• Keine Ergebnisse gefunden

8.3 Particle Interactions

8.3.2 Fields

Figure 8.2 shows a visualization of the principle of the virtual heat bath. The method of a virtual-particle bath mimics a canonical heat bath. By sampling virtual particles from the heat bath, the exchanged amount energy between particles and ŞrealŤ particles has a stochastic character. This method has several advantages. Spatial anisotropies are not generated, any energy exchange between particles and the heat bath is distributed evenly across all particles.

Additionally, a Ąne grained control over the heat bath is given by the two parameters temperature T and the heat bath cross sectionσbath. The ratio of the system- and heat bath temperature measures the hardness of the interactions

rbath = Tbath

Tmedium (8.28)

and gives the average energy exchange between the two reservoirs. The cross section σbath

determines the time in which the system equilibrates because it is proportional to the reaction rate between the particles and the heat bath while. The heat bath method is used in the DSLAM model to control the temperature of a thermal box. It is both used to keep the system at a constant temperature and to change the system temperature, for example to drive the system from a hot phase through the chiral-phase transition to a cold phase. All energy which is released in the phase transition can be absorbed by the heat bath. Calculations with the virtual heat bath method are used in Section 3.2.1in which a particle ensemble thermalizes with the heat bath, see Figure 3.4and 3.5.

Chapter 8 Numerical Implementation-Details of the DSLAM Model

equations of motion are (2

∂t2 − ∇2x

)

σ(x, t) =

[∂U(σ, ⃗π)

∂σ +gψψ¯ ⟩

σ(x, t) +fπm2π , (2

∂t2 − ∇2x

)

π(x, t) =

[∂U(σ, ⃗π)

∂π +gψiγ¯ 5ψ

π(x, t).

(8.31)

Equations (8.31) are partial-diferential equations (PDE) which have to be solved numerically.

This can be done with potentially any PDE-solver. Robust choices for a broad range of numerical problems are the Runge-Kutta method and the leap-frog method. The Runge-Kutta method is a class of numerical solvers for diferential equations but the most applied method is the classical Runge-Kutta method which uses an explicit fourth-order solving system for arbitrary diferential equations [146]. This method can be used for implicit solving schemes as well [147].

The Runge-Kutta is a high-precision solver with small numerical error but as a drawback it does not guarantee systematic energy conservation and has a relatively high implementation complexity.

In numerical studies with the Klein-Gordon equation, solving schemes which conserve energy seem to be favorable in comparison to systems with smaller solving error but energy conservation-violation [148, 149]. While the integration error may change the actual system propagation, energy conservation seems to keep overall system dynamics stable.

An algorithm which conserves energy with carefully chosen approximations of derivatives by Ąnite diferences is the leapfrog algorithm [150] and has a propagation error scaling withϵ∼ O(∆t2) and a global energy conservation within a given bound for equations of motion with a conservative potential.

The leap-frog algorithm is derived by Taylor-expanding an integration step x(t+ ∆t) =x(t) +dx(t)

dt ∆t+d2x(t) dt2

∆t2

2! +d3x(t) dt3

∆t3

3! +O(∆t4) . (8.32) Using ˙x=v and Newtons law to express the second derivative with a Force, the above equation can be written in a physical form

x(t+ ∆t) =x(t) +v(t)∆t+a(t)

2 ∆t2+d3x(t) dt3

∆t3

3! +O(∆t3) . (8.33) Summing x(t+ ∆t) with the same expression for x(t−∆t) and solving forx(t+ ∆t), the ∆t3 term cancels and one gets the Leap-frog propagation equation

x(t+ ∆t) = 2x(t)x(t−∆t) +a(t)

2 ∆t2+O(∆t4) . (8.34)

139

Equation (8.34) can already be used for the propagation of the wave equations, the propagation error is of orderO(∆t2), and the total energy is conserved.

However for an implementation within the DSLAM model this equation is not directly applicable because the particle-Ąeld method would violate energy and momentum conservation. The leap-frog method conserves energy by interleaving multiple time steps within the physical context.

In the particle-Ąeld method the Ąeld is locally changed to simulate the energy and momentum transfer between particles and Ąelds. A direct local change ofϕ(x, t) andϕ(x, t−∆t) induces a numerical error proportional toδϕ(x, t) and violates energy conservation. A solution would be to change the explicit solving mechanism of the Leap-Frog algorithm with the explicit method of the energy-momentum-change of the particle-Ąeld method to a combined implicit method, in which bothϕ(x, t+ ∆t),ϕ(x, t) and ∆E and ∆Pis changed at the same time.

Another and more simplistic approach is to expand (8.34) to include the velocity, which then can be changed by interactions. Equation (8.34) can be expanded to include velocities by using the relation

ϕ(t+ ∆t)−ϕ(t) = ˙ϕ (

t+1

2∆t)∆t . (8.35)

By interweaving the diferent time steps again, the following relation is an equivalent solving method to (8.34):

ϕ(t+ ∆t) =ϕ(t) + ˙ϕ(t)∆t+a(t) ∆t2 2 , ϕ(t˙ + ∆t) = ˙ϕ(t) +∆t

2 [a(t) +a(t+ ∆t)] .

(8.36)

This is the leap-frog method which is implemented in the DSLAM model. Interesting is the propagation of the velocity, which is a linear combination of the current and future time step.

For computation it can be favorable to reverse the calculation order of ϕ and ˙ϕ. This can be done by the transformation (t+ ∆t)→t andt→(t−∆t) and calculating the velocity before the new Ąeld conĄguration. However in this approach the Euler propagation has to be used for the Ąrst and initial time step of the system

ϕt+1 =ϕt+Ft)∆t . (8.37)

Overall the velocity-based Leap-frog algorithm conserves the total energy for all potential and spatial-derivative based forces of the Ąeld. For all interactions between particles and Ąelds the energy violation is of the order O(∆t2). On average, these errors can cancel. In case the Euler-method is used, the overall numerical energy conservation violation would scale with O(∆t).

Chapter 8 Numerical Implementation-Details of the DSLAM Model All forces acting on the Ąelds are summarized inFt), they are given by the potential terms in (8.31). fπm2π is a constant source term which has no spatial dependencies. The potential term

∂U(σ, ⃗π)

∂σ =λ2σ(x, t)(σ2(x, t) +π2(x, t)−ν2) (8.38) is space dependent but carries no gradient terms. The spatial derivative in (8.31) are approximated by second order Ąnite diferences on the numerical grid with grid-size ∆x,

2xσ(x, t)σ(x+ ∆x·ex, t)σ(x−∆x·ex, t)

2∆x . (8.39)

The last undiscussed term in (8.31) is the one-loop quark scalar (and pseudo-scalar) density ρσ˜ψψ¯ ˜

σ(x)≡gσ(x) dE f(x,p) + ˜f(x,p)

E(x) (8.40)

and the pseudo-scalar density ρπ˜ψψ¯ ˜

π(x)≡gπ(x) dE f(x,p) + ˜f(x,p)

E(x) . (8.41)

f(x,p) is represented with test particles, so the scalar density becomes

˜ψψ¯ ˜

σ(x)≡gσ(x)

N

i

δ(pip)δ(xii)

p2i +g22+π2) , (8.42)

˜ψψ¯ ˜

π(x)≡gπ(x)

N

i

δ(pip)δ(xii)

p2i +g22+π2) . (8.43) In (8.43) spin saturation was assumed⃗π→3⟨π⟩. These densities act like a potential for the σ andπ Ąelds in the equations of motion. In fact, they are an essential part for the chiral phase transition. By representing the quark distribution function f(x,p) with test particles, the scalar densities can be rewritten in terms of a sum over delta-distributions:

˜ψψ¯ ˜

σ(x) =gσ(x)

N

i

δ(xix)

p2i +g22+π2) (8.44)

˜ψψ¯ ˜

π(x) =gπ(x)

N

i

δ(xix)

p2i +g22+π2) (8.45) Equations (8.43) and (8.45) could be implemented numerically but would lead to numerical instabilities in the partial diferential equation solvers because their spatial distribution has a Dirac-delta character and would lead to point like sources in the chiral Ąeld potentials. Even in thermal and chemical equilibrium, the system would become unstable due to numerical noise. To 141

avoid this problem, the scalar and pseudo-scalar density must by smoothed. This can be done by a convolution with a Gaussian kernel

˜˜ψψ¯ ˜(x)˜= N0

√2π3σxσyσz

V du3˜ψψ¯ ˜(x−u) exp (

u2xx2u2y

y2u2zz2

)

. (8.46) Beside the positive efect on the numerics, this smearing can be interpreted as the uncertainty principle of the quarks. The delta-functions in (8.42) and (8.43) represents the center of the position distribution, the exact position of the particle is smeared out. The width of this smearing can be either set as a free parameter or can be motivated by physical properties like estimated quark-radii given by the uncertainty principle within the proton.

Equation (8.46) smears the scalar density over a small volume deĄned by σx,σy andσz. For a numerical implementation of (8.46), the volume of the 3D Gaussian has to be smaller than the system volume 3i σiV to avoid artifacts. N0 takes into account cut-of efects of the Gaussian if some parts of the convolution are cut of due the Ąnite system volume. For suiciently large systems N0≈1, for smaller systems one has to choseN0 >1 because (8.46) must preserve the integral measure of (8.42)

V dx3˜˜ψψ¯ ˜(x)˜=

V dx3(˜˜ψψ¯ ˜(x)˜G(u)) . (8.47) In (8.46) a parameter N0 was introduced. In general, this parameter has to beN0 = 1 to fulĄll (8.46). However, this is only guaranteed if the width of the Gaussian kernel is much smaller than

the size of the system σiLi or

G(r=L)≈0 (8.48)

for the size of the system L. If this is not the case, N0 must be chosen to correct for any cut-of efects which occur through the convolution and by the numerical restriction ofLsystem<∞:

1 N0 =

Vsystem

dx3 G(x)

√2πσ23 . (8.49)

For suiciently large systems this correction factor equals unity N0≈1, for smaller systems this factor will difer from unity.

The Gaussian smearing has to be calculated in every time step, therefore an eicient imple-mentation should be chosen. A possibility is to replace the convolution in position space with a multiplication in Fourier-space and by Fourier transforming F both functions, multiply and applying the inverse transformation F−1 afterwards:

V du3f(x−u)·g(u) =F−1¶F ¶f♢ · F ¶g♢♢ (8.50)

Chapter 8 Numerical Implementation-Details of the DSLAM Model An implementation in 3D position space would have a calculation complexity of O(N6), a general implementation in Fourier-space reduces the complexity to O(N2)and if a Fast-Fourier-Transform (FFT) is used, it is reduced down to O(NlogN). For further optimization, the Gaussian convolution kernel can be pre-calculated in Fourier space F ¶G(u)♢ because it stays constant over whole simulation. The largest computational complexity of the Gaussian kernel is not the Fourier transform but the actual calculation of the kernel because the calculation of exponential values is very CPU intensive.

By pre-calculating the Gaussian kernel, one has to take care of the kernelŠs symmetries

G(ui) =G(ui) for uiux, uy, uz. (8.51)