)
249
+ where u1 · · · um are upper flow limits. Tank levels are also
250
+ constrained so that there is always enough water in the
251
+ tanks in case of an emergency and there is no overflow of
252
+ water. The set H can be defined as
253
+ H = {[h1, · · · h2] ∈ Rn | ˜h1 ≤ h1 ≤ h1, · · · ˜hn ≤ hn ≤ hn}
254
+ (7)
255
+ The cost function includes the electricity costs of the
256
+ pumps. The power provided to the network by the pump
257
+ i is equal to qpi(pout
258
+ i
259
+ − pin
260
+ i ), where qpi is the pump flow,
261
+ pi
262
+ out and pi
263
+ in are the outlet and inlet pressures of the pump
264
+ i. The inlet pressures pin = [pin
265
+ 1 , pin
266
+ 2 ] are the pressures of
267
+ the related reservoirs and are assumed to be constant. The
268
+ outlet pressures pout = [pout
269
+ 1
270
+ , pout
271
+ 2
272
+ ] are given as the output
273
+ of the linear model
274
+ pout(t) = Aph(t) + Bpu(t)
275
+ (8)
276
+ where Ap and Bp are found using system identification
277
+ on data generated by the EPANET model. Electricity
278
+ cost at time t is then found by multiplying total power
279
+ consumption u(t)T (pout(t) − pin(t)) with the electricity
280
+ price c(t).
281
+ We acknowledge a certain degree of model-plant mismatch
282
+ by using a linear model (4) to represent the whole network.
283
+ This causes actual states h(t) to be different than the
284
+ predicted states ht. We know that the predicted states
285
+ satisfy the state constraints (7) since they are the solution
286
+ to the optimization problem 5, but the actual states
287
+ might violate them. To ensure the satisfaction of the state
288
+ constraints with the model-plant mismatch, we introduce
289
+ new terms to the cost function. First, we rewrite state
290
+ constraints (7) as
291
+ Ci(h) ≤ 0,
292
+ i = 0, 1, · · · 2 × n − 1
293
+ (9)
294
+ where C0(h) = ˜h1 −h1 and the rest of the Ci functions are
295
+ chosen in a similar manner. The cost function terms are
296
+ then defined as
297
+ Jhi(h) = eai(Ci(h)+bi)
298
+ i = 0, 1, · · · 2 × n − 1
299
+ (10)
300
+ where ai, bi ∈ R>0. This can be seen as an exponential
301
+ barrier function. The parameters ai, bi determine a danger-
302
+ ous region close to the boundaries of the state constraints
303
+ where cost function Jhi attains high values. The predicted
304
+ optimal state trajectories ht do not enter the dangerous
305
+ region if possible because of the high cost values in the
306
+ dangerous region. Then, the actual states h(t) do not
307
+ violate the state constraints (7) assuming the difference
308
+ between the predicted state and the actual state is small.
309
+ If the state trajectory enters one of the dangerous regions
310
+ at any step due to the model-plant mismatch, then the
311
+ cost function will try to drive the trajectory out of the
312
+ region.
313
+ ∆t
314
+ N(t)∆t
315
+ N(t + ∆t)∆t
316
+ h(t)
317
+ h(t + ∆t)
318
+ ht
319
+ 1
320
+ ut
321
+ 0
322
+ ut+∆t
323
+ 0
324
+ ht+∆t
325
+ ht
326
+ Br(h∗
327
+ Tday/∆t)
328
+ Fig. 1. Predicted state trajectories ht, ht+∆t at times
329
+ t, t + ∆t. Sampling time ∆t, prediction horizons
330
+ N(t), N(t + ∆t) and the applied inputs ut
331
+ 0, ut+∆t
332
+ 0
333
+ are
334
+ shown. The true state h(t + ∆t) and the predicted
335
+ state ht
336
+ 1 are indicated to emphasize the deviation from
337
+ the prediction. The terminal set Br(h∗
338
+ Tday/∆t) is also
339
+ illustrated.
340
+ The overall cost function includes both the electricity
341
+ expense term and the constraint barrier functions and it
342
+ can be expressed as
343
+ J(h(t), u(t)) = c(t)u(t)T (pout(t)−pin(t))+
344
+ 2×n−1
345
+
346
+ i=0
347
+ Jhi(h(t))
348
+ (11)
349
+ Both electricity price c(t) and total water demand da(t)
350
+ signals can be viewed as consisting of a periodic signal
351
+ with a period of 1 day and a relatively small deviation
352
+ signal. This can be leveraged to find a feasible controller.
353
+ Suppose a sequence of inputs can be found for some
354
+ initial tank levels such that levels after 1 day are equal
355
+ to initial levels. In that case, the problem after 1 day is
356
+ the same as in the beginning assuming deviation signals
357
+ of the electricity price and the demand are zero, hence
358
+ they are periodic. Then, the input sequence from the
359
+ previous day could be applied and produce the same
360
+ path for tank levels. Taking into account the deviation
361
+ signals and supposing that a solution exists such that
362
+ levels after 1 day are close to initial levels, the input
363
+ sequence from the previous day could be a good point of
364
+ start to search for a feasible solution if the map from the
365
+ initial conditions and the demand profile to the optimal
366
+ input sequences is continuous. Therefore, we choose a
367
+ terminal state constraint for the end of each day to
368
+ increase the chance of finding a feasible solution. Now, the
369
+ remaining problem is to decide which tank levels should
370
+ the trajectories turn back to at the end of each day. We
371
+ define the optimal periodic trajectory of the system as the
372
+ solution of
373
+ (u∗, h∗) = arg min
374
+ ui,hi
375
+ (Tday/∆t)−1
376
+
377
+ i=0
378
+ J(hi, ui)
379
+ (12a)
380
+ hi = Adhi−1 + Bd1ui−1 + Bd2d∗
381
+ a(i − 1)
382
+ (12b)
383
+ ui ∈ U ⊆ Rm
384
+ (12c)
385
+ hi ∈ H ⊆ Rn
386
+ (12d)
387
+ h0 = hTday/∆t
388
+ (12e)
389
+ where Tday is the duration of a whole day, d∗
390
+ a is the
391
+ average daily demand profile obtained from the past
392
+ measurements. The resulting state trajectory h∗
393
+ =
394
+ [h∗
395
+ 0 · · · h∗
396
+ Tday/∆t] ∈ Rn×(Tday/∆t+1) is the optimal periodic
397
+ trajectory because of the constraint (12e). The terminal
398
+ set Htf and the prediction horizon N(t) is chosen to make
399
+ tank levels at the end of each day close to h∗
400
+ Tday/∆t. At
401
+
402
+ High Zone
403
+ Low Zone
404
+ Fig. 2. Water Distribution Network of Randers. The pump-
405
+ ing stations to be controlled are shown in red. Tanks
406
+ are shown with a ’T’ shaped symbol in yellow.
407
+ any time t, t + N(t)∆t should be equal to the end of the
408
+ day. Htf and N(t) could be written as
409
+ Htf = Br(h∗
410
+ Tday/∆t)
411
+ (13a)
412
+ N(t) = (Tday − t mod Tday)/∆t
413
+ (13b)
414
+ where Br(h∗
415
+ Tday/∆t) is the open ball centered at h∗
416
+ Tday/∆t
417
+ with radius r. Note that N(t) changes so that t + N(t)∆t
418
+ is the end of the day for all t. With these definitions, the
419
+ condition (13a) will translate to tank levels at the end of
420
+ the day being close to the final point in optimal periodic
421
+ trajectory h∗
422
+ Tday/∆t as shown in Figure 1. Therefore, not
423
+ only chance of finding a feasible solution is increased but
424
+ also the solutions are kept around the optimal periodic
425
+ trajectory h∗. If the problem (5) becomes infeasible at
426
+ any time step t, we apply the second term of the input
427
+ sequence from the previous step ut−∆t
428
+ 1
429
+ . The reason behind
430
+ this choice is as follows: If we apply the optimal control
431
+ input ut−∆t
432
+ 0
433
+ to the network model (4) at time t − ∆t,
434
+ then the optimal sequence in the next time step will be
435
+ ut = [ut−∆t
436
+ 1
437
+ · · · ut−∆t
438
+ N(t−∆t)−1] following Bellman’s principle
439
+ of optimality. Then, at time t, ut−∆t
440
+ 1
441
+ will be applied to
442
+ the system as calculated at t − ∆t. Assuming the model-
443
+ plant mismatch is small enough, ut−∆t
444
+ 1
445
+ is still a good input
446
+ candidate if the problem is infeasible at time t.
447
+ 4. APPLICATION
448
+ The presented method is applied to WDN of Randers, a
449
+ Danish city, which is shown in Figure 2. The network con-
450
+ sists of 4549 nodes and 4905 links connecting them. There
451
+ are 8 pumping stations in the network, 6 of which are
452
+ shown in the figure whereas the other 2 are stationed where
453
+ tanks are placed. The goal is to derive the schedules for
454
+ 2 of the pumping stations while other pumps are already
455
+ working according to some predetermined strategies. The
456
+ stations to be controlled are shown in red in the figure.
457
+ Their task is to deliver water mostly to the High Zone (HZ)
458
+ and Low Zone (LZ). However, connections exist between
459
+ HZ-LZ and the rest of the city, so we can not think of the
460
+ system as composed of isolated networks entirely. There
461
+ are also 3 tanks in the HZ. While 2 of them are directly
462
+ connected via pipes, the third one stands alone as shown
463
+ in the figure.
464
+ The overall structure of the Randers WDN with tanks and
465
+ pumps to be controlled are given in Figure 3. There are 3
466
+ water tanks in the network, 2 of which have been connected
467
+ Fig. 3. Structure of the WDN.
468
+ with a pipe directly. The tank level changes can be written
469
+ by applying the mass conservation law (3) to the tanks in
470
+ Figure 3 as
471
+ A1 ˙h1 = q1down + q1up + qinter
472
+ (14a)
473
+ = f1(h1, h2, h3, qp1, qp2, d),
474
+ A2 ˙h2 = q2down + q2up − qinter
475
+ (14b)
476
+ = f2(h1, h2, h3, qp1, qp2, d),
477
+ A3 ˙h3 = q3 = f3(h1, h2, h3, qp1, qp2, d),
478
+ (14c)
479
+ where d is the vector containing the demands of all the
480
+ nodes, qp1, qp2 are the pump flows, A1, A2, A3 are the cross
481
+ sectional areas of the tanks and f1, f2, f3 are nonlinear
482
+ flow functions. Water levels at the two connected tanks are
483
+ almost equal h1 ≈ h2 all the time since the pipe connecting
484
+ respective tanks is big enough to oppose the water flows
485
+ coming from neighbor nodes. That enables us to consider
486
+ h1, h2 together as
487
+ (A1 + A2)˙h1,2 ≈ q1down + q2down + qup = f1 + f2.
488
+ (15)
489
+ We have used the EPANET model of the network to
490
+ generate the data required for approximating f1 + f2
491
+ and f3. The model is simulated with various tank level
492
+ initial conditions and flow rates of 2 pumping stations
493
+ to be controlled. The control laws for the remaining
494
+ pumping stations are already defined in the EPANET
495
+ model. Then, the linear model (4) is fitted to simulation
496
+ data using least squares. The state variables for the model
497
+ are h(t) = [h1,2(t), h3(t)] ∈ R2 and the inputs are u(t) =
498
+ [qp1(t), qp2(t)] ∈ R2. The total demand of High and Low
499
+ Zone is used as aggregated demand da in the model since
500
+ mainly those areas are supplied by the controlled pumps.
501
+ 4.1 Simulation Results
502
+ The proposed control method is tested on EPANET model
503
+ of Randers water network. Epanet-Matlab toolkit Eliades
504
+ et al. (2016) is used to set the flow of the 2 pumps at
505
+ each time step and simulate the network. The remaining
506
+ pumps are controlled with rule-based control laws that are
507
+ previously defined on EPANET.
508
+ The parameters of exponential barrier functions Jhi are
509
+ chosen as ai = 80, bi = 0.3 for all i. It is assumed
510
+ that the electricity prices are known in advance during
511
+ the test. Tank levels h1, h2 have a maximum value of 3m
512
+ while h3 has 2.8m. Tanks are required to be at least half
513
+ full. Maximum pump flows are set to 100. Sampling time
514
+ ∆t is set to 1 hour in the experiments, so the control
515
+ input is recalculated at each hour. We assume that total
516
+ demand da(t) of HZ and LZ can be estimated up to 1 day
517
+ from available data. Although we do not have historical
518
+
519
+ qup
520
+ qiup
521
+ q2up
522
+ h1
523
+ h2
524
+ h3
525
+ qinter
526
+ q1down
527
+ 2down
528
+ q3
529
+ Pump 1
530
+ Pump 2
531
+ 9p1
532
+ qp2data on the demand, we imitate this behaviour by using
533
+ a slightly perturbed version of the real demand used
534
+ in EPANET simulation during MPC calculations. The
535
+ perturbations are adapted from a real demand data set of
536
+ a small Danish facility. Normalized difference between the
537
+ average demand and the demand of a random day in data
538
+ set is added to EPANET demand to replicate estimated
539
+ demand. In each experiment a different day from the data
540
+ set is used, so the assumed estimated demand is different
541
+ each time.
542
+ The simulation results when the presented method is
543
+ applied to the EPANET model are given in Figure 4. The
544
+ initial tank levels are equal to h∗
545
+ Tday/∆t in the simulation.
546
+ The top plot shows the evolution of tank levels along
547
+ with the upper and lower thresholds. It is seen that the
548
+ thresholds are not violated and moreover tank levels are
549
+ not getting too close to them, which was the idea behind
550
+ exponential barrier functions. Both the real demand and
551
+ the assumed estimated demand of HZ and LZ are in the
552
+ figure below. Total applied pump flows and electricity
553
+ prices are in the following figures. The expected result is
554
+ pump flows being higher when electricity prices are low,
555
+ and lower when they are high, which seems to be the case
556
+ as can be seen in the plot. Pump flows drop significantly
557
+ when prices are at the peak and they reach their highest
558
+ value at the end of the day when prices are low. A more
559
+ aggressive controller can be obtained by picking a smaller
560
+ bi value for barrier functions at the expense of risking
561
+ constraint violation. In Figure 5, the tank level simulation
562
+ results and control inputs for different initial conditions
563
+ and different assumed estimated demands are given. The
564
+ electricity price profile is the same as before. It is seen that
565
+ the algorithm is able to control the network on various
566
+ cases while satisfying the constraints. Regardless of initial
567
+ tank levels, the pumping profiles have a similar profile:
568
+ high pump flows close to midnight and in the middle of
569
+ the day. The only exception is the bottom plot. In the
570
+ beginning, prices are low but pump flows are not high.
571
+ This can be attributed to water levels h1, h2 being close to
572
+ the upper thresholds and water demand being low in the
573
+ beginning.
574
+ The assumption that the optimal input sequences U(t)
575
+ would not diverge a lot from the one found in previous
576
+ step U(t − ∆t) is the reason we apply ut−∆t
577
+ 1
578
+ at time t if
579
+ the problem (5) is infeasible at time t. This assumption is
580
+ tested with initial conditions h1,2,3 = h∗
581
+ Tday/∆t. In figure
582
+ 6, total pump flow [1, 1]T ut
583
+ i, i = 0 · · · N(t) − 1 of the
584
+ found optimal input sequences U(t), t = 0, ∆t · · · Tday−∆t,
585
+ except when the problem were infeasible, are given. It can
586
+ be seen that ut−∆t
587
+ 1
588
+ is close to the ut
589
+ 0 for all t, which shows
590
+ that our assumption is valid at least for this experiment.
591
+ Finally, the ability of the algorithm to decrease economic
592
+ costs is tested with various initial conditions. For each
593
+ case, a demand follower pumping strategy is used as a
594
+ benchmark. The flow of the 2 pumps is adjusted with trial
595
+ and error for each demand follower such that the total flow
596
+ of the 2 pumps is equal to water demand at each time step
597
+ and tank levels satisfy the terminal constraint (13a). The
598
+ demand follower is a natural candidate to be a benchmark
599
+ method since providing as much water as demand is an
600
+ intuitive idea and the constraints in (5) can be satisfied
601
+ (a)
602
+ (b)
603
+ (c)
604
+ (d)
605
+ Fig. 4. Sample simulation. (a) evolution of tank levels
606
+ through 1 day with upper and lower level thresholds;
607
+ (b) real total demand of HZ and LZ used in EPANET
608
+ simulation and the demand used in MPC calculations;
609
+ (c) total flow provided by the 2 pumps; (d) electricity
610
+ price.
611
+ Proposed Method
612
+ Demand Follower
613
+ 0.5967
614
+ 1
615
+ 0.5745
616
+ 1
617
+ 0.5826
618
+ 1
619
+ 0.5558
620
+ 1
621
+ Table 1. Relative economic costs of the pro-
622
+ posed method and demand follower strategy
623
+ for various demand profiles
624
+ with manual adjustments of pump flows. The economic
625
+ costs are presented relatively in Table 1 As it is seen, the
626
+ proposed algorithm saves between 40% and 45% of the
627
+ cost with different demand profiles.
628
+ 5. CONCLUSION
629
+ We have presented a predictive control algorithm with a
630
+ periodic horizon for WDNs. The aim is to minimize the
631
+
632
+ 3.5
633
+ h1
634
+ h2
635
+ upper threshold
636
+ 3
637
+ h3
638
+ 3 upper threshold
639
+ Tank Levels
640
+ 1.5
641
+ 1
642
+ 0
643
+ 5
644
+ 10
645
+ 15
646
+ 20
647
+ 25140
648
+ 120
649
+ 100
650
+ 80
651
+ 60
652
+ 40
653
+ Real Demand
654
+ Known Demand
655
+ 20
656
+ 0
657
+ 5
658
+ 10
659
+ 15
660
+ 20
661
+ 25200
662
+ Total Pump Flow
663
+ 150
664
+ 100
665
+ 50
666
+ 0
667
+ 0
668
+ 5
669
+ 10
670
+ 15
671
+ 20
672
+ 251.2
673
+ Price
674
+ 0.8
675
+ lectricity
676
+ 0.6
677
+ 0.4
678
+ E
679
+ 0.2
680
+ 0
681
+ 0
682
+ 5
683
+ 10
684
+ 15
685
+ 20
686
+ 25
687
+ HoursFig. 5. Tank levels and pump flows for different initial
688
+ conditions
689
+ Fig. 6. Evolution of found input sequences U(t) through 1
690
+ day. It can be seen that the solutions remain close to
691
+ the initial optimal sequence U(0).
692
+ economic cost and satisfy the operational constraints. A
693
+ linear model is used to represent Randers WDN to increase
694
+ the chance of finding a solution to the problem (5) at
695
+ expense of a model-plant mismatch. Periodic horizon is
696
+ introduced to the predictive control formulation to keep
697
+ the resulting state trajectories around the optimal periodic
698
+ trajectory. Barrier functions are used to prevent constraint
699
+ violation since there is a model-plant mismatch.
700
+ The presented algorithm is tested on Randers WDN using
701
+ EPANET. It is shown in various situations that the
702
+ method is able to find an economic solution where pump
703
+ flows are adjusted according to electricity prices. Also,
704
+ it is shown that the system trajectories do not enter
705
+ dangerous zones introduced by barrier functions as long
706
+ as the predicted demand and the actual demand are
707
+ somewhat close.
708
+ As future work, we plan to work on theoretical guarantees
709
+ of the existence of solutions to the proposed method. Also,
710
+ the robustness of periodic horizon control of periodical
711
+ systems with barrier functions will be investigated.
712
+ REFERENCES
713
+ Abdelsalam, A.A. and Gabbar, H.A. (2021). Energy saving
714
+ and management of water pumping networks. Heliyon,
715
+ 7(8), e07820. doi:https://doi.org/10.1016/j.heliyon.20
716
+ 21.e07820.
717
+ Bagirov, A.M., Barton, A., Mala-Jetmarova, H., Nuaimat,
718
+ A.A., Ahmed, S.T., Sultanova, N., and Yearwood, J.
719
+ (2013). An algorithm for minimization of pumping costs
720
+ in water distribution systems using a novel approach to
721
+ pump scheduling. Math. Comput. Model., 57, 873–886.
722
+ Baunsgaard, K.M.H., Ravn, O., Kallesøe, C.S., and
723
+ Poulsen, N.K. (2016).
724
+ Mpc control of water supply
725
+ networks.
726
+ 2016 European Control Conference (ECC),
727
+ 1770–1775.
728
+ Berkel, F., Caba, S., Bleich, J., and Liu, S. (2018).
729
+ A
730
+ modeling and distributed mpc approach for water dis-
731
+ tribution networks. Control Engineering Practice.
732
+ Castro-Gama, M.E., Pan, Q., Lanfranchi, E.A., Jonoski,
733
+ A., and Solomatine, D.P. (2017). Pump scheduling for a
734
+ large water distribution network. milan, italy. Procedia
735
+ Engineering, 186, 436–443.
736
+ Eliades, D.G., Kyriakou, M., Vrachimis, S., and Polycar-
737
+ pou, M.M. (2016).
738
+ Epanet-matlab toolkit: An open-
739
+ source software for interfacing epanet with matlab. In
740
+ Proc. 14th International Conference on Computing and
741
+ Control for the Water Industry (CCWI), 8. The Nether-
742
+ lands. doi:10.5281/zenodo.831493.
743
+ Fiedler, F., Cominola, A., and Lucia, S. (2020).
744
+ Eco-
745
+ nomic nonlinear predictive control of water distribution
746
+ networks based on surrogate modeling and automatic
747
+ clustering. IFAC-PapersOnLine, 53, 16636–16643.
748
+ Ghaddar, B., Naoum-Sawaya, J., Kishimoto, A., Taheri,
749
+ N., and Eck, B. (2015).
750
+ A lagrangian decomposition
751
+ approach for the pump scheduling problem in water
752
+ networks. Eur. J. Oper. Res., 241, 490–501.
753
+ Kallesøe, C.S., Jensen, T.N., and Bendtsen, J.D. (2017).
754
+ Plug-and-play model predictive control for water supply
755
+ networks with storage. IFAC-PapersOnLine, 50, 6582–
756
+ 6587.
757
+ Lindell Ormsbee, Srini Lingireddy, D.C. (2009). Optimal
758
+ pump scheduling for water distribution systems. URL
759
+ http://www.uky.edu/WDST/PDFs/[73.3]%20Ormsbee%
760
+ 20Optimal%20Pump%20Scheduling%20Paper.pdf.
761
+ Pour, F.K., Puig, V., and Cembra˜no, G. (2019). Economic
762
+ mpc-lpv control for the operational management of
763
+ water distribution networks. IFAC-PapersOnLine.
764
+ Sharif, N., Haider, H., Farahat, A., Hewage, K., and Sadiq,
765
+ R. (2019). Water energy nexus for water distribution
766
+ systems: A literature review. Environmental Reviews,
767
+ 27. doi:10.1139/er-2018-0106.
768
+ Wang, Y., Alamo, T., Puig, V., and Cembra˜no, G. (2018).
769
+ Economic model predictive control with nonlinear con-
770
+ straint relaxation for the operational management of
771
+ water distribution networks. Energies, 11, 991.
772
+ Wang, Y., Yok, K.T., Wu, W., Simpson, A.R., Weyer, E.,
773
+ and Manzie, C. (2021).
774
+ Minimizing pumping energy
775
+ cost in real-time operations of water distribution sys-
776
+ tems using economic model predictive control. ArXiv,
777
+ abs/2010.07477.
778
+
779
+ 200
780
+ Total Pump Flow
781
+ 150
782
+ 100
783
+ 50
784
+ 0
785
+ 0
786
+ 5
787
+ 10
788
+ 15
789
+ 20
790
+ 253.5
791
+ h1
792
+ h2
793
+ upperthreshold
794
+ h3
795
+ 3 upper threshold
796
+ Tank Levels
797
+ 2.5
798
+ 1.5
799
+ 1
800
+ 0
801
+ 5
802
+ 10
803
+ 15
804
+ 20
805
+ 25250
806
+ Total Pump Flow
807
+ 200
808
+ 150
809
+ 100
810
+ 50
811
+ 0
812
+ 0
813
+ 5
814
+ 10
815
+ 15
816
+ 20
817
+ 253.5
818
+ h1
819
+ h2
820
+ upper threshold
821
+ 3
822
+ h3
823
+ upper threshold
824
+ Tank Levels
825
+ 1.5
826
+ 1
827
+ 0
828
+ 5
829
+ 10
830
+ 15
831
+ 20
832
+ 25200
833
+ Total Pump Flow
834
+ 150
835
+ 100
836
+ 50
837
+ 0
838
+ 0
839
+ 5
840
+ 10
841
+ 15
842
+ 20
843
+ 25200
844
+ U(0)
845
+ 150
846
+ Flow
847
+ 100
848
+ U(1)
849
+ 50
850
+ 0
851
+ 0
852
+ 5
853
+ 10
854
+ 15
855
+ 20
856
+ 25
857
+ Hours3.5
858
+ h1
859
+ h2
860
+ upperthreshold
861
+ 3
862
+ h3
863
+ 3 upper threshold
864
+ Tank Levels
865
+ 2.5
866
+ 1.5
867
+ 1
868
+ 0
869
+ 5
870
+ 10
871
+ 15
872
+ 20
873
+ 25250
874
+ Total Pump Flow
875
+ 200
876
+ 150
877
+ 100
878
+ 50
879
+ 0
880
+ 0
881
+ 5
882
+ 10
883
+ 15
884
+ 20
885
+ 253.5
886
+ h1
887
+ h2
888
+ upperthreshold
889
+ 3
890
+ h3
891
+ 3 upper threshold
892
+ Tank Levels
893
+ 1.5
894
+ 1
895
+ 0
896
+ 5
897
+ 10
898
+ 15
899
+ 20
900
+ 25
09FRT4oBgHgl3EQflTce/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,420 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf,len=419
2
+ page_content='Economic Predictive Control with Periodic Horizon for Water Distribution Networks Mirhan ¨Urkmez ∗ Carsten Kallesøe ∗ Jan Dimon Bendtsen ∗ John Leth ∗ ∗ Aalborg University, Fredrik Bajers Vej 7c, DK-9220 Aalborg, Denmark (e-mail: {mu,csk,dimon,jjl}@es.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
3
+ page_content='aau.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
4
+ page_content='dk) Abstract: This paper deals with the control of pumps in large-scale water distribution networks with the aim of minimizing economic costs while satisfying operational constraints.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
5
+ page_content=' Finding a control algorithm in combination with a model that can be applied in real-time is a challenging problem due to the nonlinearities presented by the pipes and the network sizes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
6
+ page_content=' We propose a predictive control algorithm with a periodic horizon.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
7
+ page_content=' The method provides a way for the economic operation of large water networks with a small linear model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
8
+ page_content=' Economic Predictive control with a periodic horizon and a terminal state constraint is constructed to keep the state trajectories close to an optimal periodic trajectory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
9
+ page_content=' Barrier terms are also included in the cost function to prevent constraint violations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
10
+ page_content=' The proposed method is tested on the EPANET implementation of the water network of a medium size Danish town (Randers) and shown to perform as intended under varying conditions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
11
+ page_content=' Keywords: Water distribution networks, Pump Scheduling, Predictive control, Periodic horizon, Economic model predictive control 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
12
+ page_content=' INTRODUCTION Water distribution networks (WDNs) deliver drinkable water from water sources to consumers using elements such as pumps, pipes, tanks etc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
13
+ page_content=' About 7% − 8% of the world’s energy is used for water production and distribu- tion (Sharif et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
14
+ page_content=', 2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
15
+ page_content=' Water pumps account for a sig- nificant part of the energy required for water distribution with their percentage ranging from 90% to 95% of the total (Abdelsalam and Gabbar, 2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
16
+ page_content=' There have been many works to schedule the operation of the pumps in WDNs with proper methods so as to reduce energy costs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
17
+ page_content=' However, pump scheduling is not an easy task because of the nonlinearities governing the network elements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
18
+ page_content=' The problem gets complicated with increasing network size.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
19
+ page_content=' Also, there are constraints to be satisfied such as limits on tank levels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
20
+ page_content=' In the literature, WDNs with both constant and variable speed pumps are studied extensively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
21
+ page_content=' The control input is turning on and off the pump for constant speed pumps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
22
+ page_content=' In Lindell Ormsbee (2009), a constant-speed pump schedul- ing problem is posed as an optimization problem in which the decision variables are the operation times of the pumps and the objective is the energy cost.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
23
+ page_content=' After observing that the optimal solution would be not running the pumps at all without the constraints, the authors try to find the solution closest to the origin that also complies with the constraints.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
24
+ page_content=' The proposed way to find such a solution is ⋆ This work is funded by Independent Research Fund Denmark (DFF).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
25
+ page_content=' We acknowledge Verdo company, Peter Nordahn, and Steffen Schmidt for providing us with the EPANET model and the network information.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
26
+ page_content=' using a Genetic Algorithm (GA).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
27
+ page_content=' In Bagirov et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
28
+ page_content=' (2013), the Hooke-Jeeves method is used for finding optimal pump operating times for a similar problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
29
+ page_content=' Then, network sim- ulation algorithms are used to check if the constraints are satisfied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
30
+ page_content=' In Castro-Gama et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
31
+ page_content=' (2017), binary decision variables are used to represent the opening and the closing of each pump.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
32
+ page_content=' The feasibility of the solution found with GA is checked with EPANET, a WDN modeling software, and a high cost is assigned to the infeasible solutions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
33
+ page_content=' The number of open pumps is also taken as the input to the system in some works, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
34
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
35
+ page_content=', Wang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
36
+ page_content=' (2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
37
+ page_content=' The problem is then solved using mixed-integer nonlinear programming.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
38
+ page_content=' In Berkel et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
39
+ page_content=' (2018), a network in which pressure zones are connected via constant speed pumps is considered.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
40
+ page_content=' Each pressure zone is treated as a subsys- tem and distributed model predictive control (DMPC) is applied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
41
+ page_content=' The flow rate of the pumps should be determined for networks with variable speed pumps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
42
+ page_content=' In Pour et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
43
+ page_content=' (2019), Linear Parameter Varying (LPV) system modeling is used to replace the nonlinear part of the network, and an Economic Model Predictive Control (EMPC) is applied on top of the LPV system to find the optimal flow rates.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
44
+ page_content=' In Kallesøe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
45
+ page_content=' (2017), a network structure with an elevated reservoir is considered.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
46
+ page_content=' Available data is used for the identification of a reduced system model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
47
+ page_content=' Then, EMPC is applied to the model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
48
+ page_content=' In the EMPC formulation, node pressures are not constrained.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
49
+ page_content=' It is assumed that the pressures would be in the accepted range because there is an elevated reservoir.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
50
+ page_content=' Relaxation of the original problem into a simpler one is commonly used because of the large network sizes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
51
+ page_content=' The relaxation is generally achieved by arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
52
+ page_content='13598v1 [eess.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
53
+ page_content='SY] 31 Jan 2023 approximating the nonlinear pipe equations with some sort of linear equations or inequalities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
54
+ page_content=' In Baunsgaard et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
55
+ page_content=' (2016), pipe equations are linearized around an operating point, and model predictive control (MPC) is applied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
56
+ page_content=' In Wang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
57
+ page_content=' (2018), an EMPC is applied to a network where the nonlinear pipe equations are relaxed into a set of linear inequalities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
58
+ page_content=' Before simplifying the system model, the network structure is also simplified in Fiedler et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
59
+ page_content=' (2020).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
60
+ page_content=' A hierarchical clustering method is used to represent the original network with a smaller one which originally had 378 junctions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
61
+ page_content=' A system model is derived from the simplified structure using a Deep Neural Network (DNN) structure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
62
+ page_content=' Lagrangian relaxation is used to approximate the original problem in Ghaddar et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
63
+ page_content=' (2015).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
64
+ page_content=' In this paper, a way for optimal pump scheduling of large- scale WDNs is presented.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
65
+ page_content=' To control the pumps, a linear model of the system is derived.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
66
+ page_content=' Then, a predictive control method with a periodic horizon is constructed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
67
+ page_content=' Barrier functions are utilized to prevent constraint violation due to the model-plant mismatch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
68
+ page_content=' With the introduction of the periodic horizon and the terminal state constraint, the chance of finding a feasible solution is increased by keeping trajectories close to an optimal periodic trajectory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
69
+ page_content=' The method is applied to a medium-sized Danish town’s network (Randers).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
70
+ page_content=' The outline of the rest of the paper is as follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
71
+ page_content=' The network model is given in Section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
72
+ page_content=' The proposed control method is explained in Section 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
73
+ page_content=' The experimental results are presented in Section 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
74
+ page_content=' The paper is concluded with final remarks in Section 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
75
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
76
+ page_content=' NETWORK MODEL A typical water distribution network consists of pipes, pumps, tanks, junction nodes and reservoirs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
77
+ page_content=' Water in the network flows from high hydraulic head to low head.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
78
+ page_content=' Hydraulic head is a measure of the fluid pressure and is equal to the height of a fluid in a static column at a point.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
79
+ page_content=' Hydraulic head loss occurring in a pipe can be approxi- mated by the Hazen-Williams Equation as ∆h = h1 − h2 = Kq|q|0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
80
+ page_content='852 (1) where K is the pipe resistance that depends on the physical features of a pipe such as diameter and length, q is the flow rate, and h1 and h2 are the heads at the two ends of the pipe.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
81
+ page_content=' At each node j, the mass conservation law is satisfied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
82
+ page_content=' It can be expressed as � i∈Nj qij = dj (2) where qij is the flow entering the node j from node i and dj is the demand at node j, which is the water requested by the user at node j.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
83
+ page_content=' The symbol Nj denotes the set of neighbor nodes of node j.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
84
+ page_content=' Note that qij is positive if the flow is from node i to the neighbor node j and negative vice versa.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
85
+ page_content=' Tanks are storage elements that provide water to the users.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
86
+ page_content=' In the network, tanks are elevated so that water can be pressurized enough to be delivered to the consumers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
87
+ page_content=' The change in the water level of a tank is dependent on the flow coming from neighbor nodes and can be written for the tank j as Aj ˙hj = � i∈Nj qij (3) where Aj is the cross-sectional area, hj is the level of the tank.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
88
+ page_content=' Tank levels change according to the flow passing through the pipes connected to the tanks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
89
+ page_content=' Those flows are determined by a set of pipe head loss equations (1), and mass balance equations (2) throughout the whole network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
90
+ page_content=' As Equation (1) is nonlinear, flow through pipes connected to the tanks are nonlinear functions fi of the demand at each node, tank levels, and the amount of water coming from the pumps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
91
+ page_content=' Explicit forms of those nonlinear functions could be derived if the vector d = [d1, d2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
92
+ page_content='..' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
93
+ page_content=']T containing the demands of all the nodes is known, which is not possible unless demand data for all nodes are available.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
94
+ page_content=' In our work, we assume that the total demand of the zones that are supplied by the pumps can be estimated through available data with time series analysis methods, but not require d vector to be known.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
95
+ page_content=' Since fi functions can not be found without d vector, we approximate them using linear models and write tank level change equations as ˙h(t) = Ah(t) + B1u(t) + B2da(t) (4) where h(t) ∈ Rn includes tank levels, A ∈ Rn×n, B1 ∈ Rn×m, B2 ∈ Rn×1 are constant system matrices and da(t) is the aggregated demand of controlled zone at time t, u(t) ∈ Rm is the input containing pump flows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
96
+ page_content=' The reason we chose a linear model is to increase the chance of finding a feasible solution for the controller which is posed as an optimization problem in the next section.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
97
+ page_content=' Although capturing the full dynamics of a large-scale network is not possible with a linear model, the proposed control method is designed to compensate for model inaccuracies and we have observed that it was enough to control the system while satisfying the constraints.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
98
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
99
+ page_content=' PERIODIC HORIZON CONTROL In this section, a predictive control algorithm for pump scheduling is presented to minimize the economical costs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
100
+ page_content=' The aim is to run the pumps when the electricity price is low and let tanks deliver water when the price is high while also satisfying input and output constraints.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
101
+ page_content=' The problem at time t is posed as min ut 0,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
102
+ page_content='ut 1···ut N(t)−1 N(t)−1 � j=0 J(ht j,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
103
+ page_content=' ut j) (5a) ht j = Adht j−1 + Bd1ut j−1 + Bd2da(j − 1) (5b) ht 0 = h(t) (5c) ut j ∈ U ⊆ Rm (5d) ht j ∈ H ⊆ Rn (5e) ht N(t) ∈ Htf ⊆ Rn (5f) where J(ht j,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
104
+ page_content=' ut j) is the economic cost function,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
105
+ page_content=' ht = [ht 1 · · · ht N(t)] ∈ Rn×N(t) is the predicted future states,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
106
+ page_content=' ut j is the input vector,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
107
+ page_content=' N(t) is the prediction horizon,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
108
+ page_content=' U ⊆ Rm and H ⊆ Rn denotes the input and state constraints respectively and Htf ⊆ Rn is the terminal state set.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
109
+ page_content=' The continuous system (4) is discretized and (5b) is obtained.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
110
+ page_content=' The optimization problem (5) is solved at every time step separated by ∆t and the first term ut 0 of the optimal input sequence ut = [ut 0 · · · ut N(t)−1] ∈ Rm×N(t) is applied to the system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
111
+ page_content=' Input constraints come from the physical limitations and working principles of the pumps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
112
+ page_content=' A pump can not provide water in the opposite direction and it can deliver a maxi- mum amount of water per unit of time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
113
+ page_content=' These conditions are expressed as U = {[u1, · · · um] ∈ Rm | 0 ≤ u1 ≤ u1, · · · 0 ≤ um ≤ um} (6) where u1 · · · um are upper flow limits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
114
+ page_content=' Tank levels are also constrained so that there is always enough water in the tanks in case of an emergency and there is no overflow of water.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
115
+ page_content=' The set H can be defined as H = {[h1, · · · h2] ∈ Rn | ˜h1 ≤ h1 ≤ h1, · · · ˜hn ≤ hn ≤ hn} (7) The cost function includes the electricity costs of the pumps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
116
+ page_content=' The power provided to the network by the pump i is equal to qpi(pout i − pin i ), where qpi is the pump flow, pi out and pi in are the outlet and inlet pressures of the pump i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
117
+ page_content=' The inlet pressures pin = [pin 1 , pin 2 ] are the pressures of the related reservoirs and are assumed to be constant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
118
+ page_content=' The outlet pressures pout = [pout 1 , pout 2 ] are given as the output of the linear model pout(t) = Aph(t) + Bpu(t) (8) where Ap and Bp are found using system identification on data generated by the EPANET model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
119
+ page_content=' Electricity cost at time t is then found by multiplying total power consumption u(t)T (pout(t) − pin(t)) with the electricity price c(t).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
120
+ page_content=' We acknowledge a certain degree of model-plant mismatch by using a linear model (4) to represent the whole network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
121
+ page_content=' This causes actual states h(t) to be different than the predicted states ht.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
122
+ page_content=' We know that the predicted states satisfy the state constraints (7) since they are the solution to the optimization problem 5, but the actual states might violate them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
123
+ page_content=' To ensure the satisfaction of the state constraints with the model-plant mismatch, we introduce new terms to the cost function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
124
+ page_content=' First, we rewrite state constraints (7) as Ci(h) ≤ 0, i = 0, 1, · · · 2 × n − 1 (9) where C0(h) = ˜h1 −h1 and the rest of the Ci functions are chosen in a similar manner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
125
+ page_content=' The cost function terms are then defined as Jhi(h) = eai(Ci(h)+bi) i = 0, 1, · · · 2 × n − 1 (10) where ai, bi ∈ R>0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
126
+ page_content=' This can be seen as an exponential barrier function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
127
+ page_content=' The parameters ai, bi determine a danger- ous region close to the boundaries of the state constraints where cost function Jhi attains high values.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
128
+ page_content=' The predicted optimal state trajectories ht do not enter the dangerous region if possible because of the high cost values in the dangerous region.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
129
+ page_content=' Then, the actual states h(t) do not violate the state constraints (7) assuming the di��erence between the predicted state and the actual state is small.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
130
+ page_content=' If the state trajectory enters one of the dangerous regions at any step due to the model-plant mismatch, then the cost function will try to drive the trajectory out of the region.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
131
+ page_content=' ∆t N(t)∆t N(t + ∆t)∆t h(t) h(t + ∆t) ht 1 ut 0 ut+∆t 0 ht+∆t ht Br(h∗ Tday/∆t) Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
132
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
133
+ page_content=' Predicted state trajectories ht, ht+∆t at times t, t + ∆t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
134
+ page_content=' Sampling time ∆t, prediction horizons N(t), N(t + ∆t) and the applied inputs ut 0, ut+∆t 0 are shown.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
135
+ page_content=' The true state h(t + ∆t) and the predicted state ht 1 are indicated to emphasize the deviation from the prediction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
136
+ page_content=' The terminal set Br(h∗ Tday/∆t) is also illustrated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
137
+ page_content=' The overall cost function includes both the electricity expense term and the constraint barrier functions and it can be expressed as J(h(t), u(t)) = c(t)u(t)T (pout(t)−pin(t))+ 2×n−1 � i=0 Jhi(h(t)) (11) Both electricity price c(t) and total water demand da(t) signals can be viewed as consisting of a periodic signal with a period of 1 day and a relatively small deviation signal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
138
+ page_content=' This can be leveraged to find a feasible controller.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
139
+ page_content=' Suppose a sequence of inputs can be found for some initial tank levels such that levels after 1 day are equal to initial levels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
140
+ page_content=' In that case, the problem after 1 day is the same as in the beginning assuming deviation signals of the electricity price and the demand are zero, hence they are periodic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
141
+ page_content=' Then, the input sequence from the previous day could be applied and produce the same path for tank levels.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
142
+ page_content=' Taking into account the deviation signals and supposing that a solution exists such that levels after 1 day are close to initial levels, the input sequence from the previous day could be a good point of start to search for a feasible solution if the map from the initial conditions and the demand profile to the optimal input sequences is continuous.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
143
+ page_content=' Therefore, we choose a terminal state constraint for the end of each day to increase the chance of finding a feasible solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
144
+ page_content=' Now, the remaining problem is to decide which tank levels should the trajectories turn back to at the end of each day.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
145
+ page_content=' We define the optimal periodic trajectory of the system as the solution of (u∗, h∗) = arg min ui,hi (Tday/∆t)−1 � i=0 J(hi, ui) (12a) hi = Adhi−1 + Bd1ui−1 + Bd2d∗ a(i − 1) (12b) ui ∈ U ⊆ Rm (12c) hi ∈ H ⊆ Rn (12d) h0 = hTday/∆t (12e) where Tday is the duration of a whole day, d∗ a is the average daily demand profile obtained from the past measurements.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
146
+ page_content=' The resulting state trajectory h∗ = [h∗ 0 · · · h∗ Tday/∆t] ∈ Rn×(Tday/∆t+1) is the optimal periodic trajectory because of the constraint (12e).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
147
+ page_content=' The terminal set Htf and the prediction horizon N(t) is chosen to make tank levels at the end of each day close to h∗ Tday/∆t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
148
+ page_content=' At High Zone Low Zone Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
149
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
150
+ page_content=' Water Distribution Network of Randers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
151
+ page_content=' The pump- ing stations to be controlled are shown in red.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
152
+ page_content=' Tanks are shown with a ’T’ shaped symbol in yellow.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
153
+ page_content=' any time t, t + N(t)∆t should be equal to the end of the day.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
154
+ page_content=' Htf and N(t) could be written as Htf = Br(h∗ Tday/∆t) (13a) N(t) = (Tday − t mod Tday)/∆t (13b) where Br(h∗ Tday/∆t) is the open ball centered at h∗ Tday/∆t with radius r.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
155
+ page_content=' Note that N(t) changes so that t + N(t)∆t is the end of the day for all t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
156
+ page_content=' With these definitions, the condition (13a) will translate to tank levels at the end of the day being close to the final point in optimal periodic trajectory h∗ Tday/∆t as shown in Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
157
+ page_content=' Therefore, not only chance of finding a feasible solution is increased but also the solutions are kept around the optimal periodic trajectory h∗.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
158
+ page_content=' If the problem (5) becomes infeasible at any time step t, we apply the second term of the input sequence from the previous step ut−∆t 1 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
159
+ page_content=' The reason behind this choice is as follows: If we apply the optimal control input ut−∆t 0 to the network model (4) at time t − ∆t, then the optimal sequence in the next time step will be ut = [ut−∆t 1 · · ut−∆t N(t−∆t)−1] following Bellman’s principle of optimality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
160
+ page_content=' Then, at time t, ut−∆t 1 will be applied to the system as calculated at t − ∆t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
161
+ page_content=' Assuming the model- plant mismatch is small enough, ut−∆t 1 is still a good input candidate if the problem is infeasible at time t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
162
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
163
+ page_content=' APPLICATION The presented method is applied to WDN of Randers, a Danish city, which is shown in Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
164
+ page_content=' The network con- sists of 4549 nodes and 4905 links connecting them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
165
+ page_content=' There are 8 pumping stations in the network, 6 of which are shown in the figure whereas the other 2 are stationed where tanks are placed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
166
+ page_content=' The goal is to derive the schedules for 2 of the pumping stations while other pumps are already working according to some predetermined strategies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
167
+ page_content=' The stations to be controlled are shown in red in the figure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
168
+ page_content=' Their task is to deliver water mostly to the High Zone (HZ) and Low Zone (LZ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
169
+ page_content=' However, connections exist between HZ-LZ and the rest of the city, so we can not think of the system as composed of isolated networks entirely.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
170
+ page_content=' There are also 3 tanks in the HZ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
171
+ page_content=' While 2 of them are directly connected via pipes, the third one stands alone as shown in the figure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
172
+ page_content=' The overall structure of the Randers WDN with tanks and pumps to be controlled are given in Figure 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
173
+ page_content=' There are 3 water tanks in the network, 2 of which have been connected Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
174
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
175
+ page_content=' Structure of the WDN.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
176
+ page_content=' with a pipe directly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
177
+ page_content=' The tank level changes can be written by applying the mass conservation law (3) to the tanks in Figure 3 as A1 ˙h1 = q1down + q1up + qinter (14a) = f1(h1, h2, h3, qp1, qp2, d), A2 ˙h2 = q2down + q2up − qinter (14b) = f2(h1, h2, h3, qp1, qp2, d), A3 ˙h3 = q3 = f3(h1, h2, h3, qp1, qp2, d), (14c) where d is the vector containing the demands of all the nodes, qp1, qp2 are the pump flows, A1, A2, A3 are the cross sectional areas of the tanks and f1, f2, f3 are nonlinear flow functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
178
+ page_content=' Water levels at the two connected tanks are almost equal h1 ≈ h2 all the time since the pipe connecting respective tanks is big enough to oppose the water flows coming from neighbor nodes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
179
+ page_content=' That enables us to consider h1, h2 together as (A1 + A2)˙h1,2 ≈ q1down + q2down + qup = f1 + f2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
180
+ page_content=' (15) We have used the EPANET model of the network to generate the data required for approximating f1 + f2 and f3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
181
+ page_content=' The model is simulated with various tank level initial conditions and flow rates of 2 pumping stations to be controlled.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
182
+ page_content=' The control laws for the remaining pumping stations are already defined in the EPANET model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
183
+ page_content=' Then, the linear model (4) is fitted to simulation data using least squares.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
184
+ page_content=' The state variables for the model are h(t) = [h1,2(t), h3(t)] ∈ R2 and the inputs are u(t) = [qp1(t), qp2(t)] ∈ R2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
185
+ page_content=' The total demand of High and Low Zone is used as aggregated demand da in the model since mainly those areas are supplied by the controlled pumps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
186
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
187
+ page_content='1 Simulation Results The proposed control method is tested on EPANET model of Randers water network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
188
+ page_content=' Epanet-Matlab toolkit Eliades et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
189
+ page_content=' (2016) is used to set the flow of the 2 pumps at each time step and simulate the network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
190
+ page_content=' The remaining pumps are controlled with rule-based control laws that are previously defined on EPANET.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
191
+ page_content=' The parameters of exponential barrier functions Jhi are chosen as ai = 80, bi = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
192
+ page_content='3 for all i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
193
+ page_content=' It is assumed that the electricity prices are known in advance during the test.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
194
+ page_content=' Tank levels h1, h2 have a maximum value of 3m while h3 has 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
195
+ page_content='8m.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
196
+ page_content=' Tanks are required to be at least half full.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
197
+ page_content=' Maximum pump flows are set to 100.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
198
+ page_content=' Sampling time ∆t is set to 1 hour in the experiments, so the control input is recalculated at each hour.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
199
+ page_content=' We assume that total demand da(t) of HZ and LZ can be estimated up to 1 day from available data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
200
+ page_content=' Although we do not have historical qup qiup q2up h1 h2 h3 qinter q1down 2down q3 Pump 1 Pump 2 9p1 qp2data on the demand, we imitate this behaviour by using a slightly perturbed version of the real demand used in EPANET simulation during MPC calculations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
201
+ page_content=' The perturbations are adapted from a real demand data set of a small Danish facility.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
202
+ page_content=' Normalized difference between the average demand and the demand of a random day in data set is added to EPANET demand to replicate estimated demand.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
203
+ page_content=' In each experiment a different day from the data set is used, so the assumed estimated demand is different each time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
204
+ page_content=' The simulation results when the presented method is applied to the EPANET model are given in Figure 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
205
+ page_content=' The initial tank levels are equal to h∗ Tday/∆t in the simulation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
206
+ page_content=' The top plot shows the evolution of tank levels along with the upper and lower thresholds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
207
+ page_content=' It is seen that the thresholds are not violated and moreover tank levels are not getting too close to them, which was the idea behind exponential barrier functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
208
+ page_content=' Both the real demand and the assumed estimated demand of HZ and LZ are in the figure below.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
209
+ page_content=' Total applied pump flows and electricity prices are in the following figures.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
210
+ page_content=' The expected result is pump flows being higher when electricity prices are low, and lower when they are high, which seems to be the case as can be seen in the plot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
211
+ page_content=' Pump flows drop significantly when prices are at the peak and they reach their highest value at the end of the day when prices are low.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
212
+ page_content=' A more aggressive controller can be obtained by picking a smaller bi value for barrier functions at the expense of risking constraint violation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
213
+ page_content=' In Figure 5, the tank level simulation results and control inputs for different initial conditions and different assumed estimated demands are given.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
214
+ page_content=' The electricity price profile is the same as before.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
215
+ page_content=' It is seen that the algorithm is able to control the network on various cases while satisfying the constraints.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
216
+ page_content=' Regardless of initial tank levels, the pumping profiles have a similar profile: high pump flows close to midnight and in the middle of the day.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
217
+ page_content=' The only exception is the bottom plot.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
218
+ page_content=' In the beginning, prices are low but pump flows are not high.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
219
+ page_content=' This can be attributed to water levels h1, h2 being close to the upper thresholds and water demand being low in the beginning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
220
+ page_content=' The assumption that the optimal input sequences U(t) would not diverge a lot from the one found in previous step U(t − ∆t) is the reason we apply ut−∆t 1 at time t if the problem (5) is infeasible at time t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
221
+ page_content=' This assumption is tested with initial conditions h1,2,3 = h∗ Tday/∆t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
222
+ page_content=' In figure 6, total pump flow [1, 1]T ut i, i = 0 · · · N(t) − 1 of the found optimal input sequences U(t), t = 0, ∆t · · · Tday−∆t, except when the problem were infeasible, are given.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
223
+ page_content=' It can be seen that ut−∆t 1 is close to the ut 0 for all t, which shows that our assumption is valid at least for this experiment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
224
+ page_content=' Finally, the ability of the algorithm to decrease economic costs is tested with various initial conditions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
225
+ page_content=' For each case, a demand follower pumping strategy is used as a benchmark.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
226
+ page_content=' The flow of the 2 pumps is adjusted with trial and error for each demand follower such that the total flow of the 2 pumps is equal to water demand at each time step and tank levels satisfy the terminal constraint (13a).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
227
+ page_content=' The demand follower is a natural candidate to be a benchmark method since providing as much water as demand is an intuitive idea and the constraints in (5) can be satisfied (a) (b) (c) (d) Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
228
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
229
+ page_content=' Sample simulation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
230
+ page_content=' (a) evolution of tank levels through 1 day with upper and lower level thresholds;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
231
+ page_content=' (b) real total demand of HZ and LZ used in EPANET simulation and the demand used in MPC calculations;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
232
+ page_content=' (c) total flow provided by the 2 pumps;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
233
+ page_content=' (d) electricity price.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
234
+ page_content=' Proposed Method Demand Follower 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
235
+ page_content='5967 1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
236
+ page_content='5745 1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
237
+ page_content='5826 1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
238
+ page_content='5558 1 Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
239
+ page_content=' Relative economic costs of the pro- posed method and demand follower strategy for various demand profiles with manual adjustments of pump flows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
240
+ page_content=' The economic costs are presented relatively in Table 1 As it is seen, the proposed algorithm saves between 40% and 45% of the cost with different demand profiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
241
+ page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
242
+ page_content=' CONCLUSION We have presented a predictive control algorithm with a periodic horizon for WDNs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
243
+ page_content=' The aim is to minimize the 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
244
+ page_content='5 h1 h2 upper threshold 3 h3 3 upper threshold Tank Levels 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
245
+ page_content='5 1 0 5 10 15 20 25140 120 100 80 60 40 Real Demand Known Demand 20 0 5 10 15 20 25200 Total Pump Flow 150 100 50 0 0 5 10 15 20 251.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
246
+ page_content='2 Price 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
247
+ page_content='8 lectricity 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
248
+ page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
249
+ page_content='4 E 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
250
+ page_content='2 0 0 5 10 15 20 25 HoursFig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
251
+ page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
252
+ page_content=' Tank levels and pump flows for different initial conditions Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
253
+ page_content=' 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
254
+ page_content=' Evolution of found input sequences U(t) through 1 day.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
255
+ page_content=' It can be seen that the solutions remain close to the initial optimal sequence U(0).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
256
+ page_content=' economic cost and satisfy the operational constraints.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
257
+ page_content=' A linear model is used to represent Randers WDN to increase the chance of finding a solution to the problem (5) at expense of a model-plant mismatch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
258
+ page_content=' Periodic horizon is introduced to the predictive control formulation to keep the resulting state trajectories around the optimal periodic trajectory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
259
+ page_content=' Barrier functions are used to prevent constraint violation since there is a model-plant mismatch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
260
+ page_content=' The presented algorithm is tested on Randers WDN using EPANET.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
261
+ page_content=' It is shown in various situations that the method is able to find an economic solution where pump flows are adjusted according to electricity prices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
262
+ page_content=' Also, it is shown that the system trajectories do not enter dangerous zones introduced by barrier functions as long as the predicted demand and the actual demand are somewhat close.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
263
+ page_content=' As future work, we plan to work on theoretical guarantees of the existence of solutions to the proposed method.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
264
+ page_content=' Also, the robustness of periodic horizon control of periodical systems with barrier functions will be investigated.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
265
+ page_content=' REFERENCES Abdelsalam, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
266
+ page_content='A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
267
+ page_content=' and Gabbar, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
268
+ page_content='A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
269
+ page_content=' (2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
270
+ page_content=' Energy saving and management of water pumping networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
271
+ page_content=' Heliyon, 7(8), e07820.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
272
+ page_content=' doi:https://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
273
+ page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
274
+ page_content='1016/j.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
275
+ page_content='heliyon.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
276
+ page_content='20 21.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
277
+ page_content='e07820.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
278
+ page_content=' Bagirov, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
279
+ page_content='M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
280
+ page_content=', Barton, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
281
+ page_content=', Mala-Jetmarova, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
282
+ page_content=', Nuaimat, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
283
+ page_content='A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
284
+ page_content=', Ahmed, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
285
+ page_content='T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
286
+ page_content=', Sultanova, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
287
+ page_content=', and Yearwood, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
288
+ page_content=' (2013).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
289
+ page_content=' An algorithm for minimization of pumping costs in water distribution systems using a novel approach to pump scheduling.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
290
+ page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
291
+ page_content=' Comput.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
292
+ page_content=' Model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
293
+ page_content=', 57, 873–886.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
294
+ page_content=' Baunsgaard, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
295
+ page_content='M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
296
+ page_content='H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
297
+ page_content=', Ravn, O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
298
+ page_content=', Kallesøe, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
299
+ page_content='S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
300
+ page_content=', and Poulsen, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
301
+ page_content='K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
302
+ page_content=' (2016).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
303
+ page_content=' Mpc control of water supply networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
304
+ page_content=' 2016 European Control Conference (ECC), 1770–1775.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
305
+ page_content=' Berkel, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
306
+ page_content=', Caba, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
307
+ page_content=', Bleich, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
308
+ page_content=', and Liu, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
309
+ page_content=' (2018).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
310
+ page_content=' A modeling and distributed mpc approach for water dis- tribution networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
311
+ page_content=' Control Engineering Practice.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
312
+ page_content=' Castro-Gama, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
313
+ page_content='E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
314
+ page_content=', Pan, Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
315
+ page_content=', Lanfranchi, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
316
+ page_content='A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
317
+ page_content=', Jonoski, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
318
+ page_content=', and Solomatine, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
319
+ page_content='P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
320
+ page_content=' (2017).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
321
+ page_content=' Pump scheduling for a large water distribution network.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
322
+ page_content=' milan, italy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
323
+ page_content=' Procedia Engineering, 186, 436–443.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
324
+ page_content=' Eliades, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
325
+ page_content='G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
326
+ page_content=', Kyriakou, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
327
+ page_content=', Vrachimis, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
328
+ page_content=', and Polycar- pou, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
329
+ page_content='M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
330
+ page_content=' (2016).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
331
+ page_content=' Epanet-matlab toolkit: An open- source software for interfacing epanet with matlab.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
332
+ page_content=' In Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
333
+ page_content=' 14th International Conference on Computing and Control for the Water Industry (CCWI), 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
334
+ page_content=' The Nether- lands.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
335
+ page_content=' doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
336
+ page_content='5281/zenodo.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
337
+ page_content='831493.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
338
+ page_content=' Fiedler, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
339
+ page_content=', Cominola, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
340
+ page_content=', and Lucia, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
341
+ page_content=' (2020).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
342
+ page_content=' Eco- nomic nonlinear predictive control of water distribution networks based on surrogate modeling and automatic clustering.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
343
+ page_content=' IFAC-PapersOnLine, 53, 16636–16643.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
344
+ page_content=' Ghaddar, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
345
+ page_content=', Naoum-Sawaya, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
346
+ page_content=', Kishimoto, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
347
+ page_content=', Taheri, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
348
+ page_content=', and Eck, B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
349
+ page_content=' (2015).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
350
+ page_content=' A lagrangian decomposition approach for the pump scheduling problem in water networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
351
+ page_content=' Eur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
352
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
353
+ page_content=' Oper.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
354
+ page_content=' Res.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
355
+ page_content=', 241, 490–501.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
356
+ page_content=' Kallesøe, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
357
+ page_content='S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
358
+ page_content=', Jensen, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
359
+ page_content='N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
360
+ page_content=', and Bendtsen, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
361
+ page_content='D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
362
+ page_content=' (2017).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
363
+ page_content=' Plug-and-play model predictive control for water supply networks with storage.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
364
+ page_content=' IFAC-PapersOnLine, 50, 6582– 6587.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
365
+ page_content=' Lindell Ormsbee, Srini Lingireddy, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
366
+ page_content='C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
367
+ page_content=' (2009).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
368
+ page_content=' Optimal pump scheduling for water distribution systems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
369
+ page_content=' URL http://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
370
+ page_content='uky.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
371
+ page_content='edu/WDST/PDFs/[73.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
372
+ page_content='3]%20Ormsbee% 20Optimal%20Pump%20Scheduling%20Paper.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
373
+ page_content='pdf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
374
+ page_content=' Pour, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
375
+ page_content='K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
376
+ page_content=', Puig, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
377
+ page_content=', and Cembra˜no, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
378
+ page_content=' (2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
379
+ page_content=' Economic mpc-lpv control for the operational management of water distribution networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
380
+ page_content=' IFAC-PapersOnLine.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
381
+ page_content=' Sharif, N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
382
+ page_content=', Haider, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
383
+ page_content=', Farahat, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
384
+ page_content=', Hewage, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
385
+ page_content=', and Sadiq, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
386
+ page_content=' (2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
387
+ page_content=' Water energy nexus for water distribution systems: A literature review.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
388
+ page_content=' Environmental Reviews, 27.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
389
+ page_content=' doi:10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
390
+ page_content='1139/er-2018-0106.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
391
+ page_content=' Wang, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
392
+ page_content=', Alamo, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
393
+ page_content=', Puig, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
394
+ page_content=', and Cembra˜no, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
395
+ page_content=' (2018).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
396
+ page_content=' Economic model predictive control with nonlinear con- straint relaxation for the operational management of water distribution networks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
397
+ page_content=' Energies, 11, 991.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
398
+ page_content=' Wang, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
399
+ page_content=', Yok, K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
400
+ page_content='T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
401
+ page_content=', Wu, W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
402
+ page_content=', Simpson, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
403
+ page_content='R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
404
+ page_content=', Weyer, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
405
+ page_content=', and Manzie, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
406
+ page_content=' (2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
407
+ page_content=' Minimizing pumping energy cost in real-time operations of water distribution sys- tems using economic model predictive control.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
408
+ page_content=' ArXiv, abs/2010.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
409
+ page_content='07477.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
410
+ page_content=' 200 Total Pump Flow 150 100 50 0 0 5 10 15 20 253.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
411
+ page_content='5 h1 h2 upperthreshold h3 3 upper threshold Tank Levels 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
412
+ page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
413
+ page_content='5 1 0 5 10 15 20 25250 Total Pump Flow 200 150 100 50 0 0 5 10 15 20 253.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
414
+ page_content='5 h1 h2 upper threshold 3 h3 upper threshold Tank Levels 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
415
+ page_content='5 1 0 5 10 15 20 25200 Total Pump Flow 150 100 50 0 0 5 10 15 20 25200 U(0) 150 Flow 100 U(1) 50 0 0 5 10 15 20 25 Hours3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
416
+ page_content='5 h1 h2 upperthreshold 3 h3 3 upper threshold Tank Levels 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
417
+ page_content='5 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
418
+ page_content='5 1 0 5 10 15 20 25250 Total Pump Flow 200 150 100 50 0 0 5 10 15 20 253.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
419
+ page_content='5 h1 h2 upperthreshold 3 h3 3 upper threshold Tank Levels 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
420
+ page_content='5 1 0 5 10 15 20 25' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/09FRT4oBgHgl3EQflTce/content/2301.13598v1.pdf'}
0dFQT4oBgHgl3EQfDjUj/content/2301.13234v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:51249b5fc41f9a97c8e7566e185f3285d951856eb881e30e68b2c8df14fa5957
3
+ size 1568062
0dFQT4oBgHgl3EQfDjUj/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ddc8cc46935c44fd582a200a8b60689e2a774e4a804602ae618b31c3c694599a
3
+ size 1249100
2tFRT4oBgHgl3EQfnjcF/content/tmp_files/2301.13605v1.pdf.txt ADDED
@@ -0,0 +1,1888 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ IMSc/2023/02
2
+ Aspects of the map from Exact RG to Holographic RG in
3
+ AdS and dS
4
+ Pavan Dharanipragada ∗1, 2, Semanti Dutta †3, and B. Sathiapalan ‡1,2
5
+ 1Institute of Mathematical Sciences,CIT Campus, Tharamani, Chennai
6
+ 600113, India
7
+ 2Homi Bhabha National Institute, Training School Complex, Anushakti
8
+ Nagar, Mumbai 400085, India
9
+ 3Centre for High Energy Physics, Indian Institute of Science, C.V. Raman
10
+ Avenue, Bangalore 560012, India
11
+ February 1, 2023
12
+ Abstract
13
+ In earlier work the evolution operator for the exact RG equation was mapped to a
14
+ field theory in Euclidean AdS. This gives a simple way of understanding AdS/CFT. We
15
+ explore aspects of this map by studying a simple example of a Schroedinger equation for
16
+ a free particle with time dependent mass. This is an analytic continuation of an ERG
17
+ like equation. We show for instance that it can be mapped to a harmonic oscillator. We
18
+ show that the same techniques can lead to an understanding of dS/CFT too.
19
+ Contents
20
+ 1
21
+ Introduction
22
+ 3
23
+ 2
24
+ Mapping Free Particle with Time Dependent Mass to a Harmonic Oscillator
25
+ 3
26
+ 2.1
27
+ Mapping Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
28
+ 4
29
+ 2.1.1
30
+ Lorentzian Case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
31
+ 4
32
+ 2.1.2
33
+ Euclidean Case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
34
+ 5
35
+ 2.2
36
+ Mapping Schrodinger Equations . . . . . . . . . . . . . . . . . . . . . . . . . . .
37
+ 6
38
+ 2.2.1
39
+ Lorentzian . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
40
+ 6
41
+ 2.2.2
42
+ Euclidean . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
43
+ 7
44
+ 2.2.3
45
+ Analytic Continuation
46
+ . . . . . . . . . . . . . . . . . . . . . . . . . . . .
47
+ 7
48
+ 2.3
49
+ Semiclassical Treatment
50
+ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
51
+ 8
52
+ 2.3.1
53
+ Using Harmonic Oscillator Formulation . . . . . . . . . . . . . . . . . . .
54
+ 8
55
+ 2.3.2
56
+ Using ERG formulation
57
+ . . . . . . . . . . . . . . . . . . . . . . . . . . .
58
+ 9
59
60
61
62
+ 1
63
+ arXiv:2301.13605v1 [hep-th] 31 Jan 2023
64
+
65
+ 3
66
+ ERG to field theory in dS
67
+ 10
68
+ 3.1
69
+ Analytic Continuation
70
+ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
71
+ 10
72
+ 3.1.1
73
+ Analytic Continuation of the Action
74
+ . . . . . . . . . . . . . . . . . . . .
75
+ 10
76
+ 3.2
77
+ Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
78
+ 11
79
+ 3.2.1
80
+ Mapping from Quantum Mechanics . . . . . . . . . . . . . . . . . . . . .
81
+ 11
82
+ 3.2.2
83
+ Mapping from ERG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
84
+ 13
85
+ 3.3
86
+ Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
87
+ 13
88
+ 3.4
89
+ dS-CFT correspondence
90
+ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
91
+ 14
92
+ 4
93
+ Obtaining Bulk field from ERG
94
+ 16
95
+ 5
96
+ Summary and Conclusions
97
+ 20
98
+ 2
99
+
100
+ 1
101
+ Introduction
102
+ It has been recognized from the early days of the AdS/CFT correspondence [1, 2, 3, 4] that
103
+ the radial coordinate of the AdS space behaves like a scale for the boundary field theory. This
104
+ observation follows directly from the form of the AdS metric in Poincare coordinates:
105
+ ds2 = R2dz2 + dxµdxµ
106
+ z2
107
+ (1.1)
108
+ This leads naturally to the idea of the “Holographic” renormalization group: If the AdS/CFT
109
+ conjecture is correct then radial evolution in the bulk must correspond to RG evolution in the
110
+ boundary theory [[9]-[25]].
111
+ In [5, 6, 7] a mathematically precise connection was made between the exact RG (ERG)
112
+ equation of a boundary theory and holographic RG equations of a bulk theory in Euclidean
113
+ AdS (EAdS) space. It was shown that the ERG evolution operator of the boundary theory
114
+ can be mapped by a field redefinition to a functional integral of a field theory in the bulk
115
+ AdS space. This guarantees the existence of an EAdS bulk dual of a boundary CFT without
116
+ invoking the AdS/CFT conjecture 1
117
+ Given that the crucial ingredient in this connection with ERG is the form of the metric
118
+ (1.1) with the factor z2 in the denominator, one is naturally led to ask if similar mappings can
119
+ be done for the dS metric
120
+ ds2 = L2−dη2 + dxµdxµ
121
+ η2
122
+ (1.2)
123
+ It too has a scaling form. The difference is that the scale is a time like coordinate - so RG
124
+ evolution seems to be related to a real time evolution. In fact this metric is related to the
125
+ EAdS metric by an analytic continuation: iη = z, iL = R. Thus real time evolution should be
126
+ related to RG evolution by analytic continuation. These points have been discussed in many
127
+ of the early papers on de Sitter holography [[30]-[43]], (see also [44] for more recent work and
128
+ further references.)
129
+ This paper is an attempt to address the question of whether the mapping of [5] can be
130
+ generalised to include for instance dS-CFT. One is also led to explore other kinds of mapping
131
+ in an effort to understand the nature of this map better. In [5] the map was first introduced in
132
+ the case of 0-dimensional field theory in the boundary, which gave a one dimensional bulk field
133
+ theory or equivalently a point particle quantum mechanical system. In this paper therefore we
134
+ start by exploring maps for point particle quantum mechanical systems. In Section 2 we show
135
+ that the dynamics of a free particle with a time dependent mass can be mapped to a harmonic
136
+ oscillator. The Euclidean version of this is relevant for the ERG equation. In Section 3 the case
137
+ of mapping a field theory ERG equation to de Sitter space is considered by starting with the
138
+ analytically continued form. This complements the discussion of earlier papers where dS-CFT
139
+ is described as an analytic continuation of EAdS-CFT. In Section 4 we give some examples
140
+ of two point functions obtained using the techniques of [5] being analytically continued to dS
141
+ space. Section 5 contains a summary and conclusions.
142
+ 2
143
+ Mapping Free Particle with Time Dependent Mass to
144
+ a Harmonic Oscillator
145
+ In this section we reconsider the construction of [5] where the action for a free field theory
146
+ in D + 1 dimension with a non standard kinetic term was mapped to a free field in AdSD+1.
147
+ 1There is still the open question of the locality properties of interaction terms in this bulk field theory. For
148
+ the case of the O(N) model some aspects of this issue were discussed in [7].
149
+ 3
150
+
151
+ When D = 0 this is just a particle: we will map a free particle with time dependent mass to a
152
+ harmonic oscillator.
153
+ 2.1
154
+ Mapping Actions
155
+ 2.1.1
156
+ Lorentzian Case
157
+ Consider the following action. It defines an evolution operator for free particle (with time
158
+ dependent mass) wave function.
159
+ S = 1
160
+ 2
161
+ � tf
162
+ ti
163
+ dt M(t) ˙x2
164
+ (2.3)
165
+ Ψ(x,t) =
166
+
167
+ dxi
168
+
169
+ x(ti)
170
+ =
171
+ xi
172
+ x(t)
173
+ =
174
+ x
175
+ Dx ei 1
176
+ 2
177
+ � t
178
+ ti M(t′) ˙x2dt′Ψ(xi, ti)
179
+ (2.4)
180
+ Let x(t) = f(t)y(t) with f 2(t) =
181
+ 1
182
+ M(t). Substitute this in (2.3).
183
+ S = 1
184
+ 2
185
+
186
+ dt ( ˙y2 + (
187
+ ˙f
188
+ f )2y2 + 2
189
+ ˙f
190
+ f ˙yy)
191
+ = 1
192
+ 2
193
+
194
+ dt [ ˙y2 + (d ln f
195
+ dt )2y2 − ( d2
196
+ dt2 ln f)y2] + 1
197
+ 2
198
+
199
+ dt d
200
+ dt(d ln f
201
+ dt y2)
202
+ Thus, upto the boundary term, the action is
203
+ S = 1
204
+ 2
205
+
206
+ dt [ ˙y2 + eln f( d2
207
+ dt2e− ln f)y2]
208
+ (2.5)
209
+ Now choose
210
+ eln f( d2
211
+ dt2e− ln f) = −ω2
212
+ 0
213
+ (2.6)
214
+ and we get
215
+ ¯S = 1
216
+ 2
217
+
218
+ dt [ ˙y2 − ω2
219
+ 0y2]
220
+ (2.7)
221
+ which is the action for a harmonic oscillator. And we define ¯Ψ by absorbing the contribution
222
+ from the boundary term:
223
+ e− 1
224
+ 2 i d ln f(t)
225
+ dt
226
+ y2(t)Ψ(f(t)y, t)
227
+
228
+ ��
229
+
230
+ ¯Ψ(y,t)
231
+ =
232
+
233
+ dyi
234
+
235
+ y(ti)
236
+ =
237
+ yi
238
+ y(t)
239
+ =
240
+ y
241
+ Dy ei 1
242
+ 2
243
+ � t
244
+ ti[ ˙y2−ω2
245
+ 0y2]dt′ e− 1
246
+ 2 i d ln f(ti)
247
+ dt
248
+ y2(ti)Ψ(f(ti)yi, ti)
249
+
250
+ ��
251
+
252
+ ¯Ψ(yi,ti)
253
+ (2.8)
254
+ ¯S thus defines an evolution operator for the harmonic oscillator wave function ¯Ψ. f satisfies
255
+ d2
256
+ dt2
257
+ 1
258
+ f = −ω2
259
+ 0
260
+ 1
261
+ f
262
+ (2.9)
263
+ y obeys the same equation.
264
+ Thus we can take
265
+ 1
266
+ f = a cos ω0(t − t0)
267
+ (2.10)
268
+ 4
269
+
270
+ which requires
271
+ M(t) = a2cos2ω0(t − t0)
272
+ Note that one can do more general cases if one is willing to reparametrize time [26, 27].
273
+ Thus let
274
+ dτ =
275
+ dt
276
+ Mf 2
277
+ (2.11)
278
+ Then one gets (2.7), (2.9) and (2.10) with τ replacing t. In terms of t, (2.9) becomes
279
+ d
280
+ dt(M ˙f) =
281
+ ω2
282
+ 0
283
+ Mf 3
284
+ (2.12)
285
+ Very interestingly, as pointed out in [26], it is clear from (2.7) that the energy of the
286
+ harmonic oscillator given by
287
+ E = 1
288
+ 2( ˙y2 + ω2
289
+ 0y2)
290
+ is a conerved quantity. In terms of the original variables this is
291
+ E = 1
292
+ 2(( ˙xf − x ˙f
293
+ f 2
294
+ )2 + ω2
295
+ 0(x
296
+ f )2)
297
+ These are known as Ermakov-Lewis invariants - see [26] for references to the literature on these
298
+ invariants - and we see a nice interpretation for them.
299
+ 2.1.2
300
+ Euclidean Case
301
+ In the Euclidean case the functional integral is
302
+ Ψ(x,τ) =
303
+
304
+ dxi
305
+
306
+ x(τi)
307
+ =
308
+ xi
309
+ x(τ)
310
+ =
311
+ x
312
+ Dx e− 1
313
+ 2
314
+ � τ
315
+ τi M(τ ′) ˙x2dτ ′Ψ(xi, τi)
316
+ (2.13)
317
+ Ψ in this case is not a wave function. It was shown in [5] that the evolution operator for
318
+ a D-dimensional Euclidean field theory is of this form if we take ME(τ) = −
319
+ 1
320
+ ˙G(τ) and D = 0.
321
+ In this case Ψ can be taken to be e−H[xi,τi] where H is a Hamiltonian or Euclideanized action.
322
+ Alternatively (depending on what ME(τ) is) it can also be eW[J] - a generating functional or
323
+ partition function.
324
+ Setting x = fy with f 2 =
325
+ 1
326
+ ME(τ), one goes through the same manipulations but replacing
327
+ (2.6) by
328
+ eln f( d2
329
+ dτ 2e− ln f) = +ω2
330
+ 0
331
+ (2.14)
332
+ and (2.7),(2.8) and (2.9) are replaced by
333
+ ¯S = 1
334
+ 2
335
+
336
+ dτ [ ˙y2 + ω2
337
+ 0y2]
338
+ (2.15)
339
+ ¯Ψ(y, τ) =
340
+
341
+ dyi
342
+
343
+ y(τi)
344
+ =
345
+ yi
346
+ y(τ)
347
+ =
348
+ y
349
+ Dy e− 1
350
+ 2
351
+ � τ
352
+ τi[ ˙y2+ω2
353
+ 0y2]dτ ′ ¯Ψ(yi, τi)
354
+ (2.16)
355
+ and
356
+ d2
357
+ dτ 2
358
+ 1
359
+ f = ω2
360
+ 0
361
+ 1
362
+ f
363
+ (2.17)
364
+ 5
365
+
366
+ The solutions are of the form
367
+ f = A sech ω0(τ − τ0)
368
+ (2.18)
369
+ which means ME(τ) =
370
+ 1
371
+ A2cosh2ω0(τ − τ0).
372
+ (2.16) has a τ independent action. In this case there are well known physical interpretations
373
+ for the Euclidean theory. The evolution operator, K(y, τ; yi, 0), where
374
+ K(y, τ; yi, 0) =
375
+
376
+ y(0)
377
+ =
378
+ yi
379
+ y(τ)
380
+ =
381
+ y
382
+ Dy e− 1
383
+ 2
384
+ � τ
385
+ 0 [ ˙y2+ω2
386
+ 0y2]dτ ′
387
+ (2.19)
388
+ is the density operator of a QM harmonic oscillator in equilibrium at temperature specified by
389
+ β = τ.
390
+ Less well known is that the evolution operator of the Fokker-Planck equation in stochastic
391
+ quantization can be written in the form given in (2.16). ¯Ψ is then related to the probability
392
+ function (see, for instance, [29] for a nice discussion).
393
+ In the next section we discuss the mappings directly for the Schroedinger equation, rather
394
+ than its evolution operator.
395
+ 2.2
396
+ Mapping Schrodinger Equations
397
+ 2.2.1
398
+ Lorentzian
399
+ Let us consider the same mapping from the point of view of the Schroedinger equation for the
400
+ free particle wave function.
401
+ Schrodinger’s equation for the free particle is
402
+ i∂Ψ(x, t)
403
+ ∂t
404
+ = −
405
+ 1
406
+ 2M(t)
407
+ ∂2Ψ(x, t)
408
+ ∂x2
409
+ (2.20)
410
+ Ψ given by (2.4) obeys this equation.
411
+ We make a coordinate transformation and a wave function redefinition. Both can be un-
412
+ derstood as canonical transformations [28].
413
+ Let x = f(t)y with f 2 =
414
+ 1
415
+ M(t). We take f, M to be dimensionless. We treat this as a 0 + 1
416
+ dimensional field theory where x has the canonical dimension of − 1
417
+ 2. So x = L
418
+ 1
419
+ 2X would define
420
+ a dimensionless X. L is some length scale.
421
+ ∂Ψ(x, t)
422
+ ∂t
423
+ = ∂Ψ(f(t)y, t)
424
+ ∂t
425
+
426
+ ˙fy
427
+ f
428
+ ∂Ψ(f(t)y, t)
429
+ ∂y
430
+ Let
431
+ Ψ(f(t)y, t) = e− 1
432
+ 2 αy2 ¯Ψ(y, t)
433
+ ∂Ψ
434
+ ∂t = e− 1
435
+ 2 αy2(−1
436
+ 2 ˙αy2 + ∂
437
+ ∂t)¯Ψ(y, t)
438
+ −i
439
+ ˙fy
440
+ f
441
+ ∂Ψ(f(t)y, t)
442
+ ∂y
443
+ = ie− 1
444
+ 2 αy2(α
445
+ ˙f
446
+ f y2 −
447
+ ˙f
448
+ f y ∂
449
+ ∂y)¯Ψ(y, t)
450
+ 1
451
+ M
452
+ 1
453
+ 2
454
+ ∂2
455
+ ∂x2Ψ = 1
456
+ 2
457
+ ∂2
458
+ ∂y2e− 1
459
+ 2 αy2 ¯Ψ = (1
460
+ 2e− 1
461
+ 2 αy2(α2y2 − 2αy ∂
462
+ ∂y − α + ∂2
463
+ ∂y2)¯Ψ)
464
+ Collecting all the terms one finds that (2.20) becomes:
465
+ i∂ ¯Ψ
466
+ ∂t = (1
467
+ 2i ˙α − iα
468
+ ˙f
469
+ f − 1
470
+ 2α2)y2 ¯Ψ + (i
471
+ ˙f
472
+ f y ∂
473
+ ∂y + αy ∂
474
+ ∂y)¯Ψ + 1
475
+ 2αΨ − 1
476
+ 2
477
+ ∂2
478
+ ∂y2 ¯Ψ
479
+ (2.21)
480
+ 6
481
+
482
+ We choose α = −i
483
+ ˙f
484
+ f to get rid of the second term on the RHS. We get
485
+ i∂ ¯Ψ
486
+ ∂t = [(1
487
+ 2
488
+ d2 ln f
489
+ dt2
490
+ − 1
491
+ 2(d ln f
492
+ dt )2)y2 + 1
493
+ 2α − 1
494
+ 2
495
+ ∂2
496
+ ∂y2]¯Ψ
497
+ As before it can be rewritten as
498
+ i∂ ¯Ψ
499
+ ∂t = 1
500
+ 2[−eln f( d2
501
+ dt2e− ln f)y2 − ∂2
502
+ ∂y2 + α]¯Ψ
503
+ (2.22)
504
+ Set
505
+ d2
506
+ dt2
507
+ 1
508
+ f = −ω2
509
+ 0
510
+ 1
511
+ f
512
+ again as before to get
513
+ i∂ ¯Ψ
514
+ ∂t = 1
515
+ 2[− ∂2
516
+ ∂y2 + ω2
517
+ 0y2 + α]¯Ψ
518
+ (2.23)
519
+ The term 1
520
+ 2α generates a scale transformation e− 1
521
+ 2 ln f(t)
522
+ f(ti) for ¯Ψ.
523
+ 2.2.2
524
+ Euclidean
525
+ The Euclidean version is
526
+ ∂Ψ(x, τ)
527
+ ∂τ
528
+ =
529
+ 1
530
+ 2ME(τ)
531
+ ∂2Ψ(x, τ)
532
+ ∂x2
533
+ (2.24)
534
+ As mentioned above, this is of the form of a Polchinski ERG equation (with
535
+ 1
536
+ 2ME(τ) = − ˙G(τ))
537
+ for H defined by Ψ ≡ e−H. Going through the same steps one finds, with f 2 =
538
+ 1
539
+ ME(τ),
540
+ ∂ ¯Ψ
541
+ ∂τ = (1
542
+ 2 ˙α − α
543
+ ˙f
544
+ f + 1
545
+ 2α2)y2 ¯Ψ + (
546
+ ˙f
547
+ f y ∂
548
+ ∂y − αy ∂
549
+ ∂y)¯Ψ − 1
550
+ 2αΨ + 1
551
+ 2
552
+ ∂2
553
+ ∂y2 ¯Ψ
554
+ (2.25)
555
+ the condition α =
556
+ ˙f
557
+ f and the equation becomes
558
+ ∂ ¯Ψ
559
+ ∂t = 1
560
+ 2[− eln f( d2
561
+ dt2e− ln f)
562
+
563
+ ��
564
+
565
+ = ω2
566
+ 0
567
+ y2 + ∂2
568
+ ∂y2 − α]¯Ψ
569
+ (2.26)
570
+ Thus
571
+ ∂ ¯Ψ
572
+ ∂τ = 1
573
+ 2[ ∂2
574
+ ∂y2 − ω2
575
+ 0y2 − α]¯Ψ
576
+ (2.27)
577
+ And f obeys
578
+ d2
579
+ dt2
580
+ 1
581
+ f = ω2
582
+ 0
583
+ 1
584
+ f
585
+ (2.28)
586
+ This is a Euclidean harmonic oscillator equation.
587
+ Various physical interpretations of this
588
+ equation were given in the last section. The term α in (2.27) provides a multiplicative scaling
589
+ e− 1
590
+ 2
591
+ � t
592
+ ti dt′ ∂t′ ln f = ( f(ti)
593
+ f(t) )
594
+ 1
595
+ 2 of ¯Ψ.
596
+ 2.2.3
597
+ Analytic Continuation
598
+ If we set it = τ, (2.20) becomes (2.24) provided M(−iτ) = ME(τ). Similarly (2.23) becomes
599
+ (2.27). Note that in (2.23) α = −i
600
+ ˙f
601
+ f . This analytically continues to
602
+ ˙f
603
+ f as required.
604
+ 7
605
+
606
+ 2.3
607
+ Semiclassical Treatment
608
+ Most of the AdS/CFT calculations invoke large N to do a semiclassical treatment of the bulk
609
+ theory- one can evaluate boundary Green’s function. The analysis in [5, 7] did this for the
610
+ ERG treatment - the evolution of the Wilson action/Generating functional were calculated. In
611
+ [32] a semiclassical treatment was used to obtain the ground state wave function in dS space.
612
+ For completeness we do the same for the simple systems discussed in this paper. This
613
+ illustrates the connection between ERG and dS.
614
+ 2.3.1
615
+ Using Harmonic Oscillator Formulation
616
+ Since
617
+ Ψ(x, t) =
618
+
619
+ dxi
620
+
621
+ x(ti)
622
+ =
623
+ xi
624
+ x(t)
625
+ =
626
+ x
627
+ Dx ei
628
+ � t
629
+ ti L(x(t′), ˙x(t′),t′)dt′Ψ(xi, ti)
630
+ (2.29)
631
+ solves Schroedinger’s equation. For the Harmonic Oscillator
632
+ L = 1
633
+ 2( ˙x2 − ω0x2)
634
+ (2.30)
635
+ for the Lorentzian version.
636
+ One can evaluate the path integral semiclassically by plugging in a classical solution with
637
+ some regular boundary condition. We choose x = 0 at t = −∞. The initial state wave function
638
+ is thus a delta function. Classical solution of the EOM is of the form
639
+ x(t) = ae−iω0t + a∗eiω0t
640
+ Since a should annihilate the vacuum state in the far past we would like the solution to look
641
+ like
642
+ x(t) → eiω0t
643
+ in order to ensure that we are in the ground state.
644
+ x(t) = xfe−iω0(tf−t)
645
+ (2.31)
646
+ At t = −∞ we assume that the solution vanishes. This is justified by an infinitesimal rotation
647
+ t → t + iϵt. Evaluated on this solution, the action becomes
648
+ Sclassical = 1
649
+ 2x(t) ˙x(t)|
650
+ tf
651
+ −∞
652
+ We get
653
+ Sclassical = 1
654
+ 2iω0x2
655
+ f
656
+ (2.32)
657
+ Plugging (2.31) into (2.29) we obtain
658
+ Ψ(xf) ≈ e− 1
659
+ 2 ω0x2
660
+ f
661
+ (2.33)
662
+ If we repeat this for the free field in dS space we get the ground state wave functional [32].
663
+ 8
664
+
665
+ 2.3.2
666
+ Using ERG formulation
667
+ For the Euclidean version, we set it = τ and we write
668
+ Ψ(x, τ) =
669
+
670
+ dxi
671
+
672
+ x(τi)
673
+ =
674
+ xi
675
+ x(τ)
676
+ =
677
+ x
678
+ Dx e−
679
+ � τ
680
+ τi LE(x(τ ′), ˙x(τ ′),τ ′)dτ ′Ψ(xi, τi)
681
+ (2.34)
682
+ It is well known that if one does the semiclassical analysis for the Euclidean case with general
683
+ boundary condition one recovers the thermal density matrix. This is for the time independent
684
+ Hamiltonian - such as the harmonic oscillator. We will not do this here. Instead we proceed
685
+ directly to the ERG interpretation of the calculation. Here the Hamiltonian is time dependent.
686
+ In [5] the analysis given below was applied to W[J]. We repeat it here for the Wilson action.
687
+ Our starting action in this case is (Note ˙G < 0):
688
+ S = −1
689
+ 2
690
+ � τf
691
+ τi
692
+ ˙x2
693
+ ˙G
694
+ (2.35)
695
+ EOM is given by,
696
+ ∂τ( ˙x
697
+ ˙G
698
+ ) = 0
699
+ ˙x
700
+ ˙G
701
+ = b =⇒ x = bG + c
702
+ We choose G so that it vanishes at τ = ∞ .
703
+ For the Euclidean Harmonic oscillator case G has then to be
704
+ G = − 1
705
+ ω0
706
+ (tanh ω(τ − τi) − 1)
707
+ Also x → 0 as τ → ∞. So c = 0.
708
+ x = bG
709
+ (2.36)
710
+ x(τ) = − b
711
+ ω0
712
+ (tanh ω(τ − τi) − 1)
713
+ On shell
714
+ S = −1
715
+ 2
716
+ � τf
717
+ τi
718
+
719
+ d
720
+ dτ (x ˙x
721
+ G )
722
+ = 1
723
+ 2(x(τf) − x(τi))b = 1
724
+ 2[x(τf)x(τf)
725
+ G(τf)
726
+ − x(τi)x(τi)
727
+ G(τi)
728
+ ]
729
+ If we add this change to the initial Wilson action 1
730
+ 2
731
+ x(τi)x(τi)
732
+ G(τi)
733
+ we get the final Wilson action
734
+ Hf = 1
735
+ 2
736
+ x(τf)x(τf)
737
+ G(τf)
738
+ If, for instance, we are interested in evaluating H semiclassically at τ = τi.
739
+ x(τi) = b
740
+ ω0
741
+ =⇒ b = x(τi)ω0
742
+ x(τ) = −x(0)(tanh ω(τ − τi) − 1)
743
+ ˙x(τ) = −x(0)ω0sech2ω0(τ − τi)
744
+ 9
745
+
746
+ The classical action is
747
+ Sclassical = 1
748
+ 2ω0x(τi)2
749
+ Thus since G(τi) =
750
+ 1
751
+ ω0, H evaluated semiclassically is:
752
+ H[x, τi] ≈ 1
753
+ 2ω0x(τi)2
754
+ (2.37)
755
+ Then
756
+ Ψ = e−H[x,τi] = e−ω0x(τi)2
757
+ which coincides with the ground state wave function of the harmonic oscillator. This is essen-
758
+ tially the Hartle Hawking prescription [45]. This also motivates the dS-CFT correspondence
759
+ statement [30, 31, 32] that ΨdS = ZCFT
760
+ This concludes the discussion of the mapping of ERG equation to a Euclidean harmonic
761
+ oscillator. In higher dimensions this gives free field theory in flat space. We now return to the
762
+ case of interest, namely dS space.
763
+ 3
764
+ ERG to field theory in dS
765
+ We first map the system to Euclidean AdS. Then analytically continue and obtain dS results.
766
+ Alternatively, one can analytically continue the ERG equation to the Schroedinger equation
767
+ (when D = 0 this is a free particle with a time dependent mass) and then map to de Sitter
768
+ space. This is all exactly as was done for the harmonic oscillator.
769
+ 3.1
770
+ Analytic Continuation
771
+ The EAdS metric in Poincare coordinates is
772
+ ds2 = R2[dxidxi + dz2
773
+ z2
774
+ ]
775
+ (3.38)
776
+ The dS metric in Poincare coordinates is:
777
+ ds2 = L2[dxidxi − dη2
778
+ η2
779
+ ]
780
+ (3.39)
781
+ The metrics are related by analytic continuation:
782
+ iη = z,
783
+ iL = R
784
+ 3.1.1
785
+ Analytic Continuation of the Action
786
+ The action generically is
787
+ S = −1
788
+ 2
789
+
790
+ dD+1x√g[gµν∂µφ∂νφ + m2φ2]
791
+ (3.40)
792
+ 10
793
+
794
+ de Sitter
795
+ In this case we write √−g since g is negative: g = −( L2
796
+ η2 )D+1. Also g00 = − η2
797
+ L2
798
+ and gij = δij η2
799
+ L2.
800
+ Thus
801
+ SdS =
802
+
803
+ dDx
804
+ � ∞
805
+ 0
806
+ dη (L
807
+ η )D+1[ η2
808
+ L2∂ηφ∂ηφ − η2
809
+ L2∂iφ∂iφ − m2φ2]
810
+ (3.41)
811
+ In momentum space:
812
+ SdS =
813
+
814
+ dDp
815
+ (2π)D
816
+ � ∞
817
+ 0
818
+ dη (L
819
+ η )D+1[ η2
820
+ L2∂ηφ(p)∂ηφ(−p) − ( η2
821
+ L2p2 + m2)φ(p)φ(−p)]
822
+ (3.42)
823
+ The functional integral description of the quantum mechanical evolution operator for the
824
+ wave functional of the fields in dS space-time is
825
+ ¯Ψ[φ(p), t] =
826
+
827
+ dφi(p)
828
+
829
+ φ(p, ti)
830
+ =
831
+ φi(p)
832
+ φ(p, t)
833
+ =
834
+ φ(p)
835
+ Dφ(p, t) ei 1
836
+ 2
837
+ � t
838
+ ti[ ˙φ(p,t′)2−ω2
839
+ 0φ(p,t′)2]dt′ ¯Ψ[φi(p), ti]
840
+ (3.43)
841
+ Euclidean Anti de Sitter
842
+ g = ( R2
843
+ z2 )D+1. Also g00 = z2
844
+ R2 and gij = δij z2
845
+ R2.
846
+ SEAdS =
847
+
848
+ dDx
849
+ � ∞
850
+ 0
851
+ dz (R
852
+ z )D+1[ z2
853
+ R2∂zφ∂zφ + z2
854
+ R2∂iφ∂iφ + m2φ2]
855
+ (3.44)
856
+ In momentum space
857
+ SEAdS =
858
+
859
+ dDp
860
+ (2π)D
861
+ � ∞
862
+ 0
863
+ dz (R
864
+ z )D+1[ z2
865
+ R2∂zφ(p)∂zφ(−p) + ( z2
866
+ R2p2 + m2)φ(p)φ(−p)]
867
+ (3.45)
868
+ If we set iη = z and iL = R we see that the functional integral (3.43) becomes
869
+ ¯Ψ[φ(p), t] =
870
+
871
+ dφi(p)
872
+
873
+ φ(p, ti)
874
+ =
875
+ φi(p)
876
+ φ(p, t)
877
+ =
878
+ φ(p)
879
+ Dφ(p, t) e− 1
880
+ 2
881
+ � t
882
+ ti[ ˙φ(p,t′)2+ω2
883
+ 0φ(p,t′)2]dt′ ¯Ψ[φi(p), ti] (3.46)
884
+ In holograhic RG this is interpreted as a Euclidean functional integral giving the evolution in
885
+ the radial direction. ¯Ψ is to be interpreted as e−SI[φ(p),t] where SI is the Wilson action. It was
886
+ shown in [5] (see below) that this can be obtained by mapping an ERG evolution operator.
887
+ The dS functional integral (3.43) above is thus an analytically continued version of this.
888
+ 3.2
889
+ Mapping
890
+ 3.2.1
891
+ Mapping from Quantum Mechanics
892
+ Let us go back to Section (2.1) and consider the mapping from the Quantum Mechanics of a
893
+ free particle with time dependent mass. We think of it as a 0 + 1 dimensional field theory.
894
+ M(t) is taken to be dimensionless and x has canonical dimensions of − 1
895
+ 2.
896
+ S = 1
897
+ 2
898
+
899
+ dt M(t) ˙x2
900
+ (3.47)
901
+ (In the ERG version M(t) = 1
902
+ ˙G)
903
+ The path integral is
904
+
905
+ Dx eiS
906
+ (3.48)
907
+ 11
908
+
909
+ As before x(t) = f(t)y(t) with f 2(t) =
910
+ 1
911
+ M(t). Substitute this in (3.47) and go through the
912
+ same steps to obtain:
913
+ S = 1
914
+ 2
915
+
916
+ dt [ ˙y2 + eln f( d2
917
+ dt2e− ln f)y2]
918
+ (3.49)
919
+ Now choose
920
+ eln f( d2
921
+ dt2e− ln f) = −( η2
922
+ L2p2 + m2)
923
+ (3.50)
924
+ where η = Le
925
+ t
926
+ L. to obtain SdS
927
+ SdS = 1
928
+ 2
929
+
930
+ dt [ ˙y2 − ( η2
931
+ L2p2 + m2)y2]
932
+ = 1
933
+ 2
934
+
935
+ dη (L
936
+ η )[ η2
937
+ L2∂ηy∂ηy − ( η2
938
+ L2p2 + m2)y2]
939
+ (3.51)
940
+ p, m here are just some parameters. When D > 0 they will stand for momentum and mass
941
+ of the field respectively. So starting from a free particle with time dependent mass we obtain
942
+ the free field action in de Sitter space dSD+1 with D = 0.
943
+ Schroedinger Equation:
944
+ i∂Ψ(x, t)
945
+ ∂t
946
+ = −
947
+ 1
948
+ 2M(t)
949
+ ∂2Ψ(x, t)
950
+ ∂x2
951
+ (3.52)
952
+ Using the same mapping as in Section (2.2.1), x = fy
953
+ Ψ(f(t)y, t) = e− 1
954
+ 2 αy2 ¯Ψ(y, t)
955
+ with α = −i
956
+ ˙f
957
+ f one obtains
958
+ i∂ ¯Ψ
959
+ ∂t = [(1
960
+ 2
961
+ d2 ln f
962
+ dt2
963
+ − 1
964
+ 2(d ln f
965
+ dt )2)y2 + 1
966
+ 2α − 1
967
+ 2
968
+ ∂2
969
+ ∂y2]¯Ψ
970
+ Using (3.50) this becomes
971
+ i η
972
+ L
973
+ ∂ ¯Ψ
974
+ ∂η = [−1
975
+ 2
976
+ ∂2
977
+ ∂y2 + 1
978
+ 2( η2
979
+ L2p2 + m2)y2 + 1
980
+ 2α]¯Ψ
981
+ (3.53)
982
+ If we construct the Schroedinger equation corresponding to the action (3.51) one obtains
983
+ i η
984
+ L
985
+ ∂ ¯Ψ
986
+ ∂η = [−1
987
+ 2
988
+ ∂2
989
+ ∂y2 + 1
990
+ 2( η2
991
+ L2p2 + m2)y2]¯Ψ
992
+ (3.54)
993
+ which barring the field independent term α is exactly the same as (3.53). This term as we
994
+ have seen provides an overall field independent scaling for all wave functions. It is a consequence
995
+ of the ordering ambiguity in going from classical to quantum treatment. (3.54) (or its extension
996
+ to D > 0) describes the quantum mechanical time evolution of the matter field wave functional
997
+ in de Sitter space.
998
+ 12
999
+
1000
+ 3.2.2
1001
+ Mapping from ERG
1002
+ Action
1003
+ We now consider the Euclidean version of (3.47), which is the Polchinski ERG
1004
+ equation. This is what was done in [5]. Thus we replace M(t) by − 1
1005
+ ˙G.
1006
+ S = −1
1007
+ 2
1008
+
1009
+ dτ ˙x2
1010
+ ˙G
1011
+ (3.55)
1012
+ The path integral is ( ˙G < 0)
1013
+
1014
+ Dx e
1015
+ 1
1016
+ 2
1017
+
1018
+
1019
+ ˙x2
1020
+ ˙G
1021
+ (3.56)
1022
+ which can be obtained from (3.52) by setting it = τ. We take z = Re
1023
+ τ
1024
+ R If we let iη = z, iL =
1025
+ R, it = τ then this can be obtained from the corresponding Minkowski case.
1026
+ As before x(τ) = f(τ)y(τ) with f 2(τ) = ˙G. Substitute this in (3.55) and go through the
1027
+ same steps to obtain:
1028
+ S = 1
1029
+ 2
1030
+
1031
+ dτ [ ˙y2 + eln f( d2
1032
+ dτ 2e− ln f)y2]
1033
+ (3.57)
1034
+ Now choose
1035
+ eln f( d2
1036
+ dτ 2e− ln f) = ( z2
1037
+ R2p2 + m2)
1038
+ (3.58)
1039
+ where z = Re
1040
+ τ
1041
+ R. to obtain SEAdS
1042
+ SEAdS =
1043
+
1044
+ dz (R
1045
+ z )[ z2
1046
+ R2∂zy∂zy + ( z2
1047
+ R2p2 + m2)y2]
1048
+ (3.59)
1049
+ ERG Equation
1050
+ By analogy with the Schroedinger equation we can see that (3.56) is the
1051
+ evolution operator corresponding to the ERG equation
1052
+ ∂Ψ(x, τ)
1053
+ ∂τ
1054
+ = −1
1055
+ 2
1056
+ ˙G∂2Ψ(x, τ)
1057
+ ∂x2
1058
+ (3.60)
1059
+ By the same series of transformations as in the de Sitter case, but using (3.58), one obtains
1060
+ z
1061
+ R
1062
+ ∂ ¯Ψ
1063
+ ∂z = [1
1064
+ 2
1065
+ ∂2
1066
+ ∂y2 − ( z2
1067
+ R2p2 + m2)y2 − 1
1068
+ 2α]¯Ψ
1069
+ (3.61)
1070
+ with α =
1071
+ ˙f
1072
+ f generating an overall scale transformation for ¯Ψ.
1073
+ In the ERG context ¯Ψ
1074
+ represents eW[J] upto a quadratic term. This equation is the holographic RG equation in the
1075
+ AdS/CFT correspondence for an elementary scalar field [5].
1076
+ 3.3
1077
+ Connections
1078
+ Let us summarize the various connections obtained above.
1079
+ • We start with the quantum mechanics of a free particle having a time dependent mass.
1080
+ The Schroedinger equation (SE) for this is (2.20). Analytical continuation of this equation
1081
+ (generalized to higher dimensions) gives the Polchinski ERG equation (2.24).
1082
+ • The free particle SE (2.20) can be mapped to a SE for a harmonic oscillator (2.23). The
1083
+ ERG equation (2.24) can similarly be mapped to a Euclidean harmonic oscillator (2.27)-
1084
+ analytically continued version of (2.23).
1085
+ 13
1086
+
1087
+ • The evolution operators for the above equations are defined in terms of path integrals
1088
+ over some actions. The same mapping function f maps the corresponding actions to each
1089
+ other. Thus the evolution operator for the free particle Schroedinger equation is given by
1090
+ the action in (2.3) which is mapped to a harmonic oscillator action (2.7). The analytical
1091
+ continuation of these are the Euclidean ERG evolution operator (2.13) mapped to a
1092
+ harmonic oscillator Hamiltonian (2.16). These steps are summarized in the flow diagram
1093
+ in Figure 1.
1094
+ • The mapping function f was originally chosen in [5] to map the free particle ERG action
1095
+ (3.55) to an action for free fields in EAdS0+1 given in (3.60). The analytical continuation
1096
+ of this problem to real time gives us an action in dS0+1 (3.51).
1097
+ • One can also repeat these steps for the corresponding “wave” equations. The Polchinski
1098
+ ERG equation for eW[J] gets mapped to an equation in EAdS for eW[J] which is nothing but
1099
+ the holographic RG equations. Analytically continuing this, the Schroedinger equation
1100
+ for a wave functional is mapped to a Schroedinger equation for wave functionals of fields
1101
+ in dS.
1102
+ These are summarized in the figure below (Fig.2). The analytic continuation can be done
1103
+ before the map with f is applied or after as shown in the figure. It can be done both for the
1104
+ actions as well as for the equations.
1105
+ ERG
1106
+ Equation
1107
+ Holographic RG:
1108
+ Radial evolution
1109
+ in EAdS
1110
+ Schroedinger
1111
+ Equation
1112
+ Real time QM
1113
+ evolution
1114
+ In dS
1115
+ Map “f”
1116
+ Map “f”
1117
+ Analytic
1118
+ Continuation
1119
+ Analytic
1120
+ Continuation
1121
+ ERG
1122
+ Equation
1123
+ Evolution equation
1124
+ For Euclidean
1125
+ Harmonic Oscillator
1126
+ QM Schroedinger
1127
+ Equation
1128
+ Real time QM
1129
+ Schroedinger
1130
+ Equation for
1131
+ Harmonic Oscillator
1132
+ Map “f”
1133
+ Map “f”
1134
+ Analytic
1135
+ Continuation
1136
+ Analytic
1137
+ Continuation
1138
+ ERG
1139
+ Equation
1140
+ Holographic RG:
1141
+ Radial evolution
1142
+ in EAdS
1143
+ Schroedinger
1144
+ Equation
1145
+ Real time QM
1146
+ evolution
1147
+ In dS
1148
+ Map “f”
1149
+ Map “f”
1150
+ Analytic
1151
+ Continuation
1152
+ Analytic
1153
+ Continuation
1154
+ Euclidean Action
1155
+ For ERG evolution
1156
+ By Feynman
1157
+ Path Integral
1158
+ Euclidean action for
1159
+ Harmonic Oscillator
1160
+ Path Integral
1161
+ Lorentzian
1162
+ Action for QM
1163
+ Evolution by
1164
+ Path Integral
1165
+ QM evolution:
1166
+ Action for
1167
+ Harmonic Oscillator
1168
+ Path Integral
1169
+ Map “f”
1170
+ Map “f”
1171
+ Analytic
1172
+ Continuation
1173
+ Analytic
1174
+ Continuation
1175
+ Flow of equations-Harmonic Oscillator
1176
+ Flow of actions – Harmonic Oscillator
1177
+ Figure 1: Mapping ERG to Harmonic Oscillator
1178
+ 3.4
1179
+ dS-CFT correspondence
1180
+ The connections with ERG mentioned above should, if pursued, provide some insights into
1181
+ dS-CFT correspondence. We restrict ourselves to some preliminary observations in this paper.
1182
+ 14
1183
+
1184
+ ERG
1185
+ Equation
1186
+ Holographic RG:
1187
+ Radial evolution
1188
+ in EAdS
1189
+ Schroedinger
1190
+ Equation
1191
+ Real time QM
1192
+ evolution
1193
+ In dS
1194
+ Map “f”
1195
+ Map “f”
1196
+ Analytic
1197
+ Continuation
1198
+ Analytic
1199
+ Continuation
1200
+ ERG
1201
+ Equation
1202
+ Holographic RG:
1203
+ Radial evolution
1204
+ equation in EAdS
1205
+ QM Schroedinger
1206
+ Equation
1207
+ Real time QM
1208
+ Schroedinger
1209
+ equation
1210
+ in dS
1211
+ Map “f”
1212
+ Map “f”
1213
+ Analytic
1214
+ Continuation
1215
+ Analytic
1216
+ Continuation
1217
+ ERG
1218
+ Equation
1219
+ Holographic RG:
1220
+ Radial evolution
1221
+ in EAdS
1222
+ Schroedinger
1223
+ Equation
1224
+ Real time QM
1225
+ evolution
1226
+ In dS
1227
+ Map “f”
1228
+ Map “f”
1229
+ Analytic
1230
+ Continuation
1231
+ Analytic
1232
+ Continuation
1233
+ Euclidean Action
1234
+ For ERG evolution
1235
+ by functional integral
1236
+ Holographic RG:
1237
+ Action in EadS
1238
+ for functional
1239
+ integral
1240
+ Lorentzian
1241
+ Action for QM
1242
+ evolution
1243
+ QM evolution by
1244
+ Functional integral:
1245
+ Action in dS
1246
+ Map “f”
1247
+ Map “f”
1248
+ Analytic
1249
+ Continuation
1250
+ Analytic
1251
+ Continuation
1252
+ Flow of equations
1253
+ Flow of actions
1254
+ Figure 2: Mapping ERG to Holographic RG
1255
+ The idea of dS-CFT correspondence was suggested in [30, 31, 32]. This has been investigated
1256
+ further by many authors, e.g. [33, 34, 38, 39, 35, 37, 36].
1257
+ What we see from the above analysis is that considering the relation between the evolution
1258
+ equations, one can say that
1259
+ Ψ[φ, J]wave−functional in dS = {Z[φ, J]CFT}analytically continued
1260
+ (3.62)
1261
+ Thus we see that the dS-CFT correspondence suggested by this analysis is one between an
1262
+ ERG equation for a CFT generating functional and a real time quantum mechanical evolution
1263
+ of a wave functional in dS space time.
1264
+ The LHS of (3.62) is a QM wave functional of fields on a D-dimensional spatial slice of
1265
+ a D + 1 dimensional dS spacetime. The RHS is the analytically continued partition function
1266
+ of a D-dimensional Euclidean CFT - more precisely, either eWΛ[J] or e−SI,Λ[φ]. The precise
1267
+ statement has to involve some statement of the boundary conditions. In the next section we
1268
+ give a concrete example with boundary conditions specified.
1269
+ Note that the LHS is a complex probability amplitude. Expectation values will involve Ψ∗Ψ
1270
+ and were calculated first in [30, 31, 32].
1271
+ One can proceed to ask whether the expectations on the spatial slice calculated using Ψ∗Ψ
1272
+ also correspond to some other Euclidean CFT on the spatial slice. This was explored further
1273
+ in [38]. We do not address this question here.
1274
+ In the next section we give some examples that explicitly illustrate the connection made by
1275
+ (3.62).
1276
+ 15
1277
+
1278
+ 4
1279
+ Obtaining Bulk field from ERG
1280
+ The ERG formulation stated in this paper starts with the boundary fields. The evolution
1281
+ operator for this involves bulk fields but with a non standard action. When this action is
1282
+ mapped to EAdS action one can interpret the newly mapped field as the EAdS bulk field. This
1283
+ analysis for Euclidean AdS is well defined and has been done in [5, 7]. However, this treatment
1284
+ does not have a natural interpretation in the context in dS space. We have elaborated that in
1285
+ this section.
1286
+ Bulk scalar field in Euclidean AdS and dS
1287
+ There are conceptual barriers if one tries to do similar analysis to map the ERG evolution
1288
+ operator directly to Lorentzian dS. First of all, it is not clear as in EAdS whether the function
1289
+ G(t) a.k.a f 2(t) = ˙G(t) is the Green’s function of the dual field theory of dS. It has an oscillatory
1290
+ cutoff function. Therefore we analytically continue the ERG action to a Lorentzian action first,
1291
+ and then do the mapping.
1292
+ The result thus obtained (4.74) matches with the value found in [39] where the authors have
1293
+ found the bulk field in semicalssical approximation from dS bulk action. For the Lorentzian dS
1294
+ analysis presented here the RG interpretation is not clearly understood - except as an anlytic
1295
+ continuation. We have presented it here for sake of completeness.
1296
+ Euclidean AdS
1297
+ The Euclidean action of the ERG evolution operator in momentum space,
1298
+ S = −1
1299
+ 2
1300
+
1301
+
1302
+
1303
+ p
1304
+ ˙φ2
1305
+ ˙G
1306
+ (4.63)
1307
+ is mapped to
1308
+ SEAdS =
1309
+
1310
+ dDp
1311
+ (2π)D
1312
+ � ∞
1313
+ ϵEAdS
1314
+ dz (R
1315
+ z )d+1[ z2
1316
+ R2∂zyEAdS(p)∂zyEAdS(−p)+( z2
1317
+ R2p2+m2)yEAdS(p)yEAdS(−p)]
1318
+ (4.64)
1319
+ with z = Re
1320
+ τ
1321
+ R as described in [5]. We have rescaled the field as φ = fyEAdS where f is
1322
+ related to the boundary Green’s function G as f 2 = −
1323
+ � z
1324
+ R
1325
+ �−d ˙G.
1326
+ The constraint on 1
1327
+ f is given by,
1328
+
1329
+ ∂z{
1330
+ � z
1331
+ R
1332
+ �−d+1 ∂
1333
+ ∂z
1334
+ 1
1335
+ f } =
1336
+ � z
1337
+ R
1338
+ �−d+1 �
1339
+ p2 + m2R2
1340
+ z2
1341
+ � 1
1342
+ f
1343
+ (4.65)
1344
+ The solutions are zd/2Kα(pz) and zd/2Iα(pz) where α2 = m2R2 + d2
1345
+ 4 .
1346
+ So 1
1347
+ f can be taken as,
1348
+ 1
1349
+ f(p, z) = (z)d/2 (AKα(pz) + BIα(pz))
1350
+ (4.66)
1351
+ The Green’s function is
1352
+ G(p, z) = CKα(pz) + DIα(pz)
1353
+ AKα(pz) + BIα(pz)
1354
+ (4.67)
1355
+ The large argument asymptotic form of the Modified Bessel function Iα(z) and Kα(z) are
1356
+ given by,
1357
+ Iα(z) ∼
1358
+ ez
1359
+
1360
+ 2πz
1361
+
1362
+ 1 + O(1
1363
+ z)
1364
+
1365
+ for |arg z| < π
1366
+ 2
1367
+ 16
1368
+
1369
+ Kα(z) ∼
1370
+ � π
1371
+ 2ze−z
1372
+
1373
+ 1 + O(1
1374
+ z)
1375
+
1376
+ for |arg z| < 3π
1377
+ 2
1378
+ Putting two constraints on G- i)G(pz → ∞) = 0 ii)G(pz → 0) = γEAdS p−2α, we get,
1379
+ D = 0; C(p) = γEAdS p−α; B(p) = −
1380
+ 1
1381
+ γEAdS
1382
+
1383
+ In semiclassical approximation the bulk field yEAdS = bEAdS
1384
+ G
1385
+ f . If yEAdS satisfies yEAdS
1386
+ 0
1387
+ the
1388
+ bulk field is given by,
1389
+ yEAdS = yEAdS
1390
+ 0
1391
+ zd/2
1392
+ ϵd/2
1393
+ Kα(pz)
1394
+ Kα(pϵ)
1395
+ (4.68)
1396
+ Now let’s check by analytic continuation iη = z and iL = R. First of all, α becomes ν. ϵ
1397
+ is replaced by iϵ. We get,
1398
+ yEAdS|z=iη, R=iL = yEAdS
1399
+ 0
1400
+ |z=iη, R=iL
1401
+ (iη)d/2
1402
+ (iϵ)d/2
1403
+ Kν(ipη)
1404
+ Kν(ipϵ)
1405
+ (4.69)
1406
+ As,
1407
+ yEAdS
1408
+ 0
1409
+ = bEAdS ϵd/2
1410
+ EAdS
1411
+ γEAdS Kα(pϵ)
1412
+
1413
+ (4.70)
1414
+ de Sitter
1415
+ We would like to do the same analysis as above for the Lorentzian case.
1416
+ The Lorentzian action obtained from (4.63) by analytic continuation, in momentum space,
1417
+ S = −
1418
+
1419
+ dt
1420
+
1421
+ dDp
1422
+ (2π)D
1423
+ 1
1424
+ 2 ˙G(p)
1425
+ ˙φ(p) ˙φ(−p)
1426
+ and needs to be mapped to
1427
+ = 1
1428
+ 2
1429
+ � ∞
1430
+ ϵdS
1431
+
1432
+
1433
+ dDp
1434
+ (2π)D
1435
+ ��L
1436
+ η
1437
+ �D−1
1438
+ {(∂ηydS)2 − p2ydS2 − m2L2
1439
+ η2
1440
+ ydS2}
1441
+
1442
+ Here η = Le
1443
+ t
1444
+ L. We do the field redefinition of boundary field
1445
+ φ = fydS
1446
+ f is a scale dependent quantity which is related to Green’s function G as f 2 = −
1447
+ � η
1448
+ L
1449
+ �−D ˙G.
1450
+ Performing the same manipulations as in [5], one can get the constraint on f as,
1451
+ � η
1452
+ L
1453
+ �d−1 �� η
1454
+ L
1455
+ �−d+1 d
1456
+
1457
+ �2
1458
+ e− ln f =
1459
+ � η
1460
+ L
1461
+ �−d+1 �
1462
+ −p2 − m2L2
1463
+ η2
1464
+
1465
+ e− ln f
1466
+ −d + 1
1467
+ η
1468
+
1469
+ ∂η
1470
+ 1
1471
+ f + ∂2
1472
+ ∂η2
1473
+ 1
1474
+ f =
1475
+
1476
+ −p2 − m2L2
1477
+ η2
1478
+ � 1
1479
+ f
1480
+ The solutions are
1481
+ � η
1482
+ L
1483
+ �d/2 H(1)
1484
+ ν (pη) and
1485
+ � η
1486
+ L
1487
+ �d/2 H(2)
1488
+ ν (pη) with ν2 = d2
1489
+ 4 − m2L2.
1490
+ The 1
1491
+ f can be written in general as( note f is dimensionless),
1492
+ 1
1493
+ f(p, η) =
1494
+ � η
1495
+ L
1496
+ �d/2 �
1497
+ AH(1)
1498
+ ν (pη) + BH(2)
1499
+ ν (pη)
1500
+
1501
+ (4.71)
1502
+ 17
1503
+
1504
+ and the Green’s function is 2
1505
+ G(pη) = CH(1)
1506
+ ν (pη) + DH(2)
1507
+ ν (pη)
1508
+ AH(1)
1509
+ ν (pη) + BH(2)
1510
+ ν (pη)
1511
+ Physically one can expect G(pη → ∞) = 0 which yields,
1512
+ CH(1)
1513
+ ν (pη) + DH(2)
1514
+ ν (pη) = 0
1515
+ (4.72)
1516
+ The asymptotic forms of Hankel functions of both kind for large arguments are,
1517
+ H(1)
1518
+ ν (z) ∼
1519
+
1520
+ 2
1521
+ πzei(z− νπ
1522
+ 2 − π
1523
+ 4 )
1524
+ − π < arg z < 2π
1525
+ H(2)
1526
+ ν (z) ∼
1527
+
1528
+ 2
1529
+ πze−i(z− νπ
1530
+ 2 − π
1531
+ 4 )
1532
+ − 2π < arg z < π
1533
+ The presence of the oscillatory functions will not let eq.4.72 to be satisfied.
1534
+ Hence we
1535
+ analytically continue the argument of Green’s function G. The choice of direction of the analytic
1536
+ continuation is based on the anticipation that the bulk field will have positive frequency. Hence
1537
+ we take
1538
+ η = −iz
1539
+ (4.73)
1540
+ which prompts us to make C = 0. Also, from the constraint AD − BC = 1 we get A = 1
1541
+ D.
1542
+ Hence the Green’s function now takes the form,
1543
+ G(pz) =
1544
+ DH(2)
1545
+ ν (ipz)
1546
+ 1
1547
+ DH(1)
1548
+ ν (ipz) + BH(2)
1549
+ ν (ipz)
1550
+ Next another constraint will come from the fact that boundary Green’s function is γdS p−2ν.
1551
+ So in the limit of z → 0 using the formulae,
1552
+ H(1)
1553
+ ν (z) = iYν(z); H(2)
1554
+ ν (z) = −iYν(z); Yν(z) = −Γ(ν)
1555
+ π
1556
+ �2
1557
+ z
1558
+ �ν
1559
+ One can get,
1560
+ −iD
1561
+ i
1562
+ D − iB = γdS p−2ν
1563
+ On the other side, f should become a p independent constant at boundary x = 0 so that
1564
+ it does not modify the boundary Green’s function, also ydS and f should become same field in
1565
+ boundary field theory. This gives,
1566
+ i
1567
+ D − iB = pν
1568
+ Finally we get,
1569
+ D = iγdS p−ν ; B = i
1570
+
1571
+ 1 − 1
1572
+ γdS
1573
+
1574
+
1575
+ The bulk field ydS is given by,
1576
+ 2We use the term Green function by analogy with the EAdS case, where G is the propagator of the boundary
1577
+ CFT. Also see for instance [39].
1578
+ 18
1579
+
1580
+ ydS = bdS
1581
+ G
1582
+ f = bdS(iγp−ν) 1
1583
+ Ld/2xd/2H(2)
1584
+ ν (ipx)
1585
+ If we analytically continue back to η we get,
1586
+ ydS = bdS(iγp−ν) 1
1587
+ Ld/2(−iη)d/2H(2)
1588
+ ν (pη)
1589
+ If the field ydS satisfies ydS
1590
+ 0
1591
+ at η = ϵdS then,
1592
+ ydS = ydS
1593
+ 0
1594
+ ηd/2
1595
+ ϵd/2
1596
+ dS
1597
+ H(2)
1598
+ ν (pη)
1599
+ H(2)
1600
+ ν (pϵdS)
1601
+ (4.74)
1602
+ ydS satisfies Bunch-Davies condition.
1603
+ Relation between bulk fields in EAdS and dS
1604
+ The bulk field in EAdS space is given
1605
+ by,
1606
+ yEAdS = yEAdS
1607
+ 0
1608
+ zd/2
1609
+ ϵd/2
1610
+ Kα(pz)
1611
+ Kα(pϵ)
1612
+ (4.75)
1613
+ Let’s apply the analytic continuation continuation iη = z and iL = R. First of all, α becomes
1614
+ ν. ϵ is replaced by iϵ. We get,
1615
+ yEAdS|z=iη, R=iL = yEAdS
1616
+ 0
1617
+ |z=iη, R=iL
1618
+ (iη)d/2
1619
+ (iϵ)d/2
1620
+ Kν(ipη)
1621
+ Kν(ipϵ)
1622
+ (4.76)
1623
+ As,
1624
+ yEAdS
1625
+ 0
1626
+ = bEAdS ϵd/2
1627
+ EAdS
1628
+ γEAdS Kα(pϵ)
1629
+
1630
+ (4.77)
1631
+ Using the relation between Kα(x) and Hα(x),
1632
+ Kα(x) = π
1633
+ 2 iα+1H(1)
1634
+ α (ix); − π < arg x ≤ π
1635
+ 2
1636
+ = π
1637
+ 2 (−i)α+1H(2)
1638
+ α (−ix); − π
1639
+ 2 < arg x ≤ π
1640
+ (4.78)
1641
+ Here also we want to ensure the bulk field to be of positive frequency, hence choosing
1642
+ H(2)(x).
1643
+ yEAdS
1644
+ 0
1645
+ |z=iη, R=iL = π
1646
+ 2 (i)d/2+α+1bEAdSϵd/2γEAdS
1647
+ H(2)
1648
+ α (pϵ)
1649
+
1650
+ = bEAdS
1651
+ bdS
1652
+ γEAdS
1653
+ γdS
1654
+ π
1655
+ 2 (i)d/2+α+1ydS
1656
+ 0
1657
+ Hence,
1658
+ yEAdS|z=iη, R=iL =bEAdS
1659
+ bdS
1660
+ γEAdS
1661
+ γdS
1662
+ π
1663
+ 2 (i)d/2+α+1ydS
1664
+ 0
1665
+ ηd/2
1666
+ ϵd/2
1667
+ H(2)
1668
+ α (pη)
1669
+ H(2)
1670
+ α (pϵ)
1671
+ = bEAdS
1672
+ bdS
1673
+ γEAdS
1674
+ γdS
1675
+ π
1676
+ 2 (i)d/2+α+1ydS
1677
+ (4.79)
1678
+ Upto various normalization constants we see that they agree.
1679
+ 19
1680
+
1681
+ 5
1682
+ Summary and Conclusions
1683
+ In [5, 6] an evolution operator for an ERG equation of a perturbed D-dimensional free field
1684
+ theory in flat space was mapped to a field theory action in AdSD+1. Similar mappings were done
1685
+ subsequently for the interacting O(N) model at both the free fixed point and at the Wilson-
1686
+ Fisher fixed point [7]. The main aim of this paper was to understand better the mapping used
1687
+ in these papers and to see if there are other examples. A related question was that of analytic
1688
+ continuation of these theories. These questions can posed, both for the ERG equation and its
1689
+ evolution operator.
1690
+ It was shown that a mapping of this type can map the ERG evolution operator of a (zero-
1691
+ dimensional) field theory to the action of a Euclidean harmonic oscillator. Furthermore the
1692
+ analytic continuation of the ERG evolution operator action gives the path integral for a free
1693
+ particle with a time dependent mass. A similar mapping takes this to a harmonic oscillator.
1694
+ This method also gives new way of obtaining the Ermakov-Lewis invariants for the original
1695
+ theory.
1696
+ The analytically continued ERG equation is a Schroedinger like equation for a free field
1697
+ theory wave functional. This gets mapped to the Schroedinger equation for a wave functional
1698
+ of a free field theory in de Sitter space. These are summarized in Figures 1,2. This is one
1699
+ version of the dS-CFT correspondence. From this point of view, the QM evolution of dS field
1700
+ theory is also an ERG evolution of a field theory, but accompanied by an analytic continuation.
1701
+ An example was worked out to illustrate this correspondence.
1702
+ To understand these issues further it would be useful to apply these techniques to the O(N)
1703
+ model ERG equation written in [7]. This ERG equation has extra terms and thus the theory
1704
+ naturally has interaction terms in the EAdS bulk action.
1705
+ Similarly it would be interesting to study the connection between bulk Green functions
1706
+ and the QM correlation functions on the space-like time slice of these theories, as considered
1707
+ originally in [30, 31, 32].
1708
+ Acknowledgements
1709
+ SD would like to thank IMSc,Chennai where part of the work was done.
1710
+ 20
1711
+
1712
+ References
1713
+ [1] J. M. Maldacena, “The Large N limit of superconformal field theories and supergrav-
1714
+ ity,” Int. J. Theor. Phys. 38, 1113 (1999) [Adv. Theor. Math. Phys. 2, 231 (1998)]
1715
+ doi:10.1023/A:1026654312961 arXiv:hep-th/9711200.
1716
+ [2] S. S. Gubser, I. R. Klebanov, and A. M. Polyakov, “Gauge theory correlators from non-
1717
+ critical string theory,” Phys. Lett. B428 (1998) 105-114, arXiv:hep-th/9802109.
1718
+ [3] E. Witten, “Anti-de Sitter space and holography,” Adv. Theor. Math. Phys. 2 (1998)
1719
+ 253-291, arXiv:hep-th/9802150.
1720
+ [4] E. Witten, “Anti-de Sitter space, thermal phase transition, and confinement in gauge
1721
+ theories,” Adv. Theor. Math. Phys. 2, 505 (1998) arXiv:hep-th/9803131.
1722
+ [5] B. Sathiapalan and H. Sonoda, “A Holographic form for Wilson’s RG,” Nucl. Phys. B
1723
+ 924, 603 (2017) doi:10.1016/j.nuclphysb.2017.09.018 [arXiv:1706.03371 [hep-th]].
1724
+ [6] B. Sathiapalan and H. Sonoda, “Holographic Wilson’s RG,” Nucl. Phys. B 948, 114767
1725
+ (2019) doi:10.1016/j.nuclphysb.2019.114767 [arXiv:1902.02486 [hep-th]].
1726
+ [7] B. Sathiapalan, “Holographic RG and Exact RG in O(N) Model,” Nucl. Phys. B 959,
1727
+ 115142 (2020) doi:10.1016/j.nuclphysb.2020.115142 [arXiv:2005.10412 [hep-th]].
1728
+ [8] L.
1729
+ Susskind,
1730
+ “The
1731
+ World
1732
+ as
1733
+ a
1734
+ hologram,”
1735
+ J.
1736
+ Math.
1737
+ Phys.
1738
+ 36,
1739
+ 6377
1740
+ (1995)
1741
+ doi:10.1063/1.531249 [hep-th/9409089].
1742
+ [9] E. T. Akhmedov, “A Remark on the AdS / CFT correspondence and the renormalization
1743
+ group flow,” Phys. Lett. B442 (1998) 152-158, arXiv:hep-th/9806217 [hep-th].
1744
+ [10] E. T. Akhmedov, “Notes on multitrace operators and holographic renormalization group”.
1745
+ Talk given at 30 Years of Supersymmetry, Minneapolis, Minnesota, 13-27 Oct 2000, and
1746
+ at Workshop on Integrable Models, Strings and Quantum Gravity, Chennai, India, 15-19
1747
+ Jan 2002. arXiv:
1748
+ hep-th/0202055
1749
+ [11] E. T. Akhmedov, I.B. Gahramanov, E.T. Musaev,“ Hints on integrability in the Wilso-
1750
+ nian/holographic renormalization group”
1751
+ arXiv:1006.1970 [hep-th]
1752
+ [12] E. Alvarez and C. Gomez, “Geometric holography, the renormalization group and the c
1753
+ theorem,” Nucl.Phys. B541 (1999) 441-460, arXiv:hep-th/9807226 [hep-th].
1754
+ [13] V. Balasubramanian and P. Kraus, “Space-time and the holographic renormalization
1755
+ group,” Phys. Rev. Lett. 83 (1999) 3605-3608, arXiv:hep-th/9903190 [hep-th].
1756
+ [14] D. Freedman, S. Gubser, K. Pilch, and N. Warner, “Renormalization group flows from
1757
+ holography supersymmetry and a c theorem,” Adv. Theor. Math. Phys. 3 (1999) 363-417,
1758
+ arXiv:hep-th/9904017 [hep-th].
1759
+ [15] J. de Boer, E. P. Verlinde, and H. L. Verlinde, “On the holographic renormalization group,”
1760
+ JHEP 08 (2000) 003, arXiv:hep-th/9912012.
1761
+ [16] J. de Boer, “The Holographic renormalization group,” Fortsch. Phys. 49 (2001) 339-358,
1762
+ arXiv:hep-th/0101026 [hep-th].
1763
+ 21
1764
+
1765
+ [17] T.
1766
+ Faulkner,
1767
+ H.
1768
+ Liu,
1769
+ and
1770
+ M.
1771
+ Rangamani,
1772
+ “Integrating
1773
+ out
1774
+ geometry:
1775
+ Holo-
1776
+ graphic Wilsonian RG and the membrane paradigm,”
1777
+ JHEP 1108,
1778
+ 051 (2011)
1779
+ doi:10.1007/JHEP08(2011)051 arXiv:1010.4036 [hep-th].
1780
+ [18] I. R. Klebanov and E. Witten, “AdS / CFT correspondence and symmetry breaking,”
1781
+ Nucl. Phys. B556, 89 (1999) doi:10.1016/S0550-3213(99)00387-9 arXiv:hep-th/9905104.
1782
+ [19] I. Heemskerk and J. Polchinski, “Holographic and Wilsonian Renormalization Groups,”
1783
+ JHEP 1106, 031 (2011) doi:10.1007/JHEP06(2011)031 arXiv:1010.1264 [hep-th].
1784
+ [20] J. M. Lizana, T. R. Morris, and M. Perez-Victoria, “Holographic renormalisation group
1785
+ flows and renormalisation from a Wilsonian perspective,” JHEP 1603, 198 (2016)
1786
+ doi:10.1007/JHEP03(2016)198 arXiv:1511.04432 [hep-th].
1787
+ [21] A.
1788
+ Bzowski,
1789
+ P.
1790
+ McFadden,
1791
+ and
1792
+ K.
1793
+ Skenderis,
1794
+ “Scalar
1795
+ 3-point
1796
+ functions
1797
+ in
1798
+ CFT: renormalisation,
1799
+ beta functions and anomalies,”
1800
+ JHEP 1603,
1801
+ 066 (2016)
1802
+ doi:10.1007/JHEP03(2016)066 arXiv:1510.08442 [hep-th].
1803
+ [22] S. de Haro, S. N. Solodukhin, and K. Skenderis, “Holographic reconstruction of space-time
1804
+ and renormalization in the AdS / CFT correspondence,” Comm. Math. Phys. 217, 595
1805
+ (2001) doi:10.1007/s002200100381 arXiv:hep-th/0002230.
1806
+ [23] S.-S. Lee, “Holographic description of quantum field theory”, Nuclear Physics B 832 (Jun,
1807
+ 2010) 567585, arXiv:0912.5223.
1808
+ [24] “ S.-S. Lee, Background independent holographic description: from matrix field the-
1809
+ ory to quantum gravity”, Journal of High Energy Physics 2012 (Oct, 2012) 160,
1810
+ arXiv:1204.1780.
1811
+ [25] J. F. Meloa and J. E. Santosa,“Developing local RG: quantum RG and BFSS”,
1812
+ arxiv:1910.09559.
1813
+ [26] T. Padmanabhan, “Demystifying the constancy of the Ermakov–Lewis invariant for
1814
+ a time-dependent oscillator,”
1815
+ Mod. Phys. Lett. A 33,
1816
+ no.07n08,
1817
+ 1830005 (2018)
1818
+ doi:10.1142/S0217732318300057 [arXiv:1712.07328 [physics.class-ph]].
1819
+ [27] Ramos-Prieto, I., Espinosa-Zu˜niga, A., Fern´andez-Guasti, M., and Moya-Cessa, H. M.
1820
+ (2018). Quantum harmonic oscillator with time-dependent mass. Modern Physics Letters
1821
+ B, 32(20), 1850235. doi:10.1142/s0217984918502354
1822
+ [28] A. Anderson, “Canonical Transformations in Quantum Mechanics,” Annals Phys. 232,
1823
+ 292-331 (1994) doi:10.1006/aphy.1994.1055 [arXiv:hep-th/9305054 [hep-th]].
1824
+ [29] “Stochastic Quantization”, P.H.Damgaard and H. Huffel Phys. Rep. 152, Nos. 5 and 6
1825
+ (1987) 227—398
1826
+ [30] E. Witten, “Quantum gravity in de Sitter space,” [arXiv:hep-th/0106109 [hep-th]].
1827
+ [31] A. Strominger, “The dS / CFT correspondence,” JHEP 10, 034 (2001) doi:10.1088/1126-
1828
+ 6708/2001/10/034 [arXiv:hep-th/0106113 [hep-th]].
1829
+ [32] J. M. Maldacena, “Non-Gaussian features of primordial fluctuations in single field infla-
1830
+ tionary models,” JHEP 05, 013 (2003) doi:10.1088/1126-6708/2003/05/013 [arXiv:astro-
1831
+ ph/0210603 [astro-ph]].
1832
+ 22
1833
+
1834
+ [33] R. Bousso, A. Maloney and A. Strominger, “Conformal vacua and entropy in de Sitter
1835
+ space,” Phys. Rev. D 65, 104039 (2002) doi:10.1103/PhysRevD.65.104039 [arXiv:hep-
1836
+ th/0112218 [hep-th]].
1837
+ [34] M. Spradlin and A. Volovich, “Vacuum states and the S matrix in dS / CFT,” Phys. Rev.
1838
+ D 65, 104037 (2002) doi:10.1103/PhysRevD.65.104037 [arXiv:hep-th/0112223 [hep-th]].
1839
+ [35] D. Anninos, T. Hartman and A. Strominger, “Higher Spin Realization of the dS/CFT
1840
+ Correspondence,”
1841
+ Class. Quant. Grav. 34,
1842
+ no.1,
1843
+ 015009 (2017) doi:10.1088/1361-
1844
+ 6382/34/1/015009 [arXiv:1108.5735 [hep-th]].
1845
+ [36] D. Anninos, T. Anous, D. Z. Freedman and G. Konstantinidis, “Late-time Structure
1846
+ of the Bunch-Davies De Sitter Wavefunction,” JCAP 11, 048 (2015) doi:10.1088/1475-
1847
+ 7516/2015/11/048 [arXiv:1406.5490 [hep-th]].
1848
+ [37] D. Anninos, S. A. Hartnoll and D. M. Hofman, “Static Patch Solipsism: Conformal Sym-
1849
+ metry of the de Sitter Worldline,” Class. Quant. Grav. 29, 075002 (2012) doi:10.1088/0264-
1850
+ 9381/29/7/075002 [arXiv:1109.4942 [hep-th]].
1851
+ [38] D. Harlow and D. Stanford, “Operator Dictionaries and Wave Functions in AdS/CFT and
1852
+ dS/CFT,” [arXiv:1104.2621 [hep-th]].
1853
+ [39] D. Das, S. R. Das and G. Mandal, “Double Trace Flows and Holographic RG in dS/CFT
1854
+ correspondence,” JHEP 11, 186 (2013) doi:10.1007/JHEP11(2013)186 [arXiv:1306.0336
1855
+ [hep-th]].
1856
+ [40] V. Balasubramanian, J. de Boer and D. Minic, “Notes on de Sitter space and holography,”
1857
+ Class. Quant. Grav. 19, 5655-5700 (2002) doi:10.1016/S0003-4916(02)00020-9 [arXiv:hep-
1858
+ th/0207245 [hep-th]].
1859
+ [41] A. Strominger, “Inflation and the dS / CFT correspondence,” JHEP 11, 049 (2001)
1860
+ doi:10.1088/1126-6708/2001/11/049 [arXiv:hep-th/0110087 [hep-th]].
1861
+ [42] F. Larsen, J. P. van der Schaar and R. G. Leigh, “De Sitter holography and the cos-
1862
+ mic microwave background,” JHEP 04, 047 (2002) doi:10.1088/1126-6708/2002/04/047
1863
+ [arXiv:hep-th/0202127 [hep-th]].
1864
+ [43] J. P. van der Schaar, “Inflationary perturbations from deformed CFT,” JHEP 01, 070
1865
+ (2004) doi:10.1088/1126-6708/2004/01/070 [arXiv:hep-th/0307271 [hep-th]].
1866
+ [44] H. Nastase and K. Skenderis, “Holography for the very early Universe and the clas-
1867
+ sic puzzles of Hot Big Bang cosmology,” Phys. Rev. D 101, no.2, 021901 (2020)
1868
+ doi:10.1103/PhysRevD.101.021901 [arXiv:1904.05821 [hep-th]].
1869
+ [45] J. B. Hartle and S. W. Hawking, “Wave Function of the Universe,” Phys. Rev. D 28,
1870
+ 2960-2975 (1983) doi:10.1103/PhysRevD.28.2960
1871
+ [46] J. B. Hartle and S. W. Hawking, “Path Integral Derivation of Black Hole Radiance,” Phys.
1872
+ Rev. D 13, 2188-2203 (1976) doi:10.1103/PhysRevD.13.2188
1873
+ [47] G. W. Gibbons and S. W. Hawking, “Action Integrals and Partition Functions in Quantum
1874
+ Gravity,” Phys. Rev. D 15, 2752-2756 (1977) doi:10.1103/PhysRevD.15.2752
1875
+ [48] E. Mottola, “Particle Creation in de Sitter Space,” Phys. Rev. D 31, 754 (1985)
1876
+ doi:10.1103/PhysRevD.31.754
1877
+ 23
1878
+
1879
+ [49] B. Allen,
1880
+ “Vacuum States in de Sitter Space,”
1881
+ Phys. Rev. D 32,
1882
+ 3136 (1985)
1883
+ doi:10.1103/PhysRevD.32.3136
1884
+ [50] U. H. Danielsson, “Inflation, holography, and the choice of vacuum in de Sitter space,”
1885
+ JHEP 07, 040 (2002) doi:10.1088/1126-6708/2002/07/040 [arXiv:hep-th/0205227 [hep-
1886
+ th]].
1887
+ 24
1888
+
2tFRT4oBgHgl3EQfnjcF/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
39E0T4oBgHgl3EQfvAGt/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:75bb257484981961e4bf343413c276bda44d5e330c9a4225f759fc91176ac741
3
+ size 6357037
39E0T4oBgHgl3EQfvAGt/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:4d27220b86478651fa912481887fa1a45ee83aa0ab358d87076f9778372e8034
3
+ size 221683
49E2T4oBgHgl3EQfOgYr/content/tmp_files/2301.03748v1.pdf.txt ADDED
@@ -0,0 +1,1371 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Nonlinear Dynamics
2
+
3
+ Harmonic-Gaussian double-well potential stochastic resonance with its application to
4
+ enhance weak fault characteristics of machinery
5
+ --Manuscript Draft--
6
+
7
+ Manuscript Number:
8
+ NODY-D-22-01167R2
9
+ Full Title:
10
+ Harmonic-Gaussian double-well potential stochastic resonance with its application to
11
+ enhance weak fault characteristics of machinery
12
+ Article Type:
13
+ Original Research
14
+ Keywords:
15
+ The benefits of noise, weak signature enhancement, fault identification, fault diagnosis
16
+ Corresponding Author:
17
+ Zijian Qiao, Ph.D.
18
+ Ningbo University
19
+ Ningbo, CHINA
20
+ Corresponding Author Secondary
21
+ Information:
22
+ Corresponding Author's Institution:
23
+ Ningbo University
24
+ Corresponding Author's Secondary
25
+ Institution:
26
+ First Author:
27
+ Zijian Qiao, Ph.D.
28
+ First Author Secondary Information:
29
+ Order of Authors:
30
+ Zijian Qiao, Ph.D.
31
+ Shuai Chen
32
+ Zhihui Lai
33
+ Shengtong Zhou
34
+ Miguel A. F. Sanjuán
35
+ Order of Authors Secondary Information:
36
+ Funding Information:
37
+ Foundation of the State Key Laboratory of
38
+ Performance Monitoring and Protecting of
39
+ Rail Transit Infrastructure of East China
40
+ Jiaotong University
41
+ (HJGZ2021114)
42
+ Dr. Zijian Qiao
43
+ Zhejiang Provincial Natural Science
44
+ Foundation of China
45
+ (LQ22E050003)
46
+ Dr. Zijian Qiao
47
+ National Natural Science Foundation of
48
+ China
49
+ (62001210, 51905349)
50
+ Dr. Zhihui Lai
51
+ The Spanish State Research Agency
52
+ (AEI) and the European Regional
53
+ Development Fund (ERDF)
54
+ (PID2019-105554GB-I00)
55
+ Dr. Miguel A. F. Sanjuán
56
+ Abstract:
57
+ Noise would give rise to incorrect filtering frequency-band selection in signal filtering-
58
+ based methods including fast kurtogram, teager energy operators and wavelet packet
59
+ transform filters and meanwhile would result in incorrect selection of useful
60
+ components and even mode mixing, end effects and etc. in signal decomposition-
61
+ based methods including empirical mode decomposition, singular value decomposition
62
+ and local mean decomposition. On the contrary, noise in stochastic resonance (SR) is
63
+ beneficial to enhance weak signals of interest embedded in signals with strong
64
+ background noise. Taking into account that nonlinear systems are crucial ingredients
65
+ to activate the SR, here we investigate the SR in the cases of overdamped and
66
+ underdamped harmonic-Gaussian double-well potential systems subjected to noise
67
+ and a periodic signal. We derive and measure the analytic expression of the output
68
+ signal-to-noise ratio (SNR) and the steady-state probability density (SPD) function
69
+ Powered by Editorial Manager® and ProduXion Manager® from Aries Systems Corporation
70
+
71
+ under approximate adiabatic conditions. When the harmonic-Gaussian double-well
72
+ potential loses its stability, we can observe the antiresonance phenomenon, whereas
73
+ adding the damped factor into the overdamped system can change the stability of the
74
+ harmonic-Gaussian double-well potential, resulting that the antiresonance behavior
75
+ disappears in the underdamped system. Then, we use the overdamped and
76
+ underdamped harmonic-Gaussian double-well potential SR to enhance weak useful
77
+ characteristics for diagnosing incipient rotating machinery failures. Theoretical and
78
+ experimental results show that adjusting both noise intensity and system parameters
79
+ can activate overdamped and underdamped harmonic-Gaussian double-well potential
80
+ SR in which there is a bell-shaped peak for the SNR. Additionally, the underdamped
81
+ harmonic-Gaussian double-well potential SR is independent of frequency-shifted and
82
+ rescaling transform to process large machine parameter signals and outperforms the
83
+ overdamped one. Finally, comparing the advanced robust local mean decomposition
84
+ (RLMD) method based on signal decomposition and the wavelet transform method
85
+ based on noise cancellation or infogram method based on signal filtering, the
86
+ overdamped or underdamped harmonic-Gaussian double-well potential SR methods
87
+ characterize a better performance to detect a weak signal. Fault characteristics in the
88
+ early stage of failures are successful in improving the incipient fault characteristic
89
+ identification of rolling element bearings.
90
+ Response to Reviewers:
91
+ Please see the attached "response to reviewers".
92
+ Order of Authors (with Contributor Roles): Zijian Qiao, Ph.D. (Funding acquisition: Supporting; Validation: Lead; Writing – original
93
+ draft: Lead)
94
+ Shuai Chen (Data curation: Equal; Visualization: Lead)
95
+ Zhihui Lai (Investigation: Equal; Visualization: Equal; Writing – review & editing:
96
+ Supporting)
97
+ Shengtong Zhou (Data curation: Lead; Formal analysis: Equal; Investigation: Equal;
98
+ Writing – review & editing: Equal)
99
+ Miguel A. F. Sanjuán (Formal analysis: Equal; Funding acquisition: Equal;
100
+ Methodology: Equal; Writing – review & editing: Lead)
101
+ Powered by Editorial Manager® and ProduXion Manager® from Aries Systems Corporation
102
+
103
+ 1 / 27
104
+
105
+ Harmonic-Gaussian double-well potential stochastic resonance with
106
+ its application to enhance weak fault characteristics of machinery
107
+
108
+ Zijian Qiao1,2,3,4, , Shuai Chen1, Zhihui Lai5, Shengtong Zhou2, Miguel A. F. Sanjuán6
109
+ 1 School of Mechanical Engineering and Mechanics, Ningbo University, Ningbo 315211, China
110
+ 2. State Key Laboratory of Performance Monitoring and Protecting of Rail Transit Infrastructure, East China
111
+ Jiaotong University, Nanchang 330013, China
112
+ 3. Laboratory of Yangjiang Offshore Wind Power, Yangjiang 529599, Guangdong, China
113
+ 4. Zhejiang Provincial Key Laboratory of Part Rolling Technology, Ningbo 315211, China
114
+ 5. Guangdong Provincial Key Laboratory of Micro/Nano Optomechatronics Engineering, College of Mechatronics
115
+ and Control Engineering, Shenzhen University, Shenzhen 518060, China
116
+ 6. Nonlinear Dynamics, Chaos and Complex Systems Group, Departamento de Física, Universidad Rey Juan
117
+ Carlos, Tulipán s/n, Móstoles, 28933, Madrid, Spain
118
+
119
+ Abstract:
120
+ Noise would give rise to incorrect filtering frequency-band selection in signal
121
+ filtering-based methods including fast kurtogram, teager energy operators and wavelet
122
+ packet transform filters and meanwhile would result in incorrect selection of useful
123
+ components
124
+ and
125
+ even
126
+ mode
127
+ mixing,
128
+ end
129
+ effects
130
+ and
131
+ etc.
132
+ in
133
+ signal
134
+ decomposition-based methods including empirical mode decomposition, singular
135
+ value decomposition and local mean decomposition. On the contrary, noise in
136
+ stochastic resonance (SR) is beneficial to enhance weak signals of interest embedded
137
+ in signals with strong background noise. Taking into account that nonlinear systems
138
+ are crucial ingredients to activate the SR, here we investigate the SR in the cases of
139
+ overdamped and underdamped harmonic-Gaussian double-well potential systems
140
+ subjected to noise and a periodic signal. We derive and measure the analytic
141
+ expression of the output signal-to-noise ratio (SNR) and the steady-state probability
142
+
143
+ Corresponding author.
144
+ E-mail address: [email protected], [email protected] (Z. Qiao).
145
+ Manuscript
146
+ Click here to access/download;Manuscript;Manuscript.docx
147
+ Click here to view linked References
148
+
149
+ 2 / 27
150
+
151
+ density (SPD) function under approximate adiabatic conditions. When the
152
+ harmonic-Gaussian double-well potential loses its stability, we can observe the
153
+ antiresonance phenomenon, whereas adding the damped factor into the overdamped
154
+ system can change the stability of the harmonic-Gaussian double-well potential,
155
+ resulting that the antiresonance behavior disappears in the underdamped system. Then,
156
+ we use the overdamped and underdamped harmonic-Gaussian double-well potential
157
+ SR to enhance weak useful characteristics for diagnosing incipient rotating machinery
158
+ failures. Theoretical and experimental results show that adjusting both noise intensity
159
+ and
160
+ system
161
+ parameters
162
+ can
163
+ activate
164
+ overdamped
165
+ and
166
+ underdamped
167
+ harmonic-Gaussian double-well potential SR in which there is a bell-shaped peak for
168
+ the SNR. Additionally, the underdamped harmonic-Gaussian double-well potential SR
169
+ is independent of frequency-shifted and rescaling transform to process large machine
170
+ parameter signals and outperforms the overdamped one. Finally, comparing the
171
+ advanced robust local mean decomposition (RLMD) method based on signal
172
+ decomposition and the wavelet transform method based on noise cancellation or
173
+ infogram method based on signal filtering, the overdamped or underdamped
174
+ harmonic-Gaussian double-well potential SR methods characterize a better
175
+ performance to detect a weak signal. Fault characteristics in the early stage of failures
176
+ are successful in improving the incipient fault characteristic identification of rolling
177
+ element bearings.
178
+
179
+ Key words: The benefits of noise, weak signature enhancement, fault identification,
180
+ fault diagnosis
181
+
182
+ 1. Introduction
183
+ Noise is ubiquitous but unwanted in detecting weak signals [1], but noise in
184
+ biological systems can be used to amplify weak signals embedded by a strong
185
+ background noise. Such an ingenious phenomenon is observed in a bistable nonlinear
186
+ system, namely stochastic resonance (SR) [2]. SR is a kind of synchronization
187
+ mechanism among the nonlinear systems, noise and a weak periodic signal, which
188
+
189
+ 3 / 27
190
+
191
+ takes place to activate the SR for amplifying weak useful signals [3].
192
+ SR has been investigated from theory to engineering application widely [4-6].
193
+ Among three ingredients for activating SR including noise, nonlinear systems and
194
+ weak useful signals, nonlinear systems are crucial ingredients for extracting weak
195
+ useful signals and moreover can harvest the energy of noise located at the whole
196
+ frequency band of a noisy signal to enhance or amplify a weak useful signal. For this
197
+ purpose, most of scholars pay attention to exploring the behaviors of SR in novel
198
+ nonlinear systems from bistable [7] to multistable ones [8-10], from overdamped [11]
199
+ and underdamped [12] to fractional-order [13] ones, and even from cascaded [14] and
200
+ coupled [15, 16] to time-delayed feedback [17] ones and biological systems [18, 19].
201
+ Because the bistable system is most classical among them, it has been investigated,
202
+ such as classical bistable potential overdamped systems, noisy confined bistable
203
+ potential overdamped systems [20], asymmetric bistable potential overdamped
204
+ systems [21], classical bistable potential underdamped systems, noisy bistable
205
+ potential fractional-order systems [22] and E-exponential potential underdamped
206
+ systems [23, 24]. The E-exponential potential named by the references [23, 24] is a
207
+ narrow version of the harmonic-Gaussian double-well potential. The references above
208
+ show that overdamped and underdamped harmonic-Gaussian double-well potential
209
+ SR has not been studied systematically in theory and further applied to enhance
210
+ incipient fault identification of machinery for providing a tutorial of other readers and
211
+ researchers on the SR in the overdamped and underdamped systems with novel
212
+ generalized double-well potentials yet. Even, the comparison between overdamped
213
+ and underdamped harmonic-Gaussian double-well potential SR has not been made in
214
+ theory and engineering applications. Therefore, this paper attempts to investigate the
215
+ SR in the overdamped and underdamped harmonic-Gaussian double-well potential
216
+ systems theoretically and then apply it to enhance weak fault characteristics and
217
+ diagnose incipient faults of machinery. Additionally, some comparisons with other
218
+ advanced signal processing techniques including signal decomposition-based and
219
+ noise cancellation or signal filtering-based methods for enhancing weak fault
220
+ characteristics of machinery are given.
221
+
222
+ 4 / 27
223
+
224
+ The remainder of this paper is organized as follows. Section 2 and Section 3
225
+ investigate the overdamped and underdamped harmonic-Gaussian double-well
226
+ potential SR by deriving the analytic expressions of signal-to-noise ratio (SNR) and
227
+ steady-state probability density (SPD) functions, respectively. In Section 4, we apply
228
+ the overdamped and underdamped harmonic-Gaussian double-well potential SR to
229
+ enhance weak fault characteristics and incipient fault identification of rolling element
230
+ bearings. Finally, conclusions are drawn in Section 5.
231
+
232
+ 2. Overdamped harmonic-Gaussian double-well potential SR
233
+ The overdamped Langevin equation driven by a harmonic-Gaussian double-well
234
+ potential under the action of random noise and a periodic signal can be described as
235
+ [25]
236
+ d𝑦
237
+ d𝑥 = −
238
+ 𝜕𝑈(𝑥)
239
+ 𝜕𝑥
240
+ + 𝐴 cos(𝜔0𝑡) + 𝜀(𝑡) (1)
241
+ where 𝐴 and ω0 are the amplitude and angular frequency of the periodic signal
242
+ respectively, and 𝜀(𝑡) is the Gaussian white noise with mean zero and variance 𝐷
243
+ i.e. noise intensity.
244
+ The harmonic-Gaussian double-well potential which is a variant of a double-well
245
+ potential can be expressed as [26]
246
+ 𝑈(𝑥) =
247
+ 𝑘
248
+ 2 𝑥2 + 𝛼exp(−𝛽𝑥2) (2)
249
+ where two stable states and one unstable state are located at 𝑥± = ±√ln(2𝛼𝛽 𝑘
250
+ ⁄ ) 𝛽
251
+
252
+ and
253
+ 𝑥𝑢 = 0
254
+ respectively,
255
+ and
256
+ the
257
+ barrier
258
+ height
259
+ is
260
+ ∆𝑈 = α −
261
+ 𝑘[1 + ln(2𝛼𝛽 𝑘
262
+ ⁄ )] (2𝛽)
263
+
264
+ . To ensure the stability of the harmonic-Gaussian
265
+ double-well potential, this condition ln(2𝛼𝛽 𝑘
266
+ ⁄ ) > 0 must be satisfied, further 𝑘 <
267
+ 2αβ. When 𝑘 = 1 , Fig. 1(a) shows the harmonic-Gaussian double-well potential
268
+ under different system parameter sets (𝛼, 𝛽), while Fig. 1(b) depicts those with
269
+ varying 𝑘. It is seen from Fig. 1(a) that adjusting the system parameter 𝛽 controls
270
+ the potential-well width whereas the potential-barrier height nearly keeps unchanged,
271
+ but varying 𝛼 changes the potential-barrier height whereas the potential-well width
272
+ nearly remains unchanged. Such a behavior is helpful to tune the potential-well width
273
+
274
+ 5 / 27
275
+
276
+ and depth individually to activate the optimal harmonic-Gaussian double-well
277
+ potential SR. Meanwhile, it is found from Fig. 1(b) that adjusting 𝑘 can also change
278
+ the slope of the harmonic-Gaussian double-well potential.
279
+
280
+ Fig. 1 Harmonic-Gaussian double-well potentials under different parameter sets (a)
281
+ (𝛼, 𝛽) and (b) (𝛼, 𝛽, 𝑘).
282
+ The Langevin equation in Eq. (1) can be transformed as further [27]
283
+ ∂ρ(𝑥,𝑡)
284
+ ∂𝑡
285
+ = −
286
+ 𝜕
287
+ 𝜕𝑥 [−𝑘𝑥 + 2𝛼𝛽𝑥exp(−𝛽𝑥2) + 𝐴 cos(𝜔0𝑡)]𝜌(𝑥, 𝑡) + 𝐷
288
+ 𝜕2
289
+ 𝜕𝑥2 𝜌(𝑥, 𝑡) (3)
290
+ where 𝜌(𝑥, 𝑡) is the probability density function (PDF) of the stochastic process
291
+ 𝑥(𝑡) which denotes the transition trajectory of Brownian particles in the
292
+ harmonic-Gaussian double-well potential as time varies. The corresponding SPD
293
+ function can be denoted as
294
+ 𝜌𝑠(𝑥, 𝑡) =
295
+ 𝑁(𝑡)
296
+ √𝐷 exp [−
297
+ ∅(𝑥,𝑡)
298
+ 𝐷 ] (4)
299
+ where 𝑁(𝑡) is the normalization constant and 𝑁(𝑡) = √𝐷 ∫
300
+ exp[−∅(𝑥, 𝑡) 𝐷
301
+ ⁄ ]d𝑥
302
+
303
+ −∞
304
+
305
+ ,
306
+ and ∅(𝑥, 𝑡) is the generalized potential
307
+ ∅(𝑥, 𝑡) = 𝑈(𝑥) − 𝑥𝐴 cos(𝜔0𝑡) . (5)
308
+ Assuming that the periodic signal 𝐴 cos(𝜔0𝑡) can satisfy the requirement of small
309
+ parameters under approximate adiabatic conditions, i.e., 𝜔0 is larger than the
310
+ characteristic relaxation time in double potential wells [28]. Then, the transition rates
311
+ between the two stable states are given by the Kramers-like formulas [29]
312
+ 𝑊±(𝑥, 𝑡) =
313
+ √|𝑈′′(𝑥±,𝑡)𝑈′′(𝑥𝑢,𝑡)|
314
+
315
+ exp [
316
+ ∅(𝑥±,𝑡)−∅(𝑥𝑢,𝑡)
317
+ 𝐷
318
+ ] (6)
319
+ where the notation | ∙ | denotes the absolute value and
320
+ (a)
321
+ (b)
322
+
323
+ 6 / 27
324
+
325
+ 𝑈′′(𝑥, 𝑡) = 𝑘 − 2𝛼𝛽exp(−𝛽𝑥2)(1 − 2𝛽𝑥2)
326
+ 𝑈′′(𝑥𝑢, 𝑡) = 𝑘 − 2𝛼𝛽
327
+ 𝑈′′(𝑥±, 𝑡) = 2𝑘ln (
328
+ 2𝛼𝛽
329
+ 𝑘 ) (7)
330
+ ∅(𝑥𝑢, 𝑡) = 𝑈(𝑥𝑢, 𝑡) − 𝑥𝑢𝐴 cos(𝜔0𝑡) = 𝛼
331
+ ∅(𝑥±, 𝑡) = 𝑈(𝑥±, 𝑡)−𝑥±𝐴 cos(𝜔0𝑡) = 𝑘
332
+ 2𝛽 (1 + ln 2𝛼𝛽
333
+ 𝑘 ) ∓ 𝐴 cos(𝜔0𝑡) √ln(2𝛼𝛽 𝑘
334
+ ⁄ )
335
+ 𝛽
336
+
337
+ When we introduce Eq. (7) into Eq. (6), we can obtain
338
+ 𝑊±(𝑥, 𝑡) = √𝑘(2𝛼𝛽 − 𝑘)ln(2𝛼𝛽 𝑘
339
+ ⁄ )
340
+ √2π
341
+
342
+ × exp [−
343
+ 𝛼
344
+ 𝐷 +
345
+ 𝑘(1+ln(2𝛼𝛽 𝑘
346
+ ⁄ ))
347
+ 2𝛽𝐷
348
+ ∓ 𝐴 cos(𝜔0𝑡) √
349
+ ln(2𝛼𝛽 𝑘
350
+ ⁄ )
351
+ 𝛽𝐷2
352
+ ] (8)
353
+ Furthermore, Eq. (8) can be transformed as
354
+ 𝑊±(𝑥, 𝑡) = 𝑓(𝜇 ± 𝜂0 cos(𝜔0𝑡)) (9)
355
+ where
356
+ 𝜇 =
357
+ 𝛼
358
+ 𝐷 −
359
+ 𝑘
360
+ 2𝛽𝐷 (1 + ln
361
+ 2𝛼𝛽
362
+ 𝑘 ) (10)
363
+ 𝜂0 =
364
+ 𝐴
365
+ 𝐷 √
366
+ ln(2𝛼𝛽 𝑘
367
+ ⁄ )
368
+ 𝛽
369
+ (11)
370
+ Thus, we can simplify Eq. (8) as
371
+ 𝑊±(𝑥, 𝑡) = 𝑓(𝜇 ± 𝜂0 cos(𝜔0𝑡)) =
372
+ √2𝑘(2𝛼𝛽−𝑘)ln2𝛼𝛽
373
+ 𝑘
374
+
375
+ exp[−(𝜇 ± 𝜂0 cos(𝜔0𝑡))] (12)
376
+ The response of the nonlinear system in Eq. (1) can be quantified using a classical
377
+ measure, i.e., SNR [30]. To derive its analytic expression, the power spectral density
378
+ of the system response can be described as
379
+ 𝑆(Ω) = [1 −
380
+ 𝛼12𝜂02
381
+ 2(𝛼02+𝜔02)] (
382
+ 4𝑐2𝛼0
383
+ 𝛼02+𝜔02) +
384
+ π𝑐2𝜂02𝛼12
385
+ 𝛼02+Ω2 [𝛿(Ω − 𝜔0) + 𝛿(Ω + 𝜔0)] (13)
386
+ where
387
+ 𝑐 = √
388
+ ln(2𝛼𝛽 𝑘
389
+ ⁄ )
390
+ 𝛽
391
+ (14)
392
+ 𝛼1 = 𝛼0 =
393
+ √2𝑘ln(2𝛼𝛽 𝑘
394
+ ⁄ )(2𝛼𝛽−𝑘)
395
+ π
396
+ exp(−𝜇) (15)
397
+ Finally, the output SNR of the response of the overdamped harmonic-Gaussian
398
+ double-well potential system can be derived as
399
+
400
+ 7 / 27
401
+
402
+ SNR =
403
+ π𝑐2𝛼12𝜂02
404
+ 𝛼02+Ω2 |Ω=𝜔0 ×
405
+ 𝛼02+𝜔02
406
+ 4𝑐2𝛼0 [1 −
407
+ 𝛼12𝜂02
408
+ 2(𝛼02+𝜔02)]
409
+ −1
410
+ =
411
+ π𝛼1𝜂02
412
+ 4
413
+ [1 −
414
+ 𝛼12𝜂02
415
+ 2(𝛼02+𝜔02)]
416
+ −1
417
+ (16)
418
+ Therefore, we can analyze the function between the output SNR and system
419
+ parameters using the analytic expression in Eq. (16). Figure 2 shows the output SNR
420
+ of overdamped harmonic-Gaussian double-well potential SR as system parameters
421
+ and noise intensity vary. It can be seen from Fig. 2(a) that the output SNR is a
422
+ nonmonotonic function of noise intensity 𝐷 under different 𝑘 and the peak value of
423
+ output SNR increases when 𝑘 raises, suggesting that adjusting 𝑘 is able to activate
424
+ the SR in the overdamped harmonic-Gaussian double-well potential system for
425
+ improving the output SNR. Similarly, adjusting 𝛼 and 𝛽 can also maximize the
426
+ output SNR, and the peak value of the output SNR declines as 𝛼 or 𝛽 increases but
427
+ the resonant noise intensity at the peak value becomes larger, as shown in Fig. 2(b)
428
+ and Fig. 2(c), respectively. We visualize the two-dimensional function among SNR
429
+ and two of system parameters (𝛼, 𝛽, 𝑘), as shown in Fig. 2(d), Fig. 2(c) and Fig. 2(d).
430
+ One can observe from Fig. 2(d) that a moderate parameter set (𝛼, 𝑘) can improve the
431
+ SNR of a given signal, whereas there exists a negative output SNR because the
432
+ harmonic-Gaussian double-well potential loses its stability when 𝑘 ≥ 2𝛼𝛽, resulting
433
+ in an antiresonance phenomenon. Meanwhile, we fix 𝑘 to express the output SNR as
434
+ a function of (𝛼, 𝛽) in Fig. 2(e), indicating that only an optimal matching between 𝛼
435
+ and 𝛽 can activate the overdamped harmonic-Gaussian double-well potential SR to
436
+ enhance the weak periodic signal embedded by a strong background noise. Similarly,
437
+ Fig. 2(f) also demonstrates that such a parameter matching is necessary to activate the
438
+ overdamped harmonic-Gaussian double-well potential SR. When 𝑘 ≥ 2𝛼𝛽, one can
439
+ also see the antiresonance from Fig. 2(e) and 2(f), respectively. The above results
440
+ demonstrate that the optimal parameter matching among 𝑘, 𝛼 and 𝛽 is able to
441
+ maximize the SR.
442
+
443
+ 8 / 27
444
+
445
+
446
+ Fig. 2 SNR of overdamped harmonic-Gaussian double-well potential SR varies with
447
+ system parameters and noise intensity: SNR as a function of noise intensity under
448
+ different 𝑘 in (a), 𝛽 in (b) and 𝛼 in (c); SNR as a two-dimensional function of
449
+ (𝑘, 𝛼) in (d), (𝛽, 𝛼) in (e) and (𝑘, 𝛽) in (f).
450
+ Figure 3 depicts the SPD function and the corresponding system responses. The
451
+ SPD indicates the probability of Brownian particles to reside in double potential wells.
452
+ It is found from Fig. 3(a) that when 𝐷 = 0.3 the particles oscillate at the right
453
+ potential well located at 𝑥+ = √ln(2𝛼𝛽 𝑘
454
+ ⁄ ) 𝛽
455
+ ⁄ for activating intra-well SR, which is
456
+ demonstrated by the system response in Fig. 3(b) further. When we increase the noise
457
+ intensity 𝐷, the particles can jump across the potential barrier to go back and forth in
458
+ double wells for activating the inter-well SR marked in red in Fig. 3(a), whose system
459
+ response characterizes the eye-catching period marked in red in Fig. 3(b). When the
460
+ noise intensity is fixed as 𝐷 = 3, two peaks of SPD decline and the corresponding
461
+ (a)
462
+ (b)
463
+ (c)
464
+ (d)
465
+ (e)
466
+ (f)
467
+
468
+ 9 / 27
469
+
470
+ system response marked in green becomes noisy.
471
+
472
+ Fig. 3 SPD functions and the corresponding system responses of overdamped
473
+ harmonic-Gaussian double-well potential SR under different noise intensity: (a) the
474
+ SPD functions and (b) the corresponding system responses.
475
+
476
+ 3. Underdamped harmonic-Gaussian double-well potential SR
477
+ The underdamped harmonic-Gaussian double-well potential system subjected to a
478
+ periodic signal and noise can be described as [31]
479
+ d2𝑥
480
+ d𝑡2 + 𝛾
481
+ d𝑥
482
+ d𝑡 = −
483
+ 𝜕𝑈(𝑥)
484
+ 𝜕𝑥
485
+ + 𝐴 cos(𝜔0𝑡) + 𝜉(𝑡) (17)
486
+ where 𝛾 is the damped factor and 𝛾 > 0. Equation (17) can be transformed as [32]
487
+ {
488
+ d𝑥
489
+ d𝑡 = 𝑦
490
+ d𝑦
491
+ d𝑡 = −𝛾𝑦 − 𝑘𝑥 + 2𝛼𝛽𝑥exp(−𝛽𝑥2) + 𝐴 cos(𝜔0𝑡) + 𝜉(𝑡)
492
+ (18)
493
+ Supposing that 𝐴 = 0, 𝐷 = 0, d𝑥 d𝑡
494
+
495
+ = 0 and d𝑥 d𝑡 = 0
496
+
497
+ , we can obtain three
498
+ singular points
499
+ (𝑥±
500
+ 𝑦±) = (±√
501
+ ln(2𝛼𝛽 𝑘
502
+ ⁄ )
503
+ 𝛽
504
+ 0
505
+ ) , (𝑥𝑢
506
+ 𝑦𝑢) = (0
507
+ 0) (19)
508
+ Let
509
+ 𝜕𝑈(𝑥, 𝑦) 𝜕𝑥
510
+
511
+ and
512
+ 𝜕𝑈(𝑥, 𝑦) 𝜕𝑦
513
+
514
+ mark
515
+ as
516
+ 𝑈𝑥(𝑥, 𝑦) and
517
+ 𝑈𝑦(𝑥, 𝑦)
518
+ respectively, and then Eq. (18) can be rewritten as
519
+ {
520
+ 𝑈𝑥(𝑥, 𝑦) = 𝑦
521
+ 𝑈𝑦(𝑥, 𝑦) = −𝛾𝑦 − 𝑘𝑥 + 2𝛼𝛽𝑥exp(−𝛽𝑥2) + 𝐴 cos(𝜔0𝑡) + 𝜉(𝑡) (20)
522
+ The linearization matrix of Eq. (18) can be calculated as
523
+ (𝑈𝑥𝑥(𝑥, 𝑦)
524
+ 𝑈𝑥𝑦(𝑥, 𝑦)
525
+ 𝑈𝑦𝑥(𝑥, 𝑦)
526
+ 𝑈𝑦𝑦(𝑥, 𝑦)) = (
527
+ 0
528
+ 1
529
+ −𝑘 + 2𝛼𝛽exp(−𝛽𝑥2)[1 − 2𝛽𝑥2exp(−𝛽𝑥2)]
530
+ −𝛾)
531
+ (a)
532
+ (b)
533
+
534
+ 10 / 27
535
+
536
+ (21)
537
+ Further, the linearization matrix at the singular points (±√ln(2𝛼𝛽 𝑘
538
+ ⁄ ) 𝛽
539
+
540
+ , 0) can
541
+ be denoted as
542
+ (𝑈𝑥𝑥(𝑥, 𝑦)
543
+ 𝑈𝑥𝑦(𝑥, 𝑦)
544
+ 𝑈𝑦𝑥(𝑥, 𝑦)
545
+ 𝑈𝑦𝑦(𝑥, 𝑦)) |
546
+ 𝑥=±√ln(2𝛼𝛽 𝑘
547
+ ⁄ )
548
+ 𝛽
549
+ ,𝑦=0 = (
550
+ 0
551
+ 1
552
+
553
+ 𝑘2
554
+ 𝛼𝛽 ln (
555
+ 2𝛼𝛽
556
+ 𝑘 )
557
+ −𝛾) (22)
558
+ By solving Eq. (22), the corresponding eigenvalues are calculated as
559
+ 𝛽1,2 =
560
+ −𝛾±√𝛾2−4𝑘2
561
+ 𝛼𝛽 ln(2𝛼𝛽
562
+ 𝑘 )
563
+ 2
564
+ (23)
565
+ Similarly, the linearization matrix at the singular point (0,0) is
566
+ (𝑈𝑥𝑥(𝑥, 𝑦)
567
+ 𝑈𝑥𝑦(𝑥, 𝑦)
568
+ 𝑈𝑦𝑥(𝑥, 𝑦)
569
+ 𝑈𝑦𝑦(𝑥, 𝑦)) |𝑥=0,𝑦=0 = (
570
+ 0
571
+ 1
572
+ −𝑘 + 2𝛼𝛽
573
+ −𝛾) (24)
574
+ The corresponding eigenvalues to the linearization matrix in Eq. (24) are
575
+ 𝜆1,2 =
576
+ −𝛾±√𝛾2+4(2𝛼𝛽−𝑘)
577
+ 2
578
+ (25)
579
+ Assuming that 𝜌(𝑥, 𝑦, 𝑡) is the PDF of the stochastic process in Eq. (18), the
580
+ corresponding the Fokker-Planck equation is [33]
581
+ 𝜕𝜌(𝑥,𝑦,𝑡)
582
+ 𝜕𝑡
583
+ = −
584
+ 𝜕𝑦
585
+ 𝜕𝑥 𝜌(𝑥, 𝑦, 𝑡) −
586
+ 𝜕
587
+ 𝜕𝑦 [−𝛾𝑦 − 𝑘𝑥 + 2𝛼𝛽𝑥exp(−𝛽𝑥2) +
588
+ 𝐴 cos(𝜔0𝑡)]𝜌(𝑥, 𝑦, 𝑡) + 𝛾𝐷
589
+ 𝜕2
590
+ 𝜕𝑦2 𝜌(𝑥, 𝑦, 𝑡) (26)
591
+ Then, the corresponding SPD function to Eq. (18) can be denoted as
592
+ 𝜌s(𝑥, 𝑦, 𝑡) = 𝑁(𝑡)exp [−
593
+ 1
594
+ 𝐷 (
595
+ 1
596
+ 2 𝑦2 +
597
+ 𝑘
598
+ 2 𝑥2 + 𝛼exp(−𝛽𝑥2) − 𝑥𝐴 cos(𝜔0𝑡))] (27)
599
+ where 𝑁(𝑡) stands for the normalization constant [34]
600
+ 𝑁(𝑡) =
601
+ 1
602
+
603
+
604
+ exp[−𝑈̂(𝑥,𝑦,𝑡)
605
+ 𝐷
606
+ ]d𝑥d𝑦
607
+
608
+ −∞
609
+
610
+ −∞
611
+ (28)
612
+ in which 𝑈̂(𝑥, 𝑦, 𝑡) denotes the generalized potential
613
+ 𝑈̂(𝑥, 𝑦, 𝑡) =
614
+ 1
615
+ 2 𝑦2 +
616
+ 𝑘
617
+ 2 𝑥2 + 𝛼exp(−𝛽𝑥2) − 𝑥𝐴 cos(𝜔0𝑡) (29)
618
+ The
619
+ transition
620
+ rates
621
+ of
622
+ particles
623
+ at
624
+ the
625
+ singular
626
+ points
627
+ (𝑥±, 𝑦±) =
628
+ (±√ln(2𝛼𝛽 𝑘
629
+ ⁄ ) 𝛽
630
+
631
+ , 0) can be calculated as [35]
632
+ 𝑊±(𝑡) =
633
+ √𝛽1𝛽2
634
+
635
+ √−
636
+ 𝜆1
637
+ 𝜆2 exp [
638
+ 1
639
+ 𝐷 (
640
+ 𝑘
641
+ 2𝛽 (1 + ln (
642
+ 2𝛼𝛽
643
+ 𝑘 )) − 𝛼 ∓ √
644
+ ln(2𝛼𝛽 𝑘
645
+ ⁄ )
646
+ 𝛽
647
+ 𝐴 cos(𝜔0𝑡))]
648
+ (30)
649
+
650
+ 11 / 27
651
+
652
+ Finally, the analytic expression of the output SNR of the response of the
653
+ underdamped harmonic-Gaussian double-well potential system in Eq. (17) is derived
654
+ as
655
+ SNR =
656
+ π𝑐2𝛼12𝜂02
657
+ 𝛼02+Ω2 |Ω=𝜔0 ×
658
+ 𝛼02+𝜔02
659
+ 4𝑐2𝛼0 [1 −
660
+ 𝛼12𝜂02
661
+ 2(𝛼02+𝜔02)]
662
+ −1
663
+ =
664
+ π𝛼1𝜂02
665
+ 4
666
+ [1 −
667
+ 𝛼12𝜂02
668
+ 2(𝛼02+𝜔02)]
669
+ −1
670
+ (31)
671
+ where
672
+ 𝛼1 = 𝛼0 =
673
+ √𝛽1𝛽2
674
+ π
675
+ √−
676
+ 𝜆1
677
+ 𝜆2 exp(−𝑢) (32)
678
+ Figures 4(a)-4(d) show the output SNR as noise intensity 𝐷 varies under different
679
+ system parameters. It is found from Fig. 4(a) that the output SNR increases and then
680
+ decreases as noise intensity increases, suggesting that a noise-induced underdamped
681
+ harmonic-Gaussian double-well potential SR happens. Moreover, increasing 𝑘 can
682
+ maximize the output SNR. Like this, adjusting 𝛾, 𝛼 and 𝛽 can also improve the
683
+ output SNR as shown in Fig. 4(b), Fig. 4(c) and Fig. 4(d) respectively, where the peak
684
+ value of output SNR and the resonant noise intensity are changed. Figures 4(e)-4(h)
685
+ show the output SNR as the function of system parameters for a given signal.
686
+ Adjusting the system parameters can activate the underdamped harmonic-Gaussian
687
+ double-well potential SR, as shown in Fig. 4(e)-4(h). Different from the overdamped
688
+ harmonic-Gaussian double-well potential SR, it is noticed from Fig. 4(e)-4(h) that the
689
+ antiresonance disappears in the underdamped one. That is because the damped factor
690
+ changes the stability of the nonlinear system.
691
+
692
+ 12 / 27
693
+
694
+
695
+ Fig. 4 SNR of underdamped harmonic-Gaussian double-well potential SR varies with
696
+ system parameters and noise intensity: SNR as a function of noise intensity under
697
+ different 𝑘 in (a), 𝛾 in (b) and 𝛼 in (c), 𝛽 in (d); SNR as a two-dimensional
698
+ function of (𝛽, 𝛼) in (e), (𝛽, 𝑘) in (f), (𝛾, 𝑘) in (g) and (𝛾, 𝛼) in (h).
699
+ Figure 5 shows the SPD functions and the corresponding system responses. In Fig.
700
+ 5(a), the SPD functions vary from asymmetrical peaks into two symmetrical ones as
701
+ noise intensity raises, suggesting that the underdamped harmonic-Gaussian
702
+ double-well potential SR changes from intra-well SR into inter-well one. In Fig. 5(b),
703
+ a weak period occurs when intra-well SR happens, and then the system response
704
+ (a)
705
+ (b)
706
+ (c)
707
+ (e)
708
+ (f)
709
+ (g)
710
+ (d)
711
+ (h)
712
+
713
+ 13 / 27
714
+
715
+ becomes chaotic when the particles jump randomly between double wells and finally
716
+ is periodic when the inter-well SR takes place.
717
+
718
+ Fig. 5 SPD functions and the corresponding system responses of underdamped
719
+ harmonic-Gaussian double-well potential SR under different noise intensity: (a) the
720
+ SPD functions and (b) the corresponding system responses.
721
+
722
+ 4. Application of harmonic-Gaussian double-well potential SR to enhance weak
723
+ fault characteristics of machinery
724
+ Rotating components of machinery including bearings, gears and rotors are more
725
+ prone to failures than fixed components due to contact fatigue, uneven lubrication,
726
+ misalignment and so on [36-38]. Therefore, how to detect weak fault characteristics of
727
+ rotating components in the early stage becomes a challenge [39]. Lots of scholars
728
+ have attempted to cancel or suppress the noise embedded in a signal to extract weak
729
+ fault characteristics further [40, 41]. On the contrary, we would apply
730
+ harmonic-Gaussian double-well potential SR to enhance weak fault characteristics of
731
+ machinery by using noise.
732
+ Four Rexnord ZA-2115 double row bearing run-to-failure experiments under the
733
+ rotating speed 2000 rpm and radial load 6000 lbs were performed to acquire the
734
+ bearing failure data by using accelerometers and a data acquisition card. The bearing
735
+ parameters are listed as below: the ball number 16, the pitch diameter 2.815 inches,
736
+ the contact angle 15.17 degrees and rolling element diameter 0.331 inches. The
737
+ bearing experimental rig is shown in Fig. 6(a) and the corresponding sensor
738
+ placement is illustrated in Fig. 6(b). This experimental rig is composed of four tested
739
+ bearings, an AC motor and rub belts [42]. In the bearing run-to-failure experiment, the
740
+ (a)
741
+ (b)
742
+
743
+ 14 / 27
744
+
745
+ sampling frequency is 20 kHz and the sampling time is 1.024 seconds.
746
+
747
+ Fig. 6 Bearing test rigs and sensor placement illustration: (a) bearing test rigs and (b)
748
+ sensor placement illustration.
749
+ All failures occurred after exceeding designed life time of the bearing which is
750
+ more than 100 million revolutions. The data set describes a test-to-failure experiment
751
+ and consists of individual files that are 1.024-seconds vibration signal snapshots
752
+ recorded at 10-minutes intervals. The recording duration is from February 12, 2004
753
+ 10:32:39 to February 19, 2004 06:22:39. At the end of the test-to-failure experiment,
754
+ outer race failure occurred in the tested bearing 1. The root mean square (RMS), an
755
+ effective health indicator, is often used to reflect the vibration intensity and monitor
756
+ the health state of bearings further. Therefore, RMS of bearing run-to-failure
757
+ experimental vibration data is calculated and depicted in Fig. 7 to observe the
758
+ degradation trend of the tested bearing 1. The degradation trend changes slowly with
759
+ slight fluctuation in the range of 0~88 hours and then raises into the larger RMS for
760
+ degradation marked in red dot in the zoomed RMS plot, suggesting that a tiny outer
761
+ race failure occurs in the early stage of the tested bearing 1. As time went on, it can be
762
+ seen from Fig. 7 that RMS keeps increasing, indicating that the outer race failure
763
+ becomes more and more severe. Finally, this test-to-failure experiment was stopped
764
+ because of strong vibration. In the test-to-failure experiment, the health state of the
765
+ tested bearing varies from normal to the early failure to severe failure to end of life,
766
+ which is consistent with the degradation trend reflected by RMS.
767
+ (a)
768
+ Accelerometers
769
+ Bearing 1
770
+ Bearing 2
771
+ Bearing 3
772
+ Bearing 4
773
+ Motor
774
+ Rub belts
775
+ (b)
776
+
777
+ 15 / 27
778
+
779
+
780
+ Fig. 7 RMS of the bearing run-to-failure vibration signals.
781
+ The raw vibration signal at the 88.83th hour marked in red dot and its frequency
782
+ and envelope spectrum are depicted in Fig. 8. We cannot observe the eye-catching
783
+ spectral peaks at the theoretical outer race/inner race/roller/cage fault characteristic
784
+ frequency and its harmonics from both the frequency spectrum in Fig. 8(b) and the
785
+ zoomed envelope spectrum in Fig. 8(c), which are submerged by other spectral peaks
786
+ from background noise and excited by other normal components. Although we have
787
+ completed the bearing run-to-failure experiment and observed that a failure occurred
788
+ at the outer race of the tested bearing 1 by disassembling four tested bearings, we
789
+ cannot judge what time a tiny failure occurs at the outer race of the tested bearing 1
790
+ by virtue of the raw vibration signal and its spectrum in Fig. 8, which is very
791
+ important for early fault diagnosis and remaining useful life prediction.
792
+
793
+ 16 / 27
794
+
795
+ Fig. 8 The vibration signal and its spectrum of outer race failure bearing at the early
796
+ stage: (a) the raw signal, (b) its frequency spectrum and (c) zoomed envelope
797
+ spectrum.
798
+ We apply the overdamped harmonic-Gaussian double-well potential SR to enhance
799
+ the weak fault characteristics in the early stage of the tested bearing 1. Figure 9 shows
800
+ the enhanced results of weak fault characteristics embedded in the raw vibration
801
+ signal, where the system parameters are given as 𝑘 = 1.1, 𝛼 = 1.2, 𝛽 = 0.24 and
802
+ the integral step is ℎ=0.035. The overdamped SR cannot be used to process
803
+ large-parameter signals directly and frequency-shifted and rescaling transform is
804
+ widely to solve it. Three key parameters of frequency-shifted and rescaling transform
805
+ in the overdamped harmonic-Gaussian double-well potential SR are given as below
806
+ by virtue of the theoretical outer race fault characteristic frequency 236.4 Hz that can
807
+ be calculated according to the structural parameters and rotating speed of the tested
808
+ bearing 1: the pass-band cut-off frequency 220 Hz, the stop-band cut-off frequency
809
+ 200 Hz and the carrier frequency 200 Hz. These parameters in the frequency-shifted
810
+ and rescaling transform could be selected according to the reference [43]. One can
811
+
812
+ 17 / 27
813
+
814
+ observe from Fig. 9 that the enhanced signal characterizes strong impacts and
815
+ dominant spectral peaks are at the outer race fault characteristic frequency and its
816
+ second harmonic of the tested bearing 1, suggesting that a tiny failure occurs at the
817
+ outer race of the tested bearing 1. However, the overdamped harmonic-Gaussian
818
+ double-well potential SR depends on the high-pass filter to perform the
819
+ frequency-shifted and rescaling transform, whose parameters are given artificially.
820
+ In the overdamped harmonic-Gaussian double-well potential SR-based enhanced
821
+ results, the low-frequency components of the raw vibration signal (<200Hz) have
822
+ been removed by using the frequency-shifted and rescaling transform. Moreover, the
823
+ overdamped harmonic-Gaussian double-well potential SR method would suppress the
824
+ components beyond the nonlinear filtering frequency band of overdamped
825
+ harmonic-Gaussian
826
+ double-well
827
+ potential
828
+ SR.
829
+ Although
830
+ overdamped
831
+ harmonic-Gaussian double-well potential SR method is able to utilize the noise
832
+ located in the nonlinear filtering frequency band of overdamped harmonic-Gaussian
833
+ double-well potential SR for enhancing weak fault characteristics, a part of noise is
834
+ removed. Therefore, the amplitude of the detected result in Fig. 9 is smaller than that
835
+ in Fig. 8.
836
+
837
+ Fig. 9 Overdamped harmonic-Gaussian double-well potential SR-based enhanced
838
+ results: (a) the enhanced signal and (b) its zoomed frequency spectrum.
839
+ fouter
840
+ 2fouter
841
+
842
+ 18 / 27
843
+
844
+ Further, we apply the underdamped harmonic-Gaussian double-well potential SR to
845
+ enhance weak fault characteristics embedded in the raw vibration signal, as shown in
846
+ Fig. 10 whose system parameters are given as 𝑘=1.2, 𝛼=1.1, 𝛽=0.24, 𝛾=0.33 and
847
+ ℎ =0.035. There are obvious repetitive transients in the enhanced signal and
848
+ eye-catching spectral peaks at the outer race fault characteristic frequency and its
849
+ second harmonic in the zoomed frequency spectrum as shown in Fig. 10(b).
850
+ Compared with the overdamped harmonic-Gaussian double-well potential SR-based
851
+ results, the underdamped one characterizes the higher spectral peaks at the outer race
852
+ fault characteristic frequency and its second harmonic in the zoomed frequency
853
+ spectrum.
854
+
855
+ Fig. 10 Underdamped harmonic-Gaussian double-well potential SR-based enhanced
856
+ results: (a) the enhanced signal and (b) its zoomed frequency spectrum.
857
+ For a comparison, we use the advanced robust local mean decomposition (RLMD)
858
+ [44, 45] to decompose the raw vibration signal of the tested bearing 1 into the product
859
+ functions (PFs) and a residual component (Res) for extracting weak fault
860
+ characteristics. The product functions and their zoomed envelope spectrum are shown
861
+ in Fig. 11(a) and Fig. 11(b), respectively. One cannot observe the obvious spectral
862
+ peaks at the outer race fault characteristic frequency and its harmonics from the
863
+ zoomed envelope spectrum.
864
+ fouter
865
+ 2fouter
866
+ Rotating frequency
867
+ and its harmonics
868
+
869
+ 19 / 27
870
+
871
+
872
+ Fig. 11 RLMD-based results: (a) product functions and (b) their zoomed envelope
873
+ spectrum.
874
+ In addition to signal decomposition methods, signal denoising or signal filtering
875
+ methods also have been widely applied to extract weak fault characteristics of
876
+ machinery. Among them, wavelet transform [46, 47] is typical to obtain a denoised
877
+ version of the raw signal by thresholding the wavelet coefficients. Here, the maximal
878
+ overlap discrete wavelet transform is used to denoise the signal with soft thresholding,
879
+ level 3 and db4 wavelet. The denoised signal and its zoomed envelope spectrum are
880
+ shown in Fig. 12 and Fig. 13, respectively. It is found from Fig. 12 that the wavelet
881
+ transform can cancel strong background noise, but we cannot see any fault
882
+ characteristics at the first sight from the zoomed envelope spectrum in Fig. 13.
883
+ (a)
884
+ (b)
885
+ PF1
886
+ PF2
887
+ PF3
888
+ PF4
889
+ PF5
890
+ Res
891
+ PF1
892
+ PF2
893
+ PF3
894
+ PF4
895
+ PF5
896
+ Res
897
+ Time [s]
898
+ Frequency [Hz]
899
+ Amplitude [g]
900
+
901
+ 0.2
902
+ h
903
+ 0
904
+ 0.2
905
+ 0
906
+ 0.2
907
+ 0.4
908
+ 0.6
909
+ 0.8
910
+ 0.1
911
+ 0
912
+ -0.1
913
+ 0
914
+ 0.2
915
+ 0.4
916
+ 0.6
917
+ 0.8
918
+ 1
919
+ 0.05
920
+ 0.05
921
+ 0
922
+ 0.2
923
+ 0.4
924
+ 0.6
925
+ 0.8
926
+ 0.02
927
+ -0.02
928
+ 0
929
+ 0.2
930
+ 0.4
931
+ 0.6
932
+ 0.8
933
+ ×10-3
934
+ ?>>
935
+ -5
936
+ -10
937
+ 0
938
+ 0.2
939
+ 0.4
940
+ 0.6
941
+ 0.8
942
+ X10-3
943
+ 5
944
+ 0
945
+ -5
946
+ 0
947
+ 0.2
948
+ 0.4
949
+ 0.6
950
+ 0.8 20 / 27
951
+
952
+
953
+ Fig. 12 Undecimated wavelet transform-based denoised signals.
954
+
955
+ Fig. 13 The zoomed envelope spectrum of undecimated wavelet transform-based
956
+ denoised signals.
957
+ A classical symptom of rotating machines failures in vibration signals is the
958
+ presence of repetitive transients. Antoni [48] proposed an infogram method to capture
959
+ the signature of repetitive transients in time domain, which is the variant of classical
960
+ fast kurtogram method. This method is used to process the raw vibration signal for
961
+ extracting repetitive transients in time domain. The corresponding results are shown
962
+ in Fig. 14. Although it can see the slight repetitive transients from the filtered signal in
963
+ Fig. 14(b), it is difficult for us to identify the period of repetitive transients because of
964
+ strong background noise and other normal vibration components. The above
965
+ conclusion could be further confirmed by the squared envelope amplitude sepctrum of
966
+
967
+ 21 / 27
968
+
969
+ the filtered signal in Fig. 14(b), in which we cannot see the eye-catching spectral
970
+ peaks at the outer race fault characteristic frequency and its harmonics.
971
+
972
+ Fig. 14 The detected results using infogram: (a) infogram and (b) the filtered signal
973
+ and its squared envelope amplitude sepctrum.
974
+
975
+ 5. Conclusions
976
+ The overdamped and underdamped harmonic-Gaussian double-well potential SR
977
+ are investigated by deriving the output SNR and SPD functions. It is found that both
978
+ noise-induced SR and parameter-induced SR can be activated in the overdamped and
979
+ underdamped harmonic-Gaussian double-well potential systems. Moreover, since the
980
+ harmonic-Gaussian double-well potential in the range of 𝑘 ≥ 2𝛼𝛽 loses the stability,
981
+ we can observe the antiresonance, whereas adding the damped factor into the
982
+ overdamped harmonic-Gaussian double-well potential system can change the stability,
983
+ resulting that the antiresonance disappears. Above conclusion is applicable under all
984
+ parameters.
985
+ Finally,
986
+ we
987
+ apply
988
+ both
989
+ the
990
+ overdamped
991
+ and
992
+ underdamped
993
+ harmonic-Gaussian double-well potential SR to enhance weak fault characteristics of
994
+ bearings for incipient fault identification, where the corresponding parameters would
995
+ be adjusted or optimized instead of all parameters are applicable to activate the
996
+ optimal SR. The weak fault characteristics are enhanced successfully to identify the
997
+ early failure of bearings, which somewhat outperforms to the RLMD, wavelet
998
+ transform and infogram-based results. But the SR-based methods depend on the prior
999
+ knowledge of the signals to be detected or structural parameters and rotating speeds of
1000
+ bearings, and cannot detect unknown multiple-frequency and multiple-component
1001
+ (a)
1002
+ (b)
1003
+
1004
+ 22 / 27
1005
+
1006
+ coupled signals without any prior knowledge. Therefore, we would study the
1007
+ SR-based signal decomposition method by using noise to decouple and detect
1008
+ unknown
1009
+ multiple-frequency
1010
+ and
1011
+ multiple-component
1012
+ signals,
1013
+ especially
1014
+ time-varying nonstationary signals in the future.
1015
+
1016
+ Acknowledgments
1017
+ This research was supported by Foundation of the State Key Laboratory of
1018
+ Performance Monitoring and Protecting of Rail Transit Infrastructure of East China
1019
+ Jiaotong University (HJGZ2021114), Laboratory of Yangjiang Offshore Wind Power
1020
+ (YJOFWD-OF-2022A08), Zhejiang Provincial Natural Science Foundation of China
1021
+ (LQ22E050003), National Natural Science Foundation of China (52205569), Ningbo
1022
+ Science and Technology Major Project (2020Z110, 2022Z057, 2022Z002), National
1023
+ Natural Science Foundation of China (51905349, 62001210, U2013603), Natural
1024
+ Science Foundation of Guangdong Province (2022A1515010126, 2020A1515011509),
1025
+ Ningbo Natural Science Foundation (2022J098) and also sponsored by K.C. Wong
1026
+ Magna Fund in Ningbo University. The Spanish State Research Agency (AEI) and the
1027
+ European
1028
+ Regional
1029
+ Development
1030
+ Fund
1031
+ (ERDF)
1032
+ under
1033
+ Project
1034
+ No.
1035
+ PID2019-105554GB-I00 is also aknowledged.
1036
+
1037
+ Conflicct of Interest
1038
+ The authors declare that they have no conflict of interest.
1039
+
1040
+ Data availability
1041
+ The datasets generated during and/or analysed during the current study are
1042
+ available from the corresponding author on reasonable request.
1043
+
1044
+ References
1045
+ [1] Rai A, Upadhyay S H. A review on signal processing techniques utilized in the
1046
+ fault diagnosis of rolling element bearings, Tribology International, 2016, 96:
1047
+ 289-306.
1048
+
1049
+ 23 / 27
1050
+
1051
+ [2] Benzi R, Sutera A, Vulpiani A. The mechanism of stochastic resonance, Journal
1052
+ of Physics A: Mathematical and General, 1981, 14(11): L453-L457.
1053
+ [3] Gammaitoni L, Hanggi P, Jung P, et al. Stochastic resonance, Reviews of Modern
1054
+ Physics, 1998, 70(1): 223-287.
1055
+ [4] Qiao Z, Lei Y, Li N. Applications of stochastic resonance to machinery fault
1056
+ detection: A review and tutorial, Mechanical Systems and Signal Processing,
1057
+ 2019, 122: 502-536.
1058
+ [5] Moss F, Ward L M, Sannita W G. Stochastic resonance and sensory information
1059
+ processing: A tutorial and review of application, Clinical Neurophysiology, 2004,
1060
+ 115(2): 267-281.
1061
+ [6] Dong H, Shen X, He K, et al. Nonlinear filtering effects of intrawell matched
1062
+ stochastic resonance with barrier constrainted duffing system for ship radiated
1063
+ line signature extraction, Chaos, Solitons and Fractals, 2020, 141: 110428.
1064
+ [7] Fu Y, Kang Y, Liu R. Novel bearing fault diagnosis algorithm based on the
1065
+ method of moments for stochastic resonant systems, IEEE Transactions on
1066
+ Instrumentation and Measurement, 2020, 70: 1-10.
1067
+ [8] Xu P, Jin Y. Stochastic resonance in an asymmetric tristable system driven by
1068
+ correlated noises, Applied Matheatical Modelling, 2020, 77: 408-425.
1069
+ [9] Lei Y, Qiao Z, Xu X, et al. An underdamped stochastic resonance method with
1070
+ stable-state matching for incipient fault diagnosis of rolling element bearings,
1071
+ Mechanical Systems and Signal Processing, 2017, 94: 148-164.
1072
+ [10] Li J, Chen X, He Z. Multi-stable stochastic resonance and its application research
1073
+ on mechanical fault diagnosis, Journal of Sound and Vibration, 2013, 332(22):
1074
+ 5999-6015.
1075
+ [11] Li F, Duan F, Chapeau-Blondeau F, et al. Signal estimation and filtering from
1076
+ quantized observations via adaptive stochastic resonance, Physical Review E,
1077
+ 2021, 103(5): 052108.
1078
+ [12] Rebolledo-Herrera L, Guillermo E FV. Quartic double-well system modulation
1079
+ for under-damped stochastic resonance tuning, Digital Signal Processing, 2016,
1080
+ 52: 55-63.
1081
+
1082
+ 24 / 27
1083
+
1084
+ [13] Qiao Z, Elhattab A, Shu X, et al. A second-order stochastic resonance method
1085
+ enhanced by fractional-order derivative for mechanical fault detection, Nonlinear
1086
+ Dynamics, 2021, 106(1): 707-723.
1087
+ [14] Guo W, Zhou Z, Chen C, et al. Multi-frequency weak signal detection based on
1088
+ multi-segment
1089
+ cascaded
1090
+ stochastic
1091
+ resonance
1092
+ for
1093
+ rolling
1094
+ bearings,
1095
+ Microelectronics Reliability, 2017, 75: 239-252.
1096
+ [15] Zhong S, Lv W, Ma H, et al. Collective stochastic resonance behavior in the
1097
+ globally coupled fractional oscillator, Nonlinear Dynamics, 2018, 94(2): 905-923.
1098
+ [16] Nicolis C, Nicolis G. Coupling-enhanced stochastic resonance, Physical Review
1099
+ E, 2017, 96(4): 042214.
1100
+ [17] Wadop Ngouongo Y J, Djolieu Funaye M, Djuidjé Kenmoé G, et al. Stochastic
1101
+ resonance in deformable potential with time-delayed feedback, Philosophical
1102
+ Transactions of the Royal Society A, 2021, 379(2192): 20200234.
1103
+ [18] Qiao Z, Shu X. Coupled neurons with multi-objective optimization benefit
1104
+ incipient fault identification of machinery, Chaos, Solitons and Fractals, 2021,
1105
+ 145: 110813.
1106
+ [19] Petracchi D, Gebeshuber I C, DeFelice L J, et al. Stochastic resonance in
1107
+ biological systems, Chaos Solitons and Fractals, 2000, 11(12): 1819-1822.
1108
+ [20] Xu L, Yu T, Lai L, et al. Stochastic resonance and superharmonic resonance of a
1109
+ noisy confined overdamped bistable system, Communications in Nonlinear
1110
+ Science and Numerical Simulation, 2020, 83: 105133.
1111
+ [21] Liu J, Cao J, Wang Y, et al. Asymmetric stochastic resonance in a bistable system
1112
+ driven by non-Gaussian colored noise, Physica A, 2019, 517: 321-336.
1113
+ [22] Yang J, Sanjuan M A, Liu H, et al. Stochastic P-bifurcation and stochastic
1114
+ resonance in a noisy bastable fractional-order system, Communications in
1115
+ Nonlinear Science and Numerical Simulation, 2016, 41: 104-117.
1116
+ [23] Liu S, Sun Y, Kang Y. A novel E-exponential stochastic resonance model and
1117
+ weak signal detection method for steel wire rope, IEEE Transactions on Industrial
1118
+ Electronics, 2022, 69(7): 7428-7440.
1119
+ [24] Zhang G, Zhang Y, Zhang T, et al. Stochastic resonance in second-order
1120
+
1121
+ 25 / 27
1122
+
1123
+ underdamped system with exponential bistable potential for bearing fault
1124
+ diagnosis, IEEE Access, 2018, 6: 42431-42444.
1125
+ [25] Monifi F, Zhang J, Qzdemir S K, et al. Optomechanically induced stochastic
1126
+ resonance and chaos transfer between optical fields, Nature Photonics, 2016,
1127
+ 10(6): 399-405.
1128
+ [26] Cheng K, Wang P. Analysis of multiscale quantum harmonic oscillator algorithm
1129
+ based on a new multimode objective function[J]. IEEE Access, 2019, 7:
1130
+ 46295-46305.
1131
+ [27] Hu G, Nicolis G, Nicolis C. Periodically forced Fokker-Planck equation and
1132
+ stochastic resonance, Physical Review A, 1990, 42(4): 2030.
1133
+ [28] Leng Y G, Leng Y S, Wang T Y, et al. Numerical analysis and engineering
1134
+ application of large parameter stochastic resonance, Journal of Sound and
1135
+ Vibration, 2006, 292(3-5): 788-801.
1136
+ [29] Bouzat S, Wio H S. Stochastic resonance in extended bistable systems: The role
1137
+ of potential symmetry, Physical Review E, 1999, 59(5): 5142.
1138
+ [30] Guo Y, Shen Y, Tan J. Stochastic resonance in a piecewise nonlinear model driven
1139
+ by multiplicative non-Gaussian noise and additive white noise, Communications
1140
+ in Nonlinear Science and Numerical Simulation, 2016, 38: 257-266.
1141
+ [31] Huang D, Yang J, Zhou D, et al. Recovering an unkonwn signal completely
1142
+ submegred in strong noise by a new stochastic resonance method,
1143
+ Communication in Nonlinear Science and Numerical Simulation, 2019, 66:
1144
+ 156-166.
1145
+ [32] He C, Niu P, Yang R, et al. Incipient rolling element bearing weak fault feature
1146
+ extraction based on adaptive second-order stochastic resonance incorporated by
1147
+ mode decomposition, Measurement, 2019, 145: 687-701.
1148
+ [33] Zhang H, Yang T, Xu W, et al. Effects of non-Gaussian noise on logical stochastic
1149
+ resonance in a triple-well potential system, Nonlinear Dynamics, 2014, 76(1):
1150
+ 649-656.
1151
+ [34] Gang H, Nicolis G, Nicolis C. Periodically forced Fokker-Planck equation and
1152
+ stochastic resonance, Physical Review A, 1990, 42(4): 2030.
1153
+
1154
+ 26 / 27
1155
+
1156
+ [35] Jia Y, Yu S, Li J. Stochastic resonance in a bistable system subject to
1157
+ multiplicative and additive noise, Physical Review E, 2000, 62(2): 1869.
1158
+ [36] Wei S, Wang D, Peng Z, et al. Variational nonlinear component decomposition
1159
+ for fault diagnosis of planetary gearboxes under variable speed conditions,
1160
+ Mechanical Systems and Signal Processing, 2022, 162: 108016.
1161
+ [37] He Y, Fu Y, Qiao Z, et al. Chaotic resonance in a fractional-order oscillator
1162
+ system with application to mechanical fault diagnosis, Chaos, Solitons and
1163
+ Fractals, 2021, 142: 110536.
1164
+ [38] Yuan J, Wang Y, Peng Y, et al. Weak fault detection and health degradation
1165
+ monitoring using customized standard multiwavelets, Mechanical Systems and
1166
+ Signal Processing, 2017, 94: 384-399.
1167
+ [39] Qiao W, Lu D. A survey on wind turbine condition monitoring and fault
1168
+ diagnosis—Part II: Signals and signal processing methods, IEEE Transactions on
1169
+ Industrial Electronics, 2015, 62(10): 6546-6557.
1170
+ [40] He Z, Shao H, Ding Z, et al. Modified deep auto-encoder driven by multi-source
1171
+ parameters for fault transfer prognosis of aero-engine, IEEE Transactions on
1172
+ Industrial Electronics, 2022, 69(1): 845-855.
1173
+ [41] Wang T, Han Q, Chu F, et al. Vibration based condition monitoring and fault
1174
+ diagnosis of wind turbine planetary gearbox: A review, Mechanical Systems and
1175
+ Signal Processing, 2019, 126: 662-685.
1176
+ [42] Qiu H, Lee J, Lin J, et al. Wavelet filter-based weak signature detection method
1177
+ and its application on rolling element bearing prognostics, Journal of Sound and
1178
+ Vibration, 2006, 289(4-5): 1066-1090.
1179
+ [43] Tan J, Chen X, Wang J, et al. Study of frequency-shifted and re-scaling stochastic
1180
+ resonance and its application to fault diagnosis, Mechanical Systems and Signal
1181
+ Processing, 2009, 23(3): 811-822.
1182
+ [44] Liu Z, Jin Y, Zuo M J, et al. Time-frequency representation based on robust local
1183
+ mean decomposition for multi-component AM-FM signal analysis, Mechanical
1184
+ Systems and Signal Processing, 2017, 95: 468-487.
1185
+ [45] Smith J S. The local mean decomposition and its application to EEG perception
1186
+
1187
+ 27 / 27
1188
+
1189
+ data, Journal of the Royal Society Interface, 2005, 2(5): 443-454.
1190
+ [46] Chen J, Li Z, Pan J, et al. Wavelet transform based on inner product in fault
1191
+ diagnosis of rotating machinery: A review, Mechanical Systems and Signal
1192
+ Processing, 2016, 70: 1-35.
1193
+ [47] Abbasion S, Rafsanjani A, Farshidianfar A, et al. Rolling element bearings
1194
+ multi-fault classification based on the wavelet denoising and support vector
1195
+ machine, Mechanical Systems and Signal Processing, 2007, 21(7): 2933-2945.
1196
+ [48] Antoni J. The infogram: Entropic evidence of the signature of repetitive transients,
1197
+ Mechanical Systems and Signal Processing, 2016, 74: 73-94.
1198
+
1199
+
1200
+
1201
+
1202
+
1203
+
1204
+
1205
+
1206
+ Zhejiang Provincial Key Laboratory of Part Rolling Technology
1207
+
1208
+ School of Mechanical Engineering and Mechanics • Ningbo University
1209
+
1210
+ Ningbo University
1211
+
1212
+
1213
+ July 24, 2022
1214
+
1215
+ RE: “Harmonic-Gaussian double-well potential stochastic resonance with its
1216
+ application to enhance weak fault characteristics of machinery” by Zijian Qiao, Shuai
1217
+ Chen, Zhihui Lai, Shengtong Zhou and Miguel A. F. Sanjuán (Manuscript Number:
1218
+ NODY-D-22-01167)
1219
+
1220
+
1221
+
1222
+ Dear Editor,
1223
+
1224
+ We have carefully revised our paper taking into account your suggestions and the
1225
+ comments of the reviewers. We have uploaded the revised version and the revision
1226
+ notes. Thank you very much for processing our paper.
1227
+
1228
+ We appreciate very much the constructive comments and suggestions provided by the
1229
+ reviewers. They have been incorporated in the revised version of this paper. Major
1230
+ changes made in the paper are marked in blue. The following summarizes our
1231
+ response to each point raised by each reviewer.
1232
+
1233
+ We would like to thank the three reviewers for their valuable comments and
1234
+ constructive suggestions to improve the quality of this paper. We have fully
1235
+ considered their comments and suggestions and made revisions accordingly. The
1236
+ major revisions are highlighted by BLUE color. The point-to-point explanations and
1237
+ revisions are listed as follow.
1238
+
1239
+ We have taken into full consideration all comments of the three referees and made a
1240
+ thorough revision of the paper.
1241
+
1242
+
1243
+
1244
+ Sincerely yours,
1245
+
1246
+ Zijian Qiao Ph.D
1247
+ Shuai Chen M.S.
1248
+ Zhihui Lai Ph.D
1249
+ Shengtong Zhou Ph.D
1250
+ Miguel A. F. Sanjuán Ph.D
1251
+ Cover Letter
1252
+ Click here to access/download;attachment to
1253
+ manuscript;Cover Letter.doc
1254
+ Click here to view linked References
1255
+
1256
+
1257
+
1258
+
1259
+ Page 1 of 1
1260
+ Highlights
1261
+
1262
+ RE: “Harmonic-Gaussian double-well potential stochastic resonance with its application to
1263
+ enhance weak fault characteristics of machinery” by Zijian Qiao, Shuai Chen, Zhihui Lai,
1264
+ Shengtong Zhou and Miguel A. F. Sanjuán
1265
+
1266
+  Harmonic-Gaussian double-well potential SR is investigated by deriving and measuring
1267
+ the output SNR.
1268
+  Steady-state probability density functions are used to evaluate the transition rates of
1269
+ particles in the harmonic-Gaussian double-well potential.
1270
+  Parameter-induced SR, noise-induced SR and antiresonance are observed by analyzing
1271
+ the output SNR.
1272
+  Harmonic-Gaussian double-well potential SR is applied to enhance weak fault
1273
+ characteristics of machinery successfully.
1274
+ Highlights
1275
+ Click here to access/download;attachment to
1276
+ manuscript;Highlights.doc
1277
+ Click here to view linked References
1278
+
1279
+ Declaration of Interest Statement
1280
+ The authors declare that they have no conflict of interest.
1281
+ Declaration of Interest Statement
1282
+ Click here to access/download;attachment to
1283
+ manuscript;Declaration of Interest Statement.docx
1284
+ Click here to view linked References
1285
+
1286
+ Manuscript Number: NODY-D-22-01167R1
1287
+ Title: Harmonic-Gaussian double-well potential stochastic resonance with its application to enhance
1288
+ weak fault characteristics of machinery
1289
+ Response to Editor
1290
+ There are still some minor comments raised by one of the reviewers needed to be addressed. A minor
1291
+ revision is recommended.
1292
+ Response: We appreciate the constructive comments from two reviewers. According to their
1293
+ comments and suggestions, we have made a thorough revision for the manuscript and have addressed
1294
+ all points raised by each reviewer. The major changes made in the manuscript are marked in BLUE
1295
+ color. We also include the major changes of the manuscript into the response point by point. For
1296
+ convenient review, the page numbers or paragraph numbers of the revision in the manuscript are
1297
+ cited below.
1298
+ We hope that this revised submission is satisfactory. The authors thank editors and anonymous
1299
+ reviewers for their valuable and helpful comments to revise and improve our manuscript.
1300
+ Compressed File
1301
+ Click here to access/download;Compressed File;Response to
1302
+ Reviewers.docx
1303
+
1304
+ Manuscript Number: NODY-D-22-01167R1
1305
+ Title: Harmonic-Gaussian double-well potential stochastic resonance with its application to enhance
1306
+ weak fault characteristics of machinery
1307
+ Response to Reviewer #3
1308
+ The authors have correctly taken into consideration the reviewers comments.
1309
+ Response: Thanks for your recommendation.
1310
+
1311
+
1312
+ Manuscript Number: NODY-D-22-01167R1
1313
+ Title: Harmonic-Gaussian double-well potential stochastic resonance with its application to enhance
1314
+ weak fault characteristics of machinery
1315
+ Response to Reviewer #5
1316
+ The paper presents that the overdamped or underdamped harmonic Gaussian double-well potential
1317
+ SR methods characterize a better performance to detect a weak signal. The work is organized in a
1318
+ clear form, but the technical content looks not high and there are important aspects that are not
1319
+ discussed.
1320
+ 1. Whether the analysis conclusion obtained is the conclusion under these special parameters or
1321
+ whether all parameters are applicable? Please give some explanations.
1322
+ Response: According to the comments of the reviewer #5, we think that two analysis conclusion
1323
+ obtained could be illustrated whether under these special parameters or all parameters.
1324
+ In Sections 2 and 3: Overdamped and underdamped harmonic-Gaussian double-well
1325
+ potential SR
1326
+ We investigate the SR in the cases of overdamped and underdamped harmonic-Gaussian
1327
+ double-well potential systems subjected to noise and a periodic signal. We derive and measure the
1328
+ analytic expression of the output signal-to-noise ratio (SNR) and the steady-state probability density
1329
+ (SPD) function under approximate adiabatic conditions. When the harmonic-Gaussian double-well
1330
+ potential loses its stability, we can observe the antiresonance phenomenon, whereas adding the
1331
+ damped factor into the overdamped system can change the stability of the harmonic-Gaussian
1332
+ double-well potential, resulting that the antiresonance behavior disappears in the underdamped
1333
+ system. Although above analysis conclusion is obtained under these special parameters, other
1334
+ parameters would depict the same findings. As a result, the analysis conclusion obtained in two
1335
+
1336
+ sections is applicable under all parameters.
1337
+ In Section 4: Application of harmonic-Gaussian double-well potential SR to enhance weak
1338
+ fault characteristics of machinery
1339
+ Harmonic-Gaussian double-well potential stochastic resonance is a typical nonlinear filter with the
1340
+ adjusting parameters in which the noise embedded in a signal is able to be utilized to enhance weak
1341
+ useful information by activating the stochastic resonance phenomenon. The stochastic resonance
1342
+ phenomenon could be activated when the optimal matching among the weak useful information,
1343
+ noise and these parameters of stochastic resonance. For a different signal, therefore, these parameters
1344
+ of the harmonic-Gaussian double-well potential stochastic resonance must be tuned to activate the
1345
+ stochastic resonance phenomenon for enhancing weak useful information by using noise. As a result,
1346
+ applying harmonic-Gaussian double-well potential stochastic resonance to enhance weak fault
1347
+ characteristics of machinery, these parameters of harmonic-Gaussian double-well potential stochastic
1348
+ resonance would be adjusted or optimized instead of all parameters are applicable to activate the
1349
+ optimal stochastic resonance phenomenon. (See the conclusion in Section 5 page 21, which is
1350
+ marked in BLUE)
1351
+
1352
+ 2. "Noise is ubiquitous and unwanted in detecting weak signals", This sentence is repeated and can
1353
+ be deleted.
1354
+ Response: Thanks for your suggestions. We have deleted it in Abstract. (See the abstract in page 1,
1355
+ which is marked in BLUE)
1356
+
1357
+
1358
+ 3 "Key words" write too long.
1359
+ Response: Thanks for your suggestions. We have reduced the key words as below: The benefits of
1360
+ noise, weak signature enhancement, fault identification, fault diagnosis. (See the key words in page 2,
1361
+ which is marked in BLUE)
1362
+
1363
+ 4 "The recording duration is from February 12, 2004 10:32:39 to February 19, 2004 06:22:39".
1364
+ Why was it 18 years ago?
1365
+ Response: That is because Four Rexnord ZA-2115 double row bearing run-to-failure experiments
1366
+ under the rotating speed 2000 rpm and radial load 6000 lbs were performed in 2004 year. In future
1367
+ work, we would perform and conduct new bearing run-to-failure experiments. Now, our team is
1368
+ designing the new experimental platform and project to acquire new bearing and gear vibration data.
1369
+ Thanks for your understanding.
1370
+
1371
+
49E2T4oBgHgl3EQfOgYr/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
4NE0T4oBgHgl3EQfeQCD/content/2301.02388v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:3525913eea0d18c39cec2e721f87c36e2e17299085cf24c71daedcbe74cca666
3
+ size 4835472
4tE0T4oBgHgl3EQfegAX/content/2301.02390v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d84be0bbea59cfe92b4cda9ee4373356888df5fc4bfd8adb61f15786162af0be
3
+ size 261179
4tE0T4oBgHgl3EQfegAX/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:105e3ded907e680dd154e5c625b6eace99d4544980fcb0282c9bd2adc86a5049
3
+ size 1114157
4tE0T4oBgHgl3EQfegAX/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:bbbf63601e1c3d717415e0dffd9a814e3102a129336e5820f8f7b8a546c57a52
3
+ size 45690
5dE2T4oBgHgl3EQf6wiO/content/tmp_files/2301.04203v1.pdf.txt ADDED
@@ -0,0 +1,945 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.04203v1 [math.CV] 10 Jan 2023
2
+ ZERO DISTRIBUTION OF RANDOM BERNOULLI POLYNOMIAL MAPPINGS
3
+ TURGAY BAYRAKTAR & C¸˙I˘GDEM C¸EL˙IK
4
+ ABSTRACT. In this note, we study asymptotic zero distribution of multivariable full sys-
5
+ tem of random polynomials with independent Bernoulli coefficients. We prove that with
6
+ overwhelming probability their simultaneous zeros sets are discrete and the associated
7
+ normalized empirical measure of zeros asymptotic to the Haar measure on the unit torus.
8
+ 1. INTRODUCTION
9
+ A random Kac polynomial on the complex plane is of the form
10
+ (1.1)
11
+ fd(z) =
12
+ d
13
+
14
+ j=0
15
+ ajzj
16
+ where the coefficients aj are independent copies of the (real or complex) standard Gauss-
17
+ ian. A classical result due to Kac, Hammersley and Shepp & Vanderbei [20, 16, 23] asserts
18
+ that almost surely the normalized empirical measure of zeros δZ(fd) := 1
19
+ d
20
+
21
+ fd(ζ)=0 δζ, con-
22
+ verges to normalized arc length measure on S1 := {|z| = 1} as d → ∞. Asymptotic
23
+ zero distribution of Kac polynomials with i.i.d. discrete random coefficients have also
24
+ been studied extensively (see eg. [22, 14]). More recently, Ibragimov and Zaporozhets
25
+ [19] proved that the empirical measure of zeros δZ(fd) almost surely converges to the the
26
+ normalized arc length measure if and only if the moment condition E[log(1 + |ai|)] < ∞
27
+ holds. This property can be considered as a global universality property of the zeros of
28
+ random polynomials (see also [27] for a local version).
29
+ Building upon the work of Shiffman and Zelditch [26], equilibrium distribution of
30
+ random systems of polynomials with Gaussian coefficients was obtained by Bloom &
31
+ Shiffman [9] and Shiffman [24]. More recently, these results were generalized for inde-
32
+ pendent identically distributed (i.i.d.) random coefficients with bounded density [1, 2].
33
+ We refer the reader to the survey [4] and references therein for the state of the art. On
34
+ the other hand, asymptotic zero distribution of random polynomial mappings with dis-
35
+ crete random coefficients remained open (cf. [3, 8, 5]). In this note, we study asymptotic
36
+ zero distribution of multivariable full system of random polynomials with independent
37
+ Bernoulli coefficients.
38
+ 1.1. Statement of the results. A random Bernoulli polynomial is of the form
39
+ fd,i(x) =
40
+
41
+ |J|≤d
42
+ αi,JxJ ∈ C [x1, . . . , xn]
43
+ T.B. and C¸.C¸. are partially supported by T¨UB˙ITAK grant ARDEB-1001/119F184.
44
+ 1
45
+
46
+ where xJ = xj1
47
+ 1 . . . xjn
48
+ n and αi,J are ±1 Bernoulli random variables. Throughout this work,
49
+ we consider systems (fd,1, . . . , fd,n) of random Bernoulli polynomials with independent
50
+ coefficients. We write f d = (fd,1, . . . , fd,n) for short. We denote the collection of all
51
+ systems of polynomials in n variables and of degree d by Polyn,d that is endowed with
52
+ the product probability measure Probd.
53
+ Theorem 1.1. Let f d = (fd,1, . . . , fd,n) be a system of random polynomials with independent
54
+ ±1 valued Bernoulli coefficients. Then there exists a dimensional constant K = K(n) >
55
+ 0 and an exceptional set En,d ⊂ Polyn,d such that Probd(En,d) ≤ K/d and for all f d ∈
56
+ Polyn,d(A)\En,d the simultaneous solutions of the system f d are isolated with #Z(f d) = dn.
57
+ For a system f d ∈ Polyn,d, if the simultaneous zeros Z(f d) are isolated we denote
58
+ the corresponding normalized empirical measure by δZ(f d). That is δZ(fd) is a probabil-
59
+ ity measure supported on the isolated zeros. We also let νHaar denote the Haar measure
60
+ of (S1)n of total mass 1. As an application of Theorem 1.1 together with a determinis-
61
+ tic equidistribution result [13, Theorem 1.7], we obtain asymptotic zero distribution of
62
+ random Bernoulli polynomial mappings:
63
+ Corollary 1.2. Let f d = (fd,1, . . . , fd,n) be system of random polynomials with independent
64
+ ±1 valued Bernoulli coefficients and En,d ⊂ Polyn,d be as in Theorem 1.1. Then for each
65
+ sequence f d ∈ Polyn,d \ En,d we have
66
+ lim
67
+ d→∞ δZ(fd) = νHaar.
68
+ in weak topology. In particular, δZ(f d) → νHaar in probability Probd as d → ∞.
69
+ Finally, we consider the measure valued random variables
70
+ (1.2)
71
+ �Z(f d) =
72
+ ��
73
+ ξi∈Z(f d) δ(ξi)
74
+ for f d ∈ Polyn,d \ En,d
75
+ 0
76
+ otherwise.
77
+ and define the expected zero measure by
78
+ (1.3)
79
+
80
+ E[ �Z(f d)], ϕ
81
+
82
+ =
83
+
84
+ P olyn,d\En,d
85
+
86
+ ξi∈Z(f d)
87
+ ϕ(ξi) dProbd(f d)
88
+ where ϕ is a continuous function with compact support in Cn and En,d denote the excep-
89
+ tional set given by Theorem 1.1.
90
+ Theorem 1.3. Let f d = (fd,1, . . . , fd,n) be a system of random polynomials with independent
91
+ ±1 valued Bernoulli coefficients. Then
92
+ lim
93
+ d→∞ d−nE[Z(f d)] = νHaar
94
+ in weak topology.
95
+ The outline of this work as follows. In §2, we introduce some algebraic background
96
+ on resultants. In particular, we recall multi-polynomial resultant and sparse resultant for
97
+ polynomial systems [15, 11] as well as directional resultant [12]. In §3, we prove the
98
+ main result Theorem 1.1. Finally, in §4 we prove Theorem 1.3.
99
+ 2
100
+
101
+ 2. PRELIMINARIES
102
+ In this section, we collect some basic facts and algebraic background related to our
103
+ results. More precisely, we discuss the multi-homogenous (classical) resultant and the
104
+ sparse eliminant as well as the relation of these two notions. For a detailed account of the
105
+ subject and proofs we refer the reader to [15, 11]. We also discuss the sparse resultant
106
+ introduced by D’Andrea and Sombra, and corresponding directional sparse resultants
107
+ [13, 12].
108
+ 2.1. Lattice points, polytopes. For a nonempty subset P ⊂ Rn, we denote its convex
109
+ hull in Rn by conv(P). For two nonempty convex sets Q1, Q2, their Minkowski sum is
110
+ defined as
111
+ Q1 + Q2 := {q1 + q2 : q1 ∈ Q1, q2 ∈ Q2}
112
+ and for λ ∈ R, the scaled polytope is of the form
113
+ λQ := {λq : q ∈ Q}.
114
+ It is well known that V oln(d1Q1 + . . . + dnQn) is a homogenous polynomial of degree n in
115
+ the variables d1, . . . , dn ∈ Z+ where V oln denotes the normalized volume of the subsets
116
+ in Rn with respect to the Lebesgue measure. The coefficient of the monomial d1 . . . dn
117
+ is called the mixed volume of Q1, . . . , Qn and denoted by MV (Q1, . . . , Qn). One can use
118
+ the polarization formula to compute the mixed volume of the convex sets Q1, . . . , Qn.
119
+ Namely,
120
+ MVn(Q1, . . . , Qn) =
121
+ n
122
+
123
+ k=1
124
+
125
+ 1≤j1≤...≤jk≤n
126
+ (−1)n−kV oln(Qj1 + . . . + Qjk).
127
+ In particular, if Q = Q1 = . . . = Qn then
128
+ MVn(Q) := MVn(Q, . . . , Q) = n!V oln(Q).
129
+ For a convex set Q ⊂ Rn its support function sQ : Rn → R is defined by
130
+ (2.1)
131
+ sQ(v) := inf
132
+ q∈Q ⟨q, v⟩
133
+ where ⟨·, ·⟩ represents the Euclidean inner product of Rn. Then the equation
134
+ ⟨q, v⟩ = sQ(v)
135
+ defines supporting hyperplane of Q and v is called an inward pointing normal. The inter-
136
+ section of Q with the supporting hyperplane in the direction v ∈ Rn is denoted by
137
+ (2.2)
138
+ Qv := {q ∈ Q : ⟨q, v⟩ = sQ(v)}.
139
+ Qv is called the face of Q determined by v. If Qv has codimension 1, it is called a facet of
140
+ Q.
141
+ 3
142
+
143
+ 2.2. Resultant of polynomial systems.
144
+ 2.2.1. Multipolynomial Resultant. We consider homogenous polynomials of degree di
145
+ Fi(t0, . . . , tn) =
146
+
147
+ |J|=di
148
+ ui,JtJ
149
+ for i = 0, . . . , n where J is a multi-index (j0, . . . , jn) and tJ indicates the monomial
150
+ tj0
151
+ 0 · · · tjn
152
+ n which is of degree |J| = �n
153
+ i=0 ji. One can see that the homogenous polynomi-
154
+ als of degree di form an affine space by identifying �
155
+ |J|=di ui,JtJ with point (ui,J)|J|=di ∈
156
+ CN(di), where N(di) =
157
+ �n+di−1
158
+ n−1
159
+
160
+ .
161
+ Letting N := �n
162
+ i=0 N(di), recall that the incidence variety is defined by
163
+ W =
164
+
165
+ (a, t) ∈ CN × Pn : F0(a0, t) = · · · = Fn(an, t) = 0
166
+
167
+ .
168
+ We let π : CN × Pn → CN be the projection onto first coordinate. By Projective Extension
169
+ Theorem (see eg. [11]) the image π(W) forms a variety in the affine space CN.
170
+ Definition 2.1. The multipolynomial resultant Resd0,...,dn is defined as the irreducible unique
171
+ (up to a sign) polynomial in Z[a0, . . . , an] which is the defining equation of the variety π(W).
172
+ The resultant of the homogeneous polynomials F0, . . . , Fn is the evaluation of Resd0,...,dn at
173
+ the coefficients of F0, . . . , Fn and it is denoted by Resd0,...,dn(F0, . . . , Fn).
174
+ Note that if d0 = . . . = dn = 1, then the evaluation of multipolynomial resultant
175
+ Resd0,...,dn at the coefficients of F0, . . . , Fn is the determinant of the coefficient matrix. For
176
+ more general cases, we have the following result:
177
+ Theorem 2.2 ([15],[11]). Let F0, . . . , Fn ∈ C[x0, . . . , xn] be homogenous polynomials of
178
+ positive total degrees d0, . . . , dn. Then the system F0 = . . . = Fn = 0 has a solution in the
179
+ complex projective space Pn if and only if Resd0...,dn(F0, . . . , Fn) = 0.
180
+ Theorem 2.2 gives a characterization to determine the existence of nontrivial solutions
181
+ for the systems of homogenous polynomials based on the coefficients of the polynomials
182
+ in the system. However, not all the systems of equations are homogenous, and in the
183
+ power series expansions not all the monomial terms appear. Hence, we need to introduce
184
+ a more general version of the multi-homogenous resultant.
185
+ 2.2.2. Sparse Eliminant. Following [15], we will recall the definition of sparse resultant.
186
+ Let A0, . . . , An be a non-empty finite subsets of Zn, and let ui = {ui,a}a∈Ai be a group of
187
+ #Ai variables, i = 0, . . . , n and set u = {u0, . . . , un} . For each i, the general Laurent
188
+ polynomial fi with support supp(fi) = Ai given by
189
+ f(x) =
190
+
191
+ a∈Ai
192
+ ui,axa ∈ C[u][x±1
193
+ 1 , . . . , x±1
194
+ n ].
195
+ We let A = (A0, . . . , An) and consider the incidence variety in this setting defined by
196
+ (2.3)
197
+ WA =
198
+
199
+ (u, x) ∈
200
+ n
201
+
202
+ i=0
203
+ P(CAi) × (C∗)n : f0(ui, x) = · · · = fn(un, x) = 0
204
+
205
+ .
206
+ 4
207
+
208
+ Consider the canonical projection on the first coordinate
209
+ πA :
210
+ n
211
+
212
+ i=0
213
+ P(CAi) × (C∗)n →
214
+ n
215
+
216
+ i=0
217
+ P(CAi)
218
+ and let πA(WA) denote the Zariski closure of WA under the projection π.
219
+ Definition 2.3. The sparse eliminant, denoted by ResA, is defined as follows: if the variety
220
+ πA(WA) has codimension 1, then the sparse eliminant is the unique (up to sign) irreducible
221
+ polynomial in Z[u] which is the defining equation of πA(WA). If codim(πA(WA)) ≥ 2, then
222
+ ResA is defined to be the constant polynomial 1. The expression
223
+ ResA(f0, . . . , fn)
224
+ is the evaluation of ResA at the coefficients of f0, . . . , fn.
225
+ Example 2.4. For A0 = {0} , A1 = {0, 1} ⊂ Z, we have that ResA0,A1 = ±u00.
226
+ The classical resultant Resd0,...,dn is the special case of the sparse eliminant. Indeed, let
227
+ Ai be the set of all integer points in the di-simplex, i.e., Ai = diΣn ∩ Zn and Σn is the
228
+ standard unit simplex, that is,
229
+ diΣn := {(a0, . . . , an) ∈ Rn+1 : aj ≥ 0,
230
+
231
+ j
232
+ aj ≤ di}.
233
+ Following [11] and [15], for simplicity let all the sparse polynomials f0, . . . , fn have the
234
+ same support Ad = dΣn ∩ Zn for some positive integer d and consider the system
235
+ (2.4)
236
+
237
+
238
+
239
+ f0 = u01xα1 + . . . + u0dxαn = 0
240
+ ...
241
+ fn = un1xα1 + . . . + undxαn = 0
242
+ We also let t0, . . . , tn be the homogenous coordinates which are related to x1, . . . , xn by
243
+ xi = ti/t0. Then we define the homogenous polynomials
244
+ (2.5)
245
+ Fi(t0, . . . , tn) = td
246
+ 0fi(t1/t0, . . . , tn/t0) = td
247
+ 0fi(x1, . . . , xn),
248
+ for 0 ≤ i ≤ n. This method gives n+1 homogenous polynomials of total degree d in
249
+ the variables t0, . . . , tn and this procedure is independent of the choice of homogeneous
250
+ coordinates.
251
+ Proposition 2.5 ([11]). Let Ad = dΣn ∩Zn and consider the systems of polynomials F and
252
+ f as above. Then
253
+ ResA(f0, . . . , fn) = ±Resd,...,d(F0, . . . , Fn),
254
+ where A = (Ad, . . . , Ad).
255
+ Using the above proposition, we can give a version of Theorem 2.2 as follows.
256
+ 5
257
+
258
+ Corollary 2.6. Let f = (f1, . . . , fn) be a system of polynomials with supp(fi) = Ad for
259
+ i = 1, . . . , n. Assume that the system F = (F0, . . . , Fn) consists the homogenizations of fi
260
+ according to process in (2.5) and denote the set of simultaneous nonzero solutions of F by
261
+ Z(F ). Suppose that Z(F ) ∩ H∞(t0) = ∅ where H∞(t0) is the hyperplane at infinity for t0 =
262
+ 0. Then the system of polynomials f = 0 has no solution if and only if ResAd(f0, . . . , fn) ̸= 0.
263
+ Proof. If ResAd(f0, . . . , fn) ̸= 0, then by definition of the sparse resultant the system
264
+ f0(x) = . . . = fn(x) = 0
265
+ has no solution. Conversely, letting Fi be the homogenization of fi as in (2.5) with the
266
+ corresponding variable t = (t0, . . . , tn), i.e. Fi(t) = td
267
+ 0fi(x). If the system of polynomials
268
+ f = 0 has no solution then Fi(t) = 0 for i = 1, . . . , n if and only if t0 = 0 which contradicts
269
+ our assumption. Hence, by Theorem 2.2 we have
270
+ ±ResAd(f0, . . . , fn) = Resd0,...,dn(F0, . . . , Fn) ̸= 0.
271
+
272
+ 2.2.3. Sparse Resultant. In spite of being a generalization of the multipolynomial resul-
273
+ tant and involving considerable large amount of the system of polynomials, the sparse
274
+ eliminant does not satisfy some essential properties which is necessary in many applica-
275
+ tions, such as additivity property and Poisson formula. In 2014, D’Andrea and Sombra
276
+ [12] introduced the following version of the sparse resultant which has the desired fea-
277
+ tures.
278
+ Definition 2.7. The sparse resultant, denoted by ResA, is defined as any primitive poly-
279
+ nomial in Z[u] that is the defining equation of the direct image of WA, (πA)∗(WA) =
280
+ deg(πA|WA)πA(WA) if this variety has codimension one, and otherwise we set ResA = 1.
281
+ The expression
282
+ ResA(f0, . . . , fn)
283
+ is the evaluation of ResA at the coefficients of f0, . . . , fn.
284
+ According to this definition, the sparse resultant is not irreducible but it is a power of
285
+ the irreducible sparse eliminant, i.e.,
286
+ ResA = ±Res
287
+ deg(πA|WA)
288
+ A
289
+ where deg(πA|WA) is the degree of the projection πA. We also remark that ResA ̸= 1
290
+ whenever ResA ̸= 1. For more details we refer the reader to the manuscripts [12] and
291
+ [13].
292
+ Example 2.8. Let A0 = A1 = A2 = {(0, 0), (2, 0), (0, 2)}. Then ResA = det(ui,j) and
293
+ ResA = ±[det(ui,j)]4.
294
+ 6
295
+
296
+ 2.2.4. Directional Resultant. For a subset B ⊂ Zn and a polynomial f(x) = �
297
+ b∈B βbxb
298
+ with support B, we write
299
+ Bv := {b ∈ B : ⟨b, v⟩ = sQ(v)}
300
+ and
301
+ f v(x) =
302
+
303
+ b∈Bv
304
+ βbxb
305
+ where Q = conv(B) and v ∈ Rn and sconv(B)(v) is defined as equation (2.1).
306
+ Definition 2.9. Let A1, . . . , An ⊂ Zn be a family of n non-empty finite subsets, v ∈ Zn\{0},
307
+ and v⊥ ⊂ Rn the orthogonal subspace. Then there exists bi,v ∈ Zn such that
308
+ Av
309
+ i − bi,v ⊂ Zn ∩ v⊥
310
+ for i = 1, . . . , n. The resultant of A1, . . . , An in the direction of v, denoted ResAv
311
+ 1 ,...,Avn is
312
+ defined as the resultant of the family of the finite subsets Av
313
+ i − bi,v.
314
+ Let fi ∈ C[x±1
315
+ 1 , . . . , x±1
316
+ n ] be Laurent polynomials with support supp(fi) ⊂ Ai i = 1, . . . , n.
317
+ For each i = 1, . . . , n, we write f v
318
+ i = xbi,vgi,v for a Laurent polynomial gi,v ∈ C[Zn ∩ v⊥] ≃
319
+ C[y±1
320
+ 1 , . . . , y±1
321
+ n−1] with supp(gi,v) ⊂ Av
322
+ i − bi,v. The expression
323
+ ResAv
324
+ 1 ,...,Avn(f v
325
+ 1 , . . . , f v
326
+ n)
327
+ is defined as the evaluation of this resultant at the coefficients of the gi,v.
328
+ We remark that the definition of directional resultant is independent of the choice of
329
+ the vector bi,v (see [12, Proposition 3.3]). Moreover, the directional resultant ResAv
330
+ 1 ,...,Avn ̸=
331
+ 1 only if the direction vector v is an inward pointing normal to a facet of the Minkowski
332
+ sum �n
333
+ i=1 conv(Ai). Therefore, the nontrivial directional resultants of the family A1, . . . , An
334
+ is finitely many.
335
+ Example 2.10. Let f(x) = a0 + . . . + anxn ∈ C[x] be a polynomial of degree n. Then the
336
+ nontrivial directional resultants are
337
+ ResA(f v) =
338
+
339
+ ±a0
340
+ if
341
+ v = 1,
342
+ ±an
343
+ if
344
+ v = −1
345
+ for the polytope conv(A) = [0, n] ⊂ R.
346
+ 3. EQUIDISTRIBUTION OF ZEROS
347
+ 3.1. Random Polynomial Systems. First, we recall a theorem of Kozma and Zeitouni
348
+ [21] asserts that overdetermined random Bernoulli polynomial systems have no common
349
+ zeros with overwhelming probability:
350
+ Theorem 3.1. Let f1, . . . , fn+1 ∈ Z[x1, . . . , xn] be n + 1 independent random Bernoulli
351
+ polynomials of degree d and
352
+ P(d, n) := Probd{∃x ∈ Cn : fi(x) = 0 for i = 1 . . . , n + 1}
353
+ denote the probability that the system f1 = . . . = fn+1 = 0 has a common solution. Then
354
+ there exists a dimensional constant K = K(n) < ∞ such that
355
+ P(d, n) ≤ K/d
356
+ 7
357
+
358
+ for all d ∈ Z+.
359
+ Next, we prove our main result:
360
+ Proof of Theorem 1. Let fd,i be a random Bernoulli polynomial of the form
361
+ (3.1)
362
+ fd,i =
363
+
364
+ |J|≤d
365
+ αi,JxJ ∈ Z[x1, . . . , xn],
366
+ where {αi,J} is a family of independent Bernoulli random variables for i = 1, . . . , n.
367
+ We investigate the directional resultants of the system f for all nonzero primitive di-
368
+ rection vectors v ∈ Zn. By [12, Proposition 3.3] it is enough to check the inward normals
369
+ to the Minkowski sum of the supports ndΣn which has n + 1 facets with n + 1 inward
370
+ normals given by vm = em for m = 1, . . . , n and vn+1 = − �n
371
+ m=1 em where {em}n
372
+ m=1 is
373
+ the standard basis of Rn.
374
+ For vm = em the intersection of a support A with the supporting hyperplane in the
375
+ direction em is of the form
376
+ (3.2)
377
+ Avm =
378
+
379
+ (j1, . . . , jn) ∈ A : jm = 0,
380
+ n
381
+
382
+ l=1
383
+ jl ≤ d
384
+
385
+ m = 1, . . . , n. Hence, the polynomials f vm
386
+ i
387
+ can be written as
388
+ (3.3)
389
+ f vm
390
+ i
391
+ :=
392
+
393
+ J∈Avm
394
+ αi,JxJ
395
+ for i = 1, . . . , n. Note that polynomials f vm
396
+ i
397
+ depend on n − 1 variables. Following the
398
+ Definition 2.9, if we choose the vector bi,vm = 0 such that Avm − bi,vm ⊂ Zn ∩ vm⊥,
399
+ we see that the functions gi,vm := f vm
400
+ i
401
+ satisfies the equation f vm
402
+ i
403
+ = xbi,vmgi,vm for each
404
+ i = 1, . . . , n.
405
+ Recall that for two univariate polynomials h1, h2 ∈ C[x], their resultant Res(h1, h2) is
406
+ zero if and only if h1 and h2 have a common solution in C. Therefore, if n = 2 the
407
+ necessary and sufficient condition for g1,vm and g2,vm have zero resultant is that they
408
+ have a common zero. Theorem 3.1 implies that there exists a constant Km which is
409
+ independent of d so that the aforementioned event has probability at most Km/d.
410
+ On the other hand, when n > 2, we perform the homogenization process to each (n−1)
411
+ variable polynomial gi,vm for i = 1, . . . , n as described in equation (2.5). We obtain the n
412
+ variable homogenous polynomials Gi,vm of the form
413
+ (3.4)
414
+ Gi,vm(t, x) =
415
+
416
+ J∈Avm
417
+ αi,Jtd−|J|xJ.
418
+ In order to compare the sparse resultant of the polynomials gi,vm and the multipolynomial
419
+ resultant of the homogeneous polynomials Gi,vm, we check the conditions of Corollary
420
+ 2.6. Let Z(G) be the set of nontrivial solutions of the system G = (G1,vm, . . . , Gn,vm)
421
+ and suppose that G has a solution ξ = (t, ξ2, . . . , ξn) in the hyperplane at infinity H∞(t).
422
+ Evaluating these homogeneous polynomials at t = 0, we obtain the top degree homoge-
423
+ neous part of the polynomials gi,vm for i = 1, . . . , n. Since ξ ∈ H∞(t), it has a nonzero
424
+ coordinate ξk for some k ∈ {2, . . . , n}. For simplicity, let us assume k = 2 and define the
425
+ 8
426
+
427
+ new variables zi := ξi+2/ξ2 for i = 1, . . . , n − 2. Applying this change of variables, we
428
+ obtained
429
+ (3.5)
430
+ �Gi,vm(z1, . . . , zn−2) =
431
+
432
+ |J|≤d
433
+ αi,Jzϕ(J)
434
+ where ϕ : Rn → Rn−2 with ϕ(j1, . . . , jn) = (j3, . . . , jn). This gives n random Bernoulli
435
+ polynomials of degree d in n − 2 variables. Hence by Theorem 3.1, there exists a pos-
436
+ itive constant Ci, depending only the dimension n such that the probability that the
437
+ overdetermined system of Bernoulli polynomials �Gi,vm(z1, . . . , zn−2) have a common so-
438
+ lution is less than Ci/d. We infer that the system of homogenized polynomials Gi,vm
439
+ has no common zero at hyperplane at infinity H∞(t) except a set that has probability
440
+ at most Ci/d. Then by Corollary 2.6, outside of a set of small probability, the system of
441
+ polynomials consisting gi,vm has a common solution if and only if the directional resul-
442
+ tant ResAvm
443
+ 1
444
+ ,...,Avn(f v
445
+ 1 , . . . , f v
446
+ n ) = 0. Now, since the system of Bernoulli polynomials gi,vm
447
+ contains n polynomials in n − 1 variables, by Theorem 3.1, there is a dimensional con-
448
+ stant ˜Ci so that the probability that this system has common solution is at most ˜Ci/d.
449
+ Hence outside of a set that has probability Ki/d := Ci/d + ˜Ci/d , the directional resultant
450
+ ResAvmf vm
451
+ d
452
+ ̸= 0 for all vm for m = 1, . . . , n.
453
+ Next, for the inward normal vector vn+1 = − �n
454
+ m=1 em, we find the minimal weight in
455
+ this direction as Avn+1 = {J ∈ A : |J| = d}. Hence the polynomials in this directions are
456
+ of the form
457
+ (3.6)
458
+ f vn+1
459
+ i
460
+ =
461
+
462
+ |J|=d
463
+ αi,JxJ
464
+ In this case Avn+1 is not a subspace of Zn ∩ v⊥
465
+ n+1, hence we need to translate it by sub-
466
+ tracting a suitable vector bi,vn+1. For Laurent polynomial systems, the sparse resultant is
467
+ invariant under translations of supports (see [12], Proposition 3.3). Since the polynomi-
468
+ als fd,i are not Laurent, we need to determine the effects of this translations. Consider
469
+ the system of Bernoulli polynomials f d and set of its simultaneous zeros Z(f d). For a
470
+ solution x = (x1, . . . , xn) ∈ Z(f d) and assume that x1 = 0. In order to examine the
471
+ incidence of this case, we evaluate the system f d at x1 = 0 and we obtain a new system
472
+ of n Bernoulli polynomials with n − 1 variables. By Theorem 3.1, there exists a constant
473
+ C1 which is independent of d such that this system has a common solution with proba-
474
+ bility at most C1/d. Therefore the probability of the event that x1 = 0 is less than C1/d.
475
+ Hence there is no harm of translation of supports outside of a set that has probability at
476
+ most C/d, where C := �n
477
+ i=1 Ci. Now, choosing the vector bi,vn+1 = (d, 0, . . . , 0) so that
478
+ Avn+1 − bi,vn+1 ⊂ Zn ∩ v⊥
479
+ n+1, we obtain the polynomials of the form
480
+ (3.7)
481
+ gi,vn+1 =
482
+
483
+ J∈Avn+1−bi,vn+1
484
+ αi,Jxw(J)
485
+ with w : Rn → Rn satisfying (j1, j2, . . . , jn) �→ (−d + j1, j2, . . . , jn). We substitute the new
486
+ variables yi := xi+1/x1 into gi,vn+1, i = 1, . . . , n − 1 and obtain
487
+ 9
488
+
489
+ (3.8)
490
+ gi,vn+1(y) =
491
+
492
+ |J|≤d
493
+ αi,Jyσ(J)
494
+ for y ∈ Cn−1 and σ : Rn → Rn with σ(j1, j2, . . . , jn) = (0, j2, . . . , jn). The system con-
495
+ taining the polynomials gi,vn+1(y), i = 1, . . . , n contains n random Bernoulli polynomials
496
+ with n − 1 random variable as in the cases vm = em. By applying the same steps, it can
497
+ be shown that ResAvn+1f vn+1
498
+ d
499
+ ̸= 0 outside of a set that has probability at most Ki+1/d.
500
+ Now, we define the exceptional set En,d as a subset of Polyn,d which contains the sys-
501
+ tems f d that has a zero directional resultant for some nonzero primitive vector v or the
502
+ systems f d have a common solution x ∈ Cn with xi = 0 for some i = 1, . . . , n. More
503
+ precisely, letting
504
+ En,d := {f d ∈ Polyn,d : ∃ v ∈ Zn \ {0} ∋ ResAvf v
505
+ d = 0}
506
+ (3.9)
507
+
508
+ {f d ∈ Polyn,d : ∃ x ∈ Z(f d) ∋
509
+
510
+ xi = 0}.
511
+ we see that there exists a positive constant K which is independent of d such that
512
+ Prob{En,d} ≤ d−1K
513
+ where K := �n+1
514
+ i=1 Ki + C.
515
+
516
+ Next, we recall a deterministic equidistribution results for the solutions of systems of
517
+ integer coefficient polynomials [13]. For a polynomial f ∈ C[x1, . . . , xn], the supremum
518
+ norm of f on the unit torus is defined as
519
+ ∥f∥sup :=
520
+ sup
521
+ |w1|=...=|wn|=1
522
+ |f(w1, . . . , wn)| .
523
+ Let νHaar be the Haar measure on Cn with support (S1)n and of total mass 1. Assume that
524
+ f ∈ Polyn,d be a polynomial mapping such that the set of simultaneous zeros Z(f) is a
525
+ discrete set. We denote by denote the discrete probability measure on Cn associated to
526
+ the Z(f) by δZ(f). The following result gives the asymptotic distribution of the zeros of
527
+ such a system f if the coefficients are integer:
528
+ Theorem 3.2. [13] Let f = (f1, . . . , fn) be a polynomial mapping with fi ∈ Z[x1, . . . , xn]
529
+ of degree d ≥ 1 for each i = 1, . . . , n. Assume that ResAv
530
+ 1 ,...,Avn(f v
531
+ 1 , . . . , f v
532
+ n) ̸= 0 for all
533
+ v ∈ Zn \ {0} and log ||fi||sup = o(d). Then
534
+ lim
535
+ d→∞ δZ(f) = νHaar.
536
+ As a corollary of Theorem 1.1 and Theorem 3.2, we have the following equidistribution
537
+ result for random Bernoulli polynomial mappings:
538
+ Proof of Corollary 1.2. Consider the system of Bernoulli polynomials f d = (fd,1, . . . , fd,n).
539
+ Since all the coefficients are 1 or −1, by triangle inequality
540
+ (3.10)
541
+ ∥fd,i∥sup =
542
+ sup
543
+ |w1|=...=|wn|=1
544
+ |fd,i(w1, . . . , wn)| ≤
545
+ �n + d
546
+ d
547
+
548
+ = O(dn)
549
+ 10
550
+
551
+ which implies that log ∥fd,i∥sup = o(d). Moreover, by Theorem 1.1 for each sequence
552
+ f d ∈ Polyn,d \ En,d we have
553
+ ResAv
554
+ 1 ,...,Avn(f v
555
+ 1 , . . . , f v
556
+ n ) ̸= 0
557
+ for all v ∈ Zn \ {0}. Hence, by Theorem 3.2
558
+ lim
559
+ d→∞ δZ(f d) = νHaar
560
+ in weak topology. In particular, δZ(f d) → νHaar in probability since Prob{En,d} → 0 as
561
+ d → ∞.
562
+
563
+ 4. EXPECTED ZERO DISTRIBUTION
564
+ In this section, we introduce radial and angle discrepancies for random Bernoulli poly-
565
+ nomial mappings in order to study asymptotics of expected zero measures. We adapt
566
+ these concepts from [13] and refer the reader to the manuscript [13] and references
567
+ therein for a detailed account of the preliminary results this section.
568
+ Let Z be a 0-dimensional effective cycle in Cn that is there is a non-empty finite col-
569
+ lection of points ξ = (ξ1, . . . , ξn) ∈ Cn and mξ ∈ N, called the multiplicity of ξ, such
570
+ that Z = �
571
+ ξ mξ[ξ]. The degree of Z is defined by deg(Z) = �
572
+ ξ mξ which is a positive
573
+ number.
574
+ Definition 4.1. [13] Let Z be a 0-dimensional effective cycle in Cn. For each α = (α1, . . . , αn)
575
+ and β = (β1, . . . , βn) ∈ Rn such that −π ≤ αj < βj ≤ π, j = 1, . . . , n we consider the cycle
576
+ Zα,β :=
577
+
578
+ {ξ∈Z:αj<arg(ξj)≤βj}
579
+ mξ[ξ].
580
+ The angle discrepancy of Z is defined as
581
+ ∆ang(Z) := sup
582
+ α,β
583
+ �����
584
+ deg(Zα,β)
585
+ deg(Z)
586
+
587
+ n
588
+
589
+ j=1
590
+ βj − αj
591
+
592
+ ����� .
593
+ For 0 < ε < 1 we consider the cycle
594
+ Zε :=
595
+
596
+ {ξ∈Z:1−ε<|ξj|<(1−ε)−1}
597
+ mξ[ξ].
598
+ The radius discrepancy of Z with respect to ε is defined as
599
+ ∆rad(Z, ε) := 1 − deg(Zε)
600
+ deg(Z) .
601
+ Note that 0 < ∆ang(Z) ≤ 1 and 0 ≤ ∆rad(Z, ε) ≤ 1. Observe that the angle discrepancy
602
+ and the radial discrepancy are generalizations of their one dimensional versions defined
603
+ in [14, 17].
604
+ Let A1, . . . , An ⊂ Zn be a collection of finite sets and let Qi = conv(Ai) for each
605
+ i = 1, . . . , n. Throughout this section we assume that D := MVRn(Q1, . . . , Qn) ≥ 1.
606
+ For a vector w ∈ Sn−1 in the unit sphere in Rn, let w⊥ be its orthogonal subspace and
607
+ 11
608
+
609
+ πw⊥ : Rn → w⊥ be the corresponding orthogonal projection. We let MVw⊥ denote the
610
+ mixed volume of the convex bodies in w⊥ induced by the Euclidean measure on w⊥. We
611
+ also denote
612
+ Dw,i = MVw⊥ (πw(Q1), . . . , πw(Qi−1), πw(Qi+1), . . . , πw(Qn)) .
613
+ Let f = (f1, . . . , fn) be a mapping such that the coordinates fi are Laurent polynomials
614
+ with supp(fi) = Ai for i = 1, . . . , n. Following [13], we define the Erd¨os-Tur´an size of f
615
+ by
616
+ (4.1)
617
+ η(f) := 1
618
+ D
619
+ sup
620
+ w∈Sn−1 log
621
+
622
+ �n
623
+ i=1 ||f||
624
+ Dw,i
625
+ sup
626
+
627
+ v |ResAv
628
+ 1 ,...,Avn(f v
629
+ 1 , . . . , f vn )|
630
+ |⟨v,w⟩|
631
+ 2
632
+
633
+ ,
634
+ where ⟨·, ·⟩ is the standard inner product in Rn and the product in the denominator
635
+ is taken over all primitive vectors v ∈ Zn. We remark that the Erd¨os-Tur´an size of a
636
+ polynomial mapping f coincides with the bound in the Erd¨os-Tur´an Theorem [14] for
637
+ univariate polynomials.
638
+ The next result gives an upper bound for the Erd¨os-Tur´an size of polynomial systems f
639
+ with integer coefficients.
640
+ Proposition 4.2. [13, Proposition 3.15] Let A1, . . . , An be a non-empty finite subsets of
641
+ Zn and set Qi = conv(Ai) with MVRn(Q1, . . . , Qn) ≥ 1. Let di ∈ Z≥1 and bi ∈ Zn so that
642
+ diΣn + bi, i = 1, . . . , n. Suppose that f1, . . . , fn ∈ Z[x±1
643
+ 1 , . . . , x±1
644
+ n ] with supp(fi) ⊆ Ai and
645
+ such that ResAv
646
+ 1 ,...,Avn(f v
647
+ d,1, . . . , f v
648
+ d,n) ̸= 0 for all v ∈ Zn \ {0}. Then
649
+ η(f) ≤
650
+ 1
651
+ MVRn(Q1, . . . , Qn)
652
+
653
+
654
+ n + √n
655
+
656
+ � n
657
+
658
+ i=1
659
+ di
660
+
661
+ n
662
+
663
+ i=1
664
+ log ∥fi∥sup
665
+ di
666
+
667
+ .
668
+ The following theorem gives bounds for angle discrepancy and radius discrepancy of
669
+ Z(f) in terms of the Erd¨os-Tur´an size of f. For one dimensional version see for instance
670
+ [14] and [17].
671
+ Theorem 4.3. [13] Let A1, . . . , An be a non-empty finite subsets of Zn such that
672
+ MVRn(Q1, . . . , Qn) ≥ 1
673
+ with Qi = conv(Ai) for n ≥ 2. Let f1, . . . , fn ∈ C[x±1
674
+ 1 , . . . , x±1
675
+ n ] with supp(fi) ⊆ Ai and such
676
+ that ResAv
677
+ 1 ,...,Avn(f v
678
+ d,1, . . . , f v
679
+ d,n) ̸= 0 for all v ∈ Zn \ {0}. Then
680
+ (4.2)
681
+ ∆ang(Z(f)) ≤ 66n2n(18 + log+(η(f)−1))
682
+ 2
683
+ 3(n−1)η(f)
684
+ 1
685
+ 3.
686
+ Moreover, for 0 < ε < 1,
687
+ (4.3)
688
+ ∆rad(Z(f), ε) ≤ 2n
689
+ ε η(f).
690
+ For a random Bernoulli polynomial mapping f d we let Z(f d) be the set of simultaneous
691
+ zeros of f d. We define the angle discrepancy ∆ang(Z(f)) and the radius discrepancy
692
+ ∆rad(Z(f), ε) as above whenever Z(f d) is a discrete set of points. Otherwise, we set
693
+ ∆rad(Z(f), ε) = ∆ang(Z(f)) = 1. Note that as our probability space (Polyn,d, Prob) is
694
+ discrete, measurability of these random variables is not an issue in this setting. Next, we
695
+ estimate the asymptotic expected discrepancies:
696
+ 12
697
+
698
+ Proposition 4.4. Let f d = (fd,1, . . . , fd,n) be a random Bernoulli polynomial mapping of
699
+ degree d ≥ 1. Then
700
+ (4.4)
701
+ lim
702
+ d→∞ E[∆ang(Z(f d))] = 0
703
+ and
704
+ lim
705
+ d→∞ E[∆rad(Z(f d))] = 0.
706
+ Proof. We adapt the argument in [[13], Theorem 4.9] to our setting. Consider the ex-
707
+ pected value of the angular discrepancy which is
708
+ (4.5)
709
+ E[Z(f d)] =
710
+
711
+ P olyn,d
712
+ ∆ang(Z(f d))dProbd(f d).
713
+ Let En,d be the exceptional set which contains all the systems in Polyn,d with zero direc-
714
+ tional resultants for some nonzero primitive vector v ∈ Zn as described in the proof of
715
+ Theorem 1.1. Since 0 < ∆ang(Z(f d)) ≤ 1 there exist constants K1 which is independent
716
+ of d such that
717
+ (4.6)
718
+ 0 ≤
719
+
720
+ En,d
721
+ ∆ang(Z(f d))dProb(fd) ≤ Prob{En,d} ≤ K1d−1.
722
+ Hence,
723
+
724
+ En,d
725
+ ∆ang(Z(f d))dProbd(f d) → 0
726
+ as d → ∞.
727
+ Let f d ∈ Polyn,d \ En,d, then by Proposition 4.2
728
+ η(f d) ≤ 1
729
+ dn
730
+
731
+ dn−1(n + √n)
732
+ n
733
+
734
+ i=1
735
+ log ||fd,i||sup
736
+
737
+ (4.7)
738
+ ≤ 1
739
+ dn
740
+
741
+ dn−1(n + √n)
742
+ n
743
+
744
+ i=1
745
+ log(d + 1)
746
+
747
+ (4.8)
748
+ ≤ K2
749
+ log d
750
+ d
751
+ (4.9)
752
+ for a constant K2 which is independent of d. On the other hand, by Theorem 4.3 for
753
+ f d ∈ Polyn,d \ En,d there exists constants K3, K4, K5 and K6 such that
754
+ ∆ang(Z(f d)) ≤ K3η(f d)
755
+ 1
756
+ 3 log
757
+ � K4
758
+ η(f d)
759
+ � 2
760
+ 3(n−1)
761
+ (4.10)
762
+ ≤ K5
763
+ �log d
764
+ d
765
+ � 1
766
+ 3
767
+ log
768
+
769
+ d
770
+ log d
771
+ � 2
772
+ 3 (n−1)
773
+ �� K6
774
+ log d
775
+ 2n
776
+ 3 − 1
777
+ 3
778
+ d
779
+ 1
780
+ 3
781
+ .
782
+ (4.11)
783
+ since the function t
784
+ 1
785
+ 3 log( a
786
+ t )
787
+ n−1
788
+ 3
789
+ is increasing for small values of t > 0. Combining the
790
+ equations (4.9) and (4.11), we deduce that lim
791
+ d→∞ E[∆ang(Z(f d))] = 0.
792
+ The proof of the second assertion is analogous and we omit it.
793
+
794
+ Proof of Theorem 1.3. We adapt the argument in [13, Theorem 1.8] to our setting. Let us
795
+ denote νd := E[ �Z(f d)]
796
+ dn
797
+ , where E[ �Z(f d)] is the expected zero measure and νHaar be the Haar
798
+ probability on (S1)n. We need to show that for each continuous function ϕ with compact
799
+ 13
800
+
801
+ support in Cn we have
802
+
803
+ ϕdνd →
804
+
805
+ ϕdνHaar as d → ∞. To this end, it is enough to prove
806
+ the claim for characteristic functions ϕU of the open sets
807
+ (4.12)
808
+ U := {(z1, . . . , zn) ∈ Cn : r1,j < |zj| < r2,j and αj < arg(zj) < βj}
809
+ where 0 ≤ r1,j < r2,j ≤ ∞, ri,j ̸= 1 for i = 1, 2 and −π < αj < βj ≤ π.
810
+ First, we consider the case when U ∩ (S1)n = ∅. Then one can find an 0 < ε < 1 such
811
+ that U is disjoint from the set
812
+ (4.13)
813
+ {(ξ1, . . . , ξn) ∈ Cn : 1 − ε < |ξj| < (1 − ε)−1 for all j}.
814
+ Let En,d be the exceptional set as in the proof of Theorem 1.1. If f d ∈ Polyn,d \ En,d then
815
+ Z(f d) is discrete and
816
+ #{U ∩ Z(f d)} ≤ deg(Z(f d))∆rad(f d, ε) ≤ dn∆rad(f d, ε).
817
+ On the other hand, if f d ∈ En,d then by definition deg( �Z(f d)|U) = 0. Hence,
818
+ νd(U) ≤ E[∆rad( �Z(f d, ε))]
819
+ and by Proposition 4.4,
820
+ lim
821
+ d→∞
822
+
823
+ P olyn,d
824
+ ϕUdνd = 0 = νHaar(U).
825
+ If U ∩ (S1)n ̸= ∅ let
826
+ (4.14)
827
+ �U = {z : αj ≤ arg(zj) ≤ βj for all j }.
828
+ Then we have
829
+ νd(U) −
830
+ n
831
+
832
+ j=1
833
+ βj − αj
834
+
835
+ =
836
+
837
+ νd(�U) −
838
+ n
839
+
840
+ j=1
841
+ βj − αj
842
+
843
+
844
+ − νd(�U \ U).
845
+ By Theorem 1.1 we have
846
+ �����νd(�U) −
847
+ n
848
+
849
+ j=1
850
+ βj − αj
851
+
852
+ ����� =
853
+
854
+ P olyn,d\En,d
855
+ �����
856
+ deg(Z(fd)α,β)
857
+ dn
858
+
859
+ n
860
+
861
+ j=1
862
+ βj − αj
863
+
864
+ ����� dProbd(f d) + Kn
865
+ d
866
+
867
+
868
+ P olyn,d\En,d
869
+ ∆ang(Z(f d))dProbd(f d) + Kn
870
+ d .
871
+ (4.15)
872
+ Note that the set �U \U is a union of a finite number of subsets Um of the form (4.12) such
873
+ that Um ∩ (S1)n = ∅ for all m, we have limd→∞ νd(Um) = 0 by previous case and hence
874
+ limd→∞ νd(U \ U) = 0. Therefore, by Proposition 4.4 and (4.15),
875
+ lim
876
+ d→∞ νd(U) = lim
877
+ d→∞(�U) =
878
+ n
879
+
880
+ j=1
881
+ βj − αj
882
+
883
+ = νHaar(U)
884
+ which completes the proof.
885
+
886
+ 14
887
+
888
+ REFERENCES
889
+ [1] T. Bayraktar, Equidistribution of Zeros of Random Holomorphic Sections, Indiana Univ. Math. J., 5
890
+ (2016), 1759-1793.
891
+ [2] T. Bayraktar, Zero distribution of random sparse polynomials, Michigan Math. J. 66 (2017), 389-419
892
+ [3] T. Bayraktar, Global universality of random zeros, Hacet. J. Math. 48 (2019),384-398.
893
+ [4] T. Bayraktar, D. Coman, H. Herrmann and G. Marinescu. A survey on zeros of random holomorphic
894
+ sections, Dolomit. Res. Notes Approx. 11 (2018), 1-20.
895
+ [5] T. Bayraktar, T. Bloom and N. Levenberg. Zeros of Random Polynomial Mappings in Several Complex
896
+ Variables, arXiv preprint arXiv:2112.00880.
897
+ [6] D.N. Bernstein, The number of roots of a system of equations, Funktsional. Anal. , Prilozhen. 9 (1975),
898
+ no.3, 1-4.
899
+ [7] T. Bloom, Random polynomials and (pluri)potential theory, Ann. Polon. Math. 91 (2007), 131-141.
900
+ [8] T. Bloom and D. Dauvergne, Asymptotic zero distribution of random orthogonal polynomials, The An-
901
+ nals of Probability, 47(5) 2019, pp.3202-3230.
902
+ [9] T. Bloom and B. Shiffman, Zeros of random polynomials on Cm, Math. Res. Lett.14 (2007), 469-479.
903
+ [10] T. Bloom, N. Levenberg, Random Polynomials and Pluripotential Theoretic Extremal Functions, Poten-
904
+ tial. Anal. , 42, (2015), 311-334.
905
+ [11] D.A. Cox, J. Little, and D. O’Shea, Using Algebraic Geometry, second edition, Grad. Texts in Math.,
906
+ 185, Springer, New York, 2005.
907
+ [12] C. D’Andrea and M. Sombra, A Poisson Formula for the Sparse Resultant Proc. Lond. Math. Soc. (3)
908
+ 110 (2015), no. 4, 932–964.
909
+ [13] C. D’Andrea and A. Galligo and M. Sombra, Quantitative equidistribution for the solutions of systems
910
+ of sparse polynomial equations, Amer. J. of Math., 136 (2014), 1543-1579.
911
+ [14] P. Erd¨os and P. Tur´an, On the distribution of roots of polynomials, Ann. of Math. 2 (1950), 105-119.
912
+ [15] I. M. Gelfand, M. M. Kapranov, A. V. Zelevinsky, Discriminants, Resultants, and Multidimensional
913
+ Determinants, Birkh¨ause, 1994.
914
+ [16] J.M. Hammersley, The zeros of random polynomials, Proceedings of the third Berkeley symposium on
915
+ the mathematical statistics and probability, 1954-1955, vol. II, pp. 89-111.
916
+ [17] C. P. Hughes and A. Nikeghbali, The zeros of random polynomials cluster uniformly near the unit circle,
917
+ Compos. Math. 144 (2008), no. 212, 1541-1555.
918
+ [18] I. Ibragimov and O. Zeitouni, On roosts of random polynomials, Trans.Amer. Soc. 6, (1997), 2427-
919
+ 2441.
920
+ [19] I. Ibragimov and D. Zaporozhets, On Distribution of Random Polynomials in Complex Plane, Prokhorov
921
+ and Contemporary Probability Theory, Springer Proc. Math. Stat., 33, Springer, Heidelberg, (2013),
922
+ 303–323.
923
+ [20] M. Kac, On the average number of real roots of a random algebraic equations, Bull. Amer. Math. Soc.
924
+ 49 (1943), 314-320.
925
+ [21] G. Kozma and I. Zeitoni, On Common Roots of Random Bernoulli Polynomials, Int. Math. Res. Not. 18
926
+ (2013), 4334-4347.
927
+ [22] J. E. Littlewood and A. C. Offord, On the number of real roots of a random algebraic equation. III, Rec.
928
+ Math. [Mat. Sbornik] N.S. 12(54) (1943), 277–286.
929
+ [23] L. A. Shepp and R. J. Vanderbei, The complex zeros of random polynomials, Trans. Amer. Math. Soc.
930
+ 347 (1995), no. 11, 4365–4384.
931
+ [24] B. Shiffman, Convergence of random zeros on complex manifolds, Science in China, no.4 Vol 51, (2008),
932
+ 707-720.
933
+ [25] B. Shiffman and S. Zelditch, Equilibrium distribution of zeros of random polynomials, Int. Math. Res.
934
+ Not. 1 (2003), 25-49.
935
+ [26] B. Shiffman and S. Zelditch, Distribution of zeros of random and quantum chaotic sections of positive
936
+ line bundles, Comm. Math. Phys. 200(3):661–683, 1999.
937
+ 15
938
+
939
+ [27] T. Tao and V. Vu, Local Universality of Random Polynomials, Int. Math. Res. Not. IMRN, (2015), 5053-
940
+ 5139.
941
+ FACULTY OF ENGINEERING AND NATURAL SCIENCES, SABANCI UNIVERSITY, ˙ISTANBUL, TURKEY
942
+ Email address: [email protected]
943
+ Email address: [email protected]
944
+ 16
945
+
5dE2T4oBgHgl3EQf6wiO/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
5tFKT4oBgHgl3EQfSy3E/content/tmp_files/2301.11777v1.pdf.txt ADDED
@@ -0,0 +1,849 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Interpreting learning in biological neural networks as
2
+ zero-order optimization method
3
+ Johannes Schmidt-Hieber∗
4
+ Abstract
5
+ Recently, significant progress has been made regarding the statistical understanding
6
+ of artificial neural networks (ANNs). ANNs are motivated by the functioning of the
7
+ brain, but differ in several crucial aspects. In particular, it is biologically implausible
8
+ that the learning of the brain is based on gradient descent. In this work we look at
9
+ the brain as a statistical method for supervised learning. The main contribution is to
10
+ relate the local updating rule of the connection parameters in biological neural networks
11
+ (BNNs) to a zero-order optimization method.
12
+ Keywords:
13
+ Biological neural networks, zero-order optimization, derivative-free methods,
14
+ supervised learning.
15
+ 1
16
+ Introduction
17
+ Compared to artificial neural networks (ANNs), the brain learns faster, generalizes better
18
+ to new situations and consumes much less energy. A child only requires a few examples to
19
+ learn to discriminate a dog from a cat. And people only need a few hours to learn how to
20
+ drive a car. AI systems, however, need thousands of training samples for image recognition
21
+ tasks. And the self-driving car is still under development, despite the availability of data
22
+ for millions of kilometers of test drives and billions of kilometers of simulated drives. The
23
+ ∗University of Twente, Drienerlolaan 5, 7522 NB Enschede, The Netherlands.
24
25
+ This work has tremendously profited from several discussions with Wouter Koolen. The author is moreover
26
+ extremely grateful for helpful suggestions and several interesting remarks that were brought up by Matus
27
+ Telgarsky. The research has been supported by the NWO/STAR grant 613.009.034b and the NWO Vidi
28
+ grant VI.Vidi.192.021.
29
+ 1
30
+ arXiv:2301.11777v1 [cs.LG] 27 Jan 2023
31
+
32
+ Figure 1:
33
+ Artificial neurons receive and output numbers, biological neurons receive and
34
+ output spike trains.
35
+ superhuman performance of AI for some tasks [30, 33, 5] has to be related to the huge
36
+ databases and the enormous computing power required for the training.
37
+ When identifying the causes for the differences in statistical behavior, it is important to
38
+ emphasize that although ANNs are inspired by the functioning of the brain, they are very
39
+ different from biological neural networks (BNNs). Each biological neuron emits a so called
40
+ spike train that can be modelled as a stochastic process or, more precisely, as a point process
41
+ [8, 9] and all computations in BNNs, including the updating of the network parameters, are
42
+ local. The signal in ANNs, however, is passed instantaneously through the whole network
43
+ without a time component such as a spike train structure. In conclusion, ANNs generate
44
+ functions and BNNs point processes.
45
+ Another difference between ANNs and BNNs is the learning. Fitting the network param-
46
+ eters in large ANNs is based on variations of stochastic gradient descent (SGD) using the
47
+ backpropagation algorithm. The parameter update at each network weight is global in the
48
+ sense that every component of the gradient depends, in general, on all the other, possibly
49
+ millions of network weights in the whole network. This means that SGD methods require
50
+ knowledge of the state of the whole network to update one parameter. This is also known
51
+ as the weight transportation problem [14]. As neurons in a biological network do not have
52
+ the capacity to transport all the information about the state of the other weights, learning
53
+ in BNNs cannot be driven by gradient descent [19]. In [7], Francis Crick writes: ”Neverthe-
54
+ less, as far as the learning process is concerned, it is unlikely that the brain actually uses
55
+ backpropagation.”
56
+ In this work, we link the local updating rule for the parameters in a BNN to a derivative-free
57
+ (or more specifically, a zero-order) optimization method that does not require evaluation
58
+ of the gradient. Theorem 1 shows that, in expectation, this scheme does approximately
59
+ gradient descent.
60
+ 2
61
+
62
+ ARTIEICIALNEURON
63
+ BIOLOGICALNEURON
64
+ OUTPUT
65
+ a (W,X, +W,X2 + ... + W.Xd)
66
+ OUTPUT
67
+ W1
68
+ W.
69
+ W1
70
+ Wd
71
+ W2
72
+ W2
73
+ INPUT
74
+ INPUT
75
+ Wd
76
+ W2
77
+ W2
78
+ W1
79
+ W,2
80
+ A brief introduction to biological neural networks (BNNs)
81
+ Using graph theory terminology, a BNN is a directed
82
+ Figure 2:
83
+ Receiving three spike
84
+ trains, the biological neuron su-
85
+ perimposes them and releases
86
+ spikes, whenever the threshold
87
+ value (in red) is exceeded.
88
+ graph, with nodes representing neurons. The nodes/
89
+ neurons can receive spikes via incoming edges and
90
+ emit spikes via outgoing edges. In the directed graph,
91
+ parent nodes are also called presynaptic neurons and
92
+ children nodes are called postsynaptic neurons.
93
+ A
94
+ simple, first model is to think of a spike that is emit-
95
+ ted at time τ as a signal or function t �→ eτ−t1(t ≥ τ)
96
+ with 1(·) the indicator function. If neuron i emits a
97
+ spike at time τ and is connected to neuron j, then
98
+ neuron j receives the signal wijeτ−t1(t ≥ τ), where
99
+ wij is the weight parameter measuring the strength
100
+ of the connection between the neurons i and j. Due
101
+ to the exponential decay, the signal fades out quickly.
102
+ When does neuron j fire/emits a spike?
103
+ Suppose
104
+ neuron j has incoming edges from neurons i1, . . . , im.
105
+ These neurons will occasionally send spikes to j and
106
+ the overall received signal/potential at j is the su-
107
+ perposition of the weighted incoming signals. If the
108
+ combined signal exceeds a threshold S, j fires and
109
+ all children nodes (postsynaptic neurons) of j receive a signal from j. The generation of
110
+ the spike trains is illustrated in Figure 2 for m = 3. The three incoming spike trains were
111
+ chosen for illustrative purposes as triggering a spike in a BNN requires between 20 to 50
112
+ incoming spikes within a short time period [12], p.10. After a spike, neuron j enters a short
113
+ rest phase before it gets back to its normal state. Although this rest phase might play a
114
+ role in the learning, it will be ignored in the analysis.
115
+ The parameters in the BNN are the non-negative weights measuring the strength of the
116
+ connections. Plasticity is the neuroscience term to describe the changes of the network
117
+ parameters. Spike time dependent plasticity (STDP) predicts that the parameter wij mea-
118
+ suring the signal strength between the neurons i and j is decreased if a spike is sent from
119
+ i to j and increased if neuron j emits a spike [21, 2, 42, 34]. The increase becomes bigger
120
+ if the time lag between the arrived spike and the firing of neuron j gets smaller. This
121
+ is known as ”fire together, wire together” and is the main principle underlying Hebbian
122
+ learning [15, 32].
123
+ 3
124
+
125
+ threshold
126
+ received signal
127
+ emitted signalAmong specific forms for the updating formula, as simple but realistic model is to assume
128
+ that if the spike from neuron i to neuron j arrives at time τ, the weight is decreased by
129
+ A−(wij)Ce−c(τ−T−) at time τ and increased by A+(wij)Ce−c(T+−τ) at time T+, where c, C
130
+ are constants and T−, T+ are the last/first spike time of neuron j before/after τ. Regarding
131
+ the amplitude functions, A±(wij), different choices are possible, see Section 19.2.2 in [12]
132
+ From now on we will study the case that A±(x) = x. For C ≤ 1, this choice guarantees that
133
+ the change of the weight is always smaller than the weight itself. Thus positive weights
134
+ remain positive and the network topology does not change during learning. Combining
135
+ both updating steps into one formula, we have
136
+ wij ← wij + wijC(−e−c(τ−T−) + e−c(T+−τ)).
137
+ (2.1)
138
+ As a reward for how well the task has been completed compared to earlier trials and also
139
+ accounting for the total number of trials, a neurotransmitter such as dopamine is released.
140
+ The higher the reward, the more the parameters are changed.
141
+ If the brain performed
142
+ poorly in the past and suddenly manages to solve a task well, much more neurotransmitter
143
+ is released than if the same task has already been completed equally well in the past. To
144
+ take this into account, it has been argued in the neural coding literature that the realized
145
+ reward is the objective reward, how well the task has been completed, minus the expected
146
+ reward measuring how well the brain anticipated to do this task [11]. Denote by R the
147
+ reward and let R be a measure for the anticipated reward. The reward-based synaptic
148
+ plasticity updating rule becomes then
149
+ wij ← wij + (R − R)wijC
150
+
151
+ − e−c(τ−T−) + e−c(T+−τ)�
152
+ .
153
+ (2.2)
154
+ The reward is only released after the prediction has been made. In the meantime, several
155
+ spikes could have been sent from neuron i to neuron j. This requires that the system has a
156
+ short-term memory, [28].
157
+ If the brain has to complete a similar task more frequently, it becomes less exciting over
158
+ time, resulting in a smaller reward. This can be incorporated into the dynamics by including
159
+ a learning rate α > 0,
160
+ wij ← wij + α(R − R)wijC
161
+
162
+ − e−c(τ−T−) + e−c(T+−τ)�
163
+ .
164
+ (2.3)
165
+ Supervised learning is more commonly formulated in loss functions than rewards. Because a
166
+ high reward corresponds to a small loss and vice versa, L := −R is a loss function, L = −R
167
+ 4
168
+
169
+ is the anticipated loss, and the updating formula becomes
170
+ wij ← wij + α(L − L)wijC
171
+
172
+ e−c(τ−T−) − e−c(T+−τ)�
173
+ .
174
+ (2.4)
175
+ A key observation is that these updating formulas are derivative-free in the sense that they
176
+ involve the reward (or loss) but not its gradient.
177
+ Hebbian learning rules, such as (2.4), model the updating of individual weights, but do not
178
+ explain how the brain can learn a task. A brief overview about relevant existing ideas on
179
+ learning in BNNs is given in Section 5
180
+ 3
181
+ Zero-order optimization
182
+ Suppose we want to fit a d-dimensional parameter vector θ to the data and write L(θ)
183
+ for the (training) loss incurred by parameter θ. Derivative-free optimization procedures
184
+ do not require computation of the gradient of the loss. A simple iterative derivative-free
185
+ scheme would be to randomly pick in each round a new candidate parameter and update
186
+ the parameter if the loss is decreased. Standard references for derivative-free optimization
187
+ include [36, 6, 10, 16, 20].
188
+ Zero-order methods (sometimes also called zero-th order methods) are specific derivative-
189
+ free optimization procedures. To explain the concept, recall that standard gradient descent
190
+ is an iterative procedure aiming to minimize the loss function θ �→ L(θ) by the iterative
191
+ scheme
192
+ θk+1 = θk − αk+1∇L(θk),
193
+ k = 0, 1, . . .
194
+ where the initial values θ0 are chosen in some way, αk+1 > 0 is the learning rate and ∇L(θk)
195
+ denotes the gradient of the loss function at θk. In contrast, zero-order methods are only
196
+ allowed to access the loss function but not the gradient of the loss. From the loss, one
197
+ can build, however, an estimator for the gradient of the loss. 1-point zero-order methods
198
+ replace −∇L(θk) by
199
+ βL(θk + ξk)ξk
200
+ with ξk a d-dimensional random vector and β a constant. To see how this relates to the
201
+ gradient, consider the specific case that ξk is multivariate normal with zero mean vector
202
+ and covariance matrix σ2Id, where Id denotes the d × d identity matrix. The multivariate
203
+ 5
204
+
205
+ version of Stein’s lemma [38] states that
206
+ E[L(θk + ξk)ξk] = σ2E[∇L(θk + ξk)]
207
+ (3.1)
208
+ under weak regularity conditions ensuring that all expectations are well-defined.
209
+ This
210
+ means that σ−2L(θk + ξk)ξk estimates the gradient at θk + ξk, that is, ∇L(θk + ξk) =
211
+ ∇L(θk)+errork. The hope is that over many iterations the noise contributions cancel out
212
+ such that in the long-run, the 1-point zero-order dynamics behaves similarly as gradient
213
+ descent. The argument above can be extended to general symmetric distributions of ξk
214
+ that are not necessarily Gaussian.
215
+ Unfortunately, the variance of the 1-point zero-order gradient estimator (3.1) can be ex-
216
+ tremely large and often scales quadratically in the number of parameters d. As an example,
217
+ suppose that the data are stored in a d-dimensional vector Y = (Y1, . . . , Yd)⊤ and con-
218
+ sider the least squares loss L(θ) = ∥Y − θ∥2
219
+ 2. Taking ξk = (ξk1, . . . , ξkd) ∼ N(0, σ2Id) and
220
+ β = σ−2, as above, we have for the j-th component of βL(θk + ξk)ξk that
221
+ σ−2��Y − θk − ξk
222
+ ��2
223
+ 2ξkj = σ−2�
224
+ Yj − θkj − ξkj
225
+ �2ξkj + σ−2 �
226
+ ℓ:ℓ̸=j
227
+
228
+ Yℓ − θkℓ − ξkℓ
229
+ �2ξkj.
230
+ The second term on the right hand side has zero mean. It is pure noise and does not help
231
+ to estimate the gradient. This sum is over d − 1 summands and its variance scales with
232
+ O(d2) in the number of parameters d.
233
+ Due to the large variance, there are many scenarios for which 1-point zero-order dynamics
234
+ quickly diverges to infinity. Indeed if one iterate θk is already far away from the minimum,
235
+ the large loss can result in a parameter update θk+1 which is much further away from the
236
+ minimizer than θk, leading to an even larger loss and an exponential growth of the loss as
237
+ the number of iterations is further increased.
238
+ Regarding theory of zero-order methods, [10] studies a related zero-order methods and
239
+ mirror descent. Assuming that the parameter vector lies in an Euclidean ball, they obtain
240
+ in their Corollary 1 the rate
241
+
242
+ d/k with k the number of iterations and also provide a
243
+ corresponding lower bound proving that this rate is optimal (their Proposition 1). The
244
+ large noise causes the factor
245
+
246
+ d in the rate, suggesting slow convergence in the high-
247
+ dimensional regime. [25] also finds a suboptimality of order d if zero-order methods are
248
+ compared to gradient descent. Table 1 in [20] shows that the factor
249
+
250
+ d or d occurs in all
251
+ known convergence rates unless second-order information is used.
252
+ Due to the large noise, derivative-free methods are in general thought to be inferior com-
253
+ pared to gradient descent.
254
+ This is for instance remarked in [6], Section 1.3: ”Finally,
255
+ 6
256
+
257
+ we want to make a strong statement that often councils against the use of derivative-free
258
+ methods: if you can obtain clean derivatives (even if it requires considerable effort) and the
259
+ functions defining your problem are smooth and free of noise you should not use derivative-
260
+ free methods.”
261
+ Zero-order methods are also not necessarily much faster to compute than gradient descent
262
+ iterates. For the gradient-based backpropagation of ANNs, the number of operations re-
263
+ quired for the forward pass is of the same order as the number of operations required for
264
+ the backwards pass. Evaluation of the loss is therefore not substantially cheaper than com-
265
+ puting the gradient and zero-order methods cannot be computed at a faster order than
266
+ backpropagation.
267
+ Despite these rather discouraging remarks, there is a rapidly increasing interest in derivative-
268
+ free methods and they are successfully applied in practice, for example by Google [13].
269
+ 4
270
+ Hebbian learning as zero-order optimization method
271
+ The updating formula (2.4) allows to address supervised learning tasks, where we want to
272
+ learn the functional relationship between inputs and outputs given observations (or training
273
+ data) from input-output pairs (X1, Y1), (X2, Y2), . . . that are all generated from the same,
274
+ unknown distribution as the vector (X, Y ). Well-known examples for this framework are
275
+ classification and regression. For instance to classify cat and dog images, Xi is the i-th
276
+ image containing all the pixel values of the i-th cat image and Yi is the corresponding label
277
+ ”cat” or ”dog”, coded as 0 or 1.
278
+ Consider now a feedforward biological neural network (BNN) with m neurons. This means
279
+ that the neurons/nodes form a directed acyclic graph (DAG) with input neurons receiving
280
+ information from the data Xi and possibly several output neurons. For the subsequent
281
+ analysis, we neither have to specify a layered structure as commonly done for ANNs nor
282
+ conversion rules how vector valued inputs are converted into spike trains or output spike
283
+ trains are cast into response variables, such as conversion into labels in a classification
284
+ problem.
285
+ In the k-th instance, we feed the k-th input vector Xk in the BNN, let the BNN run and
286
+ receive then as output the predicted response �Yk. The loss at this round is a measure for the
287
+ difference between the predicted response �Yk and the real response Yk. It will be denoted
288
+ by L(�Yk, Yk) in the following. The anticipated loss that occurs in (2.4) could be modelled
289
+ by a (weighted) average over past iterations. Here we use the loss of the previous iterate
290
+ L(�Yk−1, Yk−1).
291
+ 7
292
+
293
+ During each instance, several spikes can be sent between any two connected neurons. We
294
+ impose the (strong) assumption that for every run, and any connection, exactly one spike
295
+ will be released.
296
+ Number the m nodes, that represent the neurons in the graph, by 1, . . . , m and denote the
297
+ edge set by T . A pair (i, j) is in T if and only if neuron i is a presynaptic neuron for neuron
298
+ j. Equivalently, (i, j) ∈ T iff there is an arrow from i to j in the underlying DAG. We
299
+ consider the case that the BNN topology is static, that is, the edge set T does not change
300
+ during learning.
301
+ If w(k)
302
+ ij
303
+ is the BNN weight after the k-th round, it is then updated in the (k +1)-st iteration
304
+ according to (2.4)
305
+ w(k+1)
306
+ ij
307
+ (4.1)
308
+ = w(k)
309
+ ij + αk+1
310
+
311
+ L(�Yk, Yk) − L(�Yk−1, Yk−1)
312
+
313
+ w(k)
314
+ ij C
315
+
316
+ e−c(τ (k)
317
+ ij −T (k)
318
+ −,j) − e−c(T (k)
319
+ +,j−τ (k)
320
+ ij )�
321
+ ,
322
+ for all (i, j) ∈ T and αk+1 > 0 the learning rate. Here T (k)
323
+ −,j and T (k)
324
+ +,j are the closest spike
325
+ times of the j-th neuron before/after the arrival time τ (k)
326
+ ij
327
+ of the spike that is sent from
328
+ neuron i to neuron j. The constant C can be integrated into the loss function and is from
329
+ now on set to one.
330
+ For the updating, the location of τ (k)
331
+ ij
332
+ is important within the interval [T (k)
333
+ −,j, T (k)
334
+ +,j], while the
335
+ interval length seems to play a minor role. Therefore, we assume that the interval length
336
+ is constant and set A := (T (k)
337
+ +,j − T (k)
338
+ −,j)/2. We assume moreover that the arrival time of the
339
+ spike from neuron i to neuron j has a negligible influence on the spike times of neuron j,
340
+ that the spike times τ (k)
341
+ ij
342
+ are all independent of each other, and follow a uniform distribution
343
+ on the interval [T (k)
344
+ −,j, T (k)
345
+ +,j]. As mentioned before, to trigger a spike, it needs of the order of
346
+ 20 − 50 presynaptic neurons to fire in a short time interval. The influence of an individual
347
+ neuron seems therefore rather minor, justifying the previous assumption. The assumptions
348
+ above show that the random variable U (k)
349
+ ij
350
+ := τ (k)
351
+ ij
352
+ − 1
353
+ 2(T (k)
354
+ +,j + T (k)
355
+ −,j) are jointly independent
356
+ and uniformly distributed on [−A, A]. Hence, (4.1) becomes
357
+ w(k+1)
358
+ ij
359
+ = w(k)
360
+ ij + αk+1
361
+
362
+ L(�Yk, Yk) − L(�Yk−1, Yk−1)
363
+
364
+ w(k)
365
+ ij
366
+
367
+ e−c(A+U(k)
368
+ i,j ) − e−c(A−U(k)
369
+ i,j )�
370
+ ,
371
+ for all (i, j) ∈ T . The factor e−cA can be absorbed into the loss function and the constant c
372
+ can be absorbed into the hyperparameter A. By reparametrization, we obtain the updating
373
+ formula
374
+ w(k+1)
375
+ ij
376
+ = w(k)
377
+ ij + αk+1
378
+
379
+ L(�Yk, Yk) − L(�Yk−1, Yk−1)
380
+
381
+ w(k)
382
+ ij
383
+
384
+ e−U(k)
385
+ i,j − eU(k)
386
+ i,j
387
+
388
+ ,
389
+ (4.2)
390
+ 8
391
+
392
+ for all (i, j) ∈ T .
393
+ To further analyze this scheme, it is important to understand how the predicted response
394
+ �Yk depends on the parameters. We now argue that, under the same assumptions as before,
395
+ �Yk is a function of the variables w(k)
396
+ ij + eU(k)
397
+ i,j . The high-level rationale is that in this neural
398
+ model, all the information that is further transmitted in the BNN about the parameter
399
+ w(k)
400
+ ij
401
+ sits in the spike times of neuron j and the interarrival spike times only depend on w(k)
402
+ ij
403
+ through w(k)
404
+ ij + eU(k)
405
+ i,j . To see this, fix neuron j. The only information that this node/neuron
406
+ releases to its descendants in the DAG are the spike times of this neuron. This means that
407
+ from all the incoming information that neuron j receives from presynaptic neurons (parent
408
+ nodes) only the part is transmitted that affects the spike times of neuron j. As mentioned in
409
+ Section 2, a spike arriving at neuron j from neuron i at time τ (k)
410
+ ij
411
+ causes the potential t �→
412
+ w(k)
413
+ ij eτ (k)
414
+ ij −t1(t ≥ τ (k)
415
+ ij ) at node j. If every incoming neuron spikes once, the overall potential
416
+ of neuron j is �
417
+ i:(i,j)∈T w(k)
418
+ ij eτ (k)
419
+ ij −t1(t ≥ τ (k)
420
+ ij ). If S denotes the threshold value for the
421
+ potential at which a neuron spikes, then at the spike time T (k)
422
+ +,j of the j-th neuron, we have
423
+ by the definition of U (k)
424
+ ij , S = �
425
+ i:(i,j)∈T w(k)
426
+ ij eτ (k)
427
+ ij −T (k)
428
+ +,j = �
429
+ i:(i,j)∈T w(k)
430
+ ij eU(k)
431
+ ij − 1
432
+ 2 (T (k)
433
+ +,j−T (k)
434
+ −,j).
435
+ Rearranging this equation shows that the interarrival spike time T (k)
436
+ +,j−T (k)
437
+ −,j can be expressed
438
+ in terms of the variables w(k)
439
+ ij eU(k)
440
+ ij . Introduce wk := (w(k)
441
+ ij )(i,j)∈T , Uk := (U (k)
442
+ ij )(i,j)∈T and
443
+ write wkeUk for (w(k)
444
+ ij eU(k)
445
+ i,j )(i,j)∈T . The previous argument indicates that the predictor �Yk
446
+ is a function of wkeUk and Xk. Thus, the loss L(�Yk, Yk) can be written as a function of the
447
+ form L
448
+
449
+ wkeUk, Xk, Yk
450
+
451
+ and (4.2) becomes
452
+ w(k+1)
453
+ ij
454
+ (4.3)
455
+ = w(k)
456
+ ij + αk+1
457
+
458
+ L
459
+
460
+ wkeUk, Xk, Yk
461
+
462
+ − L
463
+
464
+ wk−1eUk−1, Xk−1, Yk−1
465
+ ��
466
+ w(k)
467
+ ij
468
+
469
+ e−U(k)
470
+ i,j − eU(k)
471
+ i,j
472
+
473
+ .
474
+ In a BNN, the parameters w(k)
475
+ ij are non-negative. We now introduce the real-valued variables
476
+ θ(k)
477
+ ij
478
+ = log(w(k)
479
+ ij ) and θk = (θ(k)
480
+ ij )(i,j)∈T . This means that w(k)
481
+ ij
482
+ = eθ(k)
483
+ ij . A first order Taylor
484
+ expansion shows that for real numbers u, v, ∆ such that e−v∆ is small, eu = ev + ∆ gives
485
+ u = log(ev + ∆) = v + log(1 + e−v∆) ≈ v + e−v∆. Working with this approximation, we
486
+ can rewrite the formula (4.3) in terms of the θ’s as
487
+ θ(k+1)
488
+ ij
489
+ (4.4)
490
+ = θ(k)
491
+ ij + αk+1
492
+
493
+ L
494
+
495
+ θk + Uk, Xk, Yk
496
+
497
+ − L
498
+
499
+ θk−1 + Uk−1, Xk−1, Yk−1
500
+ ���
501
+ e−U(k)
502
+ i,j − eU(k)
503
+ i,j
504
+
505
+ .
506
+ Relating this formula to gradient descent and the weight transportation problem mentioned
507
+ in the introduction, we see that the update of one parameter only depends on all the other
508
+ 9
509
+
510
+ parameters through the value of the loss function.
511
+ In vector notation, the previous equality becomes
512
+ θk+1
513
+ (4.5)
514
+ = θk + αk+1
515
+
516
+ L(θk + Uk, Xk, Yk) − L(θk−1 + Uk−1, Xk−1, Yk−1)
517
+ ��
518
+ e−Uk − eUk�
519
+ ,
520
+ where eUk and e−Uk should be understood as componentwise applying the functions x �→ ex
521
+ and x �→ e−x to the vector Uk. In particular, the loss is always a scalar and eUk, e−Uk are
522
+ d-dimensional vectors.
523
+ So far, we have not specified any initial conditions. From now on, we assume that the
524
+ initial values θ0, θ−1 are given and that all the other parameter updates are determined by
525
+ (4.5) for k = 0, 1, . . . with U−1, U0, U1, U2, . . . drawn i.i.d. from the uniform distribution
526
+ U([−A, A]d).
527
+ As an analogue of (3.1), the next result shows that in average, this dynamic can also be
528
+ understood as a gradient descent method with gradient evaluated not exactly at θk but at
529
+ a random perturbation θk + Uk.
530
+ Theorem 1. Write Uk = (Uk1, . . . , Ukd)⊤ and let (eA −eUk)(eA −e−Uk) be the vector with
531
+ components (eA − eUkj)(eA − e−Ukj). Denoting by ⊙ the Hadamard product (componentwise
532
+ product) of two matrices/vectors of the same dimension(s), we have
533
+ E
534
+
535
+ θk+1
536
+
537
+ = E
538
+
539
+ θk
540
+
541
+ − αk+1e−AE
542
+
543
+ ∇θkL(θk + Uk, Xk, Yk) ⊙
544
+
545
+ eA − eUk��
546
+ eA − e−Uk��
547
+ . (4.6)
548
+ Instead of taking the expectation over all randomness, the statement is also true if we only
549
+ take the expectation with respect to Uk, which is the same as the conditional expectation
550
+ E[·|U−1, U0, U1, . . . , Uk−1, (Xℓ, Yℓ)ℓ≥1].
551
+ Note that (eA − eUkj)(eA − e−Ukj) is non-negative. Thus fA(x) = C(A)−1(eA − ex)(eA −
552
+ e−x)1(−A ≤ x ≤ A) defines a probability density function for the positive normalization
553
+ constant C(A) = 2A(e2A + 1) + 2 − 2e2A =
554
+ � A
555
+ −A(eA − ex)(eA − e−x) dx.
556
+ Denoting by
557
+ ∂jL(v, Xk, Yk) the partial derivative of L with respect to the j-th component of v, we can
558
+ state the previous result componentwise as
559
+ E
560
+
561
+ θk+1,j
562
+
563
+ = E
564
+
565
+ θkj
566
+
567
+ − αk+1e−AC(A)E
568
+
569
+ ∂jL(θk + U(j)
570
+ k , Xk, Yk)
571
+
572
+ ,
573
+ (4.7)
574
+ for a random vector U(j)
575
+ k
576
+ = (Uk1, . . . , Uk,j−1, Vkj, Uk,j+1, . . . , Ukd)⊤, with jointly indepen-
577
+ dent random variables Vkj ∼ fA and Ukℓ ∼ U[−A, A], ℓ = 1, . . . , j − 1, j + 1, . . . , d.
578
+ 10
579
+
580
+ Proof of Theorem 1. Throughout the proof, we omit the dependence of the loss function L
581
+ on the data. By conditioning on (U−1, U0, . . . , Uk−1, (Xℓ, Yℓ)ℓ≥1) and the fact that e−Uk
582
+ and eUk have the same distribution, it follows that
583
+ E
584
+
585
+ L(θk−1 + Uk−1)
586
+
587
+ e−Uk − eUk��
588
+ = E
589
+
590
+ L(θk−1 + Uk−1)E
591
+ ��
592
+ e−Uk − eUk� ��� U−1, U0, . . . , Uk−1, (Xℓ, Yℓ)ℓ≥1
593
+ ��
594
+ = 0.
595
+ (4.8)
596
+ With u = (u1, . . . , ud)⊤, the j-th component of e−AE[∇θkL(θk+Uk)⊙(eA−eUk)(eA−e−Uk)]
597
+ is
598
+ e−A
599
+ (2A)d
600
+
601
+ [−A,A]d ∂jL(θk + u)
602
+
603
+ eA − euj��
604
+ eA − e−uj�
605
+ du
606
+ = e−A
607
+ (2A)d
608
+
609
+ [−A,A]d−1
610
+ � A
611
+ −A
612
+ ∂jL(θk + u)
613
+
614
+ eA − euj��
615
+ eA − e−uj�
616
+ dujdu1 . . . duj−1duj+1 . . . dud,
617
+ Observe that (eA − euj)(eA − e−uj) vanishes at the boundaries uj ∈ {−A, A} and ∂uj(eA −
618
+ euj)(eA − e−uj) = eA−uj − eA+uj. Thus, applying integration by parts formula to the inner
619
+ integral yields
620
+ � A
621
+ −A
622
+ ∂jL(θk + u)
623
+
624
+ eA − euj��
625
+ eA − e−uj�
626
+ duj = −eA
627
+ � A
628
+ −A
629
+ L(θk + u)
630
+
631
+ e−uj − euj�
632
+ duj
633
+ and therefore
634
+ e−A
635
+ (2A)d
636
+
637
+ [−A,A]d ∂jL(θk + u)
638
+
639
+ eA − euj��
640
+ eA − e−uj�
641
+ du
642
+ = −
643
+ 1
644
+ (2A)d
645
+
646
+ [−A,A]d L(θk + u)
647
+
648
+ e−uj − euj�
649
+ du
650
+ = −E
651
+
652
+ L(θk + Uk)
653
+
654
+ e−Ukj − eUkj��
655
+ .
656
+ This holds for all j = 1, . . . , d. The minus on the right hand side cancels out the first minus
657
+ in (4.6). Together with (4.8), the claim follows.
658
+ Equation (4.8) in the proof shows that the theorem still holds if the term L(θk−1 +
659
+ Uk−1, Xk−1, Yk−1) in (4.5) is replaced by zero or any other value that is independent of
660
+ Uk.
661
+ To obtain a proper zero-order method, a crucial assumption is to choose the amplitude
662
+ functions A+, A− in (2.1) to be the same. In the brain, these functions are close, but some
663
+ 11
664
+
665
+ authors argue that there is a slight difference [34]. Such differences would lead to additional,
666
+ small contributions in the iterations that cannot be linked to the gradient.
667
+ A statistical analysis of the zero-order method (4.5) is challenging, even for simple models
668
+ such as data generated from the linear regression model.
669
+ Another open problem is to
670
+ determine whether the convergence rate of (4.5) scales in the number of parameters d in
671
+ the same way as other zero-order methods.
672
+ 5
673
+ Literature on learning with BNNs
674
+ This literature survey is aimed to give a quick overview. For a more detailed summary of
675
+ related literature, see [37, 41].
676
+ To train BNNs on data, a natural idea is to ignore Hebbian learning and to fit BNNs via
677
+ gradient descent. Similar as backpropagation efficiently computes the gradient in ANNs,
678
+ SpikeProp [3, 4] is an algorithm to compute the gradient for spiking neural networks.
679
+ The weight transportation problem is caused by the parameter dependence in the backwards
680
+ pass of the backpropagation algorithm. Feedback alignment [18, 26, 17, 1, 19] avoids this
681
+ by using the backpropagation algorithm with random weights. In a network, the feedback
682
+ could be then transmitted via specific feedback neurons.
683
+ If the brain does a version of backpropagation, the difficulty is always the feedback from
684
+ the output backwards to the neurons. Contrastive Hebbian learning [27] assumes that there
685
+ are two different phases. During the first phase the network does prediction and the second
686
+ phase starts after the prediction error is revealed. In one of the phases the learning is
687
+ Hebbian and in the other one, the learning is anti-Hebbian. Anti-Hebbian learning means
688
+ that if two neurons fire together, the connecting weight parameter is decreased instead of
689
+ increased. Equilibrium propagation [29] overcomes the two types of learning in the different
690
+ phases but requires again the computation of a gradient.
691
+ For a biologically more plausible implementation of the weight transportation problem,
692
+ predictive coding [40, 41, 35, 22, 23] uses two types of neurons, named error nodes and value
693
+ nodes. These two nodes are associated to each other and process forward and backward
694
+ information locally.
695
+ [31] proposes the concept of a ”hedonistic synapse” that follows a Hebbian learning rule
696
+ and takes the global reward into account. For the learning, a hedonistic synapse has to be
697
+ able to store information from previous trials in a so-called eligibility trace.
698
+ Closest to our approach is weight perturbation [39]. Weight perturbation adds random
699
+ 12
700
+
701
+ noise to the parameters or the outputs and compares the loss with and without added
702
+ noise to estimate the gradient. Whereas the cause of the noise perturbation is not entirely
703
+ clear in the weight perturbation framework, we have shown in this work, how the spike
704
+ train structure in BNNs implies a random perturbation of the parameters in the loss with
705
+ uniformly distributed noise and how this leads to a specific derivative-free updating formula
706
+ for the weights that also involves the difference of the loss function evaluated for different
707
+ instance of the noisy parameters.
708
+ A more statistical approach is [24] considering unsupervised classification using a small
709
+ BNN. This work identifies a closer link between a Hebbian learning rule and the EM-
710
+ algorithm for mixtures of multinomial distributions.
711
+ Some other ideas on unsupervised
712
+ learning in BNNs are moreover provided in [12], Section 19.3.
713
+ To summarize, there are various theories that are centered around the idea that the learning
714
+ in BNNs should be linked to gradient descent. All of these approaches, however, contain
715
+ still biological implausibilities and lack a theoretical analysis.
716
+ References
717
+ [1] Bartunov, S., Santoro, A., Richards, B., Marris, L., Hinton, G. E., and
718
+ Lillicrap, T. Assessing the scalability of biologically-motivated deep learning al-
719
+ gorithms and architectures. In Advances in Neural Information Processing Systems
720
+ (2018), S. Bengio, H. Wallach, H. Larochelle, K. Grauman, N. Cesa-Bianchi, and
721
+ R. Garnett, Eds., vol. 31, Curran Associates, Inc.
722
+ [2] Bi, G.-q., and Poo, M.-m. Synaptic modifications in cultured hippocampal neurons:
723
+ Dependence on spike timing, synaptic strength, and postsynaptic cell type. Journal of
724
+ Neuroscience 18, 24 (1998), 10464–10472.
725
+ [3] Bohte, S. M., Kok, J. N., and La Poutr´e, H. Error-backpropagation in tempo-
726
+ rally encoded networks of spiking neurons. Neurocomputing 48, 1 (2002), 17–37.
727
+ [4] Booij, O., and tat Nguyen, H. A gradient descent rule for spiking neurons emitting
728
+ multiple spikes. Information Processing Letters 95, 6 (2005), 552–558.
729
+ [5] Brown, N., and Sandholm, T. Superhuman AI for heads-up no-limit poker: Li-
730
+ bratus beats top professionals. Science 359, 6374 (2018), 418–424.
731
+ [6] Conn, A. R., Scheinberg, K., and Vicente, L. N. Introduction to derivative-free
732
+ optimization, vol. 8 of MPS/SIAM Series on Optimization. Society for Industrial and
733
+ 13
734
+
735
+ Applied Mathematics (SIAM), Philadelphia, PA; Mathematical Programming Society
736
+ (MPS), Philadelphia, PA, 2009.
737
+ [7] Crick, F. The recent excitement about neural networks. Nature 337, 6203 (1989),
738
+ 129–132.
739
+ [8] Daley, D. J., and Vere-Jones, D. An introduction to the theory of point processes.
740
+ Vol. I, second ed. Probability and its Applications (New York). Springer-Verlag, New
741
+ York, 2003. Elementary theory and methods.
742
+ [9] Daley, D. J., and Vere-Jones, D. An introduction to the theory of point processes.
743
+ Vol. II, second ed. Probability and its Applications (New York). Springer, New York,
744
+ 2008. General theory and structure.
745
+ [10] Duchi, J. C., Jordan, M. I., Wainwright, M. J., and Wibisono, A. Optimal
746
+ rates for zero-order convex optimization: The power of two function evaluations. IEEE
747
+ Transactions on Information Theory 61, 5 (2015), 2788–2806.
748
+ [11] Fr´emaux, N., Sprekeler, H., and Gerstner, W. Functional requirements for
749
+ reward-modulated spike-timing-dependent plasticity. Journal of Neuroscience 30, 40
750
+ (2010), 13326–13337.
751
+ [12] Gerstner, W., Kistler, W. M., Naud, R., and Paninski, L. Neuronal Dynam-
752
+ ics: From Single Neurons to Networks and Models of Cognition. Cambridge University
753
+ Press, 2014.
754
+ [13] Golovin, D., Solnik, B., Moitra, S., Kochanski, G., Karro, J. E., and
755
+ Sculley, D., Eds. Google Vizier: A Service for Black-Box Optimization (2017).
756
+ [14] Grossberg, S. Competitive learning: From interactive activation to adaptive reso-
757
+ nance. Cognitive Science 11, 1 (1987), 23–63.
758
+ [15] Hebb, D.
759
+ The Organization of Behavior: A Neuropsychological Theory (1st ed.).
760
+ Psychology Press, 2002.
761
+ [16] Larson, J., Menickelly, M., and Wild, S. M. Derivative-free optimization meth-
762
+ ods. Acta Numer. 28 (2019), 287–404.
763
+ [17] Liao, Q., Leibo, J., and Poggio, T. How important is weight symmetry in back-
764
+ propagation?
765
+ Proceedings of the AAAI Conference on Artificial Intelligence 30, 1
766
+ (2016).
767
+ 14
768
+
769
+ [18] Lillicrap, T. P., Cownden, D., Tweed, D. B., and Akerman, C. J. Random
770
+ synaptic feedback weights support error backpropagation for deep learning. Nature
771
+ Communications 7, 1 (2016), 13276.
772
+ [19] Lillicrap, T. P., Santoro, A., Marris, L., Akerman, C. J., and Hinton, G.
773
+ Backpropagation and the brain. Nature Reviews Neuroscience 21, 6 (2020), 335–346.
774
+ [20] Liu, S., Chen, P.-Y., Kailkhura, B., Zhang, G., Hero III, A. O., and Varsh-
775
+ ney, P. K. A primer on zeroth-order optimization in signal processing and machine
776
+ learning: Principals, recent advances, and applications. IEEE Signal Processing Mag-
777
+ azine 37, 5 (2020), 43–54.
778
+ [21] Markram, H., L¨ubke, J., Frotscher, M., and Sakmann, B.
779
+ Regulation of
780
+ synaptic efficacy by coincidence of postsynaptic APs and EPSPs. Science, 275 (1997),
781
+ 213–215.
782
+ [22] Millidge, B., Seth, A., and Buckley, C. L. Predictive coding: a theoretical and
783
+ experimental review. arXiv e-prints (July 2021), arXiv:2107.12979.
784
+ [23] Millidge, B., Tschantz, A., and Buckley, C. L. Predictive coding approximates
785
+ backprop along arbitrary computation graphs. Neural Computation 34, 6 (05 2022),
786
+ 1329–1368.
787
+ [24] Nessler, B., Pfeiffer, M., and Maass, W. STDP enables spiking neurons to
788
+ detect hidden causes of their inputs. In Advances in Neural Information Processing
789
+ Systems (2009), Y. Bengio, D. Schuurmans, J. Lafferty, C. Williams, and A. Culotta,
790
+ Eds., vol. 22, Curran Associates, Inc.
791
+ [25] Nesterov, Y., and Spokoiny, V. Random gradient-free minimization of convex
792
+ functions. Found. Comput. Math. 17, 2 (2017), 527–566.
793
+ [26] Nøkland, A. Direct feedback alignment provides learning in deep neural networks.
794
+ In Advances in Neural Information Processing Systems (2016), D. Lee, M. Sugiyama,
795
+ U. Luxburg, I. Guyon, and R. Garnett, Eds., vol. 29, Curran Associates, Inc.
796
+ [27] O’Reilly, R. C. Biologically plausible error-driven learning using local activation
797
+ differences: The generalized recirculation algorithm. Neural Computation 8, 5 (1996),
798
+ 895–938.
799
+ [28] Pawlak, V., Wickens, J., Kirkwood, A., and Kerr, J. Timing is not everything:
800
+ Neuromodulation opens the STDP gate. Front Synaptic Neurosci. 2 (2010), 146.
801
+ 15
802
+
803
+ [29] Scellier, B., and Bengio, Y. Equilibrium propagation: Bridging the gap between
804
+ energy-based models and backpropagation. Frontiers in Computational Neuroscience
805
+ 11 (2017).
806
+ [30] Schmidhuber, J. Deep learning in neural networks: An overview. Neural Networks
807
+ 61 (2015), 85–117.
808
+ [31] Seung, H. S.
809
+ Learning in spiking neural networks by reinforcement of stochastic
810
+ synaptic transmission. Neuron 40, 6 (2023/01/05 2003), 1063–1073.
811
+ [32] Shatz, C. J. The developing brain. Scientific American 267, 3 (1992), 60–67.
812
+ [33] Silver, D., Huang, A., Maddison, C. J., Guez, A., Sifre, L., van den Driess-
813
+ che, G., Schrittwieser, J., Antonoglou, I., Panneershelvam, V., Lanctot,
814
+ M., Dieleman, S., Grewe, D., Nham, J., Kalchbrenner, N., Sutskever, I.,
815
+ Lillicrap, T., Leach, M., Kavukcuoglu, K., Graepel, T., and Hassabis, D.
816
+ Mastering the game of Go with deep neural networks and tree search. Nature 529,
817
+ 7587 (2016), 484–489.
818
+ [34] Song, S., Miller, K. D., and Abbott, L. F.
819
+ Competitive Hebbian learning
820
+ through spike-timing-dependent synaptic plasticity. Nature Neuroscience 3, 9 (2000),
821
+ 919–926.
822
+ [35] Song, Y., Lukasiewicz, T., Xu, Z., and Bogacz, R. Can the brain do back-
823
+ propagation? — exact implementation of backpropagation in predictive coding net-
824
+ works. In Advances in Neural Information Processing Systems (2020), H. Larochelle,
825
+ M. Ranzato, R. Hadsell, M. Balcan, and H. Lin, Eds., vol. 33, Curran Associates, Inc.,
826
+ pp. 22566–22579.
827
+ [36] Spall, J. C. Introduction to stochastic search and optimization. Wiley-Interscience
828
+ Series in Discrete Mathematics and Optimization. Wiley-Interscience [John Wiley &
829
+ Sons], Hoboken, NJ, 2003. Estimation, simulation, and control.
830
+ [37] Tavanaei, A., Ghodrati, M., Kheradpisheh, S. R., Masquelier, T., and
831
+ Maida, A. Deep learning in spiking neural networks. Neural Networks 111 (2019),
832
+ 47–63.
833
+ [38] Tsybakov, A. B. Introduction to nonparametric estimation. Springer Series in Statis-
834
+ tics. Springer, New York, 2009. Revised and extended from the 2004 French original,
835
+ Translated by Vladimir Zaiats.
836
+ [39] Werfel, J., Xie, X., and Seung, H. S. Learning curves for stochastic gradient
837
+ descent in linear feedforward networks. In NIPS (2003), pp. 1197–1204.
838
+ 16
839
+
840
+ [40] Whittington, J. C. R., and Bogacz, R. An approximation of the error backpropa-
841
+ gation algorithm in a predictive coding network with local Hebbian synaptic plasticity.
842
+ Neural Computation 29, 5 (2017), 1229–1262.
843
+ [41] Whittington, J. C. R., and Bogacz, R. Theories of error back-propagation in
844
+ the brain. Trends in Cognitive Sciences 23, 3 (2019), 235–250.
845
+ [42] Zhang, L. I., Tao, H. W., Holt, C. E., Harris, W. A., and Poo, M.-m. A crit-
846
+ ical window for cooperation and competition among developing retinotectal synapses.
847
+ Nature 395, 6697 (1998), 37–44.
848
+ 17
849
+
5tFKT4oBgHgl3EQfSy3E/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
69AyT4oBgHgl3EQfcvd4/content/2301.00289v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:5dd79f9674b538610012f0a31c5101752dfa03f1edbca5d926e88cc1ba2c8b61
3
+ size 255460
69AyT4oBgHgl3EQfcvd4/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:1f99301af4c8b96217936422dcced8fc46736f07c7af89066e50f9a2ff381880
3
+ size 1048621
69AyT4oBgHgl3EQfcvd4/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:7dbcf28c61965df31969528de23ab38a62a229a134e881be5711ec0ec5048fdc
3
+ size 41234
6NFAT4oBgHgl3EQfnR2x/content/2301.08628v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:4433c9a4442ce20aa537cc399c1ed3ddc27981a31216159366475b940e76124f
3
+ size 6864968
6NFAT4oBgHgl3EQfnR2x/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:9aff6d6e1d12eb69a5fd01627ff5fb225191afcdec1046f7c2c3ea1a8664f155
3
+ size 8650797
6NFAT4oBgHgl3EQfnR2x/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:29e172e701236b3491547410195aa5877e1ef45a7ebef71f20d052efe96604c7
3
+ size 316984
6tAzT4oBgHgl3EQfEvoZ/content/2301.00997v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:9164a57341f3b71bb9b614b178f7ab7096b73a72635d04f4c4605d7cbc172445
3
+ size 1687901
6tAzT4oBgHgl3EQfEvoZ/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:5ba7dd8be19eeb3d0751a4411444cca22cdd0405c0e73c2591451961e343c220
3
+ size 1572909
6tAzT4oBgHgl3EQfEvoZ/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:bee5948cb46a49405ceb5b828833aef74461e61a91965a475f84080f47afb095
3
+ size 61462
7tAyT4oBgHgl3EQfQvZV/content/tmp_files/2301.00051v1.pdf.txt ADDED
@@ -0,0 +1,2553 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ IEEE ROBOTICS AND AUTOMATION LETTERS. PREPRINT VERSION. ACCEPTED DEC, 2022
2
+ 1
3
+ Learning from Guided Play:
4
+ Improving Exploration for Adversarial Imitation
5
+ Learning with Simple Auxiliary Tasks
6
+ Trevor Ablett1, Bryan Chan2, and Jonathan Kelly1
7
+ Abstract—Adversarial imitation learning (AIL) has become a
8
+ popular alternative to supervised imitation learning that reduces
9
+ the distribution shift suffered by the latter. However, AIL requires
10
+ effective exploration during an online reinforcement learning
11
+ phase. In this work, we show that the standard, na¨ıve approach
12
+ to exploration can manifest as a suboptimal local maximum
13
+ if a policy learned with AIL sufficiently matches the expert
14
+ distribution without fully learning the desired task. This can
15
+ be particularly catastrophic for manipulation tasks, where the
16
+ difference between an expert and a non-expert state-action pair
17
+ is often subtle. We present Learning from Guided Play (LfGP),
18
+ a framework in which we leverage expert demonstrations of
19
+ multiple exploratory, auxiliary tasks in addition to a main task.
20
+ The addition of these auxiliary tasks forces the agent to explore
21
+ states and actions that standard AIL may learn to ignore.
22
+ Additionally, this particular formulation allows for the reusability
23
+ of expert data between main tasks. Our experimental results in
24
+ a challenging multitask robotic manipulation domain indicate
25
+ that LfGP significantly outperforms both AIL and behaviour
26
+ cloning, while also being more expert sample efficient than these
27
+ baselines. To explain this performance gap, we provide further
28
+ analysis of a toy problem that highlights the coupling between
29
+ a local maximum and poor exploration, and also visualize the
30
+ differences between the learned models from AIL and LfGP.3
31
+ Index Terms—Imitation Learning, Reinforcement Learning,
32
+ Transfer Learning
33
+ I. INTRODUCTION
34
+ E
35
+ XPLORATION is a crucial part of effective reinforce-
36
+ ment learning (RL). A variety of methods have attempted
37
+ to optimize the exploration-exploitation trade-off of RL agents
38
+ [1]–[3], but the development of a technique that generalizes
39
+ across domains remains an open research problem. A simple,
40
+ well-known approach to reduce the need for random explo-
41
+ ration is to provide a dense, or “shaped,” reward to learn from,
42
+ but this can be very challenging to design appropriately [4].
43
+ Furthermore, the environment may not directly provide the
44
+ low-level state information required for such a reward. An
45
+ alternative to providing a dense reward is to learn a reward
46
+ Manuscript received: Nov. 3, 2022; Accepted: Dec. 18, 2022.
47
+ This paper was recommended for publication by Editor Jens Kober upon
48
+ evaluation of the Associate Editor and Reviewers’ comments.
49
+ 1Authors are with the Space & Terrestrial Autonomous Robotic Systems
50
+ (STARS) Laboratory at the University of Toronto Institute for Aerospace
51
+ Studies (UTIAS), Toronto, Ontario, Canada, M3H 5T6. Email: <first
52
+ name>.<last name>@robotics.utias.utoronto.ca
53
+ 2Author is with the Department of Computing Science at the Uni-
54
+ versity
55
+ of
56
+ Alberta,
57
+ Edmonton,
58
+ Alberta,
59
+ Canada,
60
+ T6G
61
+ 2E8.
62
+ Email:
63
64
+ Digital Object Identifier (DOI): see top of this page.
65
+ 3Code, Blog, Appendix: https://papers.starslab.ca/lfgp
66
+ Fig. 1: Learning from Guided Play (LfGP) finds an effective stacking
67
+ policy by learning to compose multiple simple auxiliary tasks (only
68
+ Reach is shown, for this episode) along with stacking. Discrim-
69
+ inator Actor-Critic (DAC) [7], or off-policy AIL, reaches a local
70
+ maximum action-value function and policy, failing to solve the task.
71
+ Arrow direction indicates mean policy velocity action, red-to-yellow
72
+ (background) indicates low-to-high learned value, while arrow colour
73
+ indicates probability of closing (green) or opening (blue) the gripper.
74
+ function from expert demonstrations of a task, in a process
75
+ known as inverse RL (IRL) [5]. Many modern approaches
76
+ to IRL are part of the adversarial imitation learning (AIL)
77
+ family [6]. In AIL, rather than learning a reward function
78
+ directly, the policy and a learned discriminator form a two-
79
+ player min-max optimization problem, where the policy aims
80
+ to confuse the discriminator by producing expert-like data,
81
+ while the discriminator attempts to classify expert and non-
82
+ expert data.
83
+ Although AIL has been shown to be more expert sample
84
+ efficient than supervised imitation learning (also known as be-
85
+ havioural cloning, or BC) in continuous-control environments
86
+ [6]–[8], its application to long-horizon robotic manipulation
87
+ tasks with a wide distribution of possible initial configurations
88
+ remains challenging [7], [9]. In this work, we investigate the
89
+ use of AIL in a multitask robotic manipulation domain. We
90
+ find that a state-of-the-art AIL method, in which off-policy
91
+ learning is used to maximize environment sample efficiency [7]
92
+ (i.e., reduce the quantity of environment interaction required
93
+ from the online RL portion of AIL), is outperformed by BC
94
+ arXiv:2301.00051v1 [cs.LG] 30 Dec 2022
95
+
96
+ LfGP
97
+ DAC
98
+ Reach
99
+ Stack
100
+ Pre-Grasp
101
+ Post-Grasp2
102
+ IEEE ROBOTICS AND AUTOMATION LETTERS. PREPRINT VERSION. ACCEPTED DEC, 2022
103
+ Multitask Environment
104
+ Reach
105
+ Lift
106
+ Bring
107
+ Together
108
+ Insert
109
+ Stack
110
+ Guided Expert Play
111
+ Guide
112
+ Expert
113
+ bring_0
114
+ together
115
+ stack_01
116
+ Multitask Environment
117
+ Reach( )
118
+ Lift( )
119
+ Bring( )
120
+ Insert( )
121
+ Stack( )
122
+ Multitask Environment
123
+ Reach
124
+ Lift
125
+ Bring
126
+ Together
127
+ Insert
128
+ Stack
129
+ Guided Expert Play
130
+ Expert
131
+ lift( )
132
+ Guide
133
+ Guide
134
+ stack( )
135
+ Guided Agent Play
136
+ Move( )
137
+ RESET
138
+ NEXT
139
+ Expert
140
+ lift( )
141
+ Sched
142
+ ( )
143
+ stack( )
144
+ Sched
145
+ (lift( ))
146
+ Agent
147
+ Multitask AIL
148
+ Update
149
+ Fig. 2: The main components of our system for learning from guided play. In a multitask environment, a guide prompts an expert for a mix
150
+ of multitask demonstrations, after which we learn a multitask policy through scheduled hierarchical AIL.
151
+ with an equivalent amount of expert data, contradicting previ-
152
+ ous results [6]–[8]. Through a simplified example, simulated
153
+ robotic experiments, and learned model analysis, we show
154
+ that this outcome occurs because a model learned with expert
155
+ data and a discriminator is susceptible to the deceptive reward
156
+ problem [10]. In other words, while AIL, and more generally
157
+ IRL, can provide something akin to a dense reward, this reward
158
+ is not necessarily optimal for teaching, and AIL alone does
159
+ not enforce sufficiently diverse exploration to escape locally
160
+ optimal but globally poor models. A locally-optimal policy has
161
+ converged to match a subset of the expert data, but in doing
162
+ so, avoids crucial states and actions (e.g., in Fig. 1, grasping
163
+ the blue block) required to globally match the full expert set.
164
+ To overcome this limitation of AIL, we present Learning
165
+ from Guided Play (LfGP),4 in which we combine AIL with a
166
+ scheduled approach to hierarchical RL (HRL) [12], allowing
167
+ an agent to ‘play’ in the environment with an expert guide.
168
+ Using expert demonstrations of multiple relevant auxiliary
169
+ tasks (e.g., Reach, Lift, Move-Object), along with a main task
170
+ (e.g., Stack, Bring, Insert), our scheduled hierarchical agent
171
+ is able to learn tasks where AIL alone fails. Crucially, our
172
+ formulation also allows auxiliary expert data to be reused
173
+ between main tasks, further emphasizing the expert sample
174
+ efficiency of our method.
175
+ We use the word play to describe an agent that simulta-
176
+ neously attempts and learns numerous tasks at once, freely
177
+ composing them together, inspired by the playful (as opposed
178
+ to goal-directed) phase of learning experienced by children
179
+ [12]. In our case, guided represents two separate but related
180
+ ideas: first, that the expert guides this play, as opposed to
181
+ requiring hand-crafted sparse rewards as in [12] (right side
182
+ of Fig. 2), and second, that the expert gathering of multitask,
183
+ semi-structured demonstrations is guided by uniform-random
184
+ task selection (middle of Fig. 2), rather than requiring the
185
+ expert to choose transitions between goals, as in [13], [14].
186
+ Our specific contributions are the following:
187
+ 1) A novel application of a hierarchical framework [12] to
188
+ AIL that learns a reward and policy for a challenging
189
+ 4Originally presented as a non-archival workshop paper [11].
190
+ main task by simultaneously learning rewards and poli-
191
+ cies for auxiliary tasks.
192
+ 2) Manipulation experiments in which we demonstrate that
193
+ AIL fails, while LfGP significantly outperforms both
194
+ AIL and BC.
195
+ 3) A thorough ablation study to examine the effects of
196
+ various design choices for LfGP and our baselines.
197
+ 4) Empirical analysis, including a simplified representative
198
+ example and visualization of the learned models of LfGP
199
+ and AIL, to better understand why AIL fails and how
200
+ LfGP improves upon it.
201
+ II. PROBLEM FORMULATION
202
+ A Markov decision process (MDP) is defined as M =
203
+ ⟨S, A, R, P, ρ0, γ⟩, where the sets S and A are respectively
204
+ the state and action space, R : S×A → R is a reward function,
205
+ P is the state-transition environment dynamics distribution, ρ0
206
+ is the initial state distribution, and γ is the discount factor.
207
+ Actions are sampled from a stochastic policy π(a|s). The
208
+ policy π interacts with the environment to yield experience
209
+ (st, at, rt, st+1) for t = 0, . . . , ∞, where s0 ∼ ρ0(·), at ∼
210
+ π(·|st), st+1 ∼ P(·|st, at), rt = R(st, at). When referring to
211
+ finite-horizon tasks, t = T indicates the final timestep of a
212
+ trajectory.
213
+ For notational convenience, we assume infinite-horizon,
214
+ non-terminating environments where t is unbounded, but
215
+ the extension to the finite-horizon case is trivial. We aim
216
+ to learn a policy π that maximizes the expected return
217
+ J(π)
218
+ =
219
+ Eπ [G(τ0:∞)]
220
+ =
221
+ Eπ [�∞
222
+ t=0 γtR(st, at)], where
223
+ τt:∞ = {(st, at), . . . } is the trajectory starting with (st, at),
224
+ and G(τt:∞) is the return of trajectory τ.
225
+ In this work, we focus on imitation learning (IL), where
226
+ R is unknown and instead we are given a finite set of expert
227
+ demonstration (s, a) pairs BE =
228
+
229
+ (s, a)E, . . .
230
+
231
+ . In AIL, we
232
+ attempt to simultaneously learn π and a discriminator D : S ×
233
+ A → [0, 1] that differentiates between expert samples (s, a)E
234
+ and policy samples (s, a)π and subsequently define R using D
235
+ [6], [7]. To accommodate hierarchical learning, we augment
236
+ M to contain auxiliary tasks, where Taux = {T1, . . . , TK} are
237
+ separate MDPs that share S, A, P, ρ0 and γ with the main
238
+ task Tmain but have their own reward functions, Rk. With this
239
+
240
+ ABLETT et al.: LEARNING FROM GUIDED PLAY
241
+ 3
242
+ Fig. 3: An MDP, analogous to stacking, with an expert demonstration.
243
+ Poor exploration can lead AIL to learn a suboptimal policy.
244
+ modification, we refer to entities in our model that are specific
245
+ to task T ∈ Tall, Tall = Taux ∪ {Tmain}, as (·)T . We assume
246
+ that we have a set of expert data BE
247
+ T for each task.
248
+ III. LOCAL MAXIMUM WITH OFF-POLICY AIL
249
+ In this section, we provide a representative example of how
250
+ AIL can fail by reaching a locally maximum policy due to a
251
+ learned deceptive reward [10] coupled with poor exploration.
252
+ A simple six-state MDP is shown in Fig. 3, with ten state-
253
+ conditional actions. We refer to actions as at = anm and states
254
+ as st = sn where t, n and m refer to the current timestep,
255
+ current state, and next state, respectively. The reward function
256
+ is R(s5, a55) = +1, R(s1, a15) = −5 and 0 for all other state-
257
+ action pairs. The initial state s1 is always s1, the fixed horizon
258
+ length is 5, and no discounting is used.
259
+ The MDP is meant to be roughly analogous to a stacking
260
+ manipulation task: s2, s3, s4 and s6 represent the first block
261
+ being reached, grasped, lifted, and dropped respectively. State
262
+ s5 represents the gripper hovering over the second block
263
+ (whether the first block has been stacked or not), while s1 is
264
+ the reset state, and a15 represents reaching s5 without grasping
265
+ the first block. Taking action a15 results in a total return of
266
+ -1 (because R(s1, a15) = −5), since the first block has not
267
+ actually been grasped. In our case, the agent does not receive
268
+ any reward, and instead an expert demonstration of the optimal
269
+ trajectory is provided. We will assume access to a learned
270
+ (perfect) discriminator, and will use the AIRL [8] reward, so
271
+ state-action pairs in the expert set receive +1 reward and all
272
+ others receive -1.
273
+ We define the action-value Q(st, at) as the expected
274
+ value of taking action at in state st, and initialize it to
275
+ zero for all (s, a) pairs. We define our update rule as the
276
+ standard Q-Learning update [1], Q(st, at) = Q(st, at) +
277
+ α (R(st, at) + maxa Q(st+1, a) − Q(st, at)), with α = 0.1.
278
+ The agent uses ϵ-greedy exploration, storing each (st, at, st+1)
279
+ tuple into a buffer. After each episode, all Q values are updated
280
+ to convergence using the whole buffer.
281
+ After the first complete episode of {a15, a55, a55, a55, a55},
282
+ Q(s1, a15)
283
+ =
284
+ 2.7, and Q(s1, a12)
285
+ =
286
+ 0. In the second
287
+ ({a12, a26, a61, a15, a55}) and third ({a12, a23, a36, a61, a15})
288
+ episodes, the agent initially moves in the correct direction, but
289
+ ultimately still fails. The final Q values in s1 are Q(s1, a15) =
290
+ 0.49 and Q(s1, a12) = 0.13.5
291
+ A policy maximizing Q, having simultaneously learned to
292
+ avoid s6 (by avoiding s2 and s3) and exploiting the (s5, a55)
293
+ expert pair, will choose a1 = a15, giving a final return of
294
+ -1 in the real MDP. This behaviour matches what we see in
295
+ Fig. 1: due to the large negative reward from dropping the
296
+ block, AIL learns a policy that avoids stacking altogether and
297
+ merely reaches the second block, just as AIL here learns to
298
+ skip s2 and s3 and exploit a55. In both cases, poor initial
299
+ exploration leads to a deceptive reward, which exacerbates
300
+ poor exploration.
301
+ IV. LEARNING FROM GUIDED PLAY (LFGP)
302
+ We now introduce Learning from Guided Play (LfGP). Our
303
+ primary goal is to learn a policy πTmain that can solve the main
304
+ task Tmain, with a secondary goal of also learning auxiliary task
305
+ policies πT1, . . . , πTK that are used for improved exploration.
306
+ More specifically, we derive a hierarchical learning objective
307
+ that is decomposed into three parts: i) recovering the reward
308
+ function of each task with expert demonstrations, ii) training
309
+ all policies to achieve their respective goals, and iii) using all
310
+ policies for effective exploration in Tmain. For a summary of
311
+ the algorithm, see supplementary material link in Footnote 3.
312
+ A. Learning the Reward Function
313
+ We first describe how to recover the reward functions from
314
+ expert demonstrations. For each task T ∈ Tall, we learn a dis-
315
+ criminator DT (s, a) that is used to define the reward function
316
+ for policy optimization. We construct the joint discriminator
317
+ loss following [7] to train each discriminator in an off-policy
318
+ manner:
319
+ L(D) = −
320
+
321
+ T ∈Tall
322
+ EB [log (1 − DT (s, a))]
323
+ +EBE
324
+ T [log (DT (s, a))] .
325
+ (1)
326
+ Each resulting discriminator DT attempts to differentiate the
327
+ occupancy measure between the distributions induced by BE
328
+ T
329
+ and B. We can use DT to define various reward functions [7];
330
+ following [8], we define the reward function for each task T
331
+ to be RT (st, at) = log (DT (st, at)) − log (1 − DT (st, at)).
332
+ B. Learning the Hierarchical Agent
333
+ We adapt Scheduled Auxiliary Control (SAC-X) [12] to
334
+ learn the hierarchical agent. The agent includes low-level
335
+ intention policies (equivalently referred to as intentions), a
336
+ high-level scheduler policy, as well as the Q-functions and the
337
+ discriminators. The intentions aim to solve their corresponding
338
+ tasks (i.e., the intention πT aims to maximize the task return
339
+ J(πT )), whereas the scheduler aims to maximize the expected
340
+ return for Tmain by selecting a sequence of intentions to interact
341
+ with the environment. For the remainder of the paper, when
342
+ we refer to a policy, we are referring to an intention policy,
343
+ as opposed to the scheduler, unless otherwise specified.
344
+ 5See six_state_mdp.py from open source code to reproduce.
345
+
346
+ Legend
347
+ 2
348
+ S
349
+ -5
350
+ MDP
351
+ C
352
+ 2
353
+ 3
354
+ S
355
+ S
356
+ S
357
+ 6
358
+ S
359
+ a5
360
+ Expert Demo
361
+ a4
362
+ a1
363
+ 2
364
+ S
365
+ S
366
+ a2
367
+ a3
368
+ S
369
+ a1
370
+ a2-5
371
+ Suboptimal AIL Policy
372
+ S4
373
+ IEEE ROBOTICS AND AUTOMATION LETTERS. PREPRINT VERSION. ACCEPTED DEC, 2022
374
+ 1) Learning the Intentions: We learn each intention using
375
+ Soft Actor-Critic (SAC) [15], an actor-critic algorithm that
376
+ maximizes the entropy-regularized objective, though any off-
377
+ policy RL algorithm would suffice. The objective is
378
+ J(πT ) = EπT
379
+ � ∞
380
+
381
+ t=0
382
+ γt (RT (st, at) + αH(πT (·|st)))
383
+
384
+ ,
385
+ (2)
386
+ where the learned temperature α determines the importance
387
+ of the entropy term and H(πT (·|st)) is the entropy of the
388
+ intention πT at state st. The soft Q-function is
389
+ QT (st, at) = RT (st, at)
390
+ + EπT
391
+ � ∞
392
+
393
+ t=0
394
+ γt(RT (st+1, at+1) + αH(πT (·|st+1)))
395
+
396
+ .
397
+ (3)
398
+ The intentions maximize the joint policy objective
399
+ L(πint) =
400
+
401
+ T ∈Tall
402
+ Es∼Ball,a∼πT (·|s) [QT (s, a) − α log πT (a|s)] ,
403
+ (4)
404
+ where πint refers to the set of intentions {πTmain, πT1, . . . , πTK}
405
+ and Ball refers to buffer containing every transition from
406
+ interactions and demonstrations, as is done in [16], [17].
407
+ For policy evaluation, the soft Q-functions QT for each πT
408
+ minimize the joint soft Bellman residual
409
+ L(Q) =
410
+
411
+ T ∈Tall
412
+ E(s,a,s′)∼Ball,a′∼πT (·|s′)
413
+
414
+ (QT (s, a) − δT )2�
415
+ ,
416
+ (5)
417
+ δT = RT (s, a) + γ (QT (s′, a′) − α log πT (a′|s′)) .
418
+ (6)
419
+ Crucially, because each task shares the common S, A, P, ρ0,
420
+ and γ, and we are using off-policy learning, all tasks can learn
421
+ from all data, as in [12].
422
+ 2) The Scheduler: SAC-X formulates learning the sched-
423
+ uler by maximizing the expected return of the main task
424
+ [12]. In particular, let H be the number of possible intention
425
+ switches within an episode and let each chosen intention
426
+ execute for ξ timesteps. The H intention choices made within
427
+ the episode are defined as T 0:H−1 =
428
+
429
+ T (0), . . . , T (H−1)�
430
+ ,
431
+ where T (h) ∈ Tall. The return of the main task, given chosen
432
+ intentions, is then defined as
433
+ GTmain(T 0:H−1) =
434
+ H−1
435
+
436
+ h=0
437
+ (h+1)ξ−1
438
+
439
+ t=hξ
440
+ γtRTmain(st, at),
441
+ (7)
442
+ where at ∼ πT (h)(·|st) is the action taken at timestep t,
443
+ sampled from the chosen intention T (h) in the hth scheduler
444
+ period. The scheduler for the hth period P h
445
+ S aims to maxi-
446
+ mize the expected main task return: E
447
+
448
+ GTmain(T h:H−1)|P h
449
+ S
450
+
451
+ .
452
+ Although SAC-X describes a method to learn the scheduler
453
+ [12], we find that a combination of two simple task-agnostic
454
+ heuristics performs similarly in practice (see Section V-C2).
455
+ Specifically, we use a weighted random scheduler (WRS)
456
+ combined with handcrafted trajectories (HC). The WRS forms
457
+ a prior categorical distribution over the set of tasks, with a
458
+ higher probability mass pTmain for the main task and
459
+ pTmain
460
+ K
461
+ for
462
+ all other tasks. This approach is comparable to the uniform
463
+ scheduler from [12], with a bias towards the main task. The
464
+ HC component is a small set of handcrafted trajectories of
465
+ tasks that are sampled half of the time, forcing the scheduler
466
+ to explore trajectories that would clearly be beneficial for
467
+ completing the main task. The chosen handcrafted trajectories
468
+ can be found in our code and in our supplementary material.
469
+ C. Breaking Out of Local Maxima with LfGP
470
+ Returning to the discussion in Section III, resolving the
471
+ local maximum problem with LfGP is straightforward. Sup-
472
+ pose we include a go-right auxiliary task with BE
473
+ go-right =
474
+ {(s1, a12), (s2, a23), (s3, a34)}. When the scheduler chooses
475
+ the go-right intention, the agent does not exploit the a55 action
476
+ because the go-right discriminator learns that R(s5, a55) =
477
+ −1. Since the transitions are stored in the shared buffer that
478
+ the main intention also samples from, the agent can quickly
479
+ obtain the correct, optimal value.
480
+ D. Expert Data Collection
481
+ We assume that each T ∈ Tall has, for evaluation purposes
482
+ only, a binary indicator of success. In single-task imitation
483
+ learning where this assumption is valid, expert data is typically
484
+ collected by allowing the expert to control the agent until
485
+ success conditions are met. At that point, the environment is
486
+ reset following ρ0 and collection is repeated for a fixed number
487
+ of episodes or (s, a) pairs. We collect our expert data in this
488
+ way for each T separately.
489
+ V. EXPERIMENTS
490
+ In this work, we are interested in answering the following
491
+ questions about LfGP:
492
+ 1) How does the performance of LfGP compare with BC
493
+ and AIL in challenging manipulation tasks, in terms of
494
+ success rate and expert sample efficiency?
495
+ 2) What parts of LfGP are necessary for success?
496
+ 3) How do the policies and action value functions differ
497
+ between AIL and LfGP?
498
+ A. Experimental Setup
499
+ We complete experiments in a simulation environment con-
500
+ taining a Franka Emika Panda manipulator, one green and
501
+ one blue block in a tray, fixed zones corresponding to the
502
+ green and blue blocks, and one slot in each zone with < 1mm
503
+ Fig. 4: Example successful runs of our four main tasks. Top to
504
+ bottom: Stack, Unstack-Stack, Bring, Insert.
505
+
506
+ ABLETT et al.: LEARNING FROM GUIDED PLAY
507
+ 5
508
+ 0.5
509
+ 1.0
510
+ 1.5
511
+ 2.0
512
+ 0.0
513
+ 0.2
514
+ 0.4
515
+ 0.6
516
+ 0.8
517
+ 1.0
518
+ Stack
519
+ 0.5
520
+ 1.0
521
+ 1.5
522
+ 2.0
523
+ 0.0
524
+ 0.2
525
+ 0.4
526
+ 0.6
527
+ 0.8
528
+ 1.0
529
+ Unstack-Stack
530
+ 0.5
531
+ 1.0
532
+ 1.5
533
+ 2.0
534
+ 0.0
535
+ 0.2
536
+ 0.4
537
+ 0.6
538
+ 0.8
539
+ 1.0
540
+ Bring
541
+ 1
542
+ 2
543
+ 3
544
+ 4
545
+ 0.0
546
+ 0.2
547
+ 0.4
548
+ 0.6
549
+ 0.8
550
+ 1.0
551
+ Insert
552
+ 0.0
553
+ 0.2
554
+ 0.4
555
+ 0.6
556
+ 0.8
557
+ 1.0
558
+ Updates/steps (millions)
559
+ 0.0
560
+ 0.2
561
+ 0.4
562
+ 0.6
563
+ 0.8
564
+ 1.0
565
+ Success Rate
566
+ LfGP (multi)
567
+ BC (multi)
568
+ DAC (single)
569
+ BC (single)
570
+ Expert
571
+ Fig. 5: Performance results for LfGP, multitask BC, single-task BC, and DAC on all four tasks considered in this work. The x-axis corresponds
572
+ to both gradient updates and environments steps for LfGP and DAC, and gradient updates only for both versions of BC. The shaded area
573
+ corresponds to standard deviation across five seeds. LfGP significantly outperforms the baselines on all tasks, and even in Bring where it is
574
+ matched by single-task BC, it is far more expert sample efficient.
575
+ tolerance for fitting the blocks (see bottom right of Fig. 4).
576
+ The robot is controlled via delta-position commands, and the
577
+ blocks and end-effector can both be reset anywhere above the
578
+ tray. The environment is designed such that several different
579
+ challenging tasks can be completed within a common observa-
580
+ tion and action space. The main tasks that we investigate are
581
+ Stack, Unstack-Stack, Bring, and Insert (see Fig. 4). For more
582
+ details on our environment and definitions of task success, see
583
+ supplementary material link in Footnote 3. We also define a set
584
+ of auxiliary tasks: Open-Gripper, Close-Gripper, Reach, Lift,
585
+ Move-Object, and Bring (Bring is both a main task and an
586
+ auxiliary task for Insert), all of which are reusable between
587
+ main tasks.
588
+ We compare our method to several standard multitask and
589
+ single-task baselines. A multitask algorithm simultaneously
590
+ learns to complete a main task as well as auxiliary tasks,
591
+ while the single-task algorithms only learn to complete the
592
+ main task. In general, we consider a multitask algorithm to be
593
+ more useful than a single-task algorithm, given the potential
594
+ to reuse expert data and trained models for learning new tasks.
595
+ To ensure a fair comparison, we provide single-task algorithms
596
+ with an equivalent amount of total expert data as our multitask
597
+ methods, as shown in Table I.
598
+ In our main experiments, we compare LfGP to a mul-
599
+ titask variant of behavioural cloning (BC), single-task BC,
600
+ and Discriminator-Actor-Critic (DAC) [7], a state-of-the-art
601
+ approach to AIL. We train multitask BC with a multitask mean
602
+ squared error objective,
603
+ L(πint) =
604
+
605
+ T ∈Tall
606
+
607
+ (s,a)∈BE
608
+ T
609
+ (πT (s) − a)2 ,
610
+ (8)
611
+ while BC is trained with the corresponding single task version.
612
+ Following recent trends in improving BC performance, we
613
+ train our BC baselines with the same number of gradient
614
+ updates as LfGP and DAC, evaluating the policies at the same
615
+ frequency. This adjustment has been shown to dramatically
616
+ increase the performance of BC [18], [19], particularly com-
617
+ pared to the more common practice of using early stopping,
618
+ as is done in [6], [7]. We validate that this change signifi-
619
+ cantly improves BC performance in our ablation study (see
620
+ Section V-C4).
621
+ We gather expert data by first training an expert policy using
622
+ Scheduled Auxiliary Control (SAC-X) [12]. We then run the
623
+ Task
624
+ Dataset Sizes
625
+ Reuse
626
+ Single Total
627
+ Multi
628
+ Stack
629
+ SOCRLM: 1k/task
630
+ 5k
631
+ 1k
632
+ 6k
633
+ task
634
+ U-Stack
635
+ UOCRLM: 1k/task
636
+ 5k
637
+ 1k
638
+ 6k
639
+ Bring
640
+ BOCRLM: 1k/task
641
+ 6k
642
+ 0
643
+ 6k
644
+ Insert
645
+ IBOCRLM: 1k/task
646
+ 6k
647
+ 1k
648
+ 7k
649
+ Single
650
+ Stack
651
+ S: 6k
652
+ 0
653
+ 6k
654
+ 6k
655
+ Task
656
+ U-Stack
657
+ U: 6k
658
+ 0
659
+ 6k
660
+ 6k
661
+ Bring
662
+ B: 6k
663
+ 0
664
+ 6k
665
+ 6k
666
+ Insert
667
+ I: 6k
668
+ 0
669
+ 7k
670
+ 7k
671
+ TABLE I: The number of (s, a) pairs used for each main and auxiliary
672
+ task. The table illustrates the reusability of the expert data used to
673
+ generate the performance results described in Section V-B. Each letter
674
+ under “Dataset Sizes” is the first letter of a single (auxiliary) task,
675
+ and bolded letters indicate that a dataset was reused for more than
676
+ one main task (e.g., Open-Gripper was used for all four main tasks).
677
+ Multitask methods (e.g., LfGP) are able to reuse a large portion of the
678
+ expert data, while single-task methods (e.g., single-task BC) cannot.
679
+ expert policies to collect various amounts of expert data as
680
+ described in Section IV-D and Table I. We also collect an extra
681
+ 200 expert (sT , 0) pairs per auxiliary task, where T refers to
682
+ the final timestep of an individual episode and 0 is an action
683
+ of all zeros. This is equivalent to adding example data, as is
684
+ done in example-based RL [20]. This addition improved final
685
+ task performance, likely because it biases the reward towards
686
+ completing the final task. It is worth noting that, in the real
687
+ world, final states are easier to collect than full demonstrations,
688
+ and LfGP does not require any modifications to accommodate
689
+ these extra examples. Finally, even without this addition, LfGP
690
+ still outperforms the baselines (see Section V-C1).
691
+ B. Performance Results
692
+ Performance results for all methods and main tasks are
693
+ shown in Fig. 5. We freeze the policies every 100k steps
694
+ and evaluate those policies for 50 randomized episodes, using
695
+ only the mean action outputs for stochastic policies. For all
696
+ algorithms, we test across five seeds and report the mean and
697
+ standard deviation of all seeds.
698
+ In Stack, Unstack-Stack, and Insert, LfGP achieves expert
699
+ performance, while the baselines all perform significantly
700
+ worse. In Bring, LfGP does not quite achieve expert per-
701
+ formance, and is matched by single-task BC. However, we
702
+ note that LfGP is much more expert data efficient than single-
703
+ task BC because it reuses auxiliary task data (see Table I).
704
+ A more direct comparison is multitask BC, which performs
705
+
706
+ 6
707
+ IEEE ROBOTICS AND AUTOMATION LETTERS. PREPRINT VERSION. ACCEPTED DEC, 2022
708
+ 0.5
709
+ 1.0
710
+ 1.5
711
+ 2.0
712
+ 0.0
713
+ 0.2
714
+ 0.4
715
+ 0.6
716
+ 0.8
717
+ 1.0
718
+ Stack (no ablations)
719
+ 0.5
720
+ 1.0
721
+ 1.5
722
+ 2.0
723
+ 0.0
724
+ 0.2
725
+ 0.4
726
+ 0.6
727
+ 0.8
728
+ 1.0
729
+ 0.5|BE
730
+ orig|
731
+ 0.5
732
+ 1.0
733
+ 1.5
734
+ 2.0
735
+ 0.0
736
+ 0.2
737
+ 0.4
738
+ 0.6
739
+ 0.8
740
+ 1.0
741
+ 1.5|BE
742
+ orig|
743
+ 0.5
744
+ 1.0
745
+ 1.5
746
+ 2.0
747
+ 0.0
748
+ 0.2
749
+ 0.4
750
+ 0.6
751
+ 0.8
752
+ 1.0
753
+ Subsampled BE
754
+ 0.5
755
+ 1.0
756
+ 1.5
757
+ 2.0
758
+ 0.0
759
+ 0.2
760
+ 0.4
761
+ 0.6
762
+ 0.8
763
+ 1.0No Extra Final Examples
764
+ 0.0
765
+ 0.2
766
+ 0.4
767
+ 0.6
768
+ 0.8
769
+ 1.0
770
+ Updates/steps (millions)
771
+ 0.0
772
+ 0.2
773
+ 0.4
774
+ 0.6
775
+ 0.8
776
+ 1.0
777
+ Success Rate
778
+ LfGP (multi)
779
+ BC (multi)
780
+ DAC (single)
781
+ BC (single)
782
+ Expert
783
+ Fig. 6: Various dataset ablations for LfGP and all baselines, including dataset size, subsampling of expert dataset, and replacement of extra
784
+ (sT , 0) pairs with an equivalent amount of regular trajectory (s, a) pairs. In all cases, LfGP still significantly outperforms all baselines.
785
+ 1
786
+ 2
787
+ 0.0
788
+ 0.2
789
+ 0.4
790
+ 0.6
791
+ 0.8
792
+ 1.0
793
+ LfGP Scheduler
794
+ 0.0
795
+ 0.5
796
+ 1.0
797
+ Updates/steps (millions)
798
+ 0.0
799
+ 0.2
800
+ 0.4
801
+ 0.6
802
+ 0.8
803
+ 1.0
804
+ Success Rate
805
+ WRS + HC
806
+ WRS only
807
+ Learned
808
+ No Sched.
809
+ Expert
810
+ 1
811
+ 2
812
+ 0.0
813
+ 0.2
814
+ 0.4
815
+ 0.6
816
+ 0.8
817
+ 1.0
818
+ Expert Sampling
819
+ 0.0
820
+ 0.5
821
+ 1.0
822
+ Updates/steps (millions)
823
+ 0.0
824
+ 0.2
825
+ 0.4
826
+ 0.6
827
+ 0.8
828
+ 1.0
829
+ Success Rate
830
+ LfGP
831
+ LfGP (BE
832
+ for D only)
833
+ LfGP (No
834
+ (sT , 0) bias)
835
+ DAC
836
+ DAC (BE
837
+ for D only)
838
+ DAC (No
839
+ (sT , 0) bias)
840
+ Expert
841
+ 1
842
+ 2
843
+ 0.0
844
+ 0.2
845
+ 0.4
846
+ 0.6
847
+ 0.8
848
+ 1.0
849
+ BC/DAC Alternatives
850
+ 0.0
851
+ 0.5
852
+ 1.0
853
+ Updates/steps (millions)
854
+ 0.0
855
+ 0.2
856
+ 0.4
857
+ 0.6
858
+ 0.8
859
+ 1.0
860
+ Success Rate
861
+ BC (multi)
862
+ BC (multi,
863
+ early stop)
864
+ DAC
865
+ GAIL
866
+ BC
867
+ BC (early
868
+ stop)
869
+ Expert
870
+ Fig. 7: Left: Scheduler ablations for training LfGP, WRS is weighted random scheduler, HC is handcraft; Middle: Expert sampling ablations
871
+ for training LfGP/DAC; Right: Baseline ablations for training BC/DAC.
872
+ much more poorly than LfGP across all tasks, including Bring.
873
+ Intriguingly, DAC also performs very poorly on all tasks, a
874
+ phenomenon that we further explore in Section VI.
875
+ C. Ablation Study
876
+ While the fundamental idea of LfGP is relatively straight-
877
+ forward, it is worth considering alternatives to some of the
878
+ specific choices made for our experiments. In this section,
879
+ we complete an ablation study where we vary (a) the expert
880
+ dataset, including size, subsampling, and inclusion of extra
881
+ (sT , 0) pairs; (b) the type of scheduler used for LfGP (see
882
+ Section IV-B2); (c) the sampling strategy used for expert data;
883
+ and (d) the method for training our baselines. To reduce the
884
+ computational load of completing these experiments, all of
885
+ these variations were carried out exclusively for our Stack task.
886
+ All ablation results are shown in Fig. 6 and Fig. 7.
887
+ 1) Dataset Ablations: We tested the following dataset vari-
888
+ ations: (a) half and one and a half times the original expert
889
+ dataset size; (b) subsampling BE, taking only every 20th
890
+ timestep, as is done in [6], [7]; and (c) replacing the 200 extra
891
+ (sT , 0) pairs in each buffer with 200 regular trajectory (s, a)
892
+ pairs. Notably, even in the challenging regimes of halving
893
+ and subsampling the dataset, LfGP still learns an expert-level
894
+ policy (albeit more slowly).
895
+ 2) Scheduler Ablations: We tested the following scheduler
896
+ variations: (a) Weighted Random Scheduler (WRS) only, re-
897
+ moving the Handcrafted (HC) addition; (b) a learned sched-
898
+ uler, as is used in [12]; and (c) no scheduler, in which only the
899
+ main task is attempted, akin to the Intentional Unintentional
900
+ Agent [12], [21]. Both WRS versions learn slightly faster than
901
+ the learned scheduler, but all three methods outperform the No
902
+ Scheduler ablation, replicating results from [12] demonstrating
903
+ the importance of actually exploring all auxiliary tasks. Per-
904
+ haps surprisingly, the HC modification made little difference
905
+ compared with WRS only, but it is possible that for even more
906
+ complex tasks, this could change.
907
+ 3) Expert Sampling Ablations: For our main performance
908
+ experiments, we modified standard AIL in two ways: (a) we
909
+ added expert buffer sampling to π and Q updates, in addition
910
+ to the D updates, as is done in [16], [17]; and (b) we biased the
911
+ sampling of BE when training D to be 95% final (sT , 0) pairs.
912
+ We tested both LfGP and DAC without these additions. For
913
+ LfGP, although these modifications improve learning speed,
914
+ they are not required to generate an expert policy. For DAC,
915
+ performance is quite poor regardless of these adjustments.
916
+ 4) Baseline Ablations: To verify that we evaluated against
917
+ fair baselines, we tested two alternatives to those used for our
918
+ main performance experiments: (a) an early stopping variation
919
+ of BC, in which each expert buffer is divided into a 70%/30%
920
+ train/validation split, taking the policy after validation error has
921
+ not improved for 100 epochs; and (b) the on-policy variant
922
+ of DAC, also known as Generative Adversarial Imitation
923
+ Learning (GAIL) [6]. Notably, the early stopping variants of
924
+ BC, commonly used as baselines in other AIL work [6], [7],
925
+ [22] perform dramatically more poorly than those used in our
926
+ experiments, verifying recent trends [18], [19].
927
+ VI. LEARNED MODEL ANALYSIS
928
+ In this section, we further examine the learned Stack models
929
+ of LfGP and DAC. We take snapshots of the average per-
930
+ forming models from LfGP and DAC at four points during
931
+ learning: 200k, 400k, 600k, and 800k model updates and
932
+ environment steps. Although the initial gripper and block
933
+ positions are randomized between episodes during learning,
934
+ for each snapshot, we reset the stacking environment to a
935
+ single set of representative initial conditions. We then run the
936
+
937
+ ABLETT et al.: LEARNING FROM GUIDED PLAY
938
+ 7
939
+ LfGP – Open-Gripper
940
+ LfGP – Close-Gripper
941
+ LfGP – Reach
942
+ LfGP – Lift
943
+ LfGP – Move-Object
944
+ LfGP – Stack
945
+ DAC – Stack
946
+ Fig. 8: The policy outputs (arrows) and Q values (background) for each LfGP task and for DAC at 200k environment steps. The arrows show
947
+ velocity direction/magnitude, blue → green indicates open-gripper → close-gripper. For Q values, red → yellow indicates low → high. The
948
+ LfGP policies and Q functions are reasonable for all tasks, while DAC has only learned to reach toward and above the green block.
949
+ snapshot policies for a single exploratory trajectory, using the
950
+ stochastic outputs of each policy as well as, for LfGP, the
951
+ WRS+HC scheduler. Trajectories from these runs are shown
952
+ in Fig. 9.
953
+ DAC is unable to learn to grasp or even reach the blue
954
+ block and ultimately settles on a policy that learns to reach
955
+ and hover near the green block. This is understandable—DAC
956
+ learns a deceptive reward for hovering above the green block
957
+ regardless of the position of the blue block, because it has not
958
+ sufficiently explored the alternative of first grasping the blue
959
+ block. Even if hovering above the green block does not fully
960
+ match the expert data, the DAC policy receives some reward
961
+ for doing so, as evidenced by the learned Q value on the right
962
+ side of Fig. 8.
963
+ In comparison, even after only 200k environment steps,
964
+ LfGP learns to reach and push the blue block, and by 600k
965
+ steps, grasp, move, and nearly stack it. By enforcing explo-
966
+ ration of sub-tasks that are crucial to completing the main task,
967
+ LfGP ensures that the distribution of expert stacking data is
968
+ fully matched.
969
+ VII. RELATED WORK
970
+ Imitation learning is often divided into two main categories:
971
+ behavioural cloning (BC) [23], [24] and inverse reinforcement
972
+ learning (IRL) [5], [25]. BC recovers the expert policy via
973
+ supervised learning, but it suffers from compounding errors
974
+ due to covariate shift [23], [26]. Alternatively, IRL partially
975
+ alleviates the covariate shift problem by estimating the reward
976
+ function and then applying RL using the learned reward.
977
+ A popular approach to IRL is adversarial imitation learning
978
+ (AIL) [6], [7], [27], in which the expert policy is recovered
979
+ by matching the occupancy measure between the generated
980
+ data and the demonstration data. Our proposed method en-
981
+ hances existing AIL algorithms by enabling exploration of
982
+ Fig. 9: LfGP and DAC trajectories of the gripper, blue block, and
983
+ green block for four stack episodes with consistent initial conditions
984
+ throughout the learning process. The LfGP episodes, each including
985
+ auxiliary task sub-trajectories, demonstrate significantly more variety
986
+ than the DAC trajectories.
987
+ key auxiliary tasks via the use of a scheduled multitask model,
988
+ simultaneously resolving the susceptibility of AIL to deceptive
989
+ rewards.
990
+ Agents learned via hierarchical reinforcement learning
991
+ (HRL), which act over multiple levels of temporal abstractions
992
+ in long planning horizon tasks, are shown to provide more
993
+ effective exploration than agents operating over only a single
994
+ level of abstraction [12], [28], [29]. Our approach for learning
995
+ agents most closely resembles hierarchical AIL methods that
996
+ attempt to combine AIL with HRL [27], [30]–[32]. Existing
997
+ work [30]–[32] often formulates the hierarchical agent using
998
+ the Options framework [28] and learns the reward function
999
+ with AIL [6]. Both [30] and [32] leverage task-specific expert
1000
+ demonstrations to learn options using mixture-of-experts and
1001
+ expectation-maximization strategies, respectively. In contrast,
1002
+ our work focuses on expert demonstrations that include multi-
1003
+ ple reusable auxiliary tasks, each of which has clear semantic
1004
+ meaning.
1005
+ In the multitask setting, [27] and [31] leverage unsegmented,
1006
+ multitask expert demonstrations to learn low-level policies via
1007
+ a latent variable model. Other work has used a large corpus
1008
+ of unsegmented but semantically meaningful “play” expert
1009
+ data to bootstrap policy learning [13], [14]. We define our
1010
+ expert dataset as being derived from guided play, in that the
1011
+ expert completes semantically meaningful auxiliary tasks with
1012
+ provided transitions, reducing the burden on the expert to
1013
+ generate these data arbitrarily and simultaneously providing
1014
+ auxiliary task labels. Compared with learning from unseg-
1015
+ mented demonstrations, the use of segmented demonstrations,
1016
+ as in [33], ensures that we know which auxiliary tasks our
1017
+ model will be learning, and opens up the possibility of expert
1018
+ data reuse and also transfer learning. Finally, we deviate from
1019
+ the Options framework and build upon Scheduled Auxiliary
1020
+ Control (SAC-X) to train our hierarchical agent, since SAC-
1021
+ X has been shown to work well for challenging manipulation
1022
+ tasks [12].
1023
+ VIII. LIMITATIONS
1024
+ Our approach is not without limitations. While we were
1025
+ able to use LfGP in six and seven-task settings, the number
1026
+ of tasks for which this method would become intractable is
1027
+ unclear. LfGP needs access to segmented expert data as well;
1028
+ in many cases, this is reasonable, and is also required to
1029
+ be able to reuse auxiliary task data between main tasks, but
1030
+ it does necessitate extra care during expert data collection.
1031
+ Also, LfGP requires pre-defined auxiliary tasks: while this is
1032
+ a common approach to hierarchical RL (see [34], Section 3.1,
1033
+ for numerous examples), choosing these tasks may sometimes
1034
+ present a challenge. Finally, compared with methods that use
1035
+ offline data exclusively (e.g., BC), for our tasks, LfGP requires
1036
+
1037
+ 200k
1038
+ 400k
1039
+ 600k
1040
+ 800k
1041
+ LfGP
1042
+ DAC8
1043
+ IEEE ROBOTICS AND AUTOMATION LETTERS. PREPRINT VERSION. ACCEPTED DEC, 2022
1044
+ many online environment steps to learn a high-quality policy.
1045
+ This data gathering could be costly if human supervision was
1046
+ necessary. It is worth noting that, because LfGP is already a
1047
+ multitask method, this final point could be partially resolved
1048
+ through the use of multitask reset-free RL [35].
1049
+ IX. CONCLUSION
1050
+ We have shown how adversarial imitation learning can fail
1051
+ at challenging manipulation tasks because it learns deceptive
1052
+ rewards. We demonstrated that this can be resolved with
1053
+ Learning from Guided Play (LfGP), in which we introduce
1054
+ auxiliary tasks and the corresponding expert data, guiding the
1055
+ agent to playfully explore parts of the state and action space
1056
+ that would have been avoided otherwise. We demonstrated that
1057
+ our method dramatically outperforms both BC and AIL base-
1058
+ lines, particularly in the case of AIL. Furthermore, our method
1059
+ can leverage reusable expert data, making it significantly more
1060
+ expert sample efficient than the highest-performing baseline,
1061
+ and its learned auxiliary task models can be applied to transfer
1062
+ learning. In future work, we intend to investigate transfer
1063
+ learning to determine if overall policy learning time can be
1064
+ reduced.
1065
+ ACKNOWLEDGEMENTS
1066
+ We gratefully acknowledge the Digital Research Alliance of
1067
+ Canada and NVIDIA Inc., who provided the GPUs used in this
1068
+ work through their Resources for Research Groups Program
1069
+ and their Hardware Grant Program, respectively.
1070
+ REFERENCES
1071
+ [1] R. S. Sutton and A. G. Barto, Reinforcement Learning: An Introduction,
1072
+ 2nd ed.
1073
+ MIT press, 2018.
1074
+ [2] M. Bellemare, S. Srinivasan, G. Ostrovski, T. Schaul, D. Saxton, and
1075
+ R. Munos, “Unifying Count-Based Exploration and Intrinsic Motiva-
1076
+ tion,” in Conf. Neural Inf. Processing Systems, vol. 29, Dec. 2016.
1077
+ [3] A. Nair, B. McGrew, M. Andrychowicz, W. Zaremba, and P. Abbeel,
1078
+ “Overcoming Exploration in Reinforcement Learning with Demon-
1079
+ strations,” in Proc. 2018 IEEE Int. Conf. Robotics and Automation
1080
+ (ICRA’18), Brisbane, Australia, May 2018, pp. 6292–6299.
1081
+ [4] A. Y. Ng and M. I. Jordan, “Shaping and policy search in reinforcement
1082
+ learning,” Ph.D. dissertation, University of California, Berkeley, 2003.
1083
+ [5] A. Ng and S. Russell, “Algorithms for inverse reinforcement learning,”
1084
+ in Int. Conf. Machine Learning (ICML’00), July 2000, pp. 663–670.
1085
+ [6] J. Ho and S. Ermon, “Generative Adversarial Imitation Learning,” in
1086
+ Conf. Neural Inf. Processing Systems, Barcelona, Spain, Dec. 5–11 2016,
1087
+ pp. 4565–4573.
1088
+ [7] I. Kostrikov, K. K. Agrawal, D. Dwibedi, S. Levine, and J. Tomp-
1089
+ son, “Discriminator-Actor-Critic: Addressing Sample Inefficiency and
1090
+ Reward Bias in Adversarial Imitation Learning,” in Proc. Int. Conf.
1091
+ Learning Representations (ICLR’19), New Orleans, USA, May 2019.
1092
+ [8] J. Fu, K. Luo, and S. Levine, “Learning Robust Rewards with Ad-
1093
+ verserial inverse Reinforcement Learning,” in Proc. Int. Conf. Learning
1094
+ Representations (ICLR’18), Vancouver, Canada, Apr. 30–May 3 2018.
1095
+ [9] M. Orsini, et al., “What Matters for Adversarial Imitation Learning?”
1096
+ in Conf. Neural Inf. Processing Systems, June 2021.
1097
+ [10] A. Ecoffet, J. Huizinga, J. Lehman, K. O. Stanley, and J. Clune, “First
1098
+ return, then explore,” Nature, vol. 590, no. 7847, pp. 580–586, Feb.
1099
+ 2021.
1100
+ [11] T. Ablett, B. Chan, and J. Kelly, “Learning from Guided Play: A
1101
+ Scheduled Hierarchical Approach for Improving Exploration in Ad-
1102
+ versarial Imitation Learning,” in Proc. Neural Inf. Processing Systems
1103
+ (NeurIPS’21) Deep Reinforcement Learning Workshop, Dec. 2021.
1104
+ [12] M. Riedmiller, et al., “Learning by Playing Solving Sparse Reward Tasks
1105
+ from Scratch,” in Proc. 35th Int. Conf. Machine Learning (ICML’18),
1106
+ Stockholm, Sweden, July 2018, pp. 4344–4353.
1107
+ [13] C. Lynch, et al., “Learning Latent Plans from Play,” in Conf. Robot
1108
+ Learning (CoRL’19), 2019.
1109
+ [14] A. Gupta, V. Kumar, C. Lynch, S. Levine, and K. Hausman, “Relay
1110
+ Policy Learning: Solving Long Horizon Tasks Via Imitation and Rein-
1111
+ forcement Learning,” in Conf. Robot Learning (CoRL’19), 2019.
1112
+ [15] T. Haarnoja, A. Zhou, P. Abbeel, and S. Levine, “Soft Actor-Critic:
1113
+ Off-Policy Maximum Entropy Deep Reinforcement Learning with a
1114
+ Stochastic Actor,” in Proc. 35th Int. Conf. Machine Learning (ICML’18),
1115
+ Stockholm, Sweden, July 2018, pp. 1861–1870.
1116
+ [16] M. Vecerik, et al., “Leveraging Demonstrations for Deep Reinforcement
1117
+ Learning on Robotics Problems with Sparse Rewards,” Oct. 2018.
1118
+ [17] D. Kalashnikov, et al., “QT-Opt: Scalable Deep Reinforcement Learning
1119
+ for Vision-Based Robotic Manipulation,” arXiv:1806.10293 [cs, stat],
1120
+ June 2018.
1121
+ [18] A. Mandlekar, et al., “What Matters in Learning from Offline Human
1122
+ Demonstrations for Robot Manipulation,” in Conf. Robot Learning, Nov.
1123
+ 2021.
1124
+ [19] L. Hussenot, et al., “Hyperparameter Selection for Imitation Learning,”
1125
+ in Proc. 38th Int. Conf. Machine Learning (ICML’21), July 2021, pp.
1126
+ 4511–4522.
1127
+ [20] J. Fu, A. Singh, D. Ghosh, L. Yang, and S. Levine, “Variational Inverse
1128
+ Control with Events: A General Framework for Data-Driven Reward
1129
+ Definition,” in Conf. Neural Inf. Processing Systems, Montreal, Canada,
1130
+ Dec. 2018.
1131
+ [21] S. Cabi, et al., “The Intentional Unintentional Agent: Learning to
1132
+ Solve Many Continuous Control Tasks Simultaneously,” in Conf. Robot
1133
+ Learning (CoRL’17), Mountain View, USA, Nov. 2017.
1134
+ [22] K. Zolna, et al., “Task-Relevant Adversarial Imitation Learning,” in
1135
+ Proc. 2020 Conf. Robot Learning, Oct. 2021, pp. 247–263.
1136
+ [23] S. Ross, G. J. Gordon, and D. Bagnell, “A Reduction of Imitation
1137
+ Learning and Structured Prediction to No-Regret Online Learning,” in
1138
+ Proc. 14th Int. Conf. Artificial Intelligence and Statistics (AISTATS’11),
1139
+ Fort Lauderdale, USA, Apr. 2011, pp. 627–635.
1140
+ [24] T. Ablett, Y. Zhai, and J. Kelly, “Seeing All the Angles: Learning
1141
+ Multiview Manipulation Policies for Contact-Rich Tasks from Demon-
1142
+ strations,” in Proc. IEEE/RSJ Int. Conf. Intelligent Robots and Systems
1143
+ (IROS’21), Prague, Czech Republic, Sep. 2021.
1144
+ [25] P. Abbeel and A. Y. Ng, “Apprenticeship learning via inverse reinforce-
1145
+ ment learning,” in Int. Conf. Machine Learning (ICML’04).
1146
+ Banff,
1147
+ Canada: ACM Press, 2004.
1148
+ [26] T. Ablett, F. Mari´c, and J. Kelly, “Fighting Failures with FIRE: Failure
1149
+ Identification to Reduce Expert Burden in Intervention-Based Learning,”
1150
+ arXiv:2007.00245 [cs], Aug. 2020.
1151
+ [27] K. Hausman, Y. Chebotar, S. Schaal, G. Sukhatme, and J. Lim, “Multi-
1152
+ Modal Imitation Learning from Unstructured Demonstrations using
1153
+ Generative Adversarial Nets,” in Conf. Neural Inf. Processing Systems,
1154
+ May 2017.
1155
+ [28] R. S. Sutton, D. Precup, and S. Singh, “Between MDPs and Semi-MDPs:
1156
+ A Framework for Temporal Abstraction in Reinforcement Learning,”
1157
+ Artificial Intelligence, vol. 112, no. 1-2, pp. 181–211, Aug. 1999.
1158
+ [29] O. Nachum, H. Tang, X. Lu, S. Gu, H. Lee, and S. Levine, “Why Does
1159
+ Hierarchy (Sometimes) Work So Well in Reinforcement Learning?” in
1160
+ Proc. Neural Inf. Processing Systems (NeurIPS’19) Deep Reinforcement
1161
+ Learning Workshop, Sep. 2019.
1162
+ [30] P. Henderson, W.-D. Chang, P.-L. Bacon, D. Meger, J. Pineau, and
1163
+ D. Precup, “OptionGAN: Learning Joint Reward-Policy Options Using
1164
+ Generative Adversarial Inverse Reinforcement Learning,” in Proc. AAAI
1165
+ Conf. Artificial Intelligence (AAAI’18), no. 1, Apr. 2018.
1166
+ [31] M. Sharma, A. Sharma, N. Rhinehart, and K. M. Kitani, “Directed-Info
1167
+ GAIL: Learning Hierarchical Policies from Unsegmented Demonstra-
1168
+ tions using Directed Information,” in Int. Conf. Learning Representations
1169
+ (ICLR’19), May 2019.
1170
+ [32] M. Jing, et al., “Adversarial Option-Aware Hierarchical Imitation Learn-
1171
+ ing,” in Proc. 38th Int. Conf. Machine Learning (ICML’21), July 2021,
1172
+ pp. 5097–5106.
1173
+ [33] F. Codevilla, M. M¨uller, A. L´opez, V. Koltun, and A. Dosovitskiy, “End-
1174
+ to-End Driving Via Conditional Imitation Learning,” in Proc. IEEE Int.
1175
+ Conf. Robotics and Automation (ICRA’18), Brisbane, Australia, May
1176
+ 21–25 2018, pp. 4693–4700.
1177
+ [34] S. Pateria, B. Subagdja, A.-h. Tan, and C. Quek, “Hierarchical Re-
1178
+ inforcement Learning: A Comprehensive Survey,” ACM Computing
1179
+ Surveys, vol. 54, no. 5, pp. 109:1–109:35, June 2021.
1180
+ [35] A. Gupta, et al., “Reset-Free Reinforcement Learning via Multi-Task
1181
+ Learning: Learning Dexterous Manipulation Behaviors without Human
1182
+ Intervention,” in Proc. 2021 IEEE Int. Conf. Robotics and Automation
1183
+ (ICRA’21), Apr. 2021.
1184
+
1185
+ ABLETT et al.: LEARNING FROM GUIDED PLAY
1186
+ 9
1187
+ APPENDIX A
1188
+ LEARNING FROM GUIDED PLAY ALGORITHM
1189
+ The complete pseudo-code is given in Algorithm 1. Our
1190
+ implementation builds on RL Sandbox [36], an open-source
1191
+ PyTorch [37] framework for RL algorithms. For learning
1192
+ the discriminators, we follow DAC and apply a gradient
1193
+ penalty for regularization [7], [38]. We optimize the intentions
1194
+ via the reparameterization trick [40]. As is commonly done
1195
+ in deep RL, we use the Clipped Double Q-Learning trick
1196
+ [41] to mitigate overestimation bias [42] and use a target
1197
+ network to mitigate learning instability [43] when training
1198
+ the policies and Q-functions. We also learn the temperature
1199
+ parameter αT separately for each task T (see Section 5 of [44]
1200
+ for more details on learning α). For Generative Adversarial
1201
+ Imitation Learning (GAIL), we use a common open-source
1202
+ PyTorch implementation [45]. The hyperparameters chosen for
1203
+ all methods are provided in Section G. Please see videos at
1204
+ papers.starslab.ca/lfgp for examples of what LfGP looks like
1205
+ in practice.
1206
+ Algorithm 1 Learning from Guided Play (LfGP)
1207
+ Input: Expert replay buffers BE
1208
+ main, BE
1209
+ 1 , . . . , BE
1210
+ K, scheduler
1211
+ period ξ, sample batch size N
1212
+ Parameters: Intentions πT with corresponding Q-functions
1213
+ QT and discriminators DT , and scheduler πS (e.g. with Q-
1214
+ table QS)
1215
+ 1: Initialize replay buffer B
1216
+ 2: for t = 1, . . . , do
1217
+ 3:
1218
+ # Interact with environment
1219
+ 4:
1220
+ For every ξ steps, select intention πT using πS
1221
+ 5:
1222
+ Select action at using πT
1223
+ 6:
1224
+ Execute action at and observe next state s′
1225
+ t
1226
+ 7:
1227
+ Store transition ⟨st, at, s′
1228
+ t⟩ in B
1229
+ 8:
1230
+ 9:
1231
+ # Update discriminator DT ′ for each task T ′
1232
+ 10:
1233
+ Sample {(si, ai)}N
1234
+ i=1 ∼ B
1235
+ 11:
1236
+ for each task T ′ do
1237
+ 12:
1238
+ Sample {(s′
1239
+ i, a′
1240
+ i)}B
1241
+ i=1 ∼ BE
1242
+ k
1243
+ 13:
1244
+ Update DT ′ following Eq. (1) using GAN + Gradient
1245
+ Penalty
1246
+ 14:
1247
+ end for
1248
+ 15:
1249
+ 16:
1250
+ # Update intentions πT ′ and Q-functions QT ′ for each
1251
+ task T ′
1252
+ 17:
1253
+ Sample {(si, ai)}N
1254
+ i=1 ∼ B
1255
+ 18:
1256
+ Compute reward DT ′(si, ai) for each task T ′
1257
+ 19:
1258
+ Update π and Q following Eq. (4) and Eq. (5)
1259
+ 20:
1260
+ 21:
1261
+ # Optional Update learned scheduler πS
1262
+ 22:
1263
+ if at the end of effective horizon then
1264
+ 23:
1265
+ Compute main task return GTmain using reward esti-
1266
+ mate from Dmain
1267
+ 24:
1268
+ Update πS
1269
+ (e.g. update Q-table QS
1270
+ following
1271
+ Eq. (A.3) and recompute Boltzmann distribution)
1272
+ 25:
1273
+ end if
1274
+ 26: end for
1275
+ A. Scheduler Details
1276
+ 1) Learning the Scheduler: As stated in our paper, our
1277
+ main experiments used a simple weighted random scheduler
1278
+ with handcrafted trajectories. In this section, we provide the
1279
+ details of our learned scheduler. Following [12], let H be the
1280
+ total number of possible intention switches within an episode
1281
+ and let each chosen intention execute for ξ timesteps. The
1282
+ H intention choices made within the episode are defined as
1283
+ T 0:H−1 =
1284
+
1285
+ T (0), . . . , T (H−1)�
1286
+ , where T (h) ∈ Tall. The main
1287
+ task’s return given chosen intentions is then defined as
1288
+ GTmain(T 0:H−1) =
1289
+ H−1
1290
+
1291
+ h=0
1292
+ (h+1)ξ−1
1293
+
1294
+ t=hξ
1295
+ γtRTmain(st, at),
1296
+ (A.1)
1297
+ where
1298
+ at
1299
+
1300
+ πT (h)(·|st)
1301
+ is
1302
+ the
1303
+ action
1304
+ taken
1305
+ at
1306
+ timestep
1307
+ t,
1308
+ sampled
1309
+ from
1310
+ the
1311
+ chosen
1312
+ intention
1313
+ T (h)
1314
+ in
1315
+ the
1316
+ hth
1317
+ scheduler
1318
+ period.
1319
+ We
1320
+ further
1321
+ define
1322
+ the
1323
+ Q-function
1324
+ for
1325
+ the
1326
+ scheduler
1327
+ as
1328
+ QS(T 0:h−1, T (h))
1329
+ =
1330
+ ET h:H−1∼P h:H−1
1331
+ S
1332
+
1333
+ GTmain(T h:H−1)|T 0:h−1�
1334
+ and represent the
1335
+ scheduler for the hth period as a softmax distribution P h
1336
+ S over
1337
+ {QS(T 0:h−1, Tmain), QS(T 0:h−1, T1), . . . , QS(T 0:h−1, TK)}.
1338
+ The scheduler maximizes the expected return of the main
1339
+ task following the scheduler:
1340
+ L(S) = ET (0)∼P 0
1341
+ S
1342
+
1343
+ QS(∅, T (0))
1344
+
1345
+ .
1346
+ (A.2)
1347
+ We use Monte Carlo returns to estimate QS, estimating the
1348
+ expected return using the exponential moving average:
1349
+ QS(T 0:h−1, T (h)) = (1 − φ)QS(T 0:h−1, T (h))
1350
+ +φ GTmain(T h:H),
1351
+ (A.3)
1352
+ where φ ∈ [0, 1] represents the amount of discounting on older
1353
+ returns and GTmain(T h:H) is the cumulative discounted return
1354
+ of the trajectory starting at timestep hξ.
1355
+ B. Weighted Random Scheduler Plus Handcrafted Trajectories
1356
+ As stated in our paper, the main experiments were com-
1357
+ pleted with the described weighted random scheduler (WRS)
1358
+ combined with some simple handcrafted trajectories (HC)
1359
+ that we expected to be beneficial for learning each of
1360
+ the main tasks. In this section, we provide further de-
1361
+ tails of these handcrafted scheduler trajectories. Given a
1362
+ chosen proportion hyperparameter (0.5 in our experiments),
1363
+ we randomly sampled full trajectories from the lists below
1364
+ at the beginning of training episodes, and otherwise sam-
1365
+ pled from the regular WRS. For all four tasks Main =
1366
+ {Stack, Unstack-Stack, Bring, Insert}, we provided the fol-
1367
+ lowing set of trajectories:
1368
+ 1) Reach, Lift, Main, Open-Gripper, Reach, Lift, Main,
1369
+ Open-Gripper.
1370
+ 2) Reach, Lift, Move-Object, Main, Open-Gripper, Reach,
1371
+ Lift, Move-Object.
1372
+ 3) Lift, Main, Open-Gripper, Lift, Main, Open-Gripper,
1373
+ Lift, Main.
1374
+ 4) Main, Open-Gripper, Main, Open-Gripper, Main, Open-
1375
+ Gripper, Main, Open-Gripper.
1376
+
1377
+ 10
1378
+ IEEE ROBOTICS AND AUTOMATION LETTERS. PREPRINT VERSION. ACCEPTED DEC, 2022
1379
+ TABLE II: The components used in our environment observations,
1380
+ common to all tasks. Grip finger position is a continuous value from
1381
+ 0 (closed) to 1 (open).
1382
+ Component
1383
+ Dim
1384
+ Unit
1385
+ Privileged?
1386
+ Extra info
1387
+ EE pos.
1388
+ 3
1389
+ m
1390
+ No
1391
+ rel. to base
1392
+ EE velocity
1393
+ 3
1394
+ m/s
1395
+ No
1396
+ rel. to base
1397
+ Grip finger pos.
1398
+ 6
1399
+ [0, 1]
1400
+ No
1401
+ current, last 2
1402
+ Block pos.
1403
+ 6
1404
+ m
1405
+ Yes
1406
+ both blocks
1407
+ Block rot.
1408
+ 8
1409
+ quat
1410
+ Yes
1411
+ both blocks
1412
+ Block trans vel.
1413
+ 6
1414
+ m/s
1415
+ Yes
1416
+ rel. to base
1417
+ Block rot vel.
1418
+ 6
1419
+ rad/s
1420
+ Yes
1421
+ rel. to base
1422
+ Block rel to EE
1423
+ 6
1424
+ m
1425
+ Yes
1426
+ both blocks
1427
+ Block rel to block
1428
+ 3
1429
+ m
1430
+ Yes
1431
+ in base frame
1432
+ Block rel to slot
1433
+ 6
1434
+ m
1435
+ Yes
1436
+ both blocks
1437
+ Force-torque
1438
+ 6
1439
+ N,Nm
1440
+ No
1441
+ at wrist
1442
+ Total
1443
+ 59
1444
+ 5) Move-Object, Main, Open-Gripper, Move-Object, Main,
1445
+ Open-Gripper, Move-Object, Main.
1446
+ For insert, in addition to the trajectories listed above, we added
1447
+ two more trajectories to specifically accommodate Bring as an
1448
+ auxiliary task:
1449
+ 1) Bring,
1450
+ Insert,
1451
+ Open-Gripper,
1452
+ Bring,
1453
+ Insert,
1454
+ Open-
1455
+ Gripper, Bring, Insert.
1456
+ 2) Reach, Lift, Bring, Insert, Open-Gripper, Reach, Lift,
1457
+ Bring.
1458
+ APPENDIX B
1459
+ ENVIRONMENT DETAILS
1460
+ Fig. 10: An image of our multitask environment immediately after a
1461
+ reset has been carried out.
1462
+ A screenshot of our environment, simulated in PyBullet
1463
+ [47], is shown in Fig. 10. We chose this environment because
1464
+ we desired tasks that a) have a large distribution of possible
1465
+ initial states, representative of manipulation in the real world,
1466
+ b) have a shared observation/action space with several other
1467
+ tasks, allowing the use of auxiliary tasks and transfer learning,
1468
+ and c) require a reasonably long horizon and significant use of
1469
+ contact to solve. The environment contains a tray with sloped
1470
+ edges (to keep the blocks within the reachable workspace of
1471
+ the end-effector), as well as a green and a blue block, each
1472
+ of which is 4 cm × 4 cm × 4 cm and has a mass of 100 g.
1473
+ The dimensions of the lower part of the tray, before reaching
1474
+ the sloped edges, are 30 cm × 30 cm. The dimensions of the
1475
+ ‘bring’ boundaries (shaded blue and green regions) are 8 cm
1476
+ × 8 cm, while the dimensions of the insertion slots, which
1477
+ are directly in the center of each shaded region, are 4.1 cm ×
1478
+ 4.1 cm × 1 cm. The boundaries for end-effector movement,
1479
+ relative to the tool center point that is directly between the
1480
+ gripper fingers, are a 30 cm × 30 cm × 14.5 cm box, where
1481
+ the bottom boundary is low enough to allow the gripper to
1482
+ interact with objects, but not to collide with the bottom of the
1483
+ tray.
1484
+ See Table II for a summary of our environment observations.
1485
+ In this work, we use privileged state information (e.g., block
1486
+ poses), but adapting our method to exclusively use image-
1487
+ based data is straightforward since we do not use hand-crafted
1488
+ reward functions as in [12].
1489
+ The environment movement actions are 3-DOF translational
1490
+ position changes, where the position change is relative to the
1491
+ current end-effector position. We leverage PyBullet’s built-in
1492
+ position-based inverse kinematics function to generate joint
1493
+ commands. Our actions also contain a fourth dimension that
1494
+ corresponds to actuating the gripper. To allow for the use
1495
+ of policy models with exclusively continuous outputs, this
1496
+ dimension accepts any real number, with any value greater
1497
+ than 0 commanding the gripper to open, and any number less
1498
+ than 0 commanding it to close. Actions are supplied at a rate
1499
+ of 20 Hz, and each training episode is limited to 18 seconds,
1500
+ corresponding to 360 time steps per episode. For play-based
1501
+ expert data collection, we also reset the environment manually
1502
+ every 360 time steps. Between episodes, block positions are
1503
+ randomized to any pose within the tray, and the end-effector
1504
+ is randomized to any position between 5 and 14.5 cm above
1505
+ the tray, within the earlier stated end-effector bounds, with
1506
+ the gripper fully opened. The only exception to these initial
1507
+ conditions is during expert data collection and agent training
1508
+ of the Unstack-Stack task: in this case, the green block is
1509
+ manually set to be on top of the blue block at the start of the
1510
+ episode.
1511
+ APPENDIX C
1512
+ PERFORMANCE RESULTS FOR AUXILIARY TASKS
1513
+ The performance results for all multitask methods and
1514
+ all auxiliary tasks are shown in Fig. 11. Multitask BC has
1515
+ gradually decreasing performance on many of the auxiliary
1516
+ tasks as the number of updates increases, which is consistent
1517
+ with mild overfitting. Intriguingly, however, multitask BC
1518
+ does achieve quite reasonable performance on many of the
1519
+ auxiliary tasks (such as Lift) without needing any of the extra
1520
+ environment interactions required by an online method such
1521
+ as LfGP or DAC. An interesting direction for future work is to
1522
+ determine whether pretraining via multitask BC could provide
1523
+
1524
+ ABLETT et al.: LEARNING FROM GUIDED PLAY
1525
+ 11
1526
+ 0.5
1527
+ 1.0
1528
+ 1.5
1529
+ 2.0
1530
+ 0.0
1531
+ 0.5
1532
+ 1.0
1533
+ Stack
1534
+ Stack
1535
+ 0.5
1536
+ 1.0
1537
+ 1.5
1538
+ 2.0
1539
+ 0.0
1540
+ 0.5
1541
+ 1.0
1542
+ Open
1543
+ 0.5
1544
+ 1.0
1545
+ 1.5
1546
+ 2.0
1547
+ 0.0
1548
+ 0.5
1549
+ 1.0
1550
+ Close
1551
+ 0.5
1552
+ 1.0
1553
+ 1.5
1554
+ 2.0
1555
+ 0.0
1556
+ 0.5
1557
+ 1.0
1558
+ Lift
1559
+ 0.5
1560
+ 1.0
1561
+ 1.5
1562
+ 2.0
1563
+ 0.0
1564
+ 0.5
1565
+ 1.0
1566
+ Reach
1567
+ 0.5
1568
+ 1.0
1569
+ 1.5
1570
+ 2.0
1571
+ 0.0
1572
+ 0.5
1573
+ 1.0
1574
+ Move
1575
+ 0.5
1576
+ 1.0
1577
+ 1.5
1578
+ 2.0
1579
+ 0.0
1580
+ 0.5
1581
+ 1.0
1582
+ Unstack-Stack
1583
+ Unstack-Stack
1584
+ 0.5
1585
+ 1.0
1586
+ 1.5
1587
+ 2.0
1588
+ 0.0
1589
+ 0.5
1590
+ 1.0
1591
+ Open
1592
+ 0.5
1593
+ 1.0
1594
+ 1.5
1595
+ 2.0
1596
+ 0.0
1597
+ 0.5
1598
+ 1.0
1599
+ Close
1600
+ 0.5
1601
+ 1.0
1602
+ 1.5
1603
+ 2.0
1604
+ 0.0
1605
+ 0.5
1606
+ 1.0
1607
+ Lift
1608
+ 0.5
1609
+ 1.0
1610
+ 1.5
1611
+ 2.0
1612
+ 0.0
1613
+ 0.5
1614
+ 1.0
1615
+ Reach
1616
+ 0.5
1617
+ 1.0
1618
+ 1.5
1619
+ 2.0
1620
+ 0.0
1621
+ 0.5
1622
+ 1.0
1623
+ Move
1624
+ 0.5
1625
+ 1.0
1626
+ 1.5
1627
+ 2.0
1628
+ 0.0
1629
+ 0.5
1630
+ 1.0
1631
+ Bring
1632
+ Bring
1633
+ 0.5
1634
+ 1.0
1635
+ 1.5
1636
+ 2.0
1637
+ 0.0
1638
+ 0.5
1639
+ 1.0
1640
+ Open
1641
+ 0.5
1642
+ 1.0
1643
+ 1.5
1644
+ 2.0
1645
+ 0.0
1646
+ 0.5
1647
+ 1.0
1648
+ Close
1649
+ 0.5
1650
+ 1.0
1651
+ 1.5
1652
+ 2.0
1653
+ 0.0
1654
+ 0.5
1655
+ 1.0
1656
+ Lift
1657
+ 0.5
1658
+ 1.0
1659
+ 1.5
1660
+ 2.0
1661
+ 0.0
1662
+ 0.5
1663
+ 1.0
1664
+ Reach
1665
+ 0.5
1666
+ 1.0
1667
+ 1.5
1668
+ 2.0
1669
+ 0.0
1670
+ 0.5
1671
+ 1.0
1672
+ Move
1673
+ 1
1674
+ 2
1675
+ 3
1676
+ 4
1677
+ 0.0
1678
+ 0.5
1679
+ 1.0
1680
+ Insert
1681
+ Insert
1682
+ 1
1683
+ 2
1684
+ 3
1685
+ 4
1686
+ 0.0
1687
+ 0.5
1688
+ 1.0
1689
+ Open
1690
+ 1
1691
+ 2
1692
+ 3
1693
+ 4
1694
+ 0.0
1695
+ 0.5
1696
+ 1.0
1697
+ Close
1698
+ 1
1699
+ 2
1700
+ 3
1701
+ 4
1702
+ 0.0
1703
+ 0.5
1704
+ 1.0
1705
+ Bring
1706
+ 1
1707
+ 2
1708
+ 3
1709
+ 4
1710
+ 0.0
1711
+ 0.5
1712
+ 1.0
1713
+ Lift
1714
+ 1
1715
+ 2
1716
+ 3
1717
+ 4
1718
+ 0.0
1719
+ 0.5
1720
+ 1.0
1721
+ Reach
1722
+ 1
1723
+ 2
1724
+ 3
1725
+ 4
1726
+ 0.0
1727
+ 0.5
1728
+ 1.0
1729
+ Move
1730
+ 0.0
1731
+ 0.2
1732
+ 0.4
1733
+ 0.6
1734
+ 0.8
1735
+ 1.0
1736
+ Updates/steps (millions)
1737
+ 0.0
1738
+ 0.2
1739
+ 0.4
1740
+ 0.6
1741
+ 0.8
1742
+ 1.0
1743
+ Success Rate
1744
+ LfGP (multi)
1745
+ BC (multi)
1746
+ DAC (single)
1747
+ BC (single)
1748
+ Fig. 11: Performance for LfGP and the multitask baselines across all tasks, shaded area corresponds to standard deviation.
1749
+ any improvements in environment sample efficiency. We did
1750
+ attempt to do this, but found that it resulted in poorer final
1751
+ performance than training from scratch.
1752
+ APPENDIX D
1753
+ PROCEDURE FOR OBTAINING EXPERTS
1754
+ As stated, we used SAC-X [12] to train models that we
1755
+ used for generating expert data. We used the same hyperpa-
1756
+ rameters that we used for LfGP (see Table III), apart from
1757
+ the discriminator, which, of course, does not exist in SAC-X.
1758
+ See Section E for details on the hand-crafted rewards that we
1759
+ used for training these models. For an example of gathering
1760
+ play-based expert data, please see our attached video.
1761
+ We made two modifications to regular SAC-X to speed up
1762
+ learning. First, we pre-trained a Move-Object model before
1763
+ transferring this model to each of our main tasks, as we did
1764
+ in Section 5.3 of our main paper, since we found that SAC-X
1765
+ would plateau when we tried to learn the more challenging
1766
+ tasks from scratch. The need for this modification demon-
1767
+ strates another noteworthy benefit of LfGP—when training
1768
+ LfGP, main tasks could be learned from scratch, and generally
1769
+ in fewer time steps, than it took to train our experts. Second,
1770
+ during transfer to the main tasks, we used what we called a
1771
+ conditional weighted scheduler instead of a Q-Table: we de-
1772
+ fined weights for every combination of tasks, so that the sched-
1773
+ uler would pick each task with probability P(T (h)|T (h−1)),
1774
+ ensuring that ∀T ′ ∈ Tall, �
1775
+ T ∈Tall P(T |T ′) = 1. The weights
1776
+ that we used were fairly consistent between main tasks, and
1777
+ can be found in our packaged code. The conditional weighted
1778
+ scheduler ensured that every task was still explored throughout
1779
+ the learning process, so that we would have high-quality
1780
+ experts for every auxiliary task in addition to the main task.
1781
+ This scheduler can be considered as a more complex alter-
1782
+ native to the weighted random scheduler or the addition with
1783
+ handcrafted trajectories from our main paper, and again shows
1784
+ the flexibility of using a semantically-meaningful multitask
1785
+ policy with a common observation and action space.
1786
+ APPENDIX E
1787
+ EVALUATION
1788
+ As stated in our paper, we evaluated all algorithms by
1789
+ testing the mean output of the main task policy head in
1790
+ our environment and determining a success rate based on 50
1791
+ randomly selected resets. These evaluation episodes were run
1792
+ for 360 time steps to match our training process, and if a
1793
+ condition for success was met within that time, they were
1794
+ recorded as a success. The rest of this section describes in
1795
+ detail how we evaluated ‘success’ for each of our main and
1796
+ auxiliary tasks.
1797
+ As previously stated, we trained experts using a modified
1798
+ SAC-X [12] that required us to define a set of reward functions
1799
+ for each task, which we include in this section. The authors
1800
+ of [12] focused on sparse rewards but also showed a few
1801
+ experiments in which dense rewards reduced the time to learn
1802
+ adequate policies, so we chose to use dense rewards. We note
1803
+ that many of these reward functions are particularly com-
1804
+ plex and required significant manual shaping effort, further
1805
+ motivating the use of an imitation learning scheme like the
1806
+ one presented in our paper. It is possible that we could have
1807
+ made do with sparse rewards, such as those used in [12], but
1808
+ our compute resources made this impractical—for example,
1809
+ in [12], their agent took 5000 episodes × 36 actors × 360
1810
+ time steps = 64.8 M time steps to learn their stacking task,
1811
+ which would have taken over a month of wall clock time on
1812
+ our fastest machine. To see the specific values used for the
1813
+ rewards and success conditions described in these sections,
1814
+ please review our code.
1815
+ Unless otherwise stated, each of the success conditions in
1816
+ this section had to be held for 10 time steps, or 0.5 seconds,
1817
+ before being registered as a success. This choice was made
1818
+ to prevent registering a success when, for example, the blue
1819
+ block slipped off the green block during the Stack task.
1820
+
1821
+ 12
1822
+ IEEE ROBOTICS AND AUTOMATION LETTERS. PREPRINT VERSION. ACCEPTED DEC, 2022
1823
+ A. Common
1824
+ For each of these functions, we use the following common
1825
+ labels:
1826
+ • pb: blue block position,
1827
+ • vb: blue block velocity,
1828
+ • ab: blue block acceleration,
1829
+ • pg: green block position,
1830
+ • pe: end-effector tool center point position (TCP),
1831
+ • ps: center of a block pushed into one of the slots,
1832
+ • g1: (scalar) gripper finger 1 position,
1833
+ • g2: (scalar) gripper finger 2 position, and
1834
+ • ag: (scalar) gripper open/close action.
1835
+ A block is flat on the tray when pb,z = 0 or pg,z = 0. To
1836
+ further reduce training time for SAC-X experts, all rewards
1837
+ were set to 0 if ∥pb −pe∥ > 0.1 and ∥pg −pe∥ > 0.1 (i.e., the
1838
+ TCP must be within 10 cm of either block). During training
1839
+ while using the Unstack-Stack variation of our environment,
1840
+ a penalty of -0.1 was added to each reward if ∥pg,z∥ > 0.001
1841
+ (i.e., there was a penalty to all rewards if the green block was
1842
+ not flat on the tray).
1843
+ B. Stack/Unstack-Stack
1844
+ The evaluation conditions for Stack and Unstack-Stack are
1845
+ identical, but in our Unstack-Stack experiments, the environ-
1846
+ ment is manually set to have the green block start on top of
1847
+ the blue block.
1848
+ 1) Success: Using internal PyBullet commands, we check
1849
+ to see whether the blue block is in contact with the green
1850
+ block and is not in contact with either the tray or the gripper.
1851
+ 2) Reward: We include a term for checking the distance
1852
+ between the blue block and the spot above the the green block,
1853
+ a term for rewarding increasing distance between the block and
1854
+ the TCP once the block is stacked, a term for shaping lifting
1855
+ behaviour, a term to reward closing the gripper when the block
1856
+ is within a tight reaching tolerance, and a term for rewarding
1857
+ the opening the gripper once the block is stacked.
1858
+ C. Bring/Insert
1859
+ We use the same success and reward calculations for Bring
1860
+ and Insert, but for Bring the threshold for success is 3 cm,
1861
+ and for insert, it is 2.5 mm.
1862
+ 1) Success: We check that the distance between pb and
1863
+ ps is less than the defined threshold, that the blue block is
1864
+ touching the tray, and that the end-effector is not touching the
1865
+ block. For Insert, the block can only be within 2.5 mm of the
1866
+ insertion target if it is correctly inserted.
1867
+ 2) Reward: We include a term for checking the distance
1868
+ between the pb and ps and a term for rewarding increas-
1869
+ ing distance between pb and pe once the blue block is
1870
+ brought/inserted.
1871
+ D. Open-Gripper/Close-Gripper
1872
+ We use the same success and reward calculations for Open-
1873
+ Gripper and Close-Gripper, apart from inverting the condition.
1874
+ 1) Success: For Open-Gripper and Close-Gripper, we check
1875
+ to see if ag < 0 or ag > 0 respectively.
1876
+ 2) Reward: We include a term for checking the action, as
1877
+ we do in the success condition, and also include a shaping term
1878
+ that discourages high magnitudes of the movement action.
1879
+ E. Lift
1880
+ 1) Success: We check to see if pb,z > 0.06.
1881
+ 2) Reward: We add a dense reward for checking the height
1882
+ of the block, but specifically also check that the gripper
1883
+ positions correspond to being closed around the block, so that
1884
+ the block does not simply get pushed up the edges of the tray.
1885
+ We also include a shaping term for encouraging the gripper
1886
+ to close when the block is reached.
1887
+ F. Reach
1888
+ 1) Success: We check to see if ∥pe − pb∥ < 0.015.
1889
+ 2) Reward: We have a single dense term to check the
1890
+ distance between pe and pb.
1891
+ G. Move-Object
1892
+ For Move-Object, we changed the required holding time for
1893
+ success to 1 second, or 20 time steps.
1894
+ 1) Success: We check to see if the vb > 0.05 and ab < 5.
1895
+ The acceleration condition ensures that the arm has learned to
1896
+ move the block by following a smooth trajectory, rather than
1897
+ vigorously shaking it or continuously picking up and dropping
1898
+ it.
1899
+ 2) Reward: We include a velocity term and an acceleration
1900
+ penalty, as in the success condition, but also include a dense
1901
+ bonus for lifting the block.
1902
+ APPENDIX F
1903
+ RETURN PLOTS
1904
+ As previously stated, we generated hand-crafted reward
1905
+ functions for each of our tasks for the purpose of training
1906
+ our SAC-X experts. Given that we have these rewards, we
1907
+ can also generate return plots corresponding to our results
1908
+ to add extra insight (see Fig. 12 and Fig. 13). The patterns
1909
+ displayed in these plots are, for the most part, quite similar
1910
+ to the success rate plots. One notable exception is that there
1911
+ is an eventual increase in performance when training DAC on
1912
+ Insert, indicating that, perhaps for certain tasks, DAC alone
1913
+ can eventually make progress. Nevertheless, it is clear that
1914
+ LfGP improves learning efficiency, and it is unclear whether
1915
+ DAC would plateau even if it was trained for a longer period.
1916
+ APPENDIX G
1917
+ MODEL ARCHITECTURES AND HYPERPARAMETERS
1918
+ All the single-task models share the same network architec-
1919
+ tures and all the multitask models share the same network
1920
+ architectures. All layers are initialized using the PyTorch
1921
+ default methods [37].
1922
+ For the single-task variant, the policy is a fully-connected
1923
+ network with two hidden layers followed by ReLU activation.
1924
+ Each hidden layer consists of 256 hidden units. The output of
1925
+ the policy for LfGP and DAC is split into two vectors, mean
1926
+ ˆµ and variance ˆσ2. For both variants of BC, only the mean ˆµ
1927
+
1928
+ ABLETT et al.: LEARNING FROM GUIDED PLAY
1929
+ 13
1930
+ 0.5
1931
+ 1.0
1932
+ 1.5
1933
+ 2.0
1934
+ 0
1935
+ 200
1936
+ 400
1937
+ 600
1938
+ Stack
1939
+ 0.5
1940
+ 1.0
1941
+ 1.5
1942
+ 2.0
1943
+ 0
1944
+ 200
1945
+ 400
1946
+ 600
1947
+ 800
1948
+ 1000
1949
+ Unstack-Stack
1950
+ 0.5
1951
+ 1.0
1952
+ 1.5
1953
+ 2.0
1954
+ 0
1955
+ 100
1956
+ 200
1957
+ 300
1958
+ 400
1959
+ 500
1960
+ Bring
1961
+ 0
1962
+ 1
1963
+ 2
1964
+ 3
1965
+ 4
1966
+ 100
1967
+ 200
1968
+ 300
1969
+ 400
1970
+ 500
1971
+ Insert
1972
+ 0.0
1973
+ 0.2
1974
+ 0.4
1975
+ 0.6
1976
+ 0.8
1977
+ 1.0
1978
+ Updates/steps (millions)
1979
+ 0.0
1980
+ 0.2
1981
+ 0.4
1982
+ 0.6
1983
+ 0.8
1984
+ 1.0
1985
+ Episode Return
1986
+ LfGP (multi)
1987
+ BC (multi)
1988
+ DAC (single)
1989
+ BC (single)
1990
+ Expert
1991
+ Fig. 12: Episode return for LfGP compared with all baselines. Shaded area corresponds to standard deviation.
1992
+ 0.5
1993
+ 1.0
1994
+ 1.5
1995
+ 2.0
1996
+ 0
1997
+ 200
1998
+ 400
1999
+ 600
2000
+ Stack
2001
+ Stack
2002
+ 0.5
2003
+ 1.0
2004
+ 1.5
2005
+ 2.0
2006
+ 200
2007
+ 250
2008
+ 300
2009
+ Open
2010
+ 0.5
2011
+ 1.0
2012
+ 1.5
2013
+ 2.0
2014
+ 100
2015
+ 150
2016
+ 200
2017
+ 250
2018
+ 300
2019
+ Close
2020
+ 0.5
2021
+ 1.0
2022
+ 1.5
2023
+ 2.0
2024
+ 0
2025
+ 200
2026
+ 400
2027
+ Lift
2028
+ 0.5
2029
+ 1.0
2030
+ 1.5
2031
+ 2.0
2032
+ 100
2033
+ 150
2034
+ 200
2035
+ 250
2036
+ 300
2037
+ Reach
2038
+ 0.5
2039
+ 1.0
2040
+ 1.5
2041
+ 2.0
2042
+ 0
2043
+ 200
2044
+ 400
2045
+ Move
2046
+ 0.5
2047
+ 1.0
2048
+ 1.5
2049
+ 2.0
2050
+ 0
2051
+ 200
2052
+ 400
2053
+ 600
2054
+ 800
2055
+ Unstack-Stack
2056
+ Unstack-Stack
2057
+ 0.5
2058
+ 1.0
2059
+ 1.5
2060
+ 2.0
2061
+ 200
2062
+ 250
2063
+ 300
2064
+ Open
2065
+ 0.5
2066
+ 1.0
2067
+ 1.5
2068
+ 2.0
2069
+ 150
2070
+ 200
2071
+ 250
2072
+ 300
2073
+ Close
2074
+ 0.5
2075
+ 1.0
2076
+ 1.5
2077
+ 2.0
2078
+ 0
2079
+ 200
2080
+ 400
2081
+ Lift
2082
+ 0.5
2083
+ 1.0
2084
+ 1.5
2085
+ 2.0
2086
+ 0
2087
+ 100
2088
+ 200
2089
+ Reach
2090
+ 0.5
2091
+ 1.0
2092
+ 1.5
2093
+ 2.0
2094
+ 0
2095
+ 200
2096
+ 400
2097
+ Move
2098
+ 0.5
2099
+ 1.0
2100
+ 1.5
2101
+ 2.0
2102
+ 0
2103
+ 100
2104
+ 200
2105
+ 300
2106
+ 400
2107
+ Bring
2108
+ Bring
2109
+ 0.5
2110
+ 1.0
2111
+ 1.5
2112
+ 2.0
2113
+ 200
2114
+ 250
2115
+ 300
2116
+ Open
2117
+ 0.5
2118
+ 1.0
2119
+ 1.5
2120
+ 2.0
2121
+ 100
2122
+ 200
2123
+ 300
2124
+ Close
2125
+ 0.5
2126
+ 1.0
2127
+ 1.5
2128
+ 2.0
2129
+ 0
2130
+ 200
2131
+ 400
2132
+ Lift
2133
+ 0.5
2134
+ 1.0
2135
+ 1.5
2136
+ 2.0
2137
+ 100
2138
+ 200
2139
+ 300
2140
+ Reach
2141
+ 0.5
2142
+ 1.0
2143
+ 1.5
2144
+ 2.0
2145
+ 0
2146
+ 200
2147
+ 400
2148
+ Move
2149
+ 1
2150
+ 2
2151
+ 3
2152
+ 4
2153
+ 200
2154
+ 400
2155
+ Insert
2156
+ Insert
2157
+ 1
2158
+ 2
2159
+ 3
2160
+ 4
2161
+ 250
2162
+ 275
2163
+ 300
2164
+ 325
2165
+ Open
2166
+ 1
2167
+ 2
2168
+ 3
2169
+ 4
2170
+ 100
2171
+ 200
2172
+ 300
2173
+ Close
2174
+ 1
2175
+ 2
2176
+ 3
2177
+ 4
2178
+ 100
2179
+ 200
2180
+ 300
2181
+ 400
2182
+ 500
2183
+ Bring
2184
+ 1
2185
+ 2
2186
+ 3
2187
+ 4
2188
+ 0
2189
+ 200
2190
+ 400
2191
+ Lift
2192
+ 1
2193
+ 2
2194
+ 3
2195
+ 4
2196
+ 0
2197
+ 100
2198
+ 200
2199
+ 300
2200
+ Reach
2201
+ 1
2202
+ 2
2203
+ 3
2204
+ 4
2205
+ 0
2206
+ 200
2207
+ 400
2208
+ Move
2209
+ 0.0
2210
+ 0.2
2211
+ 0.4
2212
+ 0.6
2213
+ 0.8
2214
+ 1.0
2215
+ Updates/steps (millions)
2216
+ 0.0
2217
+ 0.2
2218
+ 0.4
2219
+ 0.6
2220
+ 0.8
2221
+ 1.0
2222
+ Episode Return
2223
+ LfGP (multi)
2224
+ BC (multi)
2225
+ DAC (single)
2226
+ BC (single)
2227
+ Fig. 13: Episode return for LfGP compared with multitask baselines on all tasks. Shaded area corresponds to standard deviation.
2228
+ output is used. The vectors define a Gaussian distribution (i.e.
2229
+ N(ˆµ, ˆσ2I), where I is the identity matrix). When computing
2230
+ actions, we squash the samples using the tanh function and
2231
+ bound the actions to be in range [−1, 1], as done in SAC
2232
+ [44]. The variance ˆσ2 is computed by applying a softplus
2233
+ function followed by a sum with an epsilon ϵ = 1e-7 to
2234
+ prevent underflow: ˆσi = softplus(ˆxi) + ϵ. The Q-functions
2235
+ are fully-connected networks with two hidden layers followed
2236
+ by ReLU activations. Each hidden layer consists of 256 units.
2237
+ The output of the Q-function is a scalar corresponding to the
2238
+ value estimate given the current state-action pair. Finally, the
2239
+ discriminator is a fully-connected network with two hidden
2240
+ layers followed by tanh activations. Each hidden layer consists
2241
+ of 256 units. The output of the discriminator is a scalar logit
2242
+ to be used as an input to the sigmoid function. The sigmoid
2243
+ function output can be viewed as the probability of the current
2244
+ state-action pair coming from the expert distribution.
2245
+ For multitask variant, the policies and the Q-functions share
2246
+ their initial layers. There are two shared, fully-connected
2247
+ layers followed by ReLU activations. Each layer consists of
2248
+ 256 units. The output of the last shared layer is then fed into
2249
+ the policies and Q-functions. Each policy head and Q-function
2250
+ head corresponds to one task and has the same architecture:
2251
+ a two-layered fully-connected network followed by ReLU
2252
+ activations. The output of the policy head corresponds to the
2253
+ parameters of a Gaussian distribution, as described previously.
2254
+ Similarly, the output of the Q-function head corresponds to the
2255
+ value estimate. Finally, the discriminator is a fully-connected
2256
+ network with two hidden layers followed by tanh activations.
2257
+ Each hidden layer consists of 256 units. The output of the
2258
+ discriminator is a vector, where the ith entry corresponds to
2259
+ the logit input to the sigmoid function for task Ti. The ith
2260
+ sigmoid function output corresponds to the probability of the
2261
+ current state-action pair coming from the expert distribution
2262
+ in task Ti.
2263
+ The hyperparameters for our experiments are listed in
2264
+ Table III and Table V. In the early-stopping variant of BC,
2265
+ overfit tolerance refers to the number of full dataset training
2266
+ epochs without an improvement in validation error before we
2267
+ stop training. All models are optimized using Adam Optimizer
2268
+ [48] with PyTorch default values, unless specified otherwise.
2269
+ APPENDIX H
2270
+ OPEN-ACTION AND CLOSE-ACTION
2271
+
2272
+ 14
2273
+ IEEE ROBOTICS AND AUTOMATION LETTERS. PREPRINT VERSION. ACCEPTED DEC, 2022
2274
+ TABLE III: Hyperparameters for AIL algorithms across all tasks.
2275
+ Parameters that do not appear in the original version of DAC are
2276
+ shown in blue.
2277
+ Algorithm
2278
+ LfGP
2279
+ DAC
2280
+ Total Interactions
2281
+ 2M (4M for Insert)
2282
+ Buffer Size
2283
+ 2M (4M for Insert)
2284
+ Buffer Warmup
2285
+ 25k
2286
+ Initial Exploration
2287
+ 50k
2288
+ Evaluations per task
2289
+ 50
2290
+ Evaluation frequency
2291
+ 100k interactions
2292
+ Intention
2293
+ γ
2294
+ 0.99
2295
+ Batch Size
2296
+ 256
2297
+ Q Update Freq.
2298
+ 1
2299
+ Target Q Update Freq.
2300
+ 1
2301
+ π Update Freq.
2302
+ 1
2303
+ Polyak Averaging
2304
+ 1e-4
2305
+ Q Learning Rate
2306
+ 3e-4
2307
+ π Learning Rate
2308
+ 1e-5
2309
+ α Learning Rate
2310
+ 3e-4
2311
+ Initial α
2312
+ 1e-2
2313
+ Target Entropy
2314
+ −dim(a) = −4
2315
+ Max. Gradient Norm
2316
+ 10
2317
+ π Weight Decay
2318
+ 1e-2
2319
+ Q Weight Decay
2320
+ 1e-2
2321
+ BE sampling proportion
2322
+ 0.1
2323
+ BE sampling decay
2324
+ 0.99999
2325
+ Discriminator
2326
+ Learning Rate
2327
+ 3e-4
2328
+ Batch Size
2329
+ 256
2330
+ Gradient Penalty λ
2331
+ 10
2332
+ Weight Decay
2333
+ 1e-2
2334
+ (sT , 0) sampling bias
2335
+ 0.95
2336
+ TABLE IV: Hyperparameters for LfGP schedulers.
2337
+ Scheduler
2338
+ Learned
2339
+ WRS
2340
+ WRS + HC
2341
+ ξ
2342
+ 45
2343
+ N/A
2344
+ N/A
2345
+ φ
2346
+ 0.6
2347
+ N/A
2348
+ N/A
2349
+ Initial Temp.
2350
+ 360
2351
+ N/A
2352
+ N/A
2353
+ Temp. Decay
2354
+ 0.9995
2355
+ N/A
2356
+ N/A
2357
+ Min. Temp.
2358
+ 0.1
2359
+ N/A
2360
+ N/A
2361
+ Main Task Rate
2362
+ N/A
2363
+ 0.5
2364
+ 0.5
2365
+ Handcraft Rate
2366
+ N/A
2367
+ N/A
2368
+ 0.5
2369
+ DISTRIBUTION MATCHING
2370
+ There was one exception to the method we used for col-
2371
+ lecting our expert data. Specifically, our Open-Gripper and
2372
+ Close-Gripper tasks required additional considerations. It is
2373
+ worth reminding the reader that our Open-Gripper and Close-
2374
+ Gripper tasks were meant to simply open or close the gripper,
2375
+ respectively, while remaining reasonably close to either block.
2376
+ If we were to use the approach described above verbatim,
2377
+ the Open-Gripper and Close-Gripper data would contain no
2378
+ (s, a) pairs where the gripper actually released or grasped
2379
+ the block, instead immediately opening or closing the gripper
2380
+ while simply hovering near the blocks. Perhaps unsurprisingly,
2381
+ this was detrimental to our algorithm’s performance: as one
2382
+ example, an agent attempting to learn Stack would, if Open-
2383
+ Gripper was selected while the blue block was held above
2384
+ TABLE V: Hyperparameters for BC algorithms (both single-task and
2385
+ multitask) across all tasks.
2386
+ Version
2387
+ Main Results
2388
+ Early Stopping
2389
+ Batch Size
2390
+ 256
2391
+ Learning Rate
2392
+ 1e-5
2393
+ Weight Decay
2394
+ 1e-2
2395
+ Total Updates
2396
+ 2M (4M for Insert)
2397
+ N/A
2398
+ Overfit Tolerance
2399
+ N/A
2400
+ 100
2401
+ the green block, move the grasped blue block away from the
2402
+ green block before dropping it on the tray. This behaviour, of
2403
+ course, is not what we would want, but it better matches an
2404
+ expert distribution when the environment is reset in between
2405
+ each task execution.
2406
+ To mitigate this, our Open-Gripper data actually contain a
2407
+ mix of each of the other sub-tasks called for the first 45 time
2408
+ steps, followed by a switch to Open-Gripper, ensuring that
2409
+ the expert dataset contains some degree of block-releasing,
2410
+ with the trade-off being that 50% of the Open-Gripper expert
2411
+ data is specific to whatever the main task happens to be. We
2412
+ left this additional detail out of our main paper for clarity,
2413
+ since it corresponds to only a small portion of the expert
2414
+ data (every other auxiliary task was fully reused). Similarly,
2415
+ the Close-Gripper data calls Lift for 15 time steps before
2416
+ switching to Close-Gripper, ensuring that the Close-gripper
2417
+ dataset will contain a large proportion of data where the block
2418
+ is actually grasped. For the Closer-gripper data, however, this
2419
+ modification did still allow data to be reused between main
2420
+ tasks.
2421
+ APPENDIX I
2422
+ ATTEMPTED AND FAILED EXPERIMENTS
2423
+ In this section, we provide a list of experiments and modi-
2424
+ fications that did not improve performance, in addition to the
2425
+ alternatives that did.
2426
+ 1) Pretraining with BC: We attempted to pretrain LfGP
2427
+ using multitask BC, and then to transition to online
2428
+ learning with LfGP, but we found that this tended to
2429
+ produce significantly poorer final performance. Some
2430
+ existing work [49], [50] has investigated transitioning
2431
+ from BC to online RL, but achieving this consistently,
2432
+ especially with off-policy RL, remains an open research
2433
+ problem.
2434
+ 2) Handcrafted Open-Gripper/Close-Gripper policies:
2435
+ Given the simplicity of designing a reward function in
2436
+ these two cases, a natural question is whether Open-
2437
+ Gripper and Close-Gripper could use hand-crafted re-
2438
+ ward functions, or even hand-crafted policies, instead of
2439
+ these specialized datasets. In our experiments, both of
2440
+ these alternatives proved to be quite detrimental to our
2441
+ algorithm.
2442
+ 3) Penalizing Q values: In our early experiments, we
2443
+ found that LfGP training progress was harmed by ex-
2444
+ ploding Q values. This problem was particularly exac-
2445
+ erbated when we added BE sampling to our Q and π
2446
+ updates. It appears that this occurs because, at the begin-
2447
+ ning of training, the differences between discriminator
2448
+
2449
+ ABLETT et al.: LEARNING FROM GUIDED PLAY
2450
+ 15
2451
+ outputs for expert data and non-expert data are so large
2452
+ that the bootstrap Q updates quickly jump to unrealistic
2453
+ values. We attempted to use various forms of Q penalties
2454
+ to resolve this, akin to Conservative Q Learning (CQL)
2455
+ [51], but found that all of our modifications ultimately
2456
+ harmed final performance. Some of the things we tried,
2457
+ in addition to the CQL loss, were reducing γ (.95, .9),
2458
+ clipping Q losses to -5, +5, smooth L1 loss, huber loss,
2459
+ increased gradient penalty λ for D (50, 100), decreased
2460
+ reward scaling (.1), more discriminator updates per π/Q
2461
+ update (10), and weight decay in D only (as is done
2462
+ in [9]). We ultimately resolved exploding Q values by
2463
+ i) decreasing polyak averaging to a significantly lower
2464
+ value than is used in much other work (1e-4 as opposed
2465
+ to the SAC default of 5e-3), and ii) adding in weight
2466
+ decay (with a significantly higher value used than is
2467
+ used in other work) to π, Q, and D training (which was
2468
+ required to not overfit with the reduced polyak averaging
2469
+ value). Without the added weight decay, performance
2470
+ started to plateau and eventually to decrease.
2471
+ 4) Higher Update-to-Data (UTD) Ratio: Recent work in
2472
+ RL has started increasing the UTD ratio (i.e., increas-
2473
+ ing the number of policy/Q updates per environment
2474
+ interaction), with the goal of improving environment
2475
+ sample efficiency [53]. We were actually able to increase
2476
+ this from 1 to 2 and achieve a marginal improvement
2477
+ in environment sample efficiency, but this also nearly
2478
+ doubled the running time of our experiments, so we
2479
+ opted not to include this modification in our final results.
2480
+ Higher values of the UTD ratio also caused our Q values
2481
+ to explode.
2482
+ APPENDIX J
2483
+ EXPERIMENTAL HARDWARE
2484
+ For a list of the software we used in this work, see our code
2485
+ and instructions. We used a number of different computers and
2486
+ GPUs when completing our experiments:
2487
+ 1) GPU: NVidia Quadro RTX 8000, CPU: AMD - Ryzen
2488
+ 5950x 3.4 GHz 16-core 32-thread, RAM: 64GB, OS:
2489
+ Ubuntu 20.04.
2490
+ 2) GPU: NVidia V100 SXM2, CPU: Intel Gold 6148
2491
+ Skylake @ 2.4 GHz (only used 4 threads), RAM: 32GB,
2492
+ OS: CentOS 7.
2493
+ 3) GPU: Nvidia GeForce RTX 2070, CPU: RYZEN
2494
+ Threadripper 2990WX, RAM: 32GB, OS: Ubuntu 20.04.
2495
+ REFERENCES
2496
+ [36] B. Chan, “RL sandbox,” https://github.com/chanb/rl sandbox public,
2497
+ 2020.
2498
+ [37] A. Paszke, et al., “PyTorch: An imperative style, high-performance deep
2499
+ learning library,” in Advances in Neural Inf. Processing Systems 32,
2500
+ H. Wallach, H. Larochelle, A. Beygelzimer, F. dAlch´e-Buc, E. Fox, and
2501
+ R. Garnett, Eds.
2502
+ Curran Associates, Inc., 2019, pp. 8024–8035.
2503
+ [38] I. Gulrajani, F. Ahmed, M. Arjovsky, V. Dumoulin, and A. C. Courville,
2504
+ “Improved Training of Wasserstein GANs,” in Conf. Neural Inf. Pro-
2505
+ cessing Systems, I. Guyon, et al., Eds.
2506
+ Long Beach, USA: Curran
2507
+ Associates, Inc., Dec. 2017, pp. 5767–5777.
2508
+ [39] I. Kostrikov, K. K. Agrawal, D. Dwibedi, S. Levine, and J. Tomp-
2509
+ son, “Discriminator-Actor-Critic: Addressing Sample Inefficiency and
2510
+ Reward Bias in Adversarial Imitation Learning,” in Proc. Int. Conf.
2511
+ Learning Representations (ICLR’19), New Orleans, USA, May 2019.
2512
+ [40] D. P. Kingma and M. Welling, “Auto-Encoding Variational Bayes,”
2513
+ arXiv:1312.6114 [cs, stat], Dec. 2013.
2514
+ [41] S. Fujimoto, H. van Hoof, and D. Meger, “Addressing Function Ap-
2515
+ proximation Error in Actor-Critic Methods,” in Proc. 35th Int. Conf.
2516
+ Machine Learning (ICML’18), Stockholm, Sweden, Jul. 10–15 2018,
2517
+ pp. 1582–1591.
2518
+ [42] H. van Hasselt, A. Guez, and D. Silver, “Deep Reinforcement Learning
2519
+ with Double Q-learning,” in AAAI Conf. Artificial Intelligence, Pheonix,
2520
+ USA, Feb. 2016.
2521
+ [43] V. Mnih, et al., “Human-level control through deep reinforcement
2522
+ learning,” Nature, vol. 518, no. 7540, pp. 529–533, Feb. 2015.
2523
+ [44] T. Haarnoja, et al., “Soft Actor-Critic Algorithms and Applications,”
2524
+ arXiv:1812.05905 [cs, stat], Jan. 2019.
2525
+ [45] I. Kostrikov, “PyTorch Implementations of Reinforcement Learn-
2526
+ ing
2527
+ Algorithms,”
2528
+ https://github.com/ikostrikov/pytorch-a2c-ppo-acktr-
2529
+ gail, 2018.
2530
+ [46] M. Riedmiller, et al., “Learning by Playing Solving Sparse Reward Tasks
2531
+ from Scratch,” in Proc. 35th Int. Conf. Machine Learning (ICML’18),
2532
+ Stockholm, Sweden, July 2018, pp. 4344–4353.
2533
+ [47] E. Coumans and Y. Bai, “PyBullet, a Python module for physics
2534
+ simulation for games, robotics and machine learning,” http://pybullet.org,
2535
+ 2016.
2536
+ [48] D. P. Kingma and J. Ba, “Adam: A Method for Stochastic Optimization,”
2537
+ in Proc. Int. Conf. Learning Representations (ICLR’15), San Diego,
2538
+ USA, May 7–9 2015.
2539
+ [49] A. Rajeswaran*, et al., “Learning Complex Dexterous Manipulation with
2540
+ Deep Reinforcement Learning and Demonstrations,” in Proc. Robotics:
2541
+ Science and Systems (RSS’18), Pittsburgh, USA, Jun. 26–30 2018.
2542
+ [50] Y. Wu, M. Mozifian, and F. Shkurti, “Shaping Rewards for Rein-
2543
+ forcement Learning with Imperfect Demonstrations using Generative
2544
+ Models,” arXiv:2011.01298 [cs], Nov. 2020.
2545
+ [51] A. Kumar, A. Zhou, G. Tucker, and S. Levine, “Conservative Q-Learning
2546
+ for Offline Reinforcement Learning,” arXiv:2006.04779 [cs, stat], Aug.
2547
+ 2020.
2548
+ [52] M. Orsini, et al., “What Matters for Adversarial Imitation Learning?”
2549
+ in Conf. Neural Inf. Processing Systems, June 2021.
2550
+ [53] X. Chen, C. Wang, Z. Zhou, and K. Ross, “Randomized Ensembled
2551
+ Double Q-Learning: Learning Fast Without a Model,” arXiv:2101.05982
2552
+ [cs], Mar. 2021.
2553
+
7tAyT4oBgHgl3EQfQvZV/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
9NE1T4oBgHgl3EQf7wX0/content/2301.03539v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6395cdc2dbe044252cb39d6bae4ed980dfc183811e352dd0e65e616fd3a347f2
3
+ size 997265
9NE1T4oBgHgl3EQf7wX0/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:af319944417615ee0945906c3292b60f296d5dfdb46671364837ce278d59a87f
3
+ size 4063277
9NE1T4oBgHgl3EQf7wX0/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:5946fd42879000d701b5f67107d516c44034e1c6f063d84165ff0ddba31606bd
3
+ size 165080
9NE2T4oBgHgl3EQflwcz/content/2301.03991v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:fbd23e010f9be3687da98f36a132be98f8d643a86fc74bbc90dac9ee6407090f
3
+ size 1170305
9NE2T4oBgHgl3EQflwcz/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:57dee23fc26f59ad3a74188b19f8e369ad32cdc5a9c1a4af2b057ab8433d22f9
3
+ size 3538989
9NE2T4oBgHgl3EQflwcz/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:da121927b70df4571aef243da2aa2e3ce2022edd60e7f0f17f9e4bba4953cc6d
3
+ size 122840
AdE1T4oBgHgl3EQf9Aai/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:77dac29dab0f7429fce3565786614cdf3f6c236a35f0d6fb1a021bd6955886fa
3
+ size 2949165
D9E1T4oBgHgl3EQf-QZ6/content/tmp_files/2301.03566v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
D9E1T4oBgHgl3EQf-QZ6/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
F9E5T4oBgHgl3EQfVg_E/content/2301.05552v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:cab6e19960ac8db9ef37e97e28a0e896acb647c77696cafe26fb030422cc5dfe
3
+ size 4396506
F9E5T4oBgHgl3EQfVg_E/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:45205112ebf2575fa2cb9da3c9acf9c4bedfdbb1d34e9f904e4a8edf3f767b80
3
+ size 6160429
F9E5T4oBgHgl3EQfVg_E/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ad6dd6ab8e780b890cc3e5675de8d82d366dfbbd3e06ffba80953d2db80d5695
3
+ size 216964
H9FLT4oBgHgl3EQfIi9F/content/tmp_files/2301.12000v1.pdf.txt ADDED
@@ -0,0 +1,488 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Chapter 1
2
+ Beyond Classroom:
3
+ Making a Difference in
4
+ Diversity in Tech
5
+ Barbora Buhnova
6
+ With all the opportunities and risks that technology holds in connection to our safe and sus-
7
+ tainable future, it is becoming increasingly important to involve a larger portion of our society in
8
+ becoming active co-creators of our digitalized future—moving from the passenger seat to the
9
+ driver seat. Yet, despite extensive efforts around the world, little progress has been made in
10
+ growing the representation of certain communities and groups in software engineering. This
11
+ chapter shares one successful project, called Czechitas, triggering a major social change in
12
+ Czechia, involving 1 000+ volunteers to support 50 000+ women on their way towards software
13
+ engineering education and career.
14
+ arXiv:2301.12000v1 [cs.SE] 27 Jan 2023
15
+
16
+ CHAPTER 1
17
+ Introduction
18
+ The past decade has witnessed the emergence of hundreds of initiatives around the world
19
+ supporting various underrepresented groups on their pathway towards software engineering,
20
+ whether connected to universities [13], companies [15], or run as independent non-profit or-
21
+ ganizations [14]. Although the initiatives often start with a great vision and high volunteering
22
+ commitment, after a few years into the activities, it becomes challenging to sustain the volun-
23
+ teering energy and commitment in face of the very slow progress towards the better. In those
24
+ moments, the success cases by others can be what helps us keep going.
25
+ The initiative featured in this chapter, called Czechitas [6], started in 2014 in Czechia, with
26
+ a simple idea to bring tech closer to girls and girls closer to tech, in reaction to the strong
27
+ under-representation of women in tech in the country (see Figure 1.1). The prompt snowball
28
+ effect helped us to build a community around the joint vision to empower and encourage girls
29
+ and women to engage in computing education and career transition, and to show them that
30
+ software engineering is an interesting career direction that is not necessarily difficult nor limited
31
+ to one gender. Initially established to provide women in Czechia with an opportunity to put their
32
+ hands on programming, it now contributes to a major social change in the country.
33
+ Over time, Czechitas has become a movement that has attracted a strong community of
34
+ tech-professional volunteers (over 1 000) and companies (over 100), and given rise to a portfo-
35
+ lio of women-tailored courses in various areas of software engineering, such as programming,
36
+ Figure 1.1: Women ICT Professional (Eurostat, 2019 data) [8].
37
+ 2
38
+
39
+ 30%
40
+ 25%
41
+ 20%
42
+ EU = 17.9%
43
+ 15%
44
+ 10%
45
+ 5%
46
+ 0%CHAPTER 1
47
+ web development, mobile app development, data science, cybersecurity or testing (over 1 300
48
+ courses delivered so far). We have influenced over 50 000 women (over 30 000 via live events
49
+ and over 20 000 via online tutorials) who graduated from our courses to use their new tech
50
+ skills to change their education path or advance their careers.
51
+ Czechitas Mission: We inspire, train and guide new talents towards stronger
52
+ diversity and competitiveness in tech.
53
+ Thanks to the success of our education activities with hundreds of events a year (each
54
+ receiving more registrations than its capacity), we have become recognized as the leading
55
+ platform in Czechia actively addressing gender diversity in tech. In this chapter, we share
56
+ the lessons we learned about the low representation of women in tech, effective strategies in
57
+ supporting women on their way to software engineering, discuss the ingredients that helped us
58
+ succeed, the obstacles and challenges we faced, and the progress yet to be made.
59
+ Why are There so Few Women in Tech?
60
+ Across Europe, only 19.1% of tech professionals are women (according to 2021 data) [8], with
61
+ Czechia being the last on the list. The major reasons behind the trend in our region according
62
+ to our recent study (with 70% of participants from Czechia and Germany) [9] are:
63
+ 1. Access. The first hole in the leaky pipeline on girls’ pathway towards software engi-
64
+ neering is linked to the missing access to encouragement and support, together with the
65
+ missing access to suitable education that would be able to build on the interests of girls
66
+ that often span across multiple disciplines.
67
+ 2. Stereotypes. The ability to see herself as a software engineer is then challenged by the
68
+ perception of the software engineering as a field not leading to a purpose the girl would
69
+ like to dedicate her future to. Often, the close family and friends step-in in this moment
70
+ to direct girls away from software engineering with the intention to protect them from
71
+ a future where they cannot really imagine the girls becoming successful. Interestingly,
72
+ 3
73
+
74
+ CHAPTER 1
75
+ the intentions are meant well, to protect the girls, which shows how crucial it is to help
76
+ parents (and mainly mothers) to understand that software engineering can be a great
77
+ career choice for their daughters.
78
+ 3. Confidence. The next hole on the leaky pipeline comes when girls find themselves in
79
+ the classroom, often surrounded by more-experienced learners (typically boys). For the
80
+ little girls who often excel in other subjects, it can be hard to fall in the category of a slow
81
+ novice learner. The girls often mention frustrations of low self-efficacy, inadequacy and
82
+ missing experience of success in presence of a classroom dynamic being monopolized
83
+ by the earlier technology adopters.
84
+ 4. Sense of Belonging. The girls who resist through the earlier three challenges and find
85
+ themselves on the education pathway towards software engineering, find themselves in
86
+ classrooms surrounded predominantly by boys. While this is a comfortable environment
87
+ for some, many in the study reported not feeling comfortable to express themselves, fac-
88
+ ing sexism or unwanted attention and missing relatable role models and mentors, which
89
+ led them to reconsider whether this is the environment they would be willing to spend the
90
+ rest of their lives in.
91
+ 5. Feeling Valued. The last hole in the leaky pipeline challenges the women who entered
92
+ software engineering careers, as some of them emphasize the struggle of not feeling
93
+ valued at workplace. The reasons are different for the women with stereotypical talent
94
+ spectrum (that matches the talent spectrum typical among their men colleagues, typically
95
+ being very technical) and non-stereotypical talent spectrum (bringing not-that-common
96
+ talents to the table, typically more multidisciplinary and human-oriented). While the first
97
+ group feels ”tired of proving them wrong”, the second group feel frustrated from their
98
+ strengths viewed as second class and from missing appreciation.
99
+ Supporting Women on their Way to Tech
100
+ In Czechitas, we understand that plumbing the leaky pipeline can hardly be done by isolated
101
+ and uncoordinated efforts. This section discusses the interlinked pillars of our activities (see
102
+ Figure 1.2), listing examples of the activities and events we delivered in 2022.
103
+ 4
104
+
105
+ CHAPTER 1
106
+ Czechitas Pillar I – Awareness
107
+ One of the crucial success factors for a change towards improving gender balance in soft-
108
+ ware engineering is the actual understanding that we are in a disbalanced state that further
109
+ reinforces itself due to the factors discussed earlier. The efforts towards encouraging women
110
+ to join software engineering cannot make a difference unless the society, education system
111
+ and corporate environment welcomes and supports the change (understanding it as a push
112
+ towards the real equilibrium, not a push out of it).
113
+ In Czechitas, we are investing substantial effort in awareness around the topic. In 2022
114
+ alone, we participated in over 20 conferences and panel discussions, gave numerous inter-
115
+ views in TV, radio and other media, organized talks to students and teachers at high schools,
116
+ and to tech professionals in our partner companies. We were visible with a booth at 15 festivals
117
+ and family days across Czechia. Over 2022, Czechitas was mentioned in 508 articles, reach-
118
+ ing major part of Czech population. In 2021, we also launched a Czechitas podcast, which in
119
+ 2022 reached over 14 676 listens. Furthermore, our website was in 2022 visited by 123 785
120
+ unique visitors, and our newsletter was followed by 25 983 subscribers.
121
+ The next step in raising awareness among the general public is to make it as easy as
122
+ possible to get the first exposure to coding in a fun, enjoyable and community way. To this end,
123
+ we for instance organize an Advent Christmas Coding campaign (following the tradition of an
124
+ advent calendar, in which instead of a sweet treat, each day holds a coding assignment along a
125
+ story of bringing Mr. Gingerbread home for Christmas), which is being followed by hundreds of
126
+ Figure 1.2: The Pillars of Czechitas Activities.
127
+ 5
128
+
129
+ CAREER
130
+ AWARENESS
131
+ TRAINING
132
+ TRANSITION
133
+ COMMUNITYCHAPTER 1
134
+ people. Furthermore, in collaboration with the Ministry of Education, Youth and Sports, we e.g.
135
+ co-organized the #DIGIEDUHACK hackathon. And in collaboration with Czech universities, we
136
+ run the Czechitas Thesis Award to give visibility to exceptional bachelor theses authored by
137
+ girls. All these activities typically repeat every year.
138
+ Czechitas Pillar II – Training
139
+ Since the start of our activities in 2014, we are improving the education design of our courses
140
+ to reflect the needs of our audience—women and girls who are very often later technology
141
+ adopters or career changers—with an emphasis on providing suitable first contact with soft-
142
+ ware engineering, creating safe and supportive environment for novice learners, accommodat-
143
+ ing differences in the learning speed of each student, building self-confidence, and supporting
144
+ sustaining long-term interest, which we also publish [2, 10]. In 2022, we delivered 242 live
145
+ software-engineering courses with 15 316 participants, with the courses around web develop-
146
+ ment and data science scoring as the most popular ones.
147
+ Although most of the training is targeted to women and girls, we are also investing in training
148
+ Figure 1.3: Czechitas-participation (Data as of June 2022).
149
+ 6
150
+
151
+ 21,767
152
+ 1.482+
153
+ 57.683+
154
+ 8,686
155
+ educational
156
+ participants
157
+ events
158
+ 428
159
+ 10
160
+ 11,763
161
+ 299
162
+ 3,752
163
+ 8,268
164
+ 238
165
+ 418
166
+ 13,081
167
+ 5,821
168
+ 3,969
169
+ 145
170
+ 141
171
+ 4,271
172
+ 295
173
+ 102
174
+ 6
175
+ 8,011
176
+ 84
177
+ 2,654
178
+ 45
179
+ 135
180
+ 1,873
181
+ 1,266
182
+ 4,299
183
+ 2015
184
+ 2016
185
+ 2017
186
+ 2018
187
+ 2019
188
+ 2020
189
+ 2021
190
+ 2022*
191
+ 2015
192
+ 2016
193
+ 2017
194
+ 2018
195
+ 2019
196
+ 2020
197
+ 2021
198
+ 2022*
199
+ Number of educational events
200
+ Number of video tutorials
201
+ Educational events participants
202
+ Educational video tutorials participantsCHAPTER 1
203
+ elementary-school and high-school teachers (irrespective of gender). And some mixed-gender
204
+ activities were organized also for children (7 week-long summer camps in the summer of 2022,
205
+ besides others) and high-school kids, although in case of high schools, it is already important
206
+ to offer also girl-only courses (3 week-long summer schools for high-school girls were given
207
+ in 2022). Besides, training courses for mixed audience are also provided on events such as
208
+ Family Days (we were present at over 20 such events in 2022).
209
+ Czechitas Pillar III – Career Transition
210
+ As many women in our community intend to enter software engineering as their future profes-
211
+ sion, some of our activities are intentionally designed to facilitate this journey, whether software
212
+ engineering is to become their first job or they intend to change their career [3].
213
+ In cooperation with our partner companies, we have identified three career pathways that
214
+ appear to be the most suitable entry points to software engineering in Czechia. These are
215
+ (1) web development (including courses on JavaScript, React, HTML/CSS, Bootstrap, Git,
216
+ UX design, and others), (2) data analytics (including courses on Python, databases, SQL,
217
+ statistics, Power BI, and others), (3) testing (including courses on requirements engineering,
218
+ agile processes, manual testing, issue tracking, regression testing, smoke testing, basics of
219
+ automated testing, browsers, API, databases, version control, and others).
220
+ For the three directions, we have developed a complex career-transition support within so-
221
+ called Digital Academies. A Digital Academy is a four-month program for a group of 30 women
222
+ (and involving around 5-15 partner companies), which besides individual courses covering the
223
+ topics outlined above and taking place 3-4 times a week (evenings on working days, full days
224
+ on weekends) includes also pairing of the students with mentors from the companies to support
225
+ them in developing their own projects, a hackathon, career support, and further events offered
226
+ by the partner companies. In 2022, we have run 10 Digital Academies across four major cities
227
+ in Czechia, with over 60% of the graduates receiving a job offer within three months from
228
+ graduating from the academy.
229
+ To facilitate the career transition also for the women who opt to customize their training
230
+ journey (not attending a Digital Academy), our career consultants provide hundreds of career
231
+ consultations each year (327 in 2022), and we twice a year organize a Czechitas Job Fair,
232
+ 7
233
+
234
+ CHAPTER 1
235
+ where our graduates can meet the representatives of our partner companies (each Job Fair
236
+ attended by about 350 graduates and 30 companies).
237
+ Czechitas Foundation – Community
238
+ The foundation that supports all our activities is the community, which involves the participants
239
+ and graduates of our courses, tech professionals who teach with us, mentors, course facili-
240
+ tators, and our partner companies. The fact that many members in our community are men
241
+ helps us not only engage more tech-professional allies in our vision, but also influence a more
242
+ supportive environment in tech companies where our graduates land. To support the blending
243
+ of the community and increasing the sense of belonging of our graduates also in the mixed-
244
+ gender environment, we regularly engage in organization of Tech Meet-ups and Hackathons,
245
+ as well as informal CzechiPubs that regularly take place in 10 different cities across Czechia.
246
+ Making a Difference
247
+ The positive influence of Czechitas activities in Czechia is already visible in the shifted percep-
248
+ tion of software engineering as an education pathway and career choice to be considered by
249
+ any gender. That not only motivates many girls to consider software engineering in their choice
250
+ of a university study field (with the representation of women among ICT students changing from
251
+ 12% in 2016 to 17% in 2021 in Czechia [7, 5], moving the country closer to the European av-
252
+ erage, see Figure 1.4) but is likely also having secondary influence on all who so far hesitated
253
+ to join software engineering.
254
+ What Helped us Succeed
255
+ Building Czechitas was only possible thanks to a coordinated effort of hundreds of people (90
256
+ employees and over 1,000 volunteers). Over the past eight years of our existence, we came to
257
+ understand the ingredients without which this would not be possible:
258
+ • Great leadership and love for what we do is giving us the sense of purpose, energy and
259
+ direction, holding us together and keeping us focused. Mentors from partner companies
260
+ 8
261
+
262
+ CHAPTER 1
263
+ Figure 1.4: Women ICT Students (Czech Statistical Office, 2021 data) [5].
264
+ and beyond have been of great help to guide us through the design of our leadership and
265
+ expansion strategy.
266
+ • Visual and playful communication is giving us the fresh flavour of fun and joy that we
267
+ all (students as well as trainers and volunteers) enjoy joining even after a tiring day at
268
+ school or work. The informal and visually attractive communication helps us to share the
269
+ love for our brand.
270
+ • Community and sense of belonging is crucial for connecting those who strive to learn
271
+ with those who strive to share and teach, and those who want to support the connection.
272
+ It helps our student to feel home and make it easier for them to keep going even when
273
+ learning gets hard.
274
+ • Inclusive environment and encouragement makes it safe for our students to make mis-
275
+ takes and experience success, have the opportunity to exchange knowledge, collaborate,
276
+ and get personalized feedback and guidance. Specific strategies and interventions we
277
+ have developed to support novice learners and their self-efficacy have been key in this
278
+ direction [2].
279
+ • Knowledge and understanding is crucial for us to design our activities with insight into
280
+ the frustrations steering women away from software engineering [9] and effective strate-
281
+ gies to support girls and women in tech education [10] and career transition [3]. We
282
+ 9
283
+
284
+ 30%
285
+ 25%
286
+ EU = 20%
287
+ 20%
288
+ 15%
289
+ 10%
290
+ 5%
291
+ 0%CHAPTER 1
292
+ invest our time in sharing the lessons we have learned [2, 9, 3], and learning from other
293
+ initiatives from across the world (e.g., within the EUGAIN network, see https://eugain.eu/).
294
+ • Creating and sharing stories helps us to inspire our students, bring them closer to
295
+ relatable role models, and to give them hope and confidence that with some work and
296
+ dedication, a transition into software engineering is possible. The stories (each featuring
297
+ an inspiring woman who changed her career towards tech) are published in our blog,
298
+ communicated via social networks, and used in media articles. These women inspire
299
+ others as speakers and panelists in our events, and as guests in Czechitas Podcast.
300
+ • Sustainable financial model helps us to sustain a team employed to run the organi-
301
+ zation. The model stands on financial participation of the students, partner companies,
302
+ foundations and individual donors, with an intention to reach out also to the government
303
+ level in the future. The most crucial pillar of our financial sustainability is the partner com-
304
+ panies, which are beside their yearly partnership contributions (depending on the level of
305
+ partnership) helping us to cover certain costs (e.g., offering their office spaces for events,
306
+ motivating their employees to volunteer as mentors), and opening doors towards further
307
+ funding opportunities (e.g. with global foundations connected to their company).
308
+ Obstacles and Challenges we Faced
309
+ As any organization that has substantially outgrown its own plans and expectations, Czechitas
310
+ has undergone numerous changes and readjustments over its course of existence. And al-
311
+ though we are trying to publish the effective setup that works for us now [2, 3, 4], our first steps
312
+ were highly organic and experimental, which was key to learning what works for the context
313
+ we were in. With our enthusiasm and ”always yes” spirit, we walked many paths that we failed
314
+ and rolled back, but we also faced numerous obstacles and challenges that we withstood.
315
+ • Scaling the organization. Turning a non-profit start-up into a scale-up is a challenge on
316
+ its own, as the means for achieving stability are different from traditional companies – be-
317
+ sides the discussed financial stability, also in terms of sustained volunteering involvement
318
+ and brand building. We needed to learn to manage the mix of the innovative and largely
319
+ self-sacrificing founding community with the necessary systematic and organized spirit of
320
+ 10
321
+
322
+ CHAPTER 1
323
+ new employees. We needed to learn to prioritize and say no to some activities that the
324
+ team felt strongly for.
325
+ • Being misunderstood. As a large organization, we needed to learn to communicate
326
+ our mission well so that it is not misunderstood, knowing that anything that damages
327
+ the brand may sink the whole boat. Namely, we needed to help our partner companies
328
+ understand what level of expertise is realistic to achieve in our students, help our students
329
+ understand what time investment and commitment it takes to change direction towards
330
+ tech, and help our society understand why our focus on women is key to the success of
331
+ our society as a whole.
332
+ • Quantifying the impact of our activities. One of the important challenges that we are
333
+ still facing is our ability to quantify the impact of our individual interventions and activities,
334
+ as it is difficult to isolate the effects of each one of them. More so that the impact is often
335
+ very subtle and propagates over long periods of time (e.g., a woman making a few steps
336
+ towards tech education inspiring her friend to make a major shift towards tech, who then
337
+ inspires her daughter to study CS at university). So although we have a Data & Impact
338
+ team at Czechitas, with substantial data available, the numbers we have (e.g., the number
339
+ of women who change their career to tech each year) are still only the tip of the iceberg
340
+ of the real impact we strive for, which is the shift in the collective mindset of the entire
341
+ society, leading to a sustained change.
342
+ Progress yet to be Made
343
+ With the increasing number of Czechitas graduates who are joining software engineering in-
344
+ dustry, often as very junior (in terms of their software-engineering expertise) and diverse (in
345
+ terms of their talents and competencies) members, we find it crucial to assist the companies
346
+ to improve the inclusiveness of their environment to integrate and leverage the new diverse
347
+ talent. In 2020, we made the first step towards that goal via designing a Diversity Awareness
348
+ Training, which was since then delivered to over 300 managers (mostly from Central and East-
349
+ ern Europe) across some of our partner companies. The concepts that have shown to be the
350
+ most crucial to discuss and understand during these trainings are outlined below:
351
+ 11
352
+
353
+ CHAPTER 1
354
+ Figure 1.5: Tuckman’s Model of Team Dynamics with an illustration of different dynamics
355
+ observed in homogeneous and heterogeneous teams.
356
+ • Diversity does not come easy, but it pays off. Avoiding diversity is natural to human in-
357
+ dividuals, but dangerous to humankind1. The same is true for corporate environment. We
358
+ need to acknowledge that diverse teams might have a harder time at start (as illustrated
359
+ with the Tuckman’s Model of Team Dynamics in Figure 1.5), but in long-term, diversity is
360
+ firmly correlated with higher performance [11, 12].
361
+ • We too often lose talented people by missing the talent in them. We are all talented,
362
+ in many diverse ways. It is the task of the manager to recognize and direct the talent to-
363
+ wards team success. The fact that a person uses a different talent spectrum (approaches
364
+ problems and situations differently) does not make them more/less suitable for software
365
+ engineering as such. There is no such thing as a second-class citizen when it comes to
366
+ the talents we need in software engineering.
367
+ • Biases evolved to help us navigate complexity, but they are not serving us well
368
+ when making assumptions about the potential in people. The dark side of biases is
369
+ that we tend to judge people’s potential based on how their talent spectrum matches the
370
+ talent of already-successful ones. Without realizing that the successful ones embody the
371
+ skills and conditions that worked when they joined the field (in the past) while we are now
372
+ choosing the software engineers for the future.
373
+ • Connection is built through communication. There are many unhealthy communica-
374
+ 1Our quote inspired by the statement ”Diversity is the new Darwinism” by the Great British Diversity Experiment [1].
375
+ 12
376
+
377
+ 7
378
+ Forming
379
+ Strorming
380
+ Norming
381
+ Performing
382
+ Adjourning
383
+
384
+ Effectiveness
385
+ Homogenous
386
+ team
387
+ Heterogenous
388
+ team
389
+ TimeCHAPTER 1
390
+ tion patterns around diversity, which often go against the purpose of making us all feel
391
+ the sense of belonging. It is important to create safe space, in which we can learn to
392
+ communicate our differences but also ask about the differences of others. Mistakes are
393
+ part of that learning, and forgiveness of the mistakes shall be encouraged if the mistakes
394
+ were done in the process of learning and not repeated blindly. It is important to create a
395
+ safe space to acknowledge our biases and stop shaming one another for them.
396
+ • Avoid the quick fixes, remove the barriers instead. Encourage curiosity about why cer-
397
+ tain communities are under-represented in software engineering. What are the barriers
398
+ they face and what can we do to remove them or make their journey lighter in presence of
399
+ the barriers (e.g. the care-taking on the side of most women)? Avoiding the conversation
400
+ and looking away from the differences in our experiences might lead the community to as-
401
+ sume that the under-representation is the lower-fit problem, which is dangerous because
402
+ it leads to push-back on any diversity support one might try to introduce.
403
+ • Change takes time. Promoting I&D is more complex than it might seem at first. It is
404
+ crucial to know how to start to see the first positive effects soon and be able to use them
405
+ to get more people on board towards promoting I&D further. Choose your first steps well
406
+ and invest in them. The investment will pay off.
407
+ Conclusion
408
+ Making a difference in improving gender balance in software engineering on the scale of the
409
+ whole country is not easy, but is possible. And it is very rewarding to be part of such a move-
410
+ ment. In 2021, the social impact of Czechitas activities was recognized at the European Union
411
+ level via winning the EU Social Economy Award (over 180 organizations nominated) in the
412
+ Digitalisation and Skills category, and in 2022 winning the global Equals in Tech Award (155
413
+ organizations nominated) in the Skills category. We hope our example can inspire others,
414
+ which is also why we are eager to share the lessons learned from our journey.
415
+ 13
416
+
417
+ Bibliography
418
+ [1] Amanda Bennett. Case study: The great British diversity experiment, 2016. FairPlay Ltd.
419
+ [2] Barbora Buhnova and Lucia Happe. Girl-friendly computer science classroom: Czechitas
420
+ experience report. In European Conference on Software Architecture, pages 125–137.
421
+ Springer, 2020.
422
+ [3] Barbora Buhnova, Lucie Jurystova, and Dita Prikrylova.
423
+ Assisting women in career
424
+ change towards software engineering: experience from czechitas ngo. In Proceedings of
425
+ the 13th European Conference on Software Architecture-Volume 2, pages 88–93, 2019.
426
+ [4] Barbora Buhnova and Dita Prikrylova.
427
+ Women want to learn tech: Lessons from the
428
+ czechitas education project. In 2019 IEEE/ACM 2nd International Workshop on Gender
429
+ Equality in Software Engineering (GE), pages 25–28. IEEE, 2019.
430
+ [5] Czech Statistical Office. Human resources in information technology, 2021. Available on-
431
+ line at URL https://www.czso.cz/documents/10180/165376696/063015-21.pdf/c7e96151-
432
+ b285-4388-9384-532e55f4a318?version=1.2.
433
+ [6] Czechitas.
434
+ Czechitas
435
+ annual
436
+ report
437
+ 2021,
438
+ 2022.
439
+ Available
440
+ online
441
+ at
442
+ URL
443
+ https://is.muni.cz/go/u6ji13.
444
+ [7] Eurostat.
445
+ Female students under-represented in ICT, 2016.
446
+ Available online at URL
447
+ https://ec.europa.eu/eurostat/web/products-eurostat-news/-/edn-20190425-1.
448
+ [8] Eurostat.
449
+ ICT
450
+ specialists
451
+ in
452
+ employment,
453
+ 2022.
454
+ Available
455
+ online
456
+ at
457
+ URL
458
+ https://ec.europa.eu/eurostat/statistics-explained/index.php?title=ICT specialists in em-
459
+ ployment.
460
+
461
+ CHAPTER 1
462
+ [9] Lucia Happe and Barbora Buhnova. Frustrations steering women away from software
463
+ engineering. IEEE Software, 39(4):63–69, 2022.
464
+ [10] Lucia Happe, Barbora Buhnova, Anne Koziolek, and Ingo Wagner. Effective measures to
465
+ foster girls’ interest in secondary computer science education. Education and Information
466
+ Technologies, 26(3):2811–2829, 2021.
467
+ [11] Dame Vivian Hunt, Dennis Layton, and Sara Prince.
468
+ Why diversity matters, 2015.
469
+ McKinsey. Available online at URL https://www.mckinsey.com/capabilities/people-and-
470
+ organizational-performance/our-insights/why-diversity-matters.
471
+ [12] Rocio Lorenzo and Martin Reeves. How and where diversity drives financial performance.
472
+ Business Harward Review, 2018. Available online at URL https://hbr.org/2018/01/how-
473
+ and-where-diversity-drives-financial-performance.
474
+ [13] Minerva Informatics Equality Award. Best practices in supporting women, 2022. Available
475
+ online at URL https://www.informatics-europe.org/society/minerva-informatics-equality-
476
+ award/best-practices-in-supporting-women.html.
477
+ [14] Sarah K. White. 19 organizations advancing women in tech, 2022. Available online at
478
+ URL https://www.cio.com/article/215709/16-organizations-for-women-in-tech.html.
479
+ [15] Hannah Williams.
480
+ Best initiatives for women in tech, 2017.
481
+ Available online at URL
482
+ https://techmonitor.ai/technology/hardware/best-initiatives-women-tech.
483
+ Acknowledgement
484
+ This chapter was made possible thanks to the great dedication and support of the entire
485
+ Czechitas team. Besides, it has been supported by the COST Action CA19122 – European
486
+ Network for Gender Balance in Informatics (EUGAIN).
487
+ 15
488
+
H9FLT4oBgHgl3EQfIi9F/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,267 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf,len=266
2
+ page_content='Chapter 1 Beyond Classroom: Making a Difference in Diversity in Tech Barbora Buhnova With all the opportunities and risks that technology holds in connection to our safe and sus- tainable future, it is becoming increasingly important to involve a larger portion of our society in becoming active co-creators of our digitalized future—moving from the passenger seat to the driver seat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
3
+ page_content=' Yet, despite extensive efforts around the world, little progress has been made in growing the representation of certain communities and groups in software engineering.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
4
+ page_content=' This chapter shares one successful project, called Czechitas, triggering a major social change in Czechia, involving 1 000+ volunteers to support 50 000+ women on their way towards software engineering education and career.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
5
+ page_content=' arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
6
+ page_content='12000v1 [cs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
7
+ page_content='SE] 27 Jan 2023 CHAPTER 1 Introduction The past decade has witnessed the emergence of hundreds of initiatives around the world supporting various underrepresented groups on their pathway towards software engineering, whether connected to universities [13], companies [15], or run as independent non-profit or- ganizations [14].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
8
+ page_content=' Although the initiatives often start with a great vision and high volunteering commitment, after a few years into the activities, it becomes challenging to sustain the volun- teering energy and commitment in face of the very slow progress towards the better.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
9
+ page_content=' In those moments, the success cases by others can be what helps us keep going.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
10
+ page_content=' The initiative featured in this chapter, called Czechitas [6], started in 2014 in Czechia, with a simple idea to bring tech closer to girls and girls closer to tech, in reaction to the strong under-representation of women in tech in the country (see Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
11
+ page_content='1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
12
+ page_content=' The prompt snowball effect helped us to build a community around the joint vision to empower and encourage girls and women to engage in computing education and career transition, and to show them that software engineering is an interesting career direction that is not necessarily difficult nor limited to one gender.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
13
+ page_content=' Initially established to provide women in Czechia with an opportunity to put their hands on programming, it now contributes to a major social change in the country.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
14
+ page_content=' Over time, Czechitas has become a movement that has attracted a strong community of tech-professional volunteers (over 1 000) and companies (over 100), and given rise to a portfo- lio of women-tailored courses in various areas of software engineering, such as programming, Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
15
+ page_content='1: Women ICT Professional (Eurostat, 2019 data) [8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
16
+ page_content=' 2 30% 25% 20% EU = 17.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
17
+ page_content='9% 15% 10% 5% 0%CHAPTER 1 web development, mobile app development, data science, cybersecurity or testing (over 1 300 courses delivered so far).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
18
+ page_content=' We have influenced over 50 000 women (over 30 000 via live events and over 20 000 via online tutorials) who graduated from our courses to use their new tech skills to change their education path or advance their careers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
19
+ page_content=' Czechitas Mission: We inspire, train and guide new talents towards stronger diversity and competitiveness in tech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
20
+ page_content=' Thanks to the success of our education activities with hundreds of events a year (each receiving more registrations than its capacity), we have become recognized as the leading platform in Czechia actively addressing gender diversity in tech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
21
+ page_content=' In this chapter, we share the lessons we learned about the low representation of women in tech, effective strategies in supporting women on their way to software engineering, discuss the ingredients that helped us succeed, the obstacles and challenges we faced, and the progress yet to be made.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
22
+ page_content=' Why are There so Few Women in Tech?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
23
+ page_content=' Across Europe, only 19.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
24
+ page_content='1% of tech professionals are women (according to 2021 data) [8], with Czechia being the last on the list.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
25
+ page_content=' The major reasons behind the trend in our region according to our recent study (with 70% of participants from Czechia and Germany) [9] are: 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
26
+ page_content=' Access.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
27
+ page_content=' The first hole in the leaky pipeline on girls’ pathway towards software engi- neering is linked to the missing access to encouragement and support, together with the missing access to suitable education that would be able to build on the interests of girls that often span across multiple disciplines.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
28
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
29
+ page_content=' Stereotypes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
30
+ page_content=' The ability to see herself as a software engineer is then challenged by the perception of the software engineering as a field not leading to a purpose the girl would like to dedicate her future to.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
31
+ page_content=' Often, the close family and friends step-in in this moment to direct girls away from software engineering with the intention to protect them from a future where they cannot really imagine the girls becoming successful.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
32
+ page_content=' Interestingly, 3 CHAPTER 1 the intentions are meant well, to protect the girls, which shows how crucial it is to help parents (and mainly mothers) to understand that software engineering can be a great career choice for their daughters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
33
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
34
+ page_content=' Confidence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
35
+ page_content=' The next hole on the leaky pipeline comes when girls find themselves in the classroom, often surrounded by more-experienced learners (typically boys).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
36
+ page_content=' For the little girls who often excel in other subjects, it can be hard to fall in the category of a slow novice learner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
37
+ page_content=' The girls often mention frustrations of low self-efficacy, inadequacy and missing experience of success in presence of a classroom dynamic being monopolized by the earlier technology adopters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
38
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
39
+ page_content=' Sense of Belonging.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
40
+ page_content=' The girls who resist through the earlier three challenges and find themselves on the education pathway towards software engineering, find themselves in classrooms surrounded predominantly by boys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
41
+ page_content=' While this is a comfortable environment for some, many in the study reported not feeling comfortable to express themselves, fac- ing sexism or unwanted attention and missing relatable role models and mentors, which led them to reconsider whether this is the environment they would be willing to spend the rest of their lives in.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
42
+ page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
43
+ page_content=' Feeling Valued.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
44
+ page_content=' The last hole in the leaky pipeline challenges the women who entered software engineering careers, as some of them emphasize the struggle of not feeling valued at workplace.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
45
+ page_content=' The reasons are different for the women with stereotypical talent spectrum (that matches the talent spectrum typical among their men colleagues, typically being very technical) and non-stereotypical talent spectrum (bringing not-that-common talents to the table, typically more multidisciplinary and human-oriented).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
46
+ page_content=' While the first group feels ”tired of proving them wrong”, the second group feel frustrated from their strengths viewed as second class and from missing appreciation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
47
+ page_content=' Supporting Women on their Way to Tech In Czechitas, we understand that plumbing the leaky pipeline can hardly be done by isolated and uncoordinated efforts.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
48
+ page_content=' This section discusses the interlinked pillars of our activities (see Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
49
+ page_content='2), listing examples of the activities and events we delivered in 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
50
+ page_content=' 4 CHAPTER 1 Czechitas Pillar I – Awareness One of the crucial success factors for a change towards improving gender balance in soft- ware engineering is the actual understanding that we are in a disbalanced state that further reinforces itself due to the factors discussed earlier.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
51
+ page_content=' The efforts towards encouraging women to join software engineering cannot make a difference unless the society, education system and corporate environment welcomes and supports the change (understanding it as a push towards the real equilibrium, not a push out of it).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
52
+ page_content=' In Czechitas, we are investing substantial effort in awareness around the topic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
53
+ page_content=' In 2022 alone, we participated in over 20 conferences and panel discussions, gave numerous inter- views in TV, radio and other media, organized talks to students and teachers at high schools, and to tech professionals in our partner companies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
54
+ page_content=' We were visible with a booth at 15 festivals and family days across Czechia.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
55
+ page_content=' Over 2022, Czechitas was mentioned in 508 articles, reach- ing major part of Czech population.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
56
+ page_content=' In 2021, we also launched a Czechitas podcast, which in 2022 reached over 14 676 listens.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
57
+ page_content=' Furthermore, our website was in 2022 visited by 123 785 unique visitors, and our newsletter was followed by 25 983 subscribers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
58
+ page_content=' The next step in raising awareness among the general public is to make it as easy as possible to get the first exposure to coding in a fun, enjoyable and community way.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
59
+ page_content=' To this end, we for instance organize an Advent Christmas Coding campaign (following the tradition of an advent calendar, in which instead of a sweet treat, each day holds a coding assignment along a story of bringing Mr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
60
+ page_content=' Gingerbread home for Christmas), which is being followed by hundreds of Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
61
+ page_content='2: The Pillars of Czechitas Activities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
62
+ page_content=' 5 CAREER AWARENESS TRAINING TRANSITION COMMUNITYCHAPTER 1 people.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
63
+ page_content=' Furthermore, in collaboration with the Ministry of Education, Youth and Sports, we e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
64
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
65
+ page_content=' co-organized the #DIGIEDUHACK hackathon.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
66
+ page_content=' And in collaboration with Czech universities, we run the Czechitas Thesis Award to give visibility to exceptional bachelor theses authored by girls.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
67
+ page_content=' All these activities typically repeat every year.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
68
+ page_content=' Czechitas Pillar II – Training Since the start of our activities in 2014,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
69
+ page_content=' we are improving the education design of our courses to reflect the needs of our audience—women and girls who are very often later technology adopters or career changers—with an emphasis on providing suitable first contact with soft- ware engineering,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
70
+ page_content=' creating safe and supportive environment for novice learners,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
71
+ page_content=' accommodat- ing differences in the learning speed of each student,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
72
+ page_content=' building self-confidence,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
73
+ page_content=' and supporting sustaining long-term interest,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
74
+ page_content=' which we also publish [2,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
75
+ page_content=' 10].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
76
+ page_content=' In 2022, we delivered 242 live software-engineering courses with 15 316 participants, with the courses around web develop- ment and data science scoring as the most popular ones.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
77
+ page_content=' Although most of the training is targeted to women and girls, we are also investing in training Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
78
+ page_content='3: Czechitas-participation (Data as of June 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
79
+ page_content=' 6 21,767 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
80
+ page_content='482+ 57.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
81
+ page_content='683+ 8,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
82
+ page_content='686 educational participants events 428 10 11,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
83
+ page_content='763 299 3,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
84
+ page_content='752 8,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
85
+ page_content='268 238 418 13,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
86
+ page_content='081 5,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
87
+ page_content='821 3,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
88
+ page_content='969 145 141 4,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
89
+ page_content='271 295 102 6 8,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
90
+ page_content='011 84 2,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
91
+ page_content='654 45 135 1,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
92
+ page_content='873 1,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
93
+ page_content='266 4,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
94
+ page_content='299 2015 2016 2017 2018 2019 2020 2021 2022* 2015 2016 2017 2018 2019 2020 2021 2022* Number of educational events Number of video tutorials Educational events participants Educational video tutorials participantsCHAPTER 1 elementary-school and high-school teachers (irrespective of gender).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
95
+ page_content=' And some mixed-gender activities were organized also for children (7 week-long summer camps in the summer of 2022, besides others) and high-school kids, although in case of high schools, it is already important to offer also girl-only courses (3 week-long summer schools for high-school girls were given in 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
96
+ page_content=' Besides, training courses for mixed audience are also provided on events such as Family Days (we were present at over 20 such events in 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
97
+ page_content=' Czechitas Pillar III – Career Transition As many women in our community intend to enter software engineering as their future profes- sion, some of our activities are intentionally designed to facilitate this journey, whether software engineering is to become their first job or they intend to change their career [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
98
+ page_content=' In cooperation with our partner companies, we have identified three career pathways that appear to be the most suitable entry points to software engineering in Czechia.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
99
+ page_content=' These are (1) web development (including courses on JavaScript, React, HTML/CSS, Bootstrap, Git, UX design, and others), (2) data analytics (including courses on Python, databases, SQL, statistics, Power BI, and others), (3) testing (including courses on requirements engineering, agile processes, manual testing, issue tracking, regression testing, smoke testing, basics of automated testing, browsers, API, databases, version control, and others).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
100
+ page_content=' For the three directions, we have developed a complex career-transition support within so- called Digital Academies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
101
+ page_content=' A Digital Academy is a four-month program for a group of 30 women (and involving around 5-15 partner companies), which besides individual courses covering the topics outlined above and taking place 3-4 times a week (evenings on working days, full days on weekends) includes also pairing of the students with mentors from the companies to support them in developing their own projects, a hackathon, career support, and further events offered by the partner companies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
102
+ page_content=' In 2022, we have run 10 Digital Academies across four major cities in Czechia, with over 60% of the graduates receiving a job offer within three months from graduating from the academy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
103
+ page_content=' To facilitate the career transition also for the women who opt to customize their training journey (not attending a Digital Academy), our career consultants provide hundreds of career consultations each year (327 in 2022), and we twice a year organize a Czechitas Job Fair, 7 CHAPTER 1 where our graduates can meet the representatives of our partner companies (each Job Fair attended by about 350 graduates and 30 companies).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
104
+ page_content=' Czechitas Foundation – Community The foundation that supports all our activities is the community, which involves the participants and graduates of our courses, tech professionals who teach with us, mentors, course facili- tators, and our partner companies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
105
+ page_content=' The fact that many members in our community are men helps us not only engage more tech-professional allies in our vision, but also influence a more supportive environment in tech companies where our graduates land.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
106
+ page_content=' To support the blending of the community and increasing the sense of belonging of our graduates also in the mixed- gender environment, we regularly engage in organization of Tech Meet-ups and Hackathons, as well as informal CzechiPubs that regularly take place in 10 different cities across Czechia.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
107
+ page_content=' Making a Difference The positive influence of Czechitas activities in Czechia is already visible in the shifted percep- tion of software engineering as an education pathway and career choice to be considered by any gender.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
108
+ page_content=' That not only motivates many girls to consider software engineering in their choice of a university study field (with the representation of women among ICT students changing from 12% in 2016 to 17% in 2021 in Czechia [7, 5], moving the country closer to the European av- erage, see Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
109
+ page_content='4) but is likely also having secondary influence on all who so far hesitated to join software engineering.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
110
+ page_content=' What Helped us Succeed Building Czechitas was only possible thanks to a coordinated effort of hundreds of people (90 employees and over 1,000 volunteers).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
111
+ page_content=' Over the past eight years of our existence, we came to understand the ingredients without which this would not be possible: Great leadership and love for what we do is giving us the sense of purpose, energy and direction, holding us together and keeping us focused.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
112
+ page_content=' Mentors from partner companies 8 CHAPTER 1 Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
113
+ page_content='4: Women ICT Students (Czech Statistical Office, 2021 data) [5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
114
+ page_content=' and beyond have been of great help to guide us through the design of our leadership and expansion strategy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
115
+ page_content=' Visual and playful communication is giving us the fresh flavour of fun and joy that we all (students as well as trainers and volunteers) enjoy joining even after a tiring day at school or work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
116
+ page_content=' The informal and visually attractive communication helps us to share the love for our brand.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
117
+ page_content=' Community and sense of belonging is crucial for connecting those who strive to learn with those who strive to share and teach, and those who want to support the connection.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
118
+ page_content=' It helps our student to feel home and make it easier for them to keep going even when learning gets hard.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
119
+ page_content=' Inclusive environment and encouragement makes it safe for our students to make mis- takes and experience success, have the opportunity to exchange knowledge, collaborate, and get personalized feedback and guidance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
120
+ page_content=' Specific strategies and interventions we have developed to support novice learners and their self-efficacy have been key in this direction [2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
121
+ page_content=' Knowledge and understanding is crucial for us to design our activities with insight into the frustrations steering women away from software engineering [9] and effective strate- gies to support girls and women in tech education [10] and career transition [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
122
+ page_content=' We 9 30% 25% EU = 20% 20% 15% 10% 5% 0%CHAPTER 1 invest our time in sharing the lessons we have learned [2, 9, 3], and learning from other initiatives from across the world (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
123
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
124
+ page_content=', within the EUGAIN network, see https://eugain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
125
+ page_content='eu/).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
126
+ page_content=' Creating and sharing stories helps us to inspire our students, bring them closer to relatable role models, and to give them hope and confidence that with some work and dedication, a transition into software engineering is possible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
127
+ page_content=' The stories (each featuring an inspiring woman who changed her career towards tech) are published in our blog, communicated via social networks, and used in media articles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
128
+ page_content=' These women inspire others as speakers and panelists in our events, and as guests in Czechitas Podcast.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
129
+ page_content=' Sustainable financial model helps us to sustain a team employed to run the organi- zation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
130
+ page_content=' The model stands on financial participation of the students, partner companies, foundations and individual donors, with an intention to reach out also to the government level in the future.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
131
+ page_content=' The most crucial pillar of our financial sustainability is the partner com- panies, which are beside their yearly partnership contributions (depending on the level of partnership) helping us to cover certain costs (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
132
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
133
+ page_content=', offering their office spaces for events, motivating their employees to volunteer as mentors), and opening doors towards further funding opportunities (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
134
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
135
+ page_content=' with global foundations connected to their company).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
136
+ page_content=' Obstacles and Challenges we Faced As any organization that has substantially outgrown its own plans and expectations, Czechitas has undergone numerous changes and readjustments over its course of existence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
137
+ page_content=' And al- though we are trying to publish the effective setup that works for us now [2, 3, 4], our first steps were highly organic and experimental, which was key to learning what works for the context we were in.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
138
+ page_content=' With our enthusiasm and ”always yes” spirit, we walked many paths that we failed and rolled back, but we also faced numerous obstacles and challenges that we withstood.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
139
+ page_content=' Scaling the organization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
140
+ page_content=' Turning a non-profit start-up into a scale-up is a challenge on its own, as the means for achieving stability are different from traditional companies – be- sides the discussed financial stability, also in terms of sustained volunteering involvement and brand building.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
141
+ page_content=' We needed to learn to manage the mix of the innovative and largely self-sacrificing founding community with the necessary systematic and organized spirit of 10 CHAPTER 1 new employees.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
142
+ page_content=' We needed to learn to prioritize and say no to some activities that the team felt strongly for.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
143
+ page_content=' Being misunderstood.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
144
+ page_content=' As a large organization, we needed to learn to communicate our mission well so that it is not misunderstood, knowing that anything that damages the brand may sink the whole boat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
145
+ page_content=' Namely, we needed to help our partner companies understand what level of expertise is realistic to achieve in our students, help our students understand what time investment and commitment it takes to change direction towards tech, and help our society understand why our focus on women is key to the success of our society as a whole.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
146
+ page_content=' Quantifying the impact of our activities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
147
+ page_content=' One of the important challenges that we are still facing is our ability to quantify the impact of our individual interventions and activities, as it is difficult to isolate the effects of each one of them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
148
+ page_content=' More so that the impact is often very subtle and propagates over long periods of time (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
149
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
150
+ page_content=', a woman making a few steps towards tech education inspiring her friend to make a major shift towards tech, who then inspires her daughter to study CS at university).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
151
+ page_content=' So although we have a Data & Impact team at Czechitas, with substantial data available, the numbers we have (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
152
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
153
+ page_content=', the number of women who change their career to tech each year) are still only the tip of the iceberg of the real impact we strive for, which is the shift in the collective mindset of the entire society, leading to a sustained change.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
154
+ page_content=' Progress yet to be Made With the increasing number of Czechitas graduates who are joining software engineering in- dustry, often as very junior (in terms of their software-engineering expertise) and diverse (in terms of their talents and competencies) members, we find it crucial to assist the companies to improve the inclusiveness of their environment to integrate and leverage the new diverse talent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
155
+ page_content=' In 2020, we made the first step towards that goal via designing a Diversity Awareness Training, which was since then delivered to over 300 managers (mostly from Central and East- ern Europe) across some of our partner companies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
156
+ page_content=' The concepts that have shown to be the most crucial to discuss and understand during these trainings are outlined below: 11 CHAPTER 1 Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
157
+ page_content='5: Tuckman’s Model of Team Dynamics with an illustration of different dynamics observed in homogeneous and heterogeneous teams.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
158
+ page_content=' Diversity does not come easy, but it pays off.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
159
+ page_content=' Avoiding diversity is natural to human in- dividuals, but dangerous to humankind1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
160
+ page_content=' The same is true for corporate environment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
161
+ page_content=' We need to acknowledge that diverse teams might have a harder time at start (as illustrated with the Tuckman’s Model of Team Dynamics in Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
162
+ page_content='5), but in long-term, diversity is firmly correlated with higher performance [11, 12].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
163
+ page_content=' We too often lose talented people by missing the talent in them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
164
+ page_content=' We are all talented, in many diverse ways.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
165
+ page_content=' It is the task of the manager to recognize and direct the talent to- wards team success.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
166
+ page_content=' The fact that a person uses a different talent spectrum (approaches problems and situations differently) does not make them more/less suitable for software engineering as such.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
167
+ page_content=' There is no such thing as a second-class citizen when it comes to the talents we need in software engineering.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
168
+ page_content=' Biases evolved to help us navigate complexity, but they are not serving us well when making assumptions about the potential in people.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
169
+ page_content=' The dark side of biases is that we tend to judge people’s potential based on how their talent spectrum matches the talent of already-successful ones.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
170
+ page_content=' Without realizing that the successful ones embody the skills and conditions that worked when they joined the field (in the past) while we are now choosing the software engineers for the future.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
171
+ page_content=' Connection is built through communication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
172
+ page_content=' There are many unhealthy communica- 1Our quote inspired by the statement ”Diversity is the new Darwinism” by the Great British Diversity Experiment [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
173
+ page_content=' 12 7 Forming Strorming Norming Performing Adjourning 个 Effectiveness Homogenous team Heterogenous team TimeCHAPTER 1 tion patterns around diversity, which often go against the purpose of making us all feel the sense of belonging.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
174
+ page_content=' It is important to create safe space, in which we can learn to communicate our differences but also ask about the differences of others.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
175
+ page_content=' Mistakes are part of that learning, and forgiveness of the mistakes shall be encouraged if the mistakes were done in the process of learning and not repeated blindly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
176
+ page_content=' It is important to create a safe space to acknowledge our biases and stop shaming one another for them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
177
+ page_content=' Avoid the quick fixes, remove the barriers instead.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
178
+ page_content=' Encourage curiosity about why cer- tain communities are under-represented in software engineering.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
179
+ page_content=' What are the barriers they face and what can we do to remove them or make their journey lighter in presence of the barriers (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
180
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
181
+ page_content=' the care-taking on the side of most women)?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
182
+ page_content=' Avoiding the conversation and looking away from the differences in our experiences might lead the community to as- sume that the under-representation is the lower-fit problem, which is dangerous because it leads to push-back on any diversity support one might try to introduce.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
183
+ page_content=' Change takes time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
184
+ page_content=' Promoting I&D is more complex than it might seem at first.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
185
+ page_content=' It is crucial to know how to start to see the first positive effects soon and be able to use them to get more people on board towards promoting I&D further.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
186
+ page_content=' Choose your first steps well and invest in them.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
187
+ page_content=' The investment will pay off.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
188
+ page_content=' Conclusion Making a difference in improving gender balance in software engineering on the scale of the whole country is not easy, but is possible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
189
+ page_content=' And it is very rewarding to be part of such a move- ment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
190
+ page_content=' In 2021, the social impact of Czechitas activities was recognized at the European Union level via winning the EU Social Economy Award (over 180 organizations nominated) in the Digitalisation and Skills category, and in 2022 winning the global Equals in Tech Award (155 organizations nominated) in the Skills category.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
191
+ page_content=' We hope our example can inspire others, which is also why we are eager to share the lessons learned from our journey.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
192
+ page_content=' 13 Bibliography [1] Amanda Bennett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
193
+ page_content=' Case study: The great British diversity experiment, 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
194
+ page_content=' FairPlay Ltd.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
195
+ page_content=' [2] Barbora Buhnova and Lucia Happe.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
196
+ page_content=' Girl-friendly computer science classroom: Czechitas experience report.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
197
+ page_content=' In European Conference on Software Architecture, pages 125–137.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
198
+ page_content=' Springer, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
199
+ page_content=' [3] Barbora Buhnova, Lucie Jurystova, and Dita Prikrylova.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
200
+ page_content=' Assisting women in career change towards software engineering: experience from czechitas ngo.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
201
+ page_content=' In Proceedings of the 13th European Conference on Software Architecture-Volume 2, pages 88–93, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
202
+ page_content=' [4] Barbora Buhnova and Dita Prikrylova.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
203
+ page_content=' Women want to learn tech: Lessons from the czechitas education project.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
204
+ page_content=' In 2019 IEEE/ACM 2nd International Workshop on Gender Equality in Software Engineering (GE), pages 25–28.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
205
+ page_content=' IEEE, 2019.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
206
+ page_content=' [5] Czech Statistical Office.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
207
+ page_content=' Human resources in information technology, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
208
+ page_content=' Available on- line at URL https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
209
+ page_content='czso.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
210
+ page_content='cz/documents/10180/165376696/063015-21.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
211
+ page_content='pdf/c7e96151- b285-4388-9384-532e55f4a318?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
212
+ page_content='version=1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
213
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
214
+ page_content=' [6] Czechitas.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
215
+ page_content=' Czechitas annual report 2021, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
216
+ page_content=' Available online at URL https://is.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
217
+ page_content='muni.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
218
+ page_content='cz/go/u6ji13.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
219
+ page_content=' [7] Eurostat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
220
+ page_content=' Female students under-represented in ICT, 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
221
+ page_content=' Available online at URL https://ec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
222
+ page_content='europa.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
223
+ page_content='eu/eurostat/web/products-eurostat-news/-/edn-20190425-1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
224
+ page_content=' [8] Eurostat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
225
+ page_content=' ICT specialists in employment, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
226
+ page_content=' Available online at URL https://ec.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
227
+ page_content='europa.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
228
+ page_content='eu/eurostat/statistics-explained/index.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
229
+ page_content='php?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
230
+ page_content='title=ICT specialists in em- ployment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
231
+ page_content=' CHAPTER 1 [9] Lucia Happe and Barbora Buhnova.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
232
+ page_content=' Frustrations steering women away from software engineering.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
233
+ page_content=' IEEE Software, 39(4):63–69, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
234
+ page_content=' [10] Lucia Happe, Barbora Buhnova, Anne Koziolek, and Ingo Wagner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
235
+ page_content=' Effective measures to foster girls’ interest in secondary computer science education.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
236
+ page_content=' Education and Information Technologies, 26(3):2811–2829, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
237
+ page_content=' [11] Dame Vivian Hunt, Dennis Layton, and Sara Prince.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
238
+ page_content=' Why diversity matters, 2015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
239
+ page_content=' McKinsey.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
240
+ page_content=' Available online at URL https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
241
+ page_content='mckinsey.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
242
+ page_content='com/capabilities/people-and- organizational-performance/our-insights/why-diversity-matters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
243
+ page_content=' [12] Rocio Lorenzo and Martin Reeves.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
244
+ page_content=' How and where diversity drives financial performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
245
+ page_content=' Business Harward Review, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
246
+ page_content=' Available online at URL https://hbr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
247
+ page_content='org/2018/01/how- and-where-diversity-drives-financial-performance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
248
+ page_content=' [13] Minerva Informatics Equality Award.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
249
+ page_content=' Best practices in supporting women, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
250
+ page_content=' Available online at URL https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
251
+ page_content='informatics-europe.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
252
+ page_content='org/society/minerva-informatics-equality- award/best-practices-in-supporting-women.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
253
+ page_content='html.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
254
+ page_content=' [14] Sarah K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
255
+ page_content=' White.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
256
+ page_content=' 19 organizations advancing women in tech, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
257
+ page_content=' Available online at URL https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
258
+ page_content='cio.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
259
+ page_content='com/article/215709/16-organizations-for-women-in-tech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
260
+ page_content='html.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
261
+ page_content=' [15] Hannah Williams.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
262
+ page_content=' Best initiatives for women in tech, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
263
+ page_content=' Available online at URL https://techmonitor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
264
+ page_content='ai/technology/hardware/best-initiatives-women-tech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
265
+ page_content=' Acknowledgement This chapter was made possible thanks to the great dedication and support of the entire Czechitas team.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
266
+ page_content=' Besides, it has been supported by the COST Action CA19122 – European Network for Gender Balance in Informatics (EUGAIN).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
267
+ page_content=' 15' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/H9FLT4oBgHgl3EQfIi9F/content/2301.12000v1.pdf'}
HdE2T4oBgHgl3EQf_Alo/content/tmp_files/2301.04244v1.pdf.txt ADDED
@@ -0,0 +1,470 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Elastic Cash
2
+ Anup Rao
3
+ University of Washington
4
5
+ January 12, 2023
6
+ Abstract
7
+ Elastic Cash is a new decentralized mechanism for regulating the money supply. The mech-
8
+ anism operates by modifying the supply so that an interest rate determined by a public market
9
+ is kept approximately fixed. It can be incorporated into the conventional monetary system to
10
+ improve the elasticity of the US Dollar, and it can be used to design new elastic cryptocurrencies
11
+ that remain decentralized.
12
+ 1
13
+ Introduction
14
+ Money is as old as recorded history, and yet it continues to evolve. Even the mighty US Dollar
15
+ has been repeatedly updated over the last 200 years. The recent emergence of Bitcoin and other
16
+ cryptocurrencies is another step in that evolution, and it prompts us to revisit the mechanisms
17
+ that ensure the desirable properties of money. An important property of money is its elasticity:
18
+ money is elastic if the money supply increases in response to demand. In this work, I present a
19
+ new decentralized mechanism to ensure the elasticity of money.
20
+ The US Dollar is elastic, but it uses a convoluted system to achieve its elasticity. The Dollar
21
+ system was not designed from first principles; it was iteratively amended in response to financial
22
+ crises. Elasticity is currently achieved by the combined actions of many institutions: banks and
23
+ non-banks, public and private, domestic and international. No single entity is entirely in charge
24
+ of the money supply, and a relatively small number of investor-owned institutions have undue
25
+ influence. I discuss the mechanics of the US Dollar system and its limitations in Section 2.
26
+ In contrast, Bitcoin was designed to be inelastic. Bitcoin caps the total possible supply at 21M,
27
+ and the available supply, currently about 19.2M, will slowly increase until it hits this limit. Satoshi
28
+ Nakamoto, the creator of Bitcoin, criticized conventional mechanisms for achieving elasticity in an
29
+ early forum post:
30
+ The root problem with conventional currency is all the trust that’s required to make
31
+ it work. The central bank must be trusted not to debase the currency, but the history
32
+ of fiat currencies is full of breaches of that trust. Banks must be trusted to hold our
33
+ money and transfer it electronically, but they lend it out in waves of credit bubbles with
34
+ barely a fraction in reserve.
35
+ Nakamoto eliminated the need for the kind of infrastructure used to ensure Dollar elasticity by
36
+ simply choosing to make Bitcoin inelastic. Additional technological innovations in Bitcoin further
37
+ eliminated the need for any trusted central authority to carry out transactions.
38
+ 1
39
+ arXiv:2301.04244v1 [q-fin.GN] 10 Jan 2023
40
+
41
+ To illustrate the negative consequences of inelasticity, consider the trajectory of home prices
42
+ denominated in Bitcoin over a long period. As the population grows, the demand for houses is
43
+ sure to grow. Even if the supply of houses keeps pace, home prices must fall, because the supply of
44
+ Bitcoin cannot keep pace. Certainly, if the number of concurrent transactions involving home sales
45
+ grows and the prices of houses remain stable, the amount of Bitcoin involved in these transactions
46
+ would have to grow, yet it cannot grow beyond 21M. So, a fixed money supply leads to falling
47
+ prices in a growing economy, even if the underlying supply and demand of items keep pace with
48
+ each other.
49
+ At the other extreme, if the money supply is increased excessively, the currency is debased; the
50
+ excess supply leads to rising prices and inflation. So, a mechanism for correctly setting the money
51
+ supply is essential, because this is the foundation upon which stable prices are built. As much as
52
+ possible, prices should reflect the tension between the supply and demand for items, and nothing
53
+ else. But how much money is too much? It is not just a matter of trust, the problem is that the
54
+ appropriate supply is difficult for anyone to calculate! Is there a principled method to compute
55
+ the supply, and a fair way to create new money? This work gives my answers to these important
56
+ questions.
57
+ Ideally, a mechanism for achieving elasticity should be transparent.
58
+ It should not rely on
59
+ the judgment or integrity of small groups of people, or a few institutions. I will describe a new
60
+ decentralized mechanism called Elastic Cash that enjoys these features. Elastic Cash can replace
61
+ the role played by private institutions in providing elasticity for the US Dollar, and it can be
62
+ combined with the concept of blockchains to make new cryptocurrencies that are elastic, yet do
63
+ not require any trusted central authority.
64
+ Here I will give a high-level description of Elastic Cash; a full description is in Section 3. I will
65
+ refer to the central bank and the algorithm as cash authorities. At the heart of the mechanism is
66
+ a new financial contract issued by the cash authority called a cashbond, and a public market that
67
+ allows anyone to buy and sell cashbonds using public auctions in the market. Each cashbond can be
68
+ redeemed for $1 on a specific date, so it executes a risk-free loan from the holder of the cashbond to
69
+ the cash authority. The loans are risk-free because the cash authority can always create new money
70
+ to repay the loans. Perhaps it is counterintuitive, but the purpose of the market in cashbonds is
71
+ not to give the cash authority a way to borrow money; instead, the function of the market is to use
72
+ the trading activity of participants to compute the risk-free rate of interest, which can be computed
73
+ from the prices of cashbonds in the market. The mechanism requires that cashbonds can only be
74
+ transfered by selling and buying them in the market. For example, no entity should be permitted
75
+ to use cashbonds as collateral to borrow money. This forces participants to liquidate cashbonds
76
+ when they need money, and keeps the mechanism informed about the demands for money.
77
+ It is market participants that determine the money supply in Elastic Cash.
78
+ The supply is
79
+ increased or decreased according to transparent rules ensuring that the risk-free rate of interest
80
+ remains approximately fixed. Trade in cashbonds leads to fluctuations in the rate of interest, and
81
+ the mechanism responds by creating corresponding fluctuations in the money supply. Intuitively,
82
+ the risk-free rate of interest encodes the cost of renting money. By regulating the supply of money to
83
+ keep the cost fixed, the mechanism ensures that the supply stays in equilibrium with the demand for
84
+ liquidity. When the supply is increased, market participants acquire any newly-generated money.
85
+ The supply is decreased by incentivizing market participants to exchange their money for cashbonds.
86
+ Anyone can participate in this market, and money is distributed to or taken from participants
87
+ according to transparent rules, so no single entity can control the flow of money.
88
+ 2
89
+
90
+ Source: Board of Governors of the Federal Reserve System (US)
91
+ fred.stlouisfed.org
92
+ Billions of Dollars
93
+ 1960
94
+ 1970
95
+ 1980
96
+ 1990
97
+ 2000
98
+ 2010
99
+ 2020
100
+ 0
101
+ 4,000
102
+ 8,000
103
+ 12,000
104
+ 16,000
105
+ 20,000
106
+ 24,000
107
+ M2
108
+ Figure 1: M2, a measure of the supply of US Dollars
109
+ Elastic Cash can be implemented within the framework of conventional currencies like the US
110
+ Dollar by creating regulations that require the central bank to implement the market for cashbonds
111
+ and generate money according to the rules of the mechanism.
112
+ It can be implemented in the
113
+ framework of cryptocurrencies by setting up a distributed algorithm to implement the market for
114
+ cashbonds using the blockchain. Money is generated by the algorithm according to the rules of the
115
+ mechanism. So, one can obtain the positive features of traditional currencies and cryptocurrencies
116
+ in addition to the elasticity of Elastic Cash.
117
+ Outline of this paper
118
+ In Section 2, I give more details about how the US Dollar achieves its
119
+ current elasticity, before turning to describe the new mechanism in Section 3. I discuss how the new
120
+ mechanism can be incorporated into the Dollar system in Section 4 and how it can be implemented
121
+ on the blockchain to give new cryptocurrencies in Section 7.
122
+ 2
123
+ US Dollar elasticity: the Fed, banks, and shadow banks
124
+ Figure 1 shows how the supply of US Dollars held as deposits has changed over time. In this section
125
+ I briefly review the history and mechanics of the US Dollar system. I recommend the following
126
+ 3
127
+
128
+ 二Dexcellent sources for additional background on the history of the Dollar system [1, 4], and the book
129
+ [2] for a longer history of the technology of money.
130
+ The supply of US Dollars has consistently been deemed too important to be left entirely in
131
+ the control of a government agency. Instead, we have developed a system where money is created
132
+ by investor-owned private entities. These include banks and so-called shadow banks — non-bank
133
+ financial institutions that are able to create Dollars. This privately created money is then back-
134
+ stopped by the central bank, which is the Federal Reserve, or Fed in the US. The Fed is governed
135
+ by laws written by Congress, but these laws are somewhat ambiguous about the Fed’s powers, and
136
+ Congress has repeatedly made adjustments. The Fed has responded to various crises by incentiviz-
137
+ ing or directly making big changes to the money supply, and by sometimes deciding that a new
138
+ category of privately-issued financial instruments can be exchanged for US Dollars.
139
+ At this point, there are at least four kinds of financial institutions that are able to generate
140
+ financial instruments that are de facto US Dollars. It is helpful to view the evolution of the US
141
+ Dollar system according to the events that elevated these instruments to the stature of US Dollars:
142
+ Commercial bank deposits By the early 1900s, deposits of US Dollars were being issued by
143
+ a number of investor-owned private banks.
144
+ These deposits were treated by depositors as
145
+ equivalent to US Dollars, even though the banks were issuing loans by creating deposits that
146
+ did not correspond to cash reserves. This led to a run on the banks in 1907, and the Fed was
147
+ created in 1913 to solve the problem. The Fed was given the power to backstop the money
148
+ created by commercial banks by lending to the banks. This meant that deposits could always
149
+ be exchanged for money created by the Fed. This solved the problem of bank runs, but also
150
+ elevated bank deposits to the stature of cash issued by the Fed, and effectively meant that
151
+ commercial banks were given the authority to create legitimate US Dollars in the process of
152
+ issuing loans. Currently, about $17T is held in commercial bank deposits.
153
+ Reverse purchase agreements (repos) In the 1950s, broker dealers began to enter the banking
154
+ industry using a financial instrument called reverse purchase agreements, or repo. Repos allow
155
+ dealers to borrow money from cash providers using government securities as collateral. Cash
156
+ providers began to treat the repos they had purchased from dealers as equivalent to cash.
157
+ By itself, such an arrangement does not create any new money, because if repos crash in
158
+ value, then they cannot actually be exchanged for cash. However, the properties of repos
159
+ were substantially altered when the Fed decided to backstop dealers by giving them access to
160
+ overnight loans. This meant that the private holders of repos were guaranteed that repos could
161
+ always be exchanged for US Dollars via the Fed’s repo facility, and so repos were elevated to
162
+ the same stature as cash and bank deposits. In 1991, Congress reduced restrictions on the
163
+ Fed to make it even easier to backstop the repo market. Effectively, broker dealers were given
164
+ the power to create new US Dollars. Currently, the size of the repo market is about $4T.
165
+ Eurodollars Foreign companies including both banks and non-banks (e.g. insurance companies)
166
+ have been issuing financial instruments called eurodollars that can be redeemed for US Dollars.
167
+ These eurodollars were not initially backed by actual Dollars. The oil shock of 1973-1974 led
168
+ to problems in the eurodollar market that eventually brought down a domestic US bank. The
169
+ Fed responded by promising to backstop eurodollars by providing actual US Dollars in the
170
+ form of loans to the corresponding foreign central banks. Effectively, the Fed permitted the
171
+ banking systems of other countries to create deposits that could be exchanged for US Dollars.
172
+ The size of the eurodollar market was estimated at about $13T in 2016 [3].
173
+ 4
174
+
175
+ Money market mutual funds These funds emerged in the 1970s as investments whose share
176
+ price was pegged at $1. In reality, these funds held assets whose value could drop below the
177
+ peg, and so it was not possible to guarantee the peg during a financial crisis. In response
178
+ to the great financial crisis of 2008, the Fed began to backstop these funds using its Money
179
+ Market Mutual Fund Liquidity Facility, and so elevated deposits in these funds to the stature
180
+ of US Dollars. Total assets in these funds is about $4.8T.
181
+ In addition to recognizing new forms of the US Dollar, the Fed has resorted to buying assets
182
+ in order to inject liquidity under the Quantitative Easing program. During the Great Financial
183
+ Crisis of 2008, the Fed kicked off this program by buying mortgage backed securities and treasuries,
184
+ which are loans to the US Treasury. Throughout the last decade, the Fed has continued to expand
185
+ its balance sheet, mostly with treasuries. In 2020 the Fed once again bought significant quantities
186
+ of these assets. Currently the Fed holds about $8.5T on its balance sheet.
187
+ The history of the US Dollar is full of ad hoc amendments to maintain stability in the face of
188
+ financial crises. At its heart, the problem is that there is currently no principled way to regulate
189
+ the supply of money. This becomes apparent during times of financial crises, but the imbalance in
190
+ supply is probably always brewing, even in normal times. By now, the pattern of Fed actions is
191
+ familiar, and it is inevitable that it will repeat. During times of crisis, the Fed must act to protect
192
+ money or face a significant crash in the entire system. Because private financial institutions know
193
+ that the Fed will protect their financial instruments from the most negative consequences of their
194
+ choices, they do not have the correct incentives.
195
+ Elastic Cash is meant to provide a clean, transparent, and principled mechanism to achieve
196
+ robust elasticity.
197
+ We do not need to cede control of the money supply to private institutions
198
+ or foreign banks. We do not need to elevate invented forms of money to the stature of the US
199
+ Dollar. Once Elastic Cash is adopted, I believe we can safely bar all private creation of Dollars.
200
+ The mechanism will generate new US Dollars when required, and financial institutions can obtain
201
+ liquidity by participating in the mechanism, just like everyone else.
202
+ Extricating ourselves from the current system and its vested interests is likely to be challenging,
203
+ to say the least. Nevertheless, I describe a path to incorporating the new mechanism in Section 4.
204
+ 3
205
+ Elastic Cash: the details
206
+ Elastic Cash uses trade in cashbonds to determine a risk-free rate of interest. The money supply
207
+ is regulated to ensure that this interest rate remains approximately fixed. Cashbonds are issued
208
+ by the central bank (in the case of conventional currencies) or by the distributed algorithm (in the
209
+ case of cryptocurrencies). I refer to these entities as cash authorities.
210
+ The contract cashbond(d) promises that the cash authority will pay the holder of the contract $1
211
+ on the date d. Let us reserve d0 to denote the current date. On date d0, the cash authority pays each
212
+ holder of cashbond(d0) $1, and these contracts expire. Elastic Cash requires that the cash authority
213
+ implement a public market in cashbonds. On the date d0, contracts of the type cashbond(d) for
214
+ d > d0 will be available in the market for cashbonds maintained by the cash authority.
215
+ Cashbonds are a special class of asset, and they should not be treated like other securities.
216
+ Elastic Cash requires that cashbonds can be generated and traded only in the public market that
217
+ is administered by the cash authority. Cashbonds are not transferable, meaning they cannot be
218
+ exchanged outside of the public market, and they cannot be used as collateral for loans. Because of
219
+ 5
220
+
221
+ these restrictions, cashbonds cannot themselves play the same role as money. The purpose of these
222
+ rules is to ensure that holders of cashbonds that desire liquidity will sell their cashbonds in the
223
+ market and so keep the mechanism informed about the demand for liquidity. For the same reasons,
224
+ trade in cashbonds should not be taxed. The transactions of buying and selling cashbonds should
225
+ be viewed as similar to transactions that move money between savings accounts paying varying
226
+ rates of interest, and treated similarly under the law.
227
+ 3.1
228
+ Risk-free rate of interest
229
+ The price at which cashbonds trade implies interest rates for risk-free loans of varying durations.
230
+ Let rate(t) denote the interest rate for duration t. Let us write price(d) to denote the price at which
231
+ cashbond(d) last traded in the market. Then, if the current date is d0, the prices of cashbonds can
232
+ be used to compute implied interest rates according to the formula:
233
+ price(t + d0) · (1 + rate(t))t = 1,
234
+ which implies that the interest rate can be expressed as
235
+ rate(t) = price(t + d0)− 1
236
+ t − 1.
237
+ Because the loans executed by cashbonds are risk-free, the values rate(t) capture something about
238
+ the market’s belief about the opportunity cost of making risk-free loans for duration t. Generally,
239
+ one would expect rate(t) to be a monotone function of t, meaning that rate(t) > rate(t′) if t > t′,
240
+ because loans of longer duration usually command higher interest rates. Moreover, if t is much
241
+ larger than t′, then we might expect rate(t) to have higher variance than rate(t′), because predictions
242
+ about the distant future can diverge much more than predictions about the immediate future.
243
+ These rates encode important information about the demand for liquidity. The goal of the
244
+ mechanism is to regulate the money supply so that one of these rates is held approximately fixed.
245
+ It makes the most sense to pick a rate for a relatively short duration, because these rates are likely
246
+ to have the least variance. With that in mind, let τ denote a short time period, say 1 week. The
247
+ goal of the mechanism will be to keep
248
+ rate(τ) ≈ 0.02.
249
+ There is nothing special about 0.02, except that it is convention for central banks around the world
250
+ to use 2% as the target rate of longterm inflation.
251
+ Let us set
252
+ p− = (1 + 0.021)−τ,
253
+ and
254
+ p+ = (1 + 0.019)−τ.
255
+ The goal of the mechanism will be to regulate the money supply so that
256
+ p− ≤ price(τ + d0) ≤ p+,
257
+ where again d0 is the current date. This corresponds to keeping
258
+ 0.019 ≤ rate(τ) ≤ 0.021.
259
+ 6
260
+
261
+ 3.2
262
+ Using the market to regulate the money supply
263
+ Participants in the cashbond market can put in orders to sell a specific number of cashbonds that
264
+ they hold at a specific price, and can also put in orders to buy a specific number of cashbond(d)
265
+ at a specific price. The cash authority acts as a market maker to match buy orders to sell orders
266
+ and so conduct transactions at a specific price between market participants. Ideally, the market
267
+ for cashbonds will support auctions1 for sellers to sell their cashbonds when needed.
268
+ The cash authority will itself participate in this public market by buying and selling cash bonds
269
+ in prescribed ways. The goal of the mechanism is to maintain rate(τ) approximately fixed, and to
270
+ keep the market in cashbonds sufficiently liquid, so that the money supply can be quickly adjusted
271
+ based on changes to rate(τ). Here is the proposed scheme for buying and selling cashbonds:
272
+ 1. The cash authority will buy and sell cashbonds to keep rate(τ) ≈ 0.02. The cash authority
273
+ will place a standing order to buy an infinite number of contracts cashbond(τ + d0) at price
274
+ p−, and a separate standing order to sell an infinite number of cashbond(τ + d0) contracts at
275
+ price p+.
276
+ Because the cash authority is able to generate arbitrary amounts of both money and cash-
277
+ bonds, it will always be able to satisfy any of the resulting transactions. This ensures that
278
+ p− ≤ price(τ + d0) ≤ p+,
279
+ as discussed above.
280
+ 2. When cashbonds are redeemed for money, the cash authority will need to sell new cashbonds
281
+ to restore the balance between money and cashbonds.
282
+ It makes sense to pick a particular target distribution on outstanding cashbonds that is
283
+ maintained during normal times. If the current date is d0, we say that cashbond(δ + d0) has
284
+ duration δ. For example, the cash authority might aim to maintain the invariant that at any
285
+ point in time, 1/4 of the outstanding cashbonds have duration between 0 and 1 month, 1/4
286
+ have duration between 1 month and 1 year, 1/4 have duration between 1 year and 4 years,
287
+ and 1/4 have duration between 4 years and 10 years.2.
288
+ Given such a target distribution, the redeemed cashbonds should be replaced by selling new
289
+ cashbonds at auction, picking the dates of the new cashbonds so that the overall distribution
290
+ on duration is maintained as much as possible.
291
+ 3. When the demand for money is high, we are likely to reach the point where all of the available
292
+ bonds cashbond(τ + d0) have been purchased by the cash authority.
293
+ In such times, the
294
+ mechanism has run out of the means to inject money into the financial system at a fast enough
295
+ pace according to rule 1. This can be resolved by selling large quantities of cashbond(2τ +d0)
296
+ contracts at auction in the market. Market participants will be incentivized to buy these
297
+ cashbonds and then sell them back after time τ; at that time the cash authority itself will
298
+ be willing to buy the cashbonds at price p−. The net effect will be to inject money into the
299
+ system, while preserving the number of outstanding cashbonds.
300
+ 1I will not commit to a specific style of auction here, though any implementation must carefully specifying how
301
+ the cash authority behaves as a market maker and what the rules of the auctions are.
302
+ 2There are many considerations for how to choose the target distribution, but here I will not dwell on the choices
303
+ too much.
304
+ 7
305
+
306
+ The number of cashbonds sold in this process is a design choice. The goal should be inject
307
+ significant liquidity, so I would favor an exponentially escalating volume of sales. For exam-
308
+ ple, the cash authority might first sell a quantity that corresponds to 1% of all outstanding
309
+ cashbonds, and a week later escalate it to 2%, then 4%, and so on until the cashbond market
310
+ returns to the state where market participants are no longer willing to sell back the cash-
311
+ bonds of duration τ to the cash authority at p−. These actions may temporarily distort the
312
+ distribution on the durations of outstanding cashbonds, but the distribution will be quickly
313
+ restored when the new cashbonds are redeemed and rule 2 is applied.
314
+ An actual implementation of Elastic Cash would need to resolve many smaller technical details.
315
+ Let me now make a few comments and observations about the Elastic Cash mechanism as I have
316
+ defined it.
317
+ 3.3
318
+ Discussion
319
+ Elastic Cash is quite different from a system where the central bank simply allows deposits for
320
+ all with interest rate 2%—such a scheme does not give the central bank a method to inject large
321
+ amounts of money when the liquidity is needed. History has shown that the Fed needs a tool like
322
+ Elastic Cash to inject liquidity into the financial system, since interest rates have proven too weak
323
+ as a tool to inject large quantities of liquidity. As we discussed in Section 2, this has led to the
324
+ Fed buying assets or propping up assets that were liable to crash in value. In doing so, the Fed
325
+ is forced to pick and choose between market participants that get first access to the new liquidity
326
+ that it provides.
327
+ Central bankers should not be attempting to directly reason about the demands for liquidity;
328
+ they do not have enough data to make those decisions. But if they must take such dramatic actions,
329
+ the scheme of Elastic Cash at the very least gives a fair way to do it by trading cashbonds along
330
+ the lines I have suggested above. This removes the ability of the finance sector to control the flow
331
+ of the new money. It is also preferable to having the Fed buy treasuries, because it disentangles the
332
+ actions of the Fed from the needs of the Treasury. There is no need to tie increases in the money
333
+ supply to increases in government spending.
334
+ Cashbonds should not be confused with conventional government securities like US treasuries.
335
+ These instruments are significantly different from each other, and one cannot make inferences about
336
+ the cashbond market, which does not yet exist, based on the behavior of the US treasury market. Let
337
+ me highlight some key differences. The issuance of cashbonds is controlled by strict and transparent
338
+ rules, and is not tied to the spending of the US government. There is no analogue of debt ceilings,
339
+ or any chance that the central bank will default. Cashbonds cannot be used as collateral for loans,
340
+ cannot be transferred outside of the Elastic Cash market, and trade in cashbonds is not taxed.
341
+ It is important for the functioning of Elastic Cash to maintain a large volume of outstanding
342
+ cashbonds of varying durations. Ideally, we would like there to be broad participation in the cash-
343
+ bond market from all kinds of financial entities: banks, companies, pension funds, and individuals.
344
+ Because these participants will be willing to trade at different durations, participation will be in-
345
+ creased if a wide range of durations are available, and the market is liquid at all durations. Even
346
+ though the cash authority only regulates the interest rate for duration τ, this action will affect the
347
+ rates for all durations. One would expect that banks and other sophisticated players will trade
348
+ cashbonds of shorter duration, and perform the arbitrage necessary for information about demands
349
+ for liquidity of all durations to propagate to the shorter durations. I suspect that there is a prin-
350
+ 8
351
+
352
+ cipled way to choose the ideal distribution on durations of outstanding cashbonds, but I have not
353
+ yet been able to convince myself about what it ought to be.
354
+ 4
355
+ Adopting Elastic Cash in the US Dollar system
356
+ As discussed in Section 2, the Dollar system involves many different kinds of institutions that are
357
+ currently creating instruments that can be exchanged for US Dollars. Changing the system is not
358
+ going to be straightforward.
359
+ However, I do believe that there is a path to making the change
360
+ somewhat gradually, so that all the parties involved have time to adapt to the new system. Here
361
+ is a proposed sequence of steps to adopting Elastic Cash for the US Dollar:
362
+ 1. The Fed begins to populate the cashbond market by gradually selling cashbonds of varying
363
+ duration. Cashbonds are held at accounts maintained by the Fed, which allows the Fed to
364
+ enforce that cashbonds cannot be transferred outside the cashbond market. At this point,
365
+ cashbonds that expire are replaced according to the rules of Elastic Cash, but the risk-free
366
+ rate of interest is allowed to float freely. I would expect this floating rate to converge close to
367
+ the current Fed funds rate.
368
+ 2. Once the market for cashbonds is running at significant scale, regulations should be enacted to
369
+ curtail the private creation of US Dollars. This can be done gradually by raising the interest
370
+ rate at which the Fed lends to private entities through its discount window. At the same
371
+ time, the Fed should begin to put bounds on the risk-free rate determined by cashbond, by
372
+ trading in the cashbond market. Eventually, we should end up with a high rate for borrowing
373
+ from the Fed via the discount window, while the risk-free rate in the cashbond market should
374
+ be close to 2%. This will incentivize private entities to participate in the cashbond market
375
+ and raise money there. The current creators of US Dollars can be handled as follows:
376
+ (a) Commercial banks should be barred from creating new deposits that are not backed
377
+ by cash reserves. Banks should fund new lending activity by selling corporate bonds
378
+ instead.
379
+ (b) The Fed’s repo facility and money market fund facility should be closed.
380
+ (c) The eurodollar market is, perhaps, a bigger problem, both because of its size and the fact
381
+ that the institutions cannot be regulated by US law. Still, the Fed can wind down its
382
+ swap lines with foreign central banks gradually, until eurodollars lose their Fed backing.
383
+ Foreign central banks and governments should be allowed and encouraged to participate
384
+ in the cashbond market to obtain liquidity.
385
+ 3. The inevitable tantrums in the financial sector should be treated with stoicism.
386
+ It is an understatement that moving from our current system of private money creation to
387
+ Elastic Cash would be a dramatic change. There are likely to be many challenges that need to
388
+ be overcome to implement it, not least the resistance of the finance industry, whose raison d’ˆetre
389
+ is to control the flow of money. Elastic Cash represents a significant loss of control for financial
390
+ firms, and a democratization of the flow of money. For these reasons, it is perhaps more easily
391
+ implemented in a cryptocurrency, as I discuss next.
392
+ 9
393
+
394
+ 5
395
+ Elastic Cash in cryptocurrencies
396
+ A major advantage of Elastic Cash over conventional mechanisms for elasticity is that it can be
397
+ implemented in a truly decentralized way, without any trusted central authority. Bitcoin made
398
+ a technological leap when it introduced the concept of a blockchain.
399
+ Since then, a number of
400
+ cryptocurrencies have emerged, with different ways to implement the blockchain. Any of these
401
+ systems can be used to implement Elastic Cash, so here I will keep the discussion at a high level, only
402
+ talking about how the blockchain can be utilized. Because Elastic Cash involves making significant
403
+ changes to the money supply, I do believe that implementing it requires new cryptocurrencies. I
404
+ do not think it can be implemented using a layer built on top of Bitcoin, for example.
405
+ Here is how one can implement Elastic Cash on a blockchain at a high level:
406
+ 1. At any point in time, each user of the cryptocurrency is known to hold some amount of money,
407
+ as well as various cashbonds.
408
+ 2. Users of the currency can announce transactions of money, as well as orders placed in the
409
+ cashbond market. The orders can be placed with a specific expiry date.
410
+ 3. Miners will add both money transactions and orders in the cashbond market to the next block
411
+ of the blockchain. To implement the market in cashbonds:
412
+ (a) Miners will act as market makers to map buy orders to sell orders and so execute the
413
+ trade in cashbonds. There are some subtle issues that need to be addressed here. For
414
+ example, a miner may be incentivized to pick some orders over others to include on
415
+ the blockchain, and choose to ignore some orders when acting as a market maker. In
416
+ particular, miners should themselves be paid the spread between buy and sell orders as
417
+ a transaction fee to carry out their market making function. This removes the incentives
418
+ to manipulate the orders that are added to the most recent block.
419
+ (b) Miners will also execute the algorithm to simulate the activities of the cash authority in
420
+ the cashbond market. New money and cashbonds will be created according to the rules
421
+ of the mechanism, and these will be traded with users based on the orders that have
422
+ been added to the blockchain.
423
+ 6
424
+ Conclusions and Questions
425
+ It is an exciting time to think about the technology of money. The US Dollar is experiencing a
426
+ once-in-a-lifetime contraction (see Figure 1), and the demands for a stable global currency have
427
+ never been larger. Elastic Cash is a broad scheme to enable elastic money. I have purposefully
428
+ left the mechanism underspecified, because I believe that more work is required to understand the
429
+ details and trade-offs involved in the particulars of the mechanism.
430
+ Here are some important questions that I feel remain unanswered:
431
+ 1. How should the market maker behave in the cashbond market? In the context of conventional
432
+ currencies, can private entities function as market makers? In the context of cryptocurrencies,
433
+ how should the algorithm be set up so that miners do not have an incentive to behave
434
+ dishonestly when they are carrying out the role of market maker?
435
+ 10
436
+
437
+ 2. What style of auction would give the best results for the cashbond market?
438
+ 3. What is the ideal target distribution on cashbonds? If the cashbonds are concentrated on
439
+ very short durations, this gives the most power for the mechanism to inject large quantities
440
+ of money, but it also means that the market loses information about the demand for liquidity
441
+ over long durations.
442
+ So, there is a trade-off between various choices for distributions on
443
+ durations.
444
+ 4. How can we gradually transition the current US Dollar system to such a mechanism? The
445
+ steps I discussed in Section 4 are likely to be difficult to execute. Perhaps there is a way
446
+ to use cashbonds and incentivize the large players in the financial system to adopt Elastic
447
+ Cash without being forced to do it. What is needed is a mechanism to transition to the new
448
+ mechanism!
449
+ 5. How should we expect the free floating rate curve rate(t) to behave as a function of t during
450
+ normal times? I would expect this function to be monotone, but I am not sure how to reason
451
+ about it beyond that.
452
+ 7
453
+ Acknowledgements
454
+ Thanks to Paul Beame, Siddharth Iyer, Travis Kriplean, James Lee, Noam Nisan, Darcy Rao,
455
+ Eli Ben-Sasson, Oscar Sprumont, Michael Whitmeyer and Amir Yehudayoff for many helpful and
456
+ entertaining conversations about money.
457
+ References
458
+ [1] Fed history overview. https://www.federalreservehistory.org/time-period.
459
+ [2] Christine Desan.
460
+ Making Money: Coin, Currency, and the Coming of Capitalism.
461
+ Oxford
462
+ University Press, 2014.
463
+ [3] Neels Heyneke and Mehul Daya.
464
+ The rise and fall of the eurodollar system.
465
+ https:
466
+ //www.nedbank.co.za/content/dam/nedbank-crp/reports/Strategy/NeelsAndMehul/
467
+ 2016/September/TheRiseAndFallOfTheEurodollarSystem_160907.pdf, 2016.
468
+ [4] Lev Menand. The Fed-Unbound: Central Banking in a Time of Crisis. 2022.
469
+ 11
470
+
HdE2T4oBgHgl3EQf_Alo/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,312 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf,len=311
2
+ page_content='Elastic Cash Anup Rao University of Washington anuprao@cs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
3
+ page_content='washington.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
4
+ page_content='edu January 12, 2023 Abstract Elastic Cash is a new decentralized mechanism for regulating the money supply.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
5
+ page_content=' The mech- anism operates by modifying the supply so that an interest rate determined by a public market is kept approximately fixed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
6
+ page_content=' It can be incorporated into the conventional monetary system to improve the elasticity of the US Dollar, and it can be used to design new elastic cryptocurrencies that remain decentralized.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
7
+ page_content=' 1 Introduction Money is as old as recorded history, and yet it continues to evolve.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
8
+ page_content=' Even the mighty US Dollar has been repeatedly updated over the last 200 years.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
9
+ page_content=' The recent emergence of Bitcoin and other cryptocurrencies is another step in that evolution, and it prompts us to revisit the mechanisms that ensure the desirable properties of money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
10
+ page_content=' An important property of money is its elasticity: money is elastic if the money supply increases in response to demand.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
11
+ page_content=' In this work, I present a new decentralized mechanism to ensure the elasticity of money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
12
+ page_content=' The US Dollar is elastic, but it uses a convoluted system to achieve its elasticity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
13
+ page_content=' The Dollar system was not designed from first principles;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
14
+ page_content=' it was iteratively amended in response to financial crises.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
15
+ page_content=' Elasticity is currently achieved by the combined actions of many institutions: banks and non-banks, public and private, domestic and international.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
16
+ page_content=' No single entity is entirely in charge of the money supply, and a relatively small number of investor-owned institutions have undue influence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
17
+ page_content=' I discuss the mechanics of the US Dollar system and its limitations in Section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
18
+ page_content=' In contrast, Bitcoin was designed to be inelastic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
19
+ page_content=' Bitcoin caps the total possible supply at 21M, and the available supply, currently about 19.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
20
+ page_content='2M, will slowly increase until it hits this limit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
21
+ page_content=' Satoshi Nakamoto, the creator of Bitcoin, criticized conventional mechanisms for achieving elasticity in an early forum post: The root problem with conventional currency is all the trust that’s required to make it work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
22
+ page_content=' The central bank must be trusted not to debase the currency, but the history of fiat currencies is full of breaches of that trust.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
23
+ page_content=' Banks must be trusted to hold our money and transfer it electronically, but they lend it out in waves of credit bubbles with barely a fraction in reserve.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
24
+ page_content=' Nakamoto eliminated the need for the kind of infrastructure used to ensure Dollar elasticity by simply choosing to make Bitcoin inelastic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
25
+ page_content=' Additional technological innovations in Bitcoin further eliminated the need for any trusted central authority to carry out transactions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
26
+ page_content=' 1 arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
27
+ page_content='04244v1 [q-fin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
28
+ page_content='GN] 10 Jan 2023 To illustrate the negative consequences of inelasticity, consider the trajectory of home prices denominated in Bitcoin over a long period.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
29
+ page_content=' As the population grows, the demand for houses is sure to grow.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
30
+ page_content=' Even if the supply of houses keeps pace, home prices must fall, because the supply of Bitcoin cannot keep pace.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
31
+ page_content=' Certainly, if the number of concurrent transactions involving home sales grows and the prices of houses remain stable, the amount of Bitcoin involved in these transactions would have to grow, yet it cannot grow beyond 21M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
32
+ page_content=' So, a fixed money supply leads to falling prices in a growing economy, even if the underlying supply and demand of items keep pace with each other.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
33
+ page_content=' At the other extreme, if the money supply is increased excessively, the currency is debased;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
34
+ page_content=' the excess supply leads to rising prices and inflation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
35
+ page_content=' So, a mechanism for correctly setting the money supply is essential, because this is the foundation upon which stable prices are built.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
36
+ page_content=' As much as possible, prices should reflect the tension between the supply and demand for items, and nothing else.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
37
+ page_content=' But how much money is too much?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
38
+ page_content=' It is not just a matter of trust, the problem is that the appropriate supply is difficult for anyone to calculate!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
39
+ page_content=' Is there a principled method to compute the supply, and a fair way to create new money?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
40
+ page_content=' This work gives my answers to these important questions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
41
+ page_content=' Ideally, a mechanism for achieving elasticity should be transparent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
42
+ page_content=' It should not rely on the judgment or integrity of small groups of people, or a few institutions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
43
+ page_content=' I will describe a new decentralized mechanism called Elastic Cash that enjoys these features.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
44
+ page_content=' Elastic Cash can replace the role played by private institutions in providing elasticity for the US Dollar, and it can be combined with the concept of blockchains to make new cryptocurrencies that are elastic, yet do not require any trusted central authority.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
45
+ page_content=' Here I will give a high-level description of Elastic Cash;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
46
+ page_content=' a full description is in Section 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
47
+ page_content=' I will refer to the central bank and the algorithm as cash authorities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
48
+ page_content=' At the heart of the mechanism is a new financial contract issued by the cash authority called a cashbond, and a public market that allows anyone to buy and sell cashbonds using public auctions in the market.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
49
+ page_content=' Each cashbond can be redeemed for $1 on a specific date, so it executes a risk-free loan from the holder of the cashbond to the cash authority.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
50
+ page_content=' The loans are risk-free because the cash authority can always create new money to repay the loans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
51
+ page_content=' Perhaps it is counterintuitive, but the purpose of the market in cashbonds is not to give the cash authority a way to borrow money;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
52
+ page_content=' instead, the function of the market is to use the trading activity of participants to compute the risk-free rate of interest, which can be computed from the prices of cashbonds in the market.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
53
+ page_content=' The mechanism requires that cashbonds can only be transfered by selling and buying them in the market.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
54
+ page_content=' For example, no entity should be permitted to use cashbonds as collateral to borrow money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
55
+ page_content=' This forces participants to liquidate cashbonds when they need money, and keeps the mechanism informed about the demands for money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
56
+ page_content=' It is market participants that determine the money supply in Elastic Cash.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
57
+ page_content=' The supply is increased or decreased according to transparent rules ensuring that the risk-free rate of interest remains approximately fixed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
58
+ page_content=' Trade in cashbonds leads to fluctuations in the rate of interest, and the mechanism responds by creating corresponding fluctuations in the money supply.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
59
+ page_content=' Intuitively, the risk-free rate of interest encodes the cost of renting money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
60
+ page_content=' By regulating the supply of money to keep the cost fixed, the mechanism ensures that the supply stays in equilibrium with the demand for liquidity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
61
+ page_content=' When the supply is increased, market participants acquire any newly-generated money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
62
+ page_content=' The supply is decreased by incentivizing market participants to exchange their money for cashbonds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
63
+ page_content=' Anyone can participate in this market, and money is distributed to or taken from participants according to transparent rules, so no single entity can control the flow of money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
64
+ page_content=' 2 Source: Board of Governors of the Federal Reserve System (US) fred.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
65
+ page_content='stlouisfed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
66
+ page_content='org Billions of Dollars 1960 1970 1980 1990 2000 2010 2020 0 4,000 8,000 12,000 16,000 20,000 24,000 M2 Figure 1: M2, a measure of the supply of US Dollars Elastic Cash can be implemented within the framework of conventional currencies like the US Dollar by creating regulations that require the central bank to implement the market for cashbonds and generate money according to the rules of the mechanism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
67
+ page_content=' It can be implemented in the framework of cryptocurrencies by setting up a distributed algorithm to implement the market for cashbonds using the blockchain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
68
+ page_content=' Money is generated by the algorithm according to the rules of the mechanism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
69
+ page_content=' So, one can obtain the positive features of traditional currencies and cryptocurrencies in addition to the elasticity of Elastic Cash.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
70
+ page_content=' Outline of this paper In Section 2, I give more details about how the US Dollar achieves its current elasticity, before turning to describe the new mechanism in Section 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
71
+ page_content=' I discuss how the new mechanism can be incorporated into the Dollar system in Section 4 and how it can be implemented on the blockchain to give new cryptocurrencies in Section 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
72
+ page_content=' 2 US Dollar elasticity: the Fed, banks, and shadow banks Figure 1 shows how the supply of US Dollars held as deposits has changed over time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
73
+ page_content=' In this section I briefly review the history and mechanics of the US Dollar system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
74
+ page_content=' I recommend the following 3 二Dexcellent sources for additional background on the history of the Dollar system [1, 4], and the book [2] for a longer history of the technology of money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
75
+ page_content=' The supply of US Dollars has consistently been deemed too important to be left entirely in the control of a government agency.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
76
+ page_content=' Instead, we have developed a system where money is created by investor-owned private entities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
77
+ page_content=' These include banks and so-called shadow banks — non-bank financial institutions that are able to create Dollars.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
78
+ page_content=' This privately created money is then back- stopped by the central bank, which is the Federal Reserve, or Fed in the US.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
79
+ page_content=' The Fed is governed by laws written by Congress, but these laws are somewhat ambiguous about the Fed’s powers, and Congress has repeatedly made adjustments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
80
+ page_content=' The Fed has responded to various crises by incentiviz- ing or directly making big changes to the money supply, and by sometimes deciding that a new category of privately-issued financial instruments can be exchanged for US Dollars.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
81
+ page_content=' At this point, there are at least four kinds of financial institutions that are able to generate financial instruments that are de facto US Dollars.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
82
+ page_content=' It is helpful to view the evolution of the US Dollar system according to the events that elevated these instruments to the stature of US Dollars: Commercial bank deposits By the early 1900s, deposits of US Dollars were being issued by a number of investor-owned private banks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
83
+ page_content=' These deposits were treated by depositors as equivalent to US Dollars, even though the banks were issuing loans by creating deposits that did not correspond to cash reserves.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
84
+ page_content=' This led to a run on the banks in 1907, and the Fed was created in 1913 to solve the problem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
85
+ page_content=' The Fed was given the power to backstop the money created by commercial banks by lending to the banks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
86
+ page_content=' This meant that deposits could always be exchanged for money created by the Fed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
87
+ page_content=' This solved the problem of bank runs, but also elevated bank deposits to the stature of cash issued by the Fed, and effectively meant that commercial banks were given the authority to create legitimate US Dollars in the process of issuing loans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
88
+ page_content=' Currently, about $17T is held in commercial bank deposits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
89
+ page_content=' Reverse purchase agreements (repos) In the 1950s, broker dealers began to enter the banking industry using a financial instrument called reverse purchase agreements, or repo.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
90
+ page_content=' Repos allow dealers to borrow money from cash providers using government securities as collateral.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
91
+ page_content=' Cash providers began to treat the repos they had purchased from dealers as equivalent to cash.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
92
+ page_content=' By itself, such an arrangement does not create any new money, because if repos crash in value, then they cannot actually be exchanged for cash.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
93
+ page_content=' However, the properties of repos were substantially altered when the Fed decided to backstop dealers by giving them access to overnight loans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
94
+ page_content=' This meant that the private holders of repos were guaranteed that repos could always be exchanged for US Dollars via the Fed’s repo facility, and so repos were elevated to the same stature as cash and bank deposits.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
95
+ page_content=' In 1991, Congress reduced restrictions on the Fed to make it even easier to backstop the repo market.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
96
+ page_content=' Effectively, broker dealers were given the power to create new US Dollars.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
97
+ page_content=' Currently, the size of the repo market is about $4T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
98
+ page_content=' Eurodollars Foreign companies including both banks and non-banks (e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
99
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
100
+ page_content=' insurance companies) have been issuing financial instruments called eurodollars that can be redeemed for US Dollars.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
101
+ page_content=' These eurodollars were not initially backed by actual Dollars.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
102
+ page_content=' The oil shock of 1973-1974 led to problems in the eurodollar market that eventually brought down a domestic US bank.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
103
+ page_content=' The Fed responded by promising to backstop eurodollars by providing actual US Dollars in the form of loans to the corresponding foreign central banks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
104
+ page_content=' Effectively, the Fed permitted the banking systems of other countries to create deposits that could be exchanged for US Dollars.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
105
+ page_content=' The size of the eurodollar market was estimated at about $13T in 2016 [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
106
+ page_content=' 4 Money market mutual funds These funds emerged in the 1970s as investments whose share price was pegged at $1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
107
+ page_content=' In reality, these funds held assets whose value could drop below the peg, and so it was not possible to guarantee the peg during a financial crisis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
108
+ page_content=' In response to the great financial crisis of 2008, the Fed began to backstop these funds using its Money Market Mutual Fund Liquidity Facility, and so elevated deposits in these funds to the stature of US Dollars.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
109
+ page_content=' Total assets in these funds is about $4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
110
+ page_content='8T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
111
+ page_content=' In addition to recognizing new forms of the US Dollar, the Fed has resorted to buying assets in order to inject liquidity under the Quantitative Easing program.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
112
+ page_content=' During the Great Financial Crisis of 2008, the Fed kicked off this program by buying mortgage backed securities and treasuries, which are loans to the US Treasury.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
113
+ page_content=' Throughout the last decade, the Fed has continued to expand its balance sheet, mostly with treasuries.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
114
+ page_content=' In 2020 the Fed once again bought significant quantities of these assets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
115
+ page_content=' Currently the Fed holds about $8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
116
+ page_content='5T on its balance sheet.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
117
+ page_content=' The history of the US Dollar is full of ad hoc amendments to maintain stability in the face of financial crises.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
118
+ page_content=' At its heart, the problem is that there is currently no principled way to regulate the supply of money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
119
+ page_content=' This becomes apparent during times of financial crises, but the imbalance in supply is probably always brewing, even in normal times.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
120
+ page_content=' By now, the pattern of Fed actions is familiar, and it is inevitable that it will repeat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
121
+ page_content=' During times of crisis, the Fed must act to protect money or face a significant crash in the entire system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
122
+ page_content=' Because private financial institutions know that the Fed will protect their financial instruments from the most negative consequences of their choices, they do not have the correct incentives.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
123
+ page_content=' Elastic Cash is meant to provide a clean, transparent, and principled mechanism to achieve robust elasticity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
124
+ page_content=' We do not need to cede control of the money supply to private institutions or foreign banks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
125
+ page_content=' We do not need to elevate invented forms of money to the stature of the US Dollar.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
126
+ page_content=' Once Elastic Cash is adopted, I believe we can safely bar all private creation of Dollars.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
127
+ page_content=' The mechanism will generate new US Dollars when required, and financial institutions can obtain liquidity by participating in the mechanism, just like everyone else.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
128
+ page_content=' Extricating ourselves from the current system and its vested interests is likely to be challenging, to say the least.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
129
+ page_content=' Nevertheless, I describe a path to incorporating the new mechanism in Section 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
130
+ page_content=' 3 Elastic Cash: the details Elastic Cash uses trade in cashbonds to determine a risk-free rate of interest.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
131
+ page_content=' The money supply is regulated to ensure that this interest rate remains approximately fixed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
132
+ page_content=' Cashbonds are issued by the central bank (in the case of conventional currencies) or by the distributed algorithm (in the case of cryptocurrencies).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
133
+ page_content=' I refer to these entities as cash authorities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
134
+ page_content=' The contract cashbond(d) promises that the cash authority will pay the holder of the contract $1 on the date d.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
135
+ page_content=' Let us reserve d0 to denote the current date.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
136
+ page_content=' On date d0, the cash authority pays each holder of cashbond(d0) $1, and these contracts expire.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
137
+ page_content=' Elastic Cash requires that the cash authority implement a public market in cashbonds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
138
+ page_content=' On the date d0, contracts of the type cashbond(d) for d > d0 will be available in the market for cashbonds maintained by the cash authority.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
139
+ page_content=' Cashbonds are a special class of asset, and they should not be treated like other securities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
140
+ page_content=' Elastic Cash requires that cashbonds can be generated and traded only in the public market that is administered by the cash authority.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
141
+ page_content=' Cashbonds are not transferable, meaning they cannot be exchanged outside of the public market, and they cannot be used as collateral for loans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
142
+ page_content=' Because of 5 these restrictions, cashbonds cannot themselves play the same role as money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
143
+ page_content=' The purpose of these rules is to ensure that holders of cashbonds that desire liquidity will sell their cashbonds in the market and so keep the mechanism informed about the demand for liquidity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
144
+ page_content=' For the same reasons, trade in cashbonds should not be taxed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
145
+ page_content=' The transactions of buying and selling cashbonds should be viewed as similar to transactions that move money between savings accounts paying varying rates of interest, and treated similarly under the law.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
146
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
147
+ page_content='1 Risk-free rate of interest The price at which cashbonds trade implies interest rates for risk-free loans of varying durations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
148
+ page_content=' Let rate(t) denote the interest rate for duration t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
149
+ page_content=' Let us write price(d) to denote the price at which cashbond(d) last traded in the market.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
150
+ page_content=' Then, if the current date is d0, the prices of cashbonds can be used to compute implied interest rates according to the formula: price(t + d0) · (1 + rate(t))t = 1, which implies that the interest rate can be expressed as rate(t) = price(t + d0)− 1 t − 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
151
+ page_content=' Because the loans executed by cashbonds are risk-free, the values rate(t) capture something about the market’s belief about the opportunity cost of making risk-free loans for duration t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
152
+ page_content=' Generally, one would expect rate(t) to be a monotone function of t, meaning that rate(t) > rate(t′) if t > t′, because loans of longer duration usually command higher interest rates.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
153
+ page_content=' Moreover, if t is much larger than t′, then we might expect rate(t) to have higher variance than rate(t′), because predictions about the distant future can diverge much more than predictions about the immediate future.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
154
+ page_content=' These rates encode important information about the demand for liquidity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
155
+ page_content=' The goal of the mechanism is to regulate the money supply so that one of these rates is held approximately fixed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
156
+ page_content=' It makes the most sense to pick a rate for a relatively short duration, because these rates are likely to have the least variance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
157
+ page_content=' With that in mind, let τ denote a short time period, say 1 week.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
158
+ page_content=' The goal of the mechanism will be to keep rate(τ) ≈ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
159
+ page_content='02.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
160
+ page_content=' There is nothing special about 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
161
+ page_content='02, except that it is convention for central banks around the world to use 2% as the target rate of longterm inflation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
162
+ page_content=' Let us set p− = (1 + 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
163
+ page_content='021)−τ, and p+ = (1 + 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
164
+ page_content='019)−τ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
165
+ page_content=' The goal of the mechanism will be to regulate the money supply so that p− ≤ price(τ + d0) ≤ p+, where again d0 is the current date.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
166
+ page_content=' This corresponds to keeping 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
167
+ page_content='019 ≤ rate(τ) ≤ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
168
+ page_content='021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
169
+ page_content=' 6 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
170
+ page_content='2 Using the market to regulate the money supply Participants in the cashbond market can put in orders to sell a specific number of cashbonds that they hold at a specific price, and can also put in orders to buy a specific number of cashbond(d) at a specific price.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
171
+ page_content=' The cash authority acts as a market maker to match buy orders to sell orders and so conduct transactions at a specific price between market participants.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
172
+ page_content=' Ideally, the market for cashbonds will support auctions1 for sellers to sell their cashbonds when needed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
173
+ page_content=' The cash authority will itself participate in this public market by buying and selling cash bonds in prescribed ways.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
174
+ page_content=' The goal of the mechanism is to maintain rate(τ) approximately fixed, and to keep the market in cashbonds sufficiently liquid, so that the money supply can be quickly adjusted based on changes to rate(τ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
175
+ page_content=' Here is the proposed scheme for buying and selling cashbonds: 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
176
+ page_content=' The cash authority will buy and sell cashbonds to keep rate(τ) ≈ 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
177
+ page_content='02.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
178
+ page_content=' The cash authority will place a standing order to buy an infinite number of contracts cashbond(τ + d0) at price p−, and a separate standing order to sell an infinite number of cashbond(τ + d0) contracts at price p+.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
179
+ page_content=' Because the cash authority is able to generate arbitrary amounts of both money and cash- bonds, it will always be able to satisfy any of the resulting transactions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
180
+ page_content=' This ensures that p− ≤ price(τ + d0) ≤ p+, as discussed above.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
181
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
182
+ page_content=' When cashbonds are redeemed for money, the cash authority will need to sell new cashbonds to restore the balance between money and cashbonds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
183
+ page_content=' It makes sense to pick a particular target distribution on outstanding cashbonds that is maintained during normal times.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
184
+ page_content=' If the current date is d0, we say that cashbond(δ + d0) has duration δ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
185
+ page_content=' For example, the cash authority might aim to maintain the invariant that at any point in time, 1/4 of the outstanding cashbonds have duration between 0 and 1 month, 1/4 have duration between 1 month and 1 year, 1/4 have duration between 1 year and 4 years, and 1/4 have duration between 4 years and 10 years.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
186
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
187
+ page_content=' Given such a target distribution, the redeemed cashbonds should be replaced by selling new cashbonds at auction, picking the dates of the new cashbonds so that the overall distribution on duration is maintained as much as possible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
188
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
189
+ page_content=' When the demand for money is high, we are likely to reach the point where all of the available bonds cashbond(τ + d0) have been purchased by the cash authority.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
190
+ page_content=' In such times, the mechanism has run out of the means to inject money into the financial system at a fast enough pace according to rule 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
191
+ page_content=' This can be resolved by selling large quantities of cashbond(2τ +d0) contracts at auction in the market.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
192
+ page_content=' Market participants will be incentivized to buy these cashbonds and then sell them back after time τ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
193
+ page_content=' at that time the cash authority itself will be willing to buy the cashbonds at price p−.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
194
+ page_content=' The net effect will be to inject money into the system, while preserving the number of outstanding cashbonds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
195
+ page_content=' 1I will not commit to a specific style of auction here, though any implementation must carefully specifying how the cash authority behaves as a market maker and what the rules of the auctions are.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
196
+ page_content=' 2There are many considerations for how to choose the target distribution, but here I will not dwell on the choices too much.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
197
+ page_content=' 7 The number of cashbonds sold in this process is a design choice.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
198
+ page_content=' The goal should be inject significant liquidity, so I would favor an exponentially escalating volume of sales.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
199
+ page_content=' For exam- ple, the cash authority might first sell a quantity that corresponds to 1% of all outstanding cashbonds, and a week later escalate it to 2%, then 4%, and so on until the cashbond market returns to the state where market participants are no longer willing to sell back the cash- bonds of duration τ to the cash authority at p−.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
200
+ page_content=' These actions may temporarily distort the distribution on the durations of outstanding cashbonds, but the distribution will be quickly restored when the new cashbonds are redeemed and rule 2 is applied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
201
+ page_content=' An actual implementation of Elastic Cash would need to resolve many smaller technical details.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
202
+ page_content=' Let me now make a few comments and observations about the Elastic Cash mechanism as I have defined it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
203
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
204
+ page_content='3 Discussion Elastic Cash is quite different from a system where the central bank simply allows deposits for all with interest rate 2%—such a scheme does not give the central bank a method to inject large amounts of money when the liquidity is needed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
205
+ page_content=' History has shown that the Fed needs a tool like Elastic Cash to inject liquidity into the financial system, since interest rates have proven too weak as a tool to inject large quantities of liquidity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
206
+ page_content=' As we discussed in Section 2, this has led to the Fed buying assets or propping up assets that were liable to crash in value.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
207
+ page_content=' In doing so, the Fed is forced to pick and choose between market participants that get first access to the new liquidity that it provides.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
208
+ page_content=' Central bankers should not be attempting to directly reason about the demands for liquidity;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
209
+ page_content=' they do not have enough data to make those decisions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
210
+ page_content=' But if they must take such dramatic actions, the scheme of Elastic Cash at the very least gives a fair way to do it by trading cashbonds along the lines I have suggested above.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
211
+ page_content=' This removes the ability of the finance sector to control the flow of the new money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
212
+ page_content=' It is also preferable to having the Fed buy treasuries, because it disentangles the actions of the Fed from the needs of the Treasury.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
213
+ page_content=' There is no need to tie increases in the money supply to increases in government spending.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
214
+ page_content=' Cashbonds should not be confused with conventional government securities like US treasuries.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
215
+ page_content=' These instruments are significantly different from each other, and one cannot make inferences about the cashbond market, which does not yet exist, based on the behavior of the US treasury market.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
216
+ page_content=' Let me highlight some key differences.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
217
+ page_content=' The issuance of cashbonds is controlled by strict and transparent rules, and is not tied to the spending of the US government.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
218
+ page_content=' There is no analogue of debt ceilings, or any chance that the central bank will default.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
219
+ page_content=' Cashbonds cannot be used as collateral for loans, cannot be transferred outside of the Elastic Cash market, and trade in cashbonds is not taxed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
220
+ page_content=' It is important for the functioning of Elastic Cash to maintain a large volume of outstanding cashbonds of varying durations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
221
+ page_content=' Ideally, we would like there to be broad participation in the cash- bond market from all kinds of financial entities: banks, companies, pension funds, and individuals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
222
+ page_content=' Because these participants will be willing to trade at different durations, participation will be in- creased if a wide range of durations are available, and the market is liquid at all durations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
223
+ page_content=' Even though the cash authority only regulates the interest rate for duration τ, this action will affect the rates for all durations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
224
+ page_content=' One would expect that banks and other sophisticated players will trade cashbonds of shorter duration, and perform the arbitrage necessary for information about demands for liquidity of all durations to propagate to the shorter durations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
225
+ page_content=' I suspect that there is a prin- 8 cipled way to choose the ideal distribution on durations of outstanding cashbonds, but I have not yet been able to convince myself about what it ought to be.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
226
+ page_content=' 4 Adopting Elastic Cash in the US Dollar system As discussed in Section 2, the Dollar system involves many different kinds of institutions that are currently creating instruments that can be exchanged for US Dollars.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
227
+ page_content=' Changing the system is not going to be straightforward.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
228
+ page_content=' However, I do believe that there is a path to making the change somewhat gradually, so that all the parties involved have time to adapt to the new system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
229
+ page_content=' Here is a proposed sequence of steps to adopting Elastic Cash for the US Dollar: 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
230
+ page_content=' The Fed begins to populate the cashbond market by gradually selling cashbonds of varying duration.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
231
+ page_content=' Cashbonds are held at accounts maintained by the Fed, which allows the Fed to enforce that cashbonds cannot be transferred outside the cashbond market.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
232
+ page_content=' At this point, cashbonds that expire are replaced according to the rules of Elastic Cash, but the risk-free rate of interest is allowed to float freely.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
233
+ page_content=' I would expect this floating rate to converge close to the current Fed funds rate.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
234
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
235
+ page_content=' Once the market for cashbonds is running at significant scale, regulations should be enacted to curtail the private creation of US Dollars.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
236
+ page_content=' This can be done gradually by raising the interest rate at which the Fed lends to private entities through its discount window.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
237
+ page_content=' At the same time, the Fed should begin to put bounds on the risk-free rate determined by cashbond, by trading in the cashbond market.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
238
+ page_content=' Eventually, we should end up with a high rate for borrowing from the Fed via the discount window, while the risk-free rate in the cashbond market should be close to 2%.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
239
+ page_content=' This will incentivize private entities to participate in the cashbond market and raise money there.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
240
+ page_content=' The current creators of US Dollars can be handled as follows: (a) Commercial banks should be barred from creating new deposits that are not backed by cash reserves.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
241
+ page_content=' Banks should fund new lending activity by selling corporate bonds instead.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
242
+ page_content=' (b) The Fed’s repo facility and money market fund facility should be closed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
243
+ page_content=' (c) The eurodollar market is, perhaps, a bigger problem, both because of its size and the fact that the institutions cannot be regulated by US law.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
244
+ page_content=' Still, the Fed can wind down its swap lines with foreign central banks gradually, until eurodollars lose their Fed backing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
245
+ page_content=' Foreign central banks and governments should be allowed and encouraged to participate in the cashbond market to obtain liquidity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
246
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
247
+ page_content=' The inevitable tantrums in the financial sector should be treated with stoicism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
248
+ page_content=' It is an understatement that moving from our current system of private money creation to Elastic Cash would be a dramatic change.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
249
+ page_content=' There are likely to be many challenges that need to be overcome to implement it, not least the resistance of the finance industry, whose raison d’ˆetre is to control the flow of money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
250
+ page_content=' Elastic Cash represents a significant loss of control for financial firms, and a democratization of the flow of money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
251
+ page_content=' For these reasons, it is perhaps more easily implemented in a cryptocurrency, as I discuss next.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
252
+ page_content=' 9 5 Elastic Cash in cryptocurrencies A major advantage of Elastic Cash over conventional mechanisms for elasticity is that it can be implemented in a truly decentralized way, without any trusted central authority.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
253
+ page_content=' Bitcoin made a technological leap when it introduced the concept of a blockchain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
254
+ page_content=' Since then, a number of cryptocurrencies have emerged, with different ways to implement the blockchain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
255
+ page_content=' Any of these systems can be used to implement Elastic Cash, so here I will keep the discussion at a high level, only talking about how the blockchain can be utilized.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
256
+ page_content=' Because Elastic Cash involves making significant changes to the money supply, I do believe that implementing it requires new cryptocurrencies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
257
+ page_content=' I do not think it can be implemented using a layer built on top of Bitcoin, for example.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
258
+ page_content=' Here is how one can implement Elastic Cash on a blockchain at a high level: 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
259
+ page_content=' At any point in time, each user of the cryptocurrency is known to hold some amount of money, as well as various cashbonds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
260
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
261
+ page_content=' Users of the currency can announce transactions of money, as well as orders placed in the cashbond market.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
262
+ page_content=' The orders can be placed with a specific expiry date.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
263
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
264
+ page_content=' Miners will add both money transactions and orders in the cashbond market to the next block of the blockchain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
265
+ page_content=' To implement the market in cashbonds: (a) Miners will act as market makers to map buy orders to sell orders and so execute the trade in cashbonds.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
266
+ page_content=' There are some subtle issues that need to be addressed here.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
267
+ page_content=' For example, a miner may be incentivized to pick some orders over others to include on the blockchain, and choose to ignore some orders when acting as a market maker.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
268
+ page_content=' In particular, miners should themselves be paid the spread between buy and sell orders as a transaction fee to carry out their market making function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
269
+ page_content=' This removes the incentives to manipulate the orders that are added to the most recent block.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
270
+ page_content=' (b) Miners will also execute the algorithm to simulate the activities of the cash authority in the cashbond market.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
271
+ page_content=' New money and cashbonds will be created according to the rules of the mechanism, and these will be traded with users based on the orders that have been added to the blockchain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
272
+ page_content=' 6 Conclusions and Questions It is an exciting time to think about the technology of money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
273
+ page_content=' The US Dollar is experiencing a once-in-a-lifetime contraction (see Figure 1), and the demands for a stable global currency have never been larger.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
274
+ page_content=' Elastic Cash is a broad scheme to enable elastic money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
275
+ page_content=' I have purposefully left the mechanism underspecified, because I believe that more work is required to understand the details and trade-offs involved in the particulars of the mechanism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
276
+ page_content=' Here are some important questions that I feel remain unanswered: 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
277
+ page_content=' How should the market maker behave in the cashbond market?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
278
+ page_content=' In the context of conventional currencies, can private entities function as market makers?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
279
+ page_content=' In the context of cryptocurrencies, how should the algorithm be set up so that miners do not have an incentive to behave dishonestly when they are carrying out the role of market maker?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
280
+ page_content=' 10 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
281
+ page_content=' What style of auction would give the best results for the cashbond market?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
282
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
283
+ page_content=' What is the ideal target distribution on cashbonds?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
284
+ page_content=' If the cashbonds are concentrated on very short durations, this gives the most power for the mechanism to inject large quantities of money, but it also means that the market loses information about the demand for liquidity over long durations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
285
+ page_content=' So, there is a trade-off between various choices for distributions on durations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
286
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
287
+ page_content=' How can we gradually transition the current US Dollar system to such a mechanism?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
288
+ page_content=' The steps I discussed in Section 4 are likely to be difficult to execute.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
289
+ page_content=' Perhaps there is a way to use cashbonds and incentivize the large players in the financial system to adopt Elastic Cash without being forced to do it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
290
+ page_content=' What is needed is a mechanism to transition to the new mechanism!' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
291
+ page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
292
+ page_content=' How should we expect the free floating rate curve rate(t) to behave as a function of t during normal times?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
293
+ page_content=' I would expect this function to be monotone, but I am not sure how to reason about it beyond that.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
294
+ page_content=' 7 Acknowledgements Thanks to Paul Beame, Siddharth Iyer, Travis Kriplean, James Lee, Noam Nisan, Darcy Rao, Eli Ben-Sasson, Oscar Sprumont, Michael Whitmeyer and Amir Yehudayoff for many helpful and entertaining conversations about money.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
295
+ page_content=' References [1] Fed history overview.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
296
+ page_content=' https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
297
+ page_content='federalreservehistory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
298
+ page_content='org/time-period.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
299
+ page_content=' [2] Christine Desan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
300
+ page_content=' Making Money: Coin, Currency, and the Coming of Capitalism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
301
+ page_content=' Oxford University Press, 2014.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
302
+ page_content=' [3] Neels Heyneke and Mehul Daya.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
303
+ page_content=' The rise and fall of the eurodollar system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
304
+ page_content=' https: //www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
305
+ page_content='nedbank.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
306
+ page_content='co.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
307
+ page_content='za/content/dam/nedbank-crp/reports/Strategy/NeelsAndMehul/ 2016/September/TheRiseAndFallOfTheEurodollarSystem_160907.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
308
+ page_content='pdf, 2016.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
309
+ page_content=' [4] Lev Menand.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
310
+ page_content=' The Fed-Unbound: Central Banking in a Time of Crisis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
311
+ page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
312
+ page_content=' 11' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HdE2T4oBgHgl3EQf_Alo/content/2301.04244v1.pdf'}
HdFJT4oBgHgl3EQfFCyj/content/2301.11440v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:7e5c6b4c2082d0abbfa6f7c349a9e0b5187521da25771c9a88e595268edc15e4
3
+ size 960592