On a probabilistic interpretation of shape derivatives of Dirichlet groundstates with application to Fermion nodes

نویسنده

  • Mathias Rousset
چکیده

This paper considers Schrödinger operators, and presents a probabilistic interpretation of the variation (or shape derivative) of the Dirichlet groundstate energy when the associated domain is perturbed. This interpretation relies on the distribution on the boundary of a stopped random process with Feynman-Kac weights. Practical computations require in addition the explicit approximation of the normal derivative of the groundstate on the boundary. We then propose to use this formulation in the case of the so-called fixed node approximation of fermion groundstates, defined by the bottom eigenelements of the Schrödinger operator of a fermionic system with Dirichlet conditions ∗INRIA Lille Nord Europe & Université Lille 1, Villeneuve d’Ascq, France. E-mail: [email protected] 1 in ria -0 04 47 39 6, v er si on 1 27 J an 2 01 3 on the nodes (the set of zeros) of an initially guessed skew-symmetric function. We show that shape derivatives of the fixed node energy vanishes if and only if either (i) the distribution on the nodes of the stopped random process is symmetric; or (ii) the nodes are exactly the zeros of a skew-symmetric eigenfunction of the operator. We propose an approximation of the shape derivative of the fixed node energy that can be computed with a Monte-Carlo algorithm, which can be referred to as Nodal Monte-Carlo (NMC). The latter approximation of the shape derivative also vanishes if and only if either (i) or (ii) holds.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Determining Intermediary Effect of Auditor’s Conservatism on Relationship between Ethnicity and Interpretation of Probabilistic Propositions in Accepted Accounting Standards

Use of integrated standards in today's economy is imperative to create efficient financial markets, improve resource allocation and reduce transaction costs. In the same vein, all countries must make a lot of effort to develop common standards. However, ethnic diversity in different parts of the world results in different interpretations and judgments from accounting standards and challenges a ...

متن کامل

Variational Calculations for the Relativistic Interacting Fermion System at Finite Temperature: Application to Liquid 3He

In this paper, at first we have formulated the lowest order constrained variational method for the relativistic case of an interacting fermion system at finite temperature. Then we have used this formalism to calculate some thermodynamic properties of liquid in the relativistic regime. The results show that the difference between total energies of relativistic and non-relativistic cases of liqu...

متن کامل

Energy-Aware Probabilistic Epidemic Forwarding Method in Heterogeneous Delay Tolerant Networks

Due to the increasing use of wireless communications, infrastructure-less networks such as Delay Tolerant Networks (DTNs) should be highly considered. DTN is most suitable where there is an intermittent connection between communicating nodes such as wireless mobile ad hoc network nodes. In general, a message sending node in DTN copies the message and transmits it to nodes which it encounters. A...

متن کامل

New Improvement in Interpretation of Gravity Gradient Tensor Data Using Eigenvalues and Invariants: An Application to Blatchford Lake, Northern Canada

Recently, interpretation of causative sources using components of the gravity gradient tensor (GGT) has had a rapid progress. Assuming N as the structural index, components of the gravity vector and gravity gradient tensor have a homogeneity degree of -N and - (N+1), respectively. In this paper, it is shown that the eigenvalues, the first and the second rotational invariants of the GGT (I1 and ...

متن کامل

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010