Add files using upload-large-folder tool
Browse filesThis view is limited to 50 files because it contains too many changes.
See raw diff
- .gitattributes +68 -0
- 09FPT4oBgHgl3EQfTzT7/content/tmp_files/2301.13055v1.pdf.txt +1308 -0
- 09FPT4oBgHgl3EQfTzT7/content/tmp_files/load_file.txt +0 -0
- 0NE0T4oBgHgl3EQfuAEL/vector_store/index.pkl +3 -0
- 0dE0T4oBgHgl3EQfdQAz/content/2301.02373v1.pdf +3 -0
- 0dE0T4oBgHgl3EQfdQAz/vector_store/index.pkl +3 -0
- 2dAyT4oBgHgl3EQfPvZl/vector_store/index.faiss +3 -0
- 39AyT4oBgHgl3EQfP_aH/vector_store/index.faiss +3 -0
- 39AyT4oBgHgl3EQfP_aH/vector_store/index.pkl +3 -0
- 39AzT4oBgHgl3EQf9f54/content/2301.01920v1.pdf +3 -0
- 39AzT4oBgHgl3EQf9f54/vector_store/index.faiss +3 -0
- 39AzT4oBgHgl3EQf9f54/vector_store/index.pkl +3 -0
- 4dE2T4oBgHgl3EQf6Qjc/vector_store/index.pkl +3 -0
- 5NAzT4oBgHgl3EQf9v7Q/content/2301.01925v1.pdf +3 -0
- 5NAzT4oBgHgl3EQf9v7Q/vector_store/index.faiss +3 -0
- 5NAzT4oBgHgl3EQf9v7Q/vector_store/index.pkl +3 -0
- 5NAzT4oBgHgl3EQffvy-/content/tmp_files/2301.01458v1.pdf.txt +1303 -0
- 5NAzT4oBgHgl3EQffvy-/content/tmp_files/load_file.txt +0 -0
- 5NE6T4oBgHgl3EQflhFb/content/2301.06150v1.pdf +3 -0
- 5NE6T4oBgHgl3EQflhFb/vector_store/index.faiss +3 -0
- 5dFJT4oBgHgl3EQfkywG/vector_store/index.faiss +3 -0
- 5tAyT4oBgHgl3EQf2fk_/content/2301.00751v1.pdf +3 -0
- 8tE0T4oBgHgl3EQfwgFY/content/2301.02633v1.pdf +3 -0
- 8tE0T4oBgHgl3EQfwgFY/vector_store/index.faiss +3 -0
- 8tE0T4oBgHgl3EQfwgFY/vector_store/index.pkl +3 -0
- BNE4T4oBgHgl3EQfFAx2/vector_store/index.faiss +3 -0
- BNE4T4oBgHgl3EQfFAx2/vector_store/index.pkl +3 -0
- D9E2T4oBgHgl3EQfogh1/content/tmp_files/2301.04019v1.pdf.txt +2460 -0
- D9E2T4oBgHgl3EQfogh1/content/tmp_files/load_file.txt +0 -0
- D9FKT4oBgHgl3EQfZi4o/content/tmp_files/2301.11803v1.pdf.txt +2097 -0
- D9FKT4oBgHgl3EQfZi4o/content/tmp_files/load_file.txt +0 -0
- DdE1T4oBgHgl3EQf-Abs/vector_store/index.pkl +3 -0
- DdE5T4oBgHgl3EQfUQ9g/content/tmp_files/2301.05542v1.pdf.txt +0 -0
- DdE5T4oBgHgl3EQfUQ9g/content/tmp_files/load_file.txt +0 -0
- F9E4T4oBgHgl3EQfHQxB/content/2301.04901v1.pdf +3 -0
- F9E4T4oBgHgl3EQfHQxB/vector_store/index.pkl +3 -0
- FtE1T4oBgHgl3EQf-waO/content/tmp_files/2301.03573v1.pdf.txt +0 -0
- FtE1T4oBgHgl3EQf-waO/content/tmp_files/load_file.txt +0 -0
- GNAzT4oBgHgl3EQfi_3N/vector_store/index.faiss +3 -0
- GdAyT4oBgHgl3EQffPg-/content/tmp_files/2301.00335v1.pdf.txt +0 -0
- GdAyT4oBgHgl3EQffPg-/content/tmp_files/load_file.txt +0 -0
- GtE0T4oBgHgl3EQfRQCY/content/tmp_files/2301.02205v1.pdf.txt +678 -0
- GtE0T4oBgHgl3EQfRQCY/content/tmp_files/load_file.txt +389 -0
- HdE0T4oBgHgl3EQfRgBm/content/tmp_files/2301.02208v1.pdf.txt +1183 -0
- HdE0T4oBgHgl3EQfRgBm/content/tmp_files/load_file.txt +0 -0
- HtE5T4oBgHgl3EQfWg9Q/content/tmp_files/load_file.txt +220 -0
- J9FIT4oBgHgl3EQfZytY/vector_store/index.faiss +3 -0
- JNE2T4oBgHgl3EQfUgdI/content/2301.03813v1.pdf +3 -0
- JNE2T4oBgHgl3EQfUgdI/vector_store/index.pkl +3 -0
- JNE4T4oBgHgl3EQfIgz1/content/2301.04914v1.pdf +3 -0
.gitattributes
CHANGED
@@ -15422,3 +15422,71 @@ jNFJT4oBgHgl3EQfXSyN/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -tex
|
|
15422 |
0tFRT4oBgHgl3EQfkzf9/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15423 |
INAzT4oBgHgl3EQfjf2_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15424 |
89AzT4oBgHgl3EQfgvxw/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
15422 |
0tFRT4oBgHgl3EQfkzf9/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15423 |
INAzT4oBgHgl3EQfjf2_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15424 |
89AzT4oBgHgl3EQfgvxw/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15425 |
+
ndE3T4oBgHgl3EQf7Asa/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15426 |
+
SNE2T4oBgHgl3EQfCAY8/content/2301.03608v1.pdf filter=lfs diff=lfs merge=lfs -text
|
15427 |
+
5NAzT4oBgHgl3EQf9v7Q/content/2301.01925v1.pdf filter=lfs diff=lfs merge=lfs -text
|
15428 |
+
htAyT4oBgHgl3EQfXvc6/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15429 |
+
5NE6T4oBgHgl3EQflhFb/content/2301.06150v1.pdf filter=lfs diff=lfs merge=lfs -text
|
15430 |
+
SNE2T4oBgHgl3EQfCAY8/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15431 |
+
5tAyT4oBgHgl3EQf2fk_/content/2301.00751v1.pdf filter=lfs diff=lfs merge=lfs -text
|
15432 |
+
idFJT4oBgHgl3EQfWizT/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15433 |
+
uNE5T4oBgHgl3EQfLQ6L/content/2301.05472v1.pdf filter=lfs diff=lfs merge=lfs -text
|
15434 |
+
gdE0T4oBgHgl3EQfXgBN/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15435 |
+
adFAT4oBgHgl3EQf4h70/content/2301.08727v1.pdf filter=lfs diff=lfs merge=lfs -text
|
15436 |
+
b9AyT4oBgHgl3EQf-PqC/content/2301.00889v1.pdf filter=lfs diff=lfs merge=lfs -text
|
15437 |
+
LNE3T4oBgHgl3EQfYAr5/content/2301.04485v1.pdf filter=lfs diff=lfs merge=lfs -text
|
15438 |
+
RtFJT4oBgHgl3EQfKyxj/content/2301.11466v1.pdf filter=lfs diff=lfs merge=lfs -text
|
15439 |
+
VtE4T4oBgHgl3EQfng0j/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15440 |
+
gdE0T4oBgHgl3EQfXgBN/content/2301.02293v1.pdf filter=lfs diff=lfs merge=lfs -text
|
15441 |
+
39AzT4oBgHgl3EQf9f54/content/2301.01920v1.pdf filter=lfs diff=lfs merge=lfs -text
|
15442 |
+
dNFAT4oBgHgl3EQfYx1Q/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15443 |
+
ddFST4oBgHgl3EQfEzgN/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15444 |
+
b9AyT4oBgHgl3EQfi_hp/content/2301.00406v1.pdf filter=lfs diff=lfs merge=lfs -text
|
15445 |
+
dtFJT4oBgHgl3EQf_i1w/content/2301.11695v1.pdf filter=lfs diff=lfs merge=lfs -text
|
15446 |
+
_tA0T4oBgHgl3EQfPf_J/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15447 |
+
nNFIT4oBgHgl3EQfuCsf/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15448 |
+
nNFIT4oBgHgl3EQfuCsf/content/2301.11341v1.pdf filter=lfs diff=lfs merge=lfs -text
|
15449 |
+
b9E2T4oBgHgl3EQfFgZ2/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15450 |
+
XdE3T4oBgHgl3EQfbwqk/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15451 |
+
5NAzT4oBgHgl3EQf9v7Q/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15452 |
+
uNE5T4oBgHgl3EQfLQ6L/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15453 |
+
zNAyT4oBgHgl3EQf0vni/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15454 |
+
n9E_T4oBgHgl3EQf8Byb/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15455 |
+
0dE0T4oBgHgl3EQfdQAz/content/2301.02373v1.pdf filter=lfs diff=lfs merge=lfs -text
|
15456 |
+
2dAyT4oBgHgl3EQfPvZl/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15457 |
+
RtFJT4oBgHgl3EQfKyxj/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15458 |
+
39AzT4oBgHgl3EQf9f54/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15459 |
+
m9E5T4oBgHgl3EQfHw6d/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15460 |
+
rtAyT4oBgHgl3EQfz_l6/content/2301.00710v1.pdf filter=lfs diff=lfs merge=lfs -text
|
15461 |
+
J9FIT4oBgHgl3EQfZytY/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15462 |
+
BNE4T4oBgHgl3EQfFAx2/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15463 |
+
xdE5T4oBgHgl3EQfMw71/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15464 |
+
5NE6T4oBgHgl3EQflhFb/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15465 |
+
39AyT4oBgHgl3EQfP_aH/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15466 |
+
btFLT4oBgHgl3EQfYS80/content/2301.12064v1.pdf filter=lfs diff=lfs merge=lfs -text
|
15467 |
+
JNE2T4oBgHgl3EQfUgdI/content/2301.03813v1.pdf filter=lfs diff=lfs merge=lfs -text
|
15468 |
+
8tE0T4oBgHgl3EQfwgFY/content/2301.02633v1.pdf filter=lfs diff=lfs merge=lfs -text
|
15469 |
+
O9AzT4oBgHgl3EQfIfuL/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15470 |
+
eNE1T4oBgHgl3EQfeQRR/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15471 |
+
eNE2T4oBgHgl3EQfbQcn/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15472 |
+
8tE0T4oBgHgl3EQfwgFY/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15473 |
+
m9E5T4oBgHgl3EQfHw6d/content/2301.05443v1.pdf filter=lfs diff=lfs merge=lfs -text
|
15474 |
+
p9AzT4oBgHgl3EQfAvo4/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15475 |
+
5dFJT4oBgHgl3EQfkywG/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15476 |
+
ndE1T4oBgHgl3EQfhgRQ/content/2301.03241v1.pdf filter=lfs diff=lfs merge=lfs -text
|
15477 |
+
JNE4T4oBgHgl3EQfIgz1/content/2301.04914v1.pdf filter=lfs diff=lfs merge=lfs -text
|
15478 |
+
cNAzT4oBgHgl3EQfnf3Z/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15479 |
+
stE1T4oBgHgl3EQfjgQE/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15480 |
+
VdE0T4oBgHgl3EQf2wKz/content/2301.02717v1.pdf filter=lfs diff=lfs merge=lfs -text
|
15481 |
+
ndE1T4oBgHgl3EQfhgRQ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15482 |
+
GNAzT4oBgHgl3EQfi_3N/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15483 |
+
StA0T4oBgHgl3EQfD_-h/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15484 |
+
bdFRT4oBgHgl3EQfRzcI/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15485 |
+
LdAzT4oBgHgl3EQfyv4r/content/2301.01757v1.pdf filter=lfs diff=lfs merge=lfs -text
|
15486 |
+
rtAyT4oBgHgl3EQfz_l6/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15487 |
+
zjlab/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15488 |
+
adFAT4oBgHgl3EQf4h70/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
15489 |
+
aNFPT4oBgHgl3EQfvTWR/content/2301.13159v1.pdf filter=lfs diff=lfs merge=lfs -text
|
15490 |
+
zjlab/vector_store/index_kw.faiss filter=lfs diff=lfs merge=lfs -text
|
15491 |
+
F9E4T4oBgHgl3EQfHQxB/content/2301.04901v1.pdf filter=lfs diff=lfs merge=lfs -text
|
15492 |
+
QdAyT4oBgHgl3EQfU_c5/content/2301.00134v1.pdf filter=lfs diff=lfs merge=lfs -text
|
09FPT4oBgHgl3EQfTzT7/content/tmp_files/2301.13055v1.pdf.txt
ADDED
@@ -0,0 +1,1308 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Theoretical model of membrane protrusions driven by curved active proteins
|
2 |
+
Yoav Ravid 1,∗, Samo Peniˇc 2, Yuko Mimori-Kiyosue,3, Shiro Suetsugu,4,5,6, Aleˇs Igliˇc 2, and Nir S. Gov 1,∗
|
3 |
+
1Department of Chemical and Biological Physics, Weizmann Institute of Science, Rehovot, Israel
|
4 |
+
2Laboratory of Physics, Faculty of Electrical Engineering, University of Ljubljana, Ljubljana, Slovenia
|
5 |
+
3Laboratory for Molecular and Cellular Dynamics,
|
6 |
+
RIKEN Center for Biosystems Dynamics Research,
|
7 |
+
Minatojima-minaminachi, Chuo-ku, Kobe, Hyogo 650-0047, Japan
|
8 |
+
4Division of Biological Science, Graduate School of Science and Technology,
|
9 |
+
Nara Institute of Science and Technology 8916-5, Takayama, Ikoma, Nara, 630-0192, Japan
|
10 |
+
5 Data Science Center, Nara Institute of Science and Technology, Ikoma 630-0192, Japan
|
11 |
+
6 Center for Digital Green-innovation, Nara Institute of Science and Technology, Ikoma 630-0192, Japan
|
12 |
+
Eukaryotic cells intrinsically change their shape, by changing the composition of their membrane
|
13 |
+
and by restructuring their underlying cytoskeleton. We present here further studies and extensions
|
14 |
+
of a minimal physical model, describing a closed vesicle with mobile curved membrane protein
|
15 |
+
complexes. The cytoskeletal forces describe the protrusive force due to actin polymerization which is
|
16 |
+
recruited to the membrane by the curved protein complexes. We characterize the phase diagrams of
|
17 |
+
this model, as function of the magnitude of the active forces, nearest-neighbor protein interactions
|
18 |
+
and the proteins’ spontaneous curvature. It was previously shown that this model can explain the
|
19 |
+
formation of lamellipodia-like flat protrusions, and here we explore the regimes where the model can
|
20 |
+
also give rise to filopodia-like tubular protrusions. We extend the simulation with curved components
|
21 |
+
of both convex and concave species, where we find the formation of complex ruffled clusters, as well
|
22 |
+
as internalized invaginations that resemble the process of endocytosis and macropinocytosis. We
|
23 |
+
alter the force model representing the cytoskeleton to simulate the effects of bundled instead of
|
24 |
+
branched structure, resulting in shapes which resemble filopodia.
|
25 |
+
Keywords: Cell membrane, Curved inclusions, Monte-Carlo simulations, Closed vesicle shapes, Cell motility, Filopodia
|
26 |
+
I.
|
27 |
+
INTRODUCTION
|
28 |
+
Cells in our body have different shapes depending on their function, and they control their shapes by exerting
|
29 |
+
forces on the flexible plasma membrane [1]. These forces are mostly due to the underlying cytoskeleton, dominated
|
30 |
+
by the cortical actin network. The actin polymerization near the membrane exerts protrusive forces that can give
|
31 |
+
rise to cellular protrusions, such as filopodia and lamellipodia [2]. The control of the actin polymerization in space
|
32 |
+
and time is provided by a host of proteins that nucleate actin polymerization where and when it is needed, and
|
33 |
+
are in turn controlled by different signalling cascades. One mechanism for controlling the spatial pattern of actin
|
34 |
+
polymerization on the membrane, is to couple the actin nucleation to curved membrane components (CMCs), that are
|
35 |
+
both bending locally the membrane and are sensitive to the local membrane curvature (such as BAR domain proteins
|
36 |
+
[3]). This coupling was shown theoretically to give rise to positive and negative feedbacks [4], that can result in pattern
|
37 |
+
formation in both the spatial distribution of the actin nucleators (recruited by the CMCs) and the membrane shape.
|
38 |
+
This coupling between curvature and active protrusive forces was explored for a limited regime of parameters in [5].
|
39 |
+
Experimental evidence for this coupling between CMC and protrusive forces has been accumulated in the context of
|
40 |
+
lamellipodia [6, 7] and filopodia [8–14] formation.
|
41 |
+
A summary of the vesicle shapes that we found in [5] are shown in Fig.1, explored as function of temperature and
|
42 |
+
CMC density (Fig.1A). The main phases which were identified are [15]:
|
43 |
+
• Diffused CMC-gas phase, where CMC are dispersed as entropy dominates over bending and binding energies.
|
44 |
+
• Budded phase, where binding and bending leads to CMC forming hemispherical clusters at the CMC spontaneous
|
45 |
+
curvature.
|
46 |
+
• Flattened ”pancake” phase, where the active forces push the CMC outwards, leading to a large CMC cluster along
|
47 |
+
the rim, with two flat bare membrane disc regions. Low temperature is required to prevent lateral membrane
|
48 |
+
fluctuations and thermal diffusion of the CMC from breaking up the rim cluster.
|
49 |
+
The pancake phase is quite dynamic, and tends to form ”ruffles” along the edges. With insufficient density of CMC,
|
50 |
+
there is a ”two-arc” phase with multiple flat edges connected by elongated membrane (Fig.1B). If the CMC density if
|
51 |
+
high, the excess CMC form pearled structures along the rim of the pancake (Fig.1C).
|
52 |
+
arXiv:2301.13055v1 [cond-mat.soft] 30 Jan 2023
|
53 |
+
|
54 |
+
2
|
55 |
+
When the active force is weak or zero (passive CMC), at low temperatures the system is phase-separated into
|
56 |
+
energy-minimizing ”pearled necklace” of CMC clusters, each at the CMC spontaneous curvature (Fig.1D). When the
|
57 |
+
force is strong and the CMC have low spontaneous curvature (flat), there is a phase of highly elongated ”tubular”
|
58 |
+
vesicles, where CMC caps apply large forces that pull membrane tethers (tubular protrusions) (fig.1E).
|
59 |
+
Here we expand the analysis of the coupling between the spontaneous curvature of the CMC and protrusive forces,
|
60 |
+
by exploring the patterns that form as function of the natural parameters that the cell can manipulate, such as the
|
61 |
+
strength of the actin-driven force, the binding strength between the CMCs and the spontaneous curvature of the
|
62 |
+
CMCs. By gaining a fuller understanding of the space of shapes that this coupling can produce, we are able to explore
|
63 |
+
two more complex configurations: a mixture of two CMCs of different intrinsic curvatures, and CMCs that induce
|
64 |
+
aligned active forces which model the effects of actin bundling[16]. These more complex systems, can be compared to
|
65 |
+
important biological phenomena, such as endocytosis[17] and filopodia.
|
66 |
+
II.
|
67 |
+
THE MODEL
|
68 |
+
We follow the same coarse-grained continuum model used previously [5] and [18], where the physics of the cell shape
|
69 |
+
is described by differential geometry and very few energy components [1, 19]. The lipid bilayer membrane is modeled
|
70 |
+
as a 2D flexible sheet, with zero spontaneous curvature, except where there are CMCs. Each CMC on the membrane
|
71 |
+
surface represents a complex of proteins that have a specific spontaneous curvature. The energy of the surface is
|
72 |
+
modeled by the Helfrich hamiltonian
|
73 |
+
Hbending =
|
74 |
+
��
|
75 |
+
κ
|
76 |
+
2 (C1 + C2 − C0φ)2
|
77 |
+
(1)
|
78 |
+
which penalizes deviation of the shape, given by the local curvatures C1 and C2, from a preferred local shape, determined
|
79 |
+
by the CMC relative lateral density φ and the CMC’s preferred membrane curvature C0. To simulate, we discretize
|
80 |
+
the system as a closed vesicle described by a graph V, E (vertices and edges respectively) with vertices representing
|
81 |
+
small area patches of either bare lipid bilayer or CMC. Note that the simulation does not have an intrinsic length
|
82 |
+
scale, however the edge length has to represent lengths larger than tens of nanometers for the coarse-grained model to
|
83 |
+
be physically valid. We therefore obtain the following discretized energy
|
84 |
+
E =
|
85 |
+
�
|
86 |
+
i∈V
|
87 |
+
κ
|
88 |
+
2 (2h(i) − ρiC0)2 A(i) +
|
89 |
+
�
|
90 |
+
⟨i,j⟩∈E
|
91 |
+
−wρiρj +
|
92 |
+
�
|
93 |
+
i∈V
|
94 |
+
wad θ (zi − z0)
|
95 |
+
(2)
|
96 |
+
where ρi = 1 for a CMC vertex and ρi = 0 for a bare vertex, such that the overall density of CMC is given by
|
97 |
+
ρ = �
|
98 |
+
i∈V ρi/N, where N = 4502 is the total number of vertices in our simulations. The first term is a discretized
|
99 |
+
version of the bending energy (Eq.1), κ is the bending modulus, h(i) is the mean curvature calculated at each vertex
|
100 |
+
h = (C1 + C2)/2, C0 is the spontaneous curvature of a CMC, and A(i) is the area assigned to the vertex. The second
|
101 |
+
term is the CMC-CMC nearest-neighbor binding energy, going over the edges ⟨i, j⟩, where w is the binding energy per
|
102 |
+
bond. The third term is adhesion energy of the membrane to a flat rigid surface located at z = z0, which applies to
|
103 |
+
all the nodes that are within a distance of ℓmin from this surface. The membrane is prevented from moving below
|
104 |
+
z0 − ℓmin.
|
105 |
+
This energy model is used in a Monte-Carlo (MC) simulation Trisurf-ng, described in [5], where random movement
|
106 |
+
of vertices and bond flips of edges are accepted if they lower the energy or according to a Boltzmann probability:
|
107 |
+
P = exp (−∆E − Wi) where Wi represents the work done by the active forces on each node that contains a CMC, as
|
108 |
+
follows
|
109 |
+
Wi = −f ˆn(i) · δ⃗xi
|
110 |
+
(3)
|
111 |
+
where ˆn(i) is the local outwards normal unit vector, and δ⃗xi is the vertex displacement.
|
112 |
+
The shift in the locations of the vertices are limited such that the length of each edge remains within this range:
|
113 |
+
ℓmin < ℓ < ℓmax. The edge length and adhesion surface constraints are enforced by rejecting any MC moves which
|
114 |
+
violate them. In a passive system this would lead to thermal equilibrium, but the active work term is unbounded
|
115 |
+
from below, so the system is out of equilibrium. The MC simulation does not have time-scale, as it does not include
|
116 |
+
the hydrodynamic flows and dissipative processes that determine the relaxation time-scales of the membrane shape
|
117 |
+
changes. It does allow us to follow the shape dynamics by evolving the system along decreasing energy gradients, so
|
118 |
+
the trajectory in shape space is correctly described.
|
119 |
+
The parameters in the model, used in this paper, are given in table I. All the energies in the model are in units of
|
120 |
+
kBT (κ, w), while the external force f is in units of kBT/ℓmin.
|
121 |
+
|
122 |
+
3
|
123 |
+
In addition, we implement optional models of inhibition of the force on the CMC by neighbors, based on [20] which
|
124 |
+
shows different protein species can inhibit the activity of polymerization, inhibiting the actin recruitment and thus
|
125 |
+
force on the CMCs. We implement a proportional inhibition, where an active (1) and inhibiting (2) CMC species exist
|
126 |
+
f prop
|
127 |
+
i
|
128 |
+
= f
|
129 |
+
1
|
130 |
+
Nneighbors
|
131 |
+
�
|
132 |
+
⟨i,j⟩
|
133 |
+
�
|
134 |
+
1 − ρ(2)
|
135 |
+
j
|
136 |
+
�
|
137 |
+
(4)
|
138 |
+
We also implement a disabling inhibition, where any inhibiting CMC species completely disables the force on it’s
|
139 |
+
neighbors.
|
140 |
+
f dis
|
141 |
+
i
|
142 |
+
= f
|
143 |
+
�
|
144 |
+
⟨i,j⟩
|
145 |
+
�
|
146 |
+
1 − ρ(2)
|
147 |
+
j
|
148 |
+
�
|
149 |
+
(5)
|
150 |
+
In biological filopodia, the actin filament are known to bundle by cross-lining proteins [21]. Our model does not
|
151 |
+
have a true representation of the cytoskeleton structure, but we can simulate this bundling by adding an alignment to
|
152 |
+
the force on the active CMCs, since the shared internal actin bundle would apply a force in the same direction. This is
|
153 |
+
added as an Vicsek-like interaction [22]
|
154 |
+
ˆf = ˆni + s �
|
155 |
+
r ˆnj
|
156 |
+
|ˆni + s �
|
157 |
+
r ˆnj|
|
158 |
+
(6)
|
159 |
+
The direction of force on CMC vertex i ˆfi is a weighted average of the normal direction plus a contribution from all the
|
160 |
+
vertices j a distance r from the vertex i with a weight of s, normalized. This replaces the ˆn(i) term in the work term
|
161 |
+
i.e. the unmediated local normal. This is superficially similar to the normal Vicsek model [22], where self-propelled
|
162 |
+
particles similarly align their direction with neighbors, producing flocking behavior, but here the CMCs/particles are
|
163 |
+
connected to each other and embedded in a 2D flexible sheet, and we use force in a MC simulation instead of velocity
|
164 |
+
in a Langevin simulation.
|
165 |
+
III.
|
166 |
+
MATERIALS AND METHODS
|
167 |
+
A.
|
168 |
+
Computational Methods
|
169 |
+
The simulations were run using trisurf-ng [5] version fb86a41 (”Modeled trisurf” branch) (see X) with a tape file
|
170 |
+
modified from the available default with the different physical parameters (see I), and additional simulation running
|
171 |
+
parameters of nshell=30, mcsweeps=50,000-200,000, iterations=100-1,000 (depending on the desired time resolution).
|
172 |
+
Each simulation with a set of parameters was ran independently (”embarrassingly parallel”), which took about two
|
173 |
+
weeks to finish, with occasional restarts and expansion of the space limits (nxmax). The resulting VTU files were
|
174 |
+
viewed and colored in ParaView, but further analysis and graph generation were done by separate python scripts.
|
175 |
+
B.
|
176 |
+
Experimental Methods
|
177 |
+
The cell culture and lattice light sheet microscopic observation U-251 cells were obtained from the Japanese Collection
|
178 |
+
of Research Bioresources Cell Bank. The IRSp53 knockout (KO) cells were generated by the CRISPR/Cas9 system, as
|
179 |
+
described previously [23]. The guide RNA targeting the first exon of IRSp53 (CCATGGCGATGAAGTTCCGG) was
|
180 |
+
designed using the server http://crispr.mit.edu and inserted into the pX330 vector [23]. After transfection, the cells
|
181 |
+
were cloned by monitoring the GFP fluorescence from the reporter plasmid pCAG-EGxxFP with the IRSp53 genome
|
182 |
+
fragment using a fluorescence-activated cell sorter [FACSAria (BD)] [24]. The expression of GFP or GFP-IRSp53
|
183 |
+
in the IRSp53 knockout cells was performed by the retrovirus-mediated gene transfer, as described previously [24].
|
184 |
+
All cell lines were cultured in high glucose DMEM (Thermo Fisher Scientific) supplemented with 10% bovine calf
|
185 |
+
serum (Thermo Fischer Scientific) and 1% penicillin-streptomycin solution (Thermo Fischer Scientific) and stored in
|
186 |
+
an incubator at 37oC in 5% CO2 and humidified conditions. The cells were seeded on coverslips and then imaged with
|
187 |
+
the Lattice light-sheet microscope built in the Mimori-Kiyosue laboratory at RIKEN Center for Biosystems Dynamics
|
188 |
+
Research following the design of the Betzig laboratory [25] as described previously [26].
|
189 |
+
|
190 |
+
4
|
191 |
+
IV.
|
192 |
+
FORCE-BINDING STRENGTH PHASE DIAGRAM
|
193 |
+
In [5] the phases of the vesicle with active CMC, were mostly explored as function of temperature and global density
|
194 |
+
of CMC. However, the cell can more easily modify other parameters, such as the strength of the protrusive forces
|
195 |
+
produced by actin polymerization and the binding strength between neighboring CMC. The rate of actin polymerization
|
196 |
+
recruited to the CMC can be controlled by the cell through various proteins [27–29]. The effective binding strength
|
197 |
+
between the neighboring CMC can similarly depend on the lateral concentration and character of the proteins that
|
198 |
+
form the CMC [7], as well as on the type of lipids between the CMC [30]. The cell can modify these internal parameters
|
199 |
+
spontaneously or in response to external signals.
|
200 |
+
We scan over the force f and binding strength w parameters plane (Fig.2A), with the other parameters of the model
|
201 |
+
having the following constant values: The bending modulus is taken to be κ = 20KBT, which is a typical value for
|
202 |
+
lipid bilayers. The spontaneous curvature of the CMC is taken to be C0 = 1ℓ−1
|
203 |
+
min, representing highly curved objects on
|
204 |
+
the membrane. The CMC density is ρ = 10%, which is sufficient to form the pancake shapes that require a complete
|
205 |
+
circular cluster of CMC along the vesicle rim [5].
|
206 |
+
We find that the simulated vesicles can be divided into several distinct phases: gas phase, budded phase, pancake
|
207 |
+
phase, and pearling phase. In addition there are more ambiguous, and possibly transient, elongated and mixed phases
|
208 |
+
(Fig.2A). In order to distinguish between these phases, we use four measures that characterize the vesicle shape and
|
209 |
+
the CMC cluster organization:
|
210 |
+
• Mean cluster size ⟨N⟩
|
211 |
+
• 1st eigenvalue of the Gyration tensor λ2
|
212 |
+
1
|
213 |
+
• 2nd eigenvalue of the Gyration tensor λ2
|
214 |
+
2
|
215 |
+
• Length of CMC-bare membrane boundary ℓp
|
216 |
+
The mean cluster size is averaged over all the CMC clusters, each cluster i having a size Ni of vertices
|
217 |
+
⟨N⟩ =
|
218 |
+
�
|
219 |
+
i Ni
|
220 |
+
�
|
221 |
+
i 1 = Nvertex
|
222 |
+
Nclusters
|
223 |
+
We plot this measure (Fig.2B), extracted after the simulation reaches its steady-state regime, where the measures do
|
224 |
+
not change on average (see SI). we see that it allows to clearly distinguish the gas phase, which has small cluster sizes
|
225 |
+
(yellow line in Fig.2A denotes ⟨N⟩ = 1.5). However, it is rather poor at separating the condensed phases, which all
|
226 |
+
have large clusters but differ greatly in their morphology and cluster organization. This is due to the dependence
|
227 |
+
of this measure on the number of clusters, which gives large weight to small single-vertex clusters. This makes this
|
228 |
+
measure too noisy to distinguish between the other phases, except for the gas phase which mostly contains single-vertex
|
229 |
+
clusters.
|
230 |
+
We therefore use morphological measures in order to clearly distinguish between the different phases where the
|
231 |
+
CMCs are condensed in large clusters. The morphology of the vesicle is quantified by the eigenvalues of the gyration
|
232 |
+
tensor λ2
|
233 |
+
i . The gyration tensor [31] is defined as the average over all the vertices, with respect to the center of mass
|
234 |
+
(similar to the moment of inertia tensor for equal-mass vertices)
|
235 |
+
RG ij = ⟨rirj⟩ = 1
|
236 |
+
N
|
237 |
+
�
|
238 |
+
vertices
|
239 |
+
�
|
240 |
+
�
|
241 |
+
x2 xy xz
|
242 |
+
xy y2 yz
|
243 |
+
zx yz z2
|
244 |
+
�
|
245 |
+
�
|
246 |
+
This can be visualized by a unique ellipsoid which has the same gyration tensor
|
247 |
+
xT R−1
|
248 |
+
G x = (x · e1)2
|
249 |
+
λ2
|
250 |
+
1
|
251 |
+
+ (x · e2)2
|
252 |
+
λ2
|
253 |
+
2
|
254 |
+
+ (x · e3)2
|
255 |
+
λ2
|
256 |
+
1
|
257 |
+
= 3
|
258 |
+
The eigenvectors ei of the gyration tensor are the directions of the semi-axes of the equivalent ellipsoid and the
|
259 |
+
eigenvalues are their length squared divided by 3, ordered by their size: λ2
|
260 |
+
1 ≤ λ2
|
261 |
+
2 ≤ λ2
|
262 |
+
3. The first eigenvalue λ1
|
263 |
+
essentially gives how thin is the ellipsoid, and is low for both pancake and highly elongated (linear) shapes. The
|
264 |
+
second eigenvalue λ2 is large for the pancake shape (as it is roughly equal to the largest eigenvalue λ2 ∼ λ3), but is
|
265 |
+
minimized for elongated shapes, where it similar to the value of the smallest eigenvalue, λ2 ∼ λ1. In Fig.2C,d we plot
|
266 |
+
the eigenvalues λ2
|
267 |
+
1, λ2
|
268 |
+
2, respectively. We find that the phase of pancake shapes is distinguished by the lowest λ2
|
269 |
+
1 (green
|
270 |
+
and dashed green-light blue lines in Fig.2A), indicating its flatness.
|
271 |
+
|
272 |
+
5
|
273 |
+
We identify a new phase of elongated shapes, which is distinguished by the lowest values of λ2
|
274 |
+
2 (between the light
|
275 |
+
blue and dashed green-light blue lines in Fig.2A). These elongated phases are somewhat similar to the ”two-arc” phase
|
276 |
+
found in [5], which appeared when there are not enough CMCs to form a complete circular cluster along the flat vesicle
|
277 |
+
rim. However, here we do have enough CMC to form a complete circular cluster, as shown in the ”flat” regime. The
|
278 |
+
origin of the elongated shapes as w increases beyond the ”flat” phase is due to the formation of transient or stable
|
279 |
+
pearling clusters. These cluster effectively sequester enough CMC to prevent the formation of the complete circular
|
280 |
+
cluster, leading to two curved regions that collect the CMC and stretch the vesicle due to the active forces. The CMC
|
281 |
+
clusters have the shape of flat arcs near the boundary with the ”flat” phase, while closer to the ”pearling” phase the
|
282 |
+
clusters are pearled and localized near the curved tips of the vesicle.
|
283 |
+
While the ”core” of the phases distinguished by λ2
|
284 |
+
1,2 is clear, the edges are much less sharp, due to lack of statistics,
|
285 |
+
long evolution time, and the fact that intermediate shapes do exist. There is also no obvious normalization: The
|
286 |
+
volume changes greatly, and the area is only approximately conserved. For our Nvertex = 4,502 The flat phase is found
|
287 |
+
around λ2
|
288 |
+
1 < 50, and the elongated phases is found around 80 < λ2
|
289 |
+
2 < 150.
|
290 |
+
Finally, we wish to distinguish the phases where the CMCs form pearled clusters. The most outstanding property of
|
291 |
+
the pearled clusters is that they phase-separate between the CMC and the bare membrane, as also predicted within
|
292 |
+
the theory of self-assembly [5]. We therefore measure the average length of the CMC-bare membrane boundary ¯ℓp, per
|
293 |
+
CMC, for all clusters larger than 1 (see SI section 1, Fig.S1)
|
294 |
+
¯ℓp =
|
295 |
+
�ℓpi
|
296 |
+
Ni
|
297 |
+
�
|
298 |
+
Ni>1
|
299 |
+
The phase with pearling clusters is distinguished by having very low ¯ℓp < 0.375 (Fig.2E). We find that this measure
|
300 |
+
identifies the pearled clusters both in the pearling and in the elongated phases (red dotted line in Fig.2A). In addition,
|
301 |
+
a contour of this measure allows us to separate the mixed phase, where the CMC are in both buds and pearled clusters,
|
302 |
+
from the phase that contains only buds (red solid line ¯ℓp <= 1.875 in Fig.2A,E).
|
303 |
+
Note that we do not know if these phases are necessarily the absolute steady-states of the system in the limit of
|
304 |
+
infinite time. The system might be trapped in a local meta-stable configuration due to dynamical barriers that would
|
305 |
+
require unreasonably long simulations for them to escape. For example, in the regime of low force f and large binding
|
306 |
+
strength w, the global minimum energy configuration should have all the CMC in a single pearled cluster, but during
|
307 |
+
the merging of the pearled clusters into a single cluster they have to overcome bending energy barriers that hinder this
|
308 |
+
process [32]. In other regimes, such as the elongated phase, we do not know if a stationary steady-state even exists,
|
309 |
+
since the presence of active forces may induce a constantly changing configurations. In the SI section 2 we give a
|
310 |
+
simple analytic calculation that gives reasonably well the transition line between the pearled and flat phases, which
|
311 |
+
are the main stable condensed phases in this phase diagram (Figs.S2,S3).
|
312 |
+
The evolution of a handful of chosen simulations are shown in Fig.3, showing flat, elongated-flat, elongated-pearling,
|
313 |
+
and pearling phases. All the simulations begin in a disordered uniform distribution of the CMC on the spherical vesicle,
|
314 |
+
but in all of them we find that buds form rather quickly (Fig.3B(i)-E(i)). In the budded phase this configuration
|
315 |
+
simply remains stable and does not evolve significantly. It takes longer time for the larger clusters of the flat rim, arcs
|
316 |
+
and pearls to form. The transition lines separating two different vesicle phases, obtained from our simulations, are not
|
317 |
+
precise, and one can obtain either one of the vesicle shapes close to these lines (Fig.3A).
|
318 |
+
To conclude, by exploring the f − w phase diagram, we demonstrate the competition between the protein binding
|
319 |
+
which drives the formation of pearled clusters, and the active force that drives the formation of arc-like clusters at
|
320 |
+
the edge of flat protrusion. This competition is highlighted in the new phases of vesicle morphologies that we found,
|
321 |
+
namely the elongated two-arcs and the elongated-pearled phases. The pearling phase appears for large enough values
|
322 |
+
of w, as follows also from the theory of self-assembly [5].
|
323 |
+
V.
|
324 |
+
FORCE-SPONTANEOUS CURVATURE PHASE DIAGRAM
|
325 |
+
We now proceed to explore the interplay between the active force and the spontaneous curvature of the CMC in
|
326 |
+
determining the morphology of the vesicle. We chose the parameters for a new set of simulations such that we are in
|
327 |
+
the flat phase when the CMC are highly curved: ρ = 20%, κ = 28.5, w = 2. The resulting phase diagram is shown in
|
328 |
+
Fig4A.
|
329 |
+
We find several phases: budded phase, flat phase, elongated (arcs) phase and highly-elongated (tubes) phase. Here
|
330 |
+
the boundaries between the different phases were drawn by eye, due to relative sparse scan over the parameters, and the
|
331 |
+
self-evident boundaries (Fig.4A). In this parameter regime, we do not find any pearled phase, with the budded phase
|
332 |
+
remaining stable due to the bending energy barrier that prevents buds merging (note that the bending modulus is
|
333 |
+
larger here), and lower relative w. Similar to the force-binding strength system (Fig.2A), where the budded and pearled
|
334 |
+
|
335 |
+
6
|
336 |
+
phases exist for low active force, we also find that as the active force is increased the budded phase is destabilized to
|
337 |
+
form the flat phase (Fig.4A).
|
338 |
+
The flat phase is destabilized as the spontaneous curvature decreases due to the following mechanism: as C0 decreases
|
339 |
+
the thickness of the rim cluster increases, which means that there are not enough CMC to complete a circular cluster
|
340 |
+
around the edge of the flat shape. The morphology then changes into local arc-like clusters that pull the vesicle into
|
341 |
+
elongated shapes. The elongation of these vesicles depends on the magnitude of the active force.
|
342 |
+
The main feature of this phase diagram is the appearance of the highly-elongated tubular phase, where the entire
|
343 |
+
vesicle is stretch into a several tubes that are pulled by CMC clusters at their tips. We can theoretically estimate
|
344 |
+
the location of the phase transition line, above which a vesicle will become highly-elongated, by comparing the force
|
345 |
+
exerted by the active CMC cluster and the restoring force of the emerging membrane tube due to bending (Fig.4B).
|
346 |
+
A hemispherical CMC cap with radius r = 2/C0 minimizes the bending energy (Eq.1): E ∝
|
347 |
+
�
|
348 |
+
1
|
349 |
+
r1 + 1
|
350 |
+
r2 − C0
|
351 |
+
�2
|
352 |
+
, and
|
353 |
+
maximizes the pulling force (since adding any more CMCs to the cluster, beyond the hemisphere, adds force in the
|
354 |
+
opposite direction). The total pulling force of this hemispherical cluster is given by
|
355 |
+
Fpull = f ·
|
356 |
+
1
|
357 |
+
2
|
358 |
+
����
|
359 |
+
geometry
|
360 |
+
· 2π(2/C0)2
|
361 |
+
s0
|
362 |
+
�
|
363 |
+
��
|
364 |
+
�
|
365 |
+
#vertices
|
366 |
+
(7)
|
367 |
+
where s0 is the area per vertex, and 2πr2/s0 is the number of CMC in the cluster. This hemispherical cap pulls a tube
|
368 |
+
with the same radius from the main vesicle body. Note the extra factor of 1/2 due to the hemispherical shape of the
|
369 |
+
cup, compared to the calculation done for a flat cluster of active proteins in [5].
|
370 |
+
Assuming the restoring force is dominated by the bending energy of the membrane tube, it is given by (Eq.1) [5]
|
371 |
+
Frestore = κ
|
372 |
+
2
|
373 |
+
2π
|
374 |
+
(2/C0)
|
375 |
+
(8)
|
376 |
+
The highly elongated shape is initiated when the pulling force is greater than this restoring force, so the critical value
|
377 |
+
is given by equating Eqs.7,8, which gives
|
378 |
+
f = AC3
|
379 |
+
0
|
380 |
+
(9)
|
381 |
+
where A is a constant determined by the constant parameters of the simulation (bending modulus and average area
|
382 |
+
per vertex). Plotting this simple cubic relation in Fig.4A (blue solid line, where we fit the value of A), shows a good
|
383 |
+
agreement with the observed boundary of the regime of the highly-elongated tubular shapes on the phase diagram.
|
384 |
+
Note however that the shapes of the vesicles at the transition to the tubular phase are not always simple cylindrical
|
385 |
+
tubes with hemispherical clusters at their tips (Fig.4A), as the analytic model assumes (Fig.4B).
|
386 |
+
To conclude this section, we have shown that active CMC give rise to flat protrusions when they are highly curved.
|
387 |
+
Tubular protrusions can form for weakly curved active CMC, while for highly curved CMC the active force needed
|
388 |
+
to produce such slender protrusions increases extremely fast. In the next sections we explore how slender tubular
|
389 |
+
protrusions can be produced with highly curved active proteins, by either changing the effective curvature of the CMC
|
390 |
+
cluster, or by increasing the effective pulling force of the cluster.
|
391 |
+
VI.
|
392 |
+
MULTIPLE CURVATURE
|
393 |
+
Real cells have many species of membrane protein of both convex and concave intrinsic curvature. While these
|
394 |
+
membrane proteins have distinct curvatures, the effective curvature of a cluster of CMC may depend on the composition
|
395 |
+
of the cluster, if it contains CMC of different spontaneous curvatures. In order to form clusters of mixed curvatures,
|
396 |
+
we explore vesicles that contain CMC of different curvatures (concave and convex), that bind to each other equally. If
|
397 |
+
the two CMC types bind only to their own kind, they form separate clusters on the vesicle, and their coupling with
|
398 |
+
each other due to curvature alone is rather weak (see SI). The convex CMC maintain their activity, as in the previous
|
399 |
+
sections, while the concave CMC is passive.
|
400 |
+
In Fig.4C(i) we show snapshots of the steady-state shapes of the vesicles that contain 10% passive concave CMC, i.e.
|
401 |
+
a CMC species with C−
|
402 |
+
0 < 0 and f − = 0, in addition to convex CMCs (ρ+ = 10%, f = 0.5, and C+
|
403 |
+
0 = 0.8). Both
|
404 |
+
types of CMC have the same binding strength w = 2, which binds both types equally, leading to strong mixing of the
|
405 |
+
two CMC types. For weakly curved concave CMC (C−
|
406 |
+
0 = −0.001) the flat phase remains stable (Fig.4C(i6)), driven by
|
407 |
+
the convex active CMC. As the concave CMC become more curved (Fig.4C(i) from right to left) the circular cluster at
|
408 |
+
the rim of the flat shape breaks up, and highly elongated shapes appear (Fig.4C(i2,i3)).
|
409 |
+
|
410 |
+
7
|
411 |
+
These shapes can be explained by mapping the vesicles in Fig.4C(i) on the phase diagram (Fig.4A). For each
|
412 |
+
simulation, we calculate the average spontaneous curvature of the CMC clusters: C0,eff =
|
413 |
+
�
|
414 |
+
C+
|
415 |
+
0 + C−
|
416 |
+
0
|
417 |
+
�
|
418 |
+
/2, as well as
|
419 |
+
the average pulling force per CMC: feff = f/2. In Fig.4D we plot the typical dashed outline of the vesicles from
|
420 |
+
Fig.4C(i) on the phase diagram according to these effective parameters C0,eff, feff. Most vesicles match the shape
|
421 |
+
of the phase to which they are mapped in this way. The only exception is the vesicle with the most concave CMCs
|
422 |
+
(and effective C0,eff = 0), which is not in the shape of highly-elongated tubes, as suggested by the calculated average
|
423 |
+
parameters, but fits better the arcs phase. This phenomena is due to the concave CMCs phase-separating into internal
|
424 |
+
”sacks” of concave-enriched clusters (Fig. 5Ai), which results in an effective removal of these concave CMC from
|
425 |
+
determining the outer shape of the vesicle. To take this into account, we calculate the effective mean curvature of the
|
426 |
+
CMCs while removing the concave CMC that are contained in the internalized sacks. This is done by including in the
|
427 |
+
calculation of the average curvature only concave CMCs which are connected to at least one convex CMC. Using this
|
428 |
+
revised average spontaneous curvature, we plot the locations of the vesicles on the phase diagram (full snapshots),
|
429 |
+
and find that except for the most curved concave CMC (A1), the locations of the other vesicles is minimally affected.
|
430 |
+
For the case A1, we find that indeed the formations of large sacks of concave CMC, push the vesicle into the arcs
|
431 |
+
regime, compatible with its revised location on the phase diagram. The phase separation of the passive concave CMC
|
432 |
+
into sacks is driven by the minimization of the total bending energy. The highly elongated tubes cost a high bending
|
433 |
+
energy of the bare membrane: in Fig.4C(i2) the average bending energy of the bare membrane is ∼ 25KBT, while in
|
434 |
+
the flatter shapes after the phase separation (Fig.4C(i1)) the average bending energy of the bare membrane drops to
|
435 |
+
∼ 17KBT.
|
436 |
+
In addition to the overall vesicle shape in the system of mixed curvatures, we are interested in the character of the
|
437 |
+
CMC clusters. We find that concave and convex CMCs create complex mixed clusters with a ”coral”- or ”sponge”-like
|
438 |
+
texture (Fig.4C and close up in Fig. 5Aii). The texture of these clusters seems similar to the membrane ruffles observed
|
439 |
+
in [20] behind the leading edge of motile cells. In this work, the ruffles were attributed to the interaction between
|
440 |
+
concave and convex membrane proteins, that are also involved in the recruitment of the actin polymerization. It was
|
441 |
+
furthermore proposed in [20] that the pattern of ruffles observed in these cells is determined by the interaction between
|
442 |
+
a concave membrane protein that inhibits the actin polymerization, which is recruited by the convex CMC. Motivated
|
443 |
+
by this proposed mechanism, we explored the resulting shapes of the vesicle and CMC clusters when the concave
|
444 |
+
CMCs inhibit the active force exerted by the convex CMCs. We tested two possibilities: inhibition that is proportional
|
445 |
+
to the number of concave neighbors (Eq.4, Fig. 4C(ii)), and full inhibition with even one concave neighbor (Eq.5, Fig.
|
446 |
+
4C(iii)). In both cases we find that the effective force is reduced, and that the resulting shapes correspond very well to
|
447 |
+
their locations on the phase diagram (Fig.4D). The shapes obtained for full inhibition (Fig. 4C(iii)) are very similar
|
448 |
+
to those for a vesicle with a mixture of passive CMC (see SI section 3, Fig.S4). Regarding the comparison with the
|
449 |
+
experiments [20], we conclude from the model that the ruffle texture of the CMC clusters does not crucially depend
|
450 |
+
on the inhibitory interaction between the two CMC types, but rather on their spontaneous curvatures and binding
|
451 |
+
interaction.
|
452 |
+
Let us now focus on the phase-separated sacks of highly curved concave CMC, which form within the mixed clusters
|
453 |
+
(Fig.5). We observed that the neck that connects the sacks to the outer part of the cluster is much narrower when
|
454 |
+
the convex CMC exert outwards protrusive forces (compare Fig.5(Aii) and (Cii)). We quantified the area of the
|
455 |
+
narrowest part of the neck in Fig.5B,D for the active and passive convex CMC, respectively. The necks are naturally
|
456 |
+
narrower for more highly curved concave CMC. The active convex CMC, which push the membrane outwards, exert
|
457 |
+
an effective pressure force that squeezes the neck into a narrower radius. Note that for the narrowest necks, we are
|
458 |
+
clearly at the limit of the spatial resolution of the simulation. We do not allow membrane fission, and therefore can
|
459 |
+
not describe the process of detachment of such sacks as internalized vesicles [33], as occurs in cells during endocytosis
|
460 |
+
and macropinocytosis [34].
|
461 |
+
In Fig.5E,F we show the dynamics of the cluster formation, whereby a patch of passive concave CMC (blues) increase
|
462 |
+
in size, while its rim is populated by active convex CMC (red). In these images the surrounding bare membrane is
|
463 |
+
rendered to be invisible. These simulated dynamics resemble those calculated by another model of macropinocytic
|
464 |
+
cups [35], which was based on reaction-diffusion dynamics coupled to active forces.
|
465 |
+
Finally, when the two CMC types bind exclusively to their own kind, they form separate clusters, with very limited
|
466 |
+
coupling between them (see SI section 4, Fig.S5).
|
467 |
+
VII.
|
468 |
+
FORCE ALIGNMENT
|
469 |
+
As we show in Fig.4A, when the highly curved CMC induce a protrusive force that is directed at the outwards
|
470 |
+
normal, we require an extremely large force in order for the highly elongated tubes to form. However, cells initiate
|
471 |
+
slender, tube-like filopodia protrusions using highly curved membrane proteins, such as IRsp53 [8–10, 12–14], in
|
472 |
+
agreement with theoretical calculations [36]. Within the slender filopodia in cells, the actin filaments are organized into
|
473 |
+
|
474 |
+
8
|
475 |
+
a cross-linked bundle, which efficiently directs the forces of all the polymerizing actin filaments along the protrusion’s
|
476 |
+
axis. The actin nucleators at the tip of the filopodia are different from those at the leading edge of the flat lamellipodia
|
477 |
+
[14, 21, 37], and initiate the growth of parallel actin filaments that form the bundle at the filopodia core. In our model,
|
478 |
+
since we do not explicitly describe the actin filaments organization, we can only describe the effects of the bundling on
|
479 |
+
the forces exerted on the membrane. To simulate this kind of bundling, we add an alignment term of a Vicsek-like
|
480 |
+
interaction [22], which aligns the forces exerted on the membrane by each CMC that is bound in a cluster
|
481 |
+
ˆfi = ˆni + s �
|
482 |
+
r ˆnj
|
483 |
+
|ˆni + s �
|
484 |
+
r ˆnj|
|
485 |
+
(10)
|
486 |
+
The direction of the active force exerted on each CMC vertex i, ˆfi, is a weighted average of the local outwards normal
|
487 |
+
direction (ˆni) and a contribution from all the vertices j within a distance r from the vertex i (and in the same connected
|
488 |
+
cluster), with a weight of s.
|
489 |
+
In Fig.6A we plot typical steady-state snapshots of the vesicle shape and CMC clusters, as function of the strength
|
490 |
+
and range of the alignment interaction of Eq.10. We observe a rather sharp transition from flat shapes for short-range
|
491 |
+
alignment (r < 10) to shapes containing thin tube-like protrusions for long-range alignment. As function of the
|
492 |
+
parameter s we find only weak dependence: at very small values of s and r = 10, we find that the weak alignment
|
493 |
+
is sufficient to increase the net pulling force of the CMC clusters, such that they break the circular rim of the flat
|
494 |
+
shape (Fig.4B(iii)). The resulting shape, with ”paddle”-like protrusions, resembles the ”arcs” phase we found in Fig.4
|
495 |
+
between the flat and tubes phases. At higher values of s this paddles phase changes to tubes, due to the stronger
|
496 |
+
alignment leading to a larger net pulling force.
|
497 |
+
At these larger interaction strength the vesicle produces thin, finger-like clusters with a small bulbous ”head” and an
|
498 |
+
elongated ”sleeve” (Fig.6B(ii)). This shape allows the CMC to satisfy their spontaneous curvature, with a spherical tip
|
499 |
+
that has a radius of rtip = 2/C0, while the sleeve has a thinner radius of rsleeve = 1/C0. Such a cluster configuration
|
500 |
+
is stable due to the alignment of the active forces along the tube axis (perpendicular to the membrane along the
|
501 |
+
sleeve, Fig.6B(ii)). Once these elongated clusters form, they exert a large pulling force on the remaining membrane,
|
502 |
+
thereby pulling elongated bare-membrane tubes behind them. The membrane tube can have a larger radius than the
|
503 |
+
radius of the tubular CMC cluster, as it balances the pulling force with the restoring force due to bending energy. The
|
504 |
+
alignment of the forces means that the entire CMC cluster pulls along the protrusion axis (Fig.6B(ii)), exerting a
|
505 |
+
much larger total force than was possible using purely normal forces at the tip, thereby forming tubes at values of
|
506 |
+
the force per protein that are much lower than predicted by Eq.9 and Fig.4A. Smaller clusters that only contain the
|
507 |
+
hemispherical tip (such as Fig.6B(i)), do not grow tube-like protrusions, even though their net pulling force is larger
|
508 |
+
by up to a factor of 2 compared to normal-force CMC, due to alignment (compare Fig.6B(i) to Fig.4B and Eq.7).
|
509 |
+
In Fig.7A we plot the time progression of a vesicle with aligned-force CMC. We observe that initially localized
|
510 |
+
hemispherical buds form rapidly. These buds then coalesce to form larger clusters that grow into the typical shape
|
511 |
+
of bulbous tip with a thinner tubular part behind it. The size and total force of each of the clusters are plotted as
|
512 |
+
function of time, with each point size indicating the cluster size, and its y-axis coordinate giving its total active force,
|
513 |
+
respectively. Note that clusters that contain patches of ”trapped” bare membrane undergo large force fluctuations
|
514 |
+
(blue and yellow points, largest two clusters shown on the right of Fig.7A). These fluctuations arise from loss of global
|
515 |
+
alignment over the entire CMC cluster, due to the bare membrane patch that allows the alignment to change, especially
|
516 |
+
between the protrusion tip and the tubular part.
|
517 |
+
In Fig.7B we compare the finger-like protrusions that form due to highly curved aligned-force CMC, with the tubular
|
518 |
+
shapes that form due to weakly curved normal-force CMC (Fig.4A). The main difference is that the aligned-force
|
519 |
+
protrusions are much more stable compared to the tubes formed by the much smaller clusters of normal-force CMC.
|
520 |
+
The normal-force CMC undergo frequent fission and coalescence events, that correspond to tubes shrinking and
|
521 |
+
regrowing. These differences in dynamics can be seen in the SI movies S1,S2.
|
522 |
+
VIII.
|
523 |
+
VESICLES WITH BOTH NORMAL AND ALIGNED-FORCE CMC, ADHERED TO A FLAT
|
524 |
+
SUBSTRATE
|
525 |
+
We simulate a vesicle with a mixture of CMCs (ρ = 5% of each type), both highly curved and convex, one type with
|
526 |
+
normal force and the other with strongly aligned force (r = 15, s = 1). Our initial state of the vesicle is obtained by
|
527 |
+
letting the vesicle spread over a flat adhesive substrate, while it contains only normal-force CMC. Then, at a time
|
528 |
+
where the vesicle is partially spread (time 0 in Fig.8A), we convert randomly half of the CMC to aligned-force behavior.
|
529 |
+
We chose an adhesion strength wad = 0.25 (Eq.2), which gives a well-spread vesicle when containing only normal-force
|
530 |
+
CMC [18].
|
531 |
+
In Fig.8A we show two simulations: one with universal binding between the normal and aligned-force CMCs, and
|
532 |
+
the other with exclusive binding, such that normal-normal and aligned-aligned CMC bind to their own type exclusively.
|
533 |
+
|
534 |
+
9
|
535 |
+
In these examples we see that the rim cluster forms and drives strong spreading of the vesicle, as expected [18]. The
|
536 |
+
aligned-force CMC (labeled in yellow) aggregate to form a single filopodia-like protrusion, which is able to recruit into
|
537 |
+
it also normal-force CMC (labeled in red). This filopodia is highly dynamic, undergoing periods of attachment to the
|
538 |
+
rim cluster, and to the adhesive substrate, as well as detachments from the substrate. The filopodia is observed to
|
539 |
+
attach and detach from the rim cluster, leading to meandering motion. When the two types bind exclusively, they
|
540 |
+
form segregated clusters along the rim, with the aligned-force clusters protruding slightly more outwards compared to
|
541 |
+
the normal-force clusters. The dynamics of this system can be seen in SI movie S3.
|
542 |
+
In Fig.8B we show the evolution of the segregation factor in the simulations, which is defined as
|
543 |
+
S = 2 · Prob (CMC neighbor is of the same type) − 1
|
544 |
+
(11)
|
545 |
+
This segregation factor is equal to 0 for well-mixed clusters (where the probability to have a neighbor CMC of the
|
546 |
+
same type is equal to 1/2), and it is equal to 1 for complete phase-separation of the types. In the main panels we give
|
547 |
+
the segregation factor per cluster for the simulations shown in Fig.8A. The insets show the average of 4 independent
|
548 |
+
simulations, which converge to a value of about S = 0.25 for the universal binding and S = 0.9 for the exclusive
|
549 |
+
binding. In the universal case, we can see that the segregation is strongest in the filopodia, so the segergation factor
|
550 |
+
for the large rim cluster jumps up or down, when the filopodia protrusion cluster attaches or detaches respectively.
|
551 |
+
The protrusion cluster is more segregated (S ≈ 0.25), since its tip is enriched with aligned-force CMCs that drive its
|
552 |
+
formation, while the rim cluster is nearly perfectly mixed (S ≈ 0). For the exclusive binding, the segregation is high
|
553 |
+
both in the filopodia protrusion and in the rim cluster, so it does not change when the filopodia attach or detach from
|
554 |
+
the rim.
|
555 |
+
Note that along the adhered vesicle rim, the regions of aligned-force CMC protrude slightly more than the normal-
|
556 |
+
force regions (Fig.8A, exclusive). This is enhanced when the normal-force CMC are disabled, so that they do not exert
|
557 |
+
any active force, as shown in Fig.S6.
|
558 |
+
IX.
|
559 |
+
COMPARISON WITH EXPERIMENTS
|
560 |
+
We can now compare some of our theoretical results to experimental observations, published and new.
|
561 |
+
A.
|
562 |
+
Membrane shapes driven by branched actin polymerization
|
563 |
+
The active protrusive forces in our model are representative of actin polymerization activity near the cell membrane.
|
564 |
+
When the actin polymerization is nucleated by proteins that induce branched actin networks (such as WASP, WAVE
|
565 |
+
[38–40]), it is more natural to describe the force as a local pressure on the membrane, which therefore acts towards the
|
566 |
+
outwards normal.
|
567 |
+
The variety of shapes we obtained in our model (Figs.2,3), range from flat lamellipodia-like shapes, to cylindrical
|
568 |
+
filopodia, to pearling-like protrusions. Some of these new elongated shapes can be compared with elongated global cell
|
569 |
+
shapes, observed in living cells [41].
|
570 |
+
B.
|
571 |
+
Membrane shapes driven by bundled actin polymerization
|
572 |
+
The introduction of alignment in the forces exerted by the CMC represents in our model the case of proteins that
|
573 |
+
nucleate parallel actin bundles, such as VASP and Formins [10, 12, 21]. Our model has demonstrated previously that
|
574 |
+
curved proteins that apply normal forces, induce the formation of flattened, lamellipodia-like protrusions [5, 18]. Here
|
575 |
+
we show that curved proteins that induce polymerization of bundled actin (aligned-force in our model), naturally give
|
576 |
+
rise to filopodia-like protrusions (Figs.6,7). This result fits the observation of highly curved convex-shaped proteins
|
577 |
+
such as IRSp53 in both the leading edge of lamellipodia [7, 42] and in filopodia [2], where the actin organization is
|
578 |
+
very different due to the different type of actin nucleators [38, 43]. Note that the combination of convex curvature, and
|
579 |
+
nucleators of bundled actin, can form filopodia even without the explicit presence of I-BAR proteins (such as IRSp53)
|
580 |
+
[44, 45].
|
581 |
+
Note that protrusions of similar shapes to our aligned-force protrusions, which have a bulbous tip and a slender
|
582 |
+
neck (Figs.6,7), were theoretically predicted to form by anisotropic CMC, even without force [46]. Similar thin tubes
|
583 |
+
with bulbous tips are observed in cellular nanotubes [47] and in filopodia [48]. Since many curved proteins, such as
|
584 |
+
IRSp53 are anisotropic in their intrinsic shape, it will be interesting to extend our work in the future to include such
|
585 |
+
anisotropy.
|
586 |
+
|
587 |
+
10
|
588 |
+
Finally, our simulations of an adhered vesicle (Fig.8) indicate that the filopodia protrusions can undergo attachment
|
589 |
+
and detachment from the substrate, resembling such motion observed in experiments [14]. In addition, when we
|
590 |
+
mixed the aligned-force and normal-force CMC with exclusive binding between them, we obtained their segregated
|
591 |
+
organization along the rim of the adhered vesicle. This is reminiscent of the observations of segregated regions of
|
592 |
+
bundled actin and branched actin nucleators along the rim of cellular protrusions extending on adhered substrates
|
593 |
+
[37, 49–51]. As in the experiments, the clusters of aligned-force CMC along the rim slightly protrude, as they exert
|
594 |
+
a higher local force on the membrane rim, compared to the normal-force CMC. These small protrusions have been
|
595 |
+
termed ”spikes” and ”microspikes” along the edge of lamellipodia in cells [45, 50, 52].
|
596 |
+
In Fig.9 we show images illustrating the dynamics of filopodia in cells, using lattice light-sheet microscopy, which is
|
597 |
+
capable of the high spatial and temporal resolution necessary to view the dynamics of the thin filopodia [53]. The
|
598 |
+
curved membrane protein IRSp53 is fluorescently labeled in green (GFP-IRSp53), while the actin filaments are labeled
|
599 |
+
in red (mCherry-lifeact). We observe in the experiments several features that are captured by the theoretical model:
|
600 |
+
The filopodia are highly dynamic, both at the cell rim and along its dorsal surface (Fig.9A-D), as we also see in the
|
601 |
+
model (Fig.8). The filopodia in the experiments migrate on the cell surface, merge with other filopodia, and undergo
|
602 |
+
attachments and detachments from the surface (see SI movies 5-8), as we also see in the simulations (SI movies 3 and
|
603 |
+
4). Our assumption in the model of uniform adhesion along the membrane, and along the filopodia, agrees with some
|
604 |
+
observations [48, 54], and we can add more complex adhesion models in the future if needed. Note that in the cells we
|
605 |
+
observe an additional retraction motion that is driven by myosin-II contractile forces, which we do not have in our
|
606 |
+
current model.
|
607 |
+
The highly curved IRSp53 is observed to aggregate strongly at the tips of the filopodia, while along the lower parts
|
608 |
+
of the protrusion its aggregation is more fragmented (Fig.9E,F). This fits with the shapes that we obtained in the
|
609 |
+
model (Fig.6B,8A). Furthermore, our simulations of mixtures of aligned-force and normal-force CMC indicate that
|
610 |
+
while the aligned-force CMC are essential for forming the filopodia protrusions and occupy its tip region, there can be
|
611 |
+
significant amount of normal-force CMC along the lower part of the filpodia. Since the normal-force CMC correspond
|
612 |
+
to branched-actin nucleators, this result suggests that along the lower part of filopodia we may expect to find proteins
|
613 |
+
such as WAVE, which are usually associated with the leading edge of the lamellipodia. This prediction is supported by
|
614 |
+
some experimental observations of WAVE proteins [55], Arp2/3 complexes [56], and small lamellipodia-like protrusions,
|
615 |
+
along filopodia shafts [57].
|
616 |
+
C.
|
617 |
+
Membrane shapes driven by mixtures of passive concave and active convex CMC
|
618 |
+
Our mixtures of CMC of opposite curvatures (Figs.4C,5) gives rise to membrane shapes that resemble in their
|
619 |
+
texture the ruffles observed in cells [20]. In addition, we find that when the passive concave component is highly
|
620 |
+
curved, we observe a phase separation within the CMC clusters, whereby the concave CMC forms an internalized
|
621 |
+
spherical invagination. These invaginations are then squeezed at their base by the active forces induced by the convex
|
622 |
+
CMC, and the calculated membrane shape dynamics resembles the process of actin-dependent endycytosis [17, 58–60]
|
623 |
+
and macropinocytosis [34, 61–63].
|
624 |
+
Note that there is some experimental evidence that the internalized membrane, corresponding to our concave CMC
|
625 |
+
region, do indeed contain concave membrane components, such as BAR proteins [64]. In addition, there are examples
|
626 |
+
where the internalized region contains membrane components that interact with the convex proteins that recruit actin
|
627 |
+
and form the squeezing at the narrow neck. In [59] the internalized activated integrins and associated proteins, bind to
|
628 |
+
the actin which is nucleated at the neck, recruited there by IRSp53 (convex) proteins. In our model we show that such
|
629 |
+
a direct interaction is necessary for robust formation of the internalized sacks with the recruited convex proteins at the
|
630 |
+
neck.
|
631 |
+
X.
|
632 |
+
DISCUSSION
|
633 |
+
In this study we greatly extend our theoretical understanding of the space of membrane shapes that are produced
|
634 |
+
by curved membrane protein complexes (CMC) that exert active protrusive forces on the membrane [15]. We started
|
635 |
+
by mapping the phases as function of the magnitude of the active force and attractive nearest-neighbor interaction
|
636 |
+
strength of CMCs (Fig.2A), demonstrating the competition between these two terms: systems dominated by the
|
637 |
+
binding interactions tend to have the equilibrium (pearled) shapes of the CMC clusters. The active forces tend to
|
638 |
+
break-up the pearled clusters, and induce the formation of either elongated or flat pancake-like membrane shapes.
|
639 |
+
Similarly we exposed the phase diagram in terms of the active force and the CMC spontaneous curvature (Fig.4A),
|
640 |
+
whereby highly curved CMC induce flattened vesicle shapes, while less curved CMC induce elongated tubular shapes.
|
641 |
+
Note that in these studies the protrusive force applied by each CMC is towards the local outwards normal.
|
642 |
+
|
643 |
+
11
|
644 |
+
Based on these results we further explored systems where highly curved active CMC could induce tubular protrusions.
|
645 |
+
We tested two possible scenarios: In the first one, the effective curvature of the CMC cluster is reduced by mixing
|
646 |
+
two types of CMC of opposite curvatures, such that a tubular protrusion forms with a rather flat CMC cluster at its
|
647 |
+
tip (Fig.4C,D). In the second, the net protrusive force of the CMC cluster is increased by introducing an alignment
|
648 |
+
interaction that tends to align the forces exerted by CMC that are bound within the same cluster (Fig.6). This
|
649 |
+
alignment is found to stabilize long tubular CMC clusters, since the aligned active forces act along the tube axis and
|
650 |
+
do not act to expand the tube, unlike the case of normal protrusive forces.
|
651 |
+
We found that that mixtures of CMC of opposite curvatures, specifically passive concave and active convex, lead
|
652 |
+
to formation of clusters with complex textures that resemble ruffles on cell membranes (Figs.4C,5). In addition, we
|
653 |
+
found in these systems the formation of internalized invaginations, where the convex active CMC form a narrow neck,
|
654 |
+
resembling endocytosis and macropinocytosis in cells.
|
655 |
+
To conclude, the results presented in this work expand out theoretical understanding of membrane shapes and
|
656 |
+
dynamics driven by intrinsic (spontaneous) curvature of membrane components and cytoskeletal active forces. Some
|
657 |
+
of these shapes resemble observed membrane dynamics in living cells, suggesting that this coupling between curved
|
658 |
+
membrane proteins and cytoskeleton forces gives rise to these biological phenomena. Many of the features that we
|
659 |
+
found, such as the ruffles and the internalized invaginations by mixing CMC of different curvatures, remain to be
|
660 |
+
further explored in future theoretical studies. In addition, future studies will explore the dynamics of the membranes
|
661 |
+
when the CMC have anisotropic spontaneous curvature, and also in the presence of contractile forces.
|
662 |
+
Conflict of Interest Statement
|
663 |
+
The authors declare that the research was conducted in the absence of any commercial or financial relationships
|
664 |
+
that could be construed as a potential conflict of interest.
|
665 |
+
Author Contributions
|
666 |
+
YR and NG developed the theoretical model; SP and AI developed the software; YR and NG conceived, designed
|
667 |
+
and implemented the analysis of the model, and prepared the manuscript. YK and SS cultured and imaged the cells.
|
668 |
+
The manuscript was edited by all the authors.
|
669 |
+
Funding
|
670 |
+
NG is the incumbent of the Lee and William Abramowitz Professorial Chair of Biophysics, and acknowledges support
|
671 |
+
by the Ben May Center for Theory and Computation, and the Israel Science Foundation (Grant No. 207/22). AI and
|
672 |
+
SM were supported by the Slovenian Research Agency (ARRS) through the Grants No. J3-3066 and J2-4447 and
|
673 |
+
Programme No. P2-0232. YK and SS was supported by grants from the JSPS (KAKENHI JP20H03252, JP20KK0341,
|
674 |
+
and JP21H05047) and JST CREST (JPMJCR1863) to SS and Takeda Science Foundation, a Grant-in-Aid for
|
675 |
+
Challenging Exploratory Research (KAKENHI No. 20K20379), and JST CREST (JPMJCR1863) to YK.
|
676 |
+
Acknowledgments
|
677 |
+
NG is the incumbent of the Lee and William Abramowitz Professorial Chair of Biophysics. This research is made
|
678 |
+
possible in part by the historic generosity of the Harold Perlman Family.
|
679 |
+
Supplemental Data
|
680 |
+
The SI text, figures, and movies are also available from the Box drive.
|
681 |
+
Data Availability Statement
|
682 |
+
The code for generating the simulations of this study can be found in the GitHub repository of YR, which is taken
|
683 |
+
and modified off the GitBlit repository of SP. Reconstruction of the initial simulation folders are also available from
|
684 |
+
|
685 |
+
12
|
686 |
+
the Box drive. Further data or code requests will be happily fulfilled by YR.
|
687 |
+
[1] F. Frey and T. Idema, Soft matter 17, 3533 (2021), ISSN 1744-6848.
|
688 |
+
[2] P. K. Mattila and P. Lappalainen, Nature Reviews Molecular Cell Biology 9, 446 (2008), ISSN 14710072.
|
689 |
+
[3] M. Simunovic, G. A. Voth, A. Callan-Jones, and P. Bassereau, Trends Cell Biol. 2015 (2015).
|
690 |
+
[4] N. Gov, Philosophical Transactions of the Royal Society B: Biological Sciences 373, 20170115 (2018).
|
691 |
+
[5] M. Foˇsnariˇc, S. Peniˇc, A. Igliˇc, V. Kralj-Igliˇc, M. Drab, and N. S. Gov, Soft Matter 15, 5319 (2019), ISSN 17446848,
|
692 |
+
1812.01460.
|
693 |
+
[6] I. Begemann, T. Saha, L. Lamparter, I. Rathmann, D. Grill, L. Golbach, C. Rasch, U. Keller, B. Trappmann, M. Matis,
|
694 |
+
et al., Nature Physics 15, 848 (2019).
|
695 |
+
[7] A. Pipathsouk, R. M. Brunetti, J. P. Town, B. R. Graziano, A. Breuer, P. A. Pellett, K. Marchuk, N.-H. T. Tran, M. F.
|
696 |
+
Krummel, D. Stamou, et al., Journal of Cell Biology 220, e202003086 (2021).
|
697 |
+
[8] G. Scita, S. Confalonieri, P. Lappalainen, and S. Suetsugu, Trends in cell biology 18, 52 (2008).
|
698 |
+
[9] S. Ahmed, W. I. Goh, and W. Bu, in Seminars in cell & developmental biology (Elsevier, 2010), vol. 21, pp. 350–356.
|
699 |
+
[10] F. Vaggi, A. Disanza, F. Milanesi, P. P. Di Fiore, E. Menna, M. Matteoli, N. S. Gov, G. Scita, and A. Ciliberto, PLoS
|
700 |
+
computational biology 7, e1002088 (2011).
|
701 |
+
[11] G. Mancinelli, L. Lamparter, G. Nosov, T. Saha, A. Pawluchin, R. Kurre, C. Rasch, M. Ebrahimkutty, J. Klingauf, and
|
702 |
+
M. Galic, Proceedings of the National Academy of Sciences 118, e2106921118 (2021).
|
703 |
+
[12] F.-C. Tsai, J. M. Henderson, Z. Jarin, E. Kremneva, Y. Senju, J. Pernier, O. Mikhajlov, J. Manzi, K. Kogan, C. L.
|
704 |
+
Clainche, et al., Science Advances 8, eabp8677 (2022), https://www.science.org/doi/pdf/10.1126/sciadv.abp8677, URL
|
705 |
+
https://www.science.org/doi/abs/10.1126/sciadv.abp8677.
|
706 |
+
[13] S. Fox, A. Tran, L. Trinkle-Mulcahy, and J. W. Copeland, Journal of Biological Chemistry 298 (2022).
|
707 |
+
[14] S. Y. Lee, T. Fujioka, M. Osuga, T. Nishimura, and S. Suetsugu, in Plasma Membrane Shaping (Elsevier, 2023), pp.
|
708 |
+
245–263.
|
709 |
+
[15] M. Drab, R. K. Sadhu, Y. Ravid, A. Igliˇc, V. Kralj-Igliˇc, and N. S. Gov, Plasma Membrane Shaping pp. 415–429 (2023).
|
710 |
+
[16] H. Mellor, Biochimica et Biophysica Acta (BBA)-Molecular Cell Research 1803, 191 (2010).
|
711 |
+
[17] G. J. Doherty and H. T. McMahon, Annual review of biochemistry 78, 857 (2009).
|
712 |
+
[18] R. K. Sadhu, S. Peniˇc, A. Igliˇc, and N. S. Gov, European Physical Journal Plus 136, 495 (2021), ISSN 21905444, 2101.00313.
|
713 |
+
[19] N. S. Gov, V. Kralj-Igliˇc, R. K. Sadhu, L. Mesarec, and A. Igliˇc, in Plasma Membrane Shaping (Elsevier, 2023), pp. 393–413.
|
714 |
+
[20] E. Sitarska, S. D. Almeida, M. S. Beckwith, J. Stopp, Y. Schwab, M. Sixt, A. Kreshuk, A. Erzberger, and A. Diz-Mu˜noz,
|
715 |
+
bioRxiv p. 2021.03.26.437199 (2021).
|
716 |
+
[21] J. Faix and K. Rottner, Current Opinion in Cell Biology 18, 18 (2006), ISSN 09550674.
|
717 |
+
[22] T. Vicsek and A. Zafeiris, Physics reports 517, 71 (2012).
|
718 |
+
[23] D. Mashiko, Y. Fujihara, Y. Satouh, H. Miyata, A. Isotani, and M. Ikawa, Scientific reports 3, 1 (2013).
|
719 |
+
[24] K. Hanawa-Suetsugu, Y. Itoh, M. Ab Fatah, T. Nishimura, K. Takemura, K. Takeshita, S. Kubota, N. Miyazaki, W. N. I.
|
720 |
+
Wan Mohamad Noor, T. Inaba, et al., Nature communications 10, 1 (2019).
|
721 |
+
[25] B.-C. Chen, W. R. Legant, K. Wang, L. Shao, D. E. Milkie, M. W. Davidson, C. Janetopoulos, X. S. Wu, J. A. Hammer III,
|
722 |
+
Z. Liu, et al., Science 346, 1257998 (2014).
|
723 |
+
[26] T. Nishimura, T. Oyama, H. T. Hu, T. Fujioka, K. Hanawa-Suetsugu, K. Ikeda, S. Yamada, H. Kawana, D. Saigusa,
|
724 |
+
H. Ikeda, et al., Developmental cell 56, 842 (2021).
|
725 |
+
[27] M. D. Welch and R. D. Mullins, Annual review of cell and developmental biology 18, 247 (2002).
|
726 |
+
[28] M.-F. Carlier and D. Pantaloni, Journal of Biological Chemistry 282, 23005 (2007).
|
727 |
+
[29] K. G. Campellone and M. D. Welch, Nature reviews Molecular cell biology 11, 237 (2010).
|
728 |
+
[30] K. Bohinc, V. Kralj-Igliˇc, and S. May, The Journal of chemical physics 119, 7435 (2003).
|
729 |
+
[31] D. N. Theodorou and U. W. Suter, Macromolecules 18, 1206 (1985).
|
730 |
+
[32] G. Golani, N. Ariotti, R. G. Parton, and M. M. Kozlov, Developmental Cell 48, 523 (2019), ISSN 15345807.
|
731 |
+
[33] S. Peniˇc, L. Mesarec, M. Foˇsnariˇc, L. Mr´owczy´nska, H. H¨agerstrand, V. Kralj-Igliˇc, and A. Igliˇc, Frontiers in Physics 8, 342
|
732 |
+
(2020).
|
733 |
+
[34] R. R. Kay, Cells & Development 168, 203713 (2021).
|
734 |
+
[35] N. Saito and S. Sawai, Iscience 24, 103087 (2021).
|
735 |
+
[36] L. Mesarec, W. G´o´zd´z, V. K. Igliˇc, S. Kralj, and A. Igliˇc, Colloids and Surfaces B: Biointerfaces 141, 132 (2016).
|
736 |
+
[37] J. Faix and K. Rottner, Journal of Cell Science 135, jcs259226 (2022).
|
737 |
+
[38] J. V. Small, T. Stradal, E. Vignal, and K. Rottner, Trends in cell biology 12, 112 (2002).
|
738 |
+
[39] T. Takenawa and S. Suetsugu, Nature reviews Molecular cell biology 8, 37 (2007).
|
739 |
+
[40] K. Rottner and M. Schaks, Current opinion in cell biology 56, 53 (2019).
|
740 |
+
[41] S. Suetsugu, K. Murayama, A. Sakamoto, K. Hanawa-Suetsugu, A. Seto, T. Oikawa, C. Mishima, M. Shirouzu, T. Takenawa,
|
741 |
+
and S. Yokoyama, Journal of Biological Chemistry 281, 35347 (2006).
|
742 |
+
[42] A. Pawluchin and M. Galic, Frontiers in Cell and Developmental Biology 10 (2022), ISSN 2296-634X, URL https:
|
743 |
+
//www.frontiersin.org/articles/10.3389/fcell.2022.1080995.
|
744 |
+
[43] M. Krause and A. Gautreau, Nature reviews Molecular cell biology 15, 577 (2014).
|
745 |
+
|
746 |
+
13
|
747 |
+
parameter
|
748 |
+
units
|
749 |
+
Fig.1,[5]
|
750 |
+
Fig.2
|
751 |
+
Fig.4A
|
752 |
+
Fig.4C
|
753 |
+
Fig.6
|
754 |
+
Fig.7
|
755 |
+
Fig.8
|
756 |
+
f
|
757 |
+
KBT/ℓmin
|
758 |
+
1
|
759 |
+
0 − 1.2 0 − 0.5
|
760 |
+
0.5
|
761 |
+
0.2
|
762 |
+
0.2, 0.5
|
763 |
+
0.5
|
764 |
+
w
|
765 |
+
KBT
|
766 |
+
1
|
767 |
+
0 − 4.8
|
768 |
+
2
|
769 |
+
2
|
770 |
+
2
|
771 |
+
2
|
772 |
+
2
|
773 |
+
κ
|
774 |
+
KBT
|
775 |
+
20*
|
776 |
+
20
|
777 |
+
28.5
|
778 |
+
28.5
|
779 |
+
28.5
|
780 |
+
28.5
|
781 |
+
28.5
|
782 |
+
ρ
|
783 |
+
1
|
784 |
+
0%-20%
|
785 |
+
10%
|
786 |
+
20%
|
787 |
+
10%, 10%
|
788 |
+
20%
|
789 |
+
20%,
|
790 |
+
10%, 10%
|
791 |
+
C0
|
792 |
+
1/ℓmin
|
793 |
+
1(0)
|
794 |
+
1
|
795 |
+
0.8
|
796 |
+
-0.75 − 0, 0.8
|
797 |
+
0.4
|
798 |
+
0.4, 0.1
|
799 |
+
0.8
|
800 |
+
TABLE I: The values of the model parameters used in the simulations, in the different figures. The energy units are KBT = 1,
|
801 |
+
which define the scale of f, w, κ, and the length units are ℓmin = 1, which define the scale of the vertex lattice, the force, and
|
802 |
+
spontaneous curvature.
|
803 |
+
[44] S. K¨uhn, C. Erdmann, F. Kage, J. Block, L. Schwenkmezger, A. Steffen, K. Rottner, and M. Geyer, Nature communications
|
804 |
+
6, 1 (2015).
|
805 |
+
[45] T. Pokrant, J. I. Hein, S. K¨orber, A. Disanza, A. Pich, G. Scita, K. Rottner, and J. Faix, Proceedings of the National
|
806 |
+
Academy of Sciences 120, e2217437120 (2023).
|
807 |
+
[46] N. Bobrovska, W. G´o´zd´z, V. Kralj-Igliˇc, and A. Igliˇc, PloS one 8, e73941 (2013).
|
808 |
+
[47] K. Schara, V. Janˇsa, V. ˇSuˇstar, D. Dolinar, J. I. Pavliˇc, M. Lokar, V. Kralj-Igliˇc, P. Veraniˇc, and A. Igliˇc, Cellular &
|
809 |
+
molecular biology letters 14, 636 (2009).
|
810 |
+
[48] M. Miihkinen, M. L. Gr¨onloh, A. Popovi´c, H. Vihinen, E. Jokitalo, B. T. Goult, J. Ivaska, and G. Jacquemet, Cell reports
|
811 |
+
36, 109716 (2021).
|
812 |
+
[49] C. S. Cohan, E. A. Welnhofer, L. Zhao, F. Matsumura, and S. Yamashiro, Cell motility and the cytoskeleton 48, 109 (2001).
|
813 |
+
[50] J. Damiano-Guercio, L. Kurzawa, J. Mueller, G. Dimchev, M. Schaks, M. Nemethova, T. Pokrant, S. Br¨uhmann, J. Linkner,
|
814 |
+
L. Blanchoin, et al., Elife 9 (2020).
|
815 |
+
[51] F. Kage, H. D¨oring, M. Mietkowska, M. Schaks, F. Gr¨uner, S. Stahnke, A. Steffen, M. M¨usken, T. E. Stradal, and K. Rottner,
|
816 |
+
Journal of Cell Science 135, jcs260364 (2022).
|
817 |
+
[52] S. A. Koestler, S. Auinger, M. Vinzenz, K. Rottner, and J. V. Small, Nature cell biology 10, 306 (2008).
|
818 |
+
[53] Y. Mimori-Kiyosue, in Plasma Membrane Shaping (Elsevier, 2023), pp. 357–374.
|
819 |
+
[54] Y. Tu, K. Pal, J. Austin, and X. Wang, Current Biology 32, 4386 (2022).
|
820 |
+
[55] M. Nozumi, H. Nakagawa, H. Miki, T. Takenawa, and S. Miyamoto, Journal of cell science 116, 239 (2003).
|
821 |
+
[56] S. A. Johnston, J. P. Bramble, C. L. Yeung, P. M. Mendes, and L. M. Machesky, BMC cell biology 9, 1 (2008).
|
822 |
+
[57] C. Lebrand, E. W. Dent, G. A. Strasser, L. M. Lanier, M. Krause, T. M. Svitkina, G. G. Borisy, and F. B. Gertler, Neuron
|
823 |
+
42, 37 (2004).
|
824 |
+
[58] O. L. Mooren, B. J. Galletta, and J. A. Cooper, Annual review of biochemistry 81, 661 (2012).
|
825 |
+
[59] P. Moreno-Layseca, N. Z. J¨antti, R. Godbole, C. Sommer, G. Jacquemet, H. Al-Akhrass, J. R. Conway, P. Kronqvist, R. E.
|
826 |
+
Kallionp¨a¨a, L. Oliveira-Ferrer, et al., Nature cell biology 23, 1073 (2021).
|
827 |
+
[60] C. Kaplan, S. J. Kenny, X. Chen, J. Sch¨oneberg, E. Sitarska, A. Diz-Mu˜noz, M. Akamatsu, K. Xu, and D. G. Drubin,
|
828 |
+
Molecular Biology of the Cell 33, ar50 (2022).
|
829 |
+
[61] S. L. Sønder, S. C. H¨ager, A. S. B. Heitmann, L. B. Frankel, C. Dias, A. C. Simonsen, and J. Nylandsted, Science Advances
|
830 |
+
7, eabg1969 (2021).
|
831 |
+
[62] S. Mylvaganam, S. A. Freeman, and S. Grinstein, Current Biology 31, R619 (2021).
|
832 |
+
[63] J. Lutton, P. Paschke, C. Munn, J. S. King, R. Kay, T. Bretschneider, et al., bioRxiv (2022).
|
833 |
+
[64] M. V. Baranov, R. A. Olea, and G. van den Bogaart, Trends in cell biology 29, 727 (2019).
|
834 |
+
|
835 |
+
14
|
836 |
+
FIG. 1: Phases of vesicle shapes driven by curved active CMC, as obtained in [5]. (A) Phase diagram in the temperature-density
|
837 |
+
plane: mixed (gas), budded, and flattened (pancake). The gas phase is dominated by entropy, hence appears at either high
|
838 |
+
temperatures or low densities. The pancake phase is dominated by having favorable binding and bending energy, where the
|
839 |
+
active forces are all radial and stabilize the flat shape. This phase requires large stable CMC cluster, and so can only appear at
|
840 |
+
low temperatures. The budded phase appears between the two other phases. At a CMC density that is lower than the minimal
|
841 |
+
value needed for a closed circular rim, the pancake shape changes to B) a two-arcs phase, while when the CMC concentration is
|
842 |
+
very high the pancake forms pearled extensions that contain the surplus CMC (C). There are two other phases in different
|
843 |
+
regimes: (D) The pearling phase appears at higher CMC density, where most of the CMC aggregate into long necklace-like
|
844 |
+
clusters that minimize the protein-protein binding energy (phase-separation of CMC), and (E) highly-elongated (tubular) phase
|
845 |
+
for flat CMCs, where large CMC caps can exert a strong force that pulls out elongated tubes. Pictures taken from [5] Figs.4c,7d,
|
846 |
+
and SI.
|
847 |
+
|
848 |
+
(A)
|
849 |
+
2
|
850 |
+
1.5
|
851 |
+
Mixed
|
852 |
+
I
|
853 |
+
Budded
|
854 |
+
0.5
|
855 |
+
Pancake
|
856 |
+
4
|
857 |
+
6
|
858 |
+
8
|
859 |
+
10
|
860 |
+
12
|
861 |
+
14
|
862 |
+
16
|
863 |
+
p[%]15
|
864 |
+
FIG. 2: Force-binding strength plane. (A) Phase diagram as function of f and w, with: κ = 20, C0 = 1, and ρ = 10%. The
|
865 |
+
different phases are indicated by their names, and a typical snapshot of the vesicle after a long simulation is shown. The
|
866 |
+
transition lines between the phases were drawn according to the measures shown in the bottom panels. The gas and buds phase
|
867 |
+
is separated by mean cluster size ⟨N⟩ = 1.5 (yellow solid line), as obtained from (B). The green line denotes the boundary of the
|
868 |
+
flat phase, obtained approximately from a contour of the first (small) gyration eigenvalue λ2
|
869 |
+
1, which is minimal for flat shapes
|
870 |
+
(C). The light blue line denotes the boundary of the elongated shapes, roughly following a contour of the second (intermediate)
|
871 |
+
gyration eigenvalue λ2
|
872 |
+
2 (D). The transition line between the buds and mixed phases is given by a contour of CMC perimeter
|
873 |
+
length (¯ℓp = 1.875, red solid line), extracted from (E). Finally, the pearling phase transition line (red dotted line) is drawn along
|
874 |
+
the contour of small CMC perimeter length (¯ℓp = 0.375), from (E). In panels (B-E) we plot heatmaps of the following quantities:
|
875 |
+
(B) Mean cluster size for clusters smaller than 10, ⟨N⟩ > 10 (C) first (small) gyration eigenvalue λ2
|
876 |
+
1, (D) second (intermediate)
|
877 |
+
gyration eigenvalue λ2
|
878 |
+
2, (E) Mean CMC cluster perimeter length (excluding isolated CMC) ¯ℓ.
|
879 |
+
|
880 |
+
Elongated
|
881 |
+
Mixed16
|
882 |
+
FIG. 3: Evolution of the MC simulation at four different points (B-E) denoted on the phase diagram (A) (Fig.2A). (B): f=0.8,
|
883 |
+
w=1.6, (C): f=0.8, w=2.88, (D): f=0.8, w=3.20, and (E): f=0.4, w=4.16. The MC time-steps shown in the snapshots are: (i) 10,
|
884 |
+
(ii) 50 (ii) and (iii) 200, and the final time-step (299) is shown on the phase diagram (A). At time (i), all simulations are in the
|
885 |
+
budded state. At time (ii), arc and pearling clusters begin to form, favoring arcs for large forces and pearling for large binding
|
886 |
+
strength. At time (iii), the vesicles are close to their final steady-state shapes. The flat simulation (B) generates several arcs
|
887 |
+
in stage (ii), which coalesce to form a circular stable rim. The pearling simulation (E) generates pearling clusters (ii) which
|
888 |
+
coalesce into a few larger clusters (coarsening). In contrast, the elongated simulations generate both arcs and pearled clusters at
|
889 |
+
the intermediate stage (ii). These arc-like clusters are sufficient stretch the vesicle, even in (D), to give rise to the final elongated
|
890 |
+
phase.
|
891 |
+
|
892 |
+
Ci
|
893 |
+
D i
|
894 |
+
11
|
895 |
+
Bi
|
896 |
+
ili
|
897 |
+
Ei
|
898 |
+
ili17
|
899 |
+
FIG. 4: (A) Phase diagram in the force-spontaneous curvature plane, using the parameters: ρ = 20%, κ = 28.5, w = 2. The
|
900 |
+
different phases are denoted by their typical shapes, and the thin colored transition lines were drawn by hand (yellow, red and
|
901 |
+
green). With no or weak force, we find a budded phase. As the force is increased, we find for the high spontaneous curvature
|
902 |
+
the flat phase. As the spontaneous curvature is reduced, the flat phase is observed to give way to an ”arcs” phase, which is
|
903 |
+
finally replaced by a highly-elongated tubular phase. The thick blue line denotes the theoretical calculation for the transition
|
904 |
+
line that bounds the tubes phase, which is a cubic equation: f = AC3
|
905 |
+
0 (Eq.9), where we use: A ≈ 10.6. This equation is derived
|
906 |
+
from the force balance shown schematically in (B). (C) Typical steady-state snapshots of simulations with a mixture of CMC:
|
907 |
+
active convex CMC (C0 = 0.8, f = 0.5, ρ = 10%), and passive concave CMCs (ρ = 10%) with different concave curvatures
|
908 |
+
C−
|
909 |
+
0 (along the x-axis). We show here three cases: i) no inhibition of the active convex CMC, ii) proportional inhibition, where
|
910 |
+
the force exerted by a convex CMC is proportional to number of non-concave neighbors, and iii) disabling interaction, where
|
911 |
+
the convex CMC do not exert any force if they have a concave neighbor. (D) Mapping of the vesicles shown in (C) to their
|
912 |
+
respective locations in the force-spontaneous curvature phase diagram (A), using the average force and spontaneous curvature of
|
913 |
+
the mixture (dashed outlines). The snapshots are shown at shifted locations, according to the effective curvature when we take
|
914 |
+
into account the phase-separation of the concave CMC, into internalized sacks. These shifts in locations are most dramatic for
|
915 |
+
1i,1ii,2ii,1iii,2iii (indicated by arrows), which places the vesicles in a phase which is appropriate for their shapes.
|
916 |
+
|
917 |
+
2
|
918 |
+
Flat
|
919 |
+
SO
|
920 |
+
ubes
|
921 |
+
Arcs
|
922 |
+
Buds
|
923 |
+
Flat
|
924 |
+
5i
|
925 |
+
61
|
926 |
+
2ii
|
927 |
+
Tubes
|
928 |
+
3ii
|
929 |
+
4ii
|
930 |
+
511
|
931 |
+
61l
|
932 |
+
1ili
|
933 |
+
Arcs
|
934 |
+
2ili
|
935 |
+
5ili.
|
936 |
+
Buds
|
937 |
+
6ili
|
938 |
+
3ill18
|
939 |
+
FIG. 5: Mixed clusters can precipitate internal sacks, which are composed almost entirely of the concave (passive) CMC, when
|
940 |
+
the concave CMCs are highly curved C0 = −0.75, −0.6. This is shown in A(i,ii),C(i,ii) for a system with and without active
|
941 |
+
force, respectively. This internal sack is connected to the outside by a thin neck, or ”hole”, shown in A(iii) and C(iii). The
|
942 |
+
cross-sectional area of the hole was measured by computing the area of the polygon made from the hole edge, which was picked
|
943 |
+
by hand (vertices). A histogram of the simulated hole sizes is shown for the system with and without active force respectively
|
944 |
+
(B,D). It is clear that the hole size is smaller in systems with force (B), such that it is in the limit of the simulation resolution.
|
945 |
+
The holes are also larger as the spontaneous curvature of the passive concave CMC is smaller. The insets of B,D show typical
|
946 |
+
examples of sacks (light blue nodes) connected to the outer part of the cluster (blue nodes) through the neck region (grey
|
947 |
+
shading). (E) and (F): Snapshots showing the formation of a sack for the system with active force (A), from the initial random
|
948 |
+
state. In (E) we show the cluster viewed from outside of the vesicle (where the bare membrane is rendered invisible), looking
|
949 |
+
down on the patch that forms the sack, while in (F) we show the same process viewed from within the vesicle, where we see
|
950 |
+
clearly the final invagination.
|
951 |
+
|
952 |
+
Aii
|
953 |
+
A ili
|
954 |
+
curvature: -0.75
|
955 |
+
curvature: -0.6
|
956 |
+
Ai
|
957 |
+
B
|
958 |
+
10
|
959 |
+
5
|
960 |
+
20
|
961 |
+
25C
|
962 |
+
10
|
963 |
+
15
|
964 |
+
20
|
965 |
+
25
|
966 |
+
c i
|
967 |
+
c ii
|
968 |
+
cili
|
969 |
+
LO
|
970 |
+
15
|
971 |
+
20
|
972 |
+
25 0
|
973 |
+
10
|
974 |
+
15
|
975 |
+
20
|
976 |
+
50
|
977 |
+
Hole area
|
978 |
+
Hole area
|
979 |
+
0219
|
980 |
+
FIG. 6: (A) Vesicle steady-state shapes as function of the strength (s) and range (r) of the Vicsek-like alignment interaction
|
981 |
+
(Eq.10)(ρ = 20%,κ = 28.5,C0 = 0.4,w = 2,f = 0.2). Interaction radius smaller than 10 leads to a flat phase. Above an interaction
|
982 |
+
radius of 10, the system transitions from a flat to a tubes phase. In between the flat and elongated tubes phases, we find a phase
|
983 |
+
with ”paddle”-like clusters. The tubular phase is characterized by CMC clusters that are mostly finger-like with a bulbous tip
|
984 |
+
and a tubular sleeve, which often stretch a membrane tube behind them. (B) Snapshots of CMC clusters, with the active forces
|
985 |
+
indicated by the arrows, and the colormap indicating the dot product of the local force and local outwards normal. In the tubes
|
986 |
+
phase (s = 0.75, r = 15) we show in (i) an example of a hemispherical cluster, which is not able to pull an elongated protrusion.
|
987 |
+
In (ii) (top) we show an example of a CMC cluster that contains a tubular sleeve, which increases the net pulling force above
|
988 |
+
the threshold to pull a membrane tube. Note that at the sleeve base the alignment is weak due to the bare membrane boundary.
|
989 |
+
This effect is also shown in (iii) (bottom), where a small patch of bare membrane is trapped between the cluster tip and the
|
990 |
+
sleeve, leading to formation of two different alignment domains within the same cluster. Finally, in (iv) we show an example of
|
991 |
+
the paddle cluster (s = 0.1, r = 10), where the weak alignment interaction gives rise to shapes similar to the regular arc-like
|
992 |
+
clusters (Fig.4A), elongated by the non-normal force.
|
993 |
+
|
994 |
+
Tube
|
995 |
+
Paddle
|
996 |
+
Flat
|
997 |
+
iv
|
998 |
+
120
|
999 |
+
FIG. 7: (A) Dynamics of the formation of the tubular phase, driven by strong alignment interactions (ρ = 20%, κ = 28.5, C0 =
|
1000 |
+
0.4, w = 2, f = 0.2, s = 0.75, r = 15). Each circle represents a CMC-cluster at different MC time (x axis), the y axis represents
|
1001 |
+
the total force exerted by the cluster. The circle size represents the size of the CMC cluster (see sidebar). Color gives a persistent
|
1002 |
+
”identity” to each cluster, which last until fusion or fission. On the top right is a snapshot of the vesicle in the last time step.
|
1003 |
+
The four largest cluster are highlighted, and also shown on the right of the panel. Below the x-axis, we give snapshots of the
|
1004 |
+
vesicle. The rapid initial formation of buds is seen followed by slower fusion of clusters to form elongated protrusions. Two
|
1005 |
+
of the final large clusters, the bud and one of the elongated tube, are relatively stable, while the other two elongated clusters
|
1006 |
+
have wildly oscillating force. We can see on the right that the fluctuating cluster incorporates a few bare membrane vertices
|
1007 |
+
(Fig. 6B,iii). (B) The dynamics of tube formation due to aligned force with highly curved CMCs (top, s = 0.5, r = 30, f = 0.2,
|
1008 |
+
C0 = 0.4) compared to formation due to shallow (weakly curved) CMCs with normal force (bottom, f = 0.5, C0 = 0.1). The
|
1009 |
+
tubes of the latter are more dynamic and less stable than clusters of the former. This is also seen on the right panel, which
|
1010 |
+
shows the total force on the largest clusters, which is far less noisy for the former.
|
1011 |
+
|
1012 |
+
50
|
1013 |
+
Sizes
|
1014 |
+
40
|
1015 |
+
2
|
1016 |
+
30
|
1017 |
+
4
|
1018 |
+
8
|
1019 |
+
20
|
1020 |
+
16
|
1021 |
+
32
|
1022 |
+
10
|
1023 |
+
64
|
1024 |
+
128
|
1025 |
+
256
|
1026 |
+
20
|
1027 |
+
40
|
1028 |
+
60
|
1029 |
+
80
|
1030 |
+
100
|
1031 |
+
120
|
1032 |
+
140
|
1033 |
+
timestep
|
1034 |
+
75
|
1035 |
+
50
|
1036 |
+
25
|
1037 |
+
0
|
1038 |
+
200
|
1039 |
+
400
|
1040 |
+
75
|
1041 |
+
50
|
1042 |
+
25
|
1043 |
+
0
|
1044 |
+
200
|
1045 |
+
40021
|
1046 |
+
FIG. 8: A: Initial progress of simulation with normal-force CMCs (red) and aligned-force CMCs (yellow), in universal binding
|
1047 |
+
(top) and type-exclusive binding (bottom), from the side and above (ρalign = 10%, ρnormal = 10%, κ = 28.5, C0 = 0.8, w = 2,
|
1048 |
+
f = 0.5, s = 0, 1, r = 15, wad = 0.25). CMCs in the rim drive the spreading of the vesicle on the surface, while some aligned-force
|
1049 |
+
CMCs aggregate into a bulb-and-sleeve cluster which drives the formation of a filopodia-like protrusion. This protrusion can
|
1050 |
+
attach to the rim cluster and then adhere to the substrate, while it can also detach from the substrate, and consequently also from
|
1051 |
+
the rim cluster. B: Evolution of the segregation factor in the simulations (Eq.11). The colored lines give the segregation factor
|
1052 |
+
for each cluster, with the cluster size indicated by the line thickness. In the inset we give the average of the total segregation
|
1053 |
+
factor for 4 independent simulations. In the universal binding simulation we can see the fliopodia-like cluster repeatedly attach
|
1054 |
+
and detach from the rim cluster. The rim cluster is mostly mixed for this case, while the protrusion is much more segregated, as
|
1055 |
+
its tip is enriched with aligned-force CMCs.
|
1056 |
+
|
1057 |
+
0.4
|
1058 |
+
1.00
|
1059 |
+
1.00
|
1060 |
+
0.2
|
1061 |
+
0.75
|
1062 |
+
0.75
|
1063 |
+
factor
|
1064 |
+
0.0
|
1065 |
+
0.8
|
1066 |
+
0.50
|
1067 |
+
time 0
|
1068 |
+
50
|
1069 |
+
100 150 200 250
|
1070 |
+
0.50
|
1071 |
+
segregation t
|
1072 |
+
0.6
|
1073 |
+
detachments -
|
1074 |
+
0.25
|
1075 |
+
0.25
|
1076 |
+
0.4
|
1077 |
+
0
|
1078 |
+
50
|
1079 |
+
100
|
1080 |
+
150
|
1081 |
+
200
|
1082 |
+
250
|
1083 |
+
time
|
1084 |
+
0.00
|
1085 |
+
0.00
|
1086 |
+
Rim cluster
|
1087 |
+
0.25
|
1088 |
+
-0.25
|
1089 |
+
-0.50
|
1090 |
+
-0.50
|
1091 |
+
0
|
1092 |
+
50
|
1093 |
+
100
|
1094 |
+
150
|
1095 |
+
200
|
1096 |
+
250
|
1097 |
+
0
|
1098 |
+
50
|
1099 |
+
100
|
1100 |
+
150
|
1101 |
+
200
|
1102 |
+
250
|
1103 |
+
time
|
1104 |
+
time22
|
1105 |
+
FIG. 9: Movements of IRSp53-localized cellular protrusions. (A, B) The adhesion (A) and apical (B) plane section of the
|
1106 |
+
three-dimensional images of an IRSp53-knockout U251 glioblastoma cell expressing GFP-IRSp53 (green) and mCherry-lifeact
|
1107 |
+
(red). In (A) and (B), the region for the ∼ 2 µm thick xz section projection is indicated by the cyan dotted rectangle. (C) The
|
1108 |
+
xz section of the region of (A). The white lines indicate the plane in (A,B). The yellow line, which was set in the proximity
|
1109 |
+
of the surface plane of the cell, indicates the line for the kymograph. (D) The kymograph of the cell surface as indicated in
|
1110 |
+
the yellow line in (C), along with the annotation of the representative motion of the IRSp53. (E-F) The xy and xz sections at
|
1111 |
+
the regions that are marked in (A,B), from the periphery (E), the middle (F), and the center (G). The plane parallel to the
|
1112 |
+
plasma membrane was sectioned and the regions that were projected xy and xz sections each others were marked in cyan dotted
|
1113 |
+
rectangles. Arrows indicate the protrusions. The scale bar, 10 µm (A-D), 2 µm (E-G), and 50 sec (D).
|
1114 |
+
|
1115 |
+
xz section
|
1116 |
+
apical plane
|
1117 |
+
moving to
|
1118 |
+
the center (E)
|
1119 |
+
moving to
|
1120 |
+
the periphery (F)
|
1121 |
+
adhesion plane
|
1122 |
+
apical plane
|
1123 |
+
merging (G)Supplementary Material
|
1124 |
+
S-1.
|
1125 |
+
CALCULATION OF THE PERIMETER OF CMC CLUSTERS
|
1126 |
+
The CMC-bare membrane boundary is measured by summing the dual of the edges between the cluster and bare
|
1127 |
+
membrane. These are the edges in the voronoi lattice, connecting the mid-section of each edge to the circumcenter of
|
1128 |
+
the adjacent triangles i.e. the center of the inscribing circle (see figure S-1). Partitioning each triangle between its
|
1129 |
+
vertices is already used in the calculation of the curvature [1].
|
1130 |
+
S-2.
|
1131 |
+
ANALYTICAL CALCULATION OF THE FLAT-PEARLING PHASE TRANSITION LINE
|
1132 |
+
We can make a rough analytical estimation for the flat-pearling transition by equating the active work and energy of
|
1133 |
+
the flat phase from a mixed phase to the energy of the pearling phase (Fig. S-2). In the flat phase, moving the active
|
1134 |
+
CMCs outwards from the radius of the sphere rp to the larger radius of the flattened disc rf results in work. The
|
1135 |
+
pearling phase has binding advantage because all CMC vertices are connected, with −w per edge, while the flat rim
|
1136 |
+
has large interface (boundary perimeter length) where CMCs vertices neighbor bare membrane vertices, whose edge
|
1137 |
+
does not contribute. The pearling phase has a bending disadvantage due to the bare membrane body, which is roughly
|
1138 |
+
spherical with an energy of 8πκ, compare to the flat phase where the bare membrane is in two flat discs with no
|
1139 |
+
bending energy (both the pearling and rim clusters are curved to fit the CMCs, so they do not have bending energy).
|
1140 |
+
− (rf − rp) F = −w (χp − χf) + 8πκ
|
1141 |
+
(S-1)
|
1142 |
+
The radius difference ∆r = rf − rp (Fig. S-2), and the number of CMC-CMC bonds χp, χf in the pearling and
|
1143 |
+
flat phases respectively, are dependant on the geometry of the phases, so they should be very weakly dependant on
|
1144 |
+
the specific model parameters. Therefore ∆r and χp − χf do not depend on w, f, κ, and we end up having a linear
|
1145 |
+
relation between f and w along the transition line in the f, w phase diagram. In the force-binding strength (f − w)
|
1146 |
+
system, we take the values for these geometric quantities from simulations and draw the resulting line on the phase
|
1147 |
+
diagram (Fig. S-3, green line), which qualitatively matches the behavior of the transition observed in the simulations.
|
1148 |
+
S-3.
|
1149 |
+
MIXED CURVATURE CMC CLUSTERS
|
1150 |
+
The concave and convex CMCs generate a wavelike pattern, but analyzing it in terms of wavenumber is difficult,
|
1151 |
+
since the clusters are part of an irregular, triangulated surface. The undulations of the CMCs in the mixed clusters are
|
1152 |
+
essentially independent of C0, and f, as shown in Fig.S-4. Note that we are at the limit of the mesh resolution for
|
1153 |
+
these undulations. We have yet to be able to compare this to the experimental results in [2].
|
1154 |
+
S-4.
|
1155 |
+
MIXED CURVATURE WITH EXCLUSIVE BINDING
|
1156 |
+
The mixed curvature system (Fig. 4c in the main text) was also simulated using exclusive binding, i.e. only
|
1157 |
+
same-curvature CMCs bind together (Fig.S-5). The result is that the two CMCs types form separated aggregates,
|
1158 |
+
with the active convex CMCs aggregating along the rim and forming the flat phase. The passive concave CMC form
|
1159 |
+
separated clusters of different shapes, depending on their spontaneous curvature. Highly concave CMCs (C−
|
1160 |
+
0 ≤ −0.45)
|
1161 |
+
aggregate into internal pearling clusters, that do not affect the flat global phase. The shallower concave CMCs
|
1162 |
+
(C−
|
1163 |
+
0 ≥ −0.3) aggregate into large, shallow bowl-like patches.
|
1164 |
+
In some cases, these concave aggregates are able to form with convex CMC along their rim, since their curvatures
|
1165 |
+
complement each other (see for example at C−
|
1166 |
+
0 = −0.3). Since the convex active CMC along the rim of the concave
|
1167 |
+
cluster apply protrusive forces, they end up forming together a ”cup”-like protrusion. When the force is inhibited,
|
1168 |
+
this aggregation occurs, but it is not elongated as a protrusion (compare ”None” with ”Disable” at C−
|
1169 |
+
0 = −0.3 in
|
1170 |
+
Fig.S-5). Other than that, inhibition doesn’t appear to significantly affect the results in Fig.S-5, since there is no
|
1171 |
+
significant contact between the two CMC types. These shapes, in the form of open bowls, resemble early stages of
|
1172 |
+
macropinocytosis [3, 4], but do not evolve to induce closure of the ”mouth”, as we observed when the convex and
|
1173 |
+
concave CMC had direct interactions (Fig.5 in the main text).
|
1174 |
+
arXiv:2301.13055v1 [cond-mat.soft] 30 Jan 2023
|
1175 |
+
|
1176 |
+
2
|
1177 |
+
parameter
|
1178 |
+
units
|
1179 |
+
Fig.S-3
|
1180 |
+
Fig.S-4
|
1181 |
+
Fig.S-5
|
1182 |
+
Fig.S-6
|
1183 |
+
movie 1,2 movie 3,4
|
1184 |
+
f
|
1185 |
+
KBT/ℓmin 0 − 1.2
|
1186 |
+
0.5, 0
|
1187 |
+
0.5
|
1188 |
+
0.5
|
1189 |
+
0.2, 0.5
|
1190 |
+
0.5
|
1191 |
+
w
|
1192 |
+
KBT
|
1193 |
+
0 − 0.48
|
1194 |
+
2
|
1195 |
+
2
|
1196 |
+
2
|
1197 |
+
2
|
1198 |
+
2
|
1199 |
+
κ
|
1200 |
+
KBT
|
1201 |
+
20
|
1202 |
+
28.5
|
1203 |
+
28.5
|
1204 |
+
28.5
|
1205 |
+
28.5
|
1206 |
+
28.5
|
1207 |
+
ρ
|
1208 |
+
1
|
1209 |
+
10%
|
1210 |
+
10%, 10%
|
1211 |
+
10%, 10%
|
1212 |
+
10%, 10%
|
1213 |
+
20%
|
1214 |
+
10%, 10%
|
1215 |
+
C0
|
1216 |
+
1/ℓmin
|
1217 |
+
1
|
1218 |
+
-0.6 − 0, 0.8 -0.75 − 0, 0.8
|
1219 |
+
0.8
|
1220 |
+
0.4,0.1
|
1221 |
+
0.8
|
1222 |
+
TABLE I: The values of the model parameters used in the simulations in the different figures. The energy units are KBT = 1,
|
1223 |
+
which define the scale of f, w, κ, and the length units are ℓmin = 1, which define the scale of the vertex lattice, the force, and
|
1224 |
+
spontaneous curvature.
|
1225 |
+
S-5.
|
1226 |
+
VESICLES WITH BOTH NORMAL AND ALIGNED-FORCE CMC, ADHERED TO A FLAT
|
1227 |
+
SUBSTRATE
|
1228 |
+
In Fig.S-6 we show the dynamics of the vesicle that contains the mixture of aligned-force (yellow) and normal-force
|
1229 |
+
(red) CMC, which have exclusive binding interactions between them (see Fig.8 in the main text). At time t = 250
|
1230 |
+
we turned off the normal-force CMC, keeping only the aligned-force CMC active. We find that the adhered area
|
1231 |
+
shape changes, with the rim regions that contain the curved passive (red) CMC retract into the vesicle, while the
|
1232 |
+
aligned-force regions protrude more prominently along the adhered rim.
|
1233 |
+
Movies
|
1234 |
+
• Movie-S1 Aligned-force simulation of the formation of filopodia-like tubular protrusions (corresponding to
|
1235 |
+
Fig.7B), with parameters κ = 28.5, f = 0.2, w = 2, C0 = 0.4, ρ = 20%, s = 0.5, r = 30
|
1236 |
+
• Movie-S2 Normal force simulation, in the regime of tubes shapes (corresponding to Fig.7B), with parameters
|
1237 |
+
κ = 28.5, f = 0.5, w = 2, C0 = 0.1, ρ = 20%
|
1238 |
+
• Movie-S3 Adhered, universal-binding between normal-force CMCs (red) and aligned-force CMCs (yellow),
|
1239 |
+
corresponding to Fig.8A. Parameters used: κ = 28.5, f = 0.5, w = 2, wad = 0.25, C0 = 0.8, ρn = 10%, ρa =
|
1240 |
+
10%, s = 1, r = 15
|
1241 |
+
• Movie-S4 Adhered, exclusive-binding between normal-force CMCs (red) and aligned-force CMCs (yellow),
|
1242 |
+
corresponding to Fig.8A. Parameters used: κ = 28.5, f = 0.5, w = 2, wad = 0.25, C0 = 0.8, ρn = 10%, ρa =
|
1243 |
+
10%, s = 1, r = 15
|
1244 |
+
• Movie-S5. The 3D movie of the cell in Figure 9A
|
1245 |
+
• Movie-S6. The movie of the XY and XZ section for Figure 9E
|
1246 |
+
• Movie-S7. The movie of the XY and XZ section for Figure 9F
|
1247 |
+
• Movie-S8. The movie of the XY and XZ section for Figure 9G
|
1248 |
+
[1] G. Gompper and D. M. Kroll, in Statistical Mechanics of Membranes and Surfaces (WORLD SCIENTIFIC, 2004), pp.
|
1249 |
+
359–426.
|
1250 |
+
[2] E. Sitarska, S. D. Almeida, M. S. Beckwith, J. Stopp, Y. Schwab, M. Sixt, A. Kreshuk, A. Erzberger, and A. Diz-Mu˜noz,
|
1251 |
+
bioRxiv p. 2021.03.26.437199 (2021).
|
1252 |
+
[3] D. M. Veltman, T. D. Williams, G. Bloomfield, B.-C. Chen, E. Betzig, R. H. Insall, and R. R. Kay, Elife 5, e20085 (2016).
|
1253 |
+
[4] R. R. Kay, Cells & Development 168, 203713 (2021).
|
1254 |
+
|
1255 |
+
3
|
1256 |
+
FIG. S-1: Sketch of the boundary of connected clusters: for each edge between the cluster and the outside, a line is drawn from
|
1257 |
+
the middle to the center each of the adjacent triangles. We ignore the single-clusters (dashed line)
|
1258 |
+
FIG. S-2: Schematic description of the transition between flat and pearling phases, from an initially mixed, spherical phase (at
|
1259 |
+
the center). Bare membrane is in white, and CMCs in red, and mixed composition in pink. The flat transition result in all
|
1260 |
+
CMCs moving from the surface of the sphere to the rim of a flat disc, which has a larger radius ∆r. Due to active force f,
|
1261 |
+
this generates work W = −f∆r. The bending energy of the CMCs on the rim and in the pearling clusters is assumed to be
|
1262 |
+
approximately 0, but the spherical body of bare membrane in the pearling phase has a bending energy of a closed sphere: 8πκ,
|
1263 |
+
while it is zero for the flat discs of bare membrane in the flat phase (since they are flat). Finally, the number of CMC-CMC
|
1264 |
+
bonds in the pearling phase χp is larger than in the flat phase χf, since in the flat phase it is reduced due to the large boundary
|
1265 |
+
between the rim cluster the the flat bare membrane discs.
|
1266 |
+
|
1267 |
+
f△r
|
1268 |
+
8πK4
|
1269 |
+
FIG. S-3: Phase diagram of the force-binding strength system, with an analytically-derived transition line for the pearling-flat
|
1270 |
+
transition (green line, Eq.S-1).
|
1271 |
+
FIG. S-4: The undulation of a CMC cluster with (A) highly concave (−0.6) active CMC (B) with shallow concave (−0.001)
|
1272 |
+
CMC and disabled force. The size and shape of the clusters is very different, but the peaks and troughs patterning due to CMC
|
1273 |
+
shape is at the limit of the mesh resolution for both.
|
1274 |
+
|
1275 |
+
20
|
1276 |
+
12
|
1277 |
+
longai
|
1278 |
+
04
|
1279 |
+
96
|
1280 |
+
88
|
1281 |
+
Buds
|
1282 |
+
80
|
1283 |
+
72
|
1284 |
+
64
|
1285 |
+
56
|
1286 |
+
48
|
1287 |
+
earlino
|
1288 |
+
40
|
1289 |
+
32
|
1290 |
+
24
|
1291 |
+
16
|
1292 |
+
08(A)
|
1293 |
+
(B)5
|
1294 |
+
FIG. S-5: Active convex and passive concave system (red and blue, respectively), with binding between same type only. As in
|
1295 |
+
the universal binding case, the suppressive and disabling inhibition do not have any strong effects, since the types are separated.
|
1296 |
+
Simulations with C−
|
1297 |
+
0 ≤ −0.3 are draw semi-transparent. In all cases, the convex CMCs aggregate in a rim, making the vesicle
|
1298 |
+
flat, and concave CMCs aggregate in pearling for C−
|
1299 |
+
0 < −0.3, bowl-like patches for C−
|
1300 |
+
0 > −0.3, and both for C−
|
1301 |
+
0 = −0.3.
|
1302 |
+
|
1303 |
+
6
|
1304 |
+
FIG. S-6: Overview of an adhered vesicle with a mixture of aligned-force (yellow) and normal-force (red) CMC, which have
|
1305 |
+
exclusive binding interactions between them (see Fig.8 in the main text). At time t = 250 the force is disabled for the
|
1306 |
+
normal-force CMCs, leaving only the aligned-force CMCs active. The original simulation is given on the top (times 0 − 100),
|
1307 |
+
and the simulation after the normal-force has been disabled is at the bottom.
|
1308 |
+
|
09FPT4oBgHgl3EQfTzT7/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
0NE0T4oBgHgl3EQfuAEL/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:beabefade3125d84a32d15e2b9fc837cb1044190f5b318f594916eb9fa231501
|
3 |
+
size 214946
|
0dE0T4oBgHgl3EQfdQAz/content/2301.02373v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:db72da4bbfb9f0d8a3d0ae04393ab17426d2817636ab4f29e318013574f4cabc
|
3 |
+
size 1149364
|
0dE0T4oBgHgl3EQfdQAz/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:54741b01aec35316ade50059c52a02816abc01076ae445bf14328db55c400663
|
3 |
+
size 186207
|
2dAyT4oBgHgl3EQfPvZl/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:5b0691c3b4953c66d1153295e3811421d5c59f50bb7589729f0aae8e3bc30def
|
3 |
+
size 1900589
|
39AyT4oBgHgl3EQfP_aH/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:ea35ba6b678140d8ebeb07e626c992184d5014c7127e80d24683d4cb2f2e5e14
|
3 |
+
size 3604525
|
39AyT4oBgHgl3EQfP_aH/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:1e30d6c9669d24faaa686d7924d702a60b89aa8667c1ed57a2a07a9f980e6db8
|
3 |
+
size 132178
|
39AzT4oBgHgl3EQf9f54/content/2301.01920v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:8cf47c369078df06d4e69d5ccae0231442a4bca44db6fcb9e71c6716e95d2904
|
3 |
+
size 306215
|
39AzT4oBgHgl3EQf9f54/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:65a05b1787ac794377798a8398327e570abdf122146c6cfc697677275d864ab7
|
3 |
+
size 1572909
|
39AzT4oBgHgl3EQf9f54/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:4ccd548c9d9e059c261856e6078b911bae8fd472fb363334bada74058cd639b9
|
3 |
+
size 57417
|
4dE2T4oBgHgl3EQf6Qjc/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:f6fb507d0f141987111733433b7e6747d0e0675b2a45e16b9128e49ae06d4fa2
|
3 |
+
size 239529
|
5NAzT4oBgHgl3EQf9v7Q/content/2301.01925v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:a542b4fb2a66e02de76930b25c0d209f9b56fb0c2f29b337130c787dfa33b75b
|
3 |
+
size 234699
|
5NAzT4oBgHgl3EQf9v7Q/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:63b5bbe9606650596034fcd5c3eea9182790f9b45bc85d99a97d59b367b393ef
|
3 |
+
size 2555949
|
5NAzT4oBgHgl3EQf9v7Q/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:50c45b4aef8cdf65eadf09d716eca6cace1ad2f136b5343af77a4b174311c815
|
3 |
+
size 85246
|
5NAzT4oBgHgl3EQffvy-/content/tmp_files/2301.01458v1.pdf.txt
ADDED
@@ -0,0 +1,1303 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
An improved hybrid regularization approach for extreme
|
2 |
+
learning machine
|
3 |
+
Liangjuan Zhou
|
4 |
+
School of Mathematics, Hunan University
|
5 |
+
Changsha, China
|
6 |
+
Wei Miao∗
|
7 | |
8 |
+
School of Mathematics, Hunan University
|
9 |
+
Changsha, China
|
10 |
+
ABSTRACT
|
11 |
+
Extreme learning machine (ELM) is a network model that arbitrarily
|
12 |
+
initializes the first hidden layer and can be computed speedily.
|
13 |
+
In order to improve the classification performance of ELM, a ℓ2
|
14 |
+
and ℓ0.5 regularization ELM model (ℓ2-ℓ0.5-ELM) is proposed in
|
15 |
+
this paper. An iterative optimization algorithm of the fixed point
|
16 |
+
contraction mapping is applied to solve the ℓ2-ℓ0.5-ELM model. The
|
17 |
+
convergence and sparsity of the proposed method are discussed
|
18 |
+
and analyzed under reasonable assumptions. The performance of
|
19 |
+
the proposed ℓ2-ℓ0.5-ELM method is compared with BP, SVM, ELM,
|
20 |
+
ℓ0.5-ELM, ℓ1-ELM, ℓ2-ELM and ℓ2-ℓ1ELM, the results show that the
|
21 |
+
prediction accuracy, sparsity, and stability of the ℓ2-ℓ0.5-ELM are
|
22 |
+
better than the other 7 models.
|
23 |
+
CCS CONCEPTS
|
24 |
+
• Mathematics of computing → Convex optimization; • Com-
|
25 |
+
puting methodologies → Regularization.
|
26 |
+
KEYWORDS
|
27 |
+
High-dimensional data, Sparsity, Hybird regularization, Dimension-
|
28 |
+
ality reduction
|
29 |
+
ACM Reference Format:
|
30 |
+
Liangjuan Zhou and Wei Miao. 2022. An improved hybrid regularization
|
31 |
+
approach for extreme learning machine. In 2022 4th International Conference
|
32 |
+
on Advanced Information Science and System (AISS 2022), November 25–27,
|
33 |
+
2022, Sanya, China. ACM, New York, NY, USA, 7 pages. https://doi.org/10.
|
34 |
+
1145/3573834.3574501
|
35 |
+
1
|
36 |
+
INTRODUCTION
|
37 |
+
Feedforward neural networks(FNNs), as one of the most frequently
|
38 |
+
used neural networks which can be defined mathematically as:
|
39 |
+
𝐺𝑁 (𝑥𝑖) =
|
40 |
+
𝑁
|
41 |
+
∑︁
|
42 |
+
𝑖=1
|
43 |
+
𝛽𝑖𝑔(⟨𝜔𝑖,𝑥𝑖⟩ + 𝑏𝑖),
|
44 |
+
where 𝑥𝑖 = (𝑥𝑖1,𝑥𝑖2, . . . ,𝑥𝑖𝑝) ∈ R𝑝 is the input, 𝑏𝑖 is the bias and 𝑔
|
45 |
+
is the activation function. ⟨𝜔𝑖,𝑥𝑖⟩ = �𝑝
|
46 |
+
𝑗=1 𝜔𝑖𝑗𝑥𝑖𝑗 is the euclidean
|
47 |
+
∗Both authors contributed equally to this research.
|
48 |
+
Permission to make digital or hard copies of all or part of this work for personal or
|
49 |
+
classroom use is granted without fee provided that copies are not made or distributed
|
50 |
+
for profit or commercial advantage and that copies bear this notice and the full citation
|
51 |
+
on the first page. Copyrights for components of this work owned by others than ACM
|
52 |
+
must be honored. Abstracting with credit is permitted. To copy otherwise, or republish,
|
53 |
+
to post on servers or to redistribute to lists, requires prior specific permission and/or a
|
54 |
+
fee. Request permissions from [email protected].
|
55 |
+
AISS 2022, November 25–27, 2022, Sanya, China
|
56 |
+
© 2022 Association for Computing Machinery.
|
57 |
+
ACM ISBN 978-1-4503-9793-3/22/11...$15.00
|
58 |
+
https://doi.org/10.1145/3573834.3574501
|
59 |
+
inner product, 𝜔𝑖 = (𝜔𝑖1,𝜔𝑖2, . . . ,𝜔𝑖𝑝) ∈ R𝑝 are the weights con-
|
60 |
+
necting the input and the 𝑖-th hidden node, and 𝛽𝑖 ∈ R are the
|
61 |
+
weights connecting the 𝑖-th hidden and output node. In terms of
|
62 |
+
the traditional learning algorithm of FNNs, all parameters in the
|
63 |
+
network need to be adjusted based on specific tasks. A classical
|
64 |
+
learning method is the backpropagation (BP) algorithm, which is
|
65 |
+
mainly solved by gradient descent:
|
66 |
+
min
|
67 |
+
𝜔𝑖,𝛽𝑖,𝑏𝑖
|
68 |
+
𝑛
|
69 |
+
∑︁
|
70 |
+
𝑖=1
|
71 |
+
∥𝑡𝑖 − 𝐺𝑁 (𝑥𝑖)∥2
|
72 |
+
2,
|
73 |
+
where (𝑥𝑖,𝑡𝑖)(𝑖 = 1, 2, . . . ,𝑛) denotes the training samples. How-
|
74 |
+
ever, a randomized learner model, different to the traditional learn-
|
75 |
+
ing of FNNs, called as Extreme learning machine(ELM) and related
|
76 |
+
algorithms were proposed by Huang[10]. In the ELM model, 𝜔𝑖 and
|
77 |
+
𝑏𝑖 are randomly assigned without training, so only 𝛽𝑖 needs to be
|
78 |
+
trained. Set T = [𝑡1,𝑡2, . . . ,𝑡𝑛] and
|
79 |
+
H =
|
80 |
+
|
81 |
+
𝑔(⟨𝜔1,𝑥1⟩ + 𝑏1)
|
82 |
+
. . .
|
83 |
+
𝑔(⟨𝜔𝑁,𝑥1⟩ + 𝑏𝑁 )
|
84 |
+
...
|
85 |
+
. . .
|
86 |
+
...
|
87 |
+
𝑔(⟨𝜔1,𝑥𝑛⟩ + 𝑏1)
|
88 |
+
. . .
|
89 |
+
𝑔(⟨𝜔𝑁,𝑥𝑛⟩ + 𝑏𝑁 )
|
90 |
+
|
91 |
+
,
|
92 |
+
(1)
|
93 |
+
once the input weights and biases are specified randomly with uni-
|
94 |
+
form distribution in [−𝑐,𝑐], the hidden output matrix remains un-
|
95 |
+
changed during the training phase. Accordingly, the output weights
|
96 |
+
could be written by utilizing the least squares method:
|
97 |
+
min
|
98 |
+
𝛽 ∈R𝑁
|
99 |
+
�
|
100 |
+
∥H𝛽 − T∥2
|
101 |
+
2
|
102 |
+
�
|
103 |
+
,
|
104 |
+
(2)
|
105 |
+
the solution to model (2) could be written as 𝛽 = H†T, where H†
|
106 |
+
is the Moore–Penrose generalized inverse of hidden output matrix
|
107 |
+
H[14].
|
108 |
+
The theoretical basis for the general approximation capability of
|
109 |
+
ELM networks has been proposed and established by Igelnik[11] ,
|
110 |
+
where the range of randomly allocated input weights and biases
|
111 |
+
are data related and assigned in a constructive mode. Consequently,
|
112 |
+
the scope of parameters in the algorithm implementation should
|
113 |
+
be carefully estimated for diverse datasets. On the other hand,
|
114 |
+
considering the sparsity of the output parameter 𝛽 for many high-
|
115 |
+
dimensional data, Cao et al.[4] proposed a ℓ1 regular ELM model
|
116 |
+
based on the sparsity of the ℓ1 regularization term, which takes the
|
117 |
+
following form:
|
118 |
+
min
|
119 |
+
𝛽 ∈R𝑁
|
120 |
+
� 1
|
121 |
+
2 ∥H𝛽 − T∥2
|
122 |
+
2 + 𝜆∥𝛽∥1
|
123 |
+
�
|
124 |
+
,
|
125 |
+
(3)
|
126 |
+
where 𝜆 > 0 is a regularization parameter and 𝛽 is the output
|
127 |
+
coefficient calculated by iteration. This model is called the Lasso
|
128 |
+
model, and has been studied by many scholars in recent years [15].
|
129 |
+
arXiv:2301.01458v1 [math.OC] 4 Jan 2023
|
130 |
+
|
131 |
+
AISS 2022, November 25–27, 2022, Sanya, China
|
132 |
+
Zhou and Miao.
|
133 |
+
For the model (2), Fan et al. [8] added a ℓ0.5 regularization term
|
134 |
+
to the ELM model, based on the solution generated by ℓ0.5 is sparser
|
135 |
+
than the ℓ1 regularization term [16], and the model is defined as
|
136 |
+
follows:
|
137 |
+
min
|
138 |
+
𝛽 ∈R𝑁
|
139 |
+
� 1
|
140 |
+
2 ∥H𝛽 − T∥2
|
141 |
+
2 + 𝜆∥𝛽∥0.5
|
142 |
+
�
|
143 |
+
,
|
144 |
+
(4)
|
145 |
+
where 𝜆 > 0 is a regularization parameter, the model can be solved
|
146 |
+
by the iterative semi-threshold algorithm [16].
|
147 |
+
The other regularization model for model (2) was about the ℓ2
|
148 |
+
regularization term (ℓ2-ELM) [5]:
|
149 |
+
min
|
150 |
+
𝛽 ∈R𝑁
|
151 |
+
� 1
|
152 |
+
2 ∥H𝛽 − T∥2
|
153 |
+
2 + 𝜇∥𝛽∥2
|
154 |
+
2
|
155 |
+
�
|
156 |
+
,
|
157 |
+
(5)
|
158 |
+
where 𝜇 is a regularization parameter, and when the expression
|
159 |
+
H𝑇 H+𝜇I is invertible after choosing the parameter 𝜇, then the solu-
|
160 |
+
tion of the model (5) can be written as 𝛽 = (H𝑇 H + 𝜇I)−1I)−1H𝑇 T.
|
161 |
+
Hai et al.[9] proposed a ℓ2-ℓ1-ELM hybrid model by integrating
|
162 |
+
the sparsity of the ℓ1 regularization term and the stability of the ℓ2
|
163 |
+
regularization term as follows:
|
164 |
+
min
|
165 |
+
𝛽 ∈R𝑁
|
166 |
+
� 1
|
167 |
+
2 ∥H𝛽 − T∥2
|
168 |
+
2 + 𝜆(𝛾∥𝛽∥1 + 𝜀∥𝛽∥2
|
169 |
+
2)
|
170 |
+
�
|
171 |
+
,
|
172 |
+
(6)
|
173 |
+
where 𝜆 ≥ 0, 𝛾 ≥ 0 and 𝜀 ≥ 0 are regularization parameters. In-
|
174 |
+
spired by the ℓ2-ℓ1-ELM model, according to Xu et al.[17], they
|
175 |
+
found that the sparsity of the solution of the ℓ𝑝 (𝑝 ∈ (0, 1)) regular-
|
176 |
+
ization term: when 0 < 𝑝 < 0.5, there is no significant difference in
|
177 |
+
the sparse effect of ℓ𝑝; when 0.5 < 𝑝 < 1, the smaller 𝑝, the better
|
178 |
+
the sparse effect, so the ℓ0.5 regularization term can be used as a
|
179 |
+
representative element of ℓ𝑝 (𝑝 ∈ (0, 1)); Therefore, we propose the
|
180 |
+
ℓ2-ℓ0.5-ELM model by combining the stability of ℓ2 regularization
|
181 |
+
term and the sparsity of ℓ0.5 which is sparser than ℓ1, the new
|
182 |
+
model is described as:
|
183 |
+
min
|
184 |
+
𝛽 ∈R𝑁
|
185 |
+
� 1
|
186 |
+
2 ∥H𝛽 − T∥2
|
187 |
+
2 + 𝜆(𝛾∥𝛽∥0.5 + 𝜀∥𝛽∥2
|
188 |
+
2)
|
189 |
+
�
|
190 |
+
,
|
191 |
+
(7)
|
192 |
+
where the parameters have the same meaning as the expression
|
193 |
+
of (6). The thought of adding ℓ0.5 and ℓ2 penalties simultaneously in
|
194 |
+
the optimization model could be found in classification [2, 6]. This
|
195 |
+
study mainly establishes an iterative algorithm and studies some
|
196 |
+
properties of randomized learner model as Hai[9]. In particular, we
|
197 |
+
integrate the features of ELM and propose an iterative strategy for
|
198 |
+
solving the hybrid model (7). The main contributions of this paper
|
199 |
+
can be summarized as follows:
|
200 |
+
(i) The whole model is a non-convex, non-smooth and non-
|
201 |
+
Lipschitz optimization problem due to the existence of ℓ0.5 norm.
|
202 |
+
We propose a new algorithm called as an ℓ2-ℓ0.5-ELM algorithm.
|
203 |
+
This algorithm is proved to be effective by analyzing the sum mini-
|
204 |
+
mization problem of two convex functions with certain characteris-
|
205 |
+
tics.
|
206 |
+
(ii) The key theoretical properties such as convergence, sparsity
|
207 |
+
are derived to guarantee the feasibility of the proposed method.
|
208 |
+
(iii) Numerous experiments were carried out, including some
|
209 |
+
UCI datasets collected from experts and intelligent systems fields,
|
210 |
+
gene datasets and ORL face image datasets. Experimental results
|
211 |
+
show that the better performance of the proposed ℓ2- ℓ0.5-ELM
|
212 |
+
algorithm.
|
213 |
+
The rest of this paper is organized as follows. Section 2 reviews
|
214 |
+
some basic concepts and theories. Section 3 demonstrates the itera-
|
215 |
+
tive method by a fixed point equation and proposes a algorithm for
|
216 |
+
ℓ2 - ℓ0.5-ELM model. In Section 4, some theoretical results about
|
217 |
+
convergence and sparsity are analyzed. In Section 5, experimental
|
218 |
+
results on UCI datasets, gene datasets and ORL face image datasets
|
219 |
+
are shown. The conclusion is drawn in Section 6.
|
220 |
+
2
|
221 |
+
PRELIMINARIES
|
222 |
+
In this section, we present some fundamental concepts and con-
|
223 |
+
vex optimization theorems primarily. Initially, it is about the half-
|
224 |
+
thresholding function[16]. 𝒫(𝜆,𝑡) : R → R, 𝜆 > 0, which can be
|
225 |
+
written as:
|
226 |
+
𝒫(𝜆,𝑡) =
|
227 |
+
� 2
|
228 |
+
3𝑡
|
229 |
+
�
|
230 |
+
1 + cos
|
231 |
+
� 2(𝜋−𝜙 (𝑡))
|
232 |
+
3
|
233 |
+
��
|
234 |
+
|𝑡| > 3
|
235 |
+
4𝜆
|
236 |
+
2
|
237 |
+
3
|
238 |
+
0
|
239 |
+
|𝑡| ≤ 3
|
240 |
+
4𝜆
|
241 |
+
2
|
242 |
+
3
|
243 |
+
,
|
244 |
+
(8)
|
245 |
+
where 𝜙(𝑡) = arccos
|
246 |
+
�
|
247 |
+
𝜆
|
248 |
+
8 ( |𝑡 |
|
249 |
+
3 )− 3
|
250 |
+
2
|
251 |
+
�
|
252 |
+
, 𝜋 = 3.14, and then the corre-
|
253 |
+
sponding half-thresholding operator half(𝜆, 𝛽) : R𝑁 → R𝑁 acts
|
254 |
+
component-wise as:
|
255 |
+
[half(𝜆, 𝛽)]𝑖 = 𝒫(𝜆, 𝛽𝑖).
|
256 |
+
(9)
|
257 |
+
Next, we introduce one key characteristic of the half-thresholding
|
258 |
+
operator [7, 16]:
|
259 |
+
∥half(𝜆,𝑡) − half(𝜆,𝑡 ′)∥ ≤ ∥𝑡 − 𝑡 ′∥.
|
260 |
+
(10)
|
261 |
+
Another crucial notion of convex optimization is the proximity
|
262 |
+
operator [12]:
|
263 |
+
prox𝜑𝛽 = arg min
|
264 |
+
�
|
265 |
+
∥𝑢 − 𝛽∥2
|
266 |
+
2 + 𝜑(𝑢)
|
267 |
+
�
|
268 |
+
,
|
269 |
+
where𝜙 is a real-valued convex function on R𝑁 . A primary property
|
270 |
+
of the proximity operator is drawn in Proposition 1[7], which will
|
271 |
+
be utilized to prove our major result.
|
272 |
+
Proposition 1. Let 𝜑 be a real-valued convex function on R𝑁 .
|
273 |
+
Suppose 𝜓 (·) = 𝜑 + 𝜌
|
274 |
+
2 ∥ · ∥2
|
275 |
+
2 + ⟨·,𝑢⟩ + 𝜎, where 𝑢 ∈ R𝑁 , 𝜌 ∈ [0, ∞),
|
276 |
+
𝜎 ∈ R, then
|
277 |
+
prox𝜓 𝛽 = prox𝜑/(1+𝜌) ((𝛽 − 𝑢)/(1 + 𝜌)).
|
278 |
+
(11)
|
279 |
+
3
|
280 |
+
SOLUTION: FIXED POINT ITERATIVE
|
281 |
+
ALGORITHM FOR THE MODEL
|
282 |
+
For the ELM, the output matrix H is a bounded linear operator from
|
283 |
+
R𝑁 to R𝑚 owing to the activation function 𝑔(·) ∈ (0, 1), which is
|
284 |
+
finite. In order to further improve the accuracy and sparsity, we
|
285 |
+
employ the regularization model (7) to estimate the output weights
|
286 |
+
of the network. We define concisely as:
|
287 |
+
𝑝𝛾,𝜀 = 𝛾∥𝛽∥0.5 + 𝜀∥𝛽∥2
|
288 |
+
2,
|
289 |
+
where 𝜀, 𝛾 ≥ 0, 𝑝𝛾,𝜀 : R𝑁 → [0, ∞). Then the model (7) can be
|
290 |
+
redefined as
|
291 |
+
min
|
292 |
+
𝛽 ∈R𝑁
|
293 |
+
� 1
|
294 |
+
2 ∥H𝛽 − T∥2
|
295 |
+
2 + 𝜆𝑝𝛾,𝜀
|
296 |
+
�
|
297 |
+
.
|
298 |
+
(12)
|
299 |
+
Furthermore, we introduce the following Lemma and Theorem
|
300 |
+
which will be utilized to solve our model:
|
301 |
+
|
302 |
+
An improved hybrid regularization approach for extreme learning machine
|
303 |
+
AISS 2022, November 25–27, 2022, Sanya, China
|
304 |
+
Lemma 1. For all 𝜆 > 0 and 𝛽 ∈ R𝑁 ,the half-thresholding operator
|
305 |
+
(8) can be described as:
|
306 |
+
half(𝜆, 𝛽) = arg min
|
307 |
+
𝑢
|
308 |
+
� 1
|
309 |
+
2 ∥𝑢 − 𝛽∥2
|
310 |
+
2 + 𝜆∥𝑢∥0.5
|
311 |
+
�
|
312 |
+
.
|
313 |
+
Lemma 2. For all 𝜆
|
314 |
+
>
|
315 |
+
0,𝛾
|
316 |
+
≥
|
317 |
+
0,𝜀
|
318 |
+
≥
|
319 |
+
0 and 𝛽
|
320 |
+
∈
|
321 |
+
R𝑁 ,
|
322 |
+
half(
|
323 |
+
𝜆𝛾
|
324 |
+
1+2𝜀𝜆,
|
325 |
+
𝛽
|
326 |
+
1+2𝜀𝜆 ) is the proximity operator of 𝜆𝑝𝛾,𝜀 (𝛽).
|
327 |
+
Theorem 1. Let 𝜆 > 0, 𝛾 ≥ 0, 𝜀 ≥ 0 and 𝛿 ∈ (0, ∞). Then 𝛽 is
|
328 |
+
a minimizer of function (12) if and only if it meets the fixed point
|
329 |
+
equation:
|
330 |
+
𝛽 = half
|
331 |
+
�
|
332 |
+
𝛿𝜆𝛾
|
333 |
+
1 + 2𝜀𝜆𝛿 , (I − 𝛿H𝑇 H)𝛽 − 𝛿H𝑇 T
|
334 |
+
1 + 2𝜀𝜆𝛿
|
335 |
+
�
|
336 |
+
,
|
337 |
+
(13)
|
338 |
+
where the unit operator I : R𝑁 → R𝑁 , the definition of H is shown
|
339 |
+
in (1), and H𝑇 represents the adjoint of H.
|
340 |
+
Moreover, from the property of the proximity operator, we can
|
341 |
+
drive a precise statement for the Lipschitz constant of a contractive
|
342 |
+
map and the corresponding theorem as follows.
|
343 |
+
Theorem 2. Set 𝜆 > 0,𝛾 ≥ 0,𝜀 ≥ 0 and 𝛿 ∈ (0, ∞). Suppose that
|
344 |
+
there exist two positive constants 𝜅0 and 𝜅, such that the norm of the
|
345 |
+
output matrix H shown in (1) of the hidden layer is finite by them,
|
346 |
+
namely 𝜅0 ≤ ∥H𝑇 H∥2 ≤ 𝜅, Thus 𝛽 is a minimizer of (12) if and
|
347 |
+
only if it is a fixed point of the Lipchitz map Γ : R𝑁 → R𝑁 , that is,
|
348 |
+
𝛽 = Γ𝛽 where
|
349 |
+
Γ𝛽 = half
|
350 |
+
�
|
351 |
+
𝛿𝜆𝛾
|
352 |
+
1 + 2𝜀𝜆𝛿 , (I − 𝛿H𝑇 H)𝛽 + 𝛿H𝑇 T
|
353 |
+
1 + 2𝜀𝜆𝛿
|
354 |
+
�
|
355 |
+
.
|
356 |
+
(14)
|
357 |
+
Selecting𝛿 =
|
358 |
+
2
|
359 |
+
𝜅0+𝜅 , the Lipschitz constant is finite by𝑞 = 1− 2𝜅0
|
360 |
+
𝜅 + 𝜅0
|
361 |
+
≤
|
362 |
+
1. In particular, if 𝜅0 > 0, we can get Γ is a contractive map.
|
363 |
+
Theorem 1 and Theorem 2 illustrate that the problem of ℓ2-ℓ0.5-
|
364 |
+
ELM can be described as a fixed point algorithm. Furthermore, the
|
365 |
+
next theorem will introduce the iterative procedure of the ℓ2-ℓ0.5-
|
366 |
+
ELM.
|
367 |
+
Theorem 3. Suppose that 𝜅0 and 𝜅 are positive constants, such
|
368 |
+
that the norm of the output matrix H shown in (1) of the hidden
|
369 |
+
layer is finite by them, namely, 𝜅0 ≤ ∥H𝑇 H∥2 ≤ 𝜅, and the sequence
|
370 |
+
{𝛽}∞
|
371 |
+
𝑙=0 ⊆ R𝑁 is described iteratively as
|
372 |
+
𝛽𝑙 = half
|
373 |
+
�
|
374 |
+
𝛿𝜆𝛾
|
375 |
+
1 + 2𝜀𝜆𝛿 , (I − 𝛿H𝑁 H)𝛽𝑙−1 − 𝛿H𝑇 T
|
376 |
+
1 + 2𝜀𝜆𝛿
|
377 |
+
�
|
378 |
+
,
|
379 |
+
(15)
|
380 |
+
where 𝑙 = 1, 2, 3, . . . , 𝜆 > 0,𝜀 > 0,𝛾 ≥ 0 and 𝛿 =
|
381 |
+
2
|
382 |
+
𝜅+𝜅0 . Thus {𝛽𝑙 }∞
|
383 |
+
𝑙=0
|
384 |
+
strongly converges the minimizer of model (10) in spite of the choice
|
385 |
+
of 𝛽0.
|
386 |
+
Remark 1. It is not difficult to obtain from the proof of Theorem 3.
|
387 |
+
∥𝛽𝑙 − 𝛽∗∥2 ≤
|
388 |
+
𝜅 + 𝜅0
|
389 |
+
𝜅0(𝜅 + 𝜅0 + 4𝜀𝜆)
|
390 |
+
�𝜅 − 𝜅0
|
391 |
+
𝜅 + 𝜅0
|
392 |
+
�𝑙
|
393 |
+
∥H𝑇 T∥2.
|
394 |
+
Therefore, for each 𝜉 > 0, if
|
395 |
+
𝜅 + 𝜅0
|
396 |
+
𝜅0(𝜅 + 𝜅0 + 4𝜀𝜆)
|
397 |
+
�𝜅 − 𝜅0
|
398 |
+
𝜅 + 𝜅0
|
399 |
+
�𝑙
|
400 |
+
∥𝛽1 − 𝛽0∥2 < 𝜉.
|
401 |
+
namely,
|
402 |
+
𝑙 >
|
403 |
+
log
|
404 |
+
� ∥𝛽1−𝛽0 ∥2(𝜅+𝜅0)
|
405 |
+
𝜉𝜅0(𝜅+𝜅0+4𝜀𝜆)
|
406 |
+
�
|
407 |
+
log
|
408 |
+
� 𝜅+𝜅0
|
409 |
+
𝜅−𝜅0
|
410 |
+
�
|
411 |
+
,
|
412 |
+
thus
|
413 |
+
∥𝛽𝑙 − 𝛽∗∥2 < 𝜉.
|
414 |
+
As a conclusion, the complete ℓ2-ℓ0.5-ELM algorithm is given in
|
415 |
+
Algorithm 1 which integrates the result of Theorem 3 and Remark
|
416 |
+
1. Next section, we want give some properties of our proposed
|
417 |
+
algorithm.
|
418 |
+
Algorithm 1: the algorithm for ℓ2-ℓ0.5-ELM model
|
419 |
+
Input:Given
|
420 |
+
a
|
421 |
+
set
|
422 |
+
of
|
423 |
+
training
|
424 |
+
samples
|
425 |
+
𝒻
|
426 |
+
=
|
427 |
+
�
|
428 |
+
(𝑥𝑗,𝑡𝑗) : 𝑥𝑗 ∈ R𝑝,𝑡𝑗 ∈ R𝑚, 𝑗 = 1, 2, . . . ,𝑛
|
429 |
+
�,
|
430 |
+
activation
|
431 |
+
func-
|
432 |
+
tion 𝑔, hidden node number 𝑁, the related regularization
|
433 |
+
parameters 𝜆 > 0, 𝛾 ≥ 0, 𝜀 ≥ 0, the corresponding parameter 𝛿,
|
434 |
+
and an acceptable error 𝜉.
|
435 |
+
Step 1: Randomly assign a proper scope for input weight 𝜔𝑖 and
|
436 |
+
bias 𝑏𝑖 (𝑖 = 1, 2, . . . , 𝑁)
|
437 |
+
Step 2: Compute the hidden layer output matrix H;
|
438 |
+
Step
|
439 |
+
3:
|
440 |
+
Set
|
441 |
+
𝛽0
|
442 |
+
=
|
443 |
+
(0, 0, . . . , 0),
|
444 |
+
𝛽1
|
445 |
+
=
|
446 |
+
half(
|
447 |
+
𝛿𝜆𝛾
|
448 |
+
1 + 2𝜀𝜆𝛿 , (I − 𝛿H𝑇 H)𝛽0 + 𝛿H𝑇 T
|
449 |
+
1 + 2𝜀𝜆𝛿
|
450 |
+
), and 𝑙𝑚𝑎𝑥 be a minimal
|
451 |
+
positive integer but larger than
|
452 |
+
log
|
453 |
+
� ∥𝛽1 − 𝛽0∥2(𝜅 + 𝜅0)
|
454 |
+
𝜉𝜅0(𝜅 + 𝜅0 + 4𝜀𝜆)
|
455 |
+
�
|
456 |
+
log
|
457 |
+
� 𝜅+𝜅0
|
458 |
+
𝜅−𝜅0
|
459 |
+
�
|
460 |
+
.
|
461 |
+
Step 4: For 𝑙 = 1 : 𝑙𝑚𝑎𝑥
|
462 |
+
if 𝑙 ≥ 𝑙𝑚𝑎𝑥, stop;
|
463 |
+
else 𝑙 := 𝑙 + 1 and update the 𝛽 as follows: 𝛽𝑙+1 =
|
464 |
+
half(
|
465 |
+
𝛿𝜆𝛾
|
466 |
+
1 + 2𝜀𝜆𝛿 , (I − 𝛿H𝑇 H)𝛽𝑙 + 𝛿H𝑇 T
|
467 |
+
1 + 2𝜀𝜆𝛿
|
468 |
+
).
|
469 |
+
repeat Step 4, until that the desired output weight is ^𝛽 = 𝛽𝑚𝑎𝑥.
|
470 |
+
Output: Return the output weights ^𝛽;
|
471 |
+
4
|
472 |
+
SOME CHARACTERISTICS FOR ℓ2-ℓ0.5-ELM
|
473 |
+
For the new section, we want to discuss and analyze some key
|
474 |
+
characteristics of the estimator regarding ℓ2-ℓ0.5-ELM, such as the
|
475 |
+
convergence and sparsity.
|
476 |
+
Theorem 4. 𝛽𝑙 strongly converges to the minimum value 𝛽∗ of
|
477 |
+
the minimization problem
|
478 |
+
min
|
479 |
+
𝛽 ∈R𝑁
|
480 |
+
� 1
|
481 |
+
2 ∥H𝛽 − T∥2
|
482 |
+
2 + 𝜆𝑝𝛾𝜀 (𝛽)
|
483 |
+
�
|
484 |
+
as 𝑙 → ∞.
|
485 |
+
𝛽0.5 in the ℓ2-ℓ0.5-ELM is a highly significant part of the sparsity
|
486 |
+
of the solution. Thus, we set the Theorem 5 as follows.
|
487 |
+
Theorem 5. Suppose 𝜆
|
488 |
+
>
|
489 |
+
0,𝛾
|
490 |
+
>
|
491 |
+
0, then the support of
|
492 |
+
half(
|
493 |
+
𝜆𝛾
|
494 |
+
1+2𝜀𝜆,
|
495 |
+
𝛽
|
496 |
+
1+2𝜀𝜆 ) is finite for any 𝛽 ∈ R𝑁 . Particularly, 𝛽∗ and 𝛽𝑙
|
497 |
+
are all finitely supported.
|
498 |
+
If the regularization parameters 𝜆 and 𝛾 are fixed as some con-
|
499 |
+
stant values, then 𝛽∗ and 𝛽𝑙 have only a few finite nonzero coeffi-
|
500 |
+
cients, and hence the solution to (12) is sparse.
|
501 |
+
|
502 |
+
AISS 2022, November 25–27, 2022, Sanya, China
|
503 |
+
Zhou and Miao.
|
504 |
+
Table 1: Details of the 6 datasets
|
505 |
+
Dataset
|
506 |
+
Type
|
507 |
+
Sapmple
|
508 |
+
Feature
|
509 |
+
Catagory
|
510 |
+
Austrian
|
511 |
+
UCI
|
512 |
+
690
|
513 |
+
14
|
514 |
+
2
|
515 |
+
Ionosphere
|
516 |
+
UCI
|
517 |
+
151
|
518 |
+
34
|
519 |
+
2
|
520 |
+
Balance
|
521 |
+
UCL
|
522 |
+
625
|
523 |
+
4
|
524 |
+
3
|
525 |
+
colon
|
526 |
+
gene
|
527 |
+
62
|
528 |
+
2000
|
529 |
+
2
|
530 |
+
DLBCL
|
531 |
+
gene
|
532 |
+
77
|
533 |
+
7129
|
534 |
+
2
|
535 |
+
ORL
|
536 |
+
image
|
537 |
+
400
|
538 |
+
10304
|
539 |
+
40
|
540 |
+
5
|
541 |
+
PERFORMANCE EVALUATION
|
542 |
+
In the new section, a succession of experiments, containing some
|
543 |
+
UCI benchmark datasets[9] and gene data, are carried out to demon-
|
544 |
+
strate the performance of the proposed ℓ2-ℓ0.5-ELM method. All
|
545 |
+
the experiments are performed in the Mac Pycharm environment
|
546 |
+
running on Quad-Core Intel Core i5, CPU (8 GB 2133 MHz LPDDR3)
|
547 |
+
processor with the speed of 1.40GHz. The activation function of
|
548 |
+
networks used in the experiments is taken as sigmoid function
|
549 |
+
𝑔(𝑥) = 1/(1 + 𝑒−𝑥).
|
550 |
+
The ℓ2-ℓ0.5-ELM model is compared with seven other models:
|
551 |
+
BP, SVM, ELM, ℓ2-ℓ1-ELM, ℓ2-ELM, ℓ1-ELM, ℓ0.5-ELM. BP includes
|
552 |
+
only one hidden layer and output layer, and all parameters are
|
553 |
+
trained by back-propagation algorithm; ℓ1-ELM and ℓ0.5-ELM are
|
554 |
+
the simplified forms of ℓ2-ℓ1-ELM and ℓ2-ℓ0.5-ELM, respectively.
|
555 |
+
The activation function is defined as: 𝑔(𝑥) = 1/(1 + 𝑒−𝑥).
|
556 |
+
In order to check the algorithm for ℓ2-ℓ0.5-ELM model, three real
|
557 |
+
classification datasets from the UCI machine learning repository
|
558 |
+
are considered. The basic information of each dataset is shown in
|
559 |
+
Table 1. The average of 30 experimental validations was used as
|
560 |
+
the final result. For these datasets, the sample size is fixed, but each
|
561 |
+
sample is randomly assigned as training or testing data.
|
562 |
+
5.1
|
563 |
+
Performance for UCI datasets
|
564 |
+
To validate the performance of the proposed ℓ2-ℓ0.5-ELM model,
|
565 |
+
three types of real classification datasets were used for the experi-
|
566 |
+
ments, including UCI[3], gene expression, and ORL face datasets.
|
567 |
+
The UCI machine learning repository (2013UCI) contains three
|
568 |
+
datasets: Austrian Credit Approval(Austrian), Ionosphere, and Bal-
|
569 |
+
ance Scale(Balance). The gene expression datasets contain colon[1]
|
570 |
+
and DLBCL[13], both of which are binary datasets. Moreover, the
|
571 |
+
ORL face dataset includes 400 images divided into 40 categories.
|
572 |
+
Each category contains 10 images with different facial details and
|
573 |
+
each image size is 112 × 92. The detail information of all datasets
|
574 |
+
are summarized in Table 1. In addition, these data were obtained
|
575 |
+
from different application fields, and it is hoped that the ℓ2-ℓ0.5-
|
576 |
+
ELM model can be analyzed from multiple perspectives by using
|
577 |
+
these data from different backgrounds.
|
578 |
+
We repeat 30 trials and take the averages as the final results
|
579 |
+
on account of reducing the random error. And the regularization
|
580 |
+
parameters are used to control the trade-off between the error and
|
581 |
+
the penalty. For Austrian dataset, take the parameters ( ℓ2-ℓ0.5-ELM,
|
582 |
+
ℓ2-ℓ1-ELM : 𝜆 = 0.8,𝛾 = 0.1,𝜀 = 0.9) and for Ionosphere dataset,
|
583 |
+
take ( ℓ2-ℓ0.5-ELM, ℓ2-ℓ1-ELM : 𝜆 = 0.9,𝛾 = 0.05,𝜀 = 0.9) and
|
584 |
+
Balance Scale dataset, ( ℓ2-ℓ0.5-ELM : 𝜆 = 0.8,𝛾 = 1,𝜀 = 1, for ℓ2-ℓ1-
|
585 |
+
ELM : 𝜆 = 0.005,𝛾 = 0.5,𝜀 = 0.5), we set the acceptable error 𝜉 =
|
586 |
+
Table 2: Performance comparison of 8 models on 3 different
|
587 |
+
datasets
|
588 |
+
Datasets
|
589 |
+
Methods
|
590 |
+
Times(s)
|
591 |
+
Remaining Nodes
|
592 |
+
Accuracy(% ± %)
|
593 |
+
Austrain
|
594 |
+
BP
|
595 |
+
2.1751
|
596 |
+
600
|
597 |
+
72.58 ± 13.57
|
598 |
+
SVM
|
599 |
+
0.0448
|
600 |
+
—
|
601 |
+
79.14 ± 1.98
|
602 |
+
ELM
|
603 |
+
0.0588
|
604 |
+
600
|
605 |
+
65.37 ± 3.08
|
606 |
+
ℓ0.5-ELM
|
607 |
+
5.8542
|
608 |
+
48.5
|
609 |
+
82.76 ± 0.00
|
610 |
+
ℓ1-ELM
|
611 |
+
8.1648
|
612 |
+
118.5
|
613 |
+
81.38 ± 0.00
|
614 |
+
ℓ2-ELM
|
615 |
+
8.2735
|
616 |
+
600
|
617 |
+
80.36 ± 0.00
|
618 |
+
ℓ2-ℓ1-ELM
|
619 |
+
10.041
|
620 |
+
492.5
|
621 |
+
81.38 ± 0.00
|
622 |
+
ℓ2-ℓ0.5-ELM
|
623 |
+
7.5875
|
624 |
+
118.5
|
625 |
+
82.76 ± 0.00
|
626 |
+
Ionosphere
|
627 |
+
BP
|
628 |
+
2.1751
|
629 |
+
600
|
630 |
+
72.58 ± 13.57
|
631 |
+
SVM
|
632 |
+
0.0108
|
633 |
+
–
|
634 |
+
86.51 ± 2.09
|
635 |
+
ELM
|
636 |
+
0.0003
|
637 |
+
600
|
638 |
+
91.55 ± 2.78
|
639 |
+
ℓ0.5-ELM
|
640 |
+
0.0487
|
641 |
+
29.5
|
642 |
+
96.96 ± 0.00
|
643 |
+
ℓ1-ELM
|
644 |
+
5.4755
|
645 |
+
115.9
|
646 |
+
97.24 ± 1.06
|
647 |
+
ℓ2-ELM
|
648 |
+
0.0520
|
649 |
+
600
|
650 |
+
96.05 ± 1.57
|
651 |
+
ℓ2-ℓ1-ELM
|
652 |
+
4.4093
|
653 |
+
437.5
|
654 |
+
96.84 ± 0.98
|
655 |
+
ℓ2-ℓ0.5-ELM
|
656 |
+
0.0569
|
657 |
+
193
|
658 |
+
98.01 ± 0.00
|
659 |
+
Balance
|
660 |
+
BP
|
661 |
+
4.3814
|
662 |
+
600
|
663 |
+
59.99 ± 25.26
|
664 |
+
SVM
|
665 |
+
0.0215
|
666 |
+
–
|
667 |
+
88.63 ± 1.86
|
668 |
+
EL,M
|
669 |
+
0.0008
|
670 |
+
600
|
671 |
+
50.72 ± 6.66
|
672 |
+
ℓ0.5-ELM
|
673 |
+
0.1285
|
674 |
+
23.3
|
675 |
+
90.55 ± 0.00
|
676 |
+
ℓ1-ELM
|
677 |
+
6.5074
|
678 |
+
42.9
|
679 |
+
90.47 ± 1.66
|
680 |
+
ℓ2-ELM
|
681 |
+
0.1579
|
682 |
+
600
|
683 |
+
90.55 ± 0.00
|
684 |
+
ℓ2-ℓ1-ELM
|
685 |
+
6.8678
|
686 |
+
246.4
|
687 |
+
90.10 ± 1.35
|
688 |
+
ℓ2-ℓ0.5-ELM
|
689 |
+
0.0974
|
690 |
+
52.7
|
691 |
+
90.91 ± 0.00
|
692 |
+
0.0001, 0.001, 0.0001 respectively. The number of hidden nodes in
|
693 |
+
the experiments is 600. Table 2 shows the running time, the number
|
694 |
+
of nodes retained, and the accuracy of the test for each dataset for
|
695 |
+
the eight models (the standard deviation is kept to 4 significant
|
696 |
+
digits, 0.00 in the table indicates a standard deviation of less than
|
697 |
+
10−4). These indices are used to measure the sparsity, stability and
|
698 |
+
effectiveness of the proposed method. The corresponding figures
|
699 |
+
on testing are shown as follows.
|
700 |
+
From the results of 1-3, we can see that the accuracy of the ELM
|
701 |
+
model is lower than all the regularized ELM models. The standard
|
702 |
+
deviation of the ELM model is higher than that of other regularized
|
703 |
+
ELM models, which indicates that the stability of the ELM model is
|
704 |
+
lower. The accuracy of the ℓ2-ℓ0.5-ELM model at all nodes can be
|
705 |
+
compared with other regularized ELM models, and the accuracy at
|
706 |
+
most hidden nodes is higher than other comparable regularized ELM
|
707 |
+
models. This indicates that the ℓ2-ℓ0.5-ELM model has consistently
|
708 |
+
good classification prediction. In terms of the standard deviation
|
709 |
+
of different nodes, the ℓ2-ℓ0.5-ELM model is lower than the other
|
710 |
+
compared models, indicating that the classification accuracy of this
|
711 |
+
method is more stable.
|
712 |
+
We can see the performance of ℓ2-ℓ0.5-ELM in detail and draw
|
713 |
+
the following conclusions:
|
714 |
+
(i) In 3 datasets, the classification accuracy of the regularized
|
715 |
+
ELM methods (ℓ2-ℓ0.5-ELM, ℓ0.5-ELM, ℓ2-ℓ1-ELM, ℓ1-ELM, ℓ2-ELM)
|
716 |
+
are significantly higher than that of the BP, SVM and ELM methods,
|
717 |
+
indicating that the regularized ELM methods have better general-
|
718 |
+
ization performance, and the classification accuracy of ℓ2-ℓ0.5-ELM
|
719 |
+
methods is higher than that of other compared regularized ELM
|
720 |
+
methods.
|
721 |
+
(ii) From the perspective of the number of remaining hidden
|
722 |
+
nodes, ℓ0.5-ELM has the lowest number of hidden nodes. It is shown
|
723 |
+
|
724 |
+
An improved hybrid regularization approach for extreme learning machine
|
725 |
+
AISS 2022, November 25–27, 2022, Sanya, China
|
726 |
+
200
|
727 |
+
300
|
728 |
+
400
|
729 |
+
500
|
730 |
+
600
|
731 |
+
700
|
732 |
+
800
|
733 |
+
900
|
734 |
+
1000 1100 1200
|
735 |
+
Number of Hidden Nodes
|
736 |
+
0.50
|
737 |
+
0.55
|
738 |
+
0.60
|
739 |
+
0.65
|
740 |
+
0.70
|
741 |
+
0.75
|
742 |
+
0.80
|
743 |
+
0.85
|
744 |
+
0.90
|
745 |
+
0.95
|
746 |
+
1.00
|
747 |
+
Testing accuracy
|
748 |
+
ELM
|
749 |
+
l0.5
|
750 |
+
l1
|
751 |
+
l2
|
752 |
+
l2l1
|
753 |
+
l2l0.5
|
754 |
+
200
|
755 |
+
300
|
756 |
+
400
|
757 |
+
500
|
758 |
+
600
|
759 |
+
700
|
760 |
+
800
|
761 |
+
900
|
762 |
+
1000 1100 1200
|
763 |
+
Number of Hidden Nodes
|
764 |
+
0.000
|
765 |
+
0.002
|
766 |
+
0.004
|
767 |
+
0.006
|
768 |
+
0.008
|
769 |
+
0.010
|
770 |
+
0.012
|
771 |
+
0.014
|
772 |
+
0.016
|
773 |
+
0.018
|
774 |
+
0.020
|
775 |
+
0.022
|
776 |
+
0.024
|
777 |
+
0.026
|
778 |
+
0.028
|
779 |
+
0.030
|
780 |
+
SDs of Testing
|
781 |
+
ELM
|
782 |
+
l0.5
|
783 |
+
l1
|
784 |
+
l2
|
785 |
+
l2l1
|
786 |
+
l2l0.5
|
787 |
+
Figure 1: Performance comparison of 6 models in the Austrian dataset
|
788 |
+
200
|
789 |
+
300
|
790 |
+
400
|
791 |
+
500
|
792 |
+
600
|
793 |
+
700
|
794 |
+
800
|
795 |
+
900
|
796 |
+
1000 1100 1200
|
797 |
+
Number of Hidden Nodes
|
798 |
+
0.60
|
799 |
+
0.62
|
800 |
+
0.64
|
801 |
+
0.66
|
802 |
+
0.68
|
803 |
+
0.70
|
804 |
+
0.72
|
805 |
+
0.74
|
806 |
+
0.76
|
807 |
+
0.78
|
808 |
+
0.80
|
809 |
+
0.82
|
810 |
+
0.84
|
811 |
+
0.86
|
812 |
+
0.88
|
813 |
+
0.90
|
814 |
+
0.92
|
815 |
+
0.94
|
816 |
+
0.96
|
817 |
+
0.98
|
818 |
+
1.00
|
819 |
+
Testing accuracy
|
820 |
+
ELM
|
821 |
+
l0.5
|
822 |
+
l1
|
823 |
+
l2
|
824 |
+
l2l1
|
825 |
+
l2l0.5
|
826 |
+
200
|
827 |
+
300
|
828 |
+
400
|
829 |
+
500
|
830 |
+
600
|
831 |
+
700
|
832 |
+
800
|
833 |
+
900
|
834 |
+
1000 1100 1200
|
835 |
+
Number of Hidden Nodes
|
836 |
+
-0.01
|
837 |
+
0.00
|
838 |
+
0.01
|
839 |
+
0.02
|
840 |
+
0.03
|
841 |
+
0.04
|
842 |
+
0.05
|
843 |
+
0.06
|
844 |
+
SDs of Testing
|
845 |
+
ELM
|
846 |
+
l0.5
|
847 |
+
l1
|
848 |
+
l2
|
849 |
+
l2l1
|
850 |
+
l2l0.5
|
851 |
+
Figure 2: Performance comparison of 6 models in the Ionosphere dataset
|
852 |
+
200
|
853 |
+
300
|
854 |
+
400
|
855 |
+
500
|
856 |
+
600
|
857 |
+
700
|
858 |
+
800
|
859 |
+
900
|
860 |
+
1000 1100 1200
|
861 |
+
Number of Hidden Nodes
|
862 |
+
0.35
|
863 |
+
0.40
|
864 |
+
0.45
|
865 |
+
0.50
|
866 |
+
0.55
|
867 |
+
0.60
|
868 |
+
0.65
|
869 |
+
0.70
|
870 |
+
0.75
|
871 |
+
0.80
|
872 |
+
0.85
|
873 |
+
0.90
|
874 |
+
0.95
|
875 |
+
1.00
|
876 |
+
Testing accuracy
|
877 |
+
ELM
|
878 |
+
l0.5
|
879 |
+
l1
|
880 |
+
l2
|
881 |
+
l2l1
|
882 |
+
l2l0.5
|
883 |
+
200
|
884 |
+
300
|
885 |
+
400
|
886 |
+
500
|
887 |
+
600
|
888 |
+
700
|
889 |
+
800
|
890 |
+
900
|
891 |
+
1000 1100 1200
|
892 |
+
Number of Hidden Nodes
|
893 |
+
-0.005
|
894 |
+
0.000
|
895 |
+
0.005
|
896 |
+
0.010
|
897 |
+
0.015
|
898 |
+
0.020
|
899 |
+
0.025
|
900 |
+
0.030
|
901 |
+
0.035
|
902 |
+
0.040
|
903 |
+
0.045
|
904 |
+
0.050
|
905 |
+
0.055
|
906 |
+
0.060
|
907 |
+
0.065
|
908 |
+
0.070
|
909 |
+
0.075
|
910 |
+
0.080
|
911 |
+
0.085
|
912 |
+
0.090
|
913 |
+
0.095
|
914 |
+
0.100
|
915 |
+
SDs of Testing
|
916 |
+
ELM
|
917 |
+
l0.5
|
918 |
+
l1
|
919 |
+
l2
|
920 |
+
l2l1
|
921 |
+
l2l0.5
|
922 |
+
Figure 3: Performance comparison of 6 models in the Balance dataset
|
923 |
+
that the ℓ0.5 or ℓ1-regularization term is beneficial to enhance the
|
924 |
+
sparsity of the hidden nodes of the model. Compared with the ℓ2-
|
925 |
+
ℓ1-ELM model, the ℓ2-ℓ0.5-ELM model adds the ℓ0.5 regularization
|
926 |
+
term to the model, which has a sparser solution and thus a better
|
927 |
+
generalization ability.
|
928 |
+
(iii) From the perspective of algorithm running time, the ELM
|
929 |
+
model runs in the shortest time (the ELM model can obtain the
|
930 |
+
analytic solution directly without iterative computation). In com-
|
931 |
+
parison, the SVM model runs faster than all ELM methods with
|
932 |
+
regularity. Secondly, for the 5 regularized ELM models, the models
|
933 |
+
with ℓ0.5 regularization terms (ℓ0.5-ELM, ℓ2-ℓ0.5-ELM) are faster
|
934 |
+
than the models with ℓ1 regularization terms (ℓ1-ELM, ℓ2- ℓ1-ELM).
|
935 |
+
5.2
|
936 |
+
Performance for gene datasets
|
937 |
+
In this section, the performance of the ℓ2-ℓ0.5-ELM model is vali-
|
938 |
+
dated using the colon and DLBCL data. The training and testing sets
|
939 |
+
of each dataset were experimented in the ratio of 1 : 1. The regular-
|
940 |
+
ization parameters are set as follows, colon data: (ℓ2-ℓ0.5-ELM and
|
941 |
+
ℓ2-ℓ1-ELM : 𝜆 = 0.09,𝛾 = 0.9,𝜀 = 0.9), DLBCL data: (ℓ2-ℓ0.5-ELM
|
942 |
+
and ℓ2-ℓ1-ELM : 𝜆 = 0.005,𝛾 = 0.5,𝜀 = 0.5); and 𝜉 = 0.001. Each
|
943 |
+
dataset was repeatedly run 30 times, and the average was taken as
|
944 |
+
the final result. As shown in Table 3.
|
945 |
+
It can be demonstrated that the prediction accuracy of the single-
|
946 |
+
layer BP network is very low and does not capture the features of
|
947 |
+
|
948 |
+
AISS 2022, November 25–27, 2022, Sanya, China
|
949 |
+
Zhou and Miao.
|
950 |
+
200
|
951 |
+
300
|
952 |
+
400
|
953 |
+
500
|
954 |
+
600
|
955 |
+
700
|
956 |
+
800
|
957 |
+
900
|
958 |
+
1000 1100 1200
|
959 |
+
Number of Hidden Nodes
|
960 |
+
0.72
|
961 |
+
0.73
|
962 |
+
0.74
|
963 |
+
0.75
|
964 |
+
0.76
|
965 |
+
0.77
|
966 |
+
0.78
|
967 |
+
0.79
|
968 |
+
0.80
|
969 |
+
0.81
|
970 |
+
0.82
|
971 |
+
0.83
|
972 |
+
0.84
|
973 |
+
0.85
|
974 |
+
0.86
|
975 |
+
0.87
|
976 |
+
0.88
|
977 |
+
0.89
|
978 |
+
Testing accuracy
|
979 |
+
ELM
|
980 |
+
l0.5
|
981 |
+
l1
|
982 |
+
l2
|
983 |
+
l2l1
|
984 |
+
l2l0.5
|
985 |
+
200
|
986 |
+
300
|
987 |
+
400
|
988 |
+
500
|
989 |
+
600
|
990 |
+
700
|
991 |
+
800
|
992 |
+
900
|
993 |
+
1000 1100 1200
|
994 |
+
Number of Hidden Nodes
|
995 |
+
0.000
|
996 |
+
0.005
|
997 |
+
0.010
|
998 |
+
0.015
|
999 |
+
0.020
|
1000 |
+
0.025
|
1001 |
+
0.030
|
1002 |
+
SDs of Testing
|
1003 |
+
ELM
|
1004 |
+
l0.5
|
1005 |
+
l1
|
1006 |
+
l2
|
1007 |
+
l2l1
|
1008 |
+
l2l0.5
|
1009 |
+
Figure 4: Performance comparison of 6 models in colon dataset
|
1010 |
+
Table 3: Performance comparison of 8 models in 2 gene
|
1011 |
+
datasets
|
1012 |
+
Datasets
|
1013 |
+
Methods
|
1014 |
+
Times(s)
|
1015 |
+
Remaining Nodes
|
1016 |
+
Accuracy(% ± %)
|
1017 |
+
colon
|
1018 |
+
BP
|
1019 |
+
22.2641
|
1020 |
+
1000.0
|
1021 |
+
55.52 ± 9.15
|
1022 |
+
SVM
|
1023 |
+
0.0358
|
1024 |
+
–
|
1025 |
+
77.5 ± 7.28
|
1026 |
+
ELM
|
1027 |
+
0.0056
|
1028 |
+
1000.0
|
1029 |
+
83.02 ± 1.92
|
1030 |
+
ℓ0.5-ELM
|
1031 |
+
0.0829
|
1032 |
+
370.5
|
1033 |
+
75.00 ± 0.00
|
1034 |
+
ℓ1-ELM
|
1035 |
+
0.0488
|
1036 |
+
974.5
|
1037 |
+
84.79 ± 2.22
|
1038 |
+
ℓ2-ELM
|
1039 |
+
0.0815
|
1040 |
+
1000.0
|
1041 |
+
84.17 ± 2.20
|
1042 |
+
ℓ2-ℓ1-ELM
|
1043 |
+
0.0401
|
1044 |
+
1000.0
|
1045 |
+
83.96 ± 2.24
|
1046 |
+
ℓ2-ℓ0.5-ELM
|
1047 |
+
0.0879
|
1048 |
+
877.0
|
1049 |
+
87.50 ± 0.00
|
1050 |
+
DLBCL
|
1051 |
+
BP
|
1052 |
+
122.3174
|
1053 |
+
1000.0
|
1054 |
+
57.24 ± 12.55
|
1055 |
+
SVM
|
1056 |
+
0.0968
|
1057 |
+
–
|
1058 |
+
87.24 ± 5.98
|
1059 |
+
ELM
|
1060 |
+
0.0060
|
1061 |
+
786.0
|
1062 |
+
89.90 ± 5.98
|
1063 |
+
ℓ0.5-ELM
|
1064 |
+
5.2214
|
1065 |
+
242.0
|
1066 |
+
91.43 ± 0.00
|
1067 |
+
ℓ1-ELM
|
1068 |
+
18.2957
|
1069 |
+
188.5
|
1070 |
+
89.05 ± 5.12
|
1071 |
+
ℓ2-ELM
|
1072 |
+
5.2324
|
1073 |
+
764.0
|
1074 |
+
89.51 ± 5.48
|
1075 |
+
ℓ2-ℓ1-ELM
|
1076 |
+
15.5286
|
1077 |
+
431.5
|
1078 |
+
89.62 ± 6.10
|
1079 |
+
ℓ2-ℓ0.5-ELM
|
1080 |
+
5.4519
|
1081 |
+
575.5
|
1082 |
+
91.43 ± 0.00
|
1083 |
+
the data very well. It can also be found that the prediction accu-
|
1084 |
+
racy of the ℓ2-ℓ0.5-ELM model is slightly higher than that of the
|
1085 |
+
other methods. The standard deviations of the accuracy of the ELM
|
1086 |
+
methods with ℓ0.5 regularization are much smaller than those of
|
1087 |
+
BP, SVM, and ELM, indicating that the ELM model variants with
|
1088 |
+
ℓ0.5 regularization terms can improve the stability of the solutions;
|
1089 |
+
The number of hidden nodes in the ℓ0.5-ELM and ℓ1-ELM models
|
1090 |
+
is smaller, that is, the sparsity of these two regularization terms is
|
1091 |
+
the strongest, indicating that the addition of ℓ0.5 or ℓ1 regularization
|
1092 |
+
terms in the ELM model enhances the sparsity of the model, while
|
1093 |
+
the number of hidden nodes in the ℓ2-ELM model is 1000. The
|
1094 |
+
number of nodes in the ℓ2-ELM model is 1000, indicating that the
|
1095 |
+
ℓ2-regularization term has no sparse effect on the model. The ℓ2
|
1096 |
+
norm is used to increase the stability of the model by penalizing
|
1097 |
+
oversized regularization parameters. This makes the ℓ2-ℓ0.5-ELM
|
1098 |
+
sparser and model stable, and thus obtains better generalization
|
1099 |
+
ability.
|
1100 |
+
From the perspective of algorithm running time, it can be seen
|
1101 |
+
that the ELM model has the shortest running time (the ELM model
|
1102 |
+
can obtain the analytical solution directly without iterative solving).
|
1103 |
+
In contrast, the SVM model runs faster than all ELM methods with
|
1104 |
+
regularization.
|
1105 |
+
Further, we use the colon data to verify the effect of different
|
1106 |
+
number of hidden nodes (200, 400, 600, 800, 1000, 1200) on the sta-
|
1107 |
+
bility of the ELM correlation model. We perform 30 experiments
|
1108 |
+
for each hidden node and calculate the ELM, ℓ2-ℓ0.5-ELM, ℓ0.5-ELM,
|
1109 |
+
ℓ2-ℓ1-ELM, ℓ1-ELM, ℓ2-ELM for the test set accuracy and standard
|
1110 |
+
deviation as shown in Figure 4. The test accuracy of ℓ2-ℓ0.5-ELM at
|
1111 |
+
all nodes can be compared with all regularized ELM models, while
|
1112 |
+
the accuracy at most hidden nodes is higher than other models.
|
1113 |
+
The standard deviation of ℓ2-ℓ0.5-ELM model is lower than other
|
1114 |
+
regularized ELM models.
|
1115 |
+
5.3
|
1116 |
+
Performance for ORL face dataset
|
1117 |
+
The ORL face dataset is used for experimental validation. The num-
|
1118 |
+
ber of hidden nodes for the experiment is 1000. The average of
|
1119 |
+
30 experiments is used as the final result. Since the original im-
|
1120 |
+
age has high dimensionality, we preprocess each image by using
|
1121 |
+
the (2𝐷)2PCA[18] dimensionality reduction technique. And the
|
1122 |
+
training set and test set are in the ratio of 7 : 3. The values of the
|
1123 |
+
regular parameters set in the experiment are as follows: ℓ0.5-ELM
|
1124 |
+
and ℓ1-ELM (𝛾 = 0.05,𝜀 = 0), ℓ2-ELM (𝛾 = 0,𝜀 = 0.5), ℓ2 -ℓ1-ELM,
|
1125 |
+
ℓ2-ℓ0.5-ELM(𝛾 = 0.05,𝜀 = 0.5); 𝜆 = 0.001 and 𝜀 = 0.0001 are cho-
|
1126 |
+
sen in all experiments. This experiment validates the performance
|
1127 |
+
of the model in terms of accuracy and standard deviation. The re-
|
1128 |
+
sults are shown in Table 4. From the table, it can be seen that the
|
1129 |
+
Table 4: Performance comparison of 8 models in ORL face
|
1130 |
+
dataset
|
1131 |
+
Methods
|
1132 |
+
Accuracy(%)
|
1133 |
+
BP
|
1134 |
+
31.00 ± 4.90
|
1135 |
+
SVM
|
1136 |
+
71.53 ± 2.12
|
1137 |
+
ELM
|
1138 |
+
70.58 ± 2.95
|
1139 |
+
ℓ0.5-ELM
|
1140 |
+
71.00 ± 2.34
|
1141 |
+
ℓ1-ELM
|
1142 |
+
70.85 ± 2.86
|
1143 |
+
ℓ2-ELM
|
1144 |
+
71.17 ± 2.47
|
1145 |
+
ℓ2-ℓ1-ELM
|
1146 |
+
70.58 ± 2.87
|
1147 |
+
ℓ2-ℓ0.5-ELM
|
1148 |
+
71.67 ± 2.34
|
1149 |
+
|
1150 |
+
An improved hybrid regularization approach for extreme learning machine
|
1151 |
+
AISS 2022, November 25–27, 2022, Sanya, China
|
1152 |
+
Table 5: Performance comparison of 6 models in ORL face dataset
|
1153 |
+
Nodes
|
1154 |
+
ELM
|
1155 |
+
ℓ0.5-ELM
|
1156 |
+
ℓ1-ELM
|
1157 |
+
ℓ2-ELM
|
1158 |
+
ℓ2-ℓ1-ELM
|
1159 |
+
ℓ2-ℓ0.5-ELM
|
1160 |
+
500
|
1161 |
+
52.92±3.04
|
1162 |
+
66.10±2.55
|
1163 |
+
60.00 ±1.77
|
1164 |
+
62.63± 2.38
|
1165 |
+
59.25 ±2.32
|
1166 |
+
65.83 ± 2.46
|
1167 |
+
1500
|
1168 |
+
76.08±0.73
|
1169 |
+
77.00±0.93
|
1170 |
+
76.33 ±0.67
|
1171 |
+
76.75± 0.75
|
1172 |
+
76.33 ±0.76
|
1173 |
+
77.20 ±0.93
|
1174 |
+
2000
|
1175 |
+
78.25±2.00
|
1176 |
+
78.73±2.45
|
1177 |
+
78.33 ±2.08
|
1178 |
+
78.63± 2.18
|
1179 |
+
78.33 ±2.08
|
1180 |
+
78.83 ±2.45
|
1181 |
+
2500
|
1182 |
+
79.58±3.49
|
1183 |
+
79.74±3.36
|
1184 |
+
79.67 ±3.44
|
1185 |
+
79.21±3.29
|
1186 |
+
79.63 ±3.44
|
1187 |
+
79.76 ± 3.26
|
1188 |
+
3000
|
1189 |
+
81.50±1.98
|
1190 |
+
81.55±2.69
|
1191 |
+
81.42 ±2.07
|
1192 |
+
81.45±2.39
|
1193 |
+
81.42 ±2.07
|
1194 |
+
81.58 ± 2.68
|
1195 |
+
3500
|
1196 |
+
81.17±1.81
|
1197 |
+
81.13±2.22
|
1198 |
+
81.17 ±1.87
|
1199 |
+
81.17±1.89
|
1200 |
+
81.17 ±1.87
|
1201 |
+
81.25 ± 2.12
|
1202 |
+
4000
|
1203 |
+
82.00±1.81
|
1204 |
+
82.00±1.67
|
1205 |
+
81.92 ±1.74
|
1206 |
+
81.96±1.64
|
1207 |
+
81.92 ±1.74
|
1208 |
+
82.08 ± 1.65
|
1209 |
+
mean
|
1210 |
+
75.22±9.12
|
1211 |
+
77.16±5.33
|
1212 |
+
76.21 ±7.00
|
1213 |
+
76.62±6.21
|
1214 |
+
76.08 ±7.24
|
1215 |
+
77.26 ± 5.32
|
1216 |
+
accuracy of the ℓ2-ℓ0.5-ELM model (which is slightly higher than
|
1217 |
+
the SVM model) is slightly higher than all other models tested.
|
1218 |
+
Further, we verify the effect of different values of hidden nodes
|
1219 |
+
on the prediction accuracy. The number of hidden nodes chosen in
|
1220 |
+
the experiment is 500, 1000, 1500, 2000, 2500, 3000, 3500, 4000.
|
1221 |
+
The results are shown in Table 5, which show that the test accu-
|
1222 |
+
racy of ℓ2-ℓ0.5-ELM model is higher than the other comparative
|
1223 |
+
ELM models. The test accuracy of the ELM model fluctuates the
|
1224 |
+
most with the changing of the number of hidden nodes, i.e., the
|
1225 |
+
selection of different nodes has the greatest impact on it, indicating
|
1226 |
+
that the ELM model is less stable in high-dimensional data. In con-
|
1227 |
+
trast, the standard deviations of all the regularized ELM methods
|
1228 |
+
(5.33, 7.00, 6.21, 7.24, 5.32) are lower than those of the ELM meth-
|
1229 |
+
ods, indicating that the stability of the ELM model is improved by
|
1230 |
+
adding the regularization term. ELM methods, indicating that the
|
1231 |
+
stability of the proposed method is better than the other 5 compared
|
1232 |
+
to ELM methods.
|
1233 |
+
6
|
1234 |
+
CONCLUSION
|
1235 |
+
In order to further improve the stability and generalization of the
|
1236 |
+
ELM model, this paper proposes a ℓ2-ℓ0.5-ELM model by combin-
|
1237 |
+
ing the ℓ0.5 and the ℓ2 regularization term. The iterative algorithm
|
1238 |
+
is applied to solve the model with a fixed points algorithm. The
|
1239 |
+
convergence and sparsity of this algorithm are proved. Moreover,
|
1240 |
+
the proposed ℓ2-ℓ0.5-ELM model is compared with BP, SVM, ELM,
|
1241 |
+
ℓ0.5-ELM, ℓ1-ELM, ℓ2-ELM and ℓ2-ELM. ℓ2-ℓ1-ELM models. Experi-
|
1242 |
+
mental comparisons on several datasets (UCI dataset, gene dataset,
|
1243 |
+
ORL face dataset) show that the ℓ2-ℓ0.5-ELM method outperforms
|
1244 |
+
the other 7 models in terms of prediction accuracy and stability
|
1245 |
+
on these data. Therefore, the model can be improved as follows:
|
1246 |
+
the information of previously computed nodes is not used in the
|
1247 |
+
computation of different hidden nodes, and it can be learned from
|
1248 |
+
the incremental learning point of view, which can reduce the com-
|
1249 |
+
putation time to a certain extent.
|
1250 |
+
REFERENCES
|
1251 |
+
[1] U. Alon, N. Barkai, D. A. Notterman, K. Gish, S. Ybarra, D. Mack, and A. J. Levine.
|
1252 |
+
1999. Broad patterns of gene expression revealed by clustering analysis of tumor
|
1253 |
+
and normal colon tissues probed by oligonucleotide arrays. 96, 12 (1999), 6745–
|
1254 |
+
6750.
|
1255 |
+
[2] Hai Hui Huang A B and Yong Liang C. 2018. Hybrid 𝐿1/2+2 method for gene
|
1256 |
+
selection in the Cox proportional hazards model. Computer Methods and Programs
|
1257 |
+
in Biomedicine 164 (2018), 65–73.
|
1258 |
+
[3] K. Bache and M. Lichman. 2013. UCI machine learning repository. (2013).
|
1259 |
+
[4] Feilong Cao, Yuanpeng Tan, and Miaomiao Cai. 2014. Sparse algorithms of
|
1260 |
+
random weight networks and applications. Expert Systems with Applications 41,
|
1261 |
+
5 (2014), 2457–2462.
|
1262 |
+
[5] Feilong Cao, Dianhui Wang, Houying Zhu, and Yuguang Wang. 2016. An itera-
|
1263 |
+
tive learning algorithm for feedforward neural networks with random weights.
|
1264 |
+
Information Sciences 328 (2016), 546–557.
|
1265 |
+
[6] G. C. Cawley and Nlc Talbot. 2006. Gene selection in cancer classification using
|
1266 |
+
sparse logistic regression with Bayesian regularization. Oxford University Press
|
1267 |
+
(2006).
|
1268 |
+
[7] Patrick L. Combettes and Valérie R. Wajs. 2005. Signal recovery by proximal
|
1269 |
+
forward-backward splitting. Multiscale Model. Simul. 4 (2005), 1168–1200.
|
1270 |
+
[8] Qinwei Fan, Lei Niu, and Qian Kang. 2020. Regression and multiclass classification
|
1271 |
+
using sparse extreme learning machine via smoothing group 𝐿1/2 regularizer.
|
1272 |
+
IEEE Access 8 (2020), 191482–191494.
|
1273 |
+
[9] Hailiang, Ye, Feilong, Cao, Dianhui, and Wang. [n. d.]. A hybrid regularization
|
1274 |
+
approach for random vector functional-link networks - ScienceDirect. Expert
|
1275 |
+
Systems with Applications 140 ([n. d.]), 112912–112912.
|
1276 |
+
[10] Guang-Bin Huang, Qin-Yu Zhu, and Chee-Kheong Siew. 2006. Extreme learning
|
1277 |
+
machine: theory and applications. Neurocomputing 70, 1 (2006), 489–501.
|
1278 |
+
[11] B. Igelnik and Y. H. Pao. 1995. Stochastic choice of basis functions in adaptive
|
1279 |
+
function approximation and the functional-link net. IEEE Trans Neural Netw 6, 6
|
1280 |
+
(1995), 1320–1329.
|
1281 |
+
[12] Charles Micchelli, Lixin Shen, and Yuesheng Xu. 2011. Proximity algorithms for
|
1282 |
+
image models: denoising. Inverse Problems 27 (03 2011), 045009.
|
1283 |
+
[13] A. Rosenwald, G. Wright, W. C. Chan, J. M. Connors, E. Campo, R. I. Fisher, R. D.
|
1284 |
+
Gascoyne, H. K. Muller-Hermelink, E. B. Smeland, and J. M. Giltnane. 2011. The
|
1285 |
+
use of molecular profiling to predict survival after chemotherapy for diffuse
|
1286 |
+
large-B-cell lymphoma. New England Journal of Medicine 346, 25 (2011), 1937.
|
1287 |
+
[14] W.F. Schmidt, M.A. Kraaijveld, and R.P.W. Duin. 1992.
|
1288 |
+
Feedforward neural
|
1289 |
+
networks with random weights. (1992), 1–4.
|
1290 |
+
[15] Robert Tibshirani. 2011. Regression shrinkage and selection via the lasso: a retro-
|
1291 |
+
spective. Journal of the Royal Statistical Society: Series B (Statistical Methodology)
|
1292 |
+
73, 3 (2011), 267–288.
|
1293 |
+
[16] Zongben Xu, Xiangyu Chang, Fengmin Xu, and Hai Zhang. 2012. 𝐿1/2 regular-
|
1294 |
+
ization: a thresholding representation theory and a fast solver. IEEE Transac-
|
1295 |
+
tions on Neural Networks and Learning Systems 23, 7 (2012), 1013–1027. https:
|
1296 |
+
//doi.org/10.1109/TNNLS.2012.2197412
|
1297 |
+
[17] Zong-Ben Xu, Hai-Liang Guo, Yao Wang, and Hai Zhang. 2012. Representative
|
1298 |
+
of 𝐿1/2 regularization among 𝐿𝑞 (0 < 𝑞 ≤ 1) regularizations: an experimental
|
1299 |
+
study based on phase diagram. Acta Automatica Sinica 38, 7 (2012), 1225–1228.
|
1300 |
+
[18] Daoqiang Zhang and Zhi-Hua Zhou. 2005. (2D)2PCA: Two-directional two-
|
1301 |
+
dimensional PCA for efficient face representation and recognition. Neurocom-
|
1302 |
+
puting 69, 1 (2005), 224–231.
|
1303 |
+
|
5NAzT4oBgHgl3EQffvy-/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
5NE6T4oBgHgl3EQflhFb/content/2301.06150v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:9fef1677046b2a312a589bbd35c6fc0da21781ecf895dec3b75925919ea719b2
|
3 |
+
size 594263
|
5NE6T4oBgHgl3EQflhFb/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:f94e60c2e2f56c51918a1d062847d72e7a3c8aba635b37f6336375c0f16a29b3
|
3 |
+
size 6029357
|
5dFJT4oBgHgl3EQfkywG/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:47514ca2a9094ee84929f023419aa2bd8efbc03778eb575718fc7e4f76792f3a
|
3 |
+
size 3211309
|
5tAyT4oBgHgl3EQf2fk_/content/2301.00751v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:e99a11bddf86ddb786e4970140d61a2679534619ab775198e163795faf6ca217
|
3 |
+
size 637742
|
8tE0T4oBgHgl3EQfwgFY/content/2301.02633v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:626ddf71600516aecb5cff64488791940c9fea908b757c2613b351ec3386d909
|
3 |
+
size 152485
|
8tE0T4oBgHgl3EQfwgFY/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:d42d133246a5f7d86810f1ceecb695928f46472e1980dc713d385237fda50338
|
3 |
+
size 1376301
|
8tE0T4oBgHgl3EQfwgFY/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:d0e5fcad3f379b480c30d1c3441bee0f4b0fc7c90d2812ff4ff8845e7009766c
|
3 |
+
size 54415
|
BNE4T4oBgHgl3EQfFAx2/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:f594e20c913eb693a3dc18a16ca0d4d7c97c347a29adb8d88d13d489fe27aaa9
|
3 |
+
size 7864365
|
BNE4T4oBgHgl3EQfFAx2/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:870b6012fd477f4dcaffe50173e55a6a5d311410b36cd36edeb30f3335655cb8
|
3 |
+
size 260496
|
D9E2T4oBgHgl3EQfogh1/content/tmp_files/2301.04019v1.pdf.txt
ADDED
@@ -0,0 +1,2460 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 10, JANUARY 2023
|
2 |
+
1
|
3 |
+
FGAHOI: Fine-Grained Anchors for
|
4 |
+
Human-Object Interaction Detection
|
5 |
+
Shuailei Ma, Yuefeng Wang, Shanze Wang, and Ying Wei
|
6 |
+
Abstract—Human-Object Interaction (HOI), as an important problem in computer vision, requires locating the human-object pair and
|
7 |
+
identifying the interactive relationships between them. The HOI instance has a greater span in spatial, scale, and task than the
|
8 |
+
individual object instance, making its detection more susceptible to noisy backgrounds. To alleviate the disturbance of noisy
|
9 |
+
backgrounds on HOI detection, it is necessary to consider the input image information to generate fine-grained anchors which are then
|
10 |
+
leveraged to guide the detection of HOI instances. However, it is challenging for the following reasons. 𝑖) how to extract pivotal features
|
11 |
+
from the images with complex background information is still an open question. 𝑖𝑖) how to semantically align the extracted features and
|
12 |
+
query embeddings is also a difficult issue. In this paper, a novel end-to-end transformer-based framework (FGAHOI) is proposed to
|
13 |
+
alleviate the above problems. FGAHOI comprises three dedicated components namely, multi-scale sampling (MSS), hierarchical
|
14 |
+
spatial-aware merging (HSAM) and task-aware merging mechanism (TAM). MSS extracts features of humans, objects and
|
15 |
+
interaction areas from noisy backgrounds for HOI instances of various scales. HSAM and TAM semantically align and merge the
|
16 |
+
extracted features and query embeddings in the hierarchical spatial and task perspectives in turn. In the meanwhile, a novel training
|
17 |
+
strategy Stage-wise Training Strategy is designed to reduce the training pressure caused by overly complex tasks done by FGAHOI.
|
18 |
+
In addition, we propose two ways to measure the difficulty of HOI detection and a novel dataset, 𝑖.𝑒., HOI-SDC for the two challenges
|
19 |
+
(Uneven Distributed Area in Human-Object Pairs and Long Distance Visual Modeling of Human-Object Pairs) of HOI instances
|
20 |
+
detection. Experiments are conducted on three benchmarks: HICO-DET, HOI-SDC and V-COCO. Our model outperforms the
|
21 |
+
state-of-the-art HOI detection methods, and the extensive ablations reveal the merits of our proposed contribution. The code is
|
22 |
+
available at https://github.com/xiaomabufei/FGAHOI.
|
23 |
+
Index Terms—Human-Object Interaction, FGAHOI, Fine-Grained Anchors, Noisy Background, Semantically Aligning.
|
24 |
+
!
|
25 |
+
1
|
26 |
+
INTRODUCTION
|
27 |
+
H
|
28 |
+
UMAN-Object
|
29 |
+
interaction
|
30 |
+
(HOI)
|
31 |
+
detection,
|
32 |
+
as
|
33 |
+
a
|
34 |
+
downstream task of object detection [1], [2], [3], [4],
|
35 |
+
[5], has recently received increasing attention due to its
|
36 |
+
great application potential. For successful HOI detection, it
|
37 |
+
needs to have the ability to understand human activities
|
38 |
+
which are abstracted as a set of <human, object, action>
|
39 |
+
triplets in this task, requiring a much deeper understanding
|
40 |
+
for the semantic information of visual scenes. Without HOI
|
41 |
+
detection, machines can only interpret images as collections
|
42 |
+
of object bounding boxes, i.e., AI systems can only pick up
|
43 |
+
information such as ’A man is on the bike’ or ’A bike is in
|
44 |
+
the corner’, but not ’A man rides a bike’.
|
45 |
+
Spanning the past and the present, the existing HOI
|
46 |
+
detection approaches [6], [7], [8], [9], [10], [11], [12], [13],
|
47 |
+
[14], [15], [16], [17], [18], [19], [20], [21] tend to fall into
|
48 |
+
two categories, namely two-stage and one-stage methods.
|
49 |
+
Conventional two-stage methods [7], [8], [10], [12], [13],
|
50 |
+
[14], [18], [20], [22], [23], [24], [25], as an intuitive approach,
|
51 |
+
detect human and object instances by leveraging the off-the-
|
52 |
+
•
|
53 |
+
Shuailei Ma, Yuefeng Wang are with College of Information Science and
|
54 |
+
Engineering, Northeastern University, Shenyang, China, 110819.
|
55 |
+
E-mail: {xiaomabufei, wangyuefeng0203} @gmail.com
|
56 |
+
•
|
57 |
+
Shanze Wang is with Changsha Hisense Intelligent System Research
|
58 |
+
Institute Co., Ltd. and Information Technology R&D Innovation Center of
|
59 |
+
Peking University, Shaoxing, China.
|
60 |
+
E-mail: [email protected]
|
61 |
+
•
|
62 |
+
Ying Wei is the corresponding author, with College of Information Science
|
63 |
+
and Engineering, Northeastern University, Shenyang, China, 110819.
|
64 |
+
E-mail: [email protected]
|
65 |
+
Manuscript received October 26, 2022; revised January 10, 2023.
|
66 |
+
FGAHOI
|
67 |
+
Low Level
|
68 |
+
Middle Level
|
69 |
+
High Level
|
70 |
+
Fine-Grained
|
71 |
+
Anchors
|
72 |
+
Attention Weights
|
73 |
+
Fig. 1: FGAHOI leverages the query embeddings and multi-
|
74 |
+
scale features to generate fine-grained anchors and the
|
75 |
+
corresponding weights for HOI instances of diverse scales.
|
76 |
+
Then, they guide the decoder to aid key semantic infor-
|
77 |
+
mation of HOI instances to the content embeddings and
|
78 |
+
translate the content embeddings to HOI embeddings for
|
79 |
+
predicting all elements of the HOI instances.
|
80 |
+
shelf object detector [1], [3], [4], utilizing the visual features
|
81 |
+
extracted from the located areas to recognize action classes.
|
82 |
+
To fully leverage the visual features, several methods [7],
|
83 |
+
[10], [14], [20], [22], [23], [24], [25] separately extract vi-
|
84 |
+
sual features of human-object pairs and spatial information
|
85 |
+
from the located area in a multi-stream architecture, fusing
|
86 |
+
them in a post-fusion strategy. In the meanwhile, several
|
87 |
+
approaches [8], [10], [20], [23], [24] employ the existing pose
|
88 |
+
arXiv:2301.04019v1 [cs.CV] 8 Jan 2023
|
89 |
+
|
90 |
+
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 10, JANUARY 2023
|
91 |
+
2
|
92 |
+
estimation methods, such as [26], [27], [28] to extract pose
|
93 |
+
information and fuse it with other features to predict the
|
94 |
+
action class. In addition, some works [8], [12], [13], [18],
|
95 |
+
[29] leverage the graph neural network to extract complex
|
96 |
+
semantic relationship between humans and objects. How-
|
97 |
+
ever, the difficulties encountered in the two-stage approach
|
98 |
+
lie mainly in the effective fusion of human-object pairs and
|
99 |
+
complex semantic information. Besides, owing to the limita-
|
100 |
+
tions of the fixed detector and some other components (pose
|
101 |
+
estimation etc.), the two-stage method can only achieve a
|
102 |
+
sub-optimal solution.
|
103 |
+
To achieve high efficiency, one-stage approaches [6], [9],
|
104 |
+
[11], [15], [17], [21], [30], [31] which utilize interaction points
|
105 |
+
between the human-object pairs to simultaneously predict
|
106 |
+
human and object offset vectors and action classes, are
|
107 |
+
proposed to detect human-object pairs and recognize inter-
|
108 |
+
active relationships in parallel. However, when the human
|
109 |
+
and object in the image are far apart from each other, these
|
110 |
+
methods are disturbed by ambiguous semantic features.
|
111 |
+
The one-stage methods do not achieve much attention until
|
112 |
+
the appearance of the Detection Transformer (DETR) [32]
|
113 |
+
and QPIC [19] applies it for HOI detection. Then, plenty
|
114 |
+
of transformer-based works [6], [9], [16], [17], [33] attempt
|
115 |
+
to solve the HOI detection with different encoder-decoder
|
116 |
+
structures and backbone models.
|
117 |
+
In comparison to object instances, HOI instances have
|
118 |
+
a greater span of spatial, scale and task. In most HOI
|
119 |
+
instances, there is a certain distance between human and
|
120 |
+
objects and their scale varies enormously. Compared with
|
121 |
+
simple object classification, it is necessary to consider more
|
122 |
+
information between human-object pairs rather than the
|
123 |
+
features of humans and objects for interaction classification.
|
124 |
+
Therefore, the detection is more susceptible to distractions
|
125 |
+
from noisy backgrounds. However, most recent works [19],
|
126 |
+
[33] use object detection frameworks [32], [34] directly for
|
127 |
+
HOI detection by simply adding the interaction classifica-
|
128 |
+
tion head, ignoring these problems. Inspired by [34] which
|
129 |
+
leverages the reference points to guide the decoding pro-
|
130 |
+
cess, we propose to leverage fine-grained anchors to guide
|
131 |
+
the detection of HOI instances and protect it from noisy
|
132 |
+
backgrounds. To generate fine-grained anchors for kinds
|
133 |
+
of HOI instances, it is obviously necessary to consider the
|
134 |
+
input image features. There are, however, two inevitable
|
135 |
+
challenges that arise as a result of this. 𝑖) it is difficult to
|
136 |
+
extract pivotal features from the images which contain noisy
|
137 |
+
background information. 𝑖𝑖) how to semantically align and
|
138 |
+
merge the extracted features with query embeddings is also
|
139 |
+
an open question.
|
140 |
+
In this paper, we propose a novel transformer-based
|
141 |
+
model for HOI detection, i.e., FGAHOI: Fine-Grained An-
|
142 |
+
chors for Human-Object Interaction Detection (as shown in
|
143 |
+
Fig.1). FGAHOI leverages the multi-scale sampling mech-
|
144 |
+
anism (MSS) to extract pivotal features from images with
|
145 |
+
noisy background information for variable HOI instances.
|
146 |
+
Based on the sampling strategy and initial anchor gener-
|
147 |
+
ated by the corresponding query embedding, MSS could
|
148 |
+
extract hierarchical spatial features of human, object and the
|
149 |
+
interaction region for each HOI instance. Besides, the hi-
|
150 |
+
erarchical spatial-aware (HSAM) and task-aware merging
|
151 |
+
mechanism (TAM) are utilized to semantically align and
|
152 |
+
merge the extracted features with the query embeddings.
|
153 |
+
HSAM merges the extracted features in the hierarchical
|
154 |
+
spatial perspective according to the cross-attention between
|
155 |
+
the features and the query embeddings. Meanwhile, the
|
156 |
+
extracted features are aligned towards the query embed-
|
157 |
+
dings, according to the cross-attention weights of the merg-
|
158 |
+
ing process. Thereafter, TAM leverages the switches which
|
159 |
+
dynamically switch ON and OFF to merge the input features
|
160 |
+
and query embeddings in the task perspective.
|
161 |
+
According to experiment results, we investigate that it
|
162 |
+
is difficult of the end-to-end training approach to allow the
|
163 |
+
transformer-based models to achieve optimal performance
|
164 |
+
when more complex task requirements are required. In-
|
165 |
+
spired by the stage-wise training [35], [36] for LTR [37], we
|
166 |
+
propose a novel stage-wise training strategy for FGAHOI.
|
167 |
+
During the training process, we add the important compo-
|
168 |
+
nents of the model in turn to clarify the training direction
|
169 |
+
of the model at each stage, so as to maximize the savings in
|
170 |
+
the training cost of the model.
|
171 |
+
To the best of our knowledge, there are no measurements
|
172 |
+
for the difficulty of detecting HOI instances. We investigate
|
173 |
+
that two difficulties lie in the detection of human-object
|
174 |
+
pairs, 𝑖.𝑒., Uneven Distributed Area in Human-Object
|
175 |
+
Pairs and Long Distance Visual Modeling of Human-
|
176 |
+
Object Pairs. In this paper, we propose two measurements
|
177 |
+
and a novel dataset (HOI-SDC) for these two challenges.
|
178 |
+
HOI-SDC eliminates the influence of other factors (Too few
|
179 |
+
training samples of some HOI categories, too tricky interac-
|
180 |
+
tion actions, et.al.) on the model training and focuses on the
|
181 |
+
model for these two difficult challenges. Our contributions
|
182 |
+
can be summarized fourfold:
|
183 |
+
•
|
184 |
+
We propose a novel transformer-based human-object
|
185 |
+
interaction detector (FGAHOI) which leverages input
|
186 |
+
features to generate fine-grained anchors for pro-
|
187 |
+
tecting the detection of HOI instances from noisy
|
188 |
+
backgrounds.
|
189 |
+
•
|
190 |
+
We propose a novel training strategy where each
|
191 |
+
component of the model is trained in turn to clar-
|
192 |
+
ify the training direction at each stage, in order to
|
193 |
+
maximize the training cost savings.
|
194 |
+
•
|
195 |
+
We propose two ways to measure the difficulty of
|
196 |
+
HOI detection and a dataset, 𝑖.𝑒., HOI-SDC for the
|
197 |
+
two challenges (Uneven Distributed Area in Human-
|
198 |
+
Object Pairs and Long Distance Visual Modeling of
|
199 |
+
Human-Object Pairs) of detecting HOI instances.
|
200 |
+
•
|
201 |
+
Our extensive experiments on three benchmarks:
|
202 |
+
HICO-DET
|
203 |
+
[38],
|
204 |
+
HOI-SDC
|
205 |
+
and
|
206 |
+
V-COCO
|
207 |
+
[39],
|
208 |
+
demonstrate the effectiveness of the proposed FGA-
|
209 |
+
HOI. Specifically, FGAHOI outperforms all existing
|
210 |
+
state-of-the-art methods by a large margin.
|
211 |
+
2
|
212 |
+
RELATED WORKS
|
213 |
+
Two-stage HOI Detection Approaches: The two-stage HOI
|
214 |
+
detection approaches [7], [8], [10], [12], [13], [14], [18], [20],
|
215 |
+
[22], [23], [24], [25], [29] employ the off-the-shelf object de-
|
216 |
+
tector [1], [3], [4] to localize humans and objects. Afterwards,
|
217 |
+
the features of backbone networks inside the human and
|
218 |
+
objects regions are cropped. Part of the two-stage meth-
|
219 |
+
ods [8], [12], [13], [18], [29] treat the human and objects
|
220 |
+
feature as nodes and employ graph neural networks [40]
|
221 |
+
|
222 |
+
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 10, JANUARY 2023
|
223 |
+
3
|
224 |
+
Encoder
|
225 |
+
Content Embeddings
|
226 |
+
…
|
227 |
+
Initial Anchor
|
228 |
+
…
|
229 |
+
Positional Encoding
|
230 |
+
Human Box
|
231 |
+
Object box/Class
|
232 |
+
Human Box
|
233 |
+
Object box/Class
|
234 |
+
Verb Class
|
235 |
+
Verb Class
|
236 |
+
HOI
|
237 |
+
Detection
|
238 |
+
Head
|
239 |
+
Decoder
|
240 |
+
Task-Aware
|
241 |
+
Merging
|
242 |
+
Dynamic
|
243 |
+
Switch On/Off
|
244 |
+
…
|
245 |
+
Positional
|
246 |
+
Embeddings
|
247 |
+
Multi-Scale
|
248 |
+
Sampling Strategy
|
249 |
+
Multi-Scale
|
250 |
+
Features
|
251 |
+
Hierarchical Spatial-Aware
|
252 |
+
Merging
|
253 |
+
Fig. 2: This figure illustrates the overall structure of FGAHOI. FGAHOI utilizes a hierarchical backbone and a deformable
|
254 |
+
encoder to extract the semantic features in a multi-scale approach. In the decoding phrase, FGAHOI leverages the multi-
|
255 |
+
scale sampling, hierarchical spatial-aware merging and task-aware merging mechanism to align input features with
|
256 |
+
query embeddings and assist the generation of fine-grained anchors for the translation of HOI embeddings. At the back
|
257 |
+
end of the pipeline, HOI detector leverages the HOI embeddings and initial anchor to predict all elements of the HOI
|
258 |
+
instances.
|
259 |
+
to predict action classes. The other part of the two-stage
|
260 |
+
approach [7], [10], [14], [20], [22], [23], [24], [25] leverages
|
261 |
+
multi-stream networks to extract diverse information from
|
262 |
+
cropped regions, such as human features, object features,
|
263 |
+
spatial information and human pose information. Then,
|
264 |
+
the information is fused to predict the action in a post-
|
265 |
+
fusion strategy. Two-stage methods mainly concentrate on
|
266 |
+
predicting the action class in the second stage. Nevertheless,
|
267 |
+
the quality of cropped features from the first stage cannot
|
268 |
+
be guaranteed in most cases, so the method cannot achieve
|
269 |
+
an optimal solution. More importantly, integrating semantic
|
270 |
+
information of human-object pairs requires massive time
|
271 |
+
and computing resources.
|
272 |
+
One-stage HOI Detection Approaches: The traditional one-
|
273 |
+
stage approaches [9], [11], [15], [31] use interaction points
|
274 |
+
or union regions to detect human-object pairs and identify
|
275 |
+
interactive action classes in parallel. However, these meth-
|
276 |
+
ods which and are hampered by distant human-object pairs,
|
277 |
+
require a gathering and pairing process. With the creation of
|
278 |
+
DETR [32], one-stage approaches have become the current
|
279 |
+
mainstream. QPIC [19] converts the object detection head
|
280 |
+
of DETR into an interaction detection head to predict HOI
|
281 |
+
instance directly. HOITrans [17] combines transformer [41]
|
282 |
+
and CNN [42] to straightly predict HOI instances from the
|
283 |
+
query embeddings. AS-Net [6] and HOTR [9] each propose a
|
284 |
+
two-branch transformer method that consists of an instance
|
285 |
+
decoder and an interaction decoder to predict the boxes
|
286 |
+
and action classes in parallel. CDN [16] proposes a cascade
|
287 |
+
disentangling decoder to decode action classes. QAHOI [33]
|
288 |
+
directly combines Swin Transformer [43] and deformable
|
289 |
+
DETR [34] to predict HOI instances.
|
290 |
+
Anchor-Based Object Detection Transformer: Deformable
|
291 |
+
DETR [34] first introduces the reference point concept,
|
292 |
+
where the sampling offset is predicted by each reference
|
293 |
+
point to perform deformable cross-attention. To facilitate
|
294 |
+
extreme region discrimination, Conditional DETR [44] re-
|
295 |
+
formulates the attention operation and rebuilt positional
|
296 |
+
queries based on reference points. Anchor DETR [45] pro-
|
297 |
+
poses to explicitly capitalize on the spatial prior during
|
298 |
+
cross-attention and box regression by utilizing a predefined
|
299 |
+
2D anchor point [𝑐𝑥, 𝑐𝑦]. DAB-DETR [46] extends such a
|
300 |
+
2D concept to a 4D anchor box [𝑐𝑥, 𝑐𝑦, 𝑤, ℎ] and proposed
|
301 |
+
to refine it layer-by-layer. SAM-DETR [47] proposes directly
|
302 |
+
updating content embeddings by extracting salient points
|
303 |
+
from image features. In this paper, we propose a novel
|
304 |
+
decoding process for HOI detection. The alignment and fine-
|
305 |
+
grained anchor generation is proposed to align the multi-
|
306 |
+
scale features with HOI query embeddings and generate
|
307 |
+
fine-grained anchors for the diverse HOI instances with
|
308 |
+
variable spatial distribution, scales and tasks. Then, the fine-
|
309 |
+
grained anchors guide the deformable attention process in
|
310 |
+
aiding key information to query embeddings from noisy
|
311 |
+
backgrounds.
|
312 |
+
3
|
313 |
+
PROPOSED METHOD
|
314 |
+
In Sec.3.1, we show the overall architecture of FGAHOI.
|
315 |
+
Then, we describe the multi-scale feature extractor in Sec.3.2.
|
316 |
+
We introduce the multi-scale sampling strategy in Sec.3.3.1.
|
317 |
+
The hierarchical spatial-aware, task-aware merging mech-
|
318 |
+
anism and the decoding process is proposed in Sec.3.3.2,
|
319 |
+
Sec.3.3.3 and Sec.3.3.4, respectively. In Sec.3.4, we present
|
320 |
+
the architecture of the HOI detection head. In Sec.3.5, the
|
321 |
+
stage-wise training strategy, loss calculation and inference
|
322 |
+
process is illustrated.
|
323 |
+
3.1
|
324 |
+
Overall Architecture
|
325 |
+
The overall architecture of our proposed FGAHOI is illus-
|
326 |
+
trated in Fig 2. For a given image 𝑥 ∈ R𝐻×𝑊 ×3, FGAHOI
|
327 |
+
firstly uses a hierarchical backbone network to extract the
|
328 |
+
multi-scale features Z𝑖
|
329 |
+
∈ R
|
330 |
+
𝐻
|
331 |
+
4×2𝑖 × 𝑊
|
332 |
+
4×2𝑖 ×2𝑖𝐶𝑠, 𝑖
|
333 |
+
= 1, 2, 3. The
|
334 |
+
multi-scale features are then projected from dimension C𝑠
|
335 |
+
to dimension C𝑑 by using 1×1 convolution. After being
|
336 |
+
flattened out, the multi-scale features are concatenated to
|
337 |
+
N𝑠 vectors with C𝑑 dimensions. Afterwards, along with
|
338 |
+
|
339 |
+
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 10, JANUARY 2023
|
340 |
+
4
|
341 |
+
supplementary positional encoding 𝑝 ∈ R𝑁𝑠×𝐶𝑑, the multi-
|
342 |
+
scale features are sent into the deformable transformer en-
|
343 |
+
coder which consists of a set of stacked deformable encoder
|
344 |
+
layers to encode semantic features. The encoded semantic
|
345 |
+
features 𝑀 ∈ R𝑁𝑠×𝐶𝑑 are then acquired. In the decoding
|
346 |
+
process, the content 𝐶 and positional 𝑃 embeddings are both
|
347 |
+
a set of learnable vectors {𝑣𝑖 | 𝑣𝑖 ∈ R𝑐𝑑}𝑁𝑞
|
348 |
+
𝑖=1. The positional
|
349 |
+
embeddings 𝑃 first generate the initial anchor 𝐴 ∈ R𝑁𝑞×2
|
350 |
+
according to a linear layer. The positional 𝑃, content 𝐶
|
351 |
+
embeddings, inital anchor 𝐴 and encoded features 𝑀 are
|
352 |
+
simultaneously sent into the decoder 𝐹𝑑𝑒𝑐𝑜𝑑𝑒𝑟 (·, ·, ·, ·) which
|
353 |
+
is a set of stacked decoder layers. In every decoder layer,
|
354 |
+
the initial anchor first leverages the multi-scale sampling
|
355 |
+
strategy to sample the multi-scale features corresponding
|
356 |
+
to the content embeddings. The sampled features assist
|
357 |
+
the generation of fine-grained anchors and corresponding
|
358 |
+
attention weights through the hierarchical spatial-aware
|
359 |
+
and task-aware merging mechanism. The HOI embeddings
|
360 |
+
𝐻 = {ℎ𝑖 | ℎ𝑖 ∈ R𝑐𝑑}𝑁𝑞
|
361 |
+
𝑖=1 are translated from the query embed-
|
362 |
+
dings 𝑄 through the fine-grained anchors, attention weights
|
363 |
+
and the deformable attention. The HOI embeddings 𝐻 are
|
364 |
+
acquired as 𝐻 = 𝐹𝑑𝑒𝑐𝑜𝑑𝑒𝑟 (𝑀, 𝑃, 𝐶, 𝐴). Eventually, the HOI
|
365 |
+
detector leverages the HOI embeddings 𝐻 and initial anchor
|
366 |
+
to predict the HOI instances < 𝑏ℎ, 𝑏𝑜, 𝑐𝑜, 𝑐𝑣 >, where 𝑏ℎ, 𝑏𝑜,
|
367 |
+
𝑐𝑜 and 𝑐𝑣 stands for the human box coordinate (𝑥, 𝑦, 𝑤, ℎ),
|
368 |
+
object box coordinate, object class and verb class, respec-
|
369 |
+
tively.
|
370 |
+
3.2
|
371 |
+
Multi-Scale Features Extractor
|
372 |
+
High-quality visual features are a prerequisite for successful
|
373 |
+
HOI detection. For extracting the multi-scale features with
|
374 |
+
long-range semantic information, FGAHOI leverages the
|
375 |
+
multi-scale feature extractor which consists of a hierarchical
|
376 |
+
backbone network and a deformable transformer encoder to
|
377 |
+
extract features, the folumation is as Equation.1:
|
378 |
+
𝑀 = 𝐹𝑒𝑛𝑐𝑜𝑑𝑒𝑟 (𝐹𝑓 𝑙𝑎𝑡𝑡𝑒𝑛(𝜙(𝑥)), 𝑝, 𝑠, 𝑟, 𝑙)
|
379 |
+
∈ R𝑁𝑠×𝐶𝑑,
|
380 |
+
(1)
|
381 |
+
where 𝐹𝑒𝑛𝑐𝑜𝑑𝑒𝑟 (·), 𝐹𝑓 𝑙𝑎𝑡𝑡𝑒𝑛(·) and 𝜙(·) denotes the encoder,
|
382 |
+
flatten operation and backbone network, respectively. 𝑝 is
|
383 |
+
the position encoding, 𝑠 is the spatial shape of the multi-
|
384 |
+
scale features, 𝑟 stands for the valid ratios and 𝑙 represents
|
385 |
+
the level index corresponding the multi-scale features. The
|
386 |
+
hierarchical backbone network is flexible and can be com-
|
387 |
+
posed of any convolutional neural network [42], [48], [49],
|
388 |
+
[50] and transformer backbone network [43], [51], [52], [53],
|
389 |
+
[54], [55], [56], [57]. However, CNN is poor at capturing
|
390 |
+
non-local semantic features like the relationships between
|
391 |
+
humans and objects. In this paper, we mainly use Swin
|
392 |
+
Transformer tiny and large version [43] to enhance the
|
393 |
+
ability of feature extractor for extracting long-range features.
|
394 |
+
3.3
|
395 |
+
Why FGAHOI Decodes Better?
|
396 |
+
During the decoding process, the fine-grained anchors can
|
397 |
+
be regarded as a positional prior to let decoder focus on
|
398 |
+
the region of interest, directly guiding the decoder to aid
|
399 |
+
semantic information to the content embeddings which are
|
400 |
+
used to predict all elements of the HOI instances. Therefore,
|
401 |
+
fine-grained anchors play the following two crucial roles in
|
402 |
+
HOI detection. 𝑖) Fine-grained anchors directly determine
|
403 |
+
whether the information gained from input features to
|
404 |
+
content embeddings is instance-critical or noisy background
|
405 |
+
information. 𝑖𝑖) Fine-grained anchors determine the quality
|
406 |
+
of alignment between the query embeddings and multi-
|
407 |
+
scale features of input scenarios. Both are crucial factors for
|
408 |
+
the quality of decoding results. The existing methods [33],
|
409 |
+
[34] directly utilize the query embedding to generate fine-
|
410 |
+
grained anchors based on the initial anchor, without consid-
|
411 |
+
ering the multi-scale features of the input scenarios and the
|
412 |
+
semantic alignment between the query embedding and the
|
413 |
+
input features at all. Our FGAHOI proposes a novel fine-
|
414 |
+
grained anchors generator which consists of multi-scale
|
415 |
+
sampling, hierarchical spatial-aware merging and task-
|
416 |
+
aware merging mechanism (as shown in Fig.3). The gen-
|
417 |
+
erator adequately leverages the initial anchor, multi-scale
|
418 |
+
features and query embeddings for generating suitable fine-
|
419 |
+
grained anchors for diverse input scenarios and aligning
|
420 |
+
semantic information between different input scenarios and
|
421 |
+
query embeddings. The formulation of FGAHOI decoding
|
422 |
+
process is as follows:
|
423 |
+
𝐻 = Defattn(Task(Hier Spatial({𝑥𝑖
|
424 |
+
𝑠}, 𝐶𝑢), 𝐶𝑢), 𝑀, 𝐶𝑢),
|
425 |
+
(2)
|
426 |
+
where 𝐶𝑢 is the content embeddings updated by the po-
|
427 |
+
sitional embeddings, Defattn represents the deformable at-
|
428 |
+
tention, 𝑥𝑖
|
429 |
+
𝑠 represents the sampled features of the 𝑖-th level
|
430 |
+
features. 𝑀 is the encoded input features.
|
431 |
+
3.3.1
|
432 |
+
Multi-Scale Sampling Mechanism
|
433 |
+
The HOI instances contained in the input scenarios usually
|
434 |
+
vary in size, where some instances taking up most of the
|
435 |
+
area in the input scenarios and others occupying perhaps
|
436 |
+
only a few pixels. Our FGAHOI aims at detecting all in-
|
437 |
+
stances in the scene, regardless of the size. Therefore, when
|
438 |
+
using the initial anchor to sample the multi-scale features,
|
439 |
+
for shallow features mainly used to detect instances of small
|
440 |
+
size, the sampling strategy only samples a small range of
|
441 |
+
features around the initial anchor. In contrast, for deep
|
442 |
+
features mainly used to detect instances of large size, the
|
443 |
+
sampling strategy samples a large range of features around
|
444 |
+
the initial anchor. As shown in Fig.3 (b), in the generator, the
|
445 |
+
encoded features are first reshaped to the original shape.
|
446 |
+
Based on the initial anchor, generator leverages the sam-
|
447 |
+
pling strategy to sample multi-scale features as follows:
|
448 |
+
𝑥𝑖
|
449 |
+
𝑠 =𝐹𝑠𝑎𝑚𝑝𝑙𝑒( 𝑟𝑒𝑠ℎ𝑎𝑝𝑒(𝑀)𝑖, 𝐴, 𝑠𝑖𝑧𝑒𝑖, 𝑏𝑖𝑙𝑖𝑛𝑒𝑎𝑟 ),
|
450 |
+
(3)
|
451 |
+
where 𝑠𝑖𝑧𝑒𝑖 (𝑖 = 0, 1, 2) denotes the sampling size of the 𝑖-th
|
452 |
+
level features. 𝑀 is the encoded input features. 𝐴 is the ini-
|
453 |
+
tial anchor. Inspired by [58], we utilize bilinear interpolation
|
454 |
+
in the sampling strategy.
|
455 |
+
3.3.2
|
456 |
+
Hierarchical Spatial-Aware Merging Mechanism
|
457 |
+
In order to better utilize the hierarchical spatial informa-
|
458 |
+
tion of sampled features for aligning content embeddings
|
459 |
+
with the sampled features, we propose a novel hierarchical
|
460 |
+
spatial-aware merging mechanism (HSAM) which utilizes
|
461 |
+
the content embeddings to extract hierarchical spatial in-
|
462 |
+
formation and merge the sampled features, as shown in
|
463 |
+
Fig.3 (c). The content embeddings are first updated by the
|
464 |
+
positional embeddings and multi-head self-attention mech-
|
465 |
+
anism as follows:
|
466 |
+
𝐶𝑢 = 𝐶 + 𝐹MHA
|
467 |
+
�
|
468 |
+
(𝐶 + 𝑃)𝑊𝑞, (𝐶 + 𝑃)𝑊 𝑘, 𝐶𝑊 𝑣�
|
469 |
+
,
|
470 |
+
(4)
|
471 |
+
|
472 |
+
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 10, JANUARY 2023
|
473 |
+
5
|
474 |
+
Multi-Scale Sampling Strategy
|
475 |
+
Src Shape
|
476 |
+
Anchor
|
477 |
+
Sampling
|
478 |
+
Low
|
479 |
+
High
|
480 |
+
Middle
|
481 |
+
Positional
|
482 |
+
Embeddings
|
483 |
+
Multi-Head
|
484 |
+
Self-Attention
|
485 |
+
Add & Norm
|
486 |
+
Deformable
|
487 |
+
Multi-Head
|
488 |
+
Cross-Attention
|
489 |
+
FFN
|
490 |
+
Add & Norm
|
491 |
+
Add & Norm
|
492 |
+
Encoded Multi-Scale Features
|
493 |
+
Alignment &
|
494 |
+
Fine-Grained
|
495 |
+
Anchor Generation
|
496 |
+
Query
|
497 |
+
Embeddings
|
498 |
+
(������������ , ������������ )
|
499 |
+
V
|
500 |
+
K
|
501 |
+
Q
|
502 |
+
V
|
503 |
+
Fined-grained
|
504 |
+
Anchors
|
505 |
+
Initial Anchor
|
506 |
+
Attention
|
507 |
+
Weights
|
508 |
+
0
|
509 |
+
Updated
|
510 |
+
Content
|
511 |
+
Embeddings
|
512 |
+
Fine-grained
|
513 |
+
Anchors
|
514 |
+
Corresponding
|
515 |
+
Attention Weights
|
516 |
+
Linear
|
517 |
+
Linear
|
518 |
+
SoftMax
|
519 |
+
Generation of Fine-Grained Anchors
|
520 |
+
Reshape
|
521 |
+
Reshape
|
522 |
+
(b)
|
523 |
+
(a)
|
524 |
+
(d)
|
525 |
+
(e)
|
526 |
+
Hierarchical Spatial-Aware
|
527 |
+
Merging Mechanism
|
528 |
+
Middle
|
529 |
+
Multi-Head
|
530 |
+
Attention
|
531 |
+
Flatten
|
532 |
+
Low
|
533 |
+
High
|
534 |
+
Multi-Head Attention
|
535 |
+
CAT
|
536 |
+
Positional
|
537 |
+
Embeddings
|
538 |
+
Content
|
539 |
+
Embeddings
|
540 |
+
…
|
541 |
+
Task-Aware Merging Mechanism
|
542 |
+
Dynamic
|
543 |
+
Switch On/Off
|
544 |
+
Cross-Attn[(
|
545 |
+
,
|
546 |
+
]
|
547 |
+
Linear
|
548 |
+
Linear
|
549 |
+
RELU
|
550 |
+
Normalize
|
551 |
+
Updated
|
552 |
+
Content
|
553 |
+
Embeddings
|
554 |
+
,
|
555 |
+
)
|
556 |
+
(c)
|
557 |
+
Middle
|
558 |
+
Low
|
559 |
+
High
|
560 |
+
Merge
|
561 |
+
Features
|
562 |
+
Fig. 3: The architecture of FGAHOI’s decoder. (a) Illustration of FGAHOI’s decoding process. (b) Illustration of Multi-
|
563 |
+
scale sampling mechanism. (c) Illustration of Hierarchical spatial-aware merging mechanism. (d) Illustration of Task-aware
|
564 |
+
merging mechanism. (e) Generation process of fine-grained anchors and the corresponding attention weights.
|
565 |
+
where 𝑊𝑞, 𝑊 𝑘 and 𝑊 𝑣 denotes the parameter matrices
|
566 |
+
for query, key and value in the self-attention mechanism,
|
567 |
+
respectively. 𝐹MHA(·) is the multi-head attention mechanism.
|
568 |
+
𝐶 and 𝑃 represents the content and position embeddings,
|
569 |
+
respectively. Then, the updated content embeddings are
|
570 |
+
leveraged to merge the sampled features, the formulation
|
571 |
+
is as follows:
|
572 |
+
𝑥𝑖
|
573 |
+
𝑚 = 𝐹concat
|
574 |
+
�head1, . . . , headNH
|
575 |
+
� 𝑊𝑂,
|
576 |
+
where headn = Softmax
|
577 |
+
�
|
578 |
+
(𝐶𝑢𝑊𝑞
|
579 |
+
n ) · (𝑥𝑖
|
580 |
+
𝑠𝑊 𝑘
|
581 |
+
n )𝑇
|
582 |
+
√𝑑𝑘
|
583 |
+
�
|
584 |
+
(𝑥𝑖
|
585 |
+
𝑠𝑊 𝑣
|
586 |
+
n ).
|
587 |
+
(5)
|
588 |
+
Where 𝑥𝑖
|
589 |
+
𝑚 represents the merged features of the 𝑖-th level
|
590 |
+
sampled features. 𝐶𝑢 is the content embeddings updated
|
591 |
+
by the positional embeddings. 𝑊𝑂 denotes the parameter
|
592 |
+
matrices for multi-head concatenation. 𝑊𝑞
|
593 |
+
𝑛 , 𝑊 𝑘
|
594 |
+
𝑛 and 𝑊 𝑣
|
595 |
+
𝑛
|
596 |
+
denote the parameter matrices for query, key and value of
|
597 |
+
n-th attention head. 𝐹concat is the concatenating operation.
|
598 |
+
𝑑𝑘 =
|
599 |
+
𝑁ℎ𝑑
|
600 |
+
𝑁𝐻 , 𝑁ℎ𝑑 is the hidden dimensions, and 𝑁𝐻 is the
|
601 |
+
number of attention head.
|
602 |
+
Following the merging of the sampled features at each
|
603 |
+
scale based on spatial information, the merged features at
|
604 |
+
each scale are first concatenated together as follows:
|
605 |
+
𝑋𝑚 = 𝐹concat({𝑥𝑖
|
606 |
+
𝑚}𝑖=0,1,2) ∈ R𝐵×𝑁𝑞×𝑁𝐿×𝑁ℎ𝑑,
|
607 |
+
(6)
|
608 |
+
where 𝑁𝐿 is the number of multi-scale, 𝑥𝑖
|
609 |
+
𝑚 represents the
|
610 |
+
merged features of the 𝑖-th level sampled features, 𝑋𝑚 is the
|
611 |
+
concatenated multi-scale features and merged by the scale-
|
612 |
+
aware merging mechanism as follows:
|
613 |
+
𝑋𝑢 = 𝐹concat (head1, . . . , headh) 𝑊𝑂,
|
614 |
+
where headn = Softmax
|
615 |
+
�
|
616 |
+
(𝐶𝑢𝑊𝑞
|
617 |
+
n ) · (𝑋𝑚𝑊 𝑘
|
618 |
+
n )𝑇
|
619 |
+
√𝑑𝑘
|
620 |
+
�
|
621 |
+
(𝑋𝑚𝑊 𝑣
|
622 |
+
n ).
|
623 |
+
(7)
|
624 |
+
Where 𝑋𝑢 is the merged multi-scale features for updating
|
625 |
+
the content embeddings.
|
626 |
+
3.3.3
|
627 |
+
Task-Aware Merging Mechanism
|
628 |
+
Considering diverse HOI instances, the task-aware merging
|
629 |
+
mechanism is proposed to fuse the merged multi-scale
|
630 |
+
features and content embeddings and align the content
|
631 |
+
embeddings with the merged feature in the task-aware
|
632 |
+
perspective, as shown in Fig.3 (e). It leverages the merged
|
633 |
+
multi-scale features and content embeddings to generate
|
634 |
+
dynamic switch for selecting suitable channel in the merging
|
635 |
+
process. Content embedding and multi-scale information
|
636 |
+
after fusion are first stitched together, the formulation is as
|
637 |
+
follows:
|
638 |
+
𝑋 = 𝐹𝑠𝑡𝑎𝑐𝑘 (𝐶𝑢, 𝑋𝑢) ∈ R𝐵×𝑁𝑞×(2×𝑁ℎ𝑑).
|
639 |
+
(8)
|
640 |
+
Where 𝐶𝑢 is the content embeddings updated by the posi-
|
641 |
+
tional embeddings, 𝑋𝑢 is the merged multi-scale features.
|
642 |
+
Thereafter, we use cross-attention mechanism to update
|
643 |
+
these as follows:
|
644 |
+
𝑋𝑠𝑤𝑖𝑡𝑐ℎ = 𝐹concat (head1, . . . , headh) 𝑊𝑂,
|
645 |
+
where headn = Softmax
|
646 |
+
�
|
647 |
+
(𝐶𝑢𝑊𝑞
|
648 |
+
n ) · (𝑋𝑊 𝑘
|
649 |
+
n )𝑇
|
650 |
+
√𝑑𝑘
|
651 |
+
�
|
652 |
+
(𝑋𝑊 𝑣
|
653 |
+
n ).
|
654 |
+
(9)
|
655 |
+
|
656 |
+
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 10, JANUARY 2023
|
657 |
+
6
|
658 |
+
TABLE 1: Instance statistics of two difficulties. We quantify all the instances in the HAKE-HOI [20] dataset according to
|
659 |
+
two newly proposed metrics and divide them into ten intervals.
|
660 |
+
Dataset
|
661 |
+
IMI
|
662 |
+
IMI0
|
663 |
+
IMI1
|
664 |
+
IMI2
|
665 |
+
IMI3
|
666 |
+
IMI4
|
667 |
+
IMI5
|
668 |
+
IMI6
|
669 |
+
IMI7
|
670 |
+
IMI8
|
671 |
+
IMI9
|
672 |
+
HAKE-HOI
|
673 |
+
num𝐴𝑅
|
674 |
+
104243
|
675 |
+
65499
|
676 |
+
44303
|
677 |
+
31241
|
678 |
+
21982
|
679 |
+
11888
|
680 |
+
4670
|
681 |
+
1818
|
682 |
+
598
|
683 |
+
168
|
684 |
+
num𝐿𝑅
|
685 |
+
424
|
686 |
+
1243
|
687 |
+
1784
|
688 |
+
3043
|
689 |
+
8668
|
690 |
+
70191
|
691 |
+
83314
|
692 |
+
79427
|
693 |
+
34017
|
694 |
+
4299
|
695 |
+
SDC Train
|
696 |
+
num𝐴𝑅
|
697 |
+
62526
|
698 |
+
30235
|
699 |
+
16346
|
700 |
+
12013
|
701 |
+
10269
|
702 |
+
11189
|
703 |
+
4223
|
704 |
+
1540
|
705 |
+
423
|
706 |
+
139
|
707 |
+
num𝐿𝑅
|
708 |
+
177
|
709 |
+
515
|
710 |
+
874
|
711 |
+
1656
|
712 |
+
5208
|
713 |
+
48798
|
714 |
+
38517
|
715 |
+
29544
|
716 |
+
20265
|
717 |
+
3349
|
718 |
+
SDC Test
|
719 |
+
num𝐴𝑅
|
720 |
+
24737
|
721 |
+
0
|
722 |
+
0
|
723 |
+
0
|
724 |
+
0
|
725 |
+
0
|
726 |
+
0
|
727 |
+
0
|
728 |
+
0
|
729 |
+
0
|
730 |
+
num𝐿𝑅
|
731 |
+
153
|
732 |
+
415
|
733 |
+
464
|
734 |
+
834
|
735 |
+
2704
|
736 |
+
20167
|
737 |
+
0
|
738 |
+
0
|
739 |
+
0
|
740 |
+
0
|
741 |
+
Then, the generated information is utilized to gain the
|
742 |
+
dynamic switch for merging, the formulation is as follows:
|
743 |
+
𝑆𝑤𝑖𝑡𝑐ℎ𝛾 = 𝐹𝑛𝑜𝑟𝑚𝑎𝑙𝑖𝑧𝑒(𝐹𝑚𝑙𝑝(𝑋𝑠𝑤𝑖𝑡𝑐ℎ))𝛾 ∈ R𝐵×𝑁𝑞×2×2,
|
744 |
+
(10)
|
745 |
+
where 𝑆𝑤𝑖𝑡𝑐ℎ𝛾 is the dynamic switch for 𝛾-th dimension
|
746 |
+
of the merged features. 𝐹ℎ𝑠𝑖𝑔𝑚𝑜𝑖𝑑(·) and 𝐹𝑚𝑙𝑝(·) denote the
|
747 |
+
hard sigmoid and feed forward network which consists of
|
748 |
+
two linear layers and one Relu activation layer, respectively.
|
749 |
+
Inspired by [59], the merging mechanism is designed as
|
750 |
+
follows:
|
751 |
+
𝑈𝛾 = 𝐹𝑀 𝑎𝑥{𝑆𝑤𝑖𝑡𝑐ℎ𝛾
|
752 |
+
𝑖,0 ⊙ 𝑋𝛾
|
753 |
+
𝑢 + 𝑆𝑤𝑖𝑡𝑐ℎ𝛾
|
754 |
+
𝑖,1}𝑖=0,1 + 𝐶𝛾
|
755 |
+
𝑢 ,
|
756 |
+
(11)
|
757 |
+
where 𝑈𝛾 is 𝛾-th features of content embeddings updated by
|
758 |
+
the merged multi-scale features. 𝐹𝑀 𝑎𝑥 is the max operation.
|
759 |
+
…
|
760 |
+
Linear
|
761 |
+
Linear
|
762 |
+
MLP
|
763 |
+
MLP
|
764 |
+
Object Class
|
765 |
+
Action Class
|
766 |
+
Human Box
|
767 |
+
Object Box
|
768 |
+
HOI Instances
|
769 |
+
<Human/Object Boxes, Object
|
770 |
+
Class, Action Class>
|
771 |
+
Initial Anchor
|
772 |
+
HOI
|
773 |
+
Embeddings
|
774 |
+
Fig. 4: The prediction process of the HOI detection head. See
|
775 |
+
sec 3.4 for more details.
|
776 |
+
3.3.4
|
777 |
+
Decoding with Fine-Grained Anchor
|
778 |
+
As shown in Fig.3 (e), the updated content embeddings
|
779 |
+
are used to generate fine-grained anchors and attention
|
780 |
+
weights. According to the linear layer, reshape operation
|
781 |
+
and softmax function, the formulation is as follows:
|
782 |
+
A = 𝐹𝑙𝑖𝑛&𝑟𝑒𝑠(𝑈) ∈ R𝐵×𝑁𝑞×𝑁𝐻 ×𝑁𝐿×𝑁A×2,
|
783 |
+
(12)
|
784 |
+
W = 𝐹𝑙𝑖𝑛&𝑟𝑒𝑠&𝑠𝑜 𝑓 𝑡 (𝑈) ∈ R𝐵×𝑁𝑞×𝑁𝐻 ×𝑁𝐿×𝑁A,
|
785 |
+
(13)
|
786 |
+
As shown in Fig.3 (a), the fine-grained anchors and at-
|
787 |
+
tention weights are utilized to aid semantic features from
|
788 |
+
the encoded features of the input scenarios to the content
|
789 |
+
embeddings, the formulation is as follows:
|
790 |
+
P𝑞 =
|
791 |
+
𝑁𝐻
|
792 |
+
∑︁
|
793 |
+
𝑛=1
|
794 |
+
𝑾𝑛
|
795 |
+
� 𝑁𝐿
|
796 |
+
∑︁
|
797 |
+
𝑙=1
|
798 |
+
𝑁A
|
799 |
+
∑︁
|
800 |
+
𝑘=1
|
801 |
+
W𝑙
|
802 |
+
𝑛𝑞𝑘 · 𝑾′
|
803 |
+
𝑛𝒙𝒍 �
|
804 |
+
A𝑙
|
805 |
+
𝑛𝑞𝑘
|
806 |
+
��
|
807 |
+
,
|
808 |
+
(14)
|
809 |
+
where P𝑞 is the extracted semantic information used for
|
810 |
+
translating 𝑞-th content to HOI embeddings. A𝑙
|
811 |
+
𝑛𝑞𝑘 and
|
812 |
+
W𝑙
|
813 |
+
𝑛𝑞𝑘 represent the 𝑘-th fine-grained anchors and corre-
|
814 |
+
sponding attention weights of the 𝑛-th attention head for
|
815 |
+
the 𝑞-th query embedding. Both 𝑊𝑛 and 𝑊 ′
|
816 |
+
𝑛 are parameter
|
817 |
+
matrices of the 𝑛-th attention head. 𝑁A is the number of
|
818 |
+
fine-grained anchors of each scale in one attention head.
|
819 |
+
3.4
|
820 |
+
HOI Detection Head
|
821 |
+
FGAHOI leverages a simple HOI detection head to predict
|
822 |
+
all elements of HOI instances. As shown in Fig.4, the detec-
|
823 |
+
tion head utilizes the HOI embeddings and the initial anchor
|
824 |
+
to localize the human and object boxes. In this process, each
|
825 |
+
initial anchor acts as the base point for the bounding boxes
|
826 |
+
of the corresponding pair of a human and an object, the
|
827 |
+
formulation is as follows:
|
828 |
+
𝑏ℎ = 𝐹𝑚𝑙𝑝(𝐻)[· · · , : 2] + 𝑖𝑛𝑖𝑡𝑖𝑎𝑙 𝑎𝑛𝑐ℎ𝑜𝑟
|
829 |
+
∈ R𝑁𝑞×4,
|
830 |
+
(15)
|
831 |
+
𝑏𝑜 = 𝐹𝑚𝑙𝑝(𝐻)[· · · , : 2] + 𝑖𝑛𝑖𝑡𝑖𝑎𝑙 𝑎𝑛𝑐ℎ𝑜𝑟
|
832 |
+
∈ R𝑁𝑞×4,
|
833 |
+
(16)
|
834 |
+
𝑐𝑜 = 𝐹𝑙𝑖𝑛𝑒𝑎𝑟 (𝐻)
|
835 |
+
∈ R𝑁𝑞×𝑛𝑢𝑚𝑜,
|
836 |
+
(17)
|
837 |
+
𝑐𝑣 = 𝐹𝑙𝑖𝑛𝑒𝑎𝑟 (𝐻)
|
838 |
+
∈ R𝑁𝑞×𝑛𝑢𝑚𝑣,
|
839 |
+
(18)
|
840 |
+
where 𝐹𝑚𝑙𝑝 denotes the feed forward network consists of
|
841 |
+
three linear layers and three relu activation layers. 𝐹𝑙𝑖𝑛𝑒𝑎𝑟
|
842 |
+
stands for the linear layer. 𝑛𝑢𝑚𝑜 and 𝑛𝑢𝑚𝑣 are the number
|
843 |
+
of object and action classes, respectively. 𝐻 denotes the HOI
|
844 |
+
embeddings.
|
845 |
+
3.5
|
846 |
+
Training and Inference
|
847 |
+
3.5.1
|
848 |
+
Stage-wise Training
|
849 |
+
Inspired by the stage-wise training approach [35], [36] which
|
850 |
+
decouples feature learning and classifier learning into two
|
851 |
+
independent stages for LTR [37], we propose a novel stage-
|
852 |
+
wise training strategy for FGAHOI. We start by training
|
853 |
+
the base network (FGAHOI without any merging mecha-
|
854 |
+
nism) in an end-to-end manner. We then add the merging
|
855 |
+
mechanism in turn to the trained base network for another
|
856 |
+
short period of training. In this phrase, the parameters
|
857 |
+
of the trained base network are leveraged as pretrained
|
858 |
+
parameters and no parameters are fixed during the training
|
859 |
+
process.
|
860 |
+
|
861 |
+
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 10, JANUARY 2023
|
862 |
+
7
|
863 |
+
ride, fly, sit_on, exit,
|
864 |
+
direct airplane
|
865 |
+
ride, straddle, run,
|
866 |
+
hold, race horse
|
867 |
+
lasso cow
|
868 |
+
carry handbag
|
869 |
+
wear backpack
|
870 |
+
hold, stand_under umbrella
|
871 |
+
ride, race, run
|
872 |
+
straddle, hold horse
|
873 |
+
fly, pull
|
874 |
+
kite
|
875 |
+
sail, ride, sit_on,
|
876 |
+
stand_on, drive boat
|
877 |
+
race, turn, ride, sit on,
|
878 |
+
straddle, hold motorcycle
|
879 |
+
wear tie
|
880 |
+
scratch, walk,
|
881 |
+
pet, train dog
|
882 |
+
ride, sit on,
|
883 |
+
drive, board bus
|
884 |
+
carry, wear, hold
|
885 |
+
backpack
|
886 |
+
serve, hit sports_ball
|
887 |
+
swing tennis_racket
|
888 |
+
direct, inspect, ride,
|
889 |
+
sit on, fly airplane
|
890 |
+
type on, read,
|
891 |
+
hold laptop
|
892 |
+
sit on couch
|
893 |
+
brush_with, hold
|
894 |
+
toothbrush
|
895 |
+
kick, block, hit,
|
896 |
+
inspect, dribble
|
897 |
+
sports_ball
|
898 |
+
stand_on, ride, jump,
|
899 |
+
hold skateboard
|
900 |
+
ride, fly, sit_on, exit,
|
901 |
+
direct airplane
|
902 |
+
ride, straddle, run,
|
903 |
+
hold, race horse
|
904 |
+
lasso cow
|
905 |
+
carry handbag
|
906 |
+
wear backpack
|
907 |
+
hold, stand_under umbrella
|
908 |
+
ride, race, run
|
909 |
+
straddle, hold horse
|
910 |
+
fly, pull
|
911 |
+
kite
|
912 |
+
sail, ride, sit_on,
|
913 |
+
stand_on, drive boat
|
914 |
+
race, turn, ride, sit on,
|
915 |
+
straddle, hold motorcycle
|
916 |
+
wear tie
|
917 |
+
scratch, walk,
|
918 |
+
pet, train dog
|
919 |
+
ride, sit on,
|
920 |
+
drive, board bus
|
921 |
+
carry, wear, hold
|
922 |
+
backpack
|
923 |
+
serve, hit sports_ball
|
924 |
+
swing tennis_racket
|
925 |
+
direct, inspect, ride,
|
926 |
+
sit on, fly airplane
|
927 |
+
type on, read,
|
928 |
+
hold laptop
|
929 |
+
sit on couch
|
930 |
+
brush_with, hold
|
931 |
+
toothbrush
|
932 |
+
kick, block, hit,
|
933 |
+
inspect, dribble
|
934 |
+
sports_ball
|
935 |
+
stand_on, ride, jump,
|
936 |
+
hold skateboard
|
937 |
+
Fig. 5: Visualization of HOI detection. Humans and objects are represented by pink and blue bounding boxes respectively,
|
938 |
+
and interactions are marked by grey lines linking the box centers. Kindly refer to Sec. 5.6.1 for more details.
|
939 |
+
(a)
|
940 |
+
(b)
|
941 |
+
(c)
|
942 |
+
catch sport ball
|
943 |
+
watch
|
944 |
+
bird
|
945 |
+
kick
|
946 |
+
sports ball
|
947 |
+
hit sport
|
948 |
+
ball
|
949 |
+
fly kite
|
950 |
+
hit sport
|
951 |
+
ball
|
952 |
+
wear tie
|
953 |
+
swing
|
954 |
+
tennis_racket
|
955 |
+
sit_on
|
956 |
+
toilet
|
957 |
+
hold
|
958 |
+
surfboard
|
959 |
+
ride skateboard
|
960 |
+
ride skateboard
|
961 |
+
carry surfboard
|
962 |
+
ride surfboard
|
963 |
+
ride surfboard
|
964 |
+
ride surfboard
|
965 |
+
ride surfboard
|
966 |
+
ride surfboard
|
967 |
+
flip
|
968 |
+
skateboard
|
969 |
+
catch sport ball
|
970 |
+
watch
|
971 |
+
bird
|
972 |
+
kick
|
973 |
+
sports ball
|
974 |
+
hit sport
|
975 |
+
ball
|
976 |
+
fly kite
|
977 |
+
hit sport
|
978 |
+
ball
|
979 |
+
wear tie
|
980 |
+
swing
|
981 |
+
tennis_racket
|
982 |
+
sit_on
|
983 |
+
toilet
|
984 |
+
hold
|
985 |
+
surfboard
|
986 |
+
ride skateboard
|
987 |
+
carry surfboard
|
988 |
+
ride surfboard
|
989 |
+
ride surfboard
|
990 |
+
flip
|
991 |
+
skateboard
|
992 |
+
(a)
|
993 |
+
(b)
|
994 |
+
(c)
|
995 |
+
catch sport ball
|
996 |
+
watch
|
997 |
+
bird
|
998 |
+
kick
|
999 |
+
sports ball
|
1000 |
+
hit sport
|
1001 |
+
ball
|
1002 |
+
fly kite
|
1003 |
+
hit sport
|
1004 |
+
ball
|
1005 |
+
wear tie
|
1006 |
+
swing
|
1007 |
+
tennis_racket
|
1008 |
+
sit_on
|
1009 |
+
toilet
|
1010 |
+
hold
|
1011 |
+
surfboard
|
1012 |
+
ride skateboard
|
1013 |
+
carry surfboard
|
1014 |
+
ride surfboard
|
1015 |
+
ride surfboard
|
1016 |
+
flip
|
1017 |
+
skateboard
|
1018 |
+
Fig. 6: (a) illustrates the excellent long-range visual mod-
|
1019 |
+
elling capabilities. (b) demonstrates remarkable robustness.
|
1020 |
+
(c) shows the superior capabilities for identifying small HOI
|
1021 |
+
instances. Kindly refer to Sec. 5.6.1 for more details.
|
1022 |
+
3.5.2
|
1023 |
+
Loss Calculation
|
1024 |
+
Inspired by the set-based training process of HOI-Trans
|
1025 |
+
[17], QPIC [19], CDN [16] and QAHOI [33], we first use
|
1026 |
+
the bipartite matching with the Hungarian algorithm to
|
1027 |
+
match each ground truth with its best-matching prediction.
|
1028 |
+
For subsequent back-propagation, a loss is then established
|
1029 |
+
between the matched predictions and the matching ground
|
1030 |
+
truths. The folumation is as follows:
|
1031 |
+
𝐿 = 𝜆𝑜𝐿𝑜
|
1032 |
+
𝑐 + 𝜆𝑣 𝐿𝑣
|
1033 |
+
𝑐 +
|
1034 |
+
∑︁
|
1035 |
+
𝑘 ∈(ℎ,𝑜)
|
1036 |
+
�
|
1037 |
+
𝜆𝑏𝐿𝑘
|
1038 |
+
𝑏 + 𝜆𝐺𝐼𝑜𝑈 𝐿𝑘
|
1039 |
+
𝐺𝐼𝑜𝑈
|
1040 |
+
�
|
1041 |
+
,
|
1042 |
+
(19)
|
1043 |
+
where 𝐿𝑜
|
1044 |
+
𝑐 and 𝐿𝑣
|
1045 |
+
𝑐 represent the object class and action class
|
1046 |
+
loss, respectively. We utilize the modified focal loss function
|
1047 |
+
[60] and sigmoid focal loss function [61] for 𝐿𝑣
|
1048 |
+
𝑐 and 𝐿𝑜
|
1049 |
+
𝑐,
|
1050 |
+
respectively. 𝐿𝑏 is the box regression loss and consists of the
|
1051 |
+
𝐿1 Loss. 𝐿𝐺𝐼𝑂𝑈 denotes the intersection-over-union loss, the
|
1052 |
+
same as the function in QPIC [19]. 𝜆𝑜, 𝜆𝑣, 𝜆𝑏 and 𝜆𝐺𝐼𝑜𝑈 are
|
1053 |
+
the hyper parameters for adjusting the weights of each loss.
|
1054 |
+
3.5.3
|
1055 |
+
Inference
|
1056 |
+
The inference process is to composite the output of the HOI
|
1057 |
+
detection head to form HOI triplets. Formally, the 𝑖-th out-
|
1058 |
+
put prediction is generated as < 𝑏ℎ
|
1059 |
+
𝑖 , 𝑏𝑜
|
1060 |
+
𝑖 , 𝑎𝑟𝑔𝑚𝑎𝑥𝑘𝑐ℎ𝑜𝑖
|
1061 |
+
𝑖
|
1062 |
+
(𝑘) >.
|
1063 |
+
The HOI triplet score 𝑐ℎ𝑜𝑖
|
1064 |
+
𝑖
|
1065 |
+
combined by the scores of action
|
1066 |
+
𝑐𝑣
|
1067 |
+
𝑖 and object 𝑐𝑜
|
1068 |
+
𝑖 classification, formularized as 𝑐ℎ𝑜𝑖
|
1069 |
+
𝑖
|
1070 |
+
= 𝑐𝑣
|
1071 |
+
𝑖 · 𝑐𝑜
|
1072 |
+
𝑖 .
|
1073 |
+
4
|
1074 |
+
PROPOSED DATASET
|
1075 |
+
There are two main difficulties existing with human-object
|
1076 |
+
pairs. 𝑖) Uneven size distribution of human and objects in
|
1077 |
+
human-object pairs. 𝑖𝑖) Excessive distance between person
|
1078 |
+
and object in human-object pairs. To the best of our knowl-
|
1079 |
+
edge, there are no relevant metrics to measure these two
|
1080 |
+
difficulties. In this paper, we propose two metrics 𝐴𝑅 and
|
1081 |
+
𝐿𝑅 for measuring these two difficulties. Then two novel
|
1082 |
+
challenges corresponding to these two difficulties are pro-
|
1083 |
+
posed. In addition, we propose a novel Set for these Double
|
1084 |
+
Challenges (HOI-SDC). The data is selected from HAKE-
|
1085 |
+
HOI [20] which is re-split from HAKE [62] and provides
|
1086 |
+
110K+ images. HAKE-HOI has 117 action classes, 80 object
|
1087 |
+
classes and 520 HOI categories.
|
1088 |
+
|
1089 |
+
CB福CREERSBK2
|
1090 |
+
M
|
1091 |
+
WITDBWEJOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 10, JANUARY 2023
|
1092 |
+
8
|
1093 |
+
FGAHOI
|
1094 |
+
QAHOI
|
1095 |
+
FGAHOI
|
1096 |
+
QAHOI
|
1097 |
+
FGAHOI
|
1098 |
+
QAHOI
|
1099 |
+
Fine-Grained
|
1100 |
+
Anchors #1
|
1101 |
+
Fine-Grained
|
1102 |
+
Anchors #2
|
1103 |
+
Fine-Grained
|
1104 |
+
Anchors #3
|
1105 |
+
Fine-Grained
|
1106 |
+
Anchors #4
|
1107 |
+
Fine-Grained
|
1108 |
+
Anchors #5
|
1109 |
+
Fine-Grained
|
1110 |
+
Anchors #6
|
1111 |
+
Fine-Grained
|
1112 |
+
Anchors #7
|
1113 |
+
Fine-Grained
|
1114 |
+
Anchors #8
|
1115 |
+
HOI
|
1116 |
+
Instance
|
1117 |
+
Hold
|
1118 |
+
Sport Ball
|
1119 |
+
Ride
|
1120 |
+
Motorcycle
|
1121 |
+
Fly Kite
|
1122 |
+
Fig. 7: Comparison of fine-grained anchors between FGAHOI and QAHOI. We visualize the fine-grained anchors
|
1123 |
+
corresponding to all attention heads and the corresponding attention weights, where the shades of colors correspond
|
1124 |
+
to the magnitude of the weights. Obviously, FGAHOI is more accurate in focusing on humans, objects and interaction
|
1125 |
+
areas. Kindly refer to Sec. 5.6.2 for more details.
|
1126 |
+
4.1
|
1127 |
+
HOI-UDA
|
1128 |
+
We propose a novel measurement for the challenge of
|
1129 |
+
Uneven Distributed Area in Human-Object Pairs, the
|
1130 |
+
formulation is as follow:
|
1131 |
+
𝐴𝑅 = 𝐴𝑟𝑒𝑎ℎ · 𝐴𝑟𝑒𝑎𝑜
|
1132 |
+
𝐴𝑟𝑒𝑎2
|
1133 |
+
ℎ𝑜𝑖
|
1134 |
+
,
|
1135 |
+
(20)
|
1136 |
+
where 𝐴𝑟𝑒𝑎ℎ, 𝐴𝑟𝑒𝑎𝑜 and 𝐴𝑟𝑒𝑎ℎ𝑜𝑖 denote the area of human,
|
1137 |
+
object and HOI instances, respectively (as shown in Fig.8
|
1138 |
+
(a)). We quantify all the instances in the HAKE-HOI into ten
|
1139 |
+
intervals and count the number of instances of each interval
|
1140 |
+
in the second and fifth row of Table.1. To better evaluate the
|
1141 |
+
ability of the model to detect HOI for human-object pairs
|
1142 |
+
with uneven distributed areas, we specially select 24737
|
1143 |
+
HOI instances of IMIUDA
|
1144 |
+
0
|
1145 |
+
in testing set.
|
1146 |
+
4.2
|
1147 |
+
HOI-LDVM
|
1148 |
+
A novel measurement for the challenge of Long Distance
|
1149 |
+
Visual Modeling of Human-Object Pairs is proposed in
|
1150 |
+
Eq.21.
|
1151 |
+
𝐿𝑅 = 𝐿ℎ + 𝐿𝑜
|
1152 |
+
𝐿ℎ𝑜𝑖
|
1153 |
+
,
|
1154 |
+
(21)
|
1155 |
+
where 𝐿ℎ, 𝐿𝑜 and 𝐿ℎ𝑜𝑖 denote the size we define of human,
|
1156 |
+
object and HOI instances, respectively (as shown in Fig.8
|
1157 |
+
(b)). The instances are quantified in the third and sixth row
|
1158 |
+
of Table.1. To better evaluate the ability of the model to de-
|
1159 |
+
tect HOI for human-object pairs with with long distance, we
|
1160 |
+
specially select 24737 HOI instances of IMILDVM
|
1161 |
+
0
|
1162 |
+
∼ IMILDVM
|
1163 |
+
6
|
1164 |
+
in testing set.
|
1165 |
+
4.3
|
1166 |
+
HOI-SDC
|
1167 |
+
In order to avoid the training process of the model being
|
1168 |
+
influenced by a portion of HOI classes with a very small
|
1169 |
+
number of instances, we remove some of the HOI classes
|
1170 |
+
containing a very small number of instances and HOI
|
1171 |
+
classes with no interaction from the training Set for the
|
1172 |
+
Double Challenge. Finally, there are total 321 HOI classes,
|
1173 |
+
|
1174 |
+
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 10, JANUARY 2023
|
1175 |
+
9
|
1176 |
+
TABLE 2: Performance comparison with the state-of-the-art methods on the HICO-DET dataset. ’V’, ’S’, ’P’ and ’L’ represent
|
1177 |
+
the visual feature, spatial feature, human pose feature and language feature respectively. Fine-tuned Detection means the
|
1178 |
+
parameter of the model is pre-trained on the MS-COCO dataset. Backbone with ’*’ and ’+’ means that they are pre-trained
|
1179 |
+
on ImageNet-22K with 384×384 input resolution. QAHOI(R) represents that the results are reproduced on the same machine
|
1180 |
+
with our model. Kindly refer to Sec. 5.4.1 for more details.
|
1181 |
+
Architecture
|
1182 |
+
Method
|
1183 |
+
Backbone
|
1184 |
+
Fine-tuned
|
1185 |
+
Feature
|
1186 |
+
Default (↑)
|
1187 |
+
Known Object (↑)
|
1188 |
+
Full
|
1189 |
+
Rare
|
1190 |
+
Non-Rare
|
1191 |
+
Full
|
1192 |
+
Rare
|
1193 |
+
Non-Rare
|
1194 |
+
Two-Stage Methods
|
1195 |
+
Multi-stream
|
1196 |
+
No-Frill [23]
|
1197 |
+
ResNet-152
|
1198 |
+
|
1199 |
+
A+S+P
|
1200 |
+
17.18
|
1201 |
+
12.17
|
1202 |
+
18.08
|
1203 |
+
-
|
1204 |
+
-
|
1205 |
+
-
|
1206 |
+
PMFNet [24]
|
1207 |
+
ResNet-50-FPN
|
1208 |
+
|
1209 |
+
A+S
|
1210 |
+
17.46
|
1211 |
+
15.65
|
1212 |
+
18.00
|
1213 |
+
20.34
|
1214 |
+
17.47
|
1215 |
+
21.20
|
1216 |
+
ACP [25]
|
1217 |
+
ResNet-101
|
1218 |
+
|
1219 |
+
A+S+L
|
1220 |
+
21.96
|
1221 |
+
16.43
|
1222 |
+
23.62
|
1223 |
+
-
|
1224 |
+
-
|
1225 |
+
-
|
1226 |
+
PD-Net [10]
|
1227 |
+
ResNet-152
|
1228 |
+
|
1229 |
+
A+S+P+L
|
1230 |
+
22.37
|
1231 |
+
17.61
|
1232 |
+
23.79
|
1233 |
+
26.86
|
1234 |
+
21.70
|
1235 |
+
28.44
|
1236 |
+
VCL [7]
|
1237 |
+
ResNet-50
|
1238 |
+
|
1239 |
+
A+S
|
1240 |
+
23.63
|
1241 |
+
17.21
|
1242 |
+
25.55
|
1243 |
+
25.98
|
1244 |
+
19.12
|
1245 |
+
28.03
|
1246 |
+
Graph-Based
|
1247 |
+
RPNN [8]
|
1248 |
+
ResNet-50
|
1249 |
+
|
1250 |
+
A+P
|
1251 |
+
17.35
|
1252 |
+
12.78
|
1253 |
+
18.71
|
1254 |
+
-
|
1255 |
+
-
|
1256 |
+
-
|
1257 |
+
VSGNet [13]
|
1258 |
+
ResNet-152
|
1259 |
+
|
1260 |
+
A+S
|
1261 |
+
19.80
|
1262 |
+
16.05
|
1263 |
+
20.91
|
1264 |
+
-
|
1265 |
+
-
|
1266 |
+
-
|
1267 |
+
DRG [12]
|
1268 |
+
ResNet-50-FPN
|
1269 |
+
|
1270 |
+
A+S+L
|
1271 |
+
24.53
|
1272 |
+
19.47
|
1273 |
+
26.04
|
1274 |
+
27.98
|
1275 |
+
23.14
|
1276 |
+
29.43
|
1277 |
+
SCG [18]
|
1278 |
+
ResNet-50-FPN
|
1279 |
+
|
1280 |
+
A+S
|
1281 |
+
31.33
|
1282 |
+
24.72
|
1283 |
+
33.31
|
1284 |
+
34.37
|
1285 |
+
27.18
|
1286 |
+
36.50
|
1287 |
+
One-Stage Methods
|
1288 |
+
Interaction points
|
1289 |
+
IP-Net [15]
|
1290 |
+
ResNet-50-FPN
|
1291 |
+
|
1292 |
+
A
|
1293 |
+
19.56
|
1294 |
+
12.79
|
1295 |
+
21.58
|
1296 |
+
22.05
|
1297 |
+
15.77
|
1298 |
+
23.92
|
1299 |
+
PPDM [31]
|
1300 |
+
Hourglass-104
|
1301 |
+
|
1302 |
+
A
|
1303 |
+
21.73
|
1304 |
+
13.78
|
1305 |
+
24.10
|
1306 |
+
24.58
|
1307 |
+
16.65
|
1308 |
+
26.84
|
1309 |
+
GGNet [11]
|
1310 |
+
Hourglass-104
|
1311 |
+
|
1312 |
+
A
|
1313 |
+
23.47
|
1314 |
+
16.48
|
1315 |
+
25.60
|
1316 |
+
27.36
|
1317 |
+
20.23
|
1318 |
+
29.48
|
1319 |
+
Transformer-Based
|
1320 |
+
HOITrans [17]
|
1321 |
+
ResNet-101
|
1322 |
+
|
1323 |
+
A
|
1324 |
+
26.60
|
1325 |
+
19.15
|
1326 |
+
28.54
|
1327 |
+
29.1
|
1328 |
+
20.98
|
1329 |
+
31.57
|
1330 |
+
HOTR [9]
|
1331 |
+
ResNet-50
|
1332 |
+
|
1333 |
+
A
|
1334 |
+
23.46
|
1335 |
+
16.21
|
1336 |
+
25.65
|
1337 |
+
-
|
1338 |
+
-
|
1339 |
+
-
|
1340 |
+
ResNet-50
|
1341 |
+
|
1342 |
+
A
|
1343 |
+
25.10
|
1344 |
+
17.34
|
1345 |
+
27.42
|
1346 |
+
-
|
1347 |
+
-
|
1348 |
+
-
|
1349 |
+
AS-Net [6]
|
1350 |
+
ResNet-50
|
1351 |
+
|
1352 |
+
A
|
1353 |
+
24.40
|
1354 |
+
22.39
|
1355 |
+
25.01
|
1356 |
+
27.41
|
1357 |
+
25.44
|
1358 |
+
28.00
|
1359 |
+
ResNet-50
|
1360 |
+
|
1361 |
+
A
|
1362 |
+
28.87
|
1363 |
+
24.25
|
1364 |
+
30.25
|
1365 |
+
31.74
|
1366 |
+
27.07
|
1367 |
+
33.14
|
1368 |
+
QPIC [19]
|
1369 |
+
ResNet-50
|
1370 |
+
|
1371 |
+
A
|
1372 |
+
29.07
|
1373 |
+
21.85
|
1374 |
+
31.23
|
1375 |
+
31.68
|
1376 |
+
24.14
|
1377 |
+
33.93
|
1378 |
+
ResNet-50
|
1379 |
+
|
1380 |
+
A
|
1381 |
+
24.21
|
1382 |
+
17.51
|
1383 |
+
26.21
|
1384 |
+
-
|
1385 |
+
-
|
1386 |
+
-
|
1387 |
+
QAHOI [33]
|
1388 |
+
Swin-Tiny
|
1389 |
+
|
1390 |
+
A
|
1391 |
+
28.47
|
1392 |
+
22.44
|
1393 |
+
30.27
|
1394 |
+
30.99
|
1395 |
+
24.83
|
1396 |
+
32.84
|
1397 |
+
Swin-Large∗
|
1398 |
+
+
|
1399 |
+
|
1400 |
+
A
|
1401 |
+
35.78
|
1402 |
+
29.80
|
1403 |
+
37.56
|
1404 |
+
37.59
|
1405 |
+
31.66
|
1406 |
+
39.36
|
1407 |
+
QAHOI (R)
|
1408 |
+
Swin-Tiny
|
1409 |
+
|
1410 |
+
A
|
1411 |
+
27.67
|
1412 |
+
20.22
|
1413 |
+
29.69
|
1414 |
+
30.06
|
1415 |
+
22.95
|
1416 |
+
32.18
|
1417 |
+
Swin-Large∗
|
1418 |
+
+
|
1419 |
+
|
1420 |
+
A
|
1421 |
+
35.43
|
1422 |
+
29.22
|
1423 |
+
37.29
|
1424 |
+
37.23
|
1425 |
+
31.01
|
1426 |
+
39.09
|
1427 |
+
FGAHOI
|
1428 |
+
Swin-Tiny
|
1429 |
+
|
1430 |
+
A
|
1431 |
+
29.94
|
1432 |
+
22.24
|
1433 |
+
32.24
|
1434 |
+
32.48
|
1435 |
+
24.16
|
1436 |
+
34.97
|
1437 |
+
Swin-Large∗
|
1438 |
+
+
|
1439 |
+
|
1440 |
+
A
|
1441 |
+
37.18
|
1442 |
+
30.71
|
1443 |
+
39.11
|
1444 |
+
38.93
|
1445 |
+
31.93
|
1446 |
+
41.02
|
1447 |
+
74 object classes and 93 action classes. The training and
|
1448 |
+
testing set contain 37,155 and 9,666 images, respectively. The
|
1449 |
+
detailed distribution of HOI instances is shown in Table.1.
|
1450 |
+
(b)
|
1451 |
+
(a)
|
1452 |
+
������������������������������������������������������������
|
1453 |
+
������������������������������������������������������������
|
1454 |
+
������������������������������������������������������������������������������������
|
1455 |
+
������������������������
|
1456 |
+
������������������������
|
1457 |
+
������������������������������������������������
|
1458 |
+
Fig. 8: Proposed metrics for the difficulties existing with HOI
|
1459 |
+
instances. (a) Metric for uneven size distribution of humans
|
1460 |
+
and objects. (b) Metric for excessive distance between person
|
1461 |
+
and object. Kindly refer to Sec. 4.1 and 4.2 for more details.
|
1462 |
+
5
|
1463 |
+
EXPERIMENTS
|
1464 |
+
5.1
|
1465 |
+
Dataset
|
1466 |
+
Experiments are conducted on three HOI datasets: HICO-
|
1467 |
+
DET [38], V-COCO [39] and HOI-SDC dataset
|
1468 |
+
HICO-DET [38] has 80 object classes, 117 action classes
|
1469 |
+
and 600 HOI classes. HICO-DET offers 47,776 images with
|
1470 |
+
TABLE 3: Performance comparison with the state-of-the-art
|
1471 |
+
methods on the HOI-SDC dataset. Kindly refer to Sec. 5.4.2
|
1472 |
+
for more details.
|
1473 |
+
Dataset
|
1474 |
+
Backbone
|
1475 |
+
Method
|
1476 |
+
mAProle (↑)
|
1477 |
+
HOI-SDC
|
1478 |
+
Swin-Tiny
|
1479 |
+
QAHOI
|
1480 |
+
19.55
|
1481 |
+
Swin-Tiny
|
1482 |
+
Baseline
|
1483 |
+
21.18
|
1484 |
+
Swin-Tiny
|
1485 |
+
+HSAM
|
1486 |
+
21.91
|
1487 |
+
Swin-Tiny
|
1488 |
+
+TAM
|
1489 |
+
21.84
|
1490 |
+
Swin-Tiny
|
1491 |
+
FGAHOI
|
1492 |
+
22.25
|
1493 |
+
151,276 HOI instances, including 38,118 images with 117,871
|
1494 |
+
annotated instances of human-object pairs in the training set
|
1495 |
+
and 9658 images with 33,405 annotated instances of human-
|
1496 |
+
object pairs in the testing set. According to the number
|
1497 |
+
of these HOI classes, the 600 HOI classes in the dataset
|
1498 |
+
are grouped into three categories: Full (all HOI classes),
|
1499 |
+
Rare (138 classes with fewer than ten instances) and Non-
|
1500 |
+
Rare (462 classes with more than ten instances). Following
|
1501 |
+
HICO [63], we consider two different evaluation settings
|
1502 |
+
(the results are shown in Table.2: (1) Known object settings:
|
1503 |
+
For each HOI category (such as ’flying a kite’), the detection
|
1504 |
+
is only evaluated on the images that contain the target object
|
1505 |
+
category (such as ’kite’). The difficulty lies in the local-
|
1506 |
+
|
1507 |
+
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 10, JANUARY 2023
|
1508 |
+
10
|
1509 |
+
TABLE 4: Performance comparison with the state-of-the-art
|
1510 |
+
methods on the V-COCO dataset. Kindly refer to Sec. 5.4.3
|
1511 |
+
for more details.
|
1512 |
+
Method
|
1513 |
+
AP𝑆1
|
1514 |
+
role (↑)
|
1515 |
+
AP𝑆2
|
1516 |
+
role (↑)
|
1517 |
+
Two-stage Method
|
1518 |
+
VSG-Net
|
1519 |
+
51.8
|
1520 |
+
57.0
|
1521 |
+
PD-Net
|
1522 |
+
52.0
|
1523 |
+
-
|
1524 |
+
ACP
|
1525 |
+
53.2
|
1526 |
+
-
|
1527 |
+
One-stage Method
|
1528 |
+
HOITrans
|
1529 |
+
52.9
|
1530 |
+
-
|
1531 |
+
AS-Net
|
1532 |
+
53.9
|
1533 |
+
-
|
1534 |
+
HOTR
|
1535 |
+
55.2
|
1536 |
+
64.4
|
1537 |
+
DIRV
|
1538 |
+
56.1
|
1539 |
+
-
|
1540 |
+
QAHOI(R-50)
|
1541 |
+
58.2
|
1542 |
+
58.7
|
1543 |
+
FGAHOI(R-50)
|
1544 |
+
59.0
|
1545 |
+
59.3
|
1546 |
+
FGAHOI(Swin-T)
|
1547 |
+
60.5
|
1548 |
+
61.2
|
1549 |
+
ization of HOI (e.g. human-kite pairs) and distinguishing
|
1550 |
+
the interaction (e.g. ’flying’). (2) Default setting: For each
|
1551 |
+
HOI category, the detection is evaluated on the whole test
|
1552 |
+
set, including images containing and without target object
|
1553 |
+
categories. This is a more challenging setting because we
|
1554 |
+
also need to distinguish background images (such as images
|
1555 |
+
without ’kite’).
|
1556 |
+
V-COCO [39] contains 80 different object classes and
|
1557 |
+
29 action categories and is developed from the MS-COCO
|
1558 |
+
dataset, which includes 4,946 images for the test subset,
|
1559 |
+
2,533 images for the train subset and 2,867 images for the
|
1560 |
+
validation subset. The objects are divided into two types:
|
1561 |
+
“object” and “instrument”.
|
1562 |
+
5.2
|
1563 |
+
Metric
|
1564 |
+
Following the standard evaluation [21], [39], we use role
|
1565 |
+
mean average precious to evaluate the predicted HOI in-
|
1566 |
+
stances. A detected bounding box is considered a true
|
1567 |
+
positive for object detection if it overlaps with a ground
|
1568 |
+
truth bounding box of the same class with an intersection
|
1569 |
+
greater than union (𝐼𝑂𝑈) greater than 0.5. In HOI detection,
|
1570 |
+
we need to predict human-object pairs. The human-object
|
1571 |
+
pairs whose human overlap 𝐼𝑂𝑈ℎ and object overlap 𝐼𝑂𝑈𝑜
|
1572 |
+
both exceed 0.5, i.e., min (𝐼𝑂𝑈ℎ, 𝐼𝑂𝑈𝑜) > 0.5 are declared
|
1573 |
+
a true positive (as shown in Fig 9). Specifically, for HICO-
|
1574 |
+
DET, besides the full set of 600 HOI classes, the role mAP
|
1575 |
+
over a rare set of 138 HOI classes that have less than 10
|
1576 |
+
training instances and a non-rare set of the other 462 HOI
|
1577 |
+
classes are also reported. Furthermore, we report the role
|
1578 |
+
mAP of two scenarios for V-COCO: scenario 1 includes the
|
1579 |
+
cases even without any objects (for the four action categories
|
1580 |
+
of body motions), while scenario 2 ignores these cases. For
|
1581 |
+
HOI-SDC, we report the role mean average precision for the
|
1582 |
+
full set of 321 HOI classes.
|
1583 |
+
5.3
|
1584 |
+
Implementation Details
|
1585 |
+
The Visual Feature Extractor consists of Swin Transformer
|
1586 |
+
and a deformable transformer encoder. For Swin-Tiny and
|
1587 |
+
Swin-Large, the dimensions of the feature maps in the first
|
1588 |
+
stage are set to 𝐶𝑠 = 96 and 𝐶𝑠 = 192, respectively. We pre-
|
1589 |
+
train Swin-Tiny on the ImageNet-1k dataset. Swin-Large is
|
1590 |
+
first pre-trained on the ImageNet-22k dataset and finetuned
|
1591 |
+
Fig. 9: The human-object pairs with human overlap 𝐼𝑂𝑈ℎ
|
1592 |
+
and object overlap 𝐼𝑂𝑈𝑜 both exceeding 0.5 are declared as
|
1593 |
+
true positives. Kindly refer to Sec. 5.2 for more details.
|
1594 |
+
on the ImageNet-1k dataset. Then the weights are used
|
1595 |
+
to fine-tune the FGAHOI for the HOI detection task. The
|
1596 |
+
number of both encoder and decoder layers are set to 6
|
1597 |
+
(𝑁𝐿𝑎𝑦𝑒𝑟 = 6). The number of query embeddings is set to 300
|
1598 |
+
(𝑁𝑞 = 300), and the hidden dimension of embeddings in the
|
1599 |
+
transformer is set to 256 (𝐶𝑑 = 256). In the post-processing
|
1600 |
+
phase, the first 100 HOI instances are selected according
|
1601 |
+
to object confidence, and we use 𝛿=0.5 to filter the HOI
|
1602 |
+
instances by the combined 𝐼𝑂𝑈. Following Deformable-
|
1603 |
+
DETR [34], the AdamW [64] optimizer is used. The learning
|
1604 |
+
rates of the extractor and the other components are set to
|
1605 |
+
10−5 and 10−4, respectively. We use 8 RTX 3090 to train the
|
1606 |
+
model (QAHOI & FGAHOI) with Swin-Tiny. For the model
|
1607 |
+
with Swin-Large∗
|
1608 |
+
+, we use 16 RTX 3090 to train them. For
|
1609 |
+
HICO-DET and HOI-SDC, we train the base network for
|
1610 |
+
150 epochs and carry out the learning rate drop from the
|
1611 |
+
120th epoch at the first stage of training. For subsequent
|
1612 |
+
training, we trained the model for 40 epochs, with a learning
|
1613 |
+
rate drop at the 15th epoch. For V-COCO dataset, we train
|
1614 |
+
the base network for 90 epochs and drop the learning rate
|
1615 |
+
from 60th epoch at the first stage of training. For subsequent
|
1616 |
+
training, we trained the model for 30 epochs, with a learning
|
1617 |
+
rate drop at the 10th epoch.
|
1618 |
+
5.4
|
1619 |
+
Comparison with State-of-the-Arts
|
1620 |
+
5.4.1
|
1621 |
+
HICO-DET
|
1622 |
+
We compare FGAHOI with the state-of-the-art two-stage
|
1623 |
+
and one-stage methods on the HICO-DET dataset and
|
1624 |
+
report the results in Table.1. FGAHOI outperforms both
|
1625 |
+
state-of-the-art methods. In contrast to the state-of-the-art
|
1626 |
+
two-stage method SCG [18], FGAHOI with Swin-Large*+
|
1627 |
+
backbone exceeds an especially significant gain of 5.85 mAP
|
1628 |
+
in default full setting, 5.99 mAP in default rare setting, 5.8
|
1629 |
+
mAP in default non-rare setting, 4.56 mAP in known object
|
1630 |
+
full setting, 4.75 mAP in known rare settings and 4.52 mAP
|
1631 |
+
in known object non-rare setting. For a fair comparison, we
|
1632 |
+
used the same machine for the reproduction of the QAHOI
|
1633 |
+
(as shown in Table.2 QAHOI(R)). In comparison to the state-
|
1634 |
+
of-the-art one-stage method QAHOI, FGAHOI exceeds it
|
1635 |
+
in all settings for all backbone networks. For Swin-Tiny
|
1636 |
+
backbone network, FGAHOI exceeds an especially signifi-
|
1637 |
+
cant gain of 2.27 mAP in default full setting, 2.02 mAP in
|
1638 |
+
default rare setting, 2.55 mAP in default non-rare setting,
|
1639 |
+
2.42 mAP in known object full setting, 1.11 mAP in known
|
1640 |
+
rare settings and 2.79 mAP in known object non-rare setting.
|
1641 |
+
In addition, FGAHOI with Swin-Large*+ backbone exceeds
|
1642 |
+
an especially significant gain of 1.75 mAP in default full
|
1643 |
+
|
1644 |
+
OU
|
1645 |
+
IOU.
|
1646 |
+
Ground-truth label
|
1647 |
+
Prediction boxesJOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 10, JANUARY 2023
|
1648 |
+
11
|
1649 |
+
TABLE 5: Comparison on ten intervals of the two proposed challenges. We divide the HICO-DET dataset into ten intervals
|
1650 |
+
based on each of the two challenges and compare the performance of QAHOI and FGAHOI on each interval. Kindly refer
|
1651 |
+
to Sec. 5.5 for more details.
|
1652 |
+
Challenge
|
1653 |
+
Method
|
1654 |
+
Backbone
|
1655 |
+
mAProle (↑)
|
1656 |
+
IMI0
|
1657 |
+
IMI1
|
1658 |
+
IMI2
|
1659 |
+
IMI3
|
1660 |
+
IMI4
|
1661 |
+
IMI5
|
1662 |
+
IMI6
|
1663 |
+
IMI7
|
1664 |
+
IMI8
|
1665 |
+
IMI9
|
1666 |
+
UDA
|
1667 |
+
QAHOI
|
1668 |
+
Swin-Tiny
|
1669 |
+
16.35
|
1670 |
+
24.72
|
1671 |
+
29.24
|
1672 |
+
34.79
|
1673 |
+
38.70
|
1674 |
+
46.21
|
1675 |
+
53.13
|
1676 |
+
47.60
|
1677 |
+
58.66
|
1678 |
+
60.19
|
1679 |
+
Swin-Large∗
|
1680 |
+
+
|
1681 |
+
20.53
|
1682 |
+
33.58
|
1683 |
+
41.11
|
1684 |
+
45.41
|
1685 |
+
45.44
|
1686 |
+
56.43
|
1687 |
+
56.25
|
1688 |
+
63.53
|
1689 |
+
71.12
|
1690 |
+
75.08
|
1691 |
+
FGAHOI
|
1692 |
+
Swin-Tiny
|
1693 |
+
19.74
|
1694 |
+
29.85
|
1695 |
+
32.20
|
1696 |
+
39.46
|
1697 |
+
40.54
|
1698 |
+
48.55
|
1699 |
+
51.32
|
1700 |
+
46.50
|
1701 |
+
66.44
|
1702 |
+
78.17
|
1703 |
+
Swin-Large∗
|
1704 |
+
+
|
1705 |
+
23.69
|
1706 |
+
35.85
|
1707 |
+
42.51
|
1708 |
+
50.50
|
1709 |
+
46.89
|
1710 |
+
56.95
|
1711 |
+
56.33
|
1712 |
+
63.04
|
1713 |
+
75.70
|
1714 |
+
79.42
|
1715 |
+
LDVM
|
1716 |
+
QAHOI
|
1717 |
+
Swin-Tiny
|
1718 |
+
1.33
|
1719 |
+
4.43
|
1720 |
+
2.57
|
1721 |
+
5.00
|
1722 |
+
8.06
|
1723 |
+
17.87
|
1724 |
+
22.81
|
1725 |
+
29.25
|
1726 |
+
34.03
|
1727 |
+
42.29
|
1728 |
+
Swin-Large∗
|
1729 |
+
+
|
1730 |
+
0.82
|
1731 |
+
4.08
|
1732 |
+
2.56
|
1733 |
+
7.53
|
1734 |
+
11.42
|
1735 |
+
22.87
|
1736 |
+
30.94
|
1737 |
+
41.38
|
1738 |
+
45.31
|
1739 |
+
60.15
|
1740 |
+
FGAHOI
|
1741 |
+
Swin-Tiny
|
1742 |
+
2.50
|
1743 |
+
4.15
|
1744 |
+
3.34
|
1745 |
+
7.58
|
1746 |
+
9.83
|
1747 |
+
21.61
|
1748 |
+
27.64
|
1749 |
+
33.07
|
1750 |
+
38.31
|
1751 |
+
45.07
|
1752 |
+
Swin-Large∗
|
1753 |
+
+
|
1754 |
+
1.44
|
1755 |
+
4.32
|
1756 |
+
4.57
|
1757 |
+
7.81
|
1758 |
+
11.82
|
1759 |
+
24.92
|
1760 |
+
32.50
|
1761 |
+
43.66
|
1762 |
+
47.26
|
1763 |
+
60.55
|
1764 |
+
TABLE 6: We carefully ablate each of the constituent component of FGAHOI. The middle results denote the role mAP. The
|
1765 |
+
results in the top right corner represent the performance improvement compared to QAHOI. The results in the bottom
|
1766 |
+
right corner represent the performance improvement compared to the baseline. Kindly refer to Sec. 5.7.1 for more details.
|
1767 |
+
Method
|
1768 |
+
Merging Mechanism
|
1769 |
+
Default
|
1770 |
+
Known Object
|
1771 |
+
Hierarchical Spatial-Aware
|
1772 |
+
Task-Aware
|
1773 |
+
Full ↑
|
1774 |
+
Rare ↑
|
1775 |
+
Non-Rare ↑
|
1776 |
+
Full ↑
|
1777 |
+
Rare ↑
|
1778 |
+
Non-Rare ↑
|
1779 |
+
QAHOI
|
1780 |
+
-
|
1781 |
+
-
|
1782 |
+
27.67
|
1783 |
+
20.22
|
1784 |
+
29.69
|
1785 |
+
30.06
|
1786 |
+
22.95
|
1787 |
+
32.18
|
1788 |
+
FGAHOI
|
1789 |
+
|
1790 |
+
|
1791 |
+
28.45( +0.78 )
|
1792 |
+
(
|
1793 |
+
-
|
1794 |
+
)
|
1795 |
+
21.07( +0.85 )
|
1796 |
+
(
|
1797 |
+
-
|
1798 |
+
)
|
1799 |
+
30.66( +0.97 )
|
1800 |
+
(
|
1801 |
+
-
|
1802 |
+
)
|
1803 |
+
31.08( +1.02 )
|
1804 |
+
(
|
1805 |
+
-
|
1806 |
+
)
|
1807 |
+
24.02( +1.01 )
|
1808 |
+
(
|
1809 |
+
-
|
1810 |
+
)
|
1811 |
+
33.19( +1.07 )
|
1812 |
+
(
|
1813 |
+
-
|
1814 |
+
)
|
1815 |
+
|
1816 |
+
|
1817 |
+
29.60( +1.93 )
|
1818 |
+
( +1.15 )
|
1819 |
+
22.39( +2.17 )
|
1820 |
+
( +1.32 )
|
1821 |
+
31.76( +2.07 )
|
1822 |
+
( +1.10 )
|
1823 |
+
32.07( +2.01 )
|
1824 |
+
( +0.99 )
|
1825 |
+
24.48( +1.53 )
|
1826 |
+
( +0.46 )
|
1827 |
+
34.34( +2.16 )
|
1828 |
+
( +1.15 )
|
1829 |
+
|
1830 |
+
|
1831 |
+
29.32( +1.65 )
|
1832 |
+
( +0.87 )
|
1833 |
+
22.34( +2.12 )
|
1834 |
+
( +1.27 )
|
1835 |
+
31.41( +1.72 )
|
1836 |
+
( +0.75)
|
1837 |
+
31.81( +1.75 )
|
1838 |
+
( +0.73)
|
1839 |
+
24.30( +1.35 )
|
1840 |
+
( +0.28)
|
1841 |
+
34.05( +1.87 )
|
1842 |
+
( +0.86)
|
1843 |
+
|
1844 |
+
|
1845 |
+
29.94( +2.27 )
|
1846 |
+
( +1.49 )
|
1847 |
+
22.24( +2.02 )
|
1848 |
+
( +1.17 )
|
1849 |
+
32.24( +2.55 )
|
1850 |
+
( +1.58 )
|
1851 |
+
32.48( +2.42 )
|
1852 |
+
( +1.40 )
|
1853 |
+
24.16( +1.21 )
|
1854 |
+
( +0.14 )
|
1855 |
+
34.97( +2.79 )
|
1856 |
+
( +1.78 )
|
1857 |
+
setting, 1.49 mAP in default rare setting, 1.82 mAP in default
|
1858 |
+
non-rare setting, 1.7 mAP in known object full setting, 0.92
|
1859 |
+
mAP in known rare settings and 1.93 mAP in known object
|
1860 |
+
non-rare setting.
|
1861 |
+
5.4.2
|
1862 |
+
HOI-SDC
|
1863 |
+
On the dataset we propose, 𝑖.𝑒., HOI-SDC, we compare
|
1864 |
+
FGAHOI with QAHOI and ablate each component of FGA-
|
1865 |
+
HOI (As shown in Table.3). The backbone is set to Swin-Tiny.
|
1866 |
+
The baseline exceeds QAHOI an especially significant gain
|
1867 |
+
of 1.63 mAP. HSAM and TAM improve a significant gain
|
1868 |
+
of 0.73 and 0.66 mAP, respectively. Benefit from the MSS,
|
1869 |
+
HSAM and TAM, FGAHOI achieve 22.25 mAP on HOI-
|
1870 |
+
SDC.
|
1871 |
+
5.4.3
|
1872 |
+
V-COCO
|
1873 |
+
We compare FGAHOI with the state-of-the-art methods
|
1874 |
+
on V-COCO dataset and report the results in Table.4. In
|
1875 |
+
comparison to QAHOI, FGAHOI only exceeds a small
|
1876 |
+
margin. This phenomenon is mainly caused by too little
|
1877 |
+
training data in the dataset. We investigate that FGAHOI
|
1878 |
+
cannot adequately perform when the training data is not
|
1879 |
+
sufficient due to the complex task requirements. In addition,
|
1880 |
+
we investigate the transformer backbone is still superior to
|
1881 |
+
CNN backbone in this case.
|
1882 |
+
5.5
|
1883 |
+
Sensitivity Analysis for UDA and LDVM
|
1884 |
+
According to the two proposed challenges, we divide the
|
1885 |
+
HICO-DET into ten intervals. At each intervals, we compare
|
1886 |
+
FGAHOI and QAHOI with Swin-Tiny, Large∗
|
1887 |
+
+ backbone,
|
1888 |
+
respectively (As shown in Table.5). When compared be-
|
1889 |
+
tween each interval of UDA and LDVM, we investigate
|
1890 |
+
that the difficulty of HOI detection decreases as the interval
|
1891 |
+
level increases. This justifies the original design. Thus, it
|
1892 |
+
is imperative to consider ability of the model to address
|
1893 |
+
these two challenges when proposing novel frameworks for
|
1894 |
+
HOI detection. In the comparison between FGAHOI and
|
1895 |
+
QAHOI, the results demonstrate that FGAHOI has better
|
1896 |
+
capability for uneven distributed area and long distance
|
1897 |
+
visual modeling of human-object pairs.
|
1898 |
+
5.6
|
1899 |
+
Qualitative Analysis
|
1900 |
+
5.6.1
|
1901 |
+
Visualized Results
|
1902 |
+
In order to demonstrate our model, several representative
|
1903 |
+
HOI predictions are visualized. As shown in Fig.5, our
|
1904 |
+
model can pinpoint HOI instances from noisy backgrounds
|
1905 |
+
and excels at detecting various complicated HOIs, including
|
1906 |
+
one object interacting with different humans, one human
|
1907 |
+
engaging in multiple interactions with various objects, mul-
|
1908 |
+
tiple interactions within a single pair, and multiple humans
|
1909 |
+
engaging in various interactions with various objects. In
|
1910 |
+
addition, our model is good at long-range visual modelling,
|
1911 |
+
withstanding the impacts of hostile environments and small
|
1912 |
+
target identification. Fig.6 (a) illustrates that FGAHOI has
|
1913 |
+
excellent long-range visual modelling capabilities and can
|
1914 |
+
accurately identify interactions between human-object pairs
|
1915 |
+
far from each other. As Fig.6 (b) shows, our model has
|
1916 |
+
|
1917 |
+
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 10, JANUARY 2023
|
1918 |
+
12
|
1919 |
+
text_on cell_phone
|
1920 |
+
talk_on cell_phone
|
1921 |
+
eat orange
|
1922 |
+
open book
|
1923 |
+
cut with knife
|
1924 |
+
repair hair_drier
|
1925 |
+
hold hotdog
|
1926 |
+
hop_on elephant
|
1927 |
+
kick sports_ball
|
1928 |
+
hold cup
|
1929 |
+
carry handbag
|
1930 |
+
jump skateboard
|
1931 |
+
hold cup
|
1932 |
+
drink with cup
|
1933 |
+
text_on cell_phone
|
1934 |
+
talk_on cell_phone
|
1935 |
+
eat orange
|
1936 |
+
open book
|
1937 |
+
cut with knife
|
1938 |
+
repair hair_drier
|
1939 |
+
hold hotdog
|
1940 |
+
hop_on elephant
|
1941 |
+
kick sports_ball
|
1942 |
+
hold cup
|
1943 |
+
carry handbag
|
1944 |
+
jump skateboard
|
1945 |
+
hold cup
|
1946 |
+
drink with cup
|
1947 |
+
(a)
|
1948 |
+
(b)
|
1949 |
+
(c)
|
1950 |
+
Level_0
|
1951 |
+
Level_0
|
1952 |
+
Level_1
|
1953 |
+
Level_1
|
1954 |
+
Level_2
|
1955 |
+
Level_2
|
1956 |
+
Low
|
1957 |
+
High
|
1958 |
+
Read
|
1959 |
+
Laptop
|
1960 |
+
Read
|
1961 |
+
Laptop
|
1962 |
+
Low
|
1963 |
+
High
|
1964 |
+
Read
|
1965 |
+
Laptop
|
1966 |
+
Exit
|
1967 |
+
Airplane
|
1968 |
+
Sit on
|
1969 |
+
Airplane
|
1970 |
+
Hold
|
1971 |
+
Horse
|
1972 |
+
Ride
|
1973 |
+
Horse
|
1974 |
+
Fly Kite
|
1975 |
+
(a)
|
1976 |
+
(b)
|
1977 |
+
(c)
|
1978 |
+
Level_0
|
1979 |
+
Level_1
|
1980 |
+
Level_2
|
1981 |
+
Low
|
1982 |
+
High
|
1983 |
+
Read
|
1984 |
+
Laptop
|
1985 |
+
Exit
|
1986 |
+
Airplane
|
1987 |
+
Sit on
|
1988 |
+
Airplane
|
1989 |
+
Hold
|
1990 |
+
Horse
|
1991 |
+
Ride
|
1992 |
+
Horse
|
1993 |
+
Fly Kite
|
1994 |
+
Fig. 10: Visualization of fine-grained anchors in the decoding phase, Level 0, Level 1 and Level 2 represent the features
|
1995 |
+
at different scales respectively, the color of the blue dots from light to dark represents the degrees of attention of the fine-
|
1996 |
+
grained anchors and red dots represent the positions of interest of fine-grained anchors in current scale features. Kindly
|
1997 |
+
refer to Sec. 5.6.2 for more details.
|
1998 |
+
outstanding robustness and can effectively resist disruption
|
1999 |
+
from harsh environmental factors, including blurring, block-
|
2000 |
+
ing and glare. Fig.6 (c) demonstrates the superior capabili-
|
2001 |
+
ties of FGAHOI to identify small HOI instances.
|
2002 |
+
5.6.2
|
2003 |
+
What do the fine-grained anchors look at?
|
2004 |
+
As shown in Fig.7, we compare the fine-grained anchors of
|
2005 |
+
FGAHOI and QAHOI. First two HOI instances (𝑖.𝑒, hold
|
2006 |
+
sport ball and ride motorcycles) exhibit that FGAHOI could
|
2007 |
+
better focus on humans, objects and the interaction areas
|
2008 |
+
rather than noisy backgrounds. The fourth head of FGAHOI
|
2009 |
+
still focuses on the HOI instance, while QAHOI focuses
|
2010 |
+
on the background. When detecting instance with a long
|
2011 |
+
distance between human and object, FGAHOI could focus
|
2012 |
+
on the right position, while QAHOI is like a chicken with its
|
2013 |
+
head cut off (As shown in the last HOI instance).
|
2014 |
+
To exhibit the effectiveness of the fine-grained anchors
|
2015 |
+
for identifying HOI instances and demonstrate the working
|
2016 |
+
mechanism of fine-grained anchors, we visualize the fine-
|
2017 |
+
grained anchors of the feature maps at different scales in
|
2018 |
+
the decoding phase. In Fig.10 (a), we visualize the instances
|
2019 |
+
of two different humans and one object. As shown in Fig.10
|
2020 |
+
(b), even for exactly the same human-object pair, the areas
|
2021 |
+
of focus vary from one interaction to another. In Fig.10 (c),
|
2022 |
+
|
2023 |
+
IS人
|
2024 |
+
D2MVAD2MVAD2MVAD2MVAJOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 10, JANUARY 2023
|
2025 |
+
13
|
2026 |
+
text_on cell_phone
|
2027 |
+
talk_on cell_phone
|
2028 |
+
eat orange
|
2029 |
+
ride bicycle
|
2030 |
+
cut with knife
|
2031 |
+
repair hair_drier
|
2032 |
+
hold hotdog
|
2033 |
+
hop_on elephant
|
2034 |
+
kick sports_ball
|
2035 |
+
hold cup
|
2036 |
+
carry handbag
|
2037 |
+
jump skateboard
|
2038 |
+
hold cup
|
2039 |
+
drink with cup
|
2040 |
+
text_on cell_phone
|
2041 |
+
talk_on cell_phone
|
2042 |
+
eat orange
|
2043 |
+
ride bicycle
|
2044 |
+
cut with knife
|
2045 |
+
repair hair_drier
|
2046 |
+
hold hotdog
|
2047 |
+
hop_on elephant
|
2048 |
+
kick sports_ball
|
2049 |
+
hold cup
|
2050 |
+
carry handbag
|
2051 |
+
jump skateboard
|
2052 |
+
hold cup
|
2053 |
+
drink with cup
|
2054 |
+
Fig. 11: Visualization of several representative interactive actions and the corresponding fine-grained anchors. We only
|
2055 |
+
visualize a single representative interactive action for one human-object pair. Kindly refer to Sec. 5.6.2 for more details.
|
2056 |
+
we show two instances contain short and long distance
|
2057 |
+
between humans and objects, respectively. We investigate
|
2058 |
+
that the fine-grained anchors of low level feature map focus
|
2059 |
+
on small and fine-grained areas. They play a major role in
|
2060 |
+
detecting close range and small HOI instances. The fine-
|
2061 |
+
grained anchors of high level feature maps focus on large
|
2062 |
+
and coarse-grained areas. It is necessary for detecting long
|
2063 |
+
distance and large HOI instances.
|
2064 |
+
In order to explore what the fine-grained anchors focus
|
2065 |
+
on, we visualize several representative actions in Fig.11.
|
2066 |
+
Visualization shows that fine-grained anchors could con-
|
2067 |
+
centrate attention precisely on the location where the in-
|
2068 |
+
teractive action is generated. For example, the fine-grained
|
2069 |
+
anchors mainly focus on the hand for ’text on cell phone’,
|
2070 |
+
the mouth for ’eat orange’ and the ear and the mouth
|
2071 |
+
for ’talk on cell phone’. For ’kick sports ball’, ’jump skate-
|
2072 |
+
board’ and ’hop on elephant’, central areas of interest are
|
2073 |
+
around legs and feet, while fine-grained anchors primarily
|
2074 |
+
focuses on hands for ’carry handbag’, ’repair hair drier’,
|
2075 |
+
’hold cup’, ’hold hotdog’ and ’cut with kinfe’.
|
2076 |
+
5.7
|
2077 |
+
Ablation Study
|
2078 |
+
In this subsection, a set of experiments are designed to
|
2079 |
+
clearly understand the contribution of each of the con-
|
2080 |
+
stituent components of the proposed methodology: Merg-
|
2081 |
+
ing mechanism, Multi-Scale Sampling Strategy and Stage-
|
2082 |
+
wise Training Strategy. We conducted all experiments on
|
2083 |
+
the HICO-DET dataset.
|
2084 |
+
5.7.1
|
2085 |
+
Ablating FGAHOI Components
|
2086 |
+
To study the contribution of each of the merging mecha-
|
2087 |
+
nisms in FGAHOI, we design careful ablation experiments
|
2088 |
+
in Table.6. To ensure a fair comparison, the sampling sizes
|
2089 |
+
are all set to [1, 3, 5]. For the baseline which does not lever-
|
2090 |
+
ages the hierarchical spatial-aware and task-aware merging
|
2091 |
+
mechanism, we use the average and direct summation op-
|
2092 |
+
eration to merge the sampled features and connect embed-
|
2093 |
+
dings. For the results in the table, the middle results denote
|
2094 |
+
the role mAP, the results in the top right corner represent
|
2095 |
+
the performance improvement compared to QAHOI and the
|
2096 |
+
results in the bottom right corner represent the performance
|
2097 |
+
improvement compared to the baseline. In comparison to
|
2098 |
+
row 1 (QAHOI), row 2 adds the multi-scale sampling
|
2099 |
+
strategy. The results demonstrate that adding the sampling
|
2100 |
+
strategy improves the ability of the model to detect HOI
|
2101 |
+
instances. The row 3 and 4 show that both hierarchical
|
2102 |
+
spatial-aware and task-aware merging mechanism make
|
2103 |
+
an essential contribution to the success of FGAHOI. The
|
2104 |
+
hierarchical spatial-aware merging mechanism, combined
|
2105 |
+
with the task-aware merging mechanism performs better
|
2106 |
+
together (row 5) than using either of them separately (row 3
|
2107 |
+
and 4). Thus, each component in FGAHOI has a critical role
|
2108 |
+
to play in HOI detection.
|
2109 |
+
5.7.2
|
2110 |
+
Sensitivity Analysis On Multi-Scale Sampling Sizes
|
2111 |
+
Our multi-scale sampling strategy samples multi-scale fea-
|
2112 |
+
tures according to the pre-determined sampling sizes. We
|
2113 |
+
vary different sampling sizes to conduct the sensitivity
|
2114 |
+
|
2115 |
+
EJOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 10, JANUARY 2023
|
2116 |
+
14
|
2117 |
+
analysis for the sampling strategy and report the results
|
2118 |
+
in Table.7. We find that the sampling strategy is relatively
|
2119 |
+
stable. Changes in sampling sizes do not have a significant
|
2120 |
+
impact on the performance of FGAHOI. However, there is
|
2121 |
+
still a slight degradation in the performance of FGAHOI as
|
2122 |
+
the sample size increases. We investigate that as the sample
|
2123 |
+
size increases, too many background features around the
|
2124 |
+
fine-grained anchors are sampled, resulting in contamina-
|
2125 |
+
tion of the sampled features and thus the performance of
|
2126 |
+
the model suffers. Hence, for validation, we set the sampling
|
2127 |
+
sizes to [1, 3, 5] in all our experiments, which is a sweet spot
|
2128 |
+
that balances performance.
|
2129 |
+
TABLE 7: Comparison between different sampling sizes.
|
2130 |
+
Smpling Size
|
2131 |
+
Default
|
2132 |
+
Known Object
|
2133 |
+
Full
|
2134 |
+
Rare
|
2135 |
+
Non-Rare
|
2136 |
+
Full
|
2137 |
+
Rare
|
2138 |
+
Non-Rare
|
2139 |
+
[ 1, 3, 5 ]
|
2140 |
+
29.94
|
2141 |
+
22.24
|
2142 |
+
32.24
|
2143 |
+
32.48
|
2144 |
+
24.16
|
2145 |
+
34.97
|
2146 |
+
[ 3, 5, 7 ]
|
2147 |
+
29.72
|
2148 |
+
23.03
|
2149 |
+
31.72
|
2150 |
+
32.33
|
2151 |
+
25.67
|
2152 |
+
34.30
|
2153 |
+
[ 5, 7, 9 ]
|
2154 |
+
29.65
|
2155 |
+
22.64
|
2156 |
+
31.74
|
2157 |
+
32.55
|
2158 |
+
25.64
|
2159 |
+
34.62
|
2160 |
+
5.7.3
|
2161 |
+
Training Strategies
|
2162 |
+
As shown in Table.8, we leverage the stage-wise and end-
|
2163 |
+
to-end training strategy to train FGAHOI, respectively. In
|
2164 |
+
the end-to-end training strategy, we train FGAHOI for 150
|
2165 |
+
epochs and the learning rate drop is carried out at the
|
2166 |
+
120th epoch. The stage-wise training strategy promotes 5.96
|
2167 |
+
mAP for default full setting, 4.61 for default rare, 6.36 for
|
2168 |
+
default non-rare, 6.04 for known object full, 4.65 for known
|
2169 |
+
object rare and 6.46 mAP for known object non-rare setting.
|
2170 |
+
In comparison to the end-to-end training strategy, we in-
|
2171 |
+
vestigate that the stage-wise training strategy reduces the
|
2172 |
+
learning difficulty of the FGAHOI and clarify the learning
|
2173 |
+
direction of the model by emphasizing it to learn what it
|
2174 |
+
needs at each stage.
|
2175 |
+
TABLE 8: Comparison between Stage-Wise and End-to-End
|
2176 |
+
training approach.
|
2177 |
+
Training Strategy
|
2178 |
+
Default
|
2179 |
+
Known Object
|
2180 |
+
Full
|
2181 |
+
Rare
|
2182 |
+
Non-Rare
|
2183 |
+
Full
|
2184 |
+
Rare
|
2185 |
+
Non-Rare
|
2186 |
+
Stage-Wise
|
2187 |
+
29.94
|
2188 |
+
22.24
|
2189 |
+
32.24
|
2190 |
+
32.48
|
2191 |
+
24.16
|
2192 |
+
34.97
|
2193 |
+
End-to-End
|
2194 |
+
23.98
|
2195 |
+
17.63
|
2196 |
+
25.88
|
2197 |
+
26.44
|
2198 |
+
19.51
|
2199 |
+
28.51
|
2200 |
+
6
|
2201 |
+
CONCLUSION
|
2202 |
+
In this paper, we propose a novel transformer-based human-
|
2203 |
+
object interaction detector (FGAHOI) which leverages the
|
2204 |
+
input features to generate fine-grained anchors for protect-
|
2205 |
+
ing the detection of HOI instances from noisy backgrounds.
|
2206 |
+
We propose a novel training strategy where each component
|
2207 |
+
of the model is trained sequentially to clarify the training
|
2208 |
+
direction at each stage, for maximizing the savings of the
|
2209 |
+
training cost. We propose two novel metrics and a novel
|
2210 |
+
dataset, 𝑖.𝑒., HOI-SDC for the two challenges (Uneven Dis-
|
2211 |
+
tributed Area in Human-Object Pairs and Long Distance
|
2212 |
+
Visual Modeling of Human-Object Pairs) of detecting HOI
|
2213 |
+
instances. Our extensive experiments on three benchmarks:
|
2214 |
+
HICO-DET, HOI-SDC and V-COCO, demonstrate the effec-
|
2215 |
+
tiveness of the proposed FGAHOI. Specifically, FGAHOI
|
2216 |
+
outperforms all existing state-of-the-art methods by a large
|
2217 |
+
margin.
|
2218 |
+
ACKNOWLEDGMENTS
|
2219 |
+
This work is supported by National Natural Science Foun-
|
2220 |
+
dation of China (grant No.61871106 and No.61370152),
|
2221 |
+
Key R&D projects of Liaoning Province, China (grant
|
2222 |
+
No.2020JH2/10100029), and the Open Project Program
|
2223 |
+
Foundation of the Key Laboratory of Opto-Electronics In-
|
2224 |
+
formation Processing, Chinese Academy of Sciences (OEIP-
|
2225 |
+
O-202002).
|
2226 |
+
REFERENCES
|
2227 |
+
[1]
|
2228 |
+
R. Girshick, “Fast r-cnn,” in Proceedings of the IEEE international
|
2229 |
+
conference on computer vision, pp. 1440–1448, 2015.
|
2230 |
+
[2]
|
2231 |
+
Z. Li and F. Zhou, “Fssd: feature fusion single shot multibox
|
2232 |
+
detector,” arXiv preprint arXiv:1712.00960, 2017.
|
2233 |
+
[3]
|
2234 |
+
S. Ren, K. He, R. Girshick, and J. Sun, “Faster r-cnn: Towards real-
|
2235 |
+
time object detection with region proposal networks,” Advances in
|
2236 |
+
neural information processing systems, vol. 28, 2015.
|
2237 |
+
[4]
|
2238 |
+
R. Girshick, J. Donahue, T. Darrell, and J. Malik, “Rich feature hier-
|
2239 |
+
archies for accurate object detection and semantic segmentation,”
|
2240 |
+
in Proceedings of the IEEE conference on computer vision and pattern
|
2241 |
+
recognition, pp. 580–587, 2014.
|
2242 |
+
[5]
|
2243 |
+
J. Redmon, S. Divvala, R. Girshick, and A. Farhadi, “You only look
|
2244 |
+
once: Unified, real-time object detection,” in Proceedings of the IEEE
|
2245 |
+
conference on computer vision and pattern recognition, pp. 779–788,
|
2246 |
+
2016.
|
2247 |
+
[6]
|
2248 |
+
M. Chen, Y. Liao, S. Liu, Z. Chen, F. Wang, and C. Qian, “Refor-
|
2249 |
+
mulating hoi detection as adaptive set prediction,” in Proceedings of
|
2250 |
+
the IEEE/CVF Conference on Computer Vision and Pattern Recognition,
|
2251 |
+
pp. 9004–9013, 2021.
|
2252 |
+
[7]
|
2253 |
+
Z. Hou, X. Peng, Y. Qiao, and D. Tao, “Visual compositional learn-
|
2254 |
+
ing for human-object interaction detection,” in European Conference
|
2255 |
+
on Computer Vision, pp. 584–600, Springer, 2020.
|
2256 |
+
[8]
|
2257 |
+
P. Zhou and M. Chi, “Relation parsing neural network for human-
|
2258 |
+
object interaction detection,” in Proceedings of the IEEE/CVF Inter-
|
2259 |
+
national Conference on Computer Vision, pp. 843–851, 2019.
|
2260 |
+
[9]
|
2261 |
+
B. Kim, J. Lee, J. Kang, E.-S. Kim, and H. J. Kim, “Hotr: End-
|
2262 |
+
to-end human-object interaction detection with transformers,” in
|
2263 |
+
Proceedings of the IEEE/CVF Conference on Computer Vision and
|
2264 |
+
Pattern Recognition, pp. 74–83, 2021.
|
2265 |
+
[10] X. Zhong, C. Ding, X. Qu, and D. Tao, “Polysemy deciphering net-
|
2266 |
+
work for robust human–object interaction detection,” International
|
2267 |
+
Journal of Computer Vision, vol. 129, no. 6, pp. 1910–1929, 2021.
|
2268 |
+
[11] X. Zhong, X. Qu, C. Ding, and D. Tao, “Glance and gaze: Inferring
|
2269 |
+
action-aware points for one-stage human-object interaction detec-
|
2270 |
+
tion,” in Proceedings of the IEEE/CVF Conference on Computer Vision
|
2271 |
+
and Pattern Recognition, pp. 13234–13243, 2021.
|
2272 |
+
[12] C. Gao, J. Xu, Y. Zou, and J.-B. Huang, “Drg: Dual relation graph
|
2273 |
+
for human-object interaction detection,” in European Conference on
|
2274 |
+
Computer Vision, pp. 696–712, Springer, 2020.
|
2275 |
+
[13] O. Ulutan, A. Iftekhar, and B. S. Manjunath, “Vsgnet: Spatial
|
2276 |
+
attention network for detecting human object interactions using
|
2277 |
+
graph convolutions,” in Proceedings of the IEEE/CVF conference on
|
2278 |
+
computer vision and pattern recognition, pp. 13617–13626, 2020.
|
2279 |
+
[14] C. Gao, Y. Zou, and J.-B. Huang, “ican: Instance-centric attention
|
2280 |
+
network for human-object interaction detection,” arXiv preprint
|
2281 |
+
arXiv:1808.10437, 2018.
|
2282 |
+
[15] T. Wang, T. Yang, M. Danelljan, F. S. Khan, X. Zhang, and J. Sun,
|
2283 |
+
“Learning human-object interaction detection using interaction
|
2284 |
+
points,” in Proceedings of the IEEE/CVF Conference on Computer
|
2285 |
+
Vision and Pattern Recognition, pp. 4116–4125, 2020.
|
2286 |
+
[16] A. Zhang, Y. Liao, S. Liu, M. Lu, Y. Wang, C. Gao, and X. Li, “Min-
|
2287 |
+
ing the benefits of two-stage and one-stage hoi detection,” Ad-
|
2288 |
+
vances in Neural Information Processing Systems, vol. 34, pp. 17209–
|
2289 |
+
17220, 2021.
|
2290 |
+
[17] C. Zou, B. Wang, Y. Hu, J. Liu, Q. Wu, Y. Zhao, B. Li, C. Zhang,
|
2291 |
+
C. Zhang, Y. Wei, et al., “End-to-end human object interaction
|
2292 |
+
detection with hoi transformer,” in Proceedings of the IEEE/CVF
|
2293 |
+
conference on computer vision and pattern recognition, pp. 11825–
|
2294 |
+
11834, 2021.
|
2295 |
+
|
2296 |
+
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 10, JANUARY 2023
|
2297 |
+
15
|
2298 |
+
[18] F. Z. Zhang, D. Campbell, and S. Gould, “Spatially condi-
|
2299 |
+
tioned graphs for detecting human-object interactions,” in Proceed-
|
2300 |
+
ings of the IEEE/CVF International Conference on Computer Vision,
|
2301 |
+
pp. 13319–13327, 2021.
|
2302 |
+
[19] M. Tamura, H. Ohashi, and T. Yoshinaga, “Qpic: Query-based
|
2303 |
+
pairwise human-object interaction detection with image-wide con-
|
2304 |
+
textual information,” in Proceedings of the IEEE/CVF Conference on
|
2305 |
+
Computer Vision and Pattern Recognition, pp. 10410–10419, 2021.
|
2306 |
+
[20] Y.-L. Li, S. Zhou, X. Huang, L. Xu, Z. Ma, H.-S. Fang, Y. Wang, and
|
2307 |
+
C. Lu, “Transferable interactiveness knowledge for human-object
|
2308 |
+
interaction detection,” in Proceedings of the IEEE/CVF Conference on
|
2309 |
+
Computer Vision and Pattern Recognition, pp. 3585–3594, 2019.
|
2310 |
+
[21] G. Gkioxari, R. Girshick, P. Doll´ar, and K. He, “Detecting and
|
2311 |
+
recognizing human-object interactions,” in Proceedings of the IEEE
|
2312 |
+
conference on computer vision and pattern recognition, pp. 8359–8367,
|
2313 |
+
2018.
|
2314 |
+
[22] Y.-W. Chao, Y. Liu, X. Liu, H. Zeng, and J. Deng, “Learning to
|
2315 |
+
detect human-object interactions,” in 2018 ieee winter conference on
|
2316 |
+
applications of computer vision (wacv), pp. 381–389, IEEE, 2018.
|
2317 |
+
[23] T. Gupta, A. Schwing, and D. Hoiem, “No-frills human-object
|
2318 |
+
interaction detection: Factorization, layout encodings, and training
|
2319 |
+
techniques,” in Proceedings of the IEEE/CVF International Conference
|
2320 |
+
on Computer Vision, pp. 9677–9685, 2019.
|
2321 |
+
[24] B. Wan, D. Zhou, Y. Liu, R. Li, and X. He, “Pose-aware multi-
|
2322 |
+
level feature network for human object interaction detection,” in
|
2323 |
+
Proceedings of the IEEE/CVF International Conference on Computer
|
2324 |
+
Vision, pp. 9469–9478, 2019.
|
2325 |
+
[25] A. Bansal, S. S. Rambhatla, A. Shrivastava, and R. Chellappa, “De-
|
2326 |
+
tecting human-object interactions via functional generalization,”
|
2327 |
+
in Proceedings of the AAAI Conference on Artificial Intelligence, vol. 34,
|
2328 |
+
pp. 10460–10469, 2020.
|
2329 |
+
[26] H.-S. Fang, Y. Xu, W. Wang, X. Liu, and S.-C. Zhu, “Learning pose
|
2330 |
+
grammar to encode human body configuration for 3d pose estima-
|
2331 |
+
tion,” in Proceedings of the AAAI conference on artificial intelligence,
|
2332 |
+
vol. 32, 2018.
|
2333 |
+
[27] H.-S. Fang, G. Lu, X. Fang, J. Xie, Y.-W. Tai, and C. Lu, “Weakly
|
2334 |
+
and semi supervised human body part parsing via pose-guided
|
2335 |
+
knowledge transfer,” arXiv preprint arXiv:1805.04310, 2018.
|
2336 |
+
[28] Y. Xiu, J. Li, H. Wang, Y. Fang, and C. Lu, “Pose flow: Efficient
|
2337 |
+
online pose tracking,” arXiv preprint arXiv:1802.00977, 2018.
|
2338 |
+
[29] S. Qi, W. Wang, B. Jia, J. Shen, and S.-C. Zhu, “Learning human-
|
2339 |
+
object interactions by graph parsing neural networks,” in Proceed-
|
2340 |
+
ings of the European conference on computer vision (ECCV), pp. 401–
|
2341 |
+
417, 2018.
|
2342 |
+
[30] B. Kim, T. Choi, J. Kang, and H. J. Kim, “Uniondet: Union-level
|
2343 |
+
detector towards real-time human-object interaction detection,”
|
2344 |
+
in European Conference on Computer Vision, pp. 498–514, Springer,
|
2345 |
+
2020.
|
2346 |
+
[31] Y. Liao, S. Liu, F. Wang, Y. Chen, C. Qian, and J. Feng, “Ppdm:
|
2347 |
+
Parallel point detection and matching for real-time human-object
|
2348 |
+
interaction detection,” in Proceedings of the IEEE/CVF Conference on
|
2349 |
+
Computer Vision and Pattern Recognition, pp. 482–490, 2020.
|
2350 |
+
[32] N. Carion, F. Massa, G. Synnaeve, N. Usunier, A. Kirillov, and
|
2351 |
+
S. Zagoruyko, “End-to-end object detection with transformers,” in
|
2352 |
+
European conference on computer vision, pp. 213–229, Springer, 2020.
|
2353 |
+
[33] J. Chen and K. Yanai, “Qahoi: Query-based anchors for human-
|
2354 |
+
object interaction detection,” arXiv preprint arXiv:2112.08647, 2021.
|
2355 |
+
[34] X. Zhu, W. Su, L. Lu, B. Li, X. Wang, and J. Dai, “Deformable detr:
|
2356 |
+
Deformable transformers for end-to-end object detection,” arXiv
|
2357 |
+
preprint arXiv:2010.04159, 2020.
|
2358 |
+
[35] Y. Bengio, P. Lamblin, D. Popovici, and H. Larochelle, “Greedy
|
2359 |
+
layer-wise training of deep networks,” Advances in neural informa-
|
2360 |
+
tion processing systems, vol. 19, 2006.
|
2361 |
+
[36] G. E. Hinton, S. Osindero, and Y.-W. Teh, “A fast learning al-
|
2362 |
+
gorithm for deep belief nets,” Neural computation, vol. 18, no. 7,
|
2363 |
+
pp. 1527–1554, 2006.
|
2364 |
+
[37] B. Kang, S. Xie, M. Rohrbach, Z. Yan, A. Gordo, J. Feng, and
|
2365 |
+
Y. Kalantidis, “Decoupling representation and classifier for long-
|
2366 |
+
tailed recognition,” arXiv preprint arXiv:1910.09217, 2019.
|
2367 |
+
[38] Y.-W. Chao, Y. Liu, X. Liu, H. Zeng, and J. Deng, “Learning to
|
2368 |
+
detect human-object interactions,” in 2018 ieee winter conference on
|
2369 |
+
applications of computer vision (wacv), pp. 381–389, IEEE, 2018.
|
2370 |
+
[39] S. Gupta and J. Malik, “Visual semantic role labeling,” arXiv e-
|
2371 |
+
prints, 2015.
|
2372 |
+
[40] F. Scarselli, M. Gori, A. C. Tsoi, M. Hagenbuchner, and G. Mon-
|
2373 |
+
fardini, “The graph neural network model,” IEEE transactions on
|
2374 |
+
neural networks, vol. 20, no. 1, pp. 61–80, 2008.
|
2375 |
+
[41] A. Vaswani, N. Shazeer, N. Parmar, J. Uszkoreit, L. Jones, A. N.
|
2376 |
+
Gomez, Ł. Kaiser, and I. Polosukhin, “Attention is all you need,”
|
2377 |
+
Advances in neural information processing systems, vol. 30, 2017.
|
2378 |
+
[42] Y. LeCun, Y. Bengio, et al., “Convolutional networks for images,
|
2379 |
+
speech, and time series,” The handbook of brain theory and neural
|
2380 |
+
networks, vol. 3361, no. 10, p. 1995, 1995.
|
2381 |
+
[43] Z. Liu, Y. Lin, Y. Cao, H. Hu, Y. Wei, Z. Zhang, S. Lin, and B. Guo,
|
2382 |
+
“Swin transformer: Hierarchical vision transformer using shifted
|
2383 |
+
windows,” in Proceedings of the IEEE/CVF International Conference
|
2384 |
+
on Computer Vision, pp. 10012–10022, 2021.
|
2385 |
+
[44] X. Chen, F. Wei, G. Zeng, and J. Wang, “Conditional detr v2:
|
2386 |
+
Efficient detection transformer with box queries,” arXiv preprint
|
2387 |
+
arXiv:2207.08914, 2022.
|
2388 |
+
[45] Y. Wang, X. Zhang, T. Yang, and J. Sun, “Anchor detr: Query
|
2389 |
+
design for transformer-based detector,” in Proceedings of the AAAI
|
2390 |
+
conference on artificial intelligence, vol. 36, pp. 2567–2575, 2022.
|
2391 |
+
[46] S. Liu, F. Li, H. Zhang, X. Yang, X. Qi, H. Su, J. Zhu, and L. Zhang,
|
2392 |
+
“Dab-detr: Dynamic anchor boxes are better queries for detr,”
|
2393 |
+
arXiv preprint arXiv:2201.12329, 2022.
|
2394 |
+
[47] G. Zhang, Z. Luo, Y. Yu, K. Cui, and S. Lu, “Accelerating detr
|
2395 |
+
convergence via semantic-aligned matching,” in Proceedings of the
|
2396 |
+
IEEE/CVF Conference on Computer Vision and Pattern Recognition,
|
2397 |
+
pp. 949–958, 2022.
|
2398 |
+
[48] K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for
|
2399 |
+
image recognition,” in Proceedings of the IEEE conference on computer
|
2400 |
+
vision and pattern recognition, pp. 770–778, 2016.
|
2401 |
+
[49] F. Iandola, M. Moskewicz, S. Karayev, R. Girshick, T. Darrell, and
|
2402 |
+
K. Keutzer, “Densenet: Implementing efficient convnet descriptor
|
2403 |
+
pyramids,” arXiv preprint arXiv:1404.1869, 2014.
|
2404 |
+
[50] A. Newell, K. Yang, and J. Deng, “Stacked hourglass networks for
|
2405 |
+
human pose estimation,” in European conference on computer vision,
|
2406 |
+
pp. 483–499, Springer, 2016.
|
2407 |
+
[51] X. Dong, J. Bao, D. Chen, W. Zhang, N. Yu, L. Yuan, D. Chen, and
|
2408 |
+
B. Guo, “Cswin transformer: A general vision transformer back-
|
2409 |
+
bone with cross-shaped windows,” in Proceedings of the IEEE/CVF
|
2410 |
+
Conference on Computer Vision and Pattern Recognition, pp. 12124–
|
2411 |
+
12134, 2022.
|
2412 |
+
[52] J. Yang, C. Li, P. Zhang, X. Dai, B. Xiao, L. Yuan, and J. Gao, “Focal
|
2413 |
+
self-attention for local-global interactions in vision transformers,”
|
2414 |
+
arXiv preprint arXiv:2107.00641, 2021.
|
2415 |
+
[53] Z. Xia, X. Pan, S. Song, L. E. Li, and G. Huang, “Vision transformer
|
2416 |
+
with deformable attention,” in Proceedings of the IEEE/CVF Con-
|
2417 |
+
ference on Computer Vision and Pattern Recognition, pp. 4794–4803,
|
2418 |
+
2022.
|
2419 |
+
[54] H. Wu, B. Xiao, N. Codella, M. Liu, X. Dai, L. Yuan, and L. Zhang,
|
2420 |
+
“Cvt: Introducing convolutions to vision transformers,” in Proceed-
|
2421 |
+
ings of the IEEE/CVF International Conference on Computer Vision,
|
2422 |
+
pp. 22–31, 2021.
|
2423 |
+
[55] A. Dosovitskiy, L. Beyer, A. Kolesnikov, D. Weissenborn, X. Zhai,
|
2424 |
+
T. Unterthiner, M. Dehghani, M. Minderer, G. Heigold, S. Gelly,
|
2425 |
+
et al., “An image is worth 16x16 words: Transformers for image
|
2426 |
+
recognition at scale,” arXiv preprint arXiv:2010.11929, 2020.
|
2427 |
+
[56] C.-F. Chen, R. Panda, and Q. Fan, “Regionvit: Regional-to-local
|
2428 |
+
attention for vision transformers,” arXiv preprint arXiv:2106.02689,
|
2429 |
+
2021.
|
2430 |
+
[57] Y. Wang, R. Huang, S. Song, Z. Huang, and G. Huang, “Not all
|
2431 |
+
images are worth 16x16 words: Dynamic transformers for efficient
|
2432 |
+
image recognition,” Advances in Neural Information Processing Sys-
|
2433 |
+
tems, vol. 34, pp. 11960–11973, 2021.
|
2434 |
+
[58] K. He, G. Gkioxari, P. Doll´ar, and R. Girshick, “Mask r-cnn,” in
|
2435 |
+
Proceedings of the IEEE international conference on computer vision,
|
2436 |
+
pp. 2961–2969, 2017.
|
2437 |
+
[59] X. Dai, Y. Chen, B. Xiao, D. Chen, M. Liu, L. Yuan, and L. Zhang,
|
2438 |
+
“Dynamic head: Unifying object detection heads with attentions,”
|
2439 |
+
in Proceedings of the IEEE/CVF conference on computer vision and
|
2440 |
+
pattern recognition, pp. 7373–7382, 2021.
|
2441 |
+
[60] H. Law and J. Deng, “Cornernet: Detecting objects as paired
|
2442 |
+
keypoints,” in Proceedings of the European conference on computer
|
2443 |
+
vision (ECCV), pp. 734–750, 2018.
|
2444 |
+
[61] T.-Y. Lin, P. Goyal, R. Girshick, K. He, and P. Doll´ar, “Focal loss
|
2445 |
+
for dense object detection,” in Proceedings of the IEEE international
|
2446 |
+
conference on computer vision, pp. 2980–2988, 2017.
|
2447 |
+
[62] Y.-L. Li, L. Xu, X. Liu, X. Huang, Y. Xu, S. Wang, H.-S. Fang,
|
2448 |
+
Z. Ma, M. Chen, and C. Lu, “Pastanet: Toward human activity
|
2449 |
+
knowledge engine,” in Proceedings of the IEEE/CVF Conference on
|
2450 |
+
Computer Vision and Pattern Recognition, pp. 382–391, 2020.
|
2451 |
+
|
2452 |
+
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 10, JANUARY 2023
|
2453 |
+
16
|
2454 |
+
[63] Y.-W. Chao, Z. Wang, Y. He, J. Wang, and J. Deng, “Hico: A
|
2455 |
+
benchmark for recognizing human-object interactions in images,”
|
2456 |
+
in Proceedings of the IEEE international conference on computer vision,
|
2457 |
+
pp. 1017–1025, 2015.
|
2458 |
+
[64] I. Loshchilov and F. Hutter, “Decoupled weight decay regulariza-
|
2459 |
+
tion,” arXiv preprint arXiv:1711.05101, 2017.
|
2460 |
+
|
D9E2T4oBgHgl3EQfogh1/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
D9FKT4oBgHgl3EQfZi4o/content/tmp_files/2301.11803v1.pdf.txt
ADDED
@@ -0,0 +1,2097 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Asymptotics in an Asymptotic CFT
|
2 |
+
Lucas Schepersa1 and Daniel C. Thompsona,b2
|
3 |
+
a Department of Physics, Swansea University,
|
4 |
+
Swansea SA2 8PP, United Kingdom
|
5 |
+
b Theoretische Natuurkunde, Vrije Universiteit Brussel,
|
6 |
+
& The International Solvay Institutes, Pleinlaan 2, B-1050 Brussels, Belgium
|
7 |
+
Abstract
|
8 |
+
In this work we illustrate the resurgent structure of the λ-deformation; a two-
|
9 |
+
dimensional integrable quantum field theory that has an RG flow with an SU(N)k
|
10 |
+
Wess-Zumino-Witten conformal fixed point in the UV. To do so we use modern
|
11 |
+
matched asymptotic techniques applied to the thermodynamic Bethe ansatz formu-
|
12 |
+
lation to compute the free energy to 38 perturbative orders in an expansion of large
|
13 |
+
applied chemical potential. We find numerical evidence for factorial asymptotic be-
|
14 |
+
haviour with both alternating and non-alternating character which we match to
|
15 |
+
an analytic expression. A curiosity of the system is that it exhibits the Cheshire
|
16 |
+
Cat phenomenon with the leading non-alternating factorial growth vanishing when
|
17 |
+
k divides N. The ambiguities associated to Borel resummation of this series are
|
18 |
+
suggestive of non-perturbative contributions.
|
19 |
+
This is verified with an analytic
|
20 |
+
study of the TBA system demonstrating a cancellation between perturbative and
|
21 |
+
non-perturbative ambiguities.
|
22 | |
23 | |
24 |
+
arXiv:2301.11803v1 [hep-th] 27 Jan 2023
|
25 |
+
|
26 |
+
1
|
27 |
+
Introduction
|
28 |
+
A complete understanding of the strong coupling dynamics of four dimensional asymp-
|
29 |
+
totically free (AF) non-supersymmetric gauge theory, i.e. QCD, remains elusive. To
|
30 |
+
gain a foothold we may turn to simplified toy models. One strategy is to reduce the
|
31 |
+
dimensionality of the problem considering instead two dimensional quantum field the-
|
32 |
+
ories with similar RG behaviour. In the special case of integrable QFTs, an infinite set
|
33 |
+
of symmetries completely determine the exact S-matrix [1] providing a powerful toolkit
|
34 |
+
that can be used to tackle non-perturbative questions. An early success of this approach
|
35 |
+
was the calculation of the exact ratio of the mass gap to cut-off of AF integrable QFTs
|
36 |
+
theories [2–5].
|
37 |
+
More recently, techniques in integrable models have been used to elucidate even
|
38 |
+
deeper questions of the nature of perturbation theory. Typically, perturbation theory is
|
39 |
+
asymptotic in nature with perturbative coefficients growing factorially. The programme
|
40 |
+
of resurgence asserts that this breakdown of convergence signals the need to include
|
41 |
+
non-perturbative physics. Even more strongly, ambiguities inherent in resummations of
|
42 |
+
asymptotic perturbative expansions should be cancelled by compensating ambiguities
|
43 |
+
in a non-perturbative sector. For a modern overview of resurgence from a physics view
|
44 |
+
point see e.g. [6]. Again, integrable two-dimensional models provide an ideal test bed
|
45 |
+
for resurgence.
|
46 |
+
In semi-classical approaches [7–12], an adiabatic compactification of two-dimension
|
47 |
+
models is used to obtain a quantum mechanics which can be probed to large perturbative
|
48 |
+
orders. In these cases, two-dimensional finite Euclidean action configurations, known as
|
49 |
+
unitons1 are shown to precisely resolve the semi-classical ambiguities of the perturbative
|
50 |
+
sector. Whilst intriguing, such approaches intrinsically disregard degrees of freedom in
|
51 |
+
compactification restricting to the lowest KK sector. Alongside this features of renorm-
|
52 |
+
alisation group are disregarded in the truncation to Quantum Mechanics. Given these
|
53 |
+
limitations, one thus prompted to ask if the resurgence paradigm can be established in
|
54 |
+
a fully two-dimensional setting.
|
55 |
+
A breakthrough was the work of Volin [13, 14], recently refined in [15, 16] (see also the
|
56 |
+
recent papers [17–25]), in addressing the Thermodynamic Bethe Ansatz (TBA) system
|
57 |
+
that determines free energy in a large chemical potential. By comparing two scaling
|
58 |
+
limits, it is possible to reduce the complicated integral TBA equation to a (complicated)
|
59 |
+
set of algebraic equations that fix unknown coefficients in an ansatz for a perturbative
|
60 |
+
expansion (in the chemical potential or other more refined coupling). This allows access
|
61 |
+
to sufficient order in perturbation theory to reveal factorial divergence of perturbative
|
62 |
+
coefficients.
|
63 |
+
Although we cannot identify an instanton or other semi-classical non-perturbative
|
64 |
+
saddle in the TBA approach, we can find a matching ambiguity using a different method.
|
65 |
+
[26] showed that it is possible to solve the TBA equations using a transseries. A critical
|
66 |
+
step in their solution is an arbitrary choice of branch cut which introduces an ambiguity
|
67 |
+
of the transseries. Although this approach, due to its computational difficulty, cannot
|
68 |
+
be executed to large orders, it does exhibit a non-perturbative ambiguity that matches
|
69 |
+
the ambiguity of the large-order behaviour found in the perturbative sector.
|
70 |
+
In this note we will adopt this toolbox to study the resurgent structure of a theory
|
71 |
+
that exhibits a different renormalisation group dynamic. We consider a theory in which
|
72 |
+
the UV is not Gaussian but instead is described by a non-trivial interacting conformal
|
73 |
+
fixed point. The theory we will consider, known as the λ-model [27, 28], is realised as a
|
74 |
+
flow away from an SU(N)k Wess-Zumino-Witten (WZW) model driven at leading order
|
75 |
+
by a certain current-current bilinear. The IR of the theory is the principal chiral model,
|
76 |
+
expressed in non-Abelian T-dual coordinates, and accordingly is gapped. Whilst this
|
77 |
+
1Unlike instantons, unitons are not topologically protected.
|
78 |
+
1
|
79 |
+
|
80 |
+
marginally relevant deformation breaks conformality and the full affine symmetry of the
|
81 |
+
WZW current algebra, it does preserve an infinite symmetry associated to integrablity.
|
82 |
+
At the quantum level the exact S-matrix is known (based on symmetry grounds pre-
|
83 |
+
dating the Lagrangian description) [29, 30] and has been shown to match the λ-model
|
84 |
+
Lagrangian using a light cone lattice discretisation and Quantum Inverse Scattering [31].
|
85 |
+
The goal of this note is to match the perturbative ambiguity to that of the transseries
|
86 |
+
the new context of a λ-model. The outline is as follows: Section 2 provides a more in-
|
87 |
+
depth discussion of the λ-model as we consider its RG flow in more detail and present
|
88 |
+
its exact S-matrix. In Section 3, we review the recent techniques to perturbatively solve
|
89 |
+
TBA equation [13–16] that determine free energy.
|
90 |
+
Introducing a special coupling γ
|
91 |
+
in Section 3.4 results in a clean (i.e. log-free) series for the λ-model. We analyse its
|
92 |
+
asymptotic behaviour in Section 4 and compute the leading ambiguity. This ambiguity
|
93 |
+
is matched by a transseries calculation in Section 5. A particularly eye-catching result
|
94 |
+
is that the leading UV ambiguity disappears when N divides k. We wrap up with ideas
|
95 |
+
for future research in Section 6.
|
96 |
+
2
|
97 |
+
The λ-Model
|
98 |
+
In this section we outline the salient properties of the two-dimensional integrable QFT
|
99 |
+
that we are considering: the λ-deformed model. Classically, the λ-model provides a
|
100 |
+
Lagrangian interpolation between the conformal Wess-Zumino-Witten (WZW) model
|
101 |
+
for a Lie-group G [32] and the principal chiral model (PCM) (written in non-Abelian
|
102 |
+
T-dual variables). Remarkably this theory is integrable for all values of the eponymous
|
103 |
+
interpolating parameter λ related to the level, k, of WZW and the radius, r, of the PCM
|
104 |
+
by
|
105 |
+
λ =
|
106 |
+
k
|
107 |
+
k + r2 .
|
108 |
+
(1)
|
109 |
+
Whilst the λ-model for the restricted case of G = SU(2) was first proposed long ago
|
110 |
+
[29, 33, 34], the pioneering work of Sfetsos [27] in constructing the general theory has
|
111 |
+
prompted extensive recent development (for reviews see [35, 36]). The λ-model has been
|
112 |
+
extended to Z2 graded symmetric spaces [27, 37] where it constitutes an interpolation
|
113 |
+
between a G/H gauged WZW (representing the coset CFT) and the (non-abelian T-dual
|
114 |
+
of) the principal chiral model on G/H and even to Z4 graded super-cosets relevant to
|
115 |
+
the construction of the AdS5 × S5 superstring [38] underpinned by an elegant quantum
|
116 |
+
group at root-of-unity symmetry structure. In this string theory context, λ-deformation
|
117 |
+
is in fact marginal, and the world sheet theory can be viewed as a σ-model in some
|
118 |
+
target space super-gravity background [39–41]. Here however we will be considering the
|
119 |
+
simpler bosonic case for which the λ-deformation does not define a CFT but rather a
|
120 |
+
relevant RG flow from a WZW fixed point in the UV to the dualised PCM the IR [28,
|
121 |
+
42, 43]. A series of papers [44–48] have shown how the λ-model is actually part of a wide
|
122 |
+
tapestry of integrable deformed models linked by (analytically continued) Poisson-Lie
|
123 |
+
T-duality transformations.
|
124 |
+
2.1
|
125 |
+
Lagrangian Construction
|
126 |
+
First we sketch the construction of the non-abelian T-dual of the PCM using the Buscher
|
127 |
+
procedure [49] as it informs the construction of the λ-model. We start with the action
|
128 |
+
2
|
129 |
+
|
130 |
+
of the PCM for a group valued field ˜g 2
|
131 |
+
SPCM[˜g] = − r2
|
132 |
+
4π
|
133 |
+
�
|
134 |
+
d2σ Tr
|
135 |
+
�
|
136 |
+
˜g−1∂+˜g˜g−1∂−˜g
|
137 |
+
�
|
138 |
+
,
|
139 |
+
(2)
|
140 |
+
and downgrade the left symmetry ˜g → h−1˜g to a gauge symmetry by introducing a
|
141 |
+
gauge connection transforming as A → h−1dh + h−1Ah and replacing derivatives to
|
142 |
+
covariant derivatives d → D = d + A. This yields the gauged PCM action which we
|
143 |
+
denote as SgPCM[˜g, A]. To ensure that the gauged theory is actually equivalent to the
|
144 |
+
ungauged theory (at least in trivial topology which we assume throughout) we enforce
|
145 |
+
that the connection is flat (i.e. the gauge field is pure gauge). This is implemented by
|
146 |
+
introducing a Lagrange-multiplier term, − Tr(νF+−), to the Lagrangian. Integrating
|
147 |
+
out the field ν enforces that the field strength F+− vanishes and we recover the original
|
148 |
+
PCM after gauge-fixing ˜g = 1. However, if instead we integrate out the gauge fields A,
|
149 |
+
after gauge fixing ˜g = 1, we obtain the non-abelian T-dual model in which the field ν
|
150 |
+
becomes the fundamental field.
|
151 |
+
The construction of the λ-model by Sfetsos [27] is achieved through a modification of
|
152 |
+
this Buscher procedure. Instead of adding a Lagrange multiplier term, we add a gauged
|
153 |
+
WZW term. Recall that the WZW model is given by
|
154 |
+
SWZW,k[g] = − k
|
155 |
+
2π
|
156 |
+
�
|
157 |
+
Σ
|
158 |
+
d2σ Tr
|
159 |
+
�
|
160 |
+
g−1∂µgg−1∂µg
|
161 |
+
�
|
162 |
+
− ik
|
163 |
+
6��
|
164 |
+
�
|
165 |
+
M3
|
166 |
+
Tr
|
167 |
+
�
|
168 |
+
g−1dg
|
169 |
+
�3 ,
|
170 |
+
(3)
|
171 |
+
in which g is extended to a 3-manifold M3 with boundary ∂(M3) = Σ.
|
172 |
+
Standard
|
173 |
+
arguments [32] ensure that the path integral is well-defined (independent of choice of
|
174 |
+
extension) provided that k is appropriately quantised, and in particular for G = SU(N)
|
175 |
+
which we assume henceforth, k ∈ Z. In this sector we gauge the diagonal symmetry
|
176 |
+
g → h−1gh leading to a gauged WZW model action SgWZW,k[g, A] [50, 51].
|
177 |
+
To construct the λ-model we combine a gauged PCM and a gauged WZW model:
|
178 |
+
Sλ,k[g, ˜g, A] = SgPCM[˜g, A] + SgWZW[g, A] .
|
179 |
+
(4)
|
180 |
+
Notice that the two models are coupled through the fact that they are gauged by the
|
181 |
+
same gauge field. The Sfetsos procedure is concluded by gauge fixing ˜g = 1 and integ-
|
182 |
+
rating out the gauge field A using its on-shell value
|
183 |
+
A+ = λ(1 − λAdg)−1R+ ,
|
184 |
+
A− = −λ(1 − λAdg−1)−1L− ,
|
185 |
+
(5)
|
186 |
+
where we defined R± = ∂±gg−1 and L± = g−1∂±g and the adjoint action AdgX =
|
187 |
+
gXg−1. Integrating out the gauge field then yields the action
|
188 |
+
Sλ,k[g] = SWZW,k[g] + kλ
|
189 |
+
π
|
190 |
+
�
|
191 |
+
Σ
|
192 |
+
d2σ Tr
|
193 |
+
�
|
194 |
+
R+(1 − λAdg)−1L−
|
195 |
+
�
|
196 |
+
.
|
197 |
+
(6)
|
198 |
+
Though not vital for what follows we note that the equation of motion can be understood
|
199 |
+
as a zero-curvature condition on the Lax connection [27, 52]
|
200 |
+
L±(z) = −
|
201 |
+
2
|
202 |
+
1 + λ
|
203 |
+
A±
|
204 |
+
1 ∓ z ,
|
205 |
+
(7)
|
206 |
+
in which A± are evaluated with the on-shell values eq. (5) and z ∈ C is a spectral
|
207 |
+
parameter. This is the starting point of establishing the classical integrability of the
|
208 |
+
theory. Further to this one requires strong integrability i.e. that the conserved charges
|
209 |
+
built from the monodromy of this Lax are in involution. This is ensured provided that
|
210 |
+
the Poisson algebra of the spatial component of the Lax has a particular r-s Maillet form
|
211 |
+
as was demonstrated for the λ-model, and its generalisations, in [47, 53, 54].
|
212 |
+
2We use light cone coordinates σ± = 1
|
213 |
+
2 (t ± x). Derivatives with respect to light cone coordinates
|
214 |
+
are denoted by ∂±.
|
215 |
+
3
|
216 |
+
|
217 |
+
2.2
|
218 |
+
Renormalisation
|
219 |
+
The parameter λ given by eq. (1) varies from 0 to 1 and we shall now discuss what
|
220 |
+
happens in each of those limits. At a quantum level the parameter λ undergoes an RG
|
221 |
+
flow [28, 42, 43] given by (to all orders in λ and leading in 1
|
222 |
+
k)
|
223 |
+
µdλ
|
224 |
+
dµ = β(λ) = −2N
|
225 |
+
k
|
226 |
+
�
|
227 |
+
λ
|
228 |
+
1 + λ
|
229 |
+
�2
|
230 |
+
= −β1λ2 − β2λ3 + O(λ4) .
|
231 |
+
(8)
|
232 |
+
The leading order behaviour, which shall be relevant later, is given by
|
233 |
+
β1 = 2N
|
234 |
+
k ,
|
235 |
+
β2 = −4N
|
236 |
+
k .
|
237 |
+
(9)
|
238 |
+
There is an evident UV fixed point at λ = 0, corresponding to the undeformed WZW
|
239 |
+
model. In the vicinity of this λ ≈ 0, or k ≪ r2, we obtain a current-current deformation
|
240 |
+
of the WZW model:
|
241 |
+
Sλ,k[g] = SWZW,k[g] + λ
|
242 |
+
�
|
243 |
+
Σ
|
244 |
+
d2σ Tr (R+L−) + O(λ2) ,
|
245 |
+
(10)
|
246 |
+
This, however, is not a marginal deformation (cf. marginal ones [55]), but relevant as it
|
247 |
+
moves away from the WZW theory located in the UV.
|
248 |
+
To understand the IR regime as λ → 1, we can force k → ∞. If the group element
|
249 |
+
is expanded as g = 1 + i
|
250 |
+
kνata, the action SgWZW,k reduces to the Lagrange multiplier
|
251 |
+
term − Tr(νF+−). Thus in this limit the Sfetsos procedure reduces to the non-Abelian
|
252 |
+
T-dualisation Buscher procedure described above. Hence, in this IR limit, we recover the
|
253 |
+
non-abelian T-dual of the PCM. Further into the deep IR, one thus anticipates (as with
|
254 |
+
the PCM) that the dimensionless parameter λ is transmuted into a mass gap mediated
|
255 |
+
through a cut-off Λ.
|
256 |
+
2.3
|
257 |
+
Quantum Integrability
|
258 |
+
Not only is the theory classical integrable, it remains so at the quantum level. The
|
259 |
+
existence of higher spin conserved currents ensure that the scattering matrix of the
|
260 |
+
theory factorises, and can be fully determined with the 2-to-2 particle scattering matrix
|
261 |
+
the fundamental building block. The S-matrix for the SU(N) λ-model was constructed
|
262 |
+
many years ago [56] from an algebraic perspective, and was related directly to the
|
263 |
+
Lagrangian description for the SU(2) case in [29] by matching the free energy obtained
|
264 |
+
by Lagrangian perturbation theory and by S-matrix TBA techniques. Following the
|
265 |
+
introduction of the Lagrangian description λ-model by Sfetsos [27] for SU(N) the exact
|
266 |
+
S-matrix was conjectured [52] for general ranks. This conjecture was substantiated by
|
267 |
+
Appadu et al. [31] in which the form of the S-matrix was ‘derived’ by the Quantum
|
268 |
+
Inverse Scattering Method (i.e. a latticed version of the theory that takes the form of a
|
269 |
+
spin chain such from the QFT particle states are obtained as excitations over the ground
|
270 |
+
state in a continuum limit)3. Rather than present the full details of the S-matrix (for
|
271 |
+
which see [52]) we can give a schematic understanding somewhat mirroring the Sfetsos
|
272 |
+
procedure.
|
273 |
+
3This QISM is in fact rather non-trivial as the δ′(σ) non-ultra-local terms in the fundamental Poisson
|
274 |
+
bracket preclude a simple application of QISM. Instead what is proposed is a modification of the
|
275 |
+
λ-model, that lies in the same universality class, to which QISM can be applied.
|
276 |
+
This provides a
|
277 |
+
description as a spin-k XXX spin chain with alternating inhomogeneities.
|
278 |
+
This idea was expanded
|
279 |
+
to a two-parameter integrable λ-type model [57] realised as a spin-k XXZ spin chain with alternating
|
280 |
+
inhomogeneities.
|
281 |
+
4
|
282 |
+
|
283 |
+
We start with the SU(N) principal chiral model which has in particular an SU(N)L×
|
284 |
+
SU(N)R global symmetry. The fundamental particles are massive and transform in fun-
|
285 |
+
damental antisymmetric tensor representations of the global symmetry. The scattering
|
286 |
+
depends kinematically only on the rapidity difference θ of the particles4. Reflecting this
|
287 |
+
global symmetry, the S-matrix of these fundamental excitations has a schematic tensor
|
288 |
+
form (suppressing explicit representation labels)
|
289 |
+
SPCM(θ) = X(θ)S(θ) ⊗ S(θ) ,
|
290 |
+
(11)
|
291 |
+
where X(θ) is an overall scalar dressing factor to ensure all S-matrix axioms are obeyed,
|
292 |
+
and the S(θ) factors are separately SU(N) invariant (in fact invariant under a larger
|
293 |
+
Yangian symmetry). Recalling that in the Sfetsos procedure the left acting SU(N)L
|
294 |
+
symmetry was gauged, it is natural that the left hand block of the tensor product of eq.
|
295 |
+
(11) is modified in the λ-theory and indeed this is the case with
|
296 |
+
Sλ(θ) = Xk(θ)Sk(θ) ⊗ S(θ) .
|
297 |
+
(12)
|
298 |
+
Here Sk(θ) is a block [56] that furnishes a quantum group symmetry at the q2(k+N) = 1
|
299 |
+
root of unity taken in Restricted-Solid-On-Solid (RSOS) picture representing the scat-
|
300 |
+
tering of kink degrees of freedom.
|
301 |
+
Given knowledge of the exact S-matrix, the Thermodynamic Bethe Ansatz yields
|
302 |
+
a set of rather complicated coupled-integral equations can be used to determine the
|
303 |
+
free-energy of the theory. Solving these is quite formidable especially as the S-matrix is
|
304 |
+
non-diagonal. A powerful simplification is achieved by exposing the system to a chemical
|
305 |
+
potential h for a U(1) charge such that only certain particles condense and contribute
|
306 |
+
to the ground state. When the charge is chosen appropriately (as the one defined by
|
307 |
+
a highest weight of a rank N/2 antisymmetric representation [31]) then only a single
|
308 |
+
particle of maximal charge contributes and the TBA system simplifies to a single integral
|
309 |
+
equation determined by the identical scattering of this particle.
|
310 |
+
In this case, the scattering “matrix” reduces to a simple phase factor S(θ) that
|
311 |
+
governs transmission and reflection.
|
312 |
+
It shall prove useful in this case to define the
|
313 |
+
scattering kernel of this reduced S-matrix by
|
314 |
+
K(θ) =
|
315 |
+
1
|
316 |
+
2πi
|
317 |
+
d
|
318 |
+
dθ log S(θ) ,
|
319 |
+
(13)
|
320 |
+
and its Fourier transform
|
321 |
+
K(ω) =
|
322 |
+
� ∞
|
323 |
+
−∞
|
324 |
+
dθ eiωθK(θ) .
|
325 |
+
(14)
|
326 |
+
As a consequence of Hermitian analyticity on the reduced S-matrix, both K(θ) and its
|
327 |
+
Fourier transform are symmetric functions. Explicitly we have that the relevant kernel
|
328 |
+
is given by [57]
|
329 |
+
1 − K(ω) =
|
330 |
+
sinh2(πω/2)
|
331 |
+
sinh(πω) sinh(πκω) exp(πκω) ,
|
332 |
+
(15)
|
333 |
+
where κ =
|
334 |
+
k
|
335 |
+
N . In what follows, it shall prove useful to write the Fourier transform of
|
336 |
+
the scattering kernel as a Wiener-Hopf (WH) decomposition
|
337 |
+
1 − K(ω) =
|
338 |
+
1
|
339 |
+
G+(ω)G−(ω) ,
|
340 |
+
(16)
|
341 |
+
where G−(ω) = G+(−ω), and G+(ω) is analytic in the Upper Half Plane (UHP) and
|
342 |
+
normalised such that G+(2is) = 1 + O
|
343 |
+
�
|
344 |
+
1
|
345 |
+
s
|
346 |
+
�
|
347 |
+
. Explicitly G+(ω) is given by
|
348 |
+
G+(ω) =
|
349 |
+
√
|
350 |
+
4κ
|
351 |
+
Γ(1 − iω/2)2
|
352 |
+
Γ(1 − iω)Γ(1 − iκω) exp (ibω − iκω log(−iω)) ,
|
353 |
+
(17)
|
354 |
+
4The mass shell is related to rapidity by p0 = m cosh θ and p1 = m sinh θ.
|
355 |
+
5
|
356 |
+
|
357 |
+
with
|
358 |
+
b = κ(1 − log(κ)) − log(2) .
|
359 |
+
(18)
|
360 |
+
3
|
361 |
+
TBA Techniques
|
362 |
+
Polyakov and Wiegmann [58–60] showed in the 80s that it is possible to compute the free
|
363 |
+
energy of an integrable system with a chemical potential h turned on using a thermody-
|
364 |
+
namic Bethe ansatz (TBA) technique. Using these techniques, Hasenfratz, Niedermayer
|
365 |
+
and Maggiore [2, 3] showed in 19905 that it is possible to calculate the mass gap in
|
366 |
+
integrable models by comparing the result from TBA with conventional Lagrangian
|
367 |
+
pertubation theory. Building from this we will will apply, in section 3.4, the techniques
|
368 |
+
pioneered by [13–16] to extract an expansion for the free energy of λ-model in
|
369 |
+
1
|
370 |
+
h the
|
371 |
+
large order behaviour of which we will study extensively in section 4.
|
372 |
+
3.1
|
373 |
+
Free Energy
|
374 |
+
To present the TBA equations we will specialise to the case described above in which we
|
375 |
+
introduce a chemical potential h such that only a single particle dominates the ensemble
|
376 |
+
at large h.6 With K(θ) the appropriate scattering kernel, the TBA equations determine
|
377 |
+
the density distribution of states, χ(θ), via
|
378 |
+
m cosh(θ) = χ(θ) −
|
379 |
+
� B
|
380 |
+
−B
|
381 |
+
K(θ − θ′)χ(θ′)dθ′ ,
|
382 |
+
θ2 < B2 ,
|
383 |
+
(19)
|
384 |
+
from which the charge and energy density follow
|
385 |
+
e = m
|
386 |
+
� −B
|
387 |
+
B
|
388 |
+
χ(θ) cosh(θ) dθ
|
389 |
+
2π ,
|
390 |
+
ρ =
|
391 |
+
� −B
|
392 |
+
B
|
393 |
+
χ(θ) dθ
|
394 |
+
2π .
|
395 |
+
(20)
|
396 |
+
A critical complexity of this system is that the occupied states lie within a Fermi surface
|
397 |
+
specified by B, which is however a function of h (with large B corresponding to large
|
398 |
+
h). Supposing that we have calculated the energy density, thought of as a function of
|
399 |
+
the charge density e = e(ρ), then we can reconstruct a free energy density, F(h), from
|
400 |
+
a Legendre transform:
|
401 |
+
ρ = −F′(h) ,
|
402 |
+
F(h) − F(0) = e(ρ) − ρh .
|
403 |
+
(21)
|
404 |
+
3.2
|
405 |
+
Resolvent Approach
|
406 |
+
It will prove useful to recast the integral equation that determines χ(θ) in terms of a
|
407 |
+
resolvent function defined by
|
408 |
+
R(θ) =
|
409 |
+
� B
|
410 |
+
−B
|
411 |
+
χ(θ′)
|
412 |
+
θ − θ′ dθ′.
|
413 |
+
(22)
|
414 |
+
5This computation was intially performed for the O(N) model, but was later also completed for
|
415 |
+
Gross-Neveu models [4, 5] and PCM models [61, 62].
|
416 |
+
6That we can reduce the TBA system to involve just one species of particle from the fundamental
|
417 |
+
representation singled out by the applied chemical potential is of course an assumption that makes the
|
418 |
+
problem readily tractable. One anticipates that states of higher mass and higher charge are energetically
|
419 |
+
disfavoured, but properly speaking this assumption ought to be proven starting from a complete nested
|
420 |
+
TBA system (which we do not attempt here).
|
421 |
+
6
|
422 |
+
|
423 |
+
The resolvent is analytical everywhere except around the interval [−B, B] where it has
|
424 |
+
an ambiguity given by
|
425 |
+
χ(θ) = − 1
|
426 |
+
2πi
|
427 |
+
�
|
428 |
+
R+(θ) − R−(θ)
|
429 |
+
�
|
430 |
+
,
|
431 |
+
(23)
|
432 |
+
where we use the short hand notation R±(θ) = R(θ ± iϵ). Suppose that the kernel can
|
433 |
+
be cast in terms of some operator O as K(θ) =
|
434 |
+
1
|
435 |
+
2πiO 1
|
436 |
+
θ, then the eq. (19) is equivalent
|
437 |
+
to a Riemann-Hilbert problem
|
438 |
+
R+(θ) − R−(θ) + OR(θ) = −2πim cosh θ .
|
439 |
+
(24)
|
440 |
+
A determination of R(θ) is then equivalent to solving the TBA system and once known
|
441 |
+
the charge density is immediately extracted as
|
442 |
+
ρ = − 1
|
443 |
+
2π Resθ=∞R(θ) .
|
444 |
+
(25)
|
445 |
+
We briefly now review the approach of [13–15] which does so by considering ansatz
|
446 |
+
solutions for the resolvent in two limits (the edge and bulk) and matching them to fix
|
447 |
+
all undetermined coefficients.
|
448 |
+
3.2.1
|
449 |
+
Edge Ansatz
|
450 |
+
We begin first with the edge limit in which the weak coupling limit B → ∞ is taken
|
451 |
+
whilst keeping an edge coordinate z = 2(θ −B) fixed and small. This evidently scales to
|
452 |
+
large θ and hence probes the properties of χ(θ) around the vicinity of the Fermi energy,
|
453 |
+
B. This limit is best studied by considering the Laplace transform of the resolvent (22)
|
454 |
+
given by
|
455 |
+
R(z) =
|
456 |
+
� ∞
|
457 |
+
0
|
458 |
+
�R(s)e−szds ,
|
459 |
+
�R(s) =
|
460 |
+
1
|
461 |
+
2πi
|
462 |
+
� i∞+δ
|
463 |
+
−i∞+δ
|
464 |
+
eszR(z)dz .
|
465 |
+
(26)
|
466 |
+
Note at large B the energy density is related to this Laplace transformation by
|
467 |
+
e = meB
|
468 |
+
4π
|
469 |
+
�R(1/2) .
|
470 |
+
(27)
|
471 |
+
The key result of [15, 16] is that in the edge limit the Laplace transformed resolvent
|
472 |
+
has the following form
|
473 |
+
�R(s) = meBΦ(s)Φ
|
474 |
+
� 1
|
475 |
+
2
|
476 |
+
�
|
477 |
+
2
|
478 |
+
�
|
479 |
+
1
|
480 |
+
s + 1/2 + Q(s)
|
481 |
+
�
|
482 |
+
,
|
483 |
+
Φ(s) = G+(2is) ,
|
484 |
+
(28)
|
485 |
+
where G+(s) is the WH decomposition (16) of the (Fourier transformed) scattering
|
486 |
+
kernel and Q(s) is a series in large s and a perturbative expansion in
|
487 |
+
1
|
488 |
+
B of the form
|
489 |
+
Q(s) = 1
|
490 |
+
Bs
|
491 |
+
∞
|
492 |
+
�
|
493 |
+
m,n=0
|
494 |
+
Qn,m
|
495 |
+
Bm+nsn .
|
496 |
+
(29)
|
497 |
+
It should be noted that the coefficients Qn,m may still depend on log B.
|
498 |
+
3.2.2
|
499 |
+
Bulk Ansatz
|
500 |
+
In the bulk limit we let B → ∞ and θ → ∞ but we keep u = θ/B fixed, we are hence
|
501 |
+
studying the regime where θ is in the bulk, between 0 and B. The precise form of the
|
502 |
+
7
|
503 |
+
|
504 |
+
Bulk ansatz depends on the model. For the λ-model, we shall take the same bulk ansatz
|
505 |
+
for the Gross-Neveu model [15], which is given by
|
506 |
+
R(u) =
|
507 |
+
∞
|
508 |
+
�
|
509 |
+
n=1
|
510 |
+
∞
|
511 |
+
�
|
512 |
+
m=0
|
513 |
+
n+m
|
514 |
+
�
|
515 |
+
k=0
|
516 |
+
cn,m,k
|
517 |
+
ue(k+1)
|
518 |
+
Bm+n(u2 − 1)n
|
519 |
+
�
|
520 |
+
log u − 1
|
521 |
+
1 + u
|
522 |
+
�k
|
523 |
+
,
|
524 |
+
(30)
|
525 |
+
where e(k) is 0 if k is even and 1 if k is odd.The bulk ansatz can be motivated by
|
526 |
+
constructing it using functions that are analytic outside the interval [−B, B], where
|
527 |
+
they have a logarithmic branch cut.7 This is precisely the analytic structure demanded
|
528 |
+
by eqs. (22) and (23).
|
529 |
+
3.3
|
530 |
+
Matching
|
531 |
+
If we re-expand the bulk ansatz (30) in an edge regime where z = 2(θ − B) is fixed, we
|
532 |
+
should recover the expansion in the edge regime given by (28). Here a miraculous feature
|
533 |
+
occurs: upon comparing expansions order by order in large B, then order by order in
|
534 |
+
large z (which is small s) and then in log(z), we can solve for all the coefficients cn,m,k
|
535 |
+
and Qn,m. One peculiarity of the procedure is that we perform this matching only for
|
536 |
+
the regular terms of the expansion z−n (n ≥ 0), while we disregard all divergent terms
|
537 |
+
zn (n > 0). Using a desktop PC, over the course of a week, we solved the system up
|
538 |
+
to 38 orders. Once this calculation is completed, we compute e and ρ. Using equations
|
539 |
+
(28) and (25) we can express ρ and e in terms of the coefficients by
|
540 |
+
e = m2e2BΦ(1/2)2
|
541 |
+
8π
|
542 |
+
�
|
543 |
+
1 +
|
544 |
+
∞
|
545 |
+
�
|
546 |
+
m=1
|
547 |
+
1
|
548 |
+
Bm
|
549 |
+
m−1
|
550 |
+
�
|
551 |
+
n=0
|
552 |
+
2n+1Qn,m−1−n
|
553 |
+
�
|
554 |
+
,
|
555 |
+
ρ = 2π
|
556 |
+
∞
|
557 |
+
�
|
558 |
+
m=0
|
559 |
+
c1,m,0
|
560 |
+
Bm .
|
561 |
+
(31)
|
562 |
+
Explicitly the first few coefficients required to determine up to order B−2 are given by
|
563 |
+
c1,0,0 = 4√κ ,
|
564 |
+
c1,1,0 = −2κ3/2 ,
|
565 |
+
c1,2,0 = 1
|
566 |
+
2κ3/2(2 − κ − 4 log 2 + 4κ log(2B/κ)) ,
|
567 |
+
Q0,0 = 0 ,
|
568 |
+
Q1,0 = 0 ,
|
569 |
+
Q0,1 = κ
|
570 |
+
4 .
|
571 |
+
(32)
|
572 |
+
The last step is to calculate the quantity
|
573 |
+
e
|
574 |
+
ρ2 as an expansion in B the first terms of
|
575 |
+
which are
|
576 |
+
8κ
|
577 |
+
π
|
578 |
+
e
|
579 |
+
ρ2 = 1 + κ
|
580 |
+
B + κ
|
581 |
+
B2
|
582 |
+
�
|
583 |
+
1 − log(2) + κ
|
584 |
+
2 + κ log(2B/κ)
|
585 |
+
�
|
586 |
+
+ O(B−3) .
|
587 |
+
(33)
|
588 |
+
As this result depends on log(B), it is convenient to define a new effective coupling γ in
|
589 |
+
terms of which the perturbative expansion is free from logarithms as we shall do in the
|
590 |
+
next section.
|
591 |
+
3.4
|
592 |
+
Perturbative result
|
593 |
+
Before introducing the log-free coupling, we show our results are consistent with those
|
594 |
+
of [31], which determines the mass gap of this theory. Using standard TBA techniques,
|
595 |
+
7This is different from the PCM bulk ansatz which also has a square root branch cut along the
|
596 |
+
interval [−B, B].
|
597 |
+
8
|
598 |
+
|
599 |
+
they find an expansion for the free energy given by
|
600 |
+
F(h) − F(0) = −2h2κ
|
601 |
+
π
|
602 |
+
�
|
603 |
+
1 − 2κα + 2κα2�
|
604 |
+
2 + κ + log 4 + +2κ log κ + 2κ log α
|
605 |
+
�
|
606 |
+
− 8κ2α3 log(α)
|
607 |
+
�
|
608 |
+
(−2 + 2κ + log 4 + 2κ log(κ) + κ log(α)
|
609 |
+
�
|
610 |
+
+ O(α3)
|
611 |
+
�
|
612 |
+
.
|
613 |
+
(34)
|
614 |
+
The coupling α is here defined by
|
615 |
+
1
|
616 |
+
α = 2 log
|
617 |
+
�
|
618 |
+
2h
|
619 |
+
m
|
620 |
+
�
|
621 |
+
8κ
|
622 |
+
π
|
623 |
+
�
|
624 |
+
.
|
625 |
+
(35)
|
626 |
+
By using the Legendre transformation (21) we can compute the total energy e from eq.
|
627 |
+
(34). Doing so, we obtain the expression
|
628 |
+
8κ
|
629 |
+
π
|
630 |
+
e
|
631 |
+
ρ2 =1 + 2ακ − 2κα2(2κ log(ακ) − κ − 2 + log(4))+
|
632 |
+
8κ2α3�
|
633 |
+
κ log2(α) + (log(α) − 1)(−2 log(4) + 2κ log(κ))
|
634 |
+
�
|
635 |
+
+ O
|
636 |
+
�
|
637 |
+
α4�
|
638 |
+
.
|
639 |
+
(36)
|
640 |
+
From eq. (33), it follows that
|
641 |
+
e
|
642 |
+
ρ2 = χ0 + O(α) where χ0 =
|
643 |
+
π
|
644 |
+
8κ. Therefore to leading
|
645 |
+
order we have h = ∂e
|
646 |
+
∂ρ = 2χ0ρ, which leads to ρ = 4hκ
|
647 |
+
π . Looking at eq. (35), we should
|
648 |
+
thus define a coupling by
|
649 |
+
1
|
650 |
+
α = 2 log
|
651 |
+
�
|
652 |
+
ρ
|
653 |
+
m
|
654 |
+
�
|
655 |
+
2π
|
656 |
+
κ
|
657 |
+
�
|
658 |
+
.
|
659 |
+
(37)
|
660 |
+
This defines α in terms of B. Inverting the relation and substituting into the series (33)
|
661 |
+
recovers precisely the expansion (36), providing an important consistency check for our
|
662 |
+
programme.
|
663 |
+
We now take inspiration from the Gross-Neveu treatment of [15] to create a series
|
664 |
+
expansions for
|
665 |
+
e
|
666 |
+
ρ2 that is log-free. This is appropriate because we have that to leading
|
667 |
+
order ∆F ∼ −h2 + O(α), which leads to a coupling defined by8
|
668 |
+
1
|
669 |
+
γ + ξ log γ = log 2πρ
|
670 |
+
m/c ,
|
671 |
+
ξ = β2
|
672 |
+
β2
|
673 |
+
1
|
674 |
+
= − k
|
675 |
+
N = −κ .
|
676 |
+
(38)
|
677 |
+
One could demand that the right hand side be log 2πρ
|
678 |
+
ΛMS , where ΛMS is the cut-off in
|
679 |
+
the minimal subtraction scheme. To achieve this one has to tune the constant c = cMS
|
680 |
+
such that cMSΛMS = m. A key outcome of [31] determines that cMS = e3/2N −1/2.
|
681 |
+
However, we shall exercise the freedom to pick a c of our own choosing,
|
682 |
+
c = 2−κΓ(κ)
|
683 |
+
π
|
684 |
+
,
|
685 |
+
(39)
|
686 |
+
such that resulting expressions appear considerably simplified. This leads to an expan-
|
687 |
+
sion that is log-free in the coupling, given by
|
688 |
+
8κ
|
689 |
+
π
|
690 |
+
e
|
691 |
+
ρ2 =
|
692 |
+
∞
|
693 |
+
�
|
694 |
+
n=0
|
695 |
+
anγn = 1 + κγ + κ
|
696 |
+
2 [2 − κ]γ2+
|
697 |
+
κ
|
698 |
+
2
|
699 |
+
�
|
700 |
+
3 − 5κ + 2κ2�
|
701 |
+
γ3 + κ
|
702 |
+
8
|
703 |
+
�
|
704 |
+
3(8 − ζ(3)) − 61κ + 52κ2 − 15κ3�
|
705 |
+
γ4+
|
706 |
+
κ
|
707 |
+
12
|
708 |
+
�
|
709 |
+
90 − 18ζ(3) + κ(33ζ(3) − 288) + 355κ2 − 203κ3 + 46κ4�
|
710 |
+
γ5+
|
711 |
+
κ
|
712 |
+
32
|
713 |
+
�
|
714 |
+
45(16 − 4ζ(3) − ζ(5)) + 2κ(259ζ(3) − 1338) + 1
|
715 |
+
3κ2(12274 − 1329ζ(3))
|
716 |
+
− 3285κ3 + 1412κ4 − 787κ5
|
717 |
+
3
|
718 |
+
�
|
719 |
+
γ6 + O(γ7) .
|
720 |
+
(40)
|
721 |
+
8This is in contrast to the PCM calculation where the free energy has a structure ∆F ∼ − h2
|
722 |
+
α +O(α0),
|
723 |
+
which leads to a coupling 1
|
724 |
+
γ + (ξ − 1) log γ ∝ log ρ.
|
725 |
+
9
|
726 |
+
|
727 |
+
Figure 1: Left to right, for κ = 0.98, 1 and 1.02, the Borel-Pad´e-poles in the ζ-plane.
|
728 |
+
Evident are singularities at ζ = ±2, with the positive pole removed for κ = 1.
|
729 |
+
In the next Section we shall explore this perturbative expansion further.
|
730 |
+
4
|
731 |
+
Asymptotic Analysis
|
732 |
+
In this Section, we will quantitatively analyse the 38 orders of the perturbative series
|
733 |
+
obtained in the previous Section. The goal shall be to compute an asymptotic formula
|
734 |
+
for the growth of the coefficients as a function of κ. After obtaining such a formula, we
|
735 |
+
can compute its Borel ambiguity, which can later be compared against an ambiguity of
|
736 |
+
a transseries.
|
737 |
+
As the perturbative series can readily be seen to exhibit factorial growth, as a first
|
738 |
+
step to resummation we introduce the Borel transform
|
739 |
+
B
|
740 |
+
�8κ
|
741 |
+
π
|
742 |
+
e
|
743 |
+
ρ
|
744 |
+
2�
|
745 |
+
≡
|
746 |
+
∞
|
747 |
+
�
|
748 |
+
n=0
|
749 |
+
an
|
750 |
+
n! ζn .
|
751 |
+
(41)
|
752 |
+
This series has a finite radius of convergence but typically has either, or both, poles
|
753 |
+
and branch cuts. The pole/branch point closest to the origin in the ζ plane is governed
|
754 |
+
by the leading asymptotic behaviour.
|
755 |
+
Of course, numerically one does not have all
|
756 |
+
orders with which to establish this Borel transformation, rather only a finite number
|
757 |
+
of coefficients an for n < N say. Here the Borel-Pad´e method can be employed: we
|
758 |
+
compute BN[ 8κ
|
759 |
+
π
|
760 |
+
e
|
761 |
+
ρ
|
762 |
+
2] = �N
|
763 |
+
n=0
|
764 |
+
an
|
765 |
+
n! ζn = P (ζ)
|
766 |
+
Q(ζ) + O(ζ)N+1 in which P and Q are polynomials
|
767 |
+
in ζ of degree N/2. This results in a picture in which an accumulation of poles (i.e.
|
768 |
+
zeros of Q) is indicative of a branch point. We perform this numerically for various
|
769 |
+
values of κ and generically we find evidence of branch points at ζ = ±2 whose location
|
770 |
+
is independent of κ except that for κ ∈ Z>0 the pole in the positive axis is removed -
|
771 |
+
see Figure 1. Pole/ branch points in the negative real axis of the Borel plane indicate
|
772 |
+
contributions to an of alternating sign whereas the contributions to an that result in
|
773 |
+
poles on the positive axis would have the same sign. Here the analysis indicates that we
|
774 |
+
have both. With 38 perturbative coefficients this analysis should only be regarded as
|
775 |
+
indicative but is sufficient to inform an educated guess as to the asymptotic behaviour
|
776 |
+
of the an which we will robustly verify below.
|
777 |
+
Motivated by the Borel-Pad´e analysis we assume the coefficients grow, to leading
|
778 |
+
approximation, as
|
779 |
+
an ≈ A+Γ(n + 1)/Sn + A−Γ(n + 1)/(−S)n + O(n−1) .
|
780 |
+
(42)
|
781 |
+
A first verification is to establish the factor S which can be done noting that
|
782 |
+
g+,n :=
|
783 |
+
a2n
|
784 |
+
2n(2n − 1)a2n−2
|
785 |
+
≈ 1
|
786 |
+
S2 ,
|
787 |
+
g−,n :=
|
788 |
+
a2n+1
|
789 |
+
2n(2n − 1)a2n−1
|
790 |
+
≈ 1
|
791 |
+
S2 .
|
792 |
+
(43)
|
793 |
+
10
|
794 |
+
|
795 |
+
4
|
796 |
+
2
|
797 |
+
-2
|
798 |
+
2
|
799 |
+
4
|
800 |
+
.4
|
801 |
+
-24
|
802 |
+
2
|
803 |
+
-2
|
804 |
+
2
|
805 |
+
4
|
806 |
+
4
|
807 |
+
.24
|
808 |
+
2
|
809 |
+
-2
|
810 |
+
2
|
811 |
+
4
|
812 |
+
.4
|
813 |
+
-2Figure 2: The series g+,n (left) and g−,n (right) given by eq. (43) displayed for κ = 0.6.
|
814 |
+
Circle markers indicate the raw data, square markers the second Richardson transform-
|
815 |
+
ation with accelerated convergence. The final values of the second Richardson transform
|
816 |
+
differ by 0.11% and 0.05% respectively from the expected value 1
|
817 |
+
4.
|
818 |
+
We find, see Figure 2, that the series g±,n converge to 1
|
819 |
+
4, independent of κ thus estab-
|
820 |
+
lishing S = 2 in accordance with the expectation from the Borel-Pad´e analysis.
|
821 |
+
Having established the factorially growing character of the perturbative series, we
|
822 |
+
now propose a more refined ansatz for the an. Our central claim can be summarised
|
823 |
+
by stating that the perturbative series has coefficients that have a leading large order
|
824 |
+
behaviour as
|
825 |
+
an ≈ A+
|
826 |
+
2n
|
827 |
+
∞
|
828 |
+
�
|
829 |
+
l=0
|
830 |
+
β+
|
831 |
+
l Γ(n + a+ − l) +
|
832 |
+
A−
|
833 |
+
(−2)n
|
834 |
+
∞
|
835 |
+
�
|
836 |
+
l=0
|
837 |
+
β−
|
838 |
+
l Γ(n + a− − l) ,
|
839 |
+
(44)
|
840 |
+
where we normalise β±
|
841 |
+
0 = 1 and the first few coefficients are
|
842 |
+
a± = ∓2κ ,
|
843 |
+
A± = 8±1
|
844 |
+
π
|
845 |
+
sin(∓κ)Γ(±κ)
|
846 |
+
Γ(∓κ) = −
|
847 |
+
8±1
|
848 |
+
Γ(∓κ)Γ(1 ∓ κ) ,
|
849 |
+
β−
|
850 |
+
1 = −β−
|
851 |
+
2 = −4κ .
|
852 |
+
(45)
|
853 |
+
To support these claims, we shall define the auxiliary series
|
854 |
+
cn =
|
855 |
+
2n
|
856 |
+
Γ(n + 1)an ,
|
857 |
+
(46)
|
858 |
+
to take care of the leading factorial and geometric growth. We project to the alternating
|
859 |
+
and non-alternating parts of the series by considering
|
860 |
+
f ±
|
861 |
+
k = c2k ± c2k−1 ,
|
862 |
+
(47)
|
863 |
+
which have asymptotics
|
864 |
+
f ±
|
865 |
+
n = 2A±(2n)a±−1�
|
866 |
+
1 + O
|
867 |
+
� 1
|
868 |
+
n
|
869 |
+
��
|
870 |
+
,
|
871 |
+
(48)
|
872 |
+
such that the sequences
|
873 |
+
σ±
|
874 |
+
n = 1 + n log f ±
|
875 |
+
n+1
|
876 |
+
f ±
|
877 |
+
n
|
878 |
+
,
|
879 |
+
(49)
|
880 |
+
converge to a±. With a± determined one can then directly consider the asymptotics of
|
881 |
+
f ± to establish A±. Figure 3 illustrates the convergence of this procedure for a fixed
|
882 |
+
11
|
883 |
+
|
884 |
+
+.n
|
885 |
+
0.30r
|
886 |
+
0.28
|
887 |
+
O
|
888 |
+
0.26
|
889 |
+
boo
|
890 |
+
0.24
|
891 |
+
0.22
|
892 |
+
0.20
|
893 |
+
5
|
894 |
+
10
|
895 |
+
15
|
896 |
+
0
|
897 |
+
20g-,n
|
898 |
+
0.30r
|
899 |
+
0.28
|
900 |
+
0.26
|
901 |
+
0000000
|
902 |
+
口
|
903 |
+
0.24
|
904 |
+
口
|
905 |
+
0.22
|
906 |
+
口
|
907 |
+
0.20
|
908 |
+
5
|
909 |
+
10
|
910 |
+
15
|
911 |
+
0Figure 3: The series σ−
|
912 |
+
n (left) converges to a− using (49). Using eq. (48) we display
|
913 |
+
(right) the sequence that converges to A−. Circle markers indicate the raw data, square
|
914 |
+
markers the second Richardson transformation. For both, we display results for κ = 0.9.
|
915 |
+
The second Richardson transform converge to the expected results given by eq (45) up
|
916 |
+
to errors of 0.011% and 0.00068% respectively.
|
917 |
+
Figure 4: The second Richardson transformation of the sequences (49) (left) and (48)
|
918 |
+
(right) to determine a± and A± as functions of κ. a+, A+ are indicated by red crosses
|
919 |
+
and a−, A+ by blue points with solid lines showing the analytic formula of eq. (45).
|
920 |
+
value of κ, and Figure 4 establishes the functional form of these coefficients for various
|
921 |
+
values of κ.
|
922 |
+
A methodological subtlety is that, from empirical observation, the contributions from
|
923 |
+
the alternating sector, i.e.
|
924 |
+
A− (and associated subleading terms), are dominant for
|
925 |
+
κ > 0 over those of the non-alternating A+ sector. Thus to extract the non-alternating
|
926 |
+
contributions we first establish the leading alternating contribution as described above
|
927 |
+
and then repeat the process working instead with a new series in which the leading
|
928 |
+
alternating contribution has been subtracted. However, when κ becomes sufficiently
|
929 |
+
large, the sub-leading alternating contribution becomes comparable to that of the leading
|
930 |
+
non-alternating contribution. This limits the reliability of determination numerically of
|
931 |
+
the A+, a+ coefficients to small values of κ. However, these coefficients can be more
|
932 |
+
readily verified by continuing to the κ < 0 regime where they are more dominant.
|
933 |
+
Having determined in this fashion the leading contributions to an, these can then be
|
934 |
+
subtracted from the data, the analysis repeated mutatis mutandis, to determine the sub-
|
935 |
+
leading βk coefficients (and again for similar reasons to the above the β−
|
936 |
+
k coefficients are
|
937 |
+
more readily extracted). Figure 5 gives the numerical form of β−
|
938 |
+
1 and β−
|
939 |
+
2 as a function
|
940 |
+
of κ indicating a linear relationship.
|
941 |
+
It becomes somewhat challenging to extract further subleading contributions from
|
942 |
+
the data available. However, one can consider defining a new series, ˜an, comprised by
|
943 |
+
taking the data set and subtracting the already established asymptotic form of eq. (45).
|
944 |
+
12
|
945 |
+
|
946 |
+
n
|
947 |
+
2.00
|
948 |
+
1.95
|
949 |
+
1.90
|
950 |
+
O
|
951 |
+
1.85
|
952 |
+
1.80
|
953 |
+
666660
|
954 |
+
口
|
955 |
+
1.75
|
956 |
+
口
|
957 |
+
口
|
958 |
+
1.70
|
959 |
+
1.65
|
960 |
+
1.60
|
961 |
+
0
|
962 |
+
5
|
963 |
+
10
|
964 |
+
15A.
|
965 |
+
-0.08r
|
966 |
+
-0.10
|
967 |
+
-0.12
|
968 |
+
-0.14
|
969 |
+
-0.16
|
970 |
+
5
|
971 |
+
10
|
972 |
+
15
|
973 |
+
20
|
974 |
+
0a at
|
975 |
+
4
|
976 |
+
2
|
977 |
+
K
|
978 |
+
.3
|
979 |
+
-2
|
980 |
+
2
|
981 |
+
3
|
982 |
+
-264A- A+
|
983 |
+
-2
|
984 |
+
2
|
985 |
+
-6
|
986 |
+
8Figure 5: The sub-leading coefficient β−
|
987 |
+
1 (left) and β−
|
988 |
+
2 (right) for various values of κ.
|
989 |
+
Shown is the terminal value of the second Richardson Transformation of the sequence
|
990 |
+
that gives β−
|
991 |
+
n constructed from fn after subtraction of leading alternating and non-
|
992 |
+
alternating asymptotics.
|
993 |
+
Grey lines correspond to β−
|
994 |
+
1
|
995 |
+
= −4κ and β−
|
996 |
+
2
|
997 |
+
= +4κ.
|
998 |
+
A
|
999 |
+
noticeable drift in β−
|
1000 |
+
2 for larger values of κ suggests pollution from further sub-dominant
|
1001 |
+
terms contributing at this order of perturbation theory.
|
1002 |
+
Figure 6: After subtracting the leading alternating and non-alternating contributions,
|
1003 |
+
we again perform a Borel-Pad´e computation for κ = −0.75 (left) and κ = 0.4 (right).
|
1004 |
+
This seems to suggest that there is no longer a Borel singularity at ζ = 2, but instead
|
1005 |
+
finding one at ζ = 4.
|
1006 |
+
Using the Borel-Pad´e again to this subtracted series produces some evidence, see Figure
|
1007 |
+
6, of a compelling feature. Instead of poles at ζ = ±2, as would be anticipated should
|
1008 |
+
the ansatz (44), one finds that leading positive pole appears to be at ζ = +4. The
|
1009 |
+
interpretation here is that the subtraction has removed the entire non-alternating terms
|
1010 |
+
with behaviour 2−n, suggesting that all fluctuations β+
|
1011 |
+
n>0 = 0 and the next contribution
|
1012 |
+
comes with twice the “action” 4−n.
|
1013 |
+
This behaviour is in accordance with the Parisi-’t Hooft conjecture [63–65]; the
|
1014 |
+
leading poles in the Borel plane at ζ = ±2 lie at integer values and the values of
|
1015 |
+
a± = ∓2κ = ±2ξ are as expected (see [15]).9
|
1016 |
+
The pole at ζ = +2 is accordingly
|
1017 |
+
interpreted as an IR renormalon.
|
1018 |
+
A similar procedure of subtraction (removing the
|
1019 |
+
IR renormalon) used above (in Figure 6) was performed in [26] to expose new Borel
|
1020 |
+
renormalon poles that were not in accordance with Parisi-’t Hooft in cases including e.g.
|
1021 |
+
the Gross-Neveu model. Here however, Figure 6 indicates that the next most proximate
|
1022 |
+
IR renormalon pole is found in a location that are consistent with Parisi-’t Hooft.
|
1023 |
+
9We thank M Mari˜no and T Reis for illuminating us on this point.
|
1024 |
+
13
|
1025 |
+
|
1026 |
+
β1-
|
1027 |
+
K
|
1028 |
+
0.5
|
1029 |
+
1.0
|
1030 |
+
1.5
|
1031 |
+
2.0
|
1032 |
+
2.5
|
1033 |
+
3.0
|
1034 |
+
-2
|
1035 |
+
-4
|
1036 |
+
-6
|
1037 |
+
-8
|
1038 |
+
-10
|
1039 |
+
.12β2
|
1040 |
+
12
|
1041 |
+
10
|
1042 |
+
8
|
1043 |
+
6
|
1044 |
+
4
|
1045 |
+
2
|
1046 |
+
0.5
|
1047 |
+
1.0
|
1048 |
+
1.5
|
1049 |
+
2.0
|
1050 |
+
2.5
|
1051 |
+
3.02
|
1052 |
+
.2
|
1053 |
+
2
|
1054 |
+
6
|
1055 |
+
22
|
1056 |
+
2
|
1057 |
+
65
|
1058 |
+
Transseries and Ambiguity Cancellation
|
1059 |
+
In this section we compute the leading ambiguity of
|
1060 |
+
e
|
1061 |
+
ρ2 in two different ways. First,
|
1062 |
+
we calculate the Borel ambiguity of the large order behaviour of the perturbative sector
|
1063 |
+
established in 4. This is compared against an approach which solves the TBA system
|
1064 |
+
in terms of a transseries.
|
1065 |
+
5.1
|
1066 |
+
Borel resummation and Large Order Perturbative Ambigu-
|
1067 |
+
ity
|
1068 |
+
Naively, one could try to resum the original asymptotic series by performing a Laplace
|
1069 |
+
transform on the Borel transform (41)
|
1070 |
+
1
|
1071 |
+
γ
|
1072 |
+
� ∞
|
1073 |
+
0
|
1074 |
+
B
|
1075 |
+
�8κ
|
1076 |
+
π
|
1077 |
+
e
|
1078 |
+
ρ2
|
1079 |
+
�
|
1080 |
+
e−ζ/γdζ = 1
|
1081 |
+
γ
|
1082 |
+
� ∞
|
1083 |
+
0
|
1084 |
+
∞
|
1085 |
+
�
|
1086 |
+
n=0
|
1087 |
+
an
|
1088 |
+
n! ζne−ζ/γ ≃
|
1089 |
+
∞
|
1090 |
+
�
|
1091 |
+
n=0
|
1092 |
+
anγn = 8κ
|
1093 |
+
π
|
1094 |
+
e
|
1095 |
+
ρ2 .
|
1096 |
+
(50)
|
1097 |
+
However, as we have seen, the Borel transform B
|
1098 |
+
�
|
1099 |
+
8κ
|
1100 |
+
π
|
1101 |
+
e
|
1102 |
+
ρ2
|
1103 |
+
�
|
1104 |
+
generically has singularities
|
1105 |
+
along the positive real axis obstructing the contour of this integral. Therefore, we shall
|
1106 |
+
introduce a directional Borel resummation given by
|
1107 |
+
Sθ
|
1108 |
+
�8κ
|
1109 |
+
π
|
1110 |
+
e
|
1111 |
+
ρ2
|
1112 |
+
�
|
1113 |
+
= 1
|
1114 |
+
γ
|
1115 |
+
� eiθ∞
|
1116 |
+
0
|
1117 |
+
B
|
1118 |
+
�8κ
|
1119 |
+
π
|
1120 |
+
e
|
1121 |
+
ρ2
|
1122 |
+
�
|
1123 |
+
e−ζ/γdζ .
|
1124 |
+
(51)
|
1125 |
+
This procedure results, when integrating along a line without singularities, in a finite
|
1126 |
+
answer, which however, depends on the sign of θ, i.e.
|
1127 |
+
there is an ambiguity in the
|
1128 |
+
resummation of the perturbative series. This ambiguity, which is a Stokes phenomenon,
|
1129 |
+
is studied by considering S+ϵ − S−ϵ. This can be done analytically by using, instead of
|
1130 |
+
the numerically obtained results, a series whose coefficients are exactly the asymptotic
|
1131 |
+
form an given by eq. (44) for all values of n:
|
1132 |
+
(S+ϵ − S−ϵ)
|
1133 |
+
�8κ
|
1134 |
+
π
|
1135 |
+
e
|
1136 |
+
ρ2
|
1137 |
+
�
|
1138 |
+
(γ) = 2πiA+
|
1139 |
+
� 2
|
1140 |
+
γ
|
1141 |
+
�a+
|
1142 |
+
e−2/γ
|
1143 |
+
∞
|
1144 |
+
�
|
1145 |
+
k=0
|
1146 |
+
β+
|
1147 |
+
k
|
1148 |
+
�γ
|
1149 |
+
2
|
1150 |
+
�k
|
1151 |
+
= −
|
1152 |
+
16πi
|
1153 |
+
Γ(−κ)Γ(1 − κ)
|
1154 |
+
�γ
|
1155 |
+
2
|
1156 |
+
�2κ
|
1157 |
+
e−2/γ[1 + O(γ)] .
|
1158 |
+
(52)
|
1159 |
+
Similarly, across the negative real axis we find a leading ambiguity given by
|
1160 |
+
(Sπ+ϵ − Sπ−ϵ)
|
1161 |
+
�8κ
|
1162 |
+
π
|
1163 |
+
e
|
1164 |
+
ρ2
|
1165 |
+
�
|
1166 |
+
(γ) = 2πiA−
|
1167 |
+
�
|
1168 |
+
− 2
|
1169 |
+
γ
|
1170 |
+
�a−
|
1171 |
+
e2/γ
|
1172 |
+
∞
|
1173 |
+
�
|
1174 |
+
k=0
|
1175 |
+
β−
|
1176 |
+
k
|
1177 |
+
�
|
1178 |
+
− z
|
1179 |
+
2
|
1180 |
+
�k
|
1181 |
+
= −
|
1182 |
+
πi
|
1183 |
+
4Γ(κ)Γ(1 + κ)
|
1184 |
+
�
|
1185 |
+
−γ
|
1186 |
+
2
|
1187 |
+
�−2κ
|
1188 |
+
e2/γ[1 + O(γ)] .
|
1189 |
+
(53)
|
1190 |
+
In these expressions we note the presence of an exponentially small parameter, √qγ =
|
1191 |
+
�
|
1192 |
+
2
|
1193 |
+
γ
|
1194 |
+
�2κ
|
1195 |
+
e−2/κ (the square root is for convenience later) characteristic of non-perturbative
|
1196 |
+
physics. The main thrust of the modern resurgence paradigm is that physical quantities,
|
1197 |
+
here e/ρ2, should be understood as a transseries, i.e. an expansion in √qγ whose terms
|
1198 |
+
are each formal (asymptotic) series in γ. It is critical that whilst resummation may
|
1199 |
+
be ambiguous when applied to any individual term in this (here the perturbative √qγ0
|
1200 |
+
sector), taken altogether the final result is non-ambiguous. In particular, and this goes
|
1201 |
+
back to the pioneering work of Bogomol’nyi and Zinn-Justin [66–69], the ambiguity
|
1202 |
+
of this perturbative sector should be compensated by a leading order ambiguity in an
|
1203 |
+
appropriate non-perturbative sector. In the next section we shall verify that such an
|
1204 |
+
ambiguity cancellation does take place.
|
1205 |
+
14
|
1206 |
+
|
1207 |
+
5.2
|
1208 |
+
Transseries and Leading Non-Perturbative Ambiguity
|
1209 |
+
In this series we shall apply a different type of analysis to the TBA equations which
|
1210 |
+
results in a transseries solution. The starting point shall be a reformulation of the TBA
|
1211 |
+
system as an integral equation for an auxiliary function u(ω),
|
1212 |
+
u(ω) = i
|
1213 |
+
ω +
|
1214 |
+
1
|
1215 |
+
2πi
|
1216 |
+
� ∞
|
1217 |
+
−∞
|
1218 |
+
dω′ e2iBω′ϱ(ω′)u(ω′)
|
1219 |
+
ω′ + ω + iδ
|
1220 |
+
,
|
1221 |
+
(54)
|
1222 |
+
where
|
1223 |
+
ϱ(ω) = 1 − iω
|
1224 |
+
1 + iω
|
1225 |
+
G−(ω)
|
1226 |
+
G+(ω) ,
|
1227 |
+
(55)
|
1228 |
+
together with the boundary condition
|
1229 |
+
u(i) = m
|
1230 |
+
2heB G+(i)
|
1231 |
+
G+(0) .
|
1232 |
+
(56)
|
1233 |
+
Having established the function u, the free energy is given by
|
1234 |
+
∆F(h) = − 1
|
1235 |
+
2π h2u(i)G−(0)2
|
1236 |
+
�
|
1237 |
+
1 −
|
1238 |
+
1
|
1239 |
+
2πi
|
1240 |
+
� ∞
|
1241 |
+
−∞
|
1242 |
+
dω e2iωBu(ω)ϱ(ω)
|
1243 |
+
ω − i
|
1244 |
+
�
|
1245 |
+
.
|
1246 |
+
(57)
|
1247 |
+
We will now apply to the λ-model the techniques pioneered by [26] to solve this re-
|
1248 |
+
cursively order by order in a perturbative parameter and a non-perturbative parameter.
|
1249 |
+
The idea is to move the integration contour of the integral equation (54) into the UHP
|
1250 |
+
so that it envelops all the branch cuts and poles in the UHP. The Sine-Gordon model is
|
1251 |
+
special as it only has poles but no branch cut. This was studied in [70] and gives rise to
|
1252 |
+
a convergent rather than asymptotic expansion. However, in the case of the λ-deformed
|
1253 |
+
model, we are dealing with both poles and a branch cut along the imagine axis of ρ(ω).
|
1254 |
+
To separate it from the poles, we slightly move the cut away from the imaginary axis
|
1255 |
+
to the ray C± = {ξeiθ|θ = π
|
1256 |
+
2 ± δ}. By deforming the integration contour we isolate the
|
1257 |
+
contributions coming from the discontinuity over the cut and the residues at the poles
|
1258 |
+
(see Figure 7). As explained in [26] the choice of moving the branch cut to C+ or C− is
|
1259 |
+
arbitrary and and gives rise to a leading non-perturbative ambiguity. Letting ϱn,± be
|
1260 |
+
the residues at x = xn with the cut moved to C±, after this contour pulling eq. (54)
|
1261 |
+
becomes
|
1262 |
+
u(ix) = 1
|
1263 |
+
x +
|
1264 |
+
1
|
1265 |
+
2πi
|
1266 |
+
� ∞e±iϵ
|
1267 |
+
0
|
1268 |
+
dx′ e−2Bx′u(ix′)δϱ(ix′)
|
1269 |
+
x′ + x
|
1270 |
+
+
|
1271 |
+
�
|
1272 |
+
n
|
1273 |
+
e−2Bxnunϱn,±
|
1274 |
+
xn + x
|
1275 |
+
,
|
1276 |
+
(58)
|
1277 |
+
where un ≡ u(ixn) and δϱ is the discontinuity over the cut10.
|
1278 |
+
From the WH-decomposition (17), we evaluate ϱ(ω) using (55) as
|
1279 |
+
ϱ(ω) = −ω + i
|
1280 |
+
ω − i
|
1281 |
+
Γ
|
1282 |
+
� iω
|
1283 |
+
2 + 1
|
1284 |
+
�2 Γ(1 − iω)Γ(1 − iκω)
|
1285 |
+
Γ
|
1286 |
+
�
|
1287 |
+
1 − iω
|
1288 |
+
2
|
1289 |
+
�2 Γ(iω + 1)Γ(iκω + 1)
|
1290 |
+
e−2ibωeiκω(log(iω)+log(−iω)) .
|
1291 |
+
(59)
|
1292 |
+
For generic values of κ, this has poles on the positive real axis at ω = ixn = iµn with
|
1293 |
+
µ = 2 with residues given by
|
1294 |
+
ϱn,± =
|
1295 |
+
Res
|
1296 |
+
x=xn±iϵ ϱ(ix) = −2ie2n(2b±iπκ−2κ log(2n))n2n + 1
|
1297 |
+
2n − 1
|
1298 |
+
((2n)!)2
|
1299 |
+
(n!)4
|
1300 |
+
Γ(1 + 2nκ)
|
1301 |
+
Γ(1 − 2nκ) .
|
1302 |
+
(60)
|
1303 |
+
However, when κ is rational some of these poles are removed.
|
1304 |
+
Suppose we express
|
1305 |
+
κ ≡
|
1306 |
+
k
|
1307 |
+
N = p/q as a reduced fraction with p, q coprime integers (i.e. q = N/gcd(N, k)),
|
1308 |
+
10For the discontinuity function, we use the convention δρ(ω) = ρ(ω(1 − iϵ) − ρ(ω(1 + iϵ)).
|
1309 |
+
15
|
1310 |
+
|
1311 |
+
ω
|
1312 |
+
C−
|
1313 |
+
C
|
1314 |
+
ϱ−
|
1315 |
+
1
|
1316 |
+
ϱ−
|
1317 |
+
2
|
1318 |
+
ϱ−
|
1319 |
+
3
|
1320 |
+
ω
|
1321 |
+
C+
|
1322 |
+
C
|
1323 |
+
ϱ+
|
1324 |
+
1
|
1325 |
+
ϱ+
|
1326 |
+
2
|
1327 |
+
ϱ+
|
1328 |
+
3
|
1329 |
+
Figure 7: The contour C = (−∞, ∞) is deformed into either of two ways. The branch
|
1330 |
+
cut, represented by the curvy line is moved to either the ray C+ or C−. In those cases
|
1331 |
+
respectively, the contour is deformed into C+ or C−. In both cases we pick up residues
|
1332 |
+
ϱ±
|
1333 |
+
n , but their values differ by the branch cut discontinuity.
|
1334 |
+
then the set of poles are located at x ∈ 2N\qN (rather than x ∈ 2N). Hence, the residue
|
1335 |
+
ϱn,± evaluates to zero if 2n ∈ 2N ∩ qN, i.e. 2n is a multiple of q. In particular, when
|
1336 |
+
k is an integer multiple of a half, i.e. q = 1 or q = 2, all poles are removed entirely.
|
1337 |
+
If ϱ1 = 0, then ϱn = 0 for all n; in what follows we shall consider only the case where
|
1338 |
+
ϱ1 ̸= 0 which is most relevant to our discussion.
|
1339 |
+
The discontinuity function is given by
|
1340 |
+
δϱ(ix) = 2ix + 1
|
1341 |
+
x − 1e2bxe−2κx log x sin(κπx)Γ(1 − x/2)2Γ(1 + x)Γ(1 + κx)
|
1342 |
+
Γ(1 + x/2)2Γ(1 − x)Γ(1 − κx) .
|
1343 |
+
(61)
|
1344 |
+
Notice this has simple poles at x = 2n, which have residues that vanish for κ half-integer.
|
1345 |
+
Lastly we shall need11
|
1346 |
+
ϱ(i ± 0) = 8e2b∓iπκ Γ(1 + κ)
|
1347 |
+
Γ(1 − κ) = 8
|
1348 |
+
πκe2b∓iπκΓ(1 + κ)2 sin(πκ) .
|
1349 |
+
(62)
|
1350 |
+
Following again [26], the integral equation (58) is simplified by the introduction of
|
1351 |
+
P(η, v) given by
|
1352 |
+
e−2Bxδϱ(ix) = −2ive−ηP(η, v) ,
|
1353 |
+
(63)
|
1354 |
+
with a change of variables (x, B) → (η, v):
|
1355 |
+
1
|
1356 |
+
v + a log v = 2B ,
|
1357 |
+
x = vη .
|
1358 |
+
(64)
|
1359 |
+
Here, a is a constant determined by demanding that P(η, v) is regular in v with, in
|
1360 |
+
particular, no log(v) terms. From eq. (61), we have that δϱ(ix) ∝ e˜ax log x � dnxn,
|
1361 |
+
where ˜a = −2κ, therefore this determines ˜a = a. This yields an expansion of P(η, v)
|
1362 |
+
given by
|
1363 |
+
P(η, v) = d1,0η + vη2(d2,0 + d2,1 log(η)) + O(v2) ,
|
1364 |
+
d1,0 = πκ ,
|
1365 |
+
d2,0 = 2πκ(1 + (1 − γE − log(κ))κ − log(2)) ,
|
1366 |
+
d2,1 = −2πκ2 .
|
1367 |
+
(65)
|
1368 |
+
With the introduction of an integral operator
|
1369 |
+
I[f](η) = − v
|
1370 |
+
π
|
1371 |
+
� ∞
|
1372 |
+
0
|
1373 |
+
dη′ e−η′P(η′, v)f(η′)
|
1374 |
+
η + η′
|
1375 |
+
,
|
1376 |
+
(66)
|
1377 |
+
11Because we are assuming that κ is not integer, ϱ(i±0) is non-zero. If κ < 0, then ϱ(i±0) generically
|
1378 |
+
has a finite ambiguity.
|
1379 |
+
16
|
1380 |
+
|
1381 |
+
after this change of variables, eq. (58) can be written as
|
1382 |
+
u(η) = u(η) + I[u](η) ,
|
1383 |
+
(67)
|
1384 |
+
in which the ‘seed’ solution is given as
|
1385 |
+
u(η) = 1
|
1386 |
+
vη + 1
|
1387 |
+
v
|
1388 |
+
�
|
1389 |
+
n
|
1390 |
+
e−2Bvηnunϱn,±
|
1391 |
+
ηn + η
|
1392 |
+
.
|
1393 |
+
(68)
|
1394 |
+
The formal solution obtained by iteration is thus presented as
|
1395 |
+
u(η) =
|
1396 |
+
∞
|
1397 |
+
�
|
1398 |
+
l=0
|
1399 |
+
Il[u](η) ≡ J [u](η) .
|
1400 |
+
(69)
|
1401 |
+
To determine the unknown coefficients un = u(ηn) we evaluate eq.(67) at η = ηn =
|
1402 |
+
µn/v and define In[f] ≡ I[f](η = ηn) to obtain
|
1403 |
+
un = 1
|
1404 |
+
µn + In[u] + 1
|
1405 |
+
µ
|
1406 |
+
�
|
1407 |
+
m
|
1408 |
+
e−2Bvηnumϱm,±
|
1409 |
+
m + n
|
1410 |
+
.
|
1411 |
+
(70)
|
1412 |
+
Here we have made a slight adaptation compared to [26] to suit the locations of the poles
|
1413 |
+
at xn = µn (with µ = 2) (cf. the Gross-Neveu model for which xn = 2n+1
|
1414 |
+
Υ
|
1415 |
+
for some
|
1416 |
+
constant Υ). To treat the exponentially small contributions coming from the residue
|
1417 |
+
term we introduce the small parameter
|
1418 |
+
q = e−2Bµ = e−µ/vv−µa .
|
1419 |
+
(71)
|
1420 |
+
Both the seed and formal solution, and the unkown values un, admit expansion in q
|
1421 |
+
u(η) =
|
1422 |
+
�
|
1423 |
+
s=1
|
1424 |
+
u(s)(η)qs ,
|
1425 |
+
u(η) =
|
1426 |
+
�
|
1427 |
+
u(s)(η)qs ,
|
1428 |
+
un =
|
1429 |
+
�
|
1430 |
+
s=0
|
1431 |
+
u(s)
|
1432 |
+
n qs .
|
1433 |
+
(72)
|
1434 |
+
As the operator J does not introduce factors of q we can construct the full solution
|
1435 |
+
order by order in q noting u(s)(η) = J [u(s)](η). Using (68) one finds that the first few
|
1436 |
+
terms12 of the seed solution are given by
|
1437 |
+
u(0) = 1
|
1438 |
+
vη ,
|
1439 |
+
u(1) = ϱ1,±u(0)
|
1440 |
+
1
|
1441 |
+
vη + µ ,
|
1442 |
+
u(2) = ϱ1,±u(1)
|
1443 |
+
1
|
1444 |
+
vη + µ + ϱ2,±u(0)
|
1445 |
+
2
|
1446 |
+
vη + 2µ .
|
1447 |
+
(74)
|
1448 |
+
Applying the q-expansion to eq. (70) we have that
|
1449 |
+
u(0)
|
1450 |
+
n
|
1451 |
+
= J [u(0)](ηn) = 1
|
1452 |
+
µn + In[J [ 1
|
1453 |
+
vη ]] ,
|
1454 |
+
u(1)
|
1455 |
+
n
|
1456 |
+
= In[J [u(1)]] + 1
|
1457 |
+
µ
|
1458 |
+
ϱ1,±u(0)
|
1459 |
+
1
|
1460 |
+
1 + n
|
1461 |
+
.
|
1462 |
+
(75)
|
1463 |
+
Let us assume that ϱ1,± ̸= 0 (i.e. κ is not half-integer), such that these two expressions
|
1464 |
+
are governing the leading behaviour. Suppose now we work formally13 to leading order
|
1465 |
+
12For n ≥ 1, we have in general
|
1466 |
+
u(n)(η) =
|
1467 |
+
n
|
1468 |
+
�
|
1469 |
+
m=1
|
1470 |
+
ϱm,±u(n−m)
|
1471 |
+
m
|
1472 |
+
vη + µm
|
1473 |
+
.
|
1474 |
+
(73)
|
1475 |
+
13i.e. ignoring that q is exponentially smaller than higher order polynomial terms in v.
|
1476 |
+
17
|
1477 |
+
|
1478 |
+
in v and leading order in q . Because each application of I carries a factor v, to leading
|
1479 |
+
order it is sufficient to consider only the identity operator J = 1+. . . which results in14
|
1480 |
+
u(0)
|
1481 |
+
n
|
1482 |
+
= 1
|
1483 |
+
µn −
|
1484 |
+
v
|
1485 |
+
nπµd1,0 + O(v2) ,
|
1486 |
+
u(1)
|
1487 |
+
n
|
1488 |
+
=
|
1489 |
+
ϱ1,±
|
1490 |
+
µ2(n + 1) −
|
1491 |
+
d1,0ϱ1,±
|
1492 |
+
µ2π(n + 1)v + O(v2) .
|
1493 |
+
(76)
|
1494 |
+
The leading orders of u(η) are obtained by
|
1495 |
+
u(η) =
|
1496 |
+
�
|
1497 |
+
u(0) + I[u(0)] + O(v)
|
1498 |
+
�
|
1499 |
+
+ q
|
1500 |
+
�
|
1501 |
+
u(1) + I[u(1)] + O(v2)
|
1502 |
+
�
|
1503 |
+
+ O(q2) .
|
1504 |
+
(77)
|
1505 |
+
To implement the boundary condition that relates the chemical potential h to q, v,
|
1506 |
+
we will need
|
1507 |
+
u(i) = u
|
1508 |
+
�
|
1509 |
+
η = 1
|
1510 |
+
v
|
1511 |
+
�
|
1512 |
+
=
|
1513 |
+
�
|
1514 |
+
1 − d1,0
|
1515 |
+
π v + O(v2)
|
1516 |
+
�
|
1517 |
+
+
|
1518 |
+
qϱ1,±
|
1519 |
+
µ(1 + µ)
|
1520 |
+
�
|
1521 |
+
1 − d1,0v
|
1522 |
+
π
|
1523 |
+
+ O(v2)
|
1524 |
+
�
|
1525 |
+
+ O(q2) .
|
1526 |
+
(78)
|
1527 |
+
The next step is to do the Legendre transform and calculate
|
1528 |
+
e
|
1529 |
+
ρ2 from ∆F. This can
|
1530 |
+
then be used to compare against the perturbative calculation. The same procedure of
|
1531 |
+
resolving the cut away from the poles of ρ and deforming the contour appropriately
|
1532 |
+
yields
|
1533 |
+
∆F(h) = − h2
|
1534 |
+
2π u(i)G+(0)2
|
1535 |
+
�
|
1536 |
+
1 + v2
|
1537 |
+
π
|
1538 |
+
� e−ηP(η, v)u(η)
|
1539 |
+
ηv − 1
|
1540 |
+
dη
|
1541 |
+
− e−2Bϱ(i ± ϵ)u(i) −
|
1542 |
+
�
|
1543 |
+
n≥1
|
1544 |
+
qnϱn,±un
|
1545 |
+
µn − 1
|
1546 |
+
�
|
1547 |
+
.
|
1548 |
+
(79)
|
1549 |
+
The leading orders of eq. (79) are given by
|
1550 |
+
∆F(h) = − G+(0)2h
|
1551 |
+
2π
|
1552 |
+
�
|
1553 |
+
1 − 2d10
|
1554 |
+
π v + O(v2)
|
1555 |
+
�
|
1556 |
+
×
|
1557 |
+
�
|
1558 |
+
1 − ρ(i ± ϵ)q1/µ +
|
1559 |
+
2ρ1,±
|
1560 |
+
µ(1 − µ2)q − 2ρ1,±ρ(i ± ϵ)
|
1561 |
+
µ(1 + µ)
|
1562 |
+
q1+1/µ + O(q2)
|
1563 |
+
�
|
1564 |
+
.
|
1565 |
+
(80)
|
1566 |
+
The first step of the Legendre transform is to relate h to the parameters q and v. This
|
1567 |
+
is done by substituting the expansion (78) for u(i) into the boundary condition (56)
|
1568 |
+
which, for µ = 2, gives
|
1569 |
+
h =
|
1570 |
+
mG+(i)
|
1571 |
+
12πG+(0)q−1/4�
|
1572 |
+
π + d1,0v + O(v2)
|
1573 |
+
��
|
1574 |
+
6 − ρ1,±q + O(q2)
|
1575 |
+
�
|
1576 |
+
.
|
1577 |
+
(81)
|
1578 |
+
As a consequence ρ = − d∆F
|
1579 |
+
dh
|
1580 |
+
is given by
|
1581 |
+
ρ = G+(i)G+(0)m
|
1582 |
+
12π2
|
1583 |
+
�
|
1584 |
+
π − d1,0v + O(v2)
|
1585 |
+
��
|
1586 |
+
6q−1/4 + ρ1,±q3/4 + O(q7/4)
|
1587 |
+
�
|
1588 |
+
,
|
1589 |
+
(82)
|
1590 |
+
from which we obtain
|
1591 |
+
e
|
1592 |
+
ρ2 as a series in v and q:
|
1593 |
+
e
|
1594 |
+
ρ2 =
|
1595 |
+
1
|
1596 |
+
6G+(0)2
|
1597 |
+
�
|
1598 |
+
π + 2d1,0v + O(v2)
|
1599 |
+
��
|
1600 |
+
3 + 3ρ(i + ±ϵ)q1/2 + ρ1,±q + O(q3/2)
|
1601 |
+
�
|
1602 |
+
.
|
1603 |
+
(83)
|
1604 |
+
14The small v limit can be taken also in the integral:
|
1605 |
+
I
|
1606 |
+
� 1
|
1607 |
+
vη
|
1608 |
+
�
|
1609 |
+
(ηn) = − v
|
1610 |
+
π
|
1611 |
+
� ∞
|
1612 |
+
0
|
1613 |
+
eη′d1,0η
|
1614 |
+
vη′ + nµ = − v
|
1615 |
+
π
|
1616 |
+
� ∞
|
1617 |
+
0
|
1618 |
+
�
|
1619 |
+
eη′d1,0
|
1620 |
+
nµ
|
1621 |
+
+ O(v)
|
1622 |
+
�
|
1623 |
+
= − vd1,0
|
1624 |
+
nπµ + O(v2) .
|
1625 |
+
18
|
1626 |
+
|
1627 |
+
We will now write this expansion in terms of the coupling (38) used in the previous
|
1628 |
+
Sections. Let us introduce a parameter exponentially small in γ, analogous to q being
|
1629 |
+
exponentially small in v, given by qγ = e−4/γ(γ/2)4κ. We use (38) to write v as a series
|
1630 |
+
in γ and qγ. Substituting this series for v (and q = q(v)) into (83), we arrive at
|
1631 |
+
8κ
|
1632 |
+
π
|
1633 |
+
e
|
1634 |
+
ρ2 =
|
1635 |
+
�
|
1636 |
+
1 + κγ + O(γ2)
|
1637 |
+
�
|
1638 |
+
− 8e∓iπκ Γ(κ)
|
1639 |
+
Γ(−κ)q1/2
|
1640 |
+
γ
|
1641 |
+
(1 + O(γ))
|
1642 |
+
+ 23−4κe∓2iπκ Γ(2κ)
|
1643 |
+
Γ(−2κ)qγ(1 + O(γ)) .
|
1644 |
+
(84)
|
1645 |
+
We see that the first two coefficient of the perturbative series match precisely with eq.
|
1646 |
+
(40). The presence of transseries parameters qγ = e−4/γ(γ/2)4κ provides concrete pre-
|
1647 |
+
dictions of the resurgent structure of the perturbative series. In particular, we compute
|
1648 |
+
the ambiguity of the transseries (84) due to the difference in result if the branch cut is
|
1649 |
+
left or right of the poles. To leading order in qγ and γ, it is given by
|
1650 |
+
8κ
|
1651 |
+
π
|
1652 |
+
�� e
|
1653 |
+
ρ2
|
1654 |
+
�
|
1655 |
+
−
|
1656 |
+
−
|
1657 |
+
� e
|
1658 |
+
ρ2
|
1659 |
+
�
|
1660 |
+
+
|
1661 |
+
�
|
1662 |
+
=
|
1663 |
+
16πi
|
1664 |
+
Γ(−κ)Γ(1 − κ)
|
1665 |
+
�γ
|
1666 |
+
2
|
1667 |
+
�2κ
|
1668 |
+
e−2/γ .
|
1669 |
+
(85)
|
1670 |
+
This is exactly the same ambiguity as obtained through the asymptotic analysis of our
|
1671 |
+
perturbative calculation - see eq. (52). We thus observe that the Borel-ambiguity of
|
1672 |
+
the perturbative series can be cancelled precisely by an ambiguity of a transmonomial.
|
1673 |
+
Therefore, the large order non-perturbative behaviour is unambiguous up to the order
|
1674 |
+
considered. This mirrors the fabled BZJJ ambiguity cancellation [66–69] in a field theory
|
1675 |
+
context.
|
1676 |
+
The analysis above only finds a source of the leading ambiguity on the positive
|
1677 |
+
real axis of the Borel plane. However, we can do a similar analysis to recover the Borel
|
1678 |
+
branch singularity on the negative real axis. The critical modification of the programme,
|
1679 |
+
as realised by [15], is to deform the contour of the integral equation (54) into the lower
|
1680 |
+
half plane, instead of the upper half plan. The critical analytic data is then given by the
|
1681 |
+
branch cut and residues at the negative imaginary axis. In the lower half plane, ϱ(−ix)
|
1682 |
+
has residues at xn = 2n + 1 and at ˜xn := n
|
1683 |
+
κ. However, as the latter set of residues is
|
1684 |
+
unambiguous with respect to the branch cut, they do not contribute15. One subtlety
|
1685 |
+
when using this approach arises when computing u(i). Deforming the contour of eq.
|
1686 |
+
(54) to an envelopment of the negative imaginary axis picks up a residue at ω = −i,
|
1687 |
+
which introduces a contribution of u(−i)ρ(−i ± ϵ)q not present in the analysis above.
|
1688 |
+
We will not present a detailed derivation as it is similar to the one above. Rather, we
|
1689 |
+
can report that the final result is a transseries with a leading ambiguity given by
|
1690 |
+
8κ
|
1691 |
+
π
|
1692 |
+
�� e
|
1693 |
+
ρ2
|
1694 |
+
�
|
1695 |
+
−
|
1696 |
+
−
|
1697 |
+
� e
|
1698 |
+
ρ2
|
1699 |
+
�
|
1700 |
+
+
|
1701 |
+
�
|
1702 |
+
= −
|
1703 |
+
πi
|
1704 |
+
4Γ(κ)Γ(1 + κ)
|
1705 |
+
�
|
1706 |
+
−γ
|
1707 |
+
2
|
1708 |
+
�−2κ
|
1709 |
+
e2/γ .
|
1710 |
+
(86)
|
1711 |
+
This precisely matches the ambiguity of the perturbative sector around the negative real
|
1712 |
+
axis found in eq. (53).
|
1713 |
+
6
|
1714 |
+
Discussion
|
1715 |
+
In this note, we have studied the λ-model and brought it into the fold of resurgent
|
1716 |
+
analysis of [13–15, 26]. The model is particularly interesting, because, distinct from
|
1717 |
+
previously considered models, it has a interacting CFT fixed point in the UV.
|
1718 |
+
15They would be part of a transseries solution, but as they are unambiguous, they are not of interest
|
1719 |
+
to us currently. As a further side remark, when choosing κ < 0, along the positive imaginary axis ϱ(ix)
|
1720 |
+
also has such unambiguous residues at x = n
|
1721 |
+
κ .
|
1722 |
+
19
|
1723 |
+
|
1724 |
+
We have found a perturbative series for the energy density at finite chemical poten-
|
1725 |
+
tial of the λ-model in Section 3.4 and identified with numerical techniques its asymp-
|
1726 |
+
totic form in Section 4.
|
1727 |
+
A key feature is that the Borel resummation of the large
|
1728 |
+
order behaviour is ambiguous when taken along either the positive or negative real axis.
|
1729 |
+
These ambiguities are exactly compensated/cancelled by a further ambiguity in a non-
|
1730 |
+
perturbative sector of a transseries solution in Section 5. These cancellations provide the
|
1731 |
+
λ-model with a robustly defined foundation which may serve as a paradigmatic example
|
1732 |
+
for other theories with asymptotic CFT behaviour.
|
1733 |
+
Of particular note is that the leading ambiguity on the positive axis (and associated
|
1734 |
+
features in the Borel plane) vanishes for κ ∈ Z>0, i.e. when the WZW level k divides
|
1735 |
+
the rank N of the gauge group SU(N). This is reminiscent of Cheshire-cat resurgence
|
1736 |
+
[71–74] in which the full glory of resurgence only becomes apparent as you deform away
|
1737 |
+
from certain special points at which it truncates.
|
1738 |
+
Let us finish with some broader questions to ponder following the analysis of the
|
1739 |
+
λ-model that we hope might stimulate further investigations on the topic:
|
1740 |
+
• An interesting feature of the WZW CFT that defines the UV of the λ model is
|
1741 |
+
that it exhibits level-rank duality [75]. It would be valuable to understand the
|
1742 |
+
extent to which this property constrains, or is encapsulated, in the form of the
|
1743 |
+
transseries that defines the λ-model.
|
1744 |
+
• In a QFT it is sometimes possible to directly link poles/branch points in the
|
1745 |
+
Borel plane to finite action non-pertubative saddle configurations. Remarkably,
|
1746 |
+
this can be done even in theories without instantons. In a series of paper [9, 11,
|
1747 |
+
12] finite action ‘uniton’ configurations of 1+1d integrable QFTs were matched
|
1748 |
+
to Borel poles of a quantum mechanics that followed by dimensional reduction
|
1749 |
+
with twisted boundary conditions (akin to a chemical potential as deployed here).
|
1750 |
+
This poses a natural question: can the features of the Borel plane we have found
|
1751 |
+
here via TBA methods be related to some finite action saddles? Conversely, given
|
1752 |
+
the knowledge of such uniton configurations, what do they imply for the TBA
|
1753 |
+
method? Achieving this would serve to put the semi-classical approaches of [9, 11,
|
1754 |
+
12] on a surer-footing in quantum field theory.
|
1755 |
+
• On the other hand there are a class of ambiguities which don’t (yet at least) have an
|
1756 |
+
interpretation as semi-classical saddles. Instead they are renormalon ambiguities
|
1757 |
+
associated to certain classes of Feynman diagrams. In [18, 76] it was shown how
|
1758 |
+
to construct such a series of diagrams which source the renormalon ambiguities in
|
1759 |
+
1/N expansion of the O(N) vector model, the Gross-Neveu and the SU(N) PCM.
|
1760 |
+
It would be interesting to investigate if there are diagrams that are responsible for
|
1761 |
+
the ambiguities in the λ-models.
|
1762 |
+
• The landscape of integrable models in two dimensions has been vastly expanded
|
1763 |
+
in recent years through variants of this λ-model, and the related Yang-Baxter σ-
|
1764 |
+
models. It could be rewarding to deploy similar technique across this landscape
|
1765 |
+
included e.g. to models with multiple deformation parameters or theories based
|
1766 |
+
on cosets rather than group manifolds.
|
1767 |
+
• In [57] the Quantum Inverse Scattering Method was applied to give a direct quant-
|
1768 |
+
isation of the λ-models as a continuum limit of a spin k Heisenberg spin-chain with
|
1769 |
+
inhomogeneities. The parameter that governs the in-homogeneity becomes a mass.
|
1770 |
+
Although the ground state of the system is quite a complicated Fermi sea, one can
|
1771 |
+
identify holes as certain particle excitations. After taking the continuum limit,
|
1772 |
+
one can obtain a TBA system for these excitations matching that of the QFT.
|
1773 |
+
An exciting question is if the above resurgent structure can be given a similar ab
|
1774 |
+
initio derivation within the QISM framework.
|
1775 |
+
20
|
1776 |
+
|
1777 |
+
Acknowledgements
|
1778 |
+
DCT is supported by The Royal Society through a University Research FellowshipGen-
|
1779 |
+
eralised Dualities in String Theory and Holography URF 150185 and in part by STFC
|
1780 |
+
grant ST/P00055X/1 as well as by the FWO-Vlaanderen through the project G006119N
|
1781 |
+
and Vrije Universiteit Brussel through the Strategic Research Program “High-Energy
|
1782 |
+
Physics”. LS is supported by a PhD studentship from The Royal Society and the grant
|
1783 |
+
RF\ERE\210269. For the purpose of open access, the authors have applied a Creative
|
1784 |
+
Commons Attribution (CC BY) licence to any Author Accepted Manuscript version
|
1785 |
+
arising. We thank M Mari˜no and T Reis for helpful comments on a draft and I Aniceto
|
1786 |
+
for comments relating to this project.
|
1787 |
+
References
|
1788 |
+
[1]
|
1789 |
+
Al B Zamolodchikov. ‘Exact two-particle S-matrix of quantum sine-Gordon solitons’.
|
1790 |
+
Communications in Mathematical Physics 55.2 (1977), pp. 183–186.
|
1791 |
+
[2]
|
1792 |
+
Peter Hasenfratz, Michele Maggiore and Ferenc Niedermayer. ‘The exact mass gap
|
1793 |
+
of the O(3) and O(4) non-linear σ-models in d = 2’. Physics Letters B 245.3-4
|
1794 |
+
(1990), pp. 522–528.
|
1795 |
+
[3]
|
1796 |
+
Peter Hasenfratz and Ferenc Niedermayer. ‘The exact mass gap of the O(N) σ-
|
1797 |
+
model for arbitrary N ≥ 3 in d = 2’. Physics Letters B 245.3-4 (1990), pp. 529–
|
1798 |
+
532.
|
1799 |
+
[4]
|
1800 |
+
P. Forgacs, F. Niedermayer and P. Weisz. ‘The Exact mass gap of the Gross-Neveu
|
1801 |
+
model. 1. The Thermodynamic Bethe ansatz’. Nucl. Phys. B 367 (1991), pp. 123–
|
1802 |
+
143. doi: 10.1016/0550-3213(91)90044-X.
|
1803 |
+
[5]
|
1804 |
+
P. Forgacs, F. Niedermayer and P. Weisz. ‘The Exact mass gap of the Gross-
|
1805 |
+
Neveu model. 2. The 1/N expansion’. Nucl. Phys. B 367 (1991), pp. 144–157. doi:
|
1806 |
+
10.1016/0550-3213(91)90045-Y.
|
1807 |
+
[6]
|
1808 |
+
Inˆes Aniceto, Gok¸ce Ba¸sar and Ricardo Schiappa. ‘A Primer on Resurgent Trans-
|
1809 |
+
series and Their Asymptotics’. Phys. Rept. 809 (2019), pp. 1–135. doi: 10.1016/
|
1810 |
+
j.physrep.2019.02.003. arXiv: 1802.10441 [hep-th].
|
1811 |
+
[7]
|
1812 |
+
Gerald V Dunne and Mithat ¨Unsal. ‘Resurgence and trans-series in Quantum Field
|
1813 |
+
Theory: the CPN−1 model’. JHEP 11 (2012), p. 170. doi: 10.1007/JHEP11(2012)
|
1814 |
+
170. arXiv: 1210.2423 [hep-th].
|
1815 |
+
[8]
|
1816 |
+
Aleksey Cherman, Daniele Dorigoni, Gerald V. Dunne and Mithat ¨Unsal. ‘Resur-
|
1817 |
+
gence in Quantum Field Theory: Nonperturbative Effects in the Principal Chiral
|
1818 |
+
Model’. Phys. Rev. Lett. 112 (2014), p. 021601. doi: 10.1103/PhysRevLett.112.
|
1819 |
+
021601. arXiv: 1308.0127 [hep-th].
|
1820 |
+
[9]
|
1821 |
+
Aleksey Cherman, Daniele Dorigoni and Mithat Unsal. ‘Decoding perturbation
|
1822 |
+
theory using resurgence: Stokes phenomena, new saddle points and Lefschetz
|
1823 |
+
thimbles’. JHEP 10 (2015), p. 056. doi: 10 . 1007 / JHEP10(2015 ) 056. arXiv:
|
1824 |
+
1403.1277 [hep-th].
|
1825 |
+
[10]
|
1826 |
+
Gerald V. Dunne and Mithat Unsal. ‘Resurgence and Dynamics of O(N) and
|
1827 |
+
Grassmannian Sigma Models’. JHEP 09 (2015), p. 199. doi: 10.1007/JHEP09(2015)
|
1828 |
+
199. arXiv: 1505.07803 [hep-th].
|
1829 |
+
[11]
|
1830 |
+
Saskia Demulder, Daniele Dorigoni and Daniel C. Thompson. ‘Resurgence in η-
|
1831 |
+
deformed Principal Chiral Models’. JHEP 07 (2016), p. 088. doi: 10 . 1007 /
|
1832 |
+
JHEP07(2016)088. arXiv: 1604.07851 [hep-th].
|
1833 |
+
21
|
1834 |
+
|
1835 |
+
[12]
|
1836 |
+
Lucas Schepers and Daniel C. Thompson. ‘Resurgence in the bi-Yang-Baxter
|
1837 |
+
model’. Nucl. Phys. B 964 (2021), p. 115308. doi: 10.1016/j.nuclphysb.2021.
|
1838 |
+
115308. arXiv: 2007.03683 [hep-th].
|
1839 |
+
[13]
|
1840 |
+
Dmytro Volin. ‘From the mass gap in O(N) to the non-Borel-summability in
|
1841 |
+
O(3) and O(4) sigma-models’. Phys. Rev. D 81 (2010), p. 105008. doi: 10.1103/
|
1842 |
+
PhysRevD.81.105008. arXiv: 0904.2744 [hep-th].
|
1843 |
+
[14]
|
1844 |
+
Dmytro Volin. ‘Quantum integrability and functional equations: Applications to
|
1845 |
+
the spectral problem of AdS/CFT and two-dimensional sigma models’. Journal of
|
1846 |
+
Physics A: Mathematical and Theoretical 44.12 (2011), p. 124003. arXiv: 1003.
|
1847 |
+
4725 [hep-th].
|
1848 |
+
[15]
|
1849 |
+
Marcos Mari˜no and Tom´as Reis. ‘Renormalons in integrable field theories’. JHEP
|
1850 |
+
04 (2020), p. 160. doi: 10.1007/JHEP04(2020)160. arXiv: 1909.12134 [hep-th].
|
1851 |
+
[16]
|
1852 |
+
Marcos Mari˜no and Tom´as Reis. ‘Resurgence for superconductors’ (May 2019).
|
1853 |
+
doi: 10.1088/1742-5468/ab4802. arXiv: 1905.09569 [hep-th].
|
1854 |
+
[17]
|
1855 |
+
Marcos Mari˜no and Tom´as Reis. ‘A new renormalon in two dimensions’. JHEP 07
|
1856 |
+
(2020), p. 216. doi: 10.1007/JHEP07(2020)216. arXiv: 1912.06228 [hep-th].
|
1857 |
+
[18]
|
1858 |
+
Marcos Marino, Ramon Miravitllas and Tomas Reis. ‘Testing the Bethe ansatz
|
1859 |
+
with large N renormalons’. Eur. Phys. J. ST 230.12-13 (2021), pp. 2641–2666.
|
1860 |
+
doi: 10.1140/epjs/s11734-021-00252-4. arXiv: 2102.03078 [hep-th].
|
1861 |
+
[19]
|
1862 |
+
Zoltan Bajnok, Janos Balog, Arpad Hegedus and Istvan Vona. ‘Instanton effects
|
1863 |
+
vs resurgence in the O(3) sigma model’. Phys. Lett. B 829 (2022), p. 137073. doi:
|
1864 |
+
10.1016/j.physletb.2022.137073. arXiv: 2112.11741 [hep-th].
|
1865 |
+
[20]
|
1866 |
+
Zoltan Bajnok and Romuald A. Janik. ‘OPE coefficients and the mass-gap from
|
1867 |
+
the integrable scattering description of 2D CFT’s’. JHEP 11 (2022), p. 128. doi:
|
1868 |
+
10.1007/JHEP11(2022)128. arXiv: 2209.10393 [hep-th].
|
1869 |
+
[21]
|
1870 |
+
Zoltan Bajnok, Janos Balog, Arpad Hegedus and Istvan Vona. ‘Running coupling
|
1871 |
+
and non-perturbative corrections for O(N) free energy and for disk capacitor’.
|
1872 |
+
JHEP 09 (2022), p. 001. doi: 10.1007/JHEP09(2022)001. arXiv: 2204.13365
|
1873 |
+
[hep-th].
|
1874 |
+
[22]
|
1875 |
+
Zolt´an Bajnok, J´anos Balog and Istv´an Vona. ‘Analytic resurgence in the O(4)
|
1876 |
+
model’. JHEP 04 (2022), p. 043. doi: 10.1007/JHEP04(2022)043. arXiv: 2111.
|
1877 |
+
15390 [hep-th].
|
1878 |
+
[23]
|
1879 |
+
Michael C. Abbott, Zolt´an Bajnok, J´anos Balog, ´Arp´ad Heged´us and Saeedeh
|
1880 |
+
Sadeghian. ‘Resurgence in the O(4) sigma model’. JHEP 05 (2021), p. 253. doi:
|
1881 |
+
10.1007/JHEP05(2021)253. arXiv: 2011.12254 [hep-th].
|
1882 |
+
[24]
|
1883 |
+
Michael C. Abbott, Zolt´an Bajnok, J´anos Balog and ´Arp´ad Heged´us. ‘From per-
|
1884 |
+
turbative to non-perturbative in the O (4) sigma model’. Phys. Lett. B 818 (2021),
|
1885 |
+
p. 136369. doi: 10.1016/j.physletb.2021.136369. arXiv: 2011.09897 [hep-th].
|
1886 |
+
[25]
|
1887 |
+
Zoltan Bajnok, Janos Balog and Istvan Vona. ‘The full analytic trans-series in
|
1888 |
+
integrable field theories’ (Dec. 2022). arXiv: 2212.09416 [hep-th].
|
1889 |
+
[26]
|
1890 |
+
Marcos Marino, Ramon Miravitllas and Tomas Reis. ‘New renormalons from ana-
|
1891 |
+
lytic trans-series’ (Nov. 2021). arXiv: 2111.11951 [hep-th].
|
1892 |
+
[27]
|
1893 |
+
Konstadinos Sfetsos. ‘Integrable interpolations: From exact CFTs to non-Abelian
|
1894 |
+
T-duals’. Nucl. Phys. B 880 (2014), pp. 225–246. doi: 10.1016/j.nuclphysb.
|
1895 |
+
2014.01.004. arXiv: 1312.4560 [hep-th].
|
1896 |
+
22
|
1897 |
+
|
1898 |
+
[28]
|
1899 |
+
Konstadinos Sfetsos and Konstadinos Siampos. ‘Gauged WZW-type theories and
|
1900 |
+
the all-loop anisotropic non-Abelian Thirring model’. Nucl. Phys. B 885 (2014),
|
1901 |
+
pp. 583–599. doi: 10.1016/j.nuclphysb.2014.06.012. arXiv: 1405.7803
|
1902 |
+
[hep-th].
|
1903 |
+
[29]
|
1904 |
+
Jonathan M. Evans and Timothy J. Hollowood. ‘Integrable theories that are
|
1905 |
+
asymptotically CFT’. Nucl. Phys. B 438 (1995), pp. 469–490. doi: 10.1016/0550-
|
1906 |
+
3213(94)00473-R. arXiv: hep-th/9407113.
|
1907 |
+
[30]
|
1908 |
+
Jonathan M. Evans and Timothy J. Hollowood. ‘Exact results for integrable
|
1909 |
+
asymptotically - free field theories’. Nucl. Phys. B Proc. Suppl. 45.1 (1996). Ed. by
|
1910 |
+
G. Mussardo, S. Randjbar-Daemi and H. Saleur, pp. 130–139. doi: 10.1016/0920-
|
1911 |
+
5632(95)00622-2. arXiv: hep-th/9508141.
|
1912 |
+
[31]
|
1913 |
+
Calan Appadu, Timothy J. Hollowood and Dafydd Price. ‘Quantum Inverse Scat-
|
1914 |
+
tering and the Lambda Deformed Principal Chiral Model’. J. Phys. A 50.30 (2017),
|
1915 |
+
p. 305401. doi: 10.1088/1751-8121/aa7958. arXiv: 1703.06699 [hep-th].
|
1916 |
+
[32]
|
1917 |
+
Edward Witten. ‘Non-abelian bosonization in two dimensions’. Bosonization. World
|
1918 |
+
Scientific, 1994, pp. 201–218.
|
1919 |
+
[33]
|
1920 |
+
J. Balog, P. Forgacs, Z. Horvath and L. Palla. ‘A New family of SU(2) symmetric
|
1921 |
+
integrable sigma models’. Phys. Lett. B 324 (1994). Ed. by D. Lust and G. Weigt,
|
1922 |
+
pp. 403–408. doi: 10.1016/0370-2693(94)90213-5. arXiv: hep-th/9307030.
|
1923 |
+
[34]
|
1924 |
+
Konstadinos Sfetsos. ‘Gauged WZW models and nonAbelian duality’. Phys. Rev.
|
1925 |
+
D 50 (1994), pp. 2784–2798. doi: 10.1103/PhysRevD.50.2784. arXiv: hep-
|
1926 |
+
th/9402031.
|
1927 |
+
[35]
|
1928 |
+
Daniel C. Thompson. ‘An Introduction to Generalised Dualities and their Applic-
|
1929 |
+
ations to Holography and Integrability’. PoS CORFU2018 (2019). Ed. by Kon-
|
1930 |
+
stantinos Anagnostopoulos et al., p. 099. doi: 10.22323/1.347.0099. arXiv:
|
1931 |
+
1904.11561 [hep-th].
|
1932 |
+
[36]
|
1933 |
+
Ben Hoare. ‘Integrable deformations of sigma models’. J. Phys. A 55.9 (2022),
|
1934 |
+
p. 093001. doi: 10.1088/1751-8121/ac4a1e. arXiv: 2109.14284 [hep-th].
|
1935 |
+
[37]
|
1936 |
+
Timothy J. Hollowood, J. Luis Miramontes and David M. Schmidtt. ‘Integrable
|
1937 |
+
Deformations of Strings on Symmetric Spaces’. JHEP 11 (2014), p. 009. doi:
|
1938 |
+
10.1007/JHEP11(2014)009. arXiv: 1407.2840 [hep-th].
|
1939 |
+
[38]
|
1940 |
+
Timothy J. Hollowood, J.Luis Miramontes and David M. Schmidtt. ‘An Integrable
|
1941 |
+
Deformation of the AdS5 × S5 Superstring’. J. Phys. A 47.49 (2014), p. 495402.
|
1942 |
+
doi: 10.1088/1751-8113/47/49/495402. arXiv: 1409.1538 [hep-th].
|
1943 |
+
[39]
|
1944 |
+
Konstantinos Sfetsos and Daniel C. Thompson. ‘Spacetimes for λ-deformations’.
|
1945 |
+
JHEP 12 (2014), p. 164. doi: 10.1007/JHEP12(2014)164. arXiv: 1410.1886
|
1946 |
+
[hep-th].
|
1947 |
+
[40]
|
1948 |
+
Saskia Demulder, Konstantinos Sfetsos and Daniel C. Thompson. ‘Integrable λ-
|
1949 |
+
deformations: Squashing Coset CFTs and AdS5 × S5’. JHEP 07 (2015), p. 019.
|
1950 |
+
doi: 10.1007/JHEP07(2015)019. arXiv: 1504.02781 [hep-th].
|
1951 |
+
[41]
|
1952 |
+
Riccardo Borsato and Linus Wulff. ‘Target space supergeometry of η and λ-
|
1953 |
+
deformed strings’. JHEP 10 (2016), p. 045. doi: 10.1007/JHEP10(2016)045.
|
1954 |
+
arXiv: 1608.03570 [hep-th].
|
1955 |
+
[42]
|
1956 |
+
Arkady A. Tseytlin. ‘On A ’Universal’ class of WZW type conformal models’.
|
1957 |
+
Nucl. Phys. B 418 (1994), pp. 173–194. doi: 10.1016/0550-3213(94)90243-7.
|
1958 |
+
arXiv: hep-th/9311062.
|
1959 |
+
23
|
1960 |
+
|
1961 |
+
[43]
|
1962 |
+
Calan Appadu and Timothy J. Hollowood. ‘Beta function of k deformed AdS5
|
1963 |
+
× S5 string theory’. JHEP 11 (2015), p. 095. doi: 10.1007/JHEP11(2015)095.
|
1964 |
+
arXiv: 1507.05420 [hep-th].
|
1965 |
+
[44]
|
1966 |
+
Ctirad Klimˇc´ık. ‘Poisson–Lie T-duals of the bi-Yang–Baxter models’. Phys. Lett.
|
1967 |
+
B 760 (2016), pp. 345–349. doi: 10.1016/j.physletb.2016.06.077. arXiv:
|
1968 |
+
1606.03016 [hep-th].
|
1969 |
+
[45]
|
1970 |
+
B. Hoare and A. A. Tseytlin. ‘On integrable deformations of superstring sigma
|
1971 |
+
models related to AdSn ×Sn supercosets’. Nucl. Phys. B 897 (2015), pp. 448–478.
|
1972 |
+
doi: 10.1016/j.nuclphysb.2015.06.001. arXiv: 1504.07213 [hep-th].
|
1973 |
+
[46]
|
1974 |
+
Konstantinos Sfetsos, Konstantinos Siampos and Daniel C. Thompson. ‘Gener-
|
1975 |
+
alised integrable λ - and η-deformations and their relation’. Nucl. Phys. B 899
|
1976 |
+
(2015), pp. 489–512. doi: 10.1016/j.nuclphysb.2015.08.015. arXiv: 1506.
|
1977 |
+
05784 [hep-th].
|
1978 |
+
[47]
|
1979 |
+
Benoit Vicedo. ‘Deformed integrable σ-models, classical R-matrices and classical
|
1980 |
+
exchange algebra on Drinfel’d doubles’. J. Phys. A 48.35 (2015), p. 355203. doi:
|
1981 |
+
10.1088/1751-8113/48/35/355203. arXiv: 1504.06303 [hep-th].
|
1982 |
+
[48]
|
1983 |
+
Ctirad Klimˇc´ık. ‘η and λ deformations as E -models’. Nucl. Phys. B 900 (2015),
|
1984 |
+
pp. 259–272. doi: 10.1016/j.nuclphysb.2015.09.011. arXiv: 1508.05832
|
1985 |
+
[hep-th].
|
1986 |
+
[49]
|
1987 |
+
T. H. Buscher. ‘Path Integral Derivation of Quantum Duality in Nonlinear Sigma
|
1988 |
+
Models’. Phys. Lett. B 201 (1988), pp. 466–472. doi: 10.1016/0370-2693(88)
|
1989 |
+
90602-8.
|
1990 |
+
[50]
|
1991 |
+
K. Gawedzki and A. Kupiainen. ‘G/h Conformal Field Theory from Gauged WZW
|
1992 |
+
Model’. Phys. Lett. B 215 (1988), pp. 119–123. doi: 10.1016/0370-2693(88)
|
1993 |
+
91081-7.
|
1994 |
+
[51]
|
1995 |
+
Edward Witten. ‘On Holomorphic factorization of WZW and coset models’. Com-
|
1996 |
+
mun. Math. Phys. 144 (1992), pp. 189–212. doi: 10.1007/BF02099196.
|
1997 |
+
[52]
|
1998 |
+
Timothy J. Hollowood, J. Luis Miramontes and David M. Schmidtt. ‘S-Matrices
|
1999 |
+
and Quantum Group Symmetry of k-Deformed Sigma Models’. J. Phys. A 49.46
|
2000 |
+
(2016), p. 465201. doi: 10.1088/1751-8113/49/46/465201. arXiv: 1506.06601
|
2001 |
+
[hep-th].
|
2002 |
+
[53]
|
2003 |
+
Georgios Itsios, Konstantinos Sfetsos, Konstantinos Siampos and Alessandro Tor-
|
2004 |
+
rielli. ‘The classical Yang–Baxter equation and the associated Yangian symmetry
|
2005 |
+
of gauged WZW-type theories’. Nucl. Phys. B 889 (2014), pp. 64–86. doi: 10.
|
2006 |
+
1016/j.nuclphysb.2014.10.004. arXiv: 1409.0554 [hep-th].
|
2007 |
+
[54]
|
2008 |
+
George Georgiou, Konstantinos Sfetsos and Konstantinos Siampos. ‘Strong in-
|
2009 |
+
tegrability of λ-deformed models’. Nucl. Phys. B 952 (2020), p. 114923. doi:
|
2010 |
+
10.1016/j.nuclphysb.2020.114923. arXiv: 1911.07859 [hep-th].
|
2011 |
+
[55]
|
2012 |
+
S. F. Hassan and Ashoke Sen. ‘Marginal deformations of WZNW and coset models
|
2013 |
+
from O(d,d) transformation’. Nucl. Phys. B 405 (1993), pp. 143–165. doi: 10.
|
2014 |
+
1016/0550-3213(93)90429-S. arXiv: hep-th/9210121.
|
2015 |
+
[56]
|
2016 |
+
C Ahn, D Bernard and A LeClair. ‘Fractional supersymmetries in perturbed coset
|
2017 |
+
CFTs and integrable soliton theory’. Nuclear Physics B 346.2-3 (1990), pp. 409–
|
2018 |
+
439.
|
2019 |
+
[57]
|
2020 |
+
Calan Appadu, Timothy J. Hollowood, Dafydd Price and Daniel C. Thompson.
|
2021 |
+
‘Quantum Anisotropic Sigma and Lambda Models as Spin Chains’. J. Phys. A
|
2022 |
+
51.40 (2018), p. 405401. doi: 10.1088/1751-8121/aadc6d. arXiv: 1802.06016
|
2023 |
+
[hep-th].
|
2024 |
+
24
|
2025 |
+
|
2026 |
+
[58]
|
2027 |
+
A Polyakov and Paul B Wiegmann. ‘Theory of nonabelian Goldstone bosons in
|
2028 |
+
two dimensions’. Physics Letters B 131.1-3 (1983), pp. 121–126.
|
2029 |
+
[59]
|
2030 |
+
Alexander M Polyakov and PB Wiegmann. ‘Goldstone fields in two dimensions
|
2031 |
+
with multivalued actions’. Physics Letters B 141.3-4 (1984), pp. 223–228.
|
2032 |
+
[60]
|
2033 |
+
PB Wiegmann. ‘Exact solution of the O(3) nonlinear two-dimensional sigma-
|
2034 |
+
model’. JETP Letters 41.2 (1985), pp. 95–100.
|
2035 |
+
[61]
|
2036 |
+
J. Balog, S. Naik, F. Niedermayer and P. Weisz. ‘Exact mass gap of the chiral
|
2037 |
+
SU(n) x SU(n) model’. Phys. Rev. Lett. 69 (1992), pp. 873–876. doi: 10.1103/
|
2038 |
+
PhysRevLett.69.873.
|
2039 |
+
[62]
|
2040 |
+
Timothy J. Hollowood. ‘The Exact mass gaps of the principal chiral models’. Phys.
|
2041 |
+
Lett. B 329 (1994), pp. 450–456. doi: 10.1016/0370-2693(94)91089-8. arXiv:
|
2042 |
+
hep-th/9402084.
|
2043 |
+
[63]
|
2044 |
+
G. Parisi. ‘On Infrared Divergences’. Nucl. Phys. B 150 (1979), pp. 163–172. doi:
|
2045 |
+
10.1016/0550-3213(79)90298-0.
|
2046 |
+
[64]
|
2047 |
+
G. Parisi. ‘Singularities of the Borel Transform in Renormalizable Theories’. Phys.
|
2048 |
+
Lett. B 76 (1978), pp. 65–66. doi: 10.1016/0370-2693(78)90101-6.
|
2049 |
+
[65]
|
2050 |
+
Gerard ’t Hooft. ‘Can We Make Sense Out of Quantum Chromodynamics?’ Sub-
|
2051 |
+
nucl. Ser. 15 (1979). Ed. by Antonino Zichichi, p. 943.
|
2052 |
+
[66]
|
2053 |
+
EB Bogomolny. ‘Calculation of instanton-anti-instanton contributions in quantum
|
2054 |
+
mechanics’. Physics Letters B 91.3-4 (1980), pp. 431–435.
|
2055 |
+
[67]
|
2056 |
+
J. Zinn-Justin and U.D. Jentschura. ‘Multi-instantons and exact results I: Con-
|
2057 |
+
jectures, WKB expansions, and instanton interactions’. Annals Phys. 313 (2004),
|
2058 |
+
pp. 197–267. doi: 10.1016/j.aop.2004.04.004. arXiv: quant-ph/0501136.
|
2059 |
+
[68]
|
2060 |
+
J. Zinn-Justin and U.D. Jentschura. ‘Multi-instantons and exact results II: Specific
|
2061 |
+
cases, higher-order effects, and numerical calculations’. Annals Phys. 313 (2004),
|
2062 |
+
pp. 269–325. doi: 10.1016/j.aop.2004.04.003. arXiv: quant-ph/0501137.
|
2063 |
+
[69]
|
2064 |
+
Jean Zinn-Justin. ‘Perturbation Series at Large Orders in Quantum Mechanics
|
2065 |
+
and Field Theories: Application to the Problem of Resummation’. Phys. Rept. 70
|
2066 |
+
(1981), p. 109. doi: 10.1016/0370-1573(81)90016-8.
|
2067 |
+
[70]
|
2068 |
+
Alexei B. Zamolodchikov. ‘Mass scale in the sine-Gordon model and its reductions’.
|
2069 |
+
Int. J. Mod. Phys. A 10 (1995), pp. 1125–1150. doi: 10.1142/S0217751X9500053X.
|
2070 |
+
[71]
|
2071 |
+
Daniele Dorigoni and Philip Glass. ‘The grin of Cheshire cat resurgence from
|
2072 |
+
supersymmetric localization’. SciPost Physics 4.2 (2018), p. 012.
|
2073 |
+
[72]
|
2074 |
+
Daniele Dorigoni and Philip Glass. ‘Picard-Lefschetz decomposition and Cheshire
|
2075 |
+
Cat resurgence in 3D N = 2 field theories’. Journal of High Energy Physics 2019.12
|
2076 |
+
(2019), pp. 1–40.
|
2077 |
+
[73]
|
2078 |
+
Can Koz¸caz, Tin Sulejmanpasic, Yuya Tanizaki and Mithat ¨Unsal. ‘Cheshire Cat
|
2079 |
+
resurgence, Self-resurgence and Quasi-Exact Solvable Systems’. Commun. Math.
|
2080 |
+
Phys. 364.3 (2018), pp. 835–878. doi: 10.1007/s00220- 018- 3281- y. arXiv:
|
2081 |
+
1609.06198 [hep-th].
|
2082 |
+
[74]
|
2083 |
+
Syo Kamata, Tatsuhiro Misumi, Naohisa Sueishi and Mithat ¨Unsal. ‘Exact-WKB
|
2084 |
+
analysis for SUSY and quantum deformed potentials: Quantum mechanics with
|
2085 |
+
Grassmann fields and Wess-Zumino terms’ (Nov. 2021). arXiv: 2111.05922 [hep-th].
|
2086 |
+
[75]
|
2087 |
+
Stephen G. Naculich and Howard J. Schnitzer. ‘Duality Between SU(N)k and
|
2088 |
+
SU(k)N WZW Models’. Nucl. Phys. B 347 (1990), pp. 687–742. doi: 10.1016/
|
2089 |
+
0550-3213(90)90380-V.
|
2090 |
+
25
|
2091 |
+
|
2092 |
+
[76]
|
2093 |
+
Lorenzo Di Pietro, Marcos Mari˜no, Giacomo Sberveglieri and Marco Serone. ‘Re-
|
2094 |
+
surgence and 1/N Expansion in Integrable Field Theories’. JHEP 10 (2021), p. 166.
|
2095 |
+
doi: 10.1007/JHEP10(2021)166. arXiv: 2108.02647 [hep-th].
|
2096 |
+
26
|
2097 |
+
|
D9FKT4oBgHgl3EQfZi4o/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
DdE1T4oBgHgl3EQf-Abs/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:c78210b91bd907702ac2071c284b7dd233aa36bb850ae753ae158d36975ea5f1
|
3 |
+
size 167437
|
DdE5T4oBgHgl3EQfUQ9g/content/tmp_files/2301.05542v1.pdf.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
DdE5T4oBgHgl3EQfUQ9g/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
F9E4T4oBgHgl3EQfHQxB/content/2301.04901v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:d25df5f2a017ce78ef7118056a1f5d77188bd45ff6b498708456553465282715
|
3 |
+
size 1111783
|
F9E4T4oBgHgl3EQfHQxB/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:e509fa701b1390ac8592bbe2aa7b84964cedacf34dacaf4fe2652d79cdfdef32
|
3 |
+
size 185772
|
FtE1T4oBgHgl3EQf-waO/content/tmp_files/2301.03573v1.pdf.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
FtE1T4oBgHgl3EQf-waO/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
GNAzT4oBgHgl3EQfi_3N/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:589220eedb7a6d99990fe7a7cd08d203545b818d8a9d124332c506bb2f9e801c
|
3 |
+
size 3932205
|
GdAyT4oBgHgl3EQffPg-/content/tmp_files/2301.00335v1.pdf.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
GdAyT4oBgHgl3EQffPg-/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
GtE0T4oBgHgl3EQfRQCY/content/tmp_files/2301.02205v1.pdf.txt
ADDED
@@ -0,0 +1,678 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
arXiv:2301.02205v1 [math.LO] 5 Jan 2023
|
2 |
+
The logic with unsharp implication and negation
|
3 |
+
Ivan Chajda and Helmut L¨anger
|
4 |
+
Abstract
|
5 |
+
It is well-known that intuitionistic logics can be formalized by means of Brouwe-
|
6 |
+
rian semilattices, i.e. relatively pseudocomplemented semilattices. Then the logical
|
7 |
+
connective implication is considered to be the relative pseudocomplement and con-
|
8 |
+
junction is the semilattice operation meet.
|
9 |
+
If the Brouwerian semilattice has a
|
10 |
+
bottom element 0 then the relative pseudocomplement with respect to 0 is called
|
11 |
+
the pseudocomplement and it is considered as the connective negation in this logic.
|
12 |
+
Our idea is to consider an arbitrary meet-semilattice with 0 satisfying only the
|
13 |
+
Ascending Chain Condition, which is trivially satisfied in finite semilattices, and
|
14 |
+
introduce the connective negation x0 as the set of all maximal elements z satis-
|
15 |
+
fying x ∧ z = 0 and the connective implication x → y as the set of all maximal
|
16 |
+
elements z satisfying x∧z ≤ y. Such a negation and implication is “unsharp” since
|
17 |
+
it assigns to one entry x or to two entries x and y belonging to the semilattice,
|
18 |
+
respectively, a subset instead of an element of the semilattice. Surprisingly, this
|
19 |
+
kind of negation and implication, respectively, still shares a number of properties
|
20 |
+
of these connectives in intuitionistic logic, in particular the derivation rule Modus
|
21 |
+
Ponens. Moreover, unsharp negation and unsharp implication can be characterized
|
22 |
+
by means of five, respectively seven simple axioms. Several examples are presented.
|
23 |
+
The concepts of a deductive system and of a filter are introduced as well as the
|
24 |
+
congruence determined by such a filter. We finally describe certain relationships
|
25 |
+
between these concepts.
|
26 |
+
AMS Subject Classification: 03G10, 03G25, 03B60, 06A12, 06D20
|
27 |
+
Keywords: Semilattice, Brouwerian semilattice, Heyting algebra, intuitionistic logic,
|
28 |
+
unsharp negation, unsharp implication, deductive system, filter, congruence
|
29 |
+
1
|
30 |
+
Introduction
|
31 |
+
Intuitionistic logic is usually algebraically formalized by means of Brouwerian semilat-
|
32 |
+
tices, i.e. semilattices (S, ∧, ∗) where ∗ denotes relative pseudocomplementation which is
|
33 |
+
considered as the connective implication, see [1], [2], [12], [15] and [16]. If (S, ∧, ∗) has a 0
|
34 |
+
then x∗0 is the pseudocomplement of x usually denoted by x∗ and considered as negation
|
35 |
+
of x in this logic. If (S, ∧, ∗, 0) is even a lattice then it is called a Heyting algebra, see [14]
|
36 |
+
and [17]. For posets the concept of pseudocomplementation was extended and studied
|
37 |
+
by the authors in [4] and [5].
|
38 |
+
It is well-known that every Brouwerian lattice (or Heyting algebra) is distributive.The
|
39 |
+
concept of relative pseudocomplementation was extended by the first author to non-
|
40 |
+
distributive lattices under the name sectional pseudocomplementation, see [3] and [9].
|
41 |
+
1
|
42 |
+
|
43 |
+
Hence a kind of non-distributive intuitionistic logic can be created on sectionally pseu-
|
44 |
+
docomplemented lattices.
|
45 |
+
In their previous papers [6] and [8] the authors showed that some important logics can
|
46 |
+
be based also on posets that need not be lattices. An example of such a logic is the
|
47 |
+
logic of quantum mechanics based on orthomodular posets, see e.g. [6], [10], [11] and
|
48 |
+
[18]. It is evident that in this case some logical connectives such that disjunction or
|
49 |
+
conjunction may be only partial operations or, as pointed out by the authors in [8] and
|
50 |
+
[7], they may be be considered in an “unsharp version”, i.e. their result need not be a
|
51 |
+
single element but may be a subset of the poset in question. Thus also the connective
|
52 |
+
implication is created in this way as “unsharp”. For “unsharpness” see also [13]. This
|
53 |
+
motivated us to study a variant of intuitionistic logic based on lattices that need neither
|
54 |
+
be relatively pseudocomplemented nor even sectionally pseudocomplemented where the
|
55 |
+
connective implication is unsharp.
|
56 |
+
2
|
57 |
+
Preliminaries
|
58 |
+
In the following we identify singletons with their unique element, i.e. we will write x
|
59 |
+
instead of {x}. Moreover, all posets considered in the sequel are assumed to satisfy the
|
60 |
+
Ascending Chain Condition which we will abbreviate by ACC. This implies that every
|
61 |
+
element lies under a maximal one. Of course, every finite poset satisfies the ACC. Let
|
62 |
+
(P, ≤) be a poset, b ∈ P and A, B ⊆ P. By Max A we will denote the set of all maximal
|
63 |
+
elements of A. We define
|
64 |
+
A ≤ B if a ≤ b for all a ∈ A and all b ∈ B,
|
65 |
+
A ≤1 B if for every a ∈ A there exists some b ∈ B with a ≤ b,
|
66 |
+
A ≈1 B if A ≤1 B and B ≤1 A.
|
67 |
+
The relation ≤1 is a quasiorder relation on 2P and ≈1 an equivalence relation on 2P. It
|
68 |
+
is easy to see that A ≤1 Max B provided A ⊆ B and that A ≤1 b is equivalent to A ≤ b.
|
69 |
+
Let S = (S, ∧) be an arbitrary meet-semilattice and A, B ⊆ S. We define
|
70 |
+
A ∧ B := {a ∧ b | a ∈ A, b ∈ B}.
|
71 |
+
3
|
72 |
+
Unsharp negation
|
73 |
+
Let (S, ∧, 0) be a meet-semilattice with 0 satisfying the ACC, a ∈ S and A ⊆ S. We
|
74 |
+
define
|
75 |
+
a0 := Max{x ∈ S|a ∧ x = 0}.
|
76 |
+
Hence 0 is a unary operator on the meet-semilattice (S, ∧, 0) with 0 satisfying the ACC
|
77 |
+
which assigns to every element x ∈ S the non-void subset x0 ⊆ S. The element a is called
|
78 |
+
sharp if a00 = a. Moreover, we define
|
79 |
+
A0 := Max{x ∈ S|A ∧ x = 0}.
|
80 |
+
We are going to prove the following properties of the operator 0 for every meet-semilattice
|
81 |
+
with 0 satisfying the ACC.
|
82 |
+
2
|
83 |
+
|
84 |
+
Theorem 3.1. Let S = (S, ∧, 0) be a meet-semilattice with 0 satisfying the ACC and
|
85 |
+
a, b ∈ S. Then the following holds:
|
86 |
+
(i) a0 is an antichain,
|
87 |
+
(ii) a ≤1 a00,
|
88 |
+
(iii) a ≤ b implies b0 ≤1 a0,
|
89 |
+
(iv) 00 = Max S,
|
90 |
+
(v) a ∧ a0 = 0,
|
91 |
+
(vi) if S is bounded then 00 = 1 and 10 = 0,
|
92 |
+
(vii) a ∧ 00 ≈1 a,
|
93 |
+
(viii) a ∧ (a ∧ b)0 ≈1 a ∧ b0.
|
94 |
+
Proof.
|
95 |
+
(i) This is clear.
|
96 |
+
(ii) We have a ∈ {x ∈ S | a0 ∧ x = 0}.
|
97 |
+
(iii) If a ≤ b then {x ∈ S | b ∧ x = 0} ⊆ {x ∈ S | a ∧ x = 0}.
|
98 |
+
(iv) and (v) follow directly from the definition of a0.
|
99 |
+
(vi) If S is bounded then according to (iv)
|
100 |
+
00 = Max S = 1,
|
101 |
+
10 = Max{x ∈ S | 1 ∧ x = 0} = Max{0} = 0.
|
102 |
+
(vii) According to (iv) we have a ≤1 Max S = 00 and hence a ≤1 a ∧ 00 ≤ a.
|
103 |
+
(viii) Everyone of the following statements implies the next one:
|
104 |
+
(a ∧ b) ∧ (a ∧ b)0 = 0,
|
105 |
+
b ∧
|
106 |
+
�
|
107 |
+
a ∧ (a ∧ b)0�
|
108 |
+
= 0,
|
109 |
+
a ∧ (a ∧ b)0 ≤1 b0,
|
110 |
+
a ∧ (a ∧ b)0 ≤1 a ∧ b0.
|
111 |
+
From a ∧ b ≤ b we conclude b0 ≤1 (a ∧ b)0 according to (iii) and hence a ∧ b0 ≤1
|
112 |
+
a ∧ (a ∧ b)0.
|
113 |
+
From (iii) of Theorem 3.1 there follows immediately x0 ∧ y0 ≤ (x ∧ y)0.
|
114 |
+
Example 3.2. Consider the meet-semilattice visualized in Fig. 1:
|
115 |
+
3
|
116 |
+
|
117 |
+
0
|
118 |
+
a
|
119 |
+
b
|
120 |
+
c
|
121 |
+
Fig. 1
|
122 |
+
Meet-semilattice
|
123 |
+
We have
|
124 |
+
a = {b, c}0 = a00,
|
125 |
+
00 = {a, b, c},
|
126 |
+
a ∧ (a ∧ b)0 = a ∧ 00 = a ∧ {a, b, c} = {0, a} = a ∧ {a, c} = a ∧ b0
|
127 |
+
in accordance with (ii), (iv) and (viii) of Theorem 3.1, respectively.
|
128 |
+
Example 3.3. Consider the modular lattice L depicted in Fig. 2:
|
129 |
+
0
|
130 |
+
a
|
131 |
+
b
|
132 |
+
c
|
133 |
+
d
|
134 |
+
e
|
135 |
+
f
|
136 |
+
g
|
137 |
+
h
|
138 |
+
1
|
139 |
+
Fig. 2
|
140 |
+
Modular lattice
|
141 |
+
We have
|
142 |
+
a00 = {g, h}0 = a,
|
143 |
+
f 00 = {b, c}0 = f,
|
144 |
+
a0 ∧ e0 = {g, h} ∧ d = d ̸= {g, h} = a0 = (a ∧ e)0.
|
145 |
+
Hence a and f are sharp and the equality x0 ∧ y0 = (x ∧ y)0 does not hold in general. In
|
146 |
+
L from Figure 2 we have
|
147 |
+
e0 = d and d0 = e.
|
148 |
+
Since e ∧ d = 0 and e ∨ d = 1, {0, d, e, 1} is a complemented lattice.
|
149 |
+
If a0 is a singleton, it need not be a complement of a, even if the semilattice is a lattice.
|
150 |
+
E.g., consider the four-element lattice with atoms a and b and with an additional greatest
|
151 |
+
element 1. Then a0 = b, but a ∨ b ̸= 1, i.e., a0 is not a complement of a.
|
152 |
+
For every cardinal number n let Mn = (Mn, ∨, ∧) denote the bounded modular lattice of
|
153 |
+
length 2 having n atoms.
|
154 |
+
The situation from Figure 2 can be generalized as follows.
|
155 |
+
4
|
156 |
+
|
157 |
+
Remark 3.4. Every element of a direct product of a Boolean algebra and an arbitrary
|
158 |
+
number of lattices Mn (possibly different n) is sharp.
|
159 |
+
This follows immediately from the fact that every element of a Boolean algebra and every
|
160 |
+
element of the lattice Mn is sharp.
|
161 |
+
However, if the lattice L is not a direct product of two-element lattices and various Mn
|
162 |
+
then the assertion of Remark 3.4 need not hold, see the following example.
|
163 |
+
Example 3.5. Consider the lattice visualized in Fig. 3:
|
164 |
+
0
|
165 |
+
a
|
166 |
+
b
|
167 |
+
c
|
168 |
+
d
|
169 |
+
e
|
170 |
+
f
|
171 |
+
g
|
172 |
+
1
|
173 |
+
Fig. 3
|
174 |
+
Lattice
|
175 |
+
We have
|
176 |
+
a00 = {b, c}0 = f ̸= a,
|
177 |
+
a000 = f 0 = {b, c} = a0,
|
178 |
+
b00 = {c, f}0 = b,
|
179 |
+
(a0 ∧ b0)00 = ({b, c} ∧ {c, f})00 = {0, c}00 = {b, f}0 = c ̸= {0, c} = a0 ∧ b0,
|
180 |
+
(c0 ∧ f 0)00 = ({b, f} ∧ {b, c})00 = {0, b}00 = {c, f}0 = b ̸= {0, b} = e0 ∧ f 0.
|
181 |
+
Hence a is not sharp, b is sharp and the equality (x0 ∧ y0)00 = x0 ∧ y0 does not hold in
|
182 |
+
general.
|
183 |
+
We are going to show that the operator 0 can be characterized by means of four simple
|
184 |
+
conditions.
|
185 |
+
Theorem 3.6. Let (S, ∧, 0) be a meet-semilattice with 0 satisfying the ACC and 0 a
|
186 |
+
unary operator on S. Then the following are equivalent:
|
187 |
+
(i) x0 = Max{y ∈ S | x ∧ y = 0} for all x ∈ S,
|
188 |
+
(ii) the operator 0 satisfies the following conditions:
|
189 |
+
(P1) x0 is an antichain,
|
190 |
+
5
|
191 |
+
|
192 |
+
(P2) x ∧ 00 ≈1 x,
|
193 |
+
(P3) x ∧ x0 ≈ 0,
|
194 |
+
(P4) x ∧ (x ∧ y)0 ≈1 x ∧ y0.
|
195 |
+
Proof.
|
196 |
+
(i) ⇒ (ii):
|
197 |
+
This follows from Theorem 3.1.
|
198 |
+
(ii) ⇒ (i):
|
199 |
+
If x ∧ y = 0 then according to (P2) and (P4) we have
|
200 |
+
y ≈1 y ∧ 00 = y ∧ (x ∧ y)0 = y ∧ (y ∧ x)0 ≈1 y ∧ x0 ≤1 x0
|
201 |
+
and hence y ≤1 x0. Conversely, if y ≤1 x0 then according to (P3) we have
|
202 |
+
x ∧ y ≤1 x ∧ x0 = 0
|
203 |
+
and hence x ∧ y = 0. This shows that x ∧ y = 0 is equivalent to y ≤1 x0. We conclude
|
204 |
+
Max{y ∈ S | x ∧ y = 0} = Max{y ∈ S | y ≤1 x0} = x0.
|
205 |
+
The last equality can be seen as follows. Let z ∈ Max{y ∈ S | y ≤1 x0}. Then z ≤1 x0,
|
206 |
+
i.e. there exists some u ∈ x0 with z ≤ u. We have u ≤1 x0. Now z < u would imply
|
207 |
+
z /∈ Max{y ∈ S | y ≤1 x0}, a contradiction. This shows z = u ∈ x0. Conversely, assume
|
208 |
+
z ∈ x0. Then z ≤1 x0. If z /∈ Max{y ∈ S | y ≤1 x0} then there would exist some u ∈ S
|
209 |
+
with z < u ≤1 x0 and hence there would exist some w ∈ x0 with z < u ≤ w contradicting
|
210 |
+
(P1). This shows z ∈ Max{y ∈ S | y ≤1 x0}.
|
211 |
+
4
|
212 |
+
Unsharp implication
|
213 |
+
Now we extend the operation of relative pseudocomplementation to arbitrary meet-
|
214 |
+
semilattices with 0 satisfying the ACC as follows: Let S = (S, ∧, 0) be a meet-semilattice
|
215 |
+
with 0 satisfying the ACC, a, b ∈ S and A, B ⊆ S. We define
|
216 |
+
a → b := Max{x ∈ S | a ∧ x ≤ b}.
|
217 |
+
Thus → is a binary operator on S assigning to every pair (x, y) ∈ S2 the non-void subset
|
218 |
+
x → y ⊆ S. It is evident that
|
219 |
+
x0 = x → 0 for each x ∈ S.
|
220 |
+
Moreover, we define
|
221 |
+
A → B := Max{x ∈ S | A ∧ x ≤ B}.
|
222 |
+
Example 4.1. The “operation table” of the operator → in the meet-semilattice of Figure 1
|
223 |
+
looks as follows (we write abc instead of {a, b, c} and so on):
|
224 |
+
→
|
225 |
+
0
|
226 |
+
a
|
227 |
+
b
|
228 |
+
c
|
229 |
+
0
|
230 |
+
abc
|
231 |
+
abc
|
232 |
+
abc
|
233 |
+
abc
|
234 |
+
a
|
235 |
+
bc
|
236 |
+
abc
|
237 |
+
bc
|
238 |
+
ab
|
239 |
+
b
|
240 |
+
ac
|
241 |
+
ac
|
242 |
+
abc
|
243 |
+
ac
|
244 |
+
c
|
245 |
+
ab
|
246 |
+
ab
|
247 |
+
ab
|
248 |
+
abc
|
249 |
+
6
|
250 |
+
|
251 |
+
Example 4.2. The “operation table” of the operator → in the meet-semilattice of Figure 3
|
252 |
+
looks as follows (we write bc instead of {b, c} and so on):
|
253 |
+
→
|
254 |
+
0
|
255 |
+
a
|
256 |
+
b
|
257 |
+
c
|
258 |
+
d
|
259 |
+
e
|
260 |
+
f
|
261 |
+
g
|
262 |
+
1
|
263 |
+
0
|
264 |
+
1
|
265 |
+
1
|
266 |
+
1
|
267 |
+
1
|
268 |
+
1
|
269 |
+
1
|
270 |
+
1
|
271 |
+
1
|
272 |
+
1
|
273 |
+
a
|
274 |
+
bc
|
275 |
+
1
|
276 |
+
bc
|
277 |
+
bc
|
278 |
+
1
|
279 |
+
1
|
280 |
+
1
|
281 |
+
1
|
282 |
+
1
|
283 |
+
b
|
284 |
+
cf
|
285 |
+
cf
|
286 |
+
1
|
287 |
+
cf
|
288 |
+
cf
|
289 |
+
1
|
290 |
+
cf
|
291 |
+
1
|
292 |
+
1
|
293 |
+
c
|
294 |
+
bf
|
295 |
+
bf
|
296 |
+
bf
|
297 |
+
1
|
298 |
+
bf
|
299 |
+
1
|
300 |
+
bf
|
301 |
+
1
|
302 |
+
1
|
303 |
+
d
|
304 |
+
bc
|
305 |
+
g
|
306 |
+
bc
|
307 |
+
bc
|
308 |
+
1
|
309 |
+
g
|
310 |
+
1
|
311 |
+
g
|
312 |
+
1
|
313 |
+
e
|
314 |
+
0
|
315 |
+
f
|
316 |
+
b
|
317 |
+
c
|
318 |
+
f
|
319 |
+
1
|
320 |
+
f
|
321 |
+
1
|
322 |
+
1
|
323 |
+
f
|
324 |
+
bc
|
325 |
+
g
|
326 |
+
bc
|
327 |
+
bc
|
328 |
+
dg
|
329 |
+
g
|
330 |
+
1
|
331 |
+
g
|
332 |
+
1
|
333 |
+
g
|
334 |
+
0
|
335 |
+
f
|
336 |
+
b
|
337 |
+
c
|
338 |
+
f
|
339 |
+
ef
|
340 |
+
f
|
341 |
+
1
|
342 |
+
1
|
343 |
+
1
|
344 |
+
0
|
345 |
+
a
|
346 |
+
b
|
347 |
+
c
|
348 |
+
d
|
349 |
+
e
|
350 |
+
f
|
351 |
+
g
|
352 |
+
1
|
353 |
+
The following properties of the binary operator → can be proved.
|
354 |
+
Theorem 4.3. Let S = (S, ∧, 0) be a meet-semilattice with 0 satisfying the ACC and
|
355 |
+
a, b, c ∈ S. Then the following holds:
|
356 |
+
(i) a → b is an antichain,
|
357 |
+
(ii) a ≤ b implies a → b = Max S,
|
358 |
+
(iii) b ∈ Max S implies b ∈ a → b,
|
359 |
+
(iv) b ≤1 a → b,
|
360 |
+
(v) a ≤1 (a → b) → b,
|
361 |
+
(vi) a ≤ b implies c → a ≤1 c → b and b → c ≤1 a → c.
|
362 |
+
(vii) a ∧ (a → b) ≈1 a ∧ b,
|
363 |
+
(viii) a → (b ∧ c) ≈1 (a → b) ∧ (a → c),
|
364 |
+
(ix) (a → b) ∧ b ≈1 b,
|
365 |
+
(x) if S is bounded then 1 → b = b,
|
366 |
+
(xi) a ∧ (b → b) ≈1 a,
|
367 |
+
(xii) if S is bounded then a → b = 1 if and only if a ≤ b,
|
368 |
+
(xiii) b ≤1 a → (a ∧ b).
|
369 |
+
Proof.
|
370 |
+
(i) This is clear.
|
371 |
+
(ii), (iv), (x), (xii) and (xiii) follow immediately from the definition of →.
|
372 |
+
(iii) If b ∈ Max S then because of a∧b ≤ b we have b ∈ Max{x ∈ S | a∧x ≤ b} = a → b.
|
373 |
+
(v) Since a ∧ x ≤ b for all x ∈ a → b we have a ∧ (a → b) ≤ b, i.e. (a → b) ∧ a ≤ b.
|
374 |
+
7
|
375 |
+
|
376 |
+
(vi) If a ≤ b then
|
377 |
+
{x ∈ S | c ∧ x ≤ a} ⊆ {x ∈ S | c ∧ x ≤ b},
|
378 |
+
{x ∈ S | b ∧ x ≤ c} ⊆ {x ∈ S | a ∧ x ≤ c}.
|
379 |
+
(vii) We have a ∧ x ≤ b and hence a ∧ x ≤ a ∧ b for all x ∈ a → b and hence a ∧ b ≤1
|
380 |
+
a ∧ (a → b) ≤ a ∧ b according to (iv).
|
381 |
+
(viii) According to (vii) we have a → (b ∧ c) ≤1 (a → b) ∧ (a → c). Conversely, assume
|
382 |
+
d ∈ a → b and e ∈ a → c. Then a∧d ≤ b and a∧e ≤ c and hence a∧(d∧e) ≤ b∧c
|
383 |
+
which implies d ∧ e ≤1 a → (b ∧ c). This shows (a → b) ∧ (a → c) ≤1 a → (b ∧ c).
|
384 |
+
(ix) We have b ≤1 a → b according to (iv) and hence b ≤1 (a → b) ∧ b ≤ b.
|
385 |
+
(xi) According to (ii) we have a ≤1 Max S = b → b and hence a ≤1 a ∧ (b → b) ≤ a.
|
386 |
+
From Theorem 4.3 it is evident that the binary operator → shares properties of the
|
387 |
+
logical connective implication in intuitionistic logic despite the fact that it is unsharp,
|
388 |
+
i.e. for x, y ∈ S the result of x → y need not be a singleton.
|
389 |
+
Hence it extends the
|
390 |
+
intuitionistic logic based on a Heyting algebra (L, ∨, ∧, ∗, 0) where again ∨ formalizes
|
391 |
+
disjunction, ∧ formalizes conjunction, but now → formalizes unsharp implication and 0
|
392 |
+
formalizes unsharp negation.
|
393 |
+
Example 4.4. Consider the modular lattice visualized in Fig. 4:
|
394 |
+
0
|
395 |
+
a
|
396 |
+
b
|
397 |
+
c
|
398 |
+
d
|
399 |
+
e
|
400 |
+
f
|
401 |
+
1
|
402 |
+
Fig. 4
|
403 |
+
Modular lattice
|
404 |
+
Then
|
405 |
+
e ≤1 {d, e} = {e, f} → e = (d → e) → e,
|
406 |
+
d ∧ (d → e) = d ∧ {e, f} = c = d ∧ e,
|
407 |
+
(d → e) ∧ e = {e, f} ∧ e = {c, e} ≈1 e
|
408 |
+
in accordance with (v), (vii) and (ix) of Theorem 4.3, respectively.
|
409 |
+
8
|
410 |
+
|
411 |
+
Remark 4.5. It is easy to see that the operation ∧ and the operator → are related by
|
412 |
+
so-called unsharp adjointness, i.e.
|
413 |
+
a ∧ b ≤ c if and only if a ≤1 b → c.
|
414 |
+
Since the operation ∧ is associative, commutative and monotone, it can be considered as
|
415 |
+
a t-norm. Thus the semilattice (S, ∧, →) endowed with the operator → is an unsharply
|
416 |
+
residuated semilattice. Moreover, by (viii) of Theorem 4.3 we have
|
417 |
+
a ∧ (a → b) ≈1 a ∧ b
|
418 |
+
showing that (S, ∧, →) satisfies divisibility.
|
419 |
+
Similarly as for the unary operator 0 we can characterize the binary operator → on a
|
420 |
+
meet-semilattice with 0 satisfying the ACC as follows.
|
421 |
+
Theorem 4.6. Let (S, ∧, 0) be a meet-semilattice with 0 satisfying the ACC and → a
|
422 |
+
binary operator on S. Then the following are equivalent:
|
423 |
+
(i) x → y = Max{z ∈ S | x ∧ z ≤ y} for all x, y ∈ S,
|
424 |
+
(ii) The operator → satisfies the following conditions:
|
425 |
+
(R1) x → y is an antichain,
|
426 |
+
(R2) x ∧ (x → y) ≈1 x ∧ y,
|
427 |
+
(R3) (x → y) ∧ y ≈1 y,
|
428 |
+
(R4) x → (y ∧ z) ≈1 (x → y) ∧ (x → z),
|
429 |
+
(R5) x ∧ (y → y) ≈1 x,
|
430 |
+
(R6) y ≤ z implies x → y ≤1 x → z.
|
431 |
+
Proof.
|
432 |
+
(i) ⇒ (ii):
|
433 |
+
This follows from Theorem 4.3.
|
434 |
+
(ii) ⇒ (i):
|
435 |
+
If x ∧ z ≤ y then according to (R3), (R5), (R4) and (R6) we have
|
436 |
+
z ≈1 (x → z) ∧ z ≤1 x ��� z ≈1 (x → x) ∧ (x → z) ≈1 x → (x ∧ z) ≤1 x → y
|
437 |
+
and hence z ≤1 x → y. Conversely, if z ≤1 x → y then according to (R2) we have
|
438 |
+
x ∧ z ≤1 x ∧ (x → y) ≈1 x ∧ y ≤ y
|
439 |
+
and hence x∧z ≤ y. This shows that x∧z ≤ y is equivalent to z ≤1 x → y. We conclude
|
440 |
+
Max{z ∈ S | x ∧ z ≤ y} = Max{z ∈ S | z ≤1 x → y} = x → y.
|
441 |
+
The last equality can be seen as follows. Let u ∈ Max{z ∈ S | z ≤1 x → y}. Then
|
442 |
+
u ≤1 x → y, i.e. there exists some v ∈ x → y with u ≤ v. We have v ≤1 x → y.
|
443 |
+
Now u < v would imply u /∈ Max{z ∈ S | z ≤1 x → y}, a contradiction.
|
444 |
+
This
|
445 |
+
shows u = v ∈ x → y.
|
446 |
+
Conversely, assume u ∈ x → y.
|
447 |
+
Then u ≤1 x → y.
|
448 |
+
If
|
449 |
+
u /∈ Max{z ∈ S | z ≤1 x → y} then there would exist some v ∈ S with u < v ≤1 x → y
|
450 |
+
and hence there would exist some w ∈ x → y with u < v ≤ w contradicting (R1). This
|
451 |
+
shows u ∈ Max{z ∈ S | z ≤1 x → y}.
|
452 |
+
9
|
453 |
+
|
454 |
+
Example 4.7. Consider the lattice from Figure 4. Then
|
455 |
+
d ∧ (d → e) = d ∧ {e, f} = c = d ∧ e,
|
456 |
+
(d → e) ∧ e = e ∧ e = e,
|
457 |
+
d → (e ∧ f) = d → c = {e, f} ≈1 {c, e, f} = {e, f} ∧ {e, f} = (d → e) ∧ (d → f)
|
458 |
+
in accordance with (R2), (R3) and (R4), respectively.
|
459 |
+
5
|
460 |
+
Deductive systems
|
461 |
+
It is well-known that the connective implication in intuitionistic logic is closely related
|
462 |
+
to the so-called deductive systems in the corresponding Brouwerian semilattice. In what
|
463 |
+
follows we show that a certain modification of the concept of a deductive system plays a
|
464 |
+
similar role for logics with unsharp implication. We define
|
465 |
+
Definition 5.1. A deductive system of a meet-semilattice S = (S, ∧, 0) with 0 satisfying
|
466 |
+
the ACC is a subset D of S satisfying the following conditions for x, y ∈ S:
|
467 |
+
(D1) (Max S) ∩ D ̸= ∅,
|
468 |
+
(D2) x ∈ D and (x → y) ∩ D ̸= ∅ imply y ∈ D.
|
469 |
+
Recall that a filter of a meet-semilattice S = (S, ∧) is a non-empty subset F of S satisfying
|
470 |
+
the following conditions for x, y ∈ S:
|
471 |
+
(F1) x, y ∈ F implies x ∧ y ∈ F,
|
472 |
+
(F2) x ∈ F and x ≤ y imply y ∈ F.
|
473 |
+
It is clear that if S is finite then all filters of S are given by the sets [x) := {y ∈ S | x ≤ y},
|
474 |
+
x ∈ S, and hence the poset of all filters of S is dually isomorphic to S and therefore a
|
475 |
+
join-semilattice where [x) ∨ [y) = [x ∧ y) for all x, y ∈ S.
|
476 |
+
For every non-empty subset A of the universe of a meet-semilattice (S, ∧) we define a
|
477 |
+
binary relation Θ(A) on S as follows:
|
478 |
+
(x, y) ∈ Θ(A) if there exists some a ∈ A with x ∧ a = y ∧ a.
|
479 |
+
Although the following result is known, for the reader’s convenience we present the proof.
|
480 |
+
Lemma 5.2. Let S = (S, ∧, 1) be a meet-semilattice with 1 and Φ ∈ Con S. Then the
|
481 |
+
following holds:
|
482 |
+
(i) [1]Φ is an filter of S,
|
483 |
+
(ii) Θ([1]Φ) ⊆ Φ.
|
484 |
+
Proof.
|
485 |
+
(i) (F1) If a, b ∈ [1]Φ then a ∧ b ∈ [1 ∧ 1]Φ = [1]Φ.
|
486 |
+
10
|
487 |
+
|
488 |
+
(F2) If a ∈ [1]Φ, b ∈ S and a ≤ b then b = 1 ∧ b ∈ [a ∧ b]Φ = [a]Φ = [1]Φ.
|
489 |
+
This shows that [1]Φ is a filter of S.
|
490 |
+
(ii) If (a, b) ∈ Θ([1]Φ) then there exists some c ∈ [1]Φ with a ∧ c = b ∧ c whence
|
491 |
+
a = a ∧ 1 Φ a ∧ c = b ∧ c Φ b ∧ 1 = b
|
492 |
+
which shows (a, b) ∈ Φ.
|
493 |
+
Although our definition of a deductive system differs from that known for relatively
|
494 |
+
pseudocomplemented semilattices, we are still able to prove the following relationships
|
495 |
+
between the concepts mentioned before.
|
496 |
+
Theorem 5.3. Let S = (S, ∧, 0, 1) be a bounded meet-semilattice satisfying the ACC and
|
497 |
+
D a non-empty subset of S. Then the following are equivalent:
|
498 |
+
(i) D a deductive system of S,
|
499 |
+
(ii) D is an filter of S,
|
500 |
+
(iii) Θ(D) ∈ Con S and D = [1]
|
501 |
+
�
|
502 |
+
Θ(D)
|
503 |
+
�
|
504 |
+
.
|
505 |
+
Proof.
|
506 |
+
(i) ⇒ (ii):
|
507 |
+
(F2) Assume a ∈ D, b ∈ S and a ≤ b.
|
508 |
+
Then a → b = Max S because of (ii) of
|
509 |
+
Theorem 4.3. According to (D1) we have (a → b) ∩ D = Max S ∩ D ̸= ∅ and hence
|
510 |
+
b ∈ D by (D2).
|
511 |
+
(F1) Let a, b ∈ D. Then by (xiii) of Theorem 4.3 we have b ≤1 a → (a ∧ b). Hence there
|
512 |
+
exists some c ∈ a → (a ∧ b) with b ≤ c. Now (F2) implies c ∈ D and therefore
|
513 |
+
�
|
514 |
+
a → (a ∧ b)
|
515 |
+
�
|
516 |
+
∩ D ̸= ∅ from which we conclude a ∧ b ∈ D by (D2).
|
517 |
+
(ii) ⇒ (iii):
|
518 |
+
Evidently, Θ(D) is reflexive and symmetric. Let (a, b), (b, c) ∈ Θ(D). Then there exist
|
519 |
+
d, e ∈ D with a ∧ d = b ∧ d and b ∧ e = c ∧ e. Because of (F1) we conclude d ∧ e ∈ D.
|
520 |
+
Now
|
521 |
+
a ∧ (d ∧ e) = (a ∧ d) ∧ e = (b ∧ d) ∧ e = (b ∧ e) ∧ d = (c ∧ e) ∧ d = c ∧ (d ∧ e)
|
522 |
+
which yields (a, c) ∈ Θ(D), i.e. Θ(D) is transitive. Further, if f ∈ S then
|
523 |
+
(a ∧ f) ∧ d = (a ∧ d) ∧ f = (b ∧ d) ∧ f = (b ∧ f) ∧ d
|
524 |
+
showing (a ∧ f, b ∧ f) ∈ Θ(D).
|
525 |
+
Hence Θ(D) ∈ Con S.
|
526 |
+
If a ∈ D then because of
|
527 |
+
a ∧ a = a = 1 ∧ a we have a ∈ [1]
|
528 |
+
�
|
529 |
+
Θ(D)
|
530 |
+
�
|
531 |
+
showing D ⊆ [1]
|
532 |
+
�
|
533 |
+
Θ(D)
|
534 |
+
�
|
535 |
+
. Conversely, assume
|
536 |
+
a ∈ [1]
|
537 |
+
�
|
538 |
+
Θ(D)
|
539 |
+
�
|
540 |
+
. Then there exists some b ∈ D with a ∧ b = 1 ∧ b. This implies b ≤ a
|
541 |
+
wherefrom we conclude a ∈ D by (F2) showing [1]
|
542 |
+
�
|
543 |
+
Θ(D)
|
544 |
+
�
|
545 |
+
⊆ D.
|
546 |
+
(iii) ⇒ (i):
|
547 |
+
11
|
548 |
+
|
549 |
+
(D1) If a ∈ D then, since S satisfies the ACC, there exists some b ∈ Max S with a ≤ b
|
550 |
+
and hence
|
551 |
+
b = 1 ∧ b ∈ [a ∧ b]
|
552 |
+
�
|
553 |
+
Θ(D)
|
554 |
+
�
|
555 |
+
= [a]
|
556 |
+
�
|
557 |
+
Θ(D)
|
558 |
+
�
|
559 |
+
= [1]
|
560 |
+
�
|
561 |
+
Θ(D)
|
562 |
+
�
|
563 |
+
= D.
|
564 |
+
(D2) If a ∈ D, b ∈ S and (a → b) ∩ D ̸= ∅ then there exists some c ∈ D with c ∈ a → b
|
565 |
+
and hence a ∧ c ≤ b whence
|
566 |
+
b = 1∧1∧b ∈ [a∧c∧b]
|
567 |
+
�
|
568 |
+
Θ(D)
|
569 |
+
�
|
570 |
+
= [a∧c]
|
571 |
+
�
|
572 |
+
Θ(D)
|
573 |
+
�
|
574 |
+
= [1∧1]
|
575 |
+
�
|
576 |
+
Θ(D)
|
577 |
+
�
|
578 |
+
= [1]
|
579 |
+
�
|
580 |
+
Θ(D)
|
581 |
+
�
|
582 |
+
= D.
|
583 |
+
It is well known that for a filter F of a relatively pseudocomplemented semilattice we
|
584 |
+
have (a, b) ∈ Θ(F) if and only if a → b ∈ F and b → a ∈ F. However, we can modify
|
585 |
+
this result also for an arbitrary meet-semilattice with 0 satisfying the ACC provided our
|
586 |
+
unsharp implication is considered.
|
587 |
+
Proposition 5.4. Let S = (S, ∧, 0) be a meet-semilattice with 0 satisfying the ACC, F
|
588 |
+
a filter of S and a, b ∈ S. Then the following are equivalent:
|
589 |
+
(i) (a, b) ∈ Θ(F),
|
590 |
+
(ii) (a → b) ∩ F ̸= ∅ and (b → a) ∩ F ̸= ∅.
|
591 |
+
Proof.
|
592 |
+
(i) ⇒ (ii):
|
593 |
+
There exists some c ∈ F with a ∧ c = b ∧ c. Hence a ∧ c ≤ b and b ∧ c ≤ a and therefore
|
594 |
+
there exists some d ∈ a → b with c ≤ d and some e ∈ b → a with c ≤ e. Because of (F2)
|
595 |
+
we conclude d, e ∈ F showing (ii).
|
596 |
+
(ii) ⇒ (i):
|
597 |
+
Let c ∈ (a → b)∩F and d ∈ (b → a)∩F. Then c∧d ∈ F by (F1), a∧c ≤ b and b∧d ≤ a.
|
598 |
+
Hence
|
599 |
+
a ∧ (c ∧ d) = (a ∧ c) ∧ (c ∧ d) ≤ b ∧ (c ∧ d) = (b ∧ d) ∧ (c ∧ d) ≤ a ∧ (c ∧ d),
|
600 |
+
i.e. a ∧ (c ∧ d) = b ∧ (c ∧ d) showing (i).
|
601 |
+
Conclusion
|
602 |
+
Although the implication within the logic based on the structure (S, ∧, 0, →) is unsharp,
|
603 |
+
i.e. x → y may be a subset I of S which need not be a singleton, it has its logical meaning.
|
604 |
+
Namely, we ask that x → y is the maximal element c of S satisfying x ∧ c ≤ y (where ∧
|
605 |
+
denotes conjunction). And for each c ∈ I this is satisfied. Moreover, the elements of I
|
606 |
+
are mutually incomparable. Thus we have no need to prefer one of them with respect to
|
607 |
+
others. However, the expression
|
608 |
+
x ∧ (x → y) ≤ y
|
609 |
+
is nothing else than the derivation rule Modus Ponens (both in classical as well as in
|
610 |
+
non-classical logic) since it properly says that the truth value of y cannot be less than
|
611 |
+
the truth value of the conjunction x ∧ (x → y) of x and the implication x → y. Hence,
|
612 |
+
despite of the fact of unsharpness, such a logic is sound although it is derived from an
|
613 |
+
arbitrary meet-semilattice with 0 satisfying the ACC.
|
614 |
+
12
|
615 |
+
|
616 |
+
References
|
617 |
+
[1] L. E. J. Brouwer, De onbetrouwbaarheid der logische principes. Tijdschrift Wijs-
|
618 |
+
begeerte 2 (1908), 152–158.
|
619 |
+
[2] L. E. J. Brouwer, Intuitionism and formalism. Bull. Amer. Math. Soc. 20 (1913),
|
620 |
+
81–96.
|
621 |
+
[3] I. Chajda, An extension of relative pseudocomplementation to non-distributive lat-
|
622 |
+
tices. Acta Sci. Math. (Szeged) 69 (2003), 491–496.
|
623 |
+
[4] I. Chajda, Pseudocomplemented and Stone posets. Acta Univ. Palack. Olomuc. Fac.
|
624 |
+
Rerum Natur. Math. 51 (2012), 29–34.
|
625 |
+
[5] I. Chajda and H. L¨anger, Algebras describing pseudocomplemented, relatively pseu-
|
626 |
+
docomplemented and sectionally pseudocomplemented posets. Symmetry 13 (2021),
|
627 |
+
753 (17 pp.)
|
628 |
+
[6] I. Chajda and H. L¨anger, Implication in finite posets with pseudocomplemented
|
629 |
+
sections. Soft Computing 26 (2022), 5945–5953.
|
630 |
+
[7] I. Chajda and H. L¨anger, The logic of orthomodular posets of finite height. Log. J.
|
631 |
+
IGPL 30 (2022), 143–154.
|
632 |
+
[8] I. Chajda and H. L¨anger, Operator residuation in orthomodular posets of finite
|
633 |
+
height. Fuzzy Sets Systems (submitted).
|
634 |
+
[9] I. Chajda, H. L¨anger and J. Paseka, Sectionally pseudocomplemented posets. Order
|
635 |
+
38 (2021), 527–546.
|
636 |
+
[10] D. Fazio, A. Ledda and F. Paoli, On Finch’s conditions for the completion of ortho-
|
637 |
+
modular posets. Found. Sci. (2020), https://doi.org/10.1007/s10699-020-09702-z.
|
638 |
+
[11] P. D. Finch, On orthomodular posets. J. Austral. Math. Soc. 11 (1970), 57–62.
|
639 |
+
[12] O. Frink, Pseudo-complements in semi-lattices. Duke Math. J. 29 (1962), 505–514.
|
640 |
+
[13] R. Giuntini and H. Greuling, Toward a formal language for unsharp properties.
|
641 |
+
Found. Phys. 19 (1989), 931–945.
|
642 |
+
[14] A. Heyting, Die formalen Regeln der intuitionistischen Logik. Sitzungsber. Akad.
|
643 |
+
Berlin 1930, 42–56.
|
644 |
+
[15] P. K¨ohler, Brouwerian semilattices: the lattice of total subalgebras. Banach Center
|
645 |
+
Publ. 9 (1982), 47–56.
|
646 |
+
[16] A. Monteiro, Axiomes ind´ependants pour les alg`ebres de Brouwer. Rev. Un. Mat.
|
647 |
+
Argentina 17 (1955), 149–160.
|
648 |
+
[17] L. Monteiro, Les alg`ebres de Heyting et de Lukasiewicz trivalentes. Notre Dame J.
|
649 |
+
Formal Logic 11 (1970), 453–466.
|
650 |
+
[18] P. Pt´ak and S. Pulmannov´a, Orthomodular Structures as Quantum Logics. Kluwer,
|
651 |
+
Dordrecht 1991. ISBN 0-7923-1207-4.
|
652 |
+
13
|
653 |
+
|
654 |
+
Authors’ addresses:
|
655 |
+
Ivan Chajda
|
656 |
+
Palack´y University Olomouc
|
657 |
+
Faculty of Science
|
658 |
+
Department of Algebra and Geometry
|
659 |
+
17. listopadu 12
|
660 |
+
771 46 Olomouc
|
661 |
+
Czech Republic
|
662 | |
663 |
+
Helmut L¨anger
|
664 |
+
TU Wien
|
665 |
+
Faculty of Mathematics and Geoinformation
|
666 |
+
Institute of Discrete Mathematics and Geometry
|
667 |
+
Wiedner Hauptstraße 8-10
|
668 |
+
1040 Vienna
|
669 |
+
Austria, and
|
670 |
+
Palack´y University Olomouc
|
671 |
+
Faculty of Science
|
672 |
+
Department of Algebra and Geometry
|
673 |
+
17. listopadu 12
|
674 |
+
771 46 Olomouc
|
675 |
+
Czech Republic
|
676 | |
677 |
+
14
|
678 |
+
|
GtE0T4oBgHgl3EQfRQCY/content/tmp_files/load_file.txt
ADDED
@@ -0,0 +1,389 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf,len=388
|
2 |
+
page_content='arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
3 |
+
page_content='02205v1 [math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
4 |
+
page_content='LO] 5 Jan 2023 The logic with unsharp implication and negation Ivan Chajda and Helmut L¨anger Abstract It is well-known that intuitionistic logics can be formalized by means of Brouwe- rian semilattices, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
5 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
6 |
+
page_content=' relatively pseudocomplemented semilattices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
7 |
+
page_content=' Then the logical connective implication is considered to be the relative pseudocomplement and con- junction is the semilattice operation meet.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
8 |
+
page_content=' If the Brouwerian semilattice has a bottom element 0 then the relative pseudocomplement with respect to 0 is called the pseudocomplement and it is considered as the connective negation in this logic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
9 |
+
page_content=' Our idea is to consider an arbitrary meet-semilattice with 0 satisfying only the Ascending Chain Condition, which is trivially satisfied in finite semilattices, and introduce the connective negation x0 as the set of all maximal elements z satis- fying x ∧ z = 0 and the connective implication x → y as the set of all maximal elements z satisfying x∧z ≤ y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
10 |
+
page_content=' Such a negation and implication is “unsharp” since it assigns to one entry x or to two entries x and y belonging to the semilattice, respectively, a subset instead of an element of the semilattice.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
11 |
+
page_content=' Surprisingly, this kind of negation and implication, respectively, still shares a number of properties of these connectives in intuitionistic logic, in particular the derivation rule Modus Ponens.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
12 |
+
page_content=' Moreover, unsharp negation and unsharp implication can be characterized by means of five, respectively seven simple axioms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
13 |
+
page_content=' Several examples are presented.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
14 |
+
page_content=' The concepts of a deductive system and of a filter are introduced as well as the congruence determined by such a filter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
15 |
+
page_content=' We finally describe certain relationships between these concepts.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
16 |
+
page_content=' AMS Subject Classification: 03G10, 03G25, 03B60, 06A12, 06D20 Keywords: Semilattice, Brouwerian semilattice, Heyting algebra, intuitionistic logic, unsharp negation, unsharp implication, deductive system, filter, congruence 1 Introduction Intuitionistic logic is usually algebraically formalized by means of Brouwerian semilat- tices, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
17 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
18 |
+
page_content=' semilattices (S, ∧, ∗) where ∗ denotes relative pseudocomplementation which is considered as the connective implication, see [1], [2], [12], [15] and [16].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
19 |
+
page_content=' If (S, ∧, ∗) has a 0 then x∗0 is the pseudocomplement of x usually denoted by x∗ and considered as negation of x in this logic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
20 |
+
page_content=' If (S, ∧, ∗, 0) is even a lattice then it is called a Heyting algebra, see [14] and [17].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
21 |
+
page_content=' For posets the concept of pseudocomplementation was extended and studied by the authors in [4] and [5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
22 |
+
page_content=' It is well-known that every Brouwerian lattice (or Heyting algebra) is distributive.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
23 |
+
page_content='The concept of relative pseudocomplementation was extended by the first author to non- distributive lattices under the name sectional pseudocomplementation, see [3] and [9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
24 |
+
page_content=' 1 Hence a kind of non-distributive intuitionistic logic can be created on sectionally pseu- docomplemented lattices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
25 |
+
page_content=' In their previous papers [6] and [8] the authors showed that some important logics can be based also on posets that need not be lattices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
26 |
+
page_content=' An example of such a logic is the logic of quantum mechanics based on orthomodular posets, see e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
27 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
28 |
+
page_content=' [6], [10], [11] and [18].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
29 |
+
page_content=' It is evident that in this case some logical connectives such that disjunction or conjunction may be only partial operations or, as pointed out by the authors in [8] and [7], they may be be considered in an “unsharp version”, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
30 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
31 |
+
page_content=' their result need not be a single element but may be a subset of the poset in question.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
32 |
+
page_content=' Thus also the connective implication is created in this way as “unsharp”.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
33 |
+
page_content=' For “unsharpness” see also [13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
34 |
+
page_content=' This motivated us to study a variant of intuitionistic logic based on lattices that need neither be relatively pseudocomplemented nor even sectionally pseudocomplemented where the connective implication is unsharp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
35 |
+
page_content=' 2 Preliminaries In the following we identify singletons with their unique element, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
36 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
37 |
+
page_content=' we will write x instead of {x}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
38 |
+
page_content=' Moreover, all posets considered in the sequel are assumed to satisfy the Ascending Chain Condition which we will abbreviate by ACC.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
39 |
+
page_content=' This implies that every element lies under a maximal one.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
40 |
+
page_content=' Of course, every finite poset satisfies the ACC.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
41 |
+
page_content=' Let (P, ≤) be a poset, b ∈ P and A, B ⊆ P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
42 |
+
page_content=' By Max A we will denote the set of all maximal elements of A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
43 |
+
page_content=' We define A ≤ B if a ≤ b for all a ∈ A and all b ∈ B, A ≤1 B if for every a ∈ A there exists some b ∈ B with a ≤ b, A ≈1 B if A ≤1 B and B ≤1 A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
44 |
+
page_content=' The relation ≤1 is a quasiorder relation on 2P and ≈1 an equivalence relation on 2P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
45 |
+
page_content=' It is easy to see that A ≤1 Max B provided A ⊆ B and that A ≤1 b is equivalent to A ≤ b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
46 |
+
page_content=' Let S = (S, ∧) be an arbitrary meet-semilattice and A, B ⊆ S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
47 |
+
page_content=' We define A ∧ B := {a ∧ b | a ∈ A, b ∈ B}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
48 |
+
page_content=' 3 Unsharp negation Let (S, ∧, 0) be a meet-semilattice with 0 satisfying the ACC, a ∈ S and A ⊆ S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
49 |
+
page_content=' We define a0 := Max{x ∈ S|a ∧ x = 0}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
50 |
+
page_content=' Hence 0 is a unary operator on the meet-semilattice (S, ∧, 0) with 0 satisfying the ACC which assigns to every element x ∈ S the non-void subset x0 ⊆ S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
51 |
+
page_content=' The element a is called sharp if a00 = a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
52 |
+
page_content=' Moreover, we define A0 := Max{x ∈ S|A ∧ x = 0}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
53 |
+
page_content=' We are going to prove the following properties of the operator 0 for every meet-semilattice with 0 satisfying the ACC.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
54 |
+
page_content=' 2 Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
55 |
+
page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
56 |
+
page_content=' Let S = (S, ∧, 0) be a meet-semilattice with 0 satisfying the ACC and a, b ∈ S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
57 |
+
page_content=' Then the following holds: (i) a0 is an antichain, (ii) a ≤1 a00, (iii) a ≤ b implies b0 ≤1 a0, (iv) 00 = Max S, (v) a ∧ a0 = 0, (vi) if S is bounded then 00 = 1 and 10 = 0, (vii) a ∧ 00 ≈1 a, (viii) a ∧ (a ∧ b)0 ≈1 a ∧ b0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
58 |
+
page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
59 |
+
page_content=' (i) This is clear.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
60 |
+
page_content=' (ii) We have a ∈ {x ∈ S | a0 ∧ x = 0}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
61 |
+
page_content=' (iii) If a ≤ b then {x ∈ S | b ∧ x = 0} ⊆ {x ∈ S | a ∧ x = 0}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
62 |
+
page_content=' (iv) and (v) follow directly from the definition of a0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
63 |
+
page_content=' (vi) If S is bounded then according to (iv) 00 = Max S = 1, 10 = Max{x ∈ S | 1 ∧ x = 0} = Max{0} = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
64 |
+
page_content=' (vii) According to (iv) we have a ≤1 Max S = 00 and hence a ≤1 a ∧ 00 ≤ a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
65 |
+
page_content=' (viii) Everyone of the following statements implies the next one: (a ∧ b) ∧ (a ∧ b)0 = 0, b ∧ � a ∧ (a ∧ b)0� = 0, a ∧ (a ∧ b)0 ≤1 b0, a ∧ (a ∧ b)0 ≤1 a ∧ b0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
66 |
+
page_content=' From a ∧ b ≤ b we conclude b0 ≤1 (a ∧ b)0 according to (iii) and hence a ∧ b0 ≤1 a ∧ (a ∧ b)0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
67 |
+
page_content=' From (iii) of Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
68 |
+
page_content='1 there follows immediately x0 ∧ y0 ≤ (x ∧ y)0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
69 |
+
page_content=' Example 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
70 |
+
page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
71 |
+
page_content=' Consider the meet-semilattice visualized in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
72 |
+
page_content=' 1: 3 0 a b c Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
73 |
+
page_content=' 1 Meet-semilattice We have a = {b, c}0 = a00, 00 = {a, b, c}, a ∧ (a ∧ b)0 = a ∧ 00 = a ∧ {a, b, c} = {0, a} = a ∧ {a, c} = a ∧ b0 in accordance with (ii), (iv) and (viii) of Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
74 |
+
page_content='1, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
75 |
+
page_content=' Example 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
76 |
+
page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
77 |
+
page_content=' Consider the modular lattice L depicted in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
78 |
+
page_content=' 2: 0 a b c d e f g h 1 Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
79 |
+
page_content=' 2 Modular lattice We have a00 = {g, h}0 = a, f 00 = {b, c}0 = f, a0 ∧ e0 = {g, h} ∧ d = d ̸= {g, h} = a0 = (a ∧ e)0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
80 |
+
page_content=' Hence a and f are sharp and the equality x0 ∧ y0 = (x ∧ y)0 does not hold in general.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
81 |
+
page_content=' In L from Figure 2 we have e0 = d and d0 = e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
82 |
+
page_content=' Since e ∧ d = 0 and e ∨ d = 1, {0, d, e, 1} is a complemented lattice.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
83 |
+
page_content=' If a0 is a singleton, it need not be a complement of a, even if the semilattice is a lattice.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
84 |
+
page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
85 |
+
page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
86 |
+
page_content=', consider the four-element lattice with atoms a and b and with an additional greatest element 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
87 |
+
page_content=' Then a0 = b, but a ∨ b ̸= 1, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
88 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
89 |
+
page_content=', a0 is not a complement of a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
90 |
+
page_content=' For every cardinal number n let Mn = (Mn, ∨, ∧) denote the bounded modular lattice of length 2 having n atoms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
91 |
+
page_content=' The situation from Figure 2 can be generalized as follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
92 |
+
page_content=' 4 Remark 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
93 |
+
page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
94 |
+
page_content=' Every element of a direct product of a Boolean algebra and an arbitrary number of lattices Mn (possibly different n) is sharp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
95 |
+
page_content=' This follows immediately from the fact that every element of a Boolean algebra and every element of the lattice Mn is sharp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
96 |
+
page_content=' However, if the lattice L is not a direct product of two-element lattices and various Mn then the assertion of Remark 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
97 |
+
page_content='4 need not hold, see the following example.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
98 |
+
page_content=' Example 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
99 |
+
page_content='5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
100 |
+
page_content=' Consider the lattice visualized in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
101 |
+
page_content=' 3: 0 a b c d e f g 1 Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
102 |
+
page_content=' 3 Lattice We have a00 = {b, c}0 = f ̸= a, a000 = f 0 = {b, c} = a0, b00 = {c, f}0 = b, (a0 ∧ b0)00 = ({b, c} ∧ {c, f})00 = {0, c}00 = {b, f}0 = c ̸= {0, c} = a0 ∧ b0, (c0 ∧ f 0)00 = ({b, f} ∧ {b, c})00 = {0, b}00 = {c, f}0 = b ̸= {0, b} = e0 ∧ f 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
103 |
+
page_content=' Hence a is not sharp, b is sharp and the equality (x0 ∧ y0)00 = x0 ∧ y0 does not hold in general.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
104 |
+
page_content=' We are going to show that the operator 0 can be characterized by means of four simple conditions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
105 |
+
page_content=' Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
106 |
+
page_content='6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
107 |
+
page_content=' Let (S, ∧, 0) be a meet-semilattice with 0 satisfying the ACC and 0 a unary operator on S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
108 |
+
page_content=' Then the following are equivalent: (i) x0 = Max{y ∈ S | x ∧ y = 0} for all x ∈ S, (ii) the operator 0 satisfies the following conditions: (P1) x0 is an antichain, 5 (P2) x ∧ 00 ≈1 x, (P3) x ∧ x0 ≈ 0, (P4) x ∧ (x ∧ y)0 ≈1 x ∧ y0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
109 |
+
page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
110 |
+
page_content=' (i) ⇒ (ii): This follows from Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
111 |
+
page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
112 |
+
page_content=' (ii) ⇒ (i): If x ∧ y = 0 then according to (P2) and (P4) we have y ≈1 y ∧ 00 = y ∧ (x ∧ y)0 = y ∧ (y ∧ x)0 ≈1 y ∧ x0 ≤1 x0 and hence y ≤1 x0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
113 |
+
page_content=' Conversely, if y ≤1 x0 then according to (P3) we have x ∧ y ≤1 x ∧ x0 = 0 and hence x ∧ y = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
114 |
+
page_content=' This shows that x ∧ y = 0 is equivalent to y ≤1 x0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
115 |
+
page_content=' We conclude Max{y ∈ S | x ∧ y = 0} = Max{y ∈ S | y ≤1 x0} = x0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
116 |
+
page_content=' The last equality can be seen as follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
117 |
+
page_content=' Let z ∈ Max{y ∈ S | y ≤1 x0}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
118 |
+
page_content=' Then z ≤1 x0, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
119 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
120 |
+
page_content=' there exists some u ∈ x0 with z ≤ u.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
121 |
+
page_content=' We have u ≤1 x0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
122 |
+
page_content=' Now z < u would imply z /∈ Max{y ∈ S | y ≤1 x0}, a contradiction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
123 |
+
page_content=' This shows z = u ∈ x0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
124 |
+
page_content=' Conversely, assume z ∈ x0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
125 |
+
page_content=' Then z ≤1 x0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
126 |
+
page_content=' If z /∈ Max{y ∈ S | y ≤1 x0} then there would exist some u ∈ S with z < u ≤1 x0 and hence there would exist some w ∈ x0 with z < u ≤ w contradicting (P1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
127 |
+
page_content=' This shows z ∈ Max{y ∈ S | y ≤1 x0}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
128 |
+
page_content=' 4 Unsharp implication Now we extend the operation of relative pseudocomplementation to arbitrary meet- semilattices with 0 satisfying the ACC as follows: Let S = (S, ∧, 0) be a meet-semilattice with 0 satisfying the ACC, a, b ∈ S and A, B ⊆ S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
129 |
+
page_content=' We define a → b := Max{x ∈ S | a ∧ x ≤ b}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
130 |
+
page_content=' Thus → is a binary operator on S assigning to every pair (x, y) ∈ S2 the non-void subset x → y ⊆ S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
131 |
+
page_content=' It is evident that x0 = x → 0 for each x ∈ S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
132 |
+
page_content=' Moreover, we define A → B := Max{x ∈ S | A ∧ x ≤ B}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
133 |
+
page_content=' Example 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
134 |
+
page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
135 |
+
page_content=' The “operation table” of the operator → in the meet-semilattice of Figure 1 looks as follows (we write abc instead of {a, b, c} and so on): → 0 a b c 0 abc abc abc abc a bc abc bc ab b ac ac abc ac c ab ab ab abc 6 Example 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
136 |
+
page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
137 |
+
page_content=' The “operation table” of the operator → in the meet-semilattice of Figure 3 looks as follows (we write bc instead of {b,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
138 |
+
page_content=' c} and so on): → 0 a b c d e f g 1 0 1 1 1 1 1 1 1 1 1 a bc 1 bc bc 1 1 1 1 1 b cf cf 1 cf cf 1 cf 1 1 c bf bf bf 1 bf 1 bf 1 1 d bc g bc bc 1 g 1 g 1 e 0 f b c f 1 f 1 1 f bc g bc bc dg g 1 g 1 g 0 f b c f ef f 1 1 1 0 a b c d e f g 1 The following properties of the binary operator → can be proved.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
139 |
+
page_content=' Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
140 |
+
page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
141 |
+
page_content=' Let S = (S, ∧, 0) be a meet-semilattice with 0 satisfying the ACC and a, b, c ∈ S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
142 |
+
page_content=' Then the following holds: (i) a → b is an antichain, (ii) a ≤ b implies a → b = Max S, (iii) b ∈ Max S implies b ∈ a → b, (iv) b ≤1 a → b, (v) a ≤1 (a → b) → b, (vi) a ≤ b implies c → a ≤1 c → b and b → c ≤1 a → c.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
143 |
+
page_content=' (vii) a ∧ (a → b) ≈1 a ∧ b, (viii) a → (b ∧ c) ≈1 (a → b) ∧ (a → c), (ix) (a → b) ∧ b ≈1 b, (x) if S is bounded then 1 → b = b, (xi) a ∧ (b → b) ≈1 a, (xii) if S is bounded then a → b = 1 if and only if a ≤ b, (xiii) b ≤1 a → (a ∧ b).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
144 |
+
page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
145 |
+
page_content=' (i) This is clear.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
146 |
+
page_content=' (ii), (iv), (x), (xii) and (xiii) follow immediately from the definition of →.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
147 |
+
page_content=' (iii) If b ∈ Max S then because of a∧b ≤ b we have b ∈ Max{x ∈ S | a∧x ≤ b} = a → b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
148 |
+
page_content=' (v) Since a ∧ x ≤ b for all x ∈ a → b we have a ∧ (a → b) ≤ b, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
149 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
150 |
+
page_content=' (a → b) ∧ a ≤ b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
151 |
+
page_content=' 7 (vi) If a ≤ b then {x ∈ S | c ∧ x ≤ a} ⊆ {x ∈ S | c ∧ x ≤ b}, {x ∈ S | b ∧ x ≤ c} ⊆ {x ∈ S | a ∧ x ≤ c}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
152 |
+
page_content=' (vii) We have a ∧ x ≤ b and hence a ∧ x ≤ a ∧ b for all x ∈ a → b and hence a ∧ b ≤1 a ∧ (a → b) ≤ a ∧ b according to (iv).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
153 |
+
page_content=' (viii) According to (vii) we have a → (b ∧ c) ≤1 (a → b) ∧ (a → c).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
154 |
+
page_content=' Conversely, assume d ∈ a → b and e ∈ a → c.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
155 |
+
page_content=' Then a∧d ≤ b and a∧e ≤ c and hence a∧(d∧e) ≤ b∧c which implies d ∧ e ≤1 a → (b ∧ c).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
156 |
+
page_content=' This shows (a → b) ∧ (a → c) ≤1 a → (b ∧ c).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
157 |
+
page_content=' (ix) We have b ≤1 a → b according to (iv) and hence b ≤1 (a → b) ∧ b ≤ b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
158 |
+
page_content=' (xi) According to (ii) we have a ≤1 Max S = b → b and hence a ≤1 a ∧ (b → b) ≤ a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
159 |
+
page_content=' From Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
160 |
+
page_content='3 it is evident that the binary operator → shares properties of the logical connective implication in intuitionistic logic despite the fact that it is unsharp, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
161 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
162 |
+
page_content=' for x, y ∈ S the result of x → y need not be a singleton.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
163 |
+
page_content=' Hence it extends the intuitionistic logic based on a Heyting algebra (L, ∨, ∧, ∗, 0) where again ∨ formalizes disjunction, ∧ formalizes conjunction, but now → formalizes unsharp implication and 0 formalizes unsharp negation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
164 |
+
page_content=' Example 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
165 |
+
page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
166 |
+
page_content=' Consider the modular lattice visualized in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
167 |
+
page_content=' 4: 0 a b c d e f 1 Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
168 |
+
page_content=' 4 Modular lattice Then e ≤1 {d, e} = {e, f} → e = (d → e) → e, d ∧ (d → e) = d ∧ {e, f} = c = d ∧ e, (d → e) ∧ e = {e, f} ∧ e = {c, e} ≈1 e in accordance with (v), (vii) and (ix) of Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
169 |
+
page_content='3, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
170 |
+
page_content=' 8 Remark 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
171 |
+
page_content='5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
172 |
+
page_content=' It is easy to see that the operation ∧ and the operator → are related by so-called unsharp adjointness, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
173 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
174 |
+
page_content=' a ∧ b ≤ c if and only if a ≤1 b → c.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
175 |
+
page_content=' Since the operation ∧ is associative, commutative and monotone, it can be considered as a t-norm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
176 |
+
page_content=' Thus the semilattice (S, ∧, →) endowed with the operator → is an unsharply residuated semilattice.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
177 |
+
page_content=' Moreover, by (viii) of Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
178 |
+
page_content='3 we have a ∧ (a → b) ≈1 a ∧ b showing that (S, ∧, →) satisfies divisibility.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
179 |
+
page_content=' Similarly as for the unary operator 0 we can characterize the binary operator → on a meet-semilattice with 0 satisfying the ACC as follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
180 |
+
page_content=' Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
181 |
+
page_content='6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
182 |
+
page_content=' Let (S, ∧, 0) be a meet-semilattice with 0 satisfying the ACC and → a binary operator on S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
183 |
+
page_content=' Then the following are equivalent: (i) x → y = Max{z ∈ S | x ∧ z ≤ y} for all x, y ∈ S, (ii) The operator → satisfies the following conditions: (R1) x → y is an antichain, (R2) x ∧ (x → y) ≈1 x ∧ y, (R3) (x → y) ∧ y ≈1 y, (R4) x → (y ∧ z) ≈1 (x → y) ∧ (x → z), (R5) x ∧ (y → y) ≈1 x, (R6) y ≤ z implies x → y ≤1 x → z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
184 |
+
page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
185 |
+
page_content=' (i) ⇒ (ii): This follows from Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
186 |
+
page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
187 |
+
page_content=' (ii) ⇒ (i): If x ∧ z ≤ y then according to (R3), (R5), (R4) and (R6) we have z ≈1 (x → z) ∧ z ≤1 x → z ≈1 (x → x) ∧ (x → z) ≈1 x → (x ∧ z) ≤1 x → y and hence z ≤1 x → y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
188 |
+
page_content=' Conversely, if z ≤1 x → y then according to (R2) we have x ∧ z ≤1 x ∧ (x → y) ≈1 x ∧ y ≤ y and hence x∧z ≤ y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
189 |
+
page_content=' This shows that x∧z ≤ y is equivalent to z ≤1 x → y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
190 |
+
page_content=' We conclude Max{z ∈ S | x ∧ z ≤ y} = Max{z ∈ S | z ≤1 x → y} = x → y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
191 |
+
page_content=' The last equality can be seen as follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
192 |
+
page_content=' Let u ∈ Max{z ∈ S | z ≤1 x → y}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
193 |
+
page_content=' Then u ≤1 x → y, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
194 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
195 |
+
page_content=' there exists some v ∈ x → y with u ≤ v.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
196 |
+
page_content=' We have v ≤1 x → y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
197 |
+
page_content=' Now u < v would imply u /∈ Max{z ∈ S | z ≤1 x → y}, a contradiction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
198 |
+
page_content=' This shows u = v ∈ x → y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
199 |
+
page_content=' Conversely, assume u ∈ x → y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
200 |
+
page_content=' Then u ≤1 x → y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
201 |
+
page_content=' If u /∈ Max{z ∈ S | z ≤1 x → y} then there would exist some v ∈ S with u < v ≤1 x → y and hence there would exist some w ∈ x → y with u < v ≤ w contradicting (R1).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
202 |
+
page_content=' This shows u ∈ Max{z ∈ S | z ≤1 x → y}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
203 |
+
page_content=' 9 Example 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
204 |
+
page_content='7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
205 |
+
page_content=' Consider the lattice from Figure 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
206 |
+
page_content=' Then d ∧ (d → e) = d ∧ {e, f} = c = d ∧ e, (d → e) ∧ e = e ∧ e = e, d → (e ∧ f) = d → c = {e, f} ≈1 {c, e, f} = {e, f} ∧ {e, f} = (d → e) ∧ (d → f) in accordance with (R2), (R3) and (R4), respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
207 |
+
page_content=' 5 Deductive systems It is well-known that the connective implication in intuitionistic logic is closely related to the so-called deductive systems in the corresponding Brouwerian semilattice.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
208 |
+
page_content=' In what follows we show that a certain modification of the concept of a deductive system plays a similar role for logics with unsharp implication.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
209 |
+
page_content=' We define Definition 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
210 |
+
page_content='1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
211 |
+
page_content=' A deductive system of a meet-semilattice S = (S, ∧, 0) with 0 satisfying the ACC is a subset D of S satisfying the following conditions for x, y ∈ S: (D1) (Max S) ∩ D ̸= ∅, (D2) x ∈ D and (x → y) ∩ D ̸= ∅ imply y ∈ D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
212 |
+
page_content=' Recall that a filter of a meet-semilattice S = (S, ∧) is a non-empty subset F of S satisfying the following conditions for x, y ∈ S: (F1) x, y ∈ F implies x ∧ y ∈ F, (F2) x ∈ F and x ≤ y imply y ∈ F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
213 |
+
page_content=' It is clear that if S is finite then all filters of S are given by the sets [x) := {y ∈ S | x ≤ y}, x ∈ S, and hence the poset of all filters of S is dually isomorphic to S and therefore a join-semilattice where [x) ∨ [y) = [x ∧ y) for all x, y ∈ S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
214 |
+
page_content=' For every non-empty subset A of the universe of a meet-semilattice (S, ∧) we define a binary relation Θ(A) on S as follows: (x, y) ∈ Θ(A) if there exists some a ∈ A with x ∧ a = y ∧ a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
215 |
+
page_content=' Although the following result is known, for the reader’s convenience we present the proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
216 |
+
page_content=' Lemma 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
217 |
+
page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
218 |
+
page_content=' Let S = (S, ∧, 1) be a meet-semilattice with 1 and Φ ∈ Con S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
219 |
+
page_content=' Then the following holds: (i) [1]Φ is an filter of S, (ii) Θ([1]Φ) ⊆ Φ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
220 |
+
page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
221 |
+
page_content=' (i) (F1) If a, b ∈ [1]Φ then a ∧ b ∈ [1 ∧ 1]Φ = [1]Φ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
222 |
+
page_content=' 10 (F2) If a ∈ [1]Φ, b ∈ S and a ≤ b then b = 1 ∧ b ∈ [a ∧ b]Φ = [a]Φ = [1]Φ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
223 |
+
page_content=' This shows that [1]Φ is a filter of S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
224 |
+
page_content=' (ii) If (a, b) ∈ Θ([1]Φ) then there exists some c ∈ [1]Φ with a ∧ c = b ∧ c whence a = a ∧ 1 Φ a ∧ c = b ∧ c Φ b ∧ 1 = b which shows (a, b) ∈ Φ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
225 |
+
page_content=' Although our definition of a deductive system differs from that known for relatively pseudocomplemented semilattices, we are still able to prove the following relationships between the concepts mentioned before.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
226 |
+
page_content=' Theorem 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
227 |
+
page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
228 |
+
page_content=' Let S = (S, ∧, 0, 1) be a bounded meet-semilattice satisfying the ACC and D a non-empty subset of S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
229 |
+
page_content=' Then the following are equivalent: (i) D a deductive system of S, (ii) D is an filter of S, (iii) Θ(D) ∈ Con S and D = [1] � Θ(D) � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
230 |
+
page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
231 |
+
page_content=' (i) ⇒ (ii): (F2) Assume a ∈ D, b ∈ S and a ≤ b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
232 |
+
page_content=' Then a → b = Max S because of (ii) of Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
233 |
+
page_content='3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
234 |
+
page_content=' According to (D1) we have (a → b) ∩ D = Max S ∩ D ̸= ∅ and hence b ∈ D by (D2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
235 |
+
page_content=' (F1) Let a, b ∈ D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
236 |
+
page_content=' Then by (xiii) of Theorem 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
237 |
+
page_content='3 we have b ≤1 a → (a ∧ b).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
238 |
+
page_content=' Hence there exists some c ∈ a → (a ∧ b) with b ≤ c.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
239 |
+
page_content=' Now (F2) implies c ∈ D and therefore � a → (a ∧ b) � ∩ D ̸= ∅ from which we conclude a ∧ b ∈ D by (D2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
240 |
+
page_content=' (ii) ⇒ (iii): Evidently, Θ(D) is reflexive and symmetric.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
241 |
+
page_content=' Let (a, b), (b, c) ∈ Θ(D).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
242 |
+
page_content=' Then there exist d, e ∈ D with a ∧ d = b ∧ d and b ∧ e = c ∧ e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
243 |
+
page_content=' Because of (F1) we conclude d ∧ e ∈ D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
244 |
+
page_content=' Now a ∧ (d ∧ e) = (a ∧ d) ∧ e = (b ∧ d) ∧ e = (b ∧ e) ∧ d = (c ∧ e) ∧ d = c ∧ (d ∧ e) which yields (a, c) ∈ Θ(D), i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
245 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
246 |
+
page_content=' Θ(D) is transitive.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
247 |
+
page_content=' Further, if f ∈ S then (a ∧ f) ∧ d = (a ∧ d) ∧ f = (b ∧ d) ∧ f = (b ∧ f) ∧ d showing (a ∧ f, b ∧ f) ∈ Θ(D).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
248 |
+
page_content=' Hence Θ(D) ∈ Con S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
249 |
+
page_content=' If a ∈ D then because of a ∧ a = a = 1 ∧ a we have a ∈ [1] � Θ(D) � showing D ⊆ [1] � Θ(D) � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
250 |
+
page_content=' Conversely, assume a ∈ [1] � Θ(D) � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
251 |
+
page_content=' Then there exists some b ∈ D with a ∧ b = 1 ∧ b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
252 |
+
page_content=' This implies b ≤ a wherefrom we conclude a ∈ D by (F2) showing [1] � Θ(D) � ⊆ D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
253 |
+
page_content=' (iii) ⇒ (i): 11 (D1) If a ∈ D then, since S satisfies the ACC, there exists some b ∈ Max S with a ≤ b and hence b = 1 ∧ b ∈ [a ∧ b] � Θ(D) � = [a] � Θ(D) � = [1] � Θ(D) � = D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
254 |
+
page_content=' (D2) If a ∈ D, b ∈ S and (a → b) ∩ D ̸= ∅ then there exists some c ∈ D with c ∈ a → b and hence a ∧ c ≤ b whence b = 1∧1∧b ∈ [a∧c∧b] � Θ(D) � = [a∧c] � Θ(D) � = [1∧1] � Θ(D) � = [1] � Θ(D) � = D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
255 |
+
page_content=' It is well known that for a filter F of a relatively pseudocomplemented semilattice we have (a, b) ∈ Θ(F) if and only if a → b ∈ F and b → a ∈ F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
256 |
+
page_content=' However, we can modify this result also for an arbitrary meet-semilattice with 0 satisfying the ACC provided our unsharp implication is considered.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
257 |
+
page_content=' Proposition 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
258 |
+
page_content='4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
259 |
+
page_content=' Let S = (S, ∧, 0) be a meet-semilattice with 0 satisfying the ACC, F a filter of S and a, b ∈ S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
260 |
+
page_content=' Then the following are equivalent: (i) (a, b) ∈ Θ(F), (ii) (a → b) ∩ F ̸= ∅ and (b → a) ∩ F ̸= ∅.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
261 |
+
page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
262 |
+
page_content=' (i) ⇒ (ii): There exists some c ∈ F with a ∧ c = b ∧ c.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
263 |
+
page_content=' Hence a ∧ c ≤ b and b ∧ c ≤ a and therefore there exists some d ∈ a → b with c ≤ d and some e ∈ b → a with c ≤ e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
264 |
+
page_content=' Because of (F2) we conclude d, e ∈ F showing (ii).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
265 |
+
page_content=' (ii) ⇒ (i): Let c ∈ (a → b)∩F and d ∈ (b → a)∩F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
266 |
+
page_content=' Then c∧d ∈ F by (F1), a∧c ≤ b and b∧d ≤ a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
267 |
+
page_content=' Hence a ∧ (c ∧ d) = (a ∧ c) ∧ (c ∧ d) ≤ b ∧ (c ∧ d) = (b ∧ d) ∧ (c ∧ d) ≤ a ∧ (c ∧ d), i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
268 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
269 |
+
page_content=' a ∧ (c ∧ d) = b ∧ (c ∧ d) showing (i).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
270 |
+
page_content=' Conclusion Although the implication within the logic based on the structure (S, ∧, 0, →) is unsharp, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
271 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
272 |
+
page_content=' x → y may be a subset I of S which need not be a singleton, it has its logical meaning.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
273 |
+
page_content=' Namely, we ask that x → y is the maximal element c of S satisfying x ∧ c ≤ y (where ∧ denotes conjunction).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
274 |
+
page_content=' And for each c ∈ I this is satisfied.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
275 |
+
page_content=' Moreover, the elements of I are mutually incomparable.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
276 |
+
page_content=' Thus we have no need to prefer one of them with respect to others.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
277 |
+
page_content=' However, the expression x ∧ (x → y) ≤ y is nothing else than the derivation rule Modus Ponens (both in classical as well as in non-classical logic) since it properly says that the truth value of y cannot be less than the truth value of the conjunction x ∧ (x → y) of x and the implication x → y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
278 |
+
page_content=' Hence, despite of the fact of unsharpness, such a logic is sound although it is derived from an arbitrary meet-semilattice with 0 satisfying the ACC.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
279 |
+
page_content=' 12 References [1] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
280 |
+
page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
281 |
+
page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
282 |
+
page_content=' Brouwer, De onbetrouwbaarheid der logische principes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
283 |
+
page_content=' Tijdschrift Wijs- begeerte 2 (1908), 152–158.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
284 |
+
page_content=' [2] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
285 |
+
page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
286 |
+
page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
287 |
+
page_content=' Brouwer, Intuitionism and formalism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
288 |
+
page_content=' Bull.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
289 |
+
page_content=' Amer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
290 |
+
page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
291 |
+
page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
292 |
+
page_content=' 20 (1913), 81–96.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
293 |
+
page_content=' [3] I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
294 |
+
page_content=' Chajda, An extension of relative pseudocomplementation to non-distributive lat- tices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
295 |
+
page_content=' Acta Sci.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
296 |
+
page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
297 |
+
page_content=' (Szeged) 69 (2003), 491–496.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
298 |
+
page_content=' [4] I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
299 |
+
page_content=' Chajda, Pseudocomplemented and Stone posets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
300 |
+
page_content=' Acta Univ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
301 |
+
page_content=' Palack.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
302 |
+
page_content=' Olomuc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
303 |
+
page_content=' Fac.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
304 |
+
page_content=' Rerum Natur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
305 |
+
page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
306 |
+
page_content=' 51 (2012), 29–34.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
307 |
+
page_content=' [5] I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
308 |
+
page_content=' Chajda and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
309 |
+
page_content=' L¨anger, Algebras describing pseudocomplemented, relatively pseu- docomplemented and sectionally pseudocomplemented posets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
310 |
+
page_content=' Symmetry 13 (2021), 753 (17 pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
311 |
+
page_content=') [6] I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
312 |
+
page_content=' Chajda and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
313 |
+
page_content=' L¨anger, Implication in finite posets with pseudocomplemented sections.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
314 |
+
page_content=' Soft Computing 26 (2022), 5945–5953.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
315 |
+
page_content=' [7] I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
316 |
+
page_content=' Chajda and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
317 |
+
page_content=' L¨anger, The logic of orthomodular posets of finite height.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
318 |
+
page_content=' Log.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
319 |
+
page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
320 |
+
page_content=' IGPL 30 (2022), 143–154.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
321 |
+
page_content=' [8] I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
322 |
+
page_content=' Chajda and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
323 |
+
page_content=' L¨anger, Operator residuation in orthomodular posets of finite height.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
324 |
+
page_content=' Fuzzy Sets Systems (submitted).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
325 |
+
page_content=' [9] I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
326 |
+
page_content=' Chajda, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
327 |
+
page_content=' L¨anger and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
328 |
+
page_content=' Paseka, Sectionally pseudocomplemented posets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
329 |
+
page_content=' Order 38 (2021), 527–546.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
330 |
+
page_content=' [10] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
331 |
+
page_content=' Fazio, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
332 |
+
page_content=' Ledda and F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
333 |
+
page_content=' Paoli, On Finch’s conditions for the completion of ortho- modular posets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
334 |
+
page_content=' Found.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
335 |
+
page_content=' Sci.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
336 |
+
page_content=' (2020), https://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
337 |
+
page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
338 |
+
page_content='1007/s10699-020-09702-z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
339 |
+
page_content=' [11] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
340 |
+
page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
341 |
+
page_content=' Finch, On orthomodular posets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
342 |
+
page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
343 |
+
page_content=' Austral.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
344 |
+
page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
345 |
+
page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
346 |
+
page_content=' 11 (1970), 57–62.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
347 |
+
page_content=' [12] O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
348 |
+
page_content=' Frink, Pseudo-complements in semi-lattices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
349 |
+
page_content=' Duke Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
350 |
+
page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
351 |
+
page_content=' 29 (1962), 505–514.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
352 |
+
page_content=' [13] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
353 |
+
page_content=' Giuntini and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
354 |
+
page_content=' Greuling, Toward a formal language for unsharp properties.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
355 |
+
page_content=' Found.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
356 |
+
page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
357 |
+
page_content=' 19 (1989), 931–945.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
358 |
+
page_content=' [14] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
359 |
+
page_content=' Heyting, Die formalen Regeln der intuitionistischen Logik.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
360 |
+
page_content=' Sitzungsber.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
361 |
+
page_content=' Akad.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
362 |
+
page_content=' Berlin 1930, 42–56.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
363 |
+
page_content=' [15] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
364 |
+
page_content=' K¨ohler, Brouwerian semilattices: the lattice of total subalgebras.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
365 |
+
page_content=' Banach Center Publ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
366 |
+
page_content=' 9 (1982), 47–56.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
367 |
+
page_content=' [16] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
368 |
+
page_content=' Monteiro, Axiomes ind´ependants pour les alg`ebres de Brouwer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
369 |
+
page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
370 |
+
page_content=' Un.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
371 |
+
page_content=' Mat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
372 |
+
page_content=' Argentina 17 (1955), 149–160.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
373 |
+
page_content=' [17] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
374 |
+
page_content=' Monteiro, Les alg`ebres de Heyting et de Lukasiewicz trivalentes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
375 |
+
page_content=' Notre Dame J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
376 |
+
page_content=' Formal Logic 11 (1970), 453–466.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
377 |
+
page_content=' [18] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
378 |
+
page_content=' Pt´ak and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
379 |
+
page_content=' Pulmannov´a, Orthomodular Structures as Quantum Logics.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
380 |
+
page_content=' Kluwer, Dordrecht 1991.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
381 |
+
page_content=' ISBN 0-7923-1207-4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
382 |
+
page_content=' 13 Authors’ addresses: Ivan Chajda Palack´y University Olomouc Faculty of Science Department of Algebra and Geometry 17.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
383 |
+
page_content=' listopadu 12 771 46 Olomouc Czech Republic ivan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
384 |
+
page_content='chajda@upol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
385 |
+
page_content='cz Helmut L¨anger TU Wien Faculty of Mathematics and Geoinformation Institute of Discrete Mathematics and Geometry Wiedner Hauptstraße 8-10 1040 Vienna Austria, and Palack´y University Olomouc Faculty of Science Department of Algebra and Geometry 17.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
386 |
+
page_content=' listopadu 12 771 46 Olomouc Czech Republic helmut.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
387 |
+
page_content='laenger@tuwien.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
388 |
+
page_content='ac.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
389 |
+
page_content='at 14' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/GtE0T4oBgHgl3EQfRQCY/content/2301.02205v1.pdf'}
|
HdE0T4oBgHgl3EQfRgBm/content/tmp_files/2301.02208v1.pdf.txt
ADDED
@@ -0,0 +1,1183 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Do Users Want Platform Moderation or Individual Control?
|
2 |
+
Examining the Role of Third-Person Effects and Free Speech
|
3 |
+
Support in Shaping Moderation Preferences
|
4 |
+
Shagun Jhaver, Amy Zhang
|
5 |
+
Online platforms employ commercial content moderators and use automated systems to identify and remove
|
6 |
+
the most blatantly inappropriate content for all users. They also provide moderation settings that let users
|
7 |
+
personalize their preferences for which posts they want to avoid seeing. This study presents the results of a
|
8 |
+
nationally representative survey of 984 US adults. We examine how users would prefer for three categories of
|
9 |
+
norm-violating content (hate speech, sexually explicit content, and violent content) to be regulated.
|
10 |
+
Specifically, we analyze whether users prefer platforms to remove such content for all users or leave it up to
|
11 |
+
each user to decide if and how much they want to moderate it. We explore the influence of presumed effects
|
12 |
+
on others (PME3) and support for freedom of expression on user attitudes, the two critical factors identified
|
13 |
+
as relevant for social media censorship attitudes by prior literature, about this choice. We find perceived
|
14 |
+
negative effects on others and free speech support as significant predictors of preference for having personal
|
15 |
+
moderation settings over platform-directed moderation for regulating each speech category. Our findings
|
16 |
+
show that platform governance initiatives need to account for both the actual and perceived media effects of
|
17 |
+
norm-violating speech categories to increase user satisfaction. Our analysis also suggests that people do not
|
18 |
+
see personal moderation tools as an infringement on others’ free speech but as a means to assert greater
|
19 |
+
agency to shape their social media feeds.
|
20 |
+
And then there were what I'll call the technolibertarians. For them, MUD rapists were of
|
21 |
+
course assholes, but the presence of assholes on the system was a technical inevitability, like
|
22 |
+
noise on a phone line, and best dealt with not through repressive social disciplinary
|
23 |
+
mechanisms but through the timely deployment of defensive software tools. Some asshole
|
24 |
+
blasting violent, graphic language at you? Don't whine to the authorities about it – hit the
|
25 |
+
@gag command and the asshole's statements will be blocked from your screen (and only
|
26 |
+
yours). It's simple, it's effective, and it censors no one. – Excerpt from “A Rape in Cyberspace”
|
27 |
+
by Julian Dibbell [7]
|
28 |
+
Introduction
|
29 |
+
With the emergence of social media sites and their widespread use by people to
|
30 |
+
communicate with one another, companies like Facebook, Twitter, and YouTube have
|
31 |
+
become the new governors of digital expression. At the same time, individuals who use
|
32 |
+
these sites can also actively shape governance in various ways. For example, they may flag
|
33 |
+
posts that violate community policy, downvote inappropriate posts, serve as volunteer
|
34 |
+
moderators, engage in counter-speech, or configure moderation settings to automate
|
35 |
+
inappropriate post removals. We are therefore moving towards a “pluralist model of
|
36 |
+
speech regulation [1],” in which speech must be regulated in a multi-stakeholder fashion –
|
37 |
+
legislative entities enforce online speech laws, and platform operators set up governance
|
38 |
+
regimes of acceptable content. However, users themselves can also intervene against
|
39 |
+
content perceived as problematic.
|
40 |
+
|
41 |
+
This move to a pluralist model is occurring against recent controversies over platforms’
|
42 |
+
moderation decisions [32, 47] and growing media, policymakers, and public calls to better
|
43 |
+
regulate their content [51]. In response, platforms have begun investing more resources
|
44 |
+
into improving how inappropriate posts are detected and removed from their sites. We
|
45 |
+
focus in this article on platforms’ offering of personal moderation tools that let end-users
|
46 |
+
configure content moderation of the posts they see to align with their content preferences.
|
47 |
+
We are primarily concerned with tools offered by platforms such as Instagram and Twitch
|
48 |
+
that let users specify their sensitivity to specific topical categories such as sexually explicit
|
49 |
+
content and hate speech. Configuring such tools lets users have the moderation system
|
50 |
+
operate in alignment with their tastes and thresholds. From the perspective of platforms, a
|
51 |
+
tactical consequence of offering personal moderation tools is that the obligation of making
|
52 |
+
hard moderation decisions, the concomitant responsibility of making mistakes with them,
|
53 |
+
and the cognitive labor of making the correct configurations are passed over to the users.
|
54 |
+
Therefore, it is vital that we understand how users consider the choice between platform
|
55 |
+
versus personal moderation.
|
56 |
+
Our research responds to calls by governance scholars to conduct more survey-based
|
57 |
+
research to understand users’ perspectives on moderation interventions by different
|
58 |
+
regulatory actors [8, 41]. So far, we have little knowledge of how end-users perceive being
|
59 |
+
given self-regulating authority through personal moderation tools. We do not know the
|
60 |
+
situations in which users prefer to have a choice in shaping moderation and when they
|
61 |
+
would instead prefer the platforms manage it for every user – and the different factors that
|
62 |
+
shape these preferences.
|
63 |
+
Informed by the third-person effects (TPE) hypothesis, we fill this gap by examining users’
|
64 |
+
preferences in the context of three norm-violating speech categories that have been studied
|
65 |
+
in prior literature: (1) Hate speech; (2) Sexually explicit content; and (3) Violent content.
|
66 |
+
Previous research has shown that perceptions of the effects of media messages on others
|
67 |
+
predict censorship attitudes [42, 44]. We examine the role that third-person effects [6] play
|
68 |
+
in shaping user attitudes about deploying platform-enacted versus personal moderation
|
69 |
+
tools.
|
70 |
+
We also connect our findings to the scholarship on understanding public attitudes toward
|
71 |
+
freedom of expression and its consequences. Free speech is a core constitutional right
|
72 |
+
highly valued by many Americans. However, the introduction of personal moderation tools
|
73 |
+
offers affordances that complicate the question of preserving free speech – users may
|
74 |
+
configure tools to avoid specific content categories. Still, others may continue to see the
|
75 |
+
same content, thereby preventing infringement of online expressions. However, if most
|
76 |
+
users choose to deploy these tools, specific content categories would have significantly
|
77 |
+
reduced visibility. Therefore, we analyze how users’ support for freedom of expression
|
78 |
+
shapes their notion of different moderation approaches.
|
79 |
+
Understanding the public views on the platform and user-enacted interventions can
|
80 |
+
stimulate debates about the roles and strategies of various regulatory actors. It can also
|
81 |
+
speak to calls for evidence-based policymaking [30, 40] by clarifying how the public
|
82 |
+
understands moderation practices and identifying the gaps between policy and public
|
83 |
+
demands [36, 37, 41]. Given the rapid introduction of new moderation strategies by the
|
84 |
+
|
85 |
+
platforms, especially personal moderation tools, independent academic assessments of
|
86 |
+
users’ attitudes on their deployment are vital. Platforms can also benefit from such
|
87 |
+
research by understanding end-users' acceptance or rejection of various regulatory
|
88 |
+
practices and the factors that shape those perspectives. Further, examinations of the public
|
89 |
+
perception of free speech within the context of online activity may also shape attempts to
|
90 |
+
protect free speech in the long run.
|
91 |
+
Literature Review and Hypotheses
|
92 |
+
The Perceptual Component of the TPE
|
93 |
+
Since Davison [6] first argued that individuals perceive media’s impact on the attitudes and
|
94 |
+
behaviors of others to be greater than it is on themselves, many studies have shown this
|
95 |
+
discrepancy to be consistent across a range of contexts [49] such as political ads [16, 38],
|
96 |
+
news stories [39] and social media use [46]. This hypothesis, termed by Davison as the
|
97 |
+
third-person effect (TPE) [6], has become a widely applied perspective to explain public
|
98 |
+
opinion on the media censorship [19-21, 33]. The TPE hypothesis has two major
|
99 |
+
components – the perceptual and behavioral components [18]. The perceptual component
|
100 |
+
predicts that presumed media effects on others (PME3) tend to be greater than perceived
|
101 |
+
media effects on self (PME1). In the context of social media messages’ influence, the
|
102 |
+
perceptual component of TPE predicts that participants will consider others to be more
|
103 |
+
negatively influenced by each category of norm-violating speech than themselves. We,
|
104 |
+
therefore, raise the following hypothesis:
|
105 |
+
H1: For each norm-violating speech category, participants will perceive a greater effect of
|
106 |
+
that speech on others than on themselves.
|
107 |
+
The Behavioral Component of the TPE
|
108 |
+
The behavioral component of the TPE argues that when individuals perceive the greater
|
109 |
+
impact of media messages on others than on themselves, they will take remedial actions to
|
110 |
+
mitigate the perceived harmful effects [20]. Davison [6] described the phenomenon of
|
111 |
+
censorship as one of the most interesting behavioral consequences of third-person
|
112 |
+
perception. Prior research on TPE consequences shows that it leads to censorship support
|
113 |
+
[15, 19, 44], and the effects are particularly salient when persuasive attempts may include
|
114 |
+
socially undesirable effects [28]. In studying TPE effects on censorship attitudes, some
|
115 |
+
researchers have examined the consequences of the other-self perceptual disparity in
|
116 |
+
media effects (DME = PME3 – PME1). In contrast, others have focused on the perceived
|
117 |
+
media impact on others (PME3) [42]. Examining past research data on TPE consequences,
|
118 |
+
Chung and Moon [5] concluded that the media’s presumed effect on others (PME3) is a
|
119 |
+
stronger predictor of censorship attitudes than the other-self disparity in the perceived
|
120 |
+
media effects. We, therefore, choose PME3 as our primary predictor variable and raise the
|
121 |
+
following hypothesis:
|
122 |
+
H2: For each speech category, the perceived effects of that speech on others will be
|
123 |
+
positively related to support for the platform’s banning of that category.
|
124 |
+
|
125 |
+
Researchers of TPE have long been curious about the potential behaviors that could result
|
126 |
+
from the perceived media impact on others. In addition to censorship support, prior
|
127 |
+
studies have interrogated behavioral outcomes such as engaging in political action [10, 43,
|
128 |
+
50], disseminating opposing information [3, 17], and exposing apparent biases [2, 29]. In
|
129 |
+
the context of online content moderation, Jang and Kim found that people with a greater
|
130 |
+
level of third-person perception were more likely to support media literacy interventions
|
131 |
+
to address fake news [22]. We add to previous efforts to surface the different types of
|
132 |
+
behavioral consequences of TPE by examining its impact on users’ support for having
|
133 |
+
personal moderation settings to moderate norm-violating content. Since such
|
134 |
+
configurations are also a form of regulation, prior TPE research suggests that PME3 would
|
135 |
+
predict support for them [19, 42]. The following hypothesis thus can be raised:
|
136 |
+
H3: For each speech category, the perceived effects of that speech on others will be
|
137 |
+
positively related to support for having personal moderation tools to regulate the speech of
|
138 |
+
that category.
|
139 |
+
Platform-enacted moderation and personal configurations to self-moderate content are
|
140 |
+
different ways to regulate norm-violating speech. However, while platform-enacted
|
141 |
+
moderation censors content platform-wide, personal moderation tools allow users to
|
142 |
+
adjust whether and how much norm-violating speech they are willing to encounter
|
143 |
+
personally. Prior literature generally predicts that TPE would lead to support for
|
144 |
+
censorship attitudes [5, 19]. However, it does not guide how people will react to a choice
|
145 |
+
between letting platforms handle a specific content category and allowing users to specify
|
146 |
+
their moderation preferences for that category. We, therefore, ask the following research
|
147 |
+
question:
|
148 |
+
RQ1: For each speech category, how do its perceived effects on others relate to support for
|
149 |
+
the platform’s banning of that category versus support for having personal moderation
|
150 |
+
tools regulate it?
|
151 |
+
Support for Freedom of Speech
|
152 |
+
Discussions about the benefits of moderation measures are always intertwined with the
|
153 |
+
issue of freedom of speech. In the United States, the constitution protects the right to free
|
154 |
+
expression as a fundamental human right. However, platforms are private parties. Section
|
155 |
+
230 of the Communications Decency Act of 1996 provides them the legislative freedom to
|
156 |
+
police their users as they see fit while not being held accountable for errors or oversights
|
157 |
+
[13, 34]. Additionally, experts have shown that despite Americans’ support for freedom of
|
158 |
+
expression generally, their tolerance for hate speech is low [12, 48, 52]. Thus, people’s
|
159 |
+
acceptance of free speech in the abstract may not automatically imply their tolerance for
|
160 |
+
opposing expressions [20]. Examining how much people's support for free speech affects
|
161 |
+
their opinions about varied moderation strategies may help us better understand this
|
162 |
+
discrepancy in the context of social media platforms.
|
163 |
+
Support for free speech and attitudes toward content moderation have been linked in
|
164 |
+
previous studies. For instance, Naab et al. showed that people who commit to freedom of
|
165 |
+
expression are less likely to support restrictive actions by Facebook moderators [36]. Guo
|
166 |
+
|
167 |
+
and Johnson showed that a lack of support for freedom of speech predicts support for
|
168 |
+
government regulation of sexist hate speech [20]. However, they did not find that the
|
169 |
+
former could predict supportive attitudes toward platform censorship. Jang and Kim
|
170 |
+
suggested that support for free expression decreases support for regulating fake news
|
171 |
+
despite the existence of third-person effects [22]. Overall, this body of research indicates
|
172 |
+
that participants’ support for platform regulation will decline as free speech support
|
173 |
+
increases. We, therefore, raise the following hypotheses:
|
174 |
+
H4: For each speech category, participants’ support for freedom of expression will be
|
175 |
+
negatively related to their support for the platform’s banning of that category.
|
176 |
+
While prior research provides guidance on the expected relationship between free speech
|
177 |
+
support and support for platform-enacted moderation, the literature on personal
|
178 |
+
moderation tools is scarce. It does not offer any direct guidance on the relationship
|
179 |
+
between support for free speech and support for having personal moderation tools.
|
180 |
+
However, there is some prior work that speaks to related issues. For example, Naab et al.
|
181 |
+
did not find a relationship between users’ commitment to free speech and their intention to
|
182 |
+
engage in corrective actions such as rebuking the comment author or reporting the
|
183 |
+
comment [36]. It is unclear whether that finding would apply to our context since
|
184 |
+
deploying personal moderation tools is a restrictive action, not a corrective action. Its
|
185 |
+
expected costs (e.g., setting up once for personal moderation v/s reporting every
|
186 |
+
inappropriate post; experiencing retaliation when engaging in counter-speech v/s private
|
187 |
+
post removals for personal moderation) are also lower. Riedl et al. conducted a survey that
|
188 |
+
showed that individuals’ support for free speech does not increase their assumed self-
|
189 |
+
responsibility to intervene against problematic comments [41]. However, they did not
|
190 |
+
specify to the survey takers what type of responsibility they should carry out. Besides, in
|
191 |
+
our study context, users may not consider personal moderation tools an obligation.
|
192 |
+
On the one hand, support for free speech values should reduce support for restrictive
|
193 |
+
actions of any kind. But on the other hand, people may perceive personal moderation tools
|
194 |
+
as simply having a greater agency to shape what they see and not an infringement on the
|
195 |
+
free speech of others. In this way, personal moderation tools allow a distinction between
|
196 |
+
freedom of speech and the obligation to be heard. To clarify the direction of this
|
197 |
+
relationship, we ask the following research question:
|
198 |
+
RQ2: Does participants’ support for freedom of expression relate to their support for
|
199 |
+
having personal moderation tools?
|
200 |
+
When faced with a choice between letting platforms handle a certain content category and
|
201 |
+
allowing users to specify their moderation preferences, we expect the latter to be perceived
|
202 |
+
as more free speech preserving. It lets users decide whether and how many content
|
203 |
+
removals should occur instead of allowing platforms to handle those same decisions
|
204 |
+
unilaterally. We, therefore, raise the following hypothesis:
|
205 |
+
|
206 |
+
H5: For each speech category, participants’ support for freedom of expression will be
|
207 |
+
related to greater support for having personal moderation tools to moderate that category
|
208 |
+
than their support for the platform’s banning of that category.
|
209 |
+
Methods
|
210 |
+
Our study was considered exempt from review by the University of Washington IRB. We
|
211 |
+
recruited participants through Lucid,1 a survey company that provides researchers access
|
212 |
+
to nationally representative samples. Our inclusion criterion for the survey participants
|
213 |
+
was all adult internet users in the US. We paid participants through the Lucid system.
|
214 |
+
We designed our survey questions to test the hypotheses identified in the previous section
|
215 |
+
and adapted survey instruments from relevant prior literature to test some measures. We
|
216 |
+
describe these measures in more detail below. To increase the validity of the survey, we
|
217 |
+
sought feedback on an early draft of the survey questionnaire from other students at the
|
218 |
+
authors’ institutions. Nine students who were not involved with the project responded to
|
219 |
+
our request and provided feedback on the wording of the questions and survey flow, which
|
220 |
+
we incorporated into the final survey design. We also piloted the survey with a small subset
|
221 |
+
of the sample (27 participants). During this field test, we included this open-ended
|
222 |
+
question at three different points in the survey: “Do you have any feedback on any of the
|
223 |
+
questions so far? For example, is any question unclear or ambiguous? Please list the
|
224 |
+
question and describe your challenge with answering it.” At the end of the survey, we also
|
225 |
+
asked, “Overall, how can we improve this survey from the perspective of survey takers? Do
|
226 |
+
you have any other thoughts or feedback for us? Please describe.” Results from this survey
|
227 |
+
pretest resulted in another round of iteration before our questionnaire reached the desired
|
228 |
+
quality.
|
229 |
+
Our survey questionnaire consisted of three blocks containing similar questions about hate
|
230 |
+
speech, sexually explicit content, and violent posts. To counter the effects of the order of
|
231 |
+
presentation on survey results, we counterbalanced the order in which question blocks
|
232 |
+
related to the three content categories were shown to the participants. At the beginning of
|
233 |
+
each block, we specified the norm-violating category that the following questions related to
|
234 |
+
and defined that category. We used the following definitions:
|
235 |
+
• Hate speech: “Hate speech includes speech that is dehumanizing, stereotyping, or
|
236 |
+
insulting, on the basis of identity markers such as race/ethnicity, gender, sexual
|
237 |
+
orientation, religion, etc.”
|
238 |
+
• Violent content: “Violent content includes threats to commit violence, glorifying
|
239 |
+
violence or celebrating suffering, depictions of violence that are gratuitous or gory,
|
240 |
+
and animal abuse.”
|
241 |
+
|
242 |
+
1 https://lucidtheorem.com
|
243 |
+
|
244 |
+
• Sexually explicit content: “Sexually explicit content includes content showing sexual
|
245 |
+
activity, offering or requesting sexual activity, female nipples (except breastfeeding,
|
246 |
+
health, and acts of protest), nudity showing genitals, and sexually explicit language.”
|
247 |
+
The above definitions were inspired by the language provided by the Facebook site when
|
248 |
+
reporting any post under the category of hate speech, violence, and nudity, respectively.
|
249 |
+
We administered the survey online using the survey software package Qualtrics. We
|
250 |
+
launched the survey on November 29, 2022. Table 1 presents the demographic details of
|
251 |
+
our final sample after data cleaning and compares it with the demographics of the adult US
|
252 |
+
internet population [45].
|
253 |
+
Table 1: Demographic Profile of the US Survey
|
254 |
+
|
255 |
+
Authors’ study, US survey
|
256 |
+
Nov 2022 (%)
|
257 |
+
American Community Survey,
|
258 |
+
US sample 2021 (%)
|
259 |
+
Age:
|
260 |
+
|
261 |
+
|
262 |
+
18-29
|
263 |
+
18.7
|
264 |
+
17.4
|
265 |
+
30-49
|
266 |
+
40.1
|
267 |
+
29.5
|
268 |
+
50-64
|
269 |
+
23.7
|
270 |
+
25.6
|
271 |
+
65+
|
272 |
+
17.4
|
273 |
+
27.3
|
274 |
+
Gender:
|
275 |
+
|
276 |
+
|
277 |
+
Male
|
278 |
+
48.2
|
279 |
+
48.6
|
280 |
+
Female
|
281 |
+
51.8
|
282 |
+
51.4
|
283 |
+
Race/Ethnicity:
|
284 |
+
|
285 |
+
|
286 |
+
White
|
287 |
+
73.5
|
288 |
+
68.3
|
289 |
+
Black
|
290 |
+
12.2
|
291 |
+
9.3
|
292 |
+
Other
|
293 |
+
14.3
|
294 |
+
22.4
|
295 |
+
Hispanic:
|
296 |
+
|
297 |
+
|
298 |
+
Yes
|
299 |
+
4.5
|
300 |
+
13.7
|
301 |
+
Education:
|
302 |
+
|
303 |
+
|
304 |
+
High school or less
|
305 |
+
31.4
|
306 |
+
33.5
|
307 |
+
Some college
|
308 |
+
24.4
|
309 |
+
33.3
|
310 |
+
College+
|
311 |
+
43.3
|
312 |
+
33.1
|
313 |
+
Measures
|
314 |
+
Perceived Influence on Self and Others
|
315 |
+
For each norm-violating speech category, we asked the participants to estimate the
|
316 |
+
influence of that category on the self and others. In each case, we asked two questions:
|
317 |
+
“Seeing <speech category> posts on social media has a powerful influence on my attitudes.”
|
318 |
+
and “Seeing <speech category> posts on social media has a powerful influence on my
|
319 |
+
behaviors.” The response categories ranged on a 7-point Likert-type scale from 1 (strongly
|
320 |
+
disagree) to 7 (strongly agree). These two items were averaged to create a measure of the
|
321 |
+
perceived influence of each speech category on the self (Hate speech: M=3.89, SD=1.91,
|
322 |
+
a=.84; Violent speech: M=3.78, SD=1.87, a=.81; Sexually explicit speech: M=3.55, SD=1.89,
|
323 |
+
|
324 |
+
a=.87). We asked another two questions replacing only the word “my” with “other
|
325 |
+
people’s” and averaged the responses to create an index of the perceived influence of each
|
326 |
+
speech category on others (Hate speech: M=5.28, SD=1.46, a=.92; Violent speech: M=5.19,
|
327 |
+
SD=1.40, a=.91; Sexually explicit speech: M=4.99, SD=1.46, a=.93).
|
328 |
+
Support for Freedom of Speech
|
329 |
+
We used items developed by Guo and Johnson to measure support for freedom of speech
|
330 |
+
[20]. Participants rated these four statements on a Likert-type scale ranging from 1
|
331 |
+
(strongly disagree) to 7 (strongly agree): (1) In general, I support the First Amendment, (2)
|
332 |
+
Freedom of expression is essential to democracy, (3) Democracy works best when citizens
|
333 |
+
communicate in an unregulated marketplace of ideas, and (4) Even extreme viewpoints
|
334 |
+
deserve to be voiced in society. We included the First Amendment statement2 in the first
|
335 |
+
question to clarify its meaning. We formed an index for free speech support using the
|
336 |
+
means of these four items (M=5.43, SD=1.15, a=.80).
|
337 |
+
Dependent Variables Related to Moderation
|
338 |
+
Support for platform-enacted moderation of each speech category was operationalized by
|
339 |
+
asking participants to rate the following statement: “I support social media platforms
|
340 |
+
taking down any posts they consider to be <speech category> so that no users can see
|
341 |
+
them.” The responses for this statement ranged on a 7-point Likert-type scale, where
|
342 |
+
1=“strongly disagree” and 7=“strongly agree.”
|
343 |
+
For operationalizing support for having personal moderation tools for each category, we
|
344 |
+
showed participants an example of a personal moderation feature where every user can
|
345 |
+
decide the extent to which they want the <speech category> content filtered out (see Fig.
|
346 |
+
1). We asked participants to rate their support for providing this kind of setting to all users
|
347 |
+
on a Likert-type scale ranging from 1 (strongly disagree) to 7 (strongly agree).
|
348 |
+
|
349 |
+
2 The First Amendment to the United States Constitution states: "Congress shall make no
|
350 |
+
law respecting an establishment of religion, or prohibiting the free exercise thereof; or
|
351 |
+
abridging the freedom of speech, or of the press; or the right of the people peaceably to
|
352 |
+
assemble, and to petition the Government for a redress of grievances.”
|
353 |
+
|
354 |
+
|
355 |
+
Figure 1: Survey question asking participants to rate their support for platforms providing
|
356 |
+
personal moderation feature
|
357 |
+
In addition to these two measures, we also operationalized choosing platform-enacted
|
358 |
+
moderation v/s personal moderation for each speech category by asking respondents a
|
359 |
+
binary question: ‘Given a choice between platform-wide moderation and a "Choose your
|
360 |
+
moderation settings" feature to handle <speech category> posts, which would you prefer to
|
361 |
+
have?’ The response categories included: (1) Platform-wide moderation: Platforms should
|
362 |
+
have the power to remove all posts they identify as <speech category> across the platform
|
363 |
+
or (2) "Choose your moderation settings" feature: Each user should be allowed to configure
|
364 |
+
the extent to which <speech category> posts should be removed for them. We note that the
|
365 |
+
“Choose you moderation settings” feature enables a range of choices – from “no
|
366 |
+
moderation” to “a range of moderation.” Thus, users who desired neither platform-wide
|
367 |
+
nor personal moderation to remove any posts for them could select this feature and
|
368 |
+
configure it at the “no moderation” level.
|
369 |
+
|
370 |
+
The below example shows a feature where every user can decide for themselves
|
371 |
+
the extentto whichtheywantsexuallyexplicit contentfiltered out.
|
372 |
+
Chooseyourmoderationsettings:
|
373 |
+
Filteroutsexuallyexplicitpostsbasedonthelevelyouselect:
|
374 |
+
Alittle
|
375 |
+
Some
|
376 |
+
More
|
377 |
+
Alotof
|
378 |
+
No moderation
|
379 |
+
moderation
|
380 |
+
moderation
|
381 |
+
moderation
|
382 |
+
moderation
|
383 |
+
Onlythemostsexuallyexplicitpostswillberemovedatthislevel.
|
384 |
+
I support platforms providing this kind of setting to all users
|
385 |
+
O Strongly disagree
|
386 |
+
O Disagree
|
387 |
+
OSomewhatdisagree
|
388 |
+
ONeitheragree nordisagree
|
389 |
+
O Somewhatagree
|
390 |
+
O Agree
|
391 |
+
O Strongly agree
|
392 |
+
Figure 2: Frequency of participants’ responses to survey questions about support for platform-
|
393 |
+
wide and personal moderation, measured in percentage.
|
394 |
+
Control Variables
|
395 |
+
Prior research has shown that socio-demographic variables are related to TPE and free
|
396 |
+
speech and attitude towards media regulation [19, 26, 27, 31]. Further, social media use
|
397 |
+
has also been associated with individuals’ perceptions of harmful content and their
|
398 |
+
interventions against such [24, 25, 35, 53]. Therefore, we controlled for age, education,
|
399 |
+
gender, race, political affiliation (1 = “very liberal”, 7= “very conservative”), and social
|
400 |
+
media use of each respondent. We operationalized the frequency of social media use by
|
401 |
+
following recommendations by Ernala et al. [9] and prompting participants to respond to
|
402 |
+
the question, ‘In the past week, on average, approximately how much time PER DAY have
|
403 |
+
you spent actively using any social media?
|
404 |
+
Results
|
405 |
+
Our results show that 72.8%, 73.1%, and 66.2% of participants at least somewhat agreed
|
406 |
+
that platforms should ban hate speech, violent content, and sexually explicit content,
|
407 |
+
respectively. Further, 69.9%, 72.6%, and 72.1% of participants at least somewhat agreed
|
408 |
+
that platforms should offer personal moderation tools to let end-users regulate hate
|
409 |
+
speech, violent content, and sexually explicit content, respectively.
|
410 |
+
|
411 |
+
Statistics
|
412 |
+
Strongly disagree
|
413 |
+
Disagree
|
414 |
+
Somewhatdisagree
|
415 |
+
Personal ModerationofSexuallyExplicitContent
|
416 |
+
I Neither agree nor disagree
|
417 |
+
Somewhatagree
|
418 |
+
lAgree
|
419 |
+
IStronglyagree
|
420 |
+
PlatformBanofSexualyExplicitContent
|
421 |
+
Personal ModerationofViolentContent
|
422 |
+
PlatformBanofViolentContent
|
423 |
+
PersonalModerationofHateSpeech
|
424 |
+
PlatformBanofHateSpeech
|
425 |
+
0
|
426 |
+
20
|
427 |
+
40
|
428 |
+
60
|
429 |
+
80
|
430 |
+
100
|
431 |
+
Percentage of ParticipantsIn line with research on the third-person effects, H1 predicted that for each norm-violating
|
432 |
+
content category, participants would perceive the effects of that category on others to be
|
433 |
+
stronger than on themselves. We ran a paired t-test and found the perceived effects on
|
434 |
+
others significantly stronger than on oneself for each category (see Table 2). Thus, our
|
435 |
+
results support H1.
|
436 |
+
Table 2: Mean, standard deviations, standard errors of participants’ perceived effects of hate
|
437 |
+
speech, violent content, and sexually explicit content on others and self, and t-test results
|
438 |
+
comparing perceived effects on others and self for each speech category (N = 993). *** denotes
|
439 |
+
p < .001
|
440 |
+
|
441 |
+
|
442 |
+
M
|
443 |
+
SD
|
444 |
+
SE
|
445 |
+
t
|
446 |
+
Cohen’s d
|
447 |
+
Hate speech
|
448 |
+
Effects on others
|
449 |
+
5.28
|
450 |
+
1.46
|
451 |
+
.05
|
452 |
+
25.37***
|
453 |
+
.805
|
454 |
+
Effects on self
|
455 |
+
3.89
|
456 |
+
1.91
|
457 |
+
.06
|
458 |
+
Violent
|
459 |
+
content
|
460 |
+
Effects on others
|
461 |
+
5.19
|
462 |
+
1.40
|
463 |
+
.05
|
464 |
+
25.44***
|
465 |
+
.807
|
466 |
+
Effects on self
|
467 |
+
3.77
|
468 |
+
1.87
|
469 |
+
.06
|
470 |
+
Sexually
|
471 |
+
explicit
|
472 |
+
content
|
473 |
+
Effects on others
|
474 |
+
4.99
|
475 |
+
1.46
|
476 |
+
.05
|
477 |
+
25.81***
|
478 |
+
.819
|
479 |
+
Effects on self
|
480 |
+
3.55
|
481 |
+
1.88
|
482 |
+
.06
|
483 |
+
|
484 |
+
Support for Platform Ban
|
485 |
+
We computed hierarchical linear regression to test our hypotheses 2 and 4. For each of the
|
486 |
+
three norm-violating categories, we created a model where the participant’s support for
|
487 |
+
banning that category served as the dependent variable. In Step 1 of the three regression
|
488 |
+
models, we included the control variables age, gender, education, race, political affiliation,
|
489 |
+
and social media use. In Step 2, we introduced the independent variables PME3 (perceived
|
490 |
+
effects on others) for that category and support for free speech (Table 3).
|
491 |
+
Table 3: Hierarchical multiple regression analyses predicting support for platforms' banning
|
492 |
+
of hate speech, violent content, and sexually explicit content (N = 983)
|
493 |
+
Independent Variable
|
494 |
+
Support
|
495 |
+
for
|
496 |
+
platform ban of
|
497 |
+
hate speech (β)
|
498 |
+
Support
|
499 |
+
for
|
500 |
+
platform ban of
|
501 |
+
violent content
|
502 |
+
(β)
|
503 |
+
Support
|
504 |
+
for
|
505 |
+
platform ban of
|
506 |
+
sexually explicit
|
507 |
+
content (β)
|
508 |
+
|
509 |
+
Step 1
|
510 |
+
|
511 |
+
|
512 |
+
|
513 |
+
Age
|
514 |
+
.119***
|
515 |
+
.055
|
516 |
+
.102**
|
517 |
+
Gender (Female)
|
518 |
+
.127***
|
519 |
+
.167***
|
520 |
+
.153***
|
521 |
+
Race (White)
|
522 |
+
.018
|
523 |
+
.013
|
524 |
+
-.059
|
525 |
+
Educationa
|
526 |
+
-.008
|
527 |
+
.039
|
528 |
+
-.022
|
529 |
+
Political affiliationb
|
530 |
+
-.156***
|
531 |
+
-.09**
|
532 |
+
.019
|
533 |
+
Social media usec
|
534 |
+
.022
|
535 |
+
.013
|
536 |
+
.019
|
537 |
+
R2
|
538 |
+
.093***
|
539 |
+
.065***
|
540 |
+
.05***
|
541 |
+
Step 2
|
542 |
+
|
543 |
+
|
544 |
+
|
545 |
+
Support for free speech
|
546 |
+
-.101***
|
547 |
+
-.039
|
548 |
+
-.006
|
549 |
+
Perceived effects of hate speech on others
|
550 |
+
.476***
|
551 |
+
-
|
552 |
+
-
|
553 |
+
Perceived effects of violent content on others
|
554 |
+
-
|
555 |
+
.397***
|
556 |
+
-
|
557 |
+
Perceived effects of sexually explicit content
|
558 |
+
on others
|
559 |
+
-
|
560 |
+
-
|
561 |
+
.391***
|
562 |
+
R2 change
|
563 |
+
.215
|
564 |
+
.15***
|
565 |
+
.149***
|
566 |
+
Total R2
|
567 |
+
.307***
|
568 |
+
.215***
|
569 |
+
.199***
|
570 |
+
**p < .01, ***p < .001 (t test for β, two-tailed; F test for R2, two-tailed).
|
571 |
+
a0= Less than secondary education; 1= Secondary education or more.
|
572 |
+
b1= Strong Democrat, 7= Strong Republican.
|
573 |
+
c1= Less than 10 minutes per day, 6= More than 3 hours per day.
|
574 |
+
β = standardized beta from the full model (final beta controlling for all variables in the model).
|
575 |
+
For each norm-violating speech category, the regression models show significant
|
576 |
+
influences of the participants' perceived effects of that category on others (PME3) on their
|
577 |
+
support for platform ban of that category (Model 1: hate speech – β = .476, p < .001; Model
|
578 |
+
|
579 |
+
2: violent content – β = .397, p < .001; Model 3: sexually explicit content – β = .391, p <
|
580 |
+
.001), supporting H2.
|
581 |
+
Greater support for free speech significantly negatively influences support for platform ban
|
582 |
+
of hate speech (β = -.101, p < .001). It does not, however, influence support for platform ban
|
583 |
+
of violent content (β = -.039, p > .05) or sexually explicit content (β = -.006, p > .05). Thus,
|
584 |
+
H4 is only partially supported.
|
585 |
+
Support for Personal Moderation
|
586 |
+
We computed hierarchical linear regression to test our hypothesis 3 and answer RQ 2. For
|
587 |
+
each of the three norm-violating categories, we created a model where the participant’s
|
588 |
+
support for having personal moderation tools to regulate that category served as the
|
589 |
+
dependent variable. In Step 1 of the three regression models, we included the control
|
590 |
+
variables age, gender, education, race, political affiliation, and social media use. In Step 2,
|
591 |
+
we introduced the independent variables PME3 (perceived effects on others) for that
|
592 |
+
category and support for free speech (Table 4).
|
593 |
+
Table 4: Hierarchical multiple regression analyses predicting support for using personal
|
594 |
+
moderation tools (PMT) to regulate hate speech, violent content, and sexually explicit content
|
595 |
+
(N = 983)
|
596 |
+
Independent Variable
|
597 |
+
Support
|
598 |
+
for
|
599 |
+
PMT
|
600 |
+
to
|
601 |
+
regulate
|
602 |
+
hate
|
603 |
+
speech (β)
|
604 |
+
Support for PMT
|
605 |
+
to
|
606 |
+
regulate
|
607 |
+
violent content
|
608 |
+
(β)
|
609 |
+
Support for PMT
|
610 |
+
to
|
611 |
+
regulate
|
612 |
+
sexually explicit
|
613 |
+
content (β)
|
614 |
+
Step 1
|
615 |
+
|
616 |
+
|
617 |
+
|
618 |
+
Age
|
619 |
+
.014
|
620 |
+
-.017
|
621 |
+
-.010
|
622 |
+
Gender (Female)
|
623 |
+
-.016
|
624 |
+
.019
|
625 |
+
-.016
|
626 |
+
Race (White)
|
627 |
+
-.019
|
628 |
+
-.007
|
629 |
+
.08*
|
630 |
+
Educationa
|
631 |
+
-.018
|
632 |
+
.022
|
633 |
+
.003
|
634 |
+
Political affiliationb
|
635 |
+
-.019
|
636 |
+
-.049
|
637 |
+
-.074*
|
638 |
+
Social media usec
|
639 |
+
.051
|
640 |
+
.057
|
641 |
+
.086**
|
642 |
+
R2
|
643 |
+
.009
|
644 |
+
.013
|
645 |
+
.027***
|
646 |
+
Step 2
|
647 |
+
|
648 |
+
|
649 |
+
|
650 |
+
|
651 |
+
Support for free speech
|
652 |
+
.173***
|
653 |
+
.195***
|
654 |
+
.224***
|
655 |
+
Perceived effects of hate speech on others
|
656 |
+
.224***
|
657 |
+
-
|
658 |
+
-
|
659 |
+
Perceived effects of violent content on others
|
660 |
+
-
|
661 |
+
.187***
|
662 |
+
-
|
663 |
+
Perceived effects of sexually explicit content
|
664 |
+
on others
|
665 |
+
-
|
666 |
+
-
|
667 |
+
.225***
|
668 |
+
R2 change
|
669 |
+
.087
|
670 |
+
.081
|
671 |
+
.111
|
672 |
+
Total R2
|
673 |
+
.096***
|
674 |
+
.095***
|
675 |
+
.138***
|
676 |
+
*p < .05, **p < .01, ***p < .001 (t test for β, two-tailed; F test for R2, two-tailed).
|
677 |
+
a0= Less than secondary education; 1= Secondary education or more.
|
678 |
+
b1= Strong Democrat, 7= Strong Republican.
|
679 |
+
c1= Less than 10 minutes per day, 6= More than 3 hours per day.
|
680 |
+
β = standardized beta from the full model (final beta controlling for all variables in the model).
|
681 |
+
For each norm-violating speech category, the regression models show significant
|
682 |
+
influences of the participants' perceived effects of that category on others (PME3) on their
|
683 |
+
support for using personal moderation tools to regulate that category (Model 4: hate
|
684 |
+
speech – β = .224, p < .001; Model 5: violent content – β = .187, p < .001; Model 6: sexually
|
685 |
+
explicit content – β = .225, p < .001), supporting H4.
|
686 |
+
Greater support for free speech has a significant positive influence on participants’ support
|
687 |
+
for using personal moderation tools to regulate each norm-violating category (Model 4:
|
688 |
+
hate speech – β = .173, p < .001; Model 5: violent content – β = .195, p < .001; Model 6:
|
689 |
+
sexually explicit content – β = .224, p < .001). This answers our RQ 2.
|
690 |
+
|
691 |
+
|
692 |
+
Choosing Between Platform-wide Moderation and Personal
|
693 |
+
Moderation
|
694 |
+
|
695 |
+
Figure 3: Percentage of participants preferring platform-wide ban or personal moderation to
|
696 |
+
regulate hate speech, violent content, and sexually explicit content
|
697 |
+
Given a choice between platform-wide moderation and a personal moderation tool to
|
698 |
+
regulate hate speech, violent content, and sexually explicit content, 52.4%, 52%, and 55.3%
|
699 |
+
of participants, respectively, chose the personal moderation tool. This finding suggests that
|
700 |
+
more participants prefer autonomy over moderation than delegating it to platforms as they
|
701 |
+
see fit.
|
702 |
+
We created binomial logistic regression models to test our hypothesis 5 and answer RQ 1.
|
703 |
+
For each of the three norm-violating categories, we created a model where the participants’
|
704 |
+
binary choice between platform-wide moderation and personal moderation to handle that
|
705 |
+
category served as the dependent variable. In Step 1 of the three regression models, we
|
706 |
+
included the control variables age, gender, education, race, political affiliation, and social
|
707 |
+
media use. In Step 2, we introduced the independent variables PME3 (perceived effects on
|
708 |
+
others) for that category and support for free speech. For each model, we used the Box-
|
709 |
+
Tidwell procedure [4, 11] to check the assumption of linearity in the logit and found in each
|
710 |
+
case that our continuous variable support for free speech was not linearly related to the
|
711 |
+
logit of the dependent variable. To address this, we split this variable into two ordinal
|
712 |
+
categories – high and low, recoding each entry for this variable based on whether it
|
713 |
+
exceeded the median value. Rerunning the Box-Tidwell procedure with this transformed
|
714 |
+
support for the free speech categorical variable, we found all remaining continuous
|
715 |
+
|
716 |
+
Statistics
|
717 |
+
Prefer platform-wide ban
|
718 |
+
Preferpersonalmoderation
|
719 |
+
Sexually explicit content
|
720 |
+
Violent content
|
721 |
+
Hate speech
|
722 |
+
0
|
723 |
+
10
|
724 |
+
20
|
725 |
+
30
|
726 |
+
40
|
727 |
+
50
|
728 |
+
60
|
729 |
+
Percentage of Participantsindependent variables in each model to be linearly related to the logit of the dependent
|
730 |
+
variable. We next present these models' binomial logistic regression results (Table 5).
|
731 |
+
Table 5: Binomial logistic regression analyses predicting support for using personal
|
732 |
+
moderation tools (PMT) over platform-wide ban to regulate hate speech, violent content, and
|
733 |
+
sexually explicit content (N = 984)
|
734 |
+
Independent Variable
|
735 |
+
Support
|
736 |
+
for
|
737 |
+
PMT
|
738 |
+
over
|
739 |
+
platform ban to
|
740 |
+
regulate
|
741 |
+
hate
|
742 |
+
speech,
|
743 |
+
Odds
|
744 |
+
Ratio
|
745 |
+
Support for PMT
|
746 |
+
over
|
747 |
+
platform
|
748 |
+
ban to regulate
|
749 |
+
violent content,
|
750 |
+
Odds Ratio
|
751 |
+
Support for PMT
|
752 |
+
over
|
753 |
+
platform
|
754 |
+
ban to regulate
|
755 |
+
violent content,
|
756 |
+
Odds Ratio
|
757 |
+
Step 1
|
758 |
+
|
759 |
+
|
760 |
+
|
761 |
+
Age
|
762 |
+
.986**
|
763 |
+
.992
|
764 |
+
.994
|
765 |
+
Gender (Female)
|
766 |
+
.790
|
767 |
+
.655**
|
768 |
+
.674**
|
769 |
+
Race (White)
|
770 |
+
1.107
|
771 |
+
1.313
|
772 |
+
1.203
|
773 |
+
Educationa
|
774 |
+
.934
|
775 |
+
.870
|
776 |
+
.981
|
777 |
+
Political affiliationb
|
778 |
+
1.163***
|
779 |
+
1.118***
|
780 |
+
1.074*
|
781 |
+
Social media usec
|
782 |
+
.990
|
783 |
+
1.071
|
784 |
+
1.091*
|
785 |
+
Nagelkerke R2
|
786 |
+
.066***
|
787 |
+
.066***
|
788 |
+
.045***
|
789 |
+
Step 2
|
790 |
+
|
791 |
+
|
792 |
+
|
793 |
+
Support for free speechd
|
794 |
+
2.703***
|
795 |
+
2.239****
|
796 |
+
1.969***
|
797 |
+
Perceived effects of hate speech on others
|
798 |
+
.735***
|
799 |
+
-
|
800 |
+
-
|
801 |
+
Perceived effects of violent content on others
|
802 |
+
-
|
803 |
+
.752***
|
804 |
+
-
|
805 |
+
Perceived effects of sexually explicit content
|
806 |
+
on others
|
807 |
+
-
|
808 |
+
-
|
809 |
+
.857**
|
810 |
+
Total Nagelkerke R2
|
811 |
+
.165***
|
812 |
+
.138***
|
813 |
+
.087***
|
814 |
+
*p < .05, **p < .01, ***p < .001 (t test for β, two-tailed; Omnibus Tests of Model Coefficients for R2).
|
815 |
+
|
816 |
+
a0= Less than secondary education; 1= Secondary education or more.
|
817 |
+
b1= Strong Democrat, 7= Strong Republican.
|
818 |
+
c1= Less than 10 minutes per day, 6= More than 3 hours per day.
|
819 |
+
d0= low, 1=high.
|
820 |
+
odds ratio = exp(β) from full model.
|
821 |
+
For each norm-violating speech category, the regression models show significant
|
822 |
+
influences of the participants' perceived effects of that category on others (PME3) on their
|
823 |
+
choice of using personal moderation tools over platform-enacted bans to regulate that
|
824 |
+
category. Increasing PME3 was associated with a decreased likelihood of choosing personal
|
825 |
+
moderation tools over platform bans (Model 7: hate speech – exp(β) = .735, p < .001; Model
|
826 |
+
8: violent content – exp(β) = .752, p < .001; Model 9: sexually explicit content – exp(β) =
|
827 |
+
.857, p < .01). This answers our RQ 1.
|
828 |
+
Higher support for free speech has a significant positive influence on participants’ support
|
829 |
+
for using personal moderation tools over platform-enacted bans to regulate each norm-
|
830 |
+
violating category. Participants who showed high support for free speech have 2.703,
|
831 |
+
2.239, and 1.969 times higher odds of choosing personal moderation tools over platform-
|
832 |
+
enacted bans to regulate hate speech, violent content, and sexually explicit content,
|
833 |
+
respectively. Thus, H5 is supported.
|
834 |
+
Discussion
|
835 |
+
In recent years, the debates surrounding the censorship of inappropriate content on social
|
836 |
+
media have surfaced more and more due to the increasing essentiality of social media in
|
837 |
+
political discourse and growing controversies over how platforms regulate [13, 14]. The
|
838 |
+
purpose of this study was to measure public attitudes regarding two important forms of
|
839 |
+
social media regulation: platform-wide moderation, which lets platforms unilaterally make
|
840 |
+
moderation decisions for every user, and personal moderation, which empowers users to
|
841 |
+
decide for themselves how they would like to regulate different content categories by
|
842 |
+
adjusting their moderation settings. Third-person effects (TPE) are commonly used in
|
843 |
+
examining people’s attitudes towards censorship and related behaviors or behavioral
|
844 |
+
intentions [6, 18]. The present research extends the TPE research to managing hate speech,
|
845 |
+
violent content, and sexually explicit content on social media.
|
846 |
+
We explored the presumed negative effects of each type of content on self (PME1) and
|
847 |
+
others (PME3). The results produced strong support for the TPE hypothesis. As expected,
|
848 |
+
participants perceived the social media hate speech, violent content, and sexually explicit
|
849 |
+
content to have a greater influence on others than on themselves. We also examined how
|
850 |
+
PME3 and support for free speech affected participants’ consequent censorial behavior. In
|
851 |
+
each case, we found that the perceived effects on others (PME3) predicted participants’
|
852 |
+
support for both platform-wide moderation and personal moderation. This is a
|
853 |
+
theoretically significant finding of this study since it helps advance TPE research by
|
854 |
+
|
855 |
+
showing that perceived effects on others play an essential role in triggering censorial
|
856 |
+
behavior. Given a choice between the platform and personal moderation, PME3 predicted
|
857 |
+
support for platform moderation in each case. This finding indicates that when users
|
858 |
+
perceive the adverse effects of a content category on the public, they desire platforms to
|
859 |
+
take site-wide actions on that content rather than regulate it for themselves.
|
860 |
+
Further, the relationship between support for free speech and support for platform-wide
|
861 |
+
moderation received only partial support. While the connection is significant and negative
|
862 |
+
for hate speech, it is not significant for violent and sexually explicit content. This result is in
|
863 |
+
line with the mixed findings for free speech support as a predictor of supportive attitudes
|
864 |
+
towards platform censorship observed in prior literature [20]. On the other hand, we found
|
865 |
+
that support for free speech predicted support for the use of personal moderation for
|
866 |
+
regulating each inappropriate speech category. This suggests that people may perceive
|
867 |
+
personal moderation tools as not an infringement on the free speech of others but simply
|
868 |
+
having a greater agency to shape what they see. This is further bolstered by our finding that
|
869 |
+
given a choice between the platform and personal moderation, support for free speech
|
870 |
+
predicts support for personal moderation in each case.
|
871 |
+
Other significant effects, less central to the hypotheses being tested, also were found. We
|
872 |
+
found that age was positively related to support for platform moderation of hate speech
|
873 |
+
and sexually explicit content, but not violent content. Females supported platform
|
874 |
+
moderation of each speech category more than males. Democrats were more likely than
|
875 |
+
Republicans to support platform moderation of hate speech and violent content, but not
|
876 |
+
sexually explicit content. Regarding support for personal moderation, race, political
|
877 |
+
affiliation, and social media use were significant predictors for the sexually explicit content
|
878 |
+
category; however, no control variables significantly predicted personal moderation of hate
|
879 |
+
speech or violent content.
|
880 |
+
The evidence presented here has important implications for how platforms govern their
|
881 |
+
sites. We show that part of the reason the public supports moderation of norm-violating
|
882 |
+
categories such as pornography and war violence is that it overestimates these categories’
|
883 |
+
effects on others. Therefore, company-wide moderation decisions and public debates
|
884 |
+
concerning free speech and its limitations, must recognize and account for third-person
|
885 |
+
effects. It also points to an urgent need to measure the actual media effects as opposed to
|
886 |
+
the perceived media effects of different content types. We have noticed that even during
|
887 |
+
our interview studies on online harms, participants tend to advocate for specific
|
888 |
+
moderation initiatives based on their perceptions of what others might need. To arrive at
|
889 |
+
an accurate needs-gathering, scholars must focus on understanding the perspectives of
|
890 |
+
online content on users themselves – a topic on which they are an expert – rather than the
|
891 |
+
abstract others whose actual needs may considerably differ.
|
892 |
+
Several limitations of this study should be recognized. The survey design prohibited us
|
893 |
+
from exploring the motivations for specific perceptions in depth. Furthermore, we cannot
|
894 |
+
make conclusive statements about causal relations as a cross-sectional study. We asked
|
895 |
+
participants to respond to questions about speech categories that could be broadly
|
896 |
+
interpreted. We chose this instead of presenting a specific instance of each speech category
|
897 |
+
to increase the generalizability of our findings. Still, different users may have different
|
898 |
+
|
899 |
+
perceptions of what counts as hate speech, violent content, or sexually explicit content.
|
900 |
+
Prior moderation research has recognized this as a complex challenge in the social media
|
901 |
+
regulation [23]. We provided definitions of each speech category in the survey to clarify the
|
902 |
+
scope of each category to our participants. Nevertheless, further research on user
|
903 |
+
perceptions of stimulus-based designs that present preselected instances of each norm-
|
904 |
+
violating speech category to participants would provide valuable insights. We did not
|
905 |
+
ground our survey questions in a specific platform to increase the generalizability of our
|
906 |
+
results. Studies focused on particular social media sites can uncover whether attitudes
|
907 |
+
towards specific platforms influence users’ perceptions of moderation actions.
|
908 |
+
References
|
909 |
+
[1] Jack M Balkin. 2017. Free speech in the algorithmic society: Big data, private
|
910 |
+
governance, and new school speech regulation. UCDL Rev., 51 (2017), 1149.
|
911 |
+
[2] Matthew Barnidge and Hernando Rojas. 2014. Hostile Media Perceptions, Presumed
|
912 |
+
Media Influence, and Political Talk: Expanding the Corrective Action Hypothesis.
|
913 |
+
International
|
914 |
+
Journal
|
915 |
+
of
|
916 |
+
Public
|
917 |
+
Opinion
|
918 |
+
Research,
|
919 |
+
26,
|
920 |
+
2
|
921 |
+
(2014),
|
922 |
+
135-156.
|
923 |
+
https://doi.org/10.1093/ijpor/edt032
|
924 |
+
[3] Uli Bernhard and Marco Dohle. 2015. Corrective or Confirmative Actions? Political
|
925 |
+
Online Participation as a Consequence of Presumed Media Influences in Election
|
926 |
+
Campaigns. Journal of Information Technology & Politics, 12, 3 (2015/07/03 2015), 285-
|
927 |
+
302. https://doi.org/10.1080/19331681.2015.1048918
|
928 |
+
[4] G. E. P. Box and Paul W. Tidwell. 1962. Transformation of the Independent Variables.
|
929 |
+
Technometrics,
|
930 |
+
4,
|
931 |
+
4
|
932 |
+
(1962/11/01
|
933 |
+
1962),
|
934 |
+
531-550.
|
935 |
+
https://www.tandfonline.com/doi/abs/10.1080/00401706.1962.10490038
|
936 |
+
[5] Sungeun Chung and Shin-Il Moon. 2016. Is the Third-Person Effect Real? a Critical
|
937 |
+
Examination of Rationales, Testing Methods, and Previous Findings of the Third-Person
|
938 |
+
Effect on Censorship Attitudes. Human Communication Research, 42, 2 (2016), 312-337.
|
939 |
+
https://doi.org/10.1111/hcre.12078
|
940 |
+
[6] W. Phillips Davison. 1983. The Third-Person Effect in Communication. Public Opinion
|
941 |
+
Quarterly, 47, 1 (1983), 1-15. https://doi.org/10.1086/268763
|
942 |
+
[7] Julian Dibbell. 1994. A rape in cyberspace or how an evil clown, a Haitian trickster
|
943 |
+
spirit, two wizards, and a cast of dozens turned a database into a society. Ann. Surv. Am. L.
|
944 |
+
(1994), 471-471.
|
945 |
+
[8] Sabine A. Einwiller and Sora Kim. 2020. How Online Content Providers Moderate User-
|
946 |
+
Generated Content to Prevent Harmful Online Communication: An Analysis of Policies and
|
947 |
+
Their
|
948 |
+
Implementation.
|
949 |
+
Policy
|
950 |
+
&
|
951 |
+
Internet,
|
952 |
+
12,
|
953 |
+
2
|
954 |
+
(2020),
|
955 |
+
184-206.
|
956 |
+
https://onlinelibrary.wiley.com/doi/abs/10.1002/poi3.239
|
957 |
+
[9] Sindhu Kiranmai Ernala, Moira Burke, Alex Leavitt and Nicole B. Ellison. 2020. How
|
958 |
+
Well Do People Report Time Spent on Facebook? An Evaluation of Established Survey
|
959 |
+
Questions with Recommendations. In Proceedings of the Proceedings of the 2020 CHI
|
960 |
+
Conference on Human Factors in Computing Systems (Honolulu, HI, USA, 2020). Association
|
961 |
+
for Computing Machinery. https://doi.org/10.1145/3313831.3376435
|
962 |
+
[10] Lauren Feldman, P. Sol Hart, Anthony Leiserowitz, Edward Maibach and Connie Roser-
|
963 |
+
Renouf. 2017. Do Hostile Media Perceptions Lead to Action? The Role of Hostile Media
|
964 |
+
|
965 |
+
Perceptions, Political Efficacy, and Ideology in Predicting Climate Change Activism.
|
966 |
+
Communication
|
967 |
+
Research,
|
968 |
+
44,
|
969 |
+
8
|
970 |
+
(2017),
|
971 |
+
1099-1124.
|
972 |
+
https://journals.sagepub.com/doi/abs/10.1177/0093650214565914
|
973 |
+
[11] John Fox Applied regression analysis and generalized linear models. Sage Publications,
|
974 |
+
2015.
|
975 |
+
[12] James L. Gibson and Richard D. Bingham. 1982. On the Conceptualization and
|
976 |
+
Measurement of Political Tolerance. American Political Science Review, 76, 3 (1982), 603-
|
977 |
+
620.
|
978 |
+
https://www.cambridge.org/core/article/on-the-conceptualization-and-
|
979 |
+
measurement-of-political-tolerance/579D03FF1A6041C6DB3DD6CB1FBC98E1
|
980 |
+
[13] Tarleton Gillespie. 2017. Governance of and by platforms. Sage handbook of social
|
981 |
+
media (2017).
|
982 |
+
[14] Tarleton Gillespie Custodians of the Internet: Platforms, content moderation, and the
|
983 |
+
hidden decisions that shape social media. Yale University Press, 2018.
|
984 |
+
[15] Guy J. Golan and Stephen A. Banning. 2008. Exploring a Link Between the Third-Person
|
985 |
+
Effect and the Theory of Reasoned Action:Beneficial Ads and Social Expectations. American
|
986 |
+
Behavioral
|
987 |
+
Scientist,
|
988 |
+
52,
|
989 |
+
2
|
990 |
+
(2008),
|
991 |
+
208-224.
|
992 |
+
https://journals.sagepub.com/doi/abs/10.1177/0002764208321352
|
993 |
+
[16] Guy J. Golan, Stephen A. Banning and Lisa Lundy. 2008. Likelihood to Vote, Candidate
|
994 |
+
Choice, and the Third-Person Effect:Behavioral Implications of Political Advertising in the
|
995 |
+
2004 Presidential Election. American Behavioral Scientist, 52, 2 (2008), 278-290.
|
996 |
+
https://journals.sagepub.com/doi/abs/10.1177/0002764208321356
|
997 |
+
[17] Guy J. Golan and Joon Soo Lim Third-Person Effect of ISIS's Recruitment Propaganda:
|
998 |
+
Online Political Self-Efficacy and Social Media Activism, 2016.
|
999 |
+
[18] ALBERT GUNTHER. 1991. What We Think Others Think:Cause and Consequence in the
|
1000 |
+
Third-Person
|
1001 |
+
Effect.
|
1002 |
+
Communication
|
1003 |
+
Research,
|
1004 |
+
18,
|
1005 |
+
3
|
1006 |
+
(1991),
|
1007 |
+
355-372.
|
1008 |
+
https://journals.sagepub.com/doi/abs/10.1177/009365091018003004
|
1009 |
+
[19] Albert C. Gunther. 2006. Overrating the X-Rating: The Third-Person Perception and
|
1010 |
+
Support for Censorship of Pornography. Journal of Communication, 45, 1 (2006), 27-38.
|
1011 |
+
https://doi.org/10.1111/j.1460-2466.1995.tb00712.x
|
1012 |
+
[20] Lei Guo and Brett G. Johnson. 2020. Third-Person Effect and Hate Speech Censorship
|
1013 |
+
on
|
1014 |
+
Facebook.
|
1015 |
+
Social
|
1016 |
+
Media
|
1017 |
+
+
|
1018 |
+
Society,
|
1019 |
+
6,
|
1020 |
+
2
|
1021 |
+
(2020),
|
1022 |
+
2056305120923003.
|
1023 |
+
https://journals.sagepub.com/doi/abs/10.1177/2056305120923003
|
1024 |
+
[21] CYNTHIA HOFFNER, MARTHA BUCHANAN, JOEL DAVID ANDERSON, LISA A. HUBBS,
|
1025 |
+
STACY K. KAMIGAKI, LAURA KOWALCZYK, ANGELA PASTOREK, RICHARD S. PLOTKIN and
|
1026 |
+
KELSEY J. SILBERG. 1999. Support for Censorship of Television Violence:The Role of the
|
1027 |
+
Third-Person Effect and News Exposure. Communication Research, 26, 6 (1999), 726-742.
|
1028 |
+
https://journals.sagepub.com/doi/abs/10.1177/009365099026006004
|
1029 |
+
[22] S. Mo Jang and Joon K. Kim. 2018. Third person effects of fake news: Fake news
|
1030 |
+
regulation and media literacy interventions. Computers in Human Behavior, 80
|
1031 |
+
(2018/03/01/
|
1032 |
+
2018),
|
1033 |
+
295-302.
|
1034 |
+
https://www.sciencedirect.com/science/article/pii/S0747563217306726
|
1035 |
+
[23] Shagun Jhaver, Larry Chan and Amy Bruckman. 2018. The View from the Other Side:
|
1036 |
+
The Border Between Controversial Speech and Harassment on Kotaku in Action. First
|
1037 |
+
Monday, 23, 2 (2018). http://firstmonday.org/ojs/index.php/fm/article/view/8232
|
1038 |
+
[24] Anja Kalch and Teresa K Naab. 2017. Replying, disliking, flagging: How users engage
|
1039 |
+
with uncivil and impolite comments on news sites (2017).
|
1040 |
+
|
1041 |
+
[25] Kate Kenski, Kevin Coe and Stephen A. Rains. 2020. Perceptions of Uncivil Discourse
|
1042 |
+
Online: An Examination of Types and Predictors. Communication Research, 47, 6 (2020),
|
1043 |
+
795-814. https://journals.sagepub.com/doi/abs/10.1177/0093650217699933
|
1044 |
+
[26] Jennifer L. Lambe. 2002. Dimensions of censorship: Reconceptualizing public
|
1045 |
+
willingness to censor. Communication Law and Policy, 7 (2002), 187-235.
|
1046 |
+
[27] Francis L. F. Lee. 2009. The Prevention Effect of Third-Person Perception: A Study on
|
1047 |
+
the Perceived and Actual Influence of Polls. Mass Communication and Society, 13, 1
|
1048 |
+
(2009/12/24 2009), 87-110. https://doi.org/10.1080/15205430802635672
|
1049 |
+
[28] Joon Soo Lim. 2017. The Third-Person Effect of Online Advertising of Cosmetic
|
1050 |
+
Surgery: A Path Model for Predicting Restrictive Versus Corrective Actions. Journalism &
|
1051 |
+
Mass
|
1052 |
+
Communication
|
1053 |
+
Quarterly,
|
1054 |
+
94,
|
1055 |
+
4
|
1056 |
+
(2017),
|
1057 |
+
972-993.
|
1058 |
+
https://journals.sagepub.com/doi/abs/10.1177/1077699016687722
|
1059 |
+
[29] Joon Soo Lim and Guy J. Golan. 2011. Social Media Activism in Response to the
|
1060 |
+
Influence of Political Parody Videos on YouTube. Communication Research, 38, 5 (2011),
|
1061 |
+
710-727. https://journals.sagepub.com/doi/abs/10.1177/0093650211405649
|
1062 |
+
[30] Sonia Livingstone. 2013. ‘Knowledge enhancement’: the risks and opportunities of
|
1063 |
+
evidence-based policy (2013).
|
1064 |
+
[31] Ven-hwei Lo and Chingching Chang. 2006. Knowledge about the Gulf Wars:A
|
1065 |
+
Theoretical Model of Learning from the News. Harvard International Journal of
|
1066 |
+
Press/Politics,
|
1067 |
+
11,
|
1068 |
+
3
|
1069 |
+
(2006),
|
1070 |
+
135-155.
|
1071 |
+
https://journals.sagepub.com/doi/abs/10.1177/1081180X06289582
|
1072 |
+
[32] J. Nathan Matias. 2016. Going dark: Social factors in collective action against platform
|
1073 |
+
operators in the Reddit blackout. City, 2016.
|
1074 |
+
[33] DOUGLAS M. McLEOD, WILLIAM P. EVELAND and AMY I. NATHANSON. 1997. Support
|
1075 |
+
for Censorship of Violent and Misogynic Rap Lyrics:An Analysis of the Third-Person Effect.
|
1076 |
+
Communication
|
1077 |
+
Research,
|
1078 |
+
24,
|
1079 |
+
2
|
1080 |
+
(1997),
|
1081 |
+
153-174.
|
1082 |
+
https://journals.sagepub.com/doi/abs/10.1177/009365097024002003
|
1083 |
+
[34] Ben Medeiros. 2017. Platform (Non-)Intervention and the “Marketplace” Paradigm for
|
1084 |
+
Speech Regulation. Social Media + Society, 3, 1 (2017), 2056305117691997.
|
1085 |
+
https://journals.sagepub.com/doi/abs/10.1177/2056305117691997
|
1086 |
+
[35] Teresa K Naab, Anja Kalch and Tino GK Meitz. 2018. Flagging uncivil user comments:
|
1087 |
+
Effects of intervention information, type of victim, and response comments on bystander
|
1088 |
+
behavior.
|
1089 |
+
New
|
1090 |
+
Media
|
1091 |
+
&
|
1092 |
+
Society,
|
1093 |
+
20,
|
1094 |
+
2
|
1095 |
+
(2018),
|
1096 |
+
777-795.
|
1097 |
+
https://journals.sagepub.com/doi/abs/10.1177/1461444816670923
|
1098 |
+
[36] Teresa K. Naab, Thorsten Naab and Jonas Brandmeier. 2021. Uncivil User Comments
|
1099 |
+
Increase Users’ Intention to Engage in Corrective Actions and Their Support for
|
1100 |
+
Authoritative Restrictive Actions. Journalism & Mass Communication Quarterly, 98, 2
|
1101 |
+
(2021), 566-588. https://journals.sagepub.com/doi/abs/10.1177/1077699019886586
|
1102 |
+
[37] Hye-Jin Paek, Jennifer L. Lambe and Douglas M. McLeod. 2008. Antecedents to Support
|
1103 |
+
for Content Restrictions. Journalism & Mass Communication Quarterly, 85, 2 (2008), 273-
|
1104 |
+
290. https://journals.sagepub.com/doi/abs/10.1177/107769900808500204
|
1105 |
+
[38] Hye-Jin Paek, Zhongdang Pan, Ye Sun, Joseph Abisaid and Debra Houden. 2005. The
|
1106 |
+
Third-Person Perception as Social Judgment:An Exploration of Social Distance and
|
1107 |
+
Uncertainty in Perceived Effects of Political Attack Ads. Communication Research, 32, 2
|
1108 |
+
(2005), 143-170. https://journals.sagepub.com/doi/abs/10.1177/0093650204273760
|
1109 |
+
|
1110 |
+
[39] Vincent Price and David Tewksbury. 1996. Measuring the Third-Person Effect of News:
|
1111 |
+
The Impact of Question Order, Contrast and Knowledge. International Journal of Public
|
1112 |
+
Opinion Research, 8, 2 (1996), 120-141. https://doi.org/10.1093/ijpor/8.2.120
|
1113 |
+
[40] Manuel Puppis and Hilde Van den Bulck. 2019. Introduction: Media Policy and Media
|
1114 |
+
Policy
|
1115 |
+
Research.
|
1116 |
+
Springer
|
1117 |
+
International
|
1118 |
+
Publishing,
|
1119 |
+
City,
|
1120 |
+
2019.
|
1121 |
+
https://doi.org/10.1007/978-3-030-16065-4_1
|
1122 |
+
[41] Martin J. Riedl, Teresa K. Naab, Gina M. Masullo, Pablo Jost and Marc Ziegele. 2021.
|
1123 |
+
Who is responsible for interventions against problematic comments? Comparing user
|
1124 |
+
attitudes in Germany and the United States. Policy & Internet (2021).
|
1125 |
+
[42] Martin J. Riedl, Kelsey N. Whipple and Ryan Wallace. 2021. Antecedents of support for
|
1126 |
+
social media content moderation and platform regulation: the role of presumed effects on
|
1127 |
+
self
|
1128 |
+
and
|
1129 |
+
others.
|
1130 |
+
Information,
|
1131 |
+
Communication
|
1132 |
+
&
|
1133 |
+
Society
|
1134 |
+
(2021),
|
1135 |
+
1-18.
|
1136 |
+
https://doi.org/10.1080/1369118X.2021.1874040
|
1137 |
+
[43] Hernando Rojas. 2010. “Corrective” Actions in the Public Sphere: How Perceptions of
|
1138 |
+
Media and Media Effects Shape Political Behaviors. International Journal of Public Opinion
|
1139 |
+
Research, 22, 3 (2010), 343-363. https://doi.org/10.1093/ijpor/edq018
|
1140 |
+
[44] Hernando Rojas, Dhavan V. Shah and Ronald J. Faber. 1996. For the Good of Others:
|
1141 |
+
Censorship and the Third-person Effect. International Journal of Public Opinion Research, 8,
|
1142 |
+
2 (1996), 163-186. https://doi.org/10.1093/ijpor/8.2.163
|
1143 |
+
[45] Steven Ruggles, Sarah Flood, Ronald Goeken, Megan Schouweiler and Matthew Sobek.
|
1144 |
+
2022. IPUMS USA, Minneapolis, MN. https://doi.org/10.18128/D010.V12.0
|
1145 |
+
[46] Valarie Schweisberger, Jennifer Billinson and T. Makana Chock. 2014. Facebook, the
|
1146 |
+
Third-Person Effect, and the Differential Impact Hypothesis*. Journal of Computer-Mediated
|
1147 |
+
Communication, 19, 3 (2014), 403-413. https://doi.org/10.1111/jcc4.12061
|
1148 |
+
[47] Steve Stecklow. 2018. Why Facebook is losing the war on hate speech in Myanmar.
|
1149 |
+
Thomson
|
1150 |
+
Reuters,
|
1151 |
+
City,
|
1152 |
+
2018.
|
1153 |
+
https://www.reuters.com/investigates/special-
|
1154 |
+
report/myanmar-facebook-hate/
|
1155 |
+
[48] John L Sullivan, James Piereson and George E Marcus Political tolerance and American
|
1156 |
+
democracy. University of Chicago Press, 1993.
|
1157 |
+
[49] Ye Sun, Zhongdang Pan and Lijiang Shen. 2008. Understanding the Third-Person
|
1158 |
+
Perception: Evidence From a Meta-Analysis. Journal of Communication, 58, 2 (2008), 280-
|
1159 |
+
300. https://doi.org/10.1111/j.1460-2466.2008.00385.x
|
1160 |
+
[50] Ran Wei, Stella C. Chia and Ven-Hwei Lo. 2011. Third-person Effect and Hostile Media
|
1161 |
+
Perception Influences on Voter Attitudes toward Polls in the 2008 U.S. Presidential
|
1162 |
+
Election. International Journal of Public Opinion Research, 23, 2 (2011), 169-190.
|
1163 |
+
https://doi.org/10.1093/ijpor/edq044
|
1164 |
+
[51] Mark Williams, Michelle Butler, Anna Jurek-Loughrey and Sakir Sezer. 2021. Offensive
|
1165 |
+
communications: exploring the challenges involved in policing social media. Contemporary
|
1166 |
+
Social
|
1167 |
+
Science,
|
1168 |
+
16,
|
1169 |
+
2
|
1170 |
+
(2021/03/15
|
1171 |
+
2021),
|
1172 |
+
227-240.
|
1173 |
+
https://doi.org/10.1080/21582041.2018.1563305
|
1174 |
+
[52] David A Yalof and Kenneth Dautrich The First Amendment and the media in the court of
|
1175 |
+
public opinion. Cambridge University Press, 2002.
|
1176 |
+
[53] Marc Ziegele, Teresa K Naab and Pablo Jost. 2020. Lonely together? Identifying the
|
1177 |
+
determinants of collective corrective action against uncivil comments. New Media & Society,
|
1178 |
+
22,
|
1179 |
+
5
|
1180 |
+
(2020),
|
1181 |
+
731-751.
|
1182 |
+
https://journals.sagepub.com/doi/abs/10.1177/1461444819870130
|
1183 |
+
|
HdE0T4oBgHgl3EQfRgBm/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
HtE5T4oBgHgl3EQfWg9Q/content/tmp_files/load_file.txt
ADDED
@@ -0,0 +1,220 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf,len=219
|
2 |
+
page_content='arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
3 |
+
page_content='05559v1 [quant-ph] 11 Jan 2023 Supercurrent and Electromotive force generations by the Berry connection from many-body wave functions Hiroyasu Koizumi Division of Quantum Condensed Matter Physics, Center for Computational Sciences, University of Tsukuba, Tsukuba, Ibaraki 305-8577, Japan E-mail: koizumi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
4 |
+
page_content='hiroyasu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
5 |
+
page_content='fn@u.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
6 |
+
page_content='tsukuba.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
7 |
+
page_content='ac.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
8 |
+
page_content='jp January 2023 Abstract.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
9 |
+
page_content=' The velocity field composed of the electromagnetic field vector potential and the Berry connection from many-body wave functions explains supercurrent generation, Faraday’s law for the electromotive force (EMF) generation, and other EMF generations whose origins are not electromagnetism.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
10 |
+
page_content=' An example calculation for the EMF from the Berry connection is performed using a model for the cuprate superconductivity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
11 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
12 |
+
page_content=' Introduction The Berry phase first discovered in the context of the adiabatic approximation now prevails in various fields of physics [1, 2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
13 |
+
page_content=' In particular, it is now an indispensable mathematical tool to detect topological defects in quantum wave functions [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
14 |
+
page_content=' Recently, the Berry connection from many-body wave functions was defined and its usefulness to calculate supercurrent is demonstrated [4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
15 |
+
page_content=' A salient feature of such a formalism is that it provides a vector potential directly related to the velocity field for electric current.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
16 |
+
page_content=' In the present work, we consider the supercurrent and electromotive force (EMF) generations based on the same formalism [4, 5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
17 |
+
page_content=' The EMF is expressed using a non-irrotational ‘electric field’, Eirrot, whose origin may not be a real electric field.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
18 |
+
page_content=' It is defined as E = � C Enon−irrot · dr (1) where C is a closed electric circuit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
19 |
+
page_content=' This EMF appears due to various causes, such as chemical reactions in batters or temperature differences in metals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
20 |
+
page_content=' One of the important EMF generation mechanisms is the Faraday’s law of magnetic induction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
21 |
+
page_content=' It is expressed as a total time-derivative of a magnetic flux of the magnetic field B E = − d dt � S B · dS (2) Supercurrent and EMF by Berry connection 2 where S is a surface whose circumference is C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
22 |
+
page_content=' This EMF formula is often called the “flux rule”, since � S B · dS is the magnetic flux through the surface S;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
23 |
+
page_content=' it has been claimed curious since it is composed of two different fundamental equations in classical theory [6], i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
24 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
25 |
+
page_content=', the Faraday’s law of induction and the Lorentz force.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
26 |
+
page_content=' The curiosity is increased by the fact that one of them is an equation for fields only, and the other includes particles and is an equation for a force on a particle.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
27 |
+
page_content=' This peculiarity disappears in quantum theory using the vector potential A that is more fundamental than the magnetic field B [7, 8, 9], and the wave function makes the velocity of a particle a velocity field [10].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
28 |
+
page_content=' Then, the two contributions in the “flux rule” are connected by the duality that a U(1) phase factor added on a wave function describes a whole system motion, and also plays the role of the vector potential when it is transferred into the Hamiltonian [11].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
29 |
+
page_content=' In the present work, we extend the above vector potential and velocity field approach for the electric current generation to cases where the vector potential of the Berry connection from many-body wave functions appears [4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
30 |
+
page_content=' We show that the EMF generation other than the electromagnetic field origin, such as those due to chemical reactions or temperature gradients can be expressed by it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
31 |
+
page_content=' The organization of the present work is as follows: we explain the velocity field appearing from the Berry connection from many-body wave functions in Section 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
32 |
+
page_content=' We reexamine the Faraday’s EMF generation formula using the velocity field from the electromagnetic vector potential in Section 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
33 |
+
page_content=' We examine the EMF generation by the Berry connection in Section 4, and an example calculation is performed for the Nernst effect in Section 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
34 |
+
page_content=' Lastly, we conclude the present work by mentioning implications of the present new theory in Section 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
35 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
36 |
+
page_content=' The velocity field from the Berry connection form many-body wave functions and supercurrent generation The key ingredient in the present work is the Berry connection from many-body wave functions for electrons given by AMB Ψ (r)= 1 ℏρ(r)Re �� dσ1dx2 · · ·dxNΨ∗(r,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
37 |
+
page_content=' σ1,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
38 |
+
page_content=' · · · ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
39 |
+
page_content=' xN)(−iℏ∇)Ψ(r,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
40 |
+
page_content=' σ1,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
41 |
+
page_content=' · · · ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
42 |
+
page_content=' xN) � (3) where N is the total number of electrons in the system,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
43 |
+
page_content=' ‘Re’ denotes the real part,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
44 |
+
page_content=' Ψ is the total wave function,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
45 |
+
page_content=' xi collectively stands for the coordinate ri and the spin σi of the ith electron,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
46 |
+
page_content=' −iℏ∇ is the Schr¨odinger’s momentum operator for the coordinate vector r,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
47 |
+
page_content=' and ρ(r) is the number density calculated from Ψ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
48 |
+
page_content=' This Berry connection is obtained by regarding r as the “adiabatic parameter”[1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
49 |
+
page_content=' Let us consider the electron system whose kinetic energy operator in the Schr¨odinger Supercurrent and EMF by Berry connection 3 representation is given by ˆT = − N � j=1 ℏ2 2me ∇2 j (4) where me is the electron mass.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
50 |
+
page_content=' For convenience, we also use the following χ defined as χ(r) = −2 � r 0 AMB Ψ (r′) · dr′ (5) and express the many-electron wave function Ψ as Ψ(x1, · · · , xN) = exp � − i 2 N � j=1 χ(rj) � Ψ0(x1, · · · , xN) (6) Then, Ψ0 = Ψ exp � i 2 �N j=1 χ(rj) � is a currentless wave function for the current operator associated with ˆT in Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
51 |
+
page_content=' (4) since the contribution from Ψ and that from exp � i 2 �N j=1 χ(rj) � cancel out.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
52 |
+
page_content=' In other words, a wave function is given as a product of a currentless one, Ψ0, and the factor for the current exp � − i 2 �N j=1 χ(rj) � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
53 |
+
page_content=' The total wave function Ψ must be a single-valued function of coordinates.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
54 |
+
page_content=' This makes χ as an angular variable that satisfies some periodicity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
55 |
+
page_content=' This periodicity gives rise to non-trivial topological integer as will be explained, shortly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
56 |
+
page_content=' When electromagnetic field is included, the kinetic energy operator becomes ˆT ′ = N � j=1 1 2me (−iℏ∇j − qA)2 (7) where q = −e is the electron charge, and A is the electromagnetic field vector potential.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
57 |
+
page_content=' The magnetic field is given by B = ∇ × A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
58 |
+
page_content=' In the following, we will use the same expression, Ψ, for the total wave function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
59 |
+
page_content=' Then, the current density for Ψ is given by j = −eρv (8) with the velocity field v given by v = e me � A − ℏ 2e∇χ � = e me A + ℏ me AMB Ψ (9) The current density in Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
60 |
+
page_content=' (8) is known to give rise to the Meissner effect if it is a stable one due to the fact that it explicitly depends on A [10].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
61 |
+
page_content=' For the stable current case, ∇χ compensates the gauge ambiguity in A and makes v in Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
62 |
+
page_content=' (9) gauge invariant.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
63 |
+
page_content=' If the Meissner effect is realize, the magnetic filed is expelled from the bulk of a superconductor [10].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
64 |
+
page_content=' Then, the flux quantization is observed for magnetic flux through Supercurrent and EMF by Berry connection 4 a loop C that goes through the bulk of a ring-shaped superconductor � S B · dS = � C A · dr = ℏ 2e � C ∇χ · dr = h 2ewC[χ] (10) where wC[χ] is the topological integer ‘winding number’ defined by wC[χ] = 1 2π � C ∇χ · dr (11) According to Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
65 |
+
page_content=' (9), the presence of non-zero wC[χ] means the existence of the stable velocity field that satisfies � C v · dr = h 2me wC[χ] (12) In superconductors, the quantized flux persists.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
66 |
+
page_content=' This means that the condition d dtwC[χ] = 0 (13) is realized.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
67 |
+
page_content=' In normal metals, the time-derivative of the velocity field is often expressed as dv dt = −1 τ v (14) using a relaxation time approximation, where τ is the relaxation time.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
68 |
+
page_content=' Combination of this with Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
69 |
+
page_content=' (12) yields τ d dtwC[χ] = −wC[χ] (15) If the condition in Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
70 |
+
page_content=' (13) with nonzero wC[χ] is realized, Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
71 |
+
page_content=' (15) means that τ must be ∞, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
72 |
+
page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
73 |
+
page_content=', an infinite conductivity, or zero resistivity is realized.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
74 |
+
page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
75 |
+
page_content=' The vorticity field from the vector potential A and Faraday’s flux rule In this section, we consider the case where non-trivial AMB Ψ is absent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
76 |
+
page_content=' When AMB Ψ is trivial, it satisfies ∇ × AMB Ψ = 0 (16) Thus, by applying ∇× on the both sides of Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
77 |
+
page_content=' (9) ∇ × v = e me B (17) is obtained.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
78 |
+
page_content=' Taking the total time-derivative of the above yields ∇ × dv dt = e me ∂tB + e me (v · ∇)B (18) Supercurrent and EMF by Berry connection 5 where the total time-derivative of the field B is the Eulerian time-derivative given by dB dt = ∂tB + (v · ∇)B (19) Integrating Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
79 |
+
page_content=' (18) over the surface S, we have � C dv dt · dr = e me � S ∂tB · dS + e me � S (v · ∇)B · dS (20) where the Stokes theorem is used to convert the surface integral to the line integral.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
80 |
+
page_content=' Noting that the electromotive force for an electron is given by E = 1 −e � C d(mev) dt dr (21) where −e is the electron charge and me is the electron mass, the following relation is obtained E = − � S ∂tB · dS − � S (v · ∇)B · dS (22) This is equal to the Faraday’s formula in Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
81 |
+
page_content=' (2).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
82 |
+
page_content=' In the situation where the circuit C moves with a constant velocity v0, we have the following relation (v0 · ∇)B = ∇ × (B × v0) + v0(∇ · B) = ∇ × (B × v0) (23) due to the fact that B satisfies ∇ · B = 0 [12].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
83 |
+
page_content=' As a consequence, the well-known EMF formula E = − � S ∂tB · dS + � C (v0 × B) · dr (24) is obtained.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
84 |
+
page_content=' The first term in it is attributed to the Faraday’s law of induction, and the second to the Lorentz force.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
85 |
+
page_content=' This formula is composed of two different fundamental equations in classical theory [6].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
86 |
+
page_content=' However, in the quantum mechanical formalism, two contributions stem from a single relation in Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
87 |
+
page_content=' (9).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
88 |
+
page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
89 |
+
page_content=' The EMF generation by the Berry connection The velocity field in Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
90 |
+
page_content=' (9) contains the vector potential AMB Ψ in addition to the electromagnetic vector potential A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
91 |
+
page_content=' Just like A, AMB Ψ will also give rise to the EMF.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
92 |
+
page_content=' We now consider a general case where the Berry connection arises from a set of states {Ψj} and given by AMB = � j pjAMB Ψj (25) where pj’s are probabilities satisfy � j pj = 1 (26) and AMB Ψj is obtained from Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
93 |
+
page_content=' (3) by replacing Ψ with Ψj.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
94 |
+
page_content=' Supercurrent and EMF by Berry connection 6 We express AMB using the following density matrix ˆd = � j pj|Ψj⟩⟨Ψj| (27) where the operator ˆAMB is defined through the relation ⟨Ψj| ˆAMB|Ψj⟩ = AMB Ψj (28) From now on, we allow the time-dependence in Ψj.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
95 |
+
page_content=' When Ψj is time-dependent, AMB Ψj is also time-dependent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
96 |
+
page_content=' The distribution probability pj can be also time and coordinate dependent.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
97 |
+
page_content=' Using the density operator ˆd and the operator ˆAMB, the vector potential from the Berry connection is given by AMB = tr � ˆd ˆAMB� (29) We define BMB by BMB = ∇ × AMB (30) Then, the EMF from the Berry connection is given by EMB = −ℏ e � S ∂tBMB · dS − ℏ e � S (v · ∇)BMB · dS (31) The first term in the right hand side can arise from the time-dependence of pj.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
98 |
+
page_content=' This means that if pj varies with time due to chemical reactions, photo excitations, or etc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
99 |
+
page_content=' it will give rise to the EMF.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
100 |
+
page_content=' The second term will arise if the temperature depends on the coordinate, T(r), and pj contains the Boltzmann factor exp(− Ej kBT(r)), where Ej is the energy for the state Ψj.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
101 |
+
page_content=' It also arises when pj depends on the coordinate due, for example, to the concentration gradient of chemical spices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
102 |
+
page_content=' Now we consider the case where the circuit moves with a constant vector v0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
103 |
+
page_content=' The circuit in this case should be regarded as a region of the system which flows due to the flow existing in the system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
104 |
+
page_content=' Such a motion may arise from a temperature gradient or concentration gradient in the system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
105 |
+
page_content=' In this case, we have the following relation, (v · ∇)BMB = −∇ × (v0 × BMB) (32) due to the fact that ∇ · BMB = ∇ · (∇ × AMB) = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
106 |
+
page_content=' The equation (31) can be cast into the following form EMB = −ℏ e � C � ∂tAMB − v0 × (∇ × AMB) � dr (33) that only contains AMB.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
107 |
+
page_content=' However, the above formula may not be convenient to use due to the fact that AMB contains topological singularities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
108 |
+
page_content=' A convenient one may be the following EMB = −ℏ e d dt � S BMB · dS (34) where B in the Faraday’s law in Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
109 |
+
page_content=' (2) is replaced by BMB.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
110 |
+
page_content=' Supercurrent and EMF by Berry connection 7 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
111 |
+
page_content=' Nernst effect In this section, we examine the Nernst effect observed in cuprate superconductors [13, 14, 15].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
112 |
+
page_content=' We examine this phenomenon using Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
113 |
+
page_content=' (34).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
114 |
+
page_content=' A theory of superconductivity in the cuprate predicts the appearance of spin-vortices in the CuO2 plane around doped holes that become small polarons [16, 17, 18].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
115 |
+
page_content=' The spin-vortices generate the vector potential AMB = −1 2∇χ (35) where χ is an angular variable with period 2π.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
116 |
+
page_content=' This angular variable appears due to the requirement that the wave function to be a single-valued function of coordinates in the situation where itinerant motion of electrons around the small polaron hole is a spin-twisting one.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
117 |
+
page_content=' We can decompose χ as a sum over spin-vortices χ = Nh � j=1 χj (36) where χj is a contribution form the jth small polaron hole, and Nh is the total number of holes that become small polarons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
118 |
+
page_content=' Each χj is characterized by its winding number wj = 1 2π � Cj ∇χj · dr (37) where Cj is a loop that only encircles the center of the jth spin-vortex.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
119 |
+
page_content=' We can assume wj to be +1 or −1;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
120 |
+
page_content=' only odd integers are allowed due to the spin-twisting motion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
121 |
+
page_content=' The numbers ±1 are favorable from the energetic point of view.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
122 |
+
page_content=' C(t) v0 x y Ly C(t+Δt) v0 x0+ Δt x0 Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
123 |
+
page_content=' A schematic picture for the EMF appearing from the Berry connection generated by spin-vortices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
124 |
+
page_content=' The Berry connection creates the vector potential proportional to ∇χ, which creates vortices (loop currents) denoted by circles with arrows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
125 |
+
page_content=' We consider two loops C(t) and C(t + ∆t), where t and t + ∆t denote two times with interval ∆t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
126 |
+
page_content=' The loop moves with velocity v0 in the x-direction due to the temperature gradient in that direction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
127 |
+
page_content=' A constant magnetic field is applied in the z- direction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
128 |
+
page_content=' A voltage is generated across the y-direction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
129 |
+
page_content=' The sample exists 0 ≤ y ≤ Ly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
130 |
+
page_content=' The left edge of the loop at time t is x0 and that at time t + ∆t is x0 + v0∆t.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
131 |
+
page_content=' Supercurrent and EMF by Berry connection 8 Let us consider the situation depicted in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
132 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
133 |
+
page_content=' We neglect the contribution from A assuming that it is small.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
134 |
+
page_content=' The EMF generated across the sample in the y-direction is given by EMB = − ℏ e 1 ∆t �� S(t+∆t) BMB · dS − � S(t) BMB · dS � = − ℏ e 1 ∆t �� C(t+∆t) AMB · dr − � C(t) AMB · dr � = ℏ e 1 ∆t � ∆C AMB · dr (38) where S(t+∆t) and S(t) are surfaces in the xy-plane with circumferences C(t+∆t) and C(t), respectively;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
135 |
+
page_content=' ∆C is the loop encircling the area x0 ≤ x ≤ x0 + v0∆t, 0 ≤ y ≤ Ly, with the counterclockwise direction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
136 |
+
page_content=' We approximate � ∆C AMB · dr by � ∆C AMB · dr = − 1 2 � ∆C ∇χ · dr ≈ − 1 22π(nm − na)Lyv0∆t (39) where nm and na are average densities of wj = 1 (‘meron’) and wj = −1 (‘antimeron’) vortices, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
137 |
+
page_content=' Thus, nmLyv0∆t and naLyv0∆t are expected numbers of wj = 1 and wj = −1 vortices within the loop ∆C, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
138 |
+
page_content=' From Eqs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
139 |
+
page_content=' (38) and (38), the approximate EMB is given by EMB ≈ hv0 2e (na − nm)Ly (40) Thus, the electric field generated by EMB in the y-direction is given by Ey ≈ hv0 2e (na − nm) (41) In our previous work, na is denoted as nd indicting that it yields a diamagnetic current, and nm as np indicting that it yields a paramagnetic current [17, 18].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
140 |
+
page_content=' Using nd and np, the Nernst signal is obtained as eN = Ey |∂xT| = hv0(nd − np) 2e|∂xT| (42) The same formula was obtained previously for the situation where spin-vortices move by the temperature gradient [17, 18].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
141 |
+
page_content=' Here, the situation is different;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
142 |
+
page_content=' the spin-vortices do not move, but the electron system affected by ∇χ moves.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
143 |
+
page_content=' Considering that the small polaron movement is negligible at low temperature, the present situation is more realistic than the previous one.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
144 |
+
page_content=' The temperature dependence is the same as the one that qualitatively explains the experimental result [18].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
145 |
+
page_content=' Note that experiments indicating the presence of loop currents different from ordinary Abrikosov vortices [19] in the cuprate [20, 21].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
146 |
+
page_content=' The present result indicates that the observed Nernst can be explained by the presence of spin-vortex-induced loop currents.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
147 |
+
page_content=' Supercurrent and EMF by Berry connection 9 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
148 |
+
page_content=' Concluding remarks Since the EMF by the Berry connection is not the electromagnetic field origin, it may be more appropriate to call it the Berry-connection motive force (BCMF) given by F BMF = −eEMB = ℏ d dt � S BMB · dS (43) The BCMF will arise from quantum mechanical dynamics of particles other than electrons;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
149 |
+
page_content=' for example, from proton dynamics, through chemical reactions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
150 |
+
page_content=' The non- trivial Berry phase effect has been predicted [22], and observed in the hydrogen transfer reactions [23].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
151 |
+
page_content=' Quantum mechanical effects are important in such reactions due to the relatively light mass of protons [24, 25].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
152 |
+
page_content=' It is known that the EMF generated by the proton pumps is a very important chemical process in biological systems, and the Berry- connection motive force may play some roles in the working of the proton pumps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
153 |
+
page_content=' It may be also useful to invent high performance batteries.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
154 |
+
page_content=' References [1] Berry M V 1984 Proc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
155 |
+
page_content=' Roy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
156 |
+
page_content=' Soc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
157 |
+
page_content=' London Ser.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
158 |
+
page_content=' A 391 45 [2] Bohm A, Mostafazadeh A, Koizumi H, Niu Q and Zwanziger J 2003 The Geometric Phase in Quantum Systems (Springer) [3] Chiu C K, Teo J C Y, Schnyder A P and Ryu S 2016 Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
159 |
+
page_content=' Mod.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
160 |
+
page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
161 |
+
page_content=' 88(3) 035005 URL https://link.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
162 |
+
page_content='aps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
163 |
+
page_content='org/doi/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
164 |
+
page_content='1103/RevModPhys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
165 |
+
page_content='88.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
166 |
+
page_content='035005 [4] Koizumi H 2022 Physics Letters A 450 128367 ISSN 0375-9601 URL https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
167 |
+
page_content='sciencedirect.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
168 |
+
page_content='com/science/article/pii/S0375960122004492 [5] Koizumi H 2022 arXiv:2211.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
169 |
+
page_content='08759 [cond-mat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
170 |
+
page_content='supr-con] [6] Feynman R P, Leighton R B and Sands M 1963 The Feynman Lectures on Physics vol 2 (Addison- Wesley) [7] Aharonov Y and Bohm D 1959 Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
171 |
+
page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
172 |
+
page_content=' 115 167 [8] Tonomura A, Matsuda T, Suzuki R, Fukuhara A, Osakabe N, Umezaki H, Endo J, Shinagawa K, Sugita Y and Fujiwara H 1982 Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
173 |
+
page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
174 |
+
page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
175 |
+
page_content=' 48 1443 [9] Tonomura A, Osakabe N, Matsuda T, Kawasaki T, Endo J, Yano S and Yamada H 1986 Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
176 |
+
page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
177 |
+
page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
178 |
+
page_content=' 56(8) 792–795 URL https://link.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
179 |
+
page_content='aps.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
180 |
+
page_content='org/doi/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
181 |
+
page_content='1103/PhysRevLett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
182 |
+
page_content='56.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
183 |
+
page_content='792 [10] London F 1950 Superfluids vol 1 (New York: Wiley) [11] Koizumi H 2017 J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
184 |
+
page_content=' Supercond.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
185 |
+
page_content=' Nov.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
186 |
+
page_content=' Magn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
187 |
+
page_content=' 30 3345–3349 [12] Jackson J D 1998 Classical Electrodynamics (Wiley) [13] Xu Z A, Ong N P, Wang Y, Kakeshita T and Uchida S 2000 Nature 406 486 [14] Wang Y, Li L, Naughton M J, Gu G D, Uchida S and Ong N P 2005 Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
188 |
+
page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
189 |
+
page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
190 |
+
page_content=' 95 247002 [15] Daou R, Chang J, LeBoeuf D, Cyr-Choiniere O, Laliberte F, Doiron-Leyraud N, Ramshaw B J, Liang R, Bonn D A, Hardy W N and Taillefer L 2010 Nature 463 519–522 URL http://dx.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
191 |
+
page_content='doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
192 |
+
page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
193 |
+
page_content='1038/nature08716 [16] Koizumi H 2009 J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
194 |
+
page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
195 |
+
page_content=' Chem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
196 |
+
page_content=' A 113 3997 [17] Koizumi H 2011 J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
197 |
+
page_content=' Supercond.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
198 |
+
page_content=' Nov.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
199 |
+
page_content=' Magn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
200 |
+
page_content=' 24 1997 [18] Hidekata R and Koizumi H 2011 J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
201 |
+
page_content=' Supercond.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
202 |
+
page_content=' Nov.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
203 |
+
page_content=' Magn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
204 |
+
page_content=' 24 2253 [19] Abrikosov A A 1957 Sov.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
205 |
+
page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
206 |
+
page_content=' JETP 5 1174 [20] Xia J, Schemm E, Deutscher G, Kivelson S A, Bonn D A, Hardy W H, Liang R, Siemons W, Koster G, Fejer M M and Kapitulnik A 2008 Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
207 |
+
page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
208 |
+
page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
209 |
+
page_content=' 100 127002 [21] He R H, Hashimoto M, Karapetyan H, Koralek J D, Hinton J P, Testaud J P, Nathan V, Yoshida Supercurrent and EMF by Berry connection 10 Y, Yao H, Tanaka K, Meevasana W, Moore R G, Lu D H, Mo S K, Ishikado M, Eisaki H, andT P Devereaux Z H, Kivelson S A, Orenstein J, Kapitulnik A and Shen Z X [22] Mead C A and Truhlar D 1979 J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
210 |
+
page_content=' Chem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
211 |
+
page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
212 |
+
page_content=' 70 2284 [23] Yuan D, Guan Y, Chen W, Zhao H, Yu S, Luo C, Tan Y, Xie T, Wang X, Sun Z, Zhang D H and Yang X 2018 Science 362 1289–1293 ISSN 0036-8075 URL https://science.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
213 |
+
page_content='sciencemag.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
214 |
+
page_content='org/content/362/6420/1289 [24] Kuppermann A and Schatz G C 1975 J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
215 |
+
page_content=' Chem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
216 |
+
page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
217 |
+
page_content=' 62 62 2502 [25] Elkowitz A B and Wyatt R E 1975 J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
218 |
+
page_content=' Chem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
219 |
+
page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
220 |
+
page_content=' 62 2504' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/HtE5T4oBgHgl3EQfWg9Q/content/2301.05559v1.pdf'}
|
J9FIT4oBgHgl3EQfZytY/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:132a6edb129b513f30724124878b926c135e78944cc50e45e3efc3f13d447c44
|
3 |
+
size 1966125
|
JNE2T4oBgHgl3EQfUgdI/content/2301.03813v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:a7b824d81b6e36753365507f03eb135d67316ec1f345d3013dbf71afed332235
|
3 |
+
size 197918
|
JNE2T4oBgHgl3EQfUgdI/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:42d6a0f2c90977ccc27e01a908ef07e724adc6bcfa0aa1516f2d65ce4d90d72c
|
3 |
+
size 78405
|
JNE4T4oBgHgl3EQfIgz1/content/2301.04914v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:05d1c94bf7d6c6c8448b5f066db7b3540a2696be853c9544b2fb7b1aa2028f3c
|
3 |
+
size 495741
|