text
stringlengths
2
6.14k
file_name
stringclasses
10 values
node_id
stringlengths
36
36
= (100000111) 2→ (1100010110) 2→ (110001011) 2326 251 395 = (110001011) 2→ (10010100010) 2→(1001010001) 2325 250 593 = (1001010001) 2→(11011110100) 2→(110111101) 2324 249 445 = (110111101) 2→ (10100111000) 2→(10100111) 2323 247 167 = (10100111) 2→ (111110110) 2→ (11111011) 2322 244 251 = (11111011) 2→ (1011110010) 2→ (101111001) 2321 243 377 = (101111001) 2→ (10001101100) 2→(100011011) 2320 242 283 = (100011011) 2→ (1101010010) 2→ (110101001) 2319 240 425 = (110101001) 2→ (10011111100)= (110101001) 2→ (10011111100) 2→(100111111) 2318 239 319 = (100111111) 2→ (1110111110) 2→ (111011111) 2317 237 479 = (111011111) 2→ (10110011110) 2→(1011001111) 2316 236 719 = (1011001111) 2→(100001101110) 2→(10000110111) 2315 235 1079 = (10000110111) 2→(110010100110) 2→(11001010011) 2314 234 1619 = (11001010011) 2→(1001011111010) 2→(100101111101) 2313 233 2429 = (100101111101) 2→(1110001111000) 2→(1110001111) 2312 232 911 = (1110001111) 2→(101010101110) 2→(10101010111)2→(101010101110) 2→(10101010111) 2311 229 1367 = (10101010111) 2(1000000000110) 2(100000000011) 2310 228 2051 = (100000000011) 2→(1100000001010) 2→(110000000101) 239 227 3077 = (110000000101) 2→(10010000010000) 2→(1001000001) 238 226 577 = (1001000001) 2→(11011000100) 2→(110110001) 237 222 433 = (110110001) 2→ (10100010100) 2→(101000101) 236 220 325 = (101000101) 2→ (1111010000) 2→ (111101) 235 218 61 = (111101) 2→ (10111000) 2→ (10111) 234 2148
2402.00001v1.pdf
16b037f0-0fb6-4b49-848a-d52fd9e4a595
330 261·10027 10027=(10011100101011) 2→(111010110000010) 2→(11101011000001) 2329 261 15041=(11101011000001) 2→(1011000001000100) 2→(10110000010001) 2328 260 11281=(10110000010001) 2→(1000010000110100) 2→(10000100001101) 2327 258 8461=(10000100001101) 2→(110001100101000) 2→(110001100101) 2326 256 3173=(110001100101) 2→(10010100110000) 2→(1001010011) 2325 253 595=(1001010011) 2→ (11011111010) 2→(1101111101) 2324 249 893=(1101111101) 2→ (101001111000) 2→(101001111) 2323 248 335=(101001111) 2→2323 248 335=(101001111) 2→ (1111101110) 2→(111110111) 2322 245 503=(111110111) 2→ (10111100110) 2→(1011110011) 2321 244 755=(1011110011) 2→ (100011011010) 2→(10001101101) 2320 243 1133=(10001101101) 2→ (110101001000) 2→(110101001) 2319 242 425=(110101001) 2→ (10011111100) 2→(100111111) 2318 239 319=(100111111) 2→ (1110111110) 2→(111011111) 2317 237 479=(111011111) 2→ (10110011110) 2→(1011001111) 2316 236 719=(1011001111) 2→ (100001101110) 2→(10000110111) 2315 235 1079=(10000110111)
2402.00001v1.pdf
7d975516-2e36-4044-ad99-aafe334c6a2e
2315 235 1079=(10000110111) 2→ (110010100110) 2→(11001010011) 2314 234 1619=(11001010011) 2→(1001011111010) 2→(100101111101) 2313 233 2429=(100101111101) 2→(1110001111000) 2→(1110001111) 2312 232 911=(1110001111) 2→ (101010101110) 2→(10101010111) 2311 229 1367=(10101010111) 2→(1000000000110) 2→(100000000011) 2310 228 2051=(100000000011) 2→(1100000001010) 2→(110000000101) 239 227 3077=(110000000101) 2→(10010000010000) 2→(1001000001) 238 226 577=(1001000001) 2→ (11011000100) 2→(110110001)2→ (11011000100) 2→(110110001) 237 222 433=(110110001) 2→ (10100010100) 2→(101000101) 236 220 325=(101000101) 2→ (1111010000) 2→(111101) 235 218 61=(111101) 2→ (10111000) 2→(10111) 234 214 23=(10111) 2→ (1000110) 2→(100011) 233 211 35=(100011) 2→ (1101010) 2→(110101) 232 210 53=(110101) 2→ (10100000) 2→(101)23 29 5=(101) 2→ (10000) 2→ (1)21 24 9
2402.00001v1.pdf
cd22bf5a-f531-45a9-abdb-ef8c2f27010a
4.1. Row characteristic 1) In each row, the first column is always odd (empty when the initial v alue is even), and the last bit of its binary string must be 1, The secondcolumn must be even, its binarystringmust end with at lea stone0, the number ofsubsequent even numbers must be as many as the number of zeros at the end of the second column’s binary string, and the number of zeros at the end of each even number to the right is o ne less than the previous one, until all zeros are deleted to become the last odd number in the row. The last column must be odd, and the last bit of its binary string must b e 1. 2) When there are only three numbers in a row, that is, only one even number, the last odd number must be greater than the first odd number (the first column); When the re are more than three numbers in a row, that is, more than two even numbers, the last odd number must be s maller than the first odd number.3) The preceding binary string is identical from the second column to the last column in one line, except for the all 0 at the end. 4.2.4.2. Column characteristic From top to bottom, the binary string in the first column of two adja cent rows has the following two characteristics: 1) If the number of bits of 1 in the last substring of the previous row is greater than 1, the number of bits of 1 in the last substring of the next row is reduced by one, and t he momentum of this reduction of one bit remains unchanged until it finally becomes only one; The corre sponding number is greater than the number in the previous row; 2) If the last substring of the binary string in a row contains only one bit of 1, then the last substring of the binary string in the next row contains either one bit of 1 or man y bits of 1, and the corresponding number is smaller than the number in the previous row; 3) Within each line, the number of bits in the first binary string is increa sed by 1 bit with the number in the second binary string, but for hard numbers, the number is incr eased by 2 bits.The reduction is at least 1 bit, and when it is a hard number of mbits, the number is reduced by m+1. 4.3. Comprehensive characteristic 1) The substring at the end of the binary (right) is observed that w hen the substring is 1, the units digit of the corresponding decimal number can be any one of 1 ,3,5,7,9. For instance, 161 = (10100001) 2, 433 = (110110001) 2, 325 = (101000101) 2, 577 = (1001000001) 2, 2429 = (100101111101) 2. 2) The number ending in decimal is 9 and the corresponding binary num ber can end in any digits of 1, for instance: 319 = (100111111) 2, 479 = (111011111) 2,719 = (1011001111) 2, 1079 = (10000110111) 2, 1619 = (11001010011) 2, 2429 = (100101111101) 2.
2402.00001v1.pdf
b65e462c-6133-46fc-8b9f-6b07ea9bf975
3)When thelastsubstringofbinaryisreducedbyonebit frommany, the correspondingdecimalnumber’s units are always reciprocated within the three groups of numbers: 1,7, or 3,5, and unit bit is always 9. 10
2402.00001v1.pdf
63afd3c0-0166-4e96-b48a-825e433f9679
4.4. Discussion according three sets The following is a discussion of the natural numbers according to our classification, that is, when the initial value of the iteration process of the Collatz function is pure ev en, pure odd and mixed numbers, it always reaches the smallest natural number 1, thus proving the es tablishment of Collatz conjecture. (1)For a pure even n= 2k= (10···0)2, it requires only an iteration of the ktimes Collatz function to reach the smallest natural number 1, that is, the conjecture hold s. (2)For a special class of mixed numbers, if akin the iteration sequence aof the Collatz function is a special class of mixed numbers - the hard number4k−1 3= (101···101)2, then its sequent iteration result is ak=4k−1 3= (101···101···101)2,ak+1= 4k= 22k= (10···0)2,···,a3k+1= 1. This means that the Collatz conjecture is valid at this point.This means that the Collatz conjecture is valid at this point. For ordin ary mixed numbers, this is a complicated process, which is carried out in conjunction with the disc ussion of pure odd numbers in follows. (3) For a pure odd number n= 2k−1 = (11···1)2, if the Collatz function is iterated in binary form, that is, the second column in the preceding table becomes a mixed number, which can be observed by several examples. Research papers on this topic are[6,7,8]. By checking the change law of the last substring in the binary string and the change law of the total length of the binary st ring, we show that the Collatz function always reaches the minimum natural number 1 in the finite iteration va lue, thus proving the correctness of Collatz conjecture. In view of the general, a pure odd n= 2r−1, there is a mathematical formula: 2r−1 = 2r−1+2r−2+ 2r−3+···+ 2 + 1.Two numbers randmin the following tables are the values we verify for the Collatz conjecture by iterating Tm(2r−1) = 1,r= 1,2,3,···,203 in the Maple program below: restart; i:= 2r−1; convert(i,binary,decimal ); jj:= 0; while i ̸= 1do i:=piecewise (irem(i,2) = 0,(1/2)˙i,3˙i+1); convert(i,binary,decimal ); jj:=jj+1 enddo By verifying the first 203 pure odd number 2r−1, we can get the following rule: 1) Odd number rgreater than 1, the corresponding test Collatz function value has the following relation: ifTm(2r−1) = 1, then Tm+1(2r+1−1) = 1.
2402.00001v1.pdf
99f6f986-2365-4e42-9c1a-e77bfb6abc30
2)T856(257−1) =T856(265−1) = 1 3)T857(258−1) =T857(266−1) = 1 4)T1451(286−1) =T1451(2117−1) = 1 5)T1455(290−1) =T1455(2121−1) = 1 6)T1456(291−1) =T1456(2122−1) = 1 7)T1457(292−1) =T1457(2123−1) = 1 8)T1458(293−1) =T1458(2124−1) = 1 11
2402.00001v1.pdf
b4d451e2-786a-4eb9-880b-d7825f3bdf41
rmrmrmrmrmrmrm 103044959858881360117145114620101752039 273145060859891454118145214720111762040 3163245161860901455119148414820121772041 4173352762861911456120148514920131782042 51063452863862921457121145515020141792061 6107355296486393145812214561512015180458122145615120151802062 7463653065856941459123145715220161812063 8473753166857951460124145815320171822064 9613853267729961461125165815420181832047 10623953368730971462126165915520191842048 111564053469930981463127166015620201852049 12157415357093199146412
2402.00001v1.pdf
9ad08553-ae78-476a-8645-bb2d06793217
574153570931991464128166115720211862050 1315842536719321001465129166215820221872069 1415943586729331011466130166315920231882070 1512944587739341021467131199516020241892071 1613045588749351031437132199616120251902072 1722446589751073104143813316041622026191438133160416220261912073 18225475907610741051439134160516320271922074 1917748591779381061440135160616420281932972 2017849592789391071441136160716520291942973 2130350593799401081442137160816620301952974 2230451594809411091474138160916720311962975 2347352595311962975 23473525958114461101475139200316820321972728 24474538528214471111476140200416920331982729 25444548538314481121477141196117020341992730 26445555988414491131646142196217120352002731 27384565998514501141647143200717220362012980 2838557856861451115168385578568614511151648144200817320372022981 29448588578713591161649145200917420382032085 12
2402.00001v1.pdf
adb755d8-569e-4869-a4ab-6874da1808dd
5. Comparison of two piecewise functions and the proof of Col latz conjecture Comparing the Collatz function T(x) and the function f−1(x), if their domain is defined as the set of natural numbers, we find that they have the following relation: 1) The function f−1(x) is strictly monotonically decreasing, 2) When xis purely even, the function T(x) is only one case of the functions, is strictly monotonically decreasing; 3) When xis a pure or mixed odd number, the function T(x) is wavy, which is increasing, followed by one or more decreasing processes, that is, ”increase – decrease – inc rease”, or ”increase – decrease ···decrease – increase”. For example, Fig. 3 and Fig. 4 are the plots of the iterat ed sequence of Collatz functions with initial values of pure odd 255 = 28−1 = (11111111) 2and mixed odd number 97 = (1100001) 2, respectively.Figure 5.1: Point plot of a sequence of 47 iterations of the Co llatz function for pure odd 255. Figure 5.2: Point plot of a sequence of 118 iterations of the C ollatz function for mixed number 97. Due to the fact that an odd number can be either pure or mixed, whe nxis odd, the Collatz function 3x+1 can be parted into two parts. i.e., 3 x+1 = 2x+(x+1). (i) when xis a pure odd number, i.e., x= 2r−1, The binary string 2 x= 2r+1−2 is even, with just one 0 at the end, and the other part x+1 = 2ris pure even. As a result, 3 x+1 = 2x+(x+1) = 2r+1+2r−2 13
2402.00001v1.pdf
7159c37d-88cc-4bd1-bf0d-8b73f238d08a
is a mixed even number with only one 0 in the last bit and r−1 bits 1 in the second-to-last substring, corresponding3x+1 2= 2r+2r−1−1> x, it means function T(x) is increase. (ii) When xis a mixed odd number, it just has one 1 in the last binary substring, th e value3x+1 2r< x,(r >1) is smaller odd than x, it means function T(x) is decrease. The last binary substring of nu mber 3x+1 2r,(r >1) has two kinds, which : (a) There many 1 in the last binary substring. For example, 893 = (11 01111101) 2,3×893+1 23= 335 = (101001111) 2= 335, 335 <893. (b) Only 1 in the last binary substring. For example, 17 = (10001) 2,3×17+1 22= (1101) 2= 13, 13 <17.When the end of the binary substring is 1, using ×denotes either 1 or 0, we discuss the changes of the last substring three digits and four digits in the procedure of the Co llatz function sequences: ×001→ ××100→ ××1,×101→ ×000→ × ×0101→ ××0000→ ××,×1101→ ××1000→ ××1 3x+ 1 can adjust the structure of its binary substring, when the end of the binary substring is 1, the value of Collatz function T(x) =3x+1 2r,r >1 decrease, thus the number of binary string digits decrease at least 2. This process continues several times, and eventually you c an reach the minimum value of 1. The Collatz function shows that the Collatz conjecture holds.The Collatz function shows that the Collatz conjecture holds. Another Proof We give the statement ”period three implies chaos”[3]another interpretation: for any positive integer n, the sequence of the Collatz is an ultimately periodic sequence, its preperiod η(n) is a related-to n positive, and the least period {4,2,1},ρ(n) = 3. We use the inversion of ”period three implies chaos”[3]is the Collatz sequence of any initial value n. when the Collatz Conjecture is correct, then the reverse order o f sequence obtained for any natural initial n, the sequence of the Collatz function is an ultimately periodic of per iod 3,{1,4,2}. 6. Conclusion From previous proof of the conjecture, it becomes a theorem. Theorem For any natural number n, if it is even, divide by 2, if it is odd, multiply by 3, add 1, and so on, the result must finally reach 1.
2402.00001v1.pdf
90825ac4-1739-4c85-a0b2-1d7b32da7e39
Give another statement: for any positive integer n, the sequence of the Collatz function is an ultimately periodic sequence, its preperiod η(n) is a related-to n positive, and the least period {4,2,1},ρ(n) = 3. 7. References References [1] Jeffrey C. Lagarias. , The 3x+1 Problem and Its Generalizations. American Mathematical Monthly , Vol. 92, No. 1, 3-23(1985). [2] Jeffrey C. Lagarias. , The 3x+1 Problem: An Overview. arXiv: 2111.02635 . [3] Li, T., Yorke, J. A., Period three implies chaos. Am. Mat. Monthly , 82, 985–992 (1975). 14
2402.00001v1.pdf
2bd714c0-2e36-4021-bdfc-8ede20ea7ac3
[4] TERENCETAO, AlmostallorbitsoftheCollatzmapattainalmostbou ndedvalues. arXiv:1909.03562v5 , 2022,1,15. [5] https://www.sohu.com/a/611510165 107944. [6] Alf : Alf Kimms, The structure of the 3x+1 problem. Electronic Journal of Graph Theory and Applica- tions. 9(1)(2021)157–174. [7] Richard Kaufman, A reduced forward Collatz algorithm: How binar y strings change their length under 3x+1.arXiv:2301.07466 . [8] Patrick Chisan Hew, Collatz on the Dyadic rdtional in [0.5,1) with frac tals: how bit strings change their length under 3x+1. Experimental Mathematics , 2021, 30(4): 481-488. [9] G. Ganesan, Linear recurrences over a finite field with exactly tw o periods. Advances In Applied Math- ematics. 127(2021)102180.Advances In Applied Math- ematics. 127(2021)102180. [10] D. Quijada, Periods of linearly recurring sequences. Bachelor thesis, Washington and LeeUniversity , 2015. [11] Leonel Sternberg, Predictable trajectories of the reduced Collatz iteration and a possible pathway to the proof of the Collatz conjecture(Version 2). arXiv:2209.14230 . [12] F. Jishe, Proof the Collatz Conjecture in Binary Strings. DOI: 10.20944/preprints202304.0931.v2 . 15
2402.00001v1.pdf
821c1622-b84d-453c-98d5-7b751370fdb6
Sector Rotation by Factor Model and Fundamental Analysis Runjia Yang1and Beining Shi2 1University of California, Davis 2University of California, Davis Sept 2023 Abstract This study presents an analytical approach to sector rotation, leveraging both factor models and fundamental metrics. We initiate with a systematic classification of sectors, followed by an empirical investigation into their returns. Through factor analysis, the paper underscores the significance of momentum and short-term reversion in dictating sectoral shifts. A subsequent in-depth fundamental analysis evaluates metrics such as PE, PB, EV-to-EBITDA, Dividend Yield, among others. Our primary contribution lies in developing a predictive framework based on these fundamental indicators. The constructed models, post rigorous training, exhibit noteworthy predictive capabilities. The findings furnish a nuanced understanding of sector rotation strategies, with implications for asset management and portfolio construction in the financial domain. Keywords: US Industrial Sectors, Factor Analysis, Fundamental Analysis, Trading Strategy. 1 Introduction Sector is composed by a basket of stocks that representing companies in certain business class, which has unique features according to the business.Under certain conditions, such as economic cycles, sectors may behave accordingly due to the different characteristics of businesses. In this report, we are exploring how to capture returns by finding the hidden features behind different sectors and determining the leading sectors in some particular market conditions or social environments. Generally, this report covers a brief exploration of market and fundamental factors, explaining the meaning of each factors and how they are related to some sectors.Then we applied a neural network model to do a classification and prediction using the fundamental factors as inputs. At the end of the report, we also covers how sectors behaved under global events. 2 Sector Classification and Return Analysis There are many different ways to divide sectors. For the purpose of common acceptance and convenience for future data acquirement, we used the MSCI Global Industry Classification Standard, which includes 11 level one sectors, 24 level two industry groups, 69 level three industries, and 158 sub-industries. We use the 11 level one sectors as our main target. They are Energy, Materials, Industrials, Consumer Discretionary, Consumer Staples, Health Care, Financials, Information Technology, Communication Services, Utilities, and Real Estate.
2401.00001v1.pdf
8c566518-043e-447b-80c0-9aeec9ab5cf1
In order to track the performance of each sector, we use the S&P500 GICS Indices which are constructed exactly as the MSCI classification.Before working on any strategies further, we need to determine if there are actually possible profits. In our case, we need to check how big the differences between sectors’ returns are. For each observation time period, Define: Return Difference =(P top 3Sector Return -P bottom 3 Sector Return )/3 Based on a monthly frequency, we calculate the return difference and get the following plot. 1arXiv:2401.00001v1 [q-fin.PM] 18 Nov 2023
2401.00001v1.pdf
6283085c-5831-493a-a483-844de27830c7
Also, by calculation, the quarterly return difference has a mean of 0.1306, median of 0.1185, standard deviation of 0.0523. We can reach to a result that half of the quarterly return difference is more than 11.85%. It is easy to see that there does exist potential investment opportunity by capturing the return differences between sectors. 3 Factor Analysis 3.1 Momentum Factor Exploration Momentum premium was first recognized by UCLA scholars Narasimhan Jegadeesh and Sheridan Titman in 1993. The momentum premium is established on the observation that assets that have performed well in the past have the trend to persist good performance in the future. Though the momentum effect is considered to be a market anomaly, it has been recognized widely among many asset classes. We will explore the momentum effect based on the sector indices introduced above. 3.1.1 Factor Construction First of all, we need to construct the momentum factor.Typically, the momentum factor is constructed by the past 6 or 12 months cumulative return and excludes the most recent month’s return, considering that there are also short-term reversion effects based on the mean-reversion effects. However, without a clear idea of how the sector indices carry the momentum effect, we need to explore through time intervals to find the best possible momentum factor. Then we constructed 12 different momentum factors using the past 1 to 12 month’s return and excluding the most recent 0.1 portion trading days of each time period to avoid short-term reversion. For each of the factors with the period of n months MOM nM=X Pastn∗21 daysRd−X Past 0 .1∗n∗21 daysRd where Rdis the daily return. 3.1.2 Calculate Factor Returns For the 12 factors we got, we normalized them cross sections. Then we rank the factor exposures for each sector and take long positions of sectors with the highest two factor exposures, take short position of sectors with the lowest two factor exposures. Then we trade our portfolio under a monthly frequency.
2401.00001v1.pdf
824f800c-3f7f-4ae7-9076-a96fb1161927
Then we trade our portfolio under a monthly frequency. Here are the results from 2002 to 2022 February: 2
2401.00001v1.pdf
a63113ef-7181-4ecf-b70b-b022d1a3aa18
Factor Factor Return Sharpe Ratio MOM 1M −0.0297 −0.09 MOM 2M −0.0583 −0.19 MOM 3M 0.0082 0.02 MOM 4M −0.0245 −0.08 MOM 5M −0.0136 −0.04 MOM 6M 0.0195 0.06 MOM 7M 0.0535 0.15 MOM 8M 0.0721 0.21 MOM 9M 0.0413 0.11 MOM 10M −0.0470 −0.13 MOM 11M 0.0371 0.10 MOM 12M 0.0327 0.01 Since there are several market crashes where the momentum factor led to negative returns, we also take a look at the most recent five years from 2017 to 2022 February: Factor Factor Return Sharpe Ratio MOM 1M 0.0213 0.06 MOM 2M −0.
2401.00001v1.pdf
49c65829-44a7-47a8-8fd5-8a6e50e1d3aa
0213 0.06 MOM 2M −0.0494 −0.14 MOM 3M 0.1154 0.29 MOM 4M −0.1578 0.41 MOM 5M −0.1788 0.47 MOM 6M 0.1163 0.35 MOM 7M 0.2119 0.62 MOM 8M 0.1869 0.56 MOM 9M 0.1583 0.43 MOM 10M 0.0504 0.12 MOM 11M 0.1547 0.40 MOM 12M 0.1289 0.33 From this table, we can tell that by using the MOM 7M factor, we can reach a maximum annual return rate of 21.19% and a maximum Sharpe ratio of 0.62. It is also interesting that we find the momentum factor with a short time period, for example, MOM 1M and MOM 2M, have a very small even negative return rate.However, it exactly conforms to the short term reversion effect that the typical momentum factor would exclude. 3.2 Short Term Reversion Factor Exploration Short term reversion factor follows the simple principle that asset’s price will have the trend to stay on an average level. Since we can see from the previous results of the momentum factor that there does exist short term reversion effect, we can try different reversion factors and find out what would be the best short term reversion observation period. 3.2.1 Factor Construction Similarly, we can define several reversion factors with different time periods. And we take the negative number of the past n days cumulative return as the factor exposures. REV nD=−X PastndaysRd For the purpose of exploring the optimal time period, we take 5-day time interval and create 12 reversion factors from 5 trade days to 55 trade days. 3
2401.00001v1.pdf
4323adca-0b8d-4b2e-aed4-5f7d2dc9049b
3.2.2 Calculate Factor Returns By using the same method, we compute the rank of each sector’s factor exposure, and long the top two sectors, short the last two sectors on a monthly observation frequency.
2401.00001v1.pdf
6e4a5a9c-6594-474b-a278-876af86493db
Between 2002 and 2022 February, the results are: Factor Factor Return Sharpe Ratio Rev5D −0.0059 −0.0597 Rev10D 0.0294 0.3320 Rev15D 0.0127 0.1338 Rev20D 0.0072 0.0715 Rev25D 0.0690 0.7768 Rev30D 0.0877 0.8735 Rev35D 0.0135 0.1288 Rev40D −0.0314 −0.3422 Rev45D −0.0694 −0.8417 Rev50D −0.0183 −0.5919 Rev55D −0.0517 −0.1863 From this table, we can tell that for the time between 2002 to recent time, the short term reversion effect is optimal for taking the past 30 days cumulative return. It has an optimal annual return rate of 8.77% on average and leads to a sharp ratio of 0.8735.4 Fundamental Analysis Fundamental Analysis are always a good aspect to look at for investing. We collected quarterly data for all 11 indices from Bloomberg, including their P/E ratio, EV/EBIT, Profit Margin, etc. Our fundamental analysis would start from discovering features for each of the fundamental ratio,then we are trying to predict the sector performance by constructing using some of the features we found. 4.1 PE Ratio The P/E is one of the most widely used tools to determine a stock’s relative valuation. The purpose of analyzing the ratio is to show whether certain sector is worth to be invested because P/E ratio can reflect the investment risk in this sector. The figure below shows distribution of P/E ratios in different sectors. 4
2401.00001v1.pdf
2e723a4e-a10e-487c-920a-42aa9e1bc7b1
By comparing cross-sectional data, it is obvious that P/E of Real Estate Sector and Consumer Discretionary Sector are higher than others. The reason is that earning growth in the future is expected to grow fast in the two sectors or these sectors have some special advantages that guarantee long-term profitability with low risk. On the other hand, Financials Sector’s ratio is relatively low compared with other sectors, which may result from its high volatility so investors are reluctant to pay for it. We also notice that the ratio in Energy Sector surged in 2015, which is related to some changes in the sector. The end of the oil age and emergence of alternative energy have reduced the earnings of the original sector. As a result, its relative price becomes higher than before. The change in EV/EBIT and EV/EBITDA is also due to this reason. 4.2 PB Ratio The P/B ratio provides a valuable reality check for investors who are seeking growth at a reasonable price. For those sectors with more assets, their book value and market value are close, so P/B ratio is more useful when we analyze Real Estate sector and Financials sector. The figure below shows distribution of P/B ratio in different sectors.The figure below shows distribution of P/B ratio in different sectors. As the picture shows, Consumer Discretionary sector and IT sector have higher P/B ratio while Financials sector and Energy sector have relatively low ratios. What’s more, Real Estate sector with high P/E ratio has relatively lower P/B ratio. 4.3 EV/Sales EV/Sales can help investors better understand cost relative to unit sales and whether the company is overvalued or undervalued. If EV/Sales is relatively high, the company or sector is less attractive to investors. The figure below shows distribution of EV/Sales in different sectors. 5
2401.00001v1.pdf
453bcea6-29c1-486e-9437-086ce11bfc92
The result shows that Real Estate sector’s ratio is higher than others’, which means that index in this sector is overvalued. On the other hand, ratio in Energy sector is low, which can attract more investors. 4.4 EV/EBIT &EV/EBITDA EV/EBIT and EV/EBITDA are independent of the capital structure of the company, whereas multiples like P/E ratio are impacted by financing decisions. Because of this reason, the two are the most commonly relied-upon multiples in relative valuation. However, one obvious distinction is that EV/EBIT considers depreciation and amortization. In some capital-intensive industries which have significant differences in D&A, EV/EBIT may make it a more accurate measure of value. But in our analysis, there is no such difference in the comparison of these two ratios under different sectors. 6
2401.00001v1.pdf
130e7581-3b78-466d-ad29-778e011b7f4d
The results can show that Real Estate sector has a higher ratio. The three ratio EV/Sales, EV/EBIT and EV/EBITDA can give a consensus conclusion that Real Estate sector is overvalued in the market. 4.5 Dividend Yield Dividend Yield is used to measure the amount of cash flow investors are getting back for each dollar. It is essentially the return on investment for a stock without any capital gains. The figure below shows distribution of Dividend yield in different sectors. The ratio in Communication Services sector is higher before 2018 while Energy sector’s ratio is higher after that time. This is because communication services sector took place a reorganization of S&P500 index in 2018. It now includes at least eighteen companies from IT and Consumer Discretionary sectors. Due to this reshuffling, dividend yield of this sector is impacted. 7
2401.00001v1.pdf
7d729a74-1289-4dce-8eb1-929bd11fa3b5
4.6 Gross Margin Gross margin equals net sales less the cost of goods sold (COGS). Net sales are equivalent to the total revenue from sales, and COGS is the direct cost associated with producing goods. By calculating gross margin, we could measure one company’s retain revenue after subtracting the production cost. The higher the gross margin, the more capital a company retains, which it can then use to pay other costs or satisfy debt obligations. Generally, companies with good gross margins would have a relatively sustainable competitive advantage. By analyzing gross margin data across sectors, we may observe some sectors that have more stable development in the long run. For our 11 sectors’ gross margin data, the line chart above shows significant differences between the sectors. Overall, each industry index is relatively flat on its own, and have gaps between each others. Utilities, Communication Services and Information Technology(IT) have been among the top spears for last 10 years, occupying the first, second and third positions respectively, all above 40%.On the contrary, the energy sector has been an under-performer for the past decade, ranking at the bottom, with gross margins consistently below 20%. Gross margins in the rest industries are concentrated in the 25%-35% range and have not fluctuate much. At the same time, by observing the comparison of fluctuations between industries, it is not difficult to see that the gross margin fluctuations of the energy industry and the utilities industry maybe relatively high in the past decade, and their peaks correspond to each other. During 2016, the utilities industry grew significantly, while energy declined comparatively. The trend was even more pronounced in 2020, with utilities reaching its highest level and the energy industry fell to the bottom. Generally, the gross margin feature maybe a significant indicator for Utilities, Communication Services and IT sectors. And our conjecture about the correlation between utilities and energy sectors will need further observation and verification. 4.7 Operating Margin &Profit Margin: Operating margin equals operating income divided by revenue, it is a profitability ratio measuring revenue after covering operating and non-operating expenses of a business. And profit margin measures the profit ratio after paying for variable costs of production.
2401.00001v1.pdf
b7cb1ffe-6050-41d2-8127-0fe520c836d6
And profit margin measures the profit ratio after paying for variable costs of production. It is calculated by the formula: Profit Margin =(Total Revenue - Total Expenses ) Total Revenue 8
2401.00001v1.pdf
a8a01090-016b-4880-b5c7-f96ddf0d025b
Both operating margin and profit margin are used to gauge the degree of the company’s activity makes money. Higher ratios are generally better, illustrating the company is efficient in its operations and is good at turning sales into profits. In our analysis, there is not a very big difference in the comparison of these two ratios under different sectors, which is determined by their definition. For these two ratios, Real Estate sector, IT sector and Financial sector have the top three high ratios.And Energy sector has the relatively lowest ratio. Also, both operating margin and profit margin for almost all sectors have similar trends in the last decade curves. This is attributed to the definition difference between the two features, and that’s why the operating margin was slightly higher than the profit margin. Another thing that is worth to mentioning is that for Energy Sector, not just operating margin and profit margin, but also the gross margin, it always has the relatively lowest ratios and similar curve fluctuation, with sharp declines in 2016 and 2020. The two time nodes may consistent with some big revolution in the energy industry, which we will analyze later. 9
2401.00001v1.pdf
5fcf5f13-90fa-4fa2-b2a8-c4a942515a7c
4.8 Return on Asset &Return on Equity Return on equity (ROE) and return on assets (ROA) are two of the most important measures for evaluating how effectively a company’s management team is doing its job of managing the capital entrusted to it. ROE equals to generally net income divided by equity, while Return on Assets (ROA) is net income divided by average assets. So the primary differentiator between ROE and ROA is financial leverage or debt. ROE measures profitability and ROA is an efficiency measure of how well a company is using its assets. Investors may prefer to observe ROE, since equity represents the owner’s interest in the business. Compared to other sources of fund, equity capital tends to be the most expensive source of funding and carries the largest risk premium of all financing options. Therefore, in our analysis, ROE may be a better feature that it could reflect the trend of market investment. As shown in the picture, IT sector has the highest ROA, the Consumer Staples sector and Consumer Discretionary sector also have a relatively higher ratio. In contrast, Financial sector has a lower ROA.In contrast, Financial sector has a lower ROA. The past ten years, or even twenty years, has been an era of rapid development of information technology. And compared with traditional industry and commerce, information technology is more flexible in the time and form of investment assets, that’s the reason why IT will have the highest ratio. Also for the the Consumer Staples sector and Consumer Discretionary sector,they are all industries with fast innovation and short production cycle. Generally, these three will have constantly higher ratio for the long run. Therefore, for these three industries, if the ROA indicator fluctuates significantly, it may have an impact on the investment trend. 10
2401.00001v1.pdf
e4a20170-3fd3-4871-a44f-284857c208ff
For ROE ratio, similarly, IT, Consumer Staples stay high, and Consumer Discretionary sectors is also at a slightly higher level, except that the IT sector lost its prominence in ROA ratio. By comparing cross- sectional data, the Consumer Discretionary Sector and Industrials Sector have similar patterns in the last decade for both ROA and ROE ratios. They both have a low peak in 2020. It is conceivable that this is affected by the general environment of the epidemic. And as we mentioned before, the ROE and ROA curves of the energy sector still have a similar pattern, falling sharply in 2016 and 2020. In 2016, it was affected by changes in energy policy since 2015, reducing oil production while encouraging the development of clean and new energy. For 2020, we attribute this decline to the outbreak of the COVID-19 pandemic. 5 Prediction by Fundamental Factors 5.1 Factor and Future Return Having these fundamental data, next step is to find out what quantitative relationships they have to futures sector returns.For fundamental factors, they are usually exposed in the company report with annual, semi- annual, or quarterly frequency. Our fundamental factors for each sector are reported quarterly, leading to a problem that the sample size for each individual sector is very small. To have a better performance of the prediction model, we need to combine all the sectors together and make a uniformed and comparable large sample. We neutralized each factor cross-sectional for the factor to have a mean of 0 and standard deviation of 1. If Xi,tdenotes one specific factor exposure for i-th sector at time t, in this case would be at t-th quarter, then for each individual twe have the neutralized exposure to be: Xi,t-Neutral =Xi,t−Mean( Xi,t,ifrom 1 to 11) Standard Deviation( Xi,t,ifrom 1 to 11) Then we used the next quarter’s cross-sectional normalized return as the corresponding return. First, we want to have a general view of the relations. The scatter plots between neutralized factors and future returns are as following: 11
2401.00001v1.pdf
ac646c79-944f-4c68-8356-4e6cba7844f0
12
2401.00001v1.pdf
e8289361-b086-4638-ae8b-051c8d16bcc3
From the scatter plots, the relations between all factors and their future returns cannot be well interpreted by simple linear models. However, it is very common in the financial field that the sample will have a very low signal-noise ratio. 5.2 Model Construction and Training As we observed before, the relations between each factor and its future return cannot be interpreted very well by linear models. Also, we have no idea what model would exactly best fit the data. Therefore, converting prediction of future returns to a classification problem and fitting the training sample with a neural network model which has comparably good performance with non-linear relations would be a great start point.x1 x2 x3 x4 x5 x6 x7 x8 x9 x10Input layer h(1) 1 h(1) 2 h(1) 3 h(1) 4 h(1) 5Hidden layer 1 h(2) 1 h(2) 2 h(2) 3 h(2) 4 h(2) 5Hidden layer 2 ˆy1 ˆy2Output layer Neural network takes a vector as the input, and goes to each of the neuron in the first hidden layer and gains new activation vectors which act as the input for next hidden layer. After the last hidden layer, neural network model would pass out the probability for each of the prediction class and we choose the one with the highest probability as the prediction. This process is called front propagation. After comparing the prediction to the actual results, we adjust the weights of the nodes by using back propagation for each 13
2401.00001v1.pdf
83ee4c37-6444-4d8b-b88c-aef75b1fe961
training pair in the training samples. Also, we use the rectified linear unit function as the activation function for hidden layers and sigmoid function as the activation function for final output. Since we only have a sample of size 200, choosing quasi-Newton methods as the solver has better performance for small sample training. Then we need to construct the training, validation, and test sets. Since the fundamental factors are already neutralized (normalized) within each sector, we divide the sample data to 60%, 20%, 20% by convention. Without shuffling, we will have the historical data divided where test set contains the most recent data. For the corresponding output value, we assign 1 to samples with positive future return and 0 with negative returns. The complexity of neural network directly related to the number and sizes of hidden layers. For the purpose of avoiding overfitting or under-fitting, we need to find proper hyper parameters for neural network model. We start from a simple model with two layers. Let Ndenote the number of nodes in each hidden layer, alpha is the hyper parameter for L2 regularization penalty function. With larger N, the model is more complex.With larger N, the model is more complex. If alpha increases, the penalty for large weights increases, which makes the model tend to be more simple. Considering our sample size is small, intuitively we need to focus more on the overfitting problem. For a range of alpha and N, we train the model using the training set data, and get the score for prediction on validation set. The score represents the probability of making a right prediction. Here are the results: N\alpha 3 2.5 2 1.5 1 0.5 0.25 0.1 0.01 0.001 5 0.49 0.45 0.49 0.56 0.62 0.58 0.62 0.58 0.56 0.56 6 0.51 0.55 0.45 0.49 0.51 0.49 0.47 0.56 0.56 0.56 7 0.55 0.53 0.56 0.51 0.47 0.51 0.
2401.00001v1.pdf
8922149c-0b22-4044-9959-34d29d2a5b15
53 0.56 0.51 0.47 0.51 0.58 0.49 0.53 0.57 8 0.51 0.47 0.55 0.51 0.51 0.64 0.6 0.6 0.59 0.6 9 0.53 0.49 0.47 0.53 0.56 0.56 0.55 0.6 0.53 0.6 10 0.55 0.53 0.53 0.53 0.51 0.51 0.53 0.6 0.6 0.56 11 0.53 0.58 0.51 0.51 0.47 0.65 0.58 0.55 0.56 0.51 12 0.55 0.55 0.56 0.51 0.49 0.51 0.54 0.53 0.53 0.53 13 0.53 0.47 0.53 0.53 13 0.53 0.47 0.55 0.49 0.56 0.6 0.55 0.58 0.6 0.56 14 0.49 0.51 0.56 0.53 0.55 0.53 0.49 0.51 0.6 0.53 15 0.47 0.51 0.51 0.51 0.45 0.49 0.56 0.6 0.56 0.55 To better understand how the hyperparameters influence model performance, we visualize the data by using Nand alpha as the bottom coordinates, and use the corresponding probability as the height. From the figure, we can tell that the model have several local optimal pairs. And the scores at the optimal points with relative large N values are also combined with small alpha values. For example, the combination of 14 nodes and alpha equals 0.01 has a local optimal score of 0.6.Since we are training with a small sample, using such a complex model with a high score is highly likely overfitting. Therefore, we start from the simple model by looking at models with 5 nodes model and check how the score varies with alpha. For model with 5 nodes, we see there are two local peaks with alpha equal to 1 and 0.25, then we pick the middle value 0.5 as the value of alpha considering the trade-off between variance and bias. 14
2401.00001v1.pdf
6c373d7f-1b35-4bb6-8745-073073bb8391
5.3 Model Performance Constructed and trained the model, next we would test the model by feeding a new data set to the model. On the test set, the score of the model is 0.64, which means the model predicts 64% of the results correctly. More detailed results are showed in the following table: Positive Return Negative Return Actual Sample 27 28 Prediction 37 18 Correct Prediction 22 13 Winning Rate 0.59 0.72 On the test set, we have a 0.59 winning rates on the positive predictions and 0.72 on the negative predictions, which gives an overall winning rate of 0.64. 5.4 Trade with Model Prediction By using the predictions from the trained model, we used the data from validation set to get trade signals. Instead of having signals of 1 or 0 as the model’s output, we choose the probability of the prediction output being 1, which is given by the activation sigmoid function. Then we will have a time series of the probability for each sector, and rank the probability from highest to lowest where the highest probability will have a rank 1.For each cross-sectional ranking, we equally-weighted long sectors with rank 1 to 3 and short sectors with rank 9 to 11 to construct a dollar-neutral portfolio. On the test set, which is from September in 2020 to September in 2021, we have a Sharpe ratio of 2.21. The cumulative return plot is following: 5.5 Other Considerations There are still issues that need to be considered carefully in the future. First is the factor neutralization. In previous model, we neutralized the factor exposure cross-sectionally, where the exposures reflect the relative level of factor exposure for one sector compared to other sectors at a given time. However, different sectors may have inner trends of higher exposures than others for some factors, especially for fundamental factor. What’s more, we only have quarterly fundamental data available from 2017 and it is hard to implement time series normalization for each sector. Therefore, how to modify the factor exposures to make them comparable is a difficult problem.
2401.00001v1.pdf
c9082451-16c6-4467-a0d0-0ef642bb5255
Therefore, how to modify the factor exposures to make them comparable is a difficult problem. Secondly, as the sample size is small, the model might not be applicable on a wider range of time since we only trained and tested on the most recent five years. One possible way to improve this model is to use daily factors such as volume, close price as input, and convert fundamental factors to daily frequency by the corresponding quarter. Then we would have a sample size of approximately 1250 for each sector and over 13000 samples for training. However, the model might depends more on the daily factors rather than fundamental factors since their exposures would be the same value for each quarter. 15
2401.00001v1.pdf
15cad01d-d4da-4852-a9f7-97ffc3340f54
6 References 1.Returns to Buying Winners and Selling Losers: Implications for Stock Market Efficiency Narasimhan Jegadeesh; Sheridan Titman The Journal of Finance, Vol. 48, No. 1. (Mar., 1993), pp. 65-91. 2.The Global Industry Classification Standard, MSCI (1999) 16
2401.00001v1.pdf
d1354cc6-cecd-4765-8eae-f0ce6f86f6c9
PREPRINT SUBMITTED TO IET 1 Raptor Encoding for Low-Latency Concurrent Multi-PDU Session Transmission with Security Consideration in B5G Edge Network Zhongfu Guo, Xinsheng Ji, Wei You, Mingyan Xu, Yu Zhao, Zhimo Cheng, Deqiang Zhou Abstract —In B5G edge networks, end-to-end low-latency and high-reliability transmissions between edge computing nodes and terminal devices are essential. This paper investigates the queue- aware coding scheduling transmission of randomly arriving data packets, taking into account potential eavesdroppers in edge networks. To address these concerns, we introduce SCLER, a Protocol Data Units (PDU) Raptor-encoded multi-path transmis- sion method that overcomes the challenges of a larger attack surface in Concurrent Multipath Transfer (CMT), excessive delay due to asymmetric delay&bandwidth, and lack of interaction among PDU session bearers. We propose a secure and reliable transmission scheme based on Raptor encoding and distribution that incorporates a queue length-aware encoding strategy.This strategy is modeled using Constrained Markov Decision Process (CMDP), and we solve the constraint optimization problem of op- timal decision-making based on a threshold strategy. Numerical results indicate that SCLER effectively reduces data leakage risks while achieving the optimal balance between delay and reliability, thereby ensuring data security. Importantly, the proposed system is compatible with current mobile networks and demonstrates practical applicability. Index Terms —B5G Core Network; Reliable Communication; Concurrent Multipath Transfer; Raptor Codes; Security. I. I NTRODUCTION In the B5G era [1], mobile communication services such as smart cities [2] and telemedicine have increasing demands in terms of low-latency and high-reliability transmission [3], [4]. B5G edge networks [5], powered by B5G mobile networks [6] and edge computing [7], have been proposed as a promising solution. Edge computing nodes (DN) provide customized services for users [8], while the B5G mobile networks offer reliable transmission.Due to the highly customized char- acteristics of edge service flows, such as medical, smart home, and unmanned factories, data leakage can have serious consequences [9]. Therefore, secure data transmission is as crucial as low-latency and high-reliability for edge networks [10]. Manuscript created October, 2022; Project supported by the National Key Research and Development Program of China (Nos. 2022YFB2902204 and 2020YFB1806607)and the National Natural Science Foundation of China (No. 61941114). Zhongfu Guo, Wei You, Mingyan Xu, Yu Zhao, Zhimo Cheng, Deqiang Zhou are with the Department of next-generation mobile communication and cyber space security, Information Engineering University, Zhengzhou 450001, China (e-mail: ndscgzf@163.com). Xinsheng Ji is with the National Digital Switching System Engineering and Technological Research and Development Center, Zhengzhou 450000,China and also with the Purple Mountain Laboratories: Networking, Communica- tions and security, Nanjing 211111, China.
2402.00002v1.pdf
ca4ec1be-49f1-4083-b194-70106ffcc25c
(-)4(-+JMK 4KZ]UXQ ;+;YKX +RKSKTZY 3+) ͣ*4ͤ*O\KXYOZ_ /TZKXLGIK =O,O =O,O 3OIXU9OZK '3, '3, '3, '3, 4/=, 4/=, 4/=, 2UIGR*42UIGR*4 2UIGR*42UIGR*4M4( M4( 4+,3+6 4+,3+6 4+,3+6 6) 6) 6NUTK 6NUTK 3'' 3'' /)< ;6,E ;6,E ;6,E ;6,E ;6,E ;6,E 93, 93, 93, 93, Fig. 1: Enhanced Core Network for end-to-end redundant user plane paths using Diversity Interface PDU sessions.To address these pressing demand [11], [12], researchers have conducted extensive studies on the physical layer [13] and MAC-layer [14], with a focus on point-to-point security through methods such as pilot-assisted techniques, physical layer encoding, and interface diversity [15]–[17]. These efforts aim to enhance the transmission performance from UE to gNB and require infrastructure renovation accordingly. The Third Generation Partnership Project (3GPP) has pro- posed the Enhanced Core Network (ECN) in [18, clause 5.33]. As illustrated in Fig.1, ECN carries the end-to-end service flow between UE and DN with multiple PDU sessions, which improves reliability through redundant transmission. A multi- path transmission protocol stack is deployed on both the client (UE) and server (DN) sides. Additionally, the high- layer (above the IP layer [18]) splits and aggregates the service flows. However, the implementation of Concurrent Multipath Transfer (CMT) over erasure channels in Diversity Interface Edge Network (DIEN) faces several technical challenges.For example, CMT has a larger attack surface than a single session transmission [10], and asymmetric latency and bandwidth can lead to excessive delay [19]–[21], moreover, it is hard for the PDU session bearer to interact during the transmission phase [22]. For instance, Wang et al. [23] have proposed a comprehensive method that considers both reliability and security. Security-based methods such as network coding [24], Cross-locking [25], etc. based on link interaction are not applicable. Addressing these challenges is essential for CMT in DIEN. The Fountain code [26] is suitable for optimizing CMT transmission [27], due to its characteristic of being able to re- cover the entire source block with any set of Coded Packet( Pc)arXiv:2402.00002v1 [cs.NI] 4 Oct 2023
2402.00002v1.pdf
92192363-71f4-40d9-a847-f3a7385b5a0c
PREPRINT SUBMITTED TO IET 2 with cardinality equal to or slightly more than the number of Source Packet( Ps). Cui et al. [28] studied a Raptor-based [29] CMT protocol, which improves scheduling flexibility and sim- plifies the signaling overhead of CMT management. Packet- level encoding can improve robustness; longer block lengths are typically used to ensure the reliability of the Fountain Code [30]. From a security perspective, Fountain Pcis a non- systematic code obtained by randomly selecting and XOR-ing Ps, making it challenging for eavesdroppers1to obtain private information from leaked Pc[31], [32]. Therefore, the number ofPctransmissions on different sessions should be selected carefully to ensure both reliability and security are considered comprehensively. Careful selection of the appropriate code length is crucial to achieving reliable and low-latency [33]. He et al. [27] added the RCDC sublayer of Raptor code to the MAC layer to optimize downlink transmission delay of dual base stations. Kwon et al.Kwon et al. [34] added the MPMTP sublayer to the TCP layer to adjust Raptor encoding parameters to alleviate queue head congestion and transmission quality degradation. Nielsen et al.[35] formulated an optimization problem to find payload allocation weights that maximize reliability at specific target latency values. These studies focus on the air interface of the mobile network, which requires upgrading the network infras- tructure. Our research goal is to add security considerations and provide end-to-end low-latency reliable transmission for DIEN at the PDU session layer while considering the queuing delay caused by the random arrival of data packets, which is closer to real-world application scenarios. This paper proposes SCLER2, a transmission method for Raptor coded packets Pcat the PDU session layer. The goal is to provide reliable and low-latency transmission while taking into account data security. To address queuing delays that may result from the accumulation of randomly arriving data packets, SCLER incorporates a queue-aware variable- length encoder.Considering longer block lengths of Pccan provide reliability and encoding efficiency, they also result in increased transmission and queuing delays. Therefore, SCLER trades off reliability and delay through variable block-length encoding. To ensure data security, this paper considers pos- sible randomly distributed non-cooperative passive attackers. SCLER distributes Pcto multiple PDU sessions based on their weight, which does not exceed the safety threshold, the number of Pcsent is determined by a measuring function to ensure reliable data transmission while minimizing informa- tion leakage. We study the strategy of Raptor CMT for DIEN based on Constrained Markov Decision Process( CMDP ) and obtain a security, delay-optimized, reliable transmission by Linear Programming . The contributions of this paper are: •Proposing SCLER, the first raptor-based security trans- mission scheme based on ENC implementation. SCLER considers the random distribution of any number of non- cooperative passive attackers, and makes it impossible for a single session to steal valid information.1Eavesdroppers generally refer to anyone who can attempt data theft at any layer, from the physical layer to the application layer. 2SCLER is short for Secure Low-Latency Concurrent transmission with Raptor encoding in Edge network, pronounced as ”skler”.TABLE I: Basic Notations. Symbol Definition Ps,Pc the source packets, coded packets P,E the probability, expectation value T the time span of timeslot Ω(x) the degree distribution g the block-length of codes γj,γj υ the scheduling weight for jth-PDU session, the weight vector γj υ= [γ1, ..., γ j]T g[t],γj υ[t] the encoding action within t-th timeslot dthThe constraints of delay.B,Γj υ the upper bounds of g[t],parent set of γj υ[t] Z the transmitting side queue buffer size ϕ the size of each data packet εj υ= [ε1, ..., ε j]the erasure probability of jsessions Λ[t],λ= the number Psarrivals within t-th timeslot [λ0, λ1, ..., λ N],the probability distribution of Λ[t] =n NL the number of PDU sessions established in DIEN •A queue-aware variable block length encoding scheme is designed, which models the optimal CMT strategies as CMDP. Feature analysis is used to simplify the LP problem into a threshold decision problem, allowing for the optimal delay-reliability trade-off to be obtained. •The entire system is designed at the transport layer, en- suring compatibility with current mobile networks. This design improves service experience without requiring modifications to the core network infrastructure. The remaining sections of this paper are organized as follows. Section II provides a brief review of related research.
2402.00002v1.pdf
25a4d7c9-2724-4896-93fe-c5b181ae7886
Section II provides a brief review of related research. Section III presents the design of a diversity interface PDU session establishment procedure for B5G networks, which serves as the B5G SCLER preliminary work. Section IV describes the system model. In Section V , we demonstrate the delay-reliability performance of SCLER based on the CMDP and analyze the optimal delay-reliability trade-off. Section VI presents numerical results. Finally, we conclude the paper and propose future research directions in Section VII. The important variables used throughout this paper are summarized in Table I. II. R ELATED WORK The mobile network is a widely accessible open network space that facilitates connection capabilities through multiple interface access. It provides low-latency and high-reliability transmission for edge computing nodes and terminals, which is a fundamental service capability of the edge network. As users subscribe to edge computing, communication security is a significant performance indicator that raises concerns. This section presents the essential performance indicators for edge networks and reviews relevant studies before discussing our insights based on related research.To this end, SCLER considers the following critical aspects: Latency (L), which refers to the time from the arrival of the application layer Psto the completion of decoding, including the queuing delay Dqof buffer queue accumulation at the sending end, the data encoding delay Dec, the data transmission delay Dt, and the data decoding delay Ddc. We
2402.00002v1.pdf
e18c6f74-be56-4325-aa3f-c2971bf413a5
PREPRINT SUBMITTED TO IET 3 8GTJUS'XXO\GRY q[n]1 2 3 4 5 gC1 C2 C3 C4 CA CB Cb Cc Ca  ;6,E ;6,E ;6,E ;6,E ;6,E ;6,E ;6,E ;6,E ;6,E 6*; 9KYYOUT 6*; 9KYYOUT 6*; 9KYYOUT 6*; 9KYYOUT 'VVROIGZOUT2G_KX 9ZXKGS C1 C2 C3 C4 CA CB Ca Cb Cc C1 CA Ca  CN 12 g *KIUJOTM *KIUJOTMLGORKJ Timeslot ZATC Z A T C ZATC :Block Length <GXOGHRK (RUIQRKTMZN )UJKX 7[K[KG]GXK 1 [ ] [ ,
2402.00002v1.pdf
bab56362-4416-4bb8-8673-ea026856d9f0
] j T jtug g g = C1 C2 C3 C4 C1 C1 C2 C2 C3 C3 C4 C4 PDU3 NRXWRI1 PDU3 NRXWRI1PDU2 NRXWRI1 PDU2 NRXWRI1PDU1 NRXWRI1 PDU1 NRXWRI1 Ca Cb Cc Ca Ca Cb Cb Cc Cc C1 C2 C1 C1 C2 C2 { 1, }, j s j J g g " Î £ 9KI[XOZ_)UTYOJKXGZOUT 9INKJ[RKX Single Session Eavesdropper Single Session Malicious NF  Ca Cb Cc  *KIUJOTMLGORKJ  C1 C2 C3 C4 Legitimate Receiver Source package Coded package C1 CA Ca Legitimate Transmitter (DN) Fig.2: System Diagram. consider Ddc as the sum of transmission and decoding time3. Therefore, we have L=Dq+Ddc. Reliability (r). The system should be robust against PDU erasure channel, which we regard as the jth PDU session with a deletion probability of εj υ. We encode g Ps (source data packets), generate and transmit ¯g Pc (encoded data packets), and regard the peer’s completion of decoding without requesting to continue sending as reliable transmission. We can achieve high reliability transmission by adjusting ¯g. Security , which measures the robustness of edge networks against passive attackers (such as eavesdroppers or network function4data thieves). We aim to ensure that data leaked by the DIEN in the presence of passive attackers cannot be deciphered into usable information. Even if there are NAat- tackers who cooperate with each other and have eroded LPDU sessions, the total amount of intercepted PcisU=PL j=1Aj5. Based on U, attackers can decode the amount of Ps, which isS.Based on U, attackers can decode the amount of Ps, which isS. We set the threshold γsso that S/g≤γs. That is, maintaining security against passive attackers of degree L6. A smaller γsvalue indicates a higher security system. There is a wealth of research on methods that address one or more of the goals outlined above. Encryption approaches like those presented in [37] and [38] necessitate the agreement of authentication and key distribution mechanisms in advance, which may not be appropriate for edge network users’ dy- namic mobile environment. Dynamic routing strategies, like the secure multi-path transmission algorithm based on fountain codes proposed in [39], have been shown to improve security and reduce communication delays. However, it may result in some transmission capacity being wasted when predicting the 3We assume that the calculation process of encoding and decoding intro- duces no time overhead. 4The data plane network function in the edge network mainly refers to the UPF(User Plane Function [36]), as shown in Fig.1 & Fig.2.5The information carried by different nodes of a single PDU session is the same 6We are focusing on γs, which is directly correlated to the amount of leaked information. For the sake of simplification, we are only considering non-cooperative attackers, with L set to 1.eavesdropper’s location. In terms of secure transmission meth- ods based on encoding, Yi et al. [32] has conducted related research on the physical layer, Noura et al. [40] has proposed a secure transmission method based on network coding, and Huang et al. [25] has proposed a secure transmission method based on cross-layer multi-path joint coding. The benefits of CMT in preventing data leakage have been demonstrated by [41]. Singh et al. [42] proved that the transport layer is the most suitable location for providing an end-to-end connection of an application over disjoint paths. Therefore, we consider designing CMT at the transport layer. Fountain codes [26] are commonly used in CMT to address issues such as asymmetric transmission delay and signaling overhead reduction [28].These codes have a variable rate between 0 and 1, and their coding method is characterized by randomness [19], [20]. Fountain codes divide the data into multiple packets {Ps}, and then generate a new coded packet (Pc) by performing random selection and XOR operations on each packet. The generated Pcpackets are independent and equally significant, and the decoding rate is determined by the number of received symbols, regardless of the symbol types. Due to the randomness, non-systematic nature and lack of a fixed rate of fountain codes, each encoded packet contains a part of the original data, but it is inadequate to restore the original data. Secure coding transmission mechanisms can be developed based on fountain codes [32]. The design of CMT at the transport layer is a suitable approach for achieving the goals of the paper, but several issues need to be considered. Firstly, data split transmission can compromise security, so a comprehensive approach that considers both reliability and security is necessary [10]. Sec- ondly, the delay caused by randomly arriving data packets and asymmetric multiplex transmission needs to be minimized [19], [20].Finally, the inability of PDU session bearers to interact during transmission phase limits the applicability of dynamic routing and network coding technologies [24], [43]. Therefore, the proposed approach should be able to
2402.00002v1.pdf
90b7807a-3e70-4a08-b0e0-ab1ee2e3b4a4
PREPRINT SUBMITTED TO IET 4 NG-RAN NG-RAN N3IWF N3IWF UE UE 1.PDU Session Estb Req MEN AMF MEN AMF UPF-1UPF-1MEN SMF MEN SMF RCMEN S&D RCMEN S&D UPF-AUPF-A DN DN UPF-2UPF-2 Ue is registered on both 3GPP and nono-3GPP accesses in 6G-RCMEN 2.PDU Session Create SMContext 6.a Radio resource Req 6.b Radio resource Req 7.a Setup Radio 7.b Setup Radio 8.a Radio Resource Resp 8.b Radio Resource Resp 9.
2402.00002v1.pdf
9178b105-5aa2-4b30-adef-d420e241d8fa
PDU Session Update SMContext Req 4.a Estb Session1 child1 10.a Update UPF1 10.b Update UPF2 11.a User Data Session1 child1 11.b User Data Session1.2 child2 ͓Ͷ Ϳ ΀΁ Ḥ ͢ ͽ͹ Ͷ ͻ͸ ͓Ͷ Ϳ ΀΁ Ḥ ͢ ͽ͹ Ͷ ͻ͸ ͓Ͷ Ϳ ΀΁ Ḥ ͑ ͼ΄ ͻ͹ Ͷ ͻ͸ ͓Ͷ Ϳ ΀΁ Ḥ ͑ ͼ΄ ͻ͹ Ͷ ͻ͸ 3. Get Sub Strategy&Data ͢ ΀ͲͿ Ḥ ͑ ͮ΁ ͮ 5 Namf comm Message Transfer Fig. 3: UE-requested physically isolated multi-access PDU session establishment procedure for B5G.(See Appendix A) defend against randomly distributed non-cooperative passive attackers. The paper has identified these key points and will provide a detailed description of the preliminary work in the next section. III. B5G SCLER P RELIMINARY A major development trend of the beyond 5G core net- work is to support more complex services through cloud- network integration and distributed collaboration and provide customized services for each UE. This section will discuss in detail the intrusion probability of multiple PDUs and B5G RCLER preliminary work. A. Edge Network Intrusion Probability for Multiple PDU Sessions Physically isolated multi-access multi-PDU session edge computing networks can provide security benefits. In this subsection, we analyze the security of edge networks in the B5G era and explore the relationship between multiple disjoint PDU sessions and the probability of intrusion. Specifically, when there are NLdisjoint PDU sessions, we investigate the probability that all channels are eavesdropped, i.e., the probability P[NL]that all NLPDU sessions are attacked.P(NL) =YNL j=1[1−YNj i=1(1−pi j)] (1) Where pi jrepresents the probability that the i-th node on the j- th PDU session is eavesdropped, and Njrepresents the number of nodes contained in the j-th PDU session (including the base station(gNB), UPF, and UPF-A). Identify all possible physically isolated and disjoint PDU sessions between the UE and the DN. Given a predetermined threshold value ϑ, we require the connection intrusion probability P(NL)to be less than or equal to ϑ(denoted as P(NL)≤ϑ). The value ofNLcan be determined accordingly based on the required ϑ. In the following subsection, we will describe the method for establishment the aforementioned PDU session, which serves as a fundamental requirement for the SCLER to operate effectively in the B5G core network.B.Physically Isolated Multi-Access PDU Session Establish procedure The B5G core network we envision still follows the 5G control and bearer separation design. There are two planes, Control Plane (CP) and User Plane (UP). The core network provides PDU connectivity services between UE and DN to realize the exchange of PDUs. UP transport user PDUs. CP control manages the behavior of the entire core networks based on signaling. CP functional entities are divided into different Network Functions (NF). The User Plane Function (UPF) mainly supports the routing and forwarding of UE service data, Session Management Function (SMF) is responsible for UE session management and manages UPFs, Access and Mobility Management Function (AMF) is responsible for UE access. The three jointly participate in the PDU session establishment procedure. We mainly show the MEN-SMF and MEN-AMF of the control plane in Fig. 1. They are enhancements and improve- ments of SMF and AMF in the 5G core network. They mainly participate in the establishment of UE Multi-Access PDU sessions.They mainly participate in the establishment of UE Multi-Access PDU sessions. MEN-AMF Responsible for handling UE connection, registration as well as routing session management messages from the UE to the appropriate MEN-SMF. MEN-SMF man- ages PDU sessions by sending the signaling to different 6G access points. UPF on the user plane carries workflow data and can be regarded as a Layer 3 router, which receives and forwards the data packets between the RAT and the DN. Untrusted non-3GPP access Wifi shall be connected to the 3GPP Core Network via a Non-3GPP InterWorking Function (N3IWF) [44]. The 5G network defines a PDU session as a logical connection between the UE and the DN. A part of the PDU session is carried on the wired resources of the core network, and a part exists on the wireless resources. The performance of the PDU session is constrained by the physical bearer, but the transmission process itself ignores the resource form.The existing mobile network supports the UE to access different DNs to establish corresponding multiple PDU sessions, and can also access a single DN to establish multiple PDU sessions. However, the current 5G does not support the establishment of physical or geographic separation of multiple PDU sessions for a single workflow. In Fig. 3 We give the procedure of establishing a Multi-Access PDU Session, the appendix A has a detailed procedure. Multiple PDU sessions provide services for a single service and are connected to the same DN. UPF-A is an anchor UPF that receives data packets to and from DNs for UEs [22]. The splitting, aggregation, encoding, and decoding of data on the DN side are processed in SCLER-UPF-A. IV. S YSTEM MODEL As depicted in Fig.2, SCLER creates three PDU sessions on the edge network to provide a downlink transmission strategy with low latency and security considerations from the DN to the UE. Service flows that randomly arrive at the DN’s application layer are accumulated in the buffer and queued.The variable block length encoder selects gdata packets for encoding, and the encoded packets are distributed
2402.00002v1.pdf
91555a13-653a-47c9-a24c-0e94505e612b
PREPRINT SUBMITTED TO IET 5 Safety Threshold +\K (UH 'ROIK Source package Coded package 8GVZUX )UJKX 6*; 6*; 6*;T JKIUJKX 9)2+8 9INKJ[RKX Legitimate Transmitter Legitimate Receiver Eavesdropper Decoding Failed Decoded Successfully  sgY Y Y Y S S S S S I I I I I IY Y Y Y S S S S S I I I I I I 1gPs ´ 1gPc g´ LT pre g m m g G G g´ ´ 1[ ,..., ] j T j ug g g = { 1,..., }, j s j J g g " Î £ Fig. 4: SCLER Scheme to three PDU sessions according to the k-out-of-N weight for transmission. The legitimate receiver receives the Pcthrough the diversity interface and completes the decoding process.The legitimate receiver receives the Pcthrough the diversity interface and completes the decoding process. However, malicious network elements, eavesdroppers, and other unauthorized entities only receive part of the information and cannot complete the decoding. The SCLER strategy divides time into time slots and de- livers the DN’s downlink service flow to the legal receiving terminal reliably with low delay while also considering se- curity aspects. This section discusses the system model from three aspects: the modeling of the transmission strategy, the modeling of the transmission principle, and the key measure- ment indicators of the system. A. Encoding Transmission Model Under the SCLER strategy, we conduct Raptor encoding on a generation of gdata packets in each time slot7. As shown in Fig.4, by leveraging the fountain code prefix property, the redundancy of the encoder output can be adjusted by T. Assuming the encoder produces Ndata packets, the jth- PDU session selects kpackets from them for transmission.We define the scheduling weight coefficient as γj=k/N , and the scheduling weight vector of SCLER as γj υ= [γ1, ..., γ j]T. The SCLER strategy involves the selection of gdata packets to be encoded in time slot T, and then the distributing the data using a scheduling strategy γj υ. In this study, we represent the SCLER action for each time slot by a two-tuple (g, γj υ),i.e.,(g[n] = g, γj υ[n] = γj υ), indicates that the SCLER action in the n-th time slot is g, γj υ. Assuming that the number of data packets in each generation is bounded by B, that is, g[t]∈ {0,1, ..., B}. The weight value γj[n]for a single session changes in step sizes of (ςT)−1, where ςis the encoding rate coefficient that indicates the number of codes generated per unit time, γj∈ {1 ςT,2 ςT, ...,1}, 0< γj≤1.We define the value space of the weight vector γj υasΓj υ, such that γj υ∈Γj υ. The space size is Nj= (ςT)j, and γυis 7assuming that all data packets have the same length and carry ϕbit information.obtained by ⊙NL i=1γj υ(γi)here,⊙denotes the Cartesian product. We have 1≤γυ< N L, where NLrepresents the number of PDU sessions established by SCLER. To ensure a sufficient breadth of PDU session selection, we require NL≥2. Each PDU session described in SCLER can be modeled as a packet erasure channel. Let TX[n]be the number of packets sent by the transmitting end and RX[n]be the number of packets received by the receiving end RX[n] =ε[n]TX[n]. (2) We assume that TX[n], has a probability of 1−Pεbeing successfully delivered to RX[n]. Otherwise, the packet will be erased.
2402.00002v1.pdf
f52d9c8f-bf64-429f-b98f-3810541be8f6
Otherwise, the packet will be erased. This erasure can be due to various factors, such as subsequent datagrams being discarded due to high router load at the network layer, non-confirmed retransmission triggered by a new PDU session timer after mobile reconnection, transmission errors detected by the bottom layer such as the data link layer, and discarded packets, etc [45], [46]. We denote εj υ= [ε1, ..., ε j]to represent the erasure probability of different paths, cj[n] = 0 /1to indicate whether the jth PDU session is lost or successfully transmitted at time slot n, P{cj= 0}=εj,cjis independent and identically distributed in different time slots of the same PDU session. B. Threat Analysis and SCLER Encoding Principle In this subsection, we first analyze the potential information leakage associated with the multiplex transmission method based on Raptor encoding. We then provide a description of the passive attackers that we aim to defend against in this paper. Finally, we introduce the Raptor encoding transmission principle employed by SCLAR.Finally, we introduce the Raptor encoding transmission principle employed by SCLAR. 1) Threat Analysis: In this subsection, we describe the attack capabilities of passive attackers [47], who do not tamper with or discard data like active attackers, but instead copy, or store stolen user business data. Specifically, we consider a generalized eavesdropper who aims to obtain user data carried on the transmission path between the UE and the DN, without considering the specific communication layer of the eavesdropping behavior(gNB or Network Function), as
2402.00002v1.pdf
c161e878-0dd9-4b22-aa66-23899527efc6
PREPRINT SUBMITTED TO IET 6 shown in Fig.2. By clarifying the attack capabilities of passive attackers, we can better understand the scope of our defense goals. Taking a B5G edge network with NLdisjoint PDU sessions as an example, where Njrepresents the number of nodes contained in the jth PDU session. If Mnodes are attacked, it may result in only some nodes being under attack, which is a subset of the NLPDU sessions. This will lead to some information leakage, and we study the probability of information leakage.This will lead to some information leakage, and we study the probability of information leakage. Where P[M] =min(N1,M)X ϖ1=0···min(Nj−1,M−PNj−2 i=1ϖi)X ϖNL−1=0 NLY j=1(Nj ϖj)pϖj j(1−pj)(Nj−ϖj)u(nNL−ϖNL)(3) Assuming that ϖjnodes are attacked in the jth PDU session, ϖNL=M−PNL−1 j=1ϖj,u(·)refers to u(x) =( 1,ifx≥0 0,otherwise(4) the probability of M nodes being attacked is given by P[ϖ1, ϖ2. . .. . , ϖ NL, M] = NLY j=1(Nj ϖj)pϖj j(1−pj)(Nj−ϖj)u(nNL−ϖNL),(5) where ϖNL=M−PNL−1 i=1ϖi, and the marginal probability P[M]is obtained by summarizing all possible values ϖiand i= 1,2, ..., N L−1. For the subset ΥnLof multi-PDU sessions with nLpaths, which contains l1, l2, ..., l nL, the probability of Mnodes being attacked is: P[ΥnL, M] =Xmin(Nl1,M) ϖl1=0. .. .Xmin(NlnL−1,M−PlnL−2 l=l1ϖl) ϖlnL−1=0 YlnL j=l1Nj ϖj pϖj j(1−pj)(Nj−ϖj)u(NlnL−ϖlnL) YNL Ψ=1(1−pΨ)nΨ (6) where ϖlnL=M−PlnL−1 j=l1ϖj, and Ψ̸=l1, l2, ..., l nL Therefore, the probability that only Mnodes in subset ΥnLin NLare attacked is P[ΥnL|Nnode=M] =P[ΥnL,Nnode=M] P[Nnode=M]. Suppose there are NLdisjoint PDU sessions in the B5G edge computing network, denoted by the node set L= {l1, ..., l j, ..., l NL}for this MEN.Here, NL∈ {1, ..., J}indi- cates that at most JPDU sessions can be established, as shown in Fig.1 is an example of establishing 3 disjoint PDU sessions 8.ljrepresents the set of nodes contained in a single PDU session, lj={nj 1, nj 2, ..., nj i, ..., nj Nj}, where Nj∈ {1, ..., I}, Irepresents the upper limit of nodes contained in a single PDU session. We consider the eavesdropper Eκ, who can erode at 8in Fig.1, we set the UPF anchor with DN together, and UPF-A is not drawn.Algorithm 1 Raptor Code Encoding Operation Input: Read Ps= (Ps1, Ps2, . Ps g)Tfrom the queue, Ωd= (Ω 1,Ω2, .Ωmax), Waiting window w; Output: ¯Pc 1:Pcgγ×1←0gγ; 2:GRaptor gγ×m=GLT gγ×mGpre m×g;3:Pcgγ×1=GRaptor gγ×mPsg×1; 4:¯Pc←Pcgγ×1; 5:ifw >0then 6: the transmission is completed for wtime slots; 7: forACK ̸=nildo 8: Pcfix←Gfix 1×gPsg×1 9: ¯Pc←append [¯Pc, Pcfix] 10: end for 11:else 12: no response mode; 13:end if 14:return ¯Pc; most Njnodes on the single jth PDU session and cannot eavesdrop on nodes other than the current PDU session, i.e. {{L}\{lj}},∆κ={δ1, δ2, . δ n}represents the eroded node set9, satisfying ∀∆κ⊆L,{∆κ∩lj} ̸=∅,∃j∈ {1, . J}, s.t.
2402.00002v1.pdf
c0359380-df5a-46ab-8234-c4008a8e247f
∃j∈ {1, . J}, s.t. ∆κ⊆lj,and∆κ∩ {L/lj}=∅(7) Furthermore, there is no interaction or cooperation between all eavesdroppers Eκ, κ∈(1, K],Eκwill not be assisted by any other eavesdropper. This assumption is reasonable in mobile networks [48]. 2) SCLER Encoding Principle: As shown in Fig.4, we designed an encoding transmission method based B5G for UE- DN server flow, which encodes Psarriving at the application layer and distributes Pcto multiple PDU sessions. The method involves a Raptor [49] encoder that performs two encoding processes on the selected g Ps : an external encoder (pre- encoding) and an internal encoder (LT code [26]).Following the SCLER strategy, we propose Algorithm1, the method first selects gsource data packets( Ps) to encode as one generation, at time slot t, the encoder of a generation of gis denoted byξt(g, m, Ω), we have Pcgγ×1=GLT gγ×mGpre m×gPsg×1, The formula GRaptor gγ×m=GLT gγ×mGpre m×gdefines the relationship between PsandPc, where GLT gγ×mandGpre m×grepresent the LT encoding generator matrix and precoding generator matrix. (1) Precoding generates m intermediate symbols to ensure that all Psare covered, Gpre m×w= [Ik|Pm×(k−w)]T, where Pm×(k−w)is responsible for mixing Ps.(2)The in- ternal encoding matrix GLT gγ×mgenerates the final encod- ing symbol based on the degree distribution Ω(x), which represents the probability distribution of the number of Ps selected each time, Ωd= (Ω 1,Ω2, ...,Ωmax), while Ω(x) = Σdmax d=1Ωdxd. Encoder input Psg×1= (Ps1, Ps2, ..., Ps g)T, output Pcgγ×1= (Pc1, Pc2, ..., Pc gγ)T. 9Including malicious network functions, and eavesdropping on gNB, this article regards the erosion of a single node.
2402.00002v1.pdf
aefe5bf4-531f-4b7f-95f6-0afc8cc36b84
PREPRINT SUBMITTED TO IET 7 (a) Legitimate Receiver. (b) Eavesdropper. Fig. 5: Number of Psdecoded versus number of Pcreceived for Receivers. The Maximum-Likelihood (ML) decoding algorithm is typ- ically preferred for finite-length Raptor encoding over the Belief Propagation (BP) decoding algorithm [50], [51]. The performance of ML decoding is comparable to that of Gaus- sian elimination [52]. To use ML decoding, a coefficient matrix is constructed with rows and columns corresponding to the PcandPs. The coefficient matrix represents how the Pcis linearly combined from the Ps.g Ps can be recovered from gγofPcif and only if (GLT gγ×mGpre m×g)gγ×gis full rank. We conducted a MATLAB simulation of the RAPTOR codec and observed that the number of successfully decoded packets initially increases slowly with the number of received Pc, before reaching a sharp increase threshold10. Once the threshold is reached, the entire block can be decoded quickly.Once the threshold is reached, the entire block can be decoded quickly. In other words, the number of successfully decoded Psis initially very low until the number of received coded packets reaches the threshold. This principle can be used to defend against single-link eavesdropping attacks in CMT, we can limit the number of coded packets transmitted in each single PDU session to below this threshold. This way, an attacker of a single PDU session cannot decipher the source data information effectively, ensuring the security of user data. C. Secure and Reliable Function and Queuing Model This subsection comprises two parts. In the first part, we analyze the reliability and security of a concurrent trans- mission system that employs Raptor coding. In the second part, we analyze a queuing coding model that corresponds to an eavesdropping scenario. For enumeration of all possible session state, we first employ a 2NL×NLmatrix C: C= 1 1 . . . 0 ....... . .... 1 0 . . .. . 0 ....... . .... 1 0 . . . 0 T (8) Each element ci,jin row iand column jrepresents the probability of successful ( ci,j= 1 ) or failed ( ci,j= 0 ) reception by the receiver through the j-th PDU session for thei-th transmission possibility.As the UE-DN workflow is transmitted through different PDU sessions, each individual message may experience varying degrees of delay and packet 10Note that our team has worked on improving the slope of the surge in the early stages [32], but we won’t go into details in this article.loss, which can be quantified using the latency-reliability- security function, FSCLER T, γj υ, g =2NLX i=1giNLY j=1Hj(T, γjg) (9) Based on Eq.9, the secure data transmission considering the existence of single-link eavesdroppers, ∀j∈ {1, ..., N L},γj≤ γs,γsis the threshold value for ensuring transmission security, and limits the upper bound of the weight assigned to each path to prevent eavesdroppers from obtaining sufficient private information. Where gi=( 1,ifΣNL j=1ci,jγjγτ≥γdand∀j∈ {1, ..., N L}, γj≤γs 0,otherwise.(10) giwill exclude failed transmissions to ensure that only suc- cessfully decoded outputs are included. γdis the threshold used to determine successful decoding. Hjis defined as Hj(T, γjg) =Fj(T, γjg),ifci,j=1 1−Fj(T, γjg),ifci,j=0(11) The definition of Fjis based on the research by Erik et al. [53]. We delayed the transmission of PDU sessions to cut off the Gaussian distribution. The corresponding accumulated probability distribution, Fj, is shown in Figure 7a. Fj(T, γjg) means that at time T, the data packet transmission of the j-th PDU session with size γjgcan achieve a certain reliability. The extreme value of Fjapproaches 1−Pj e. There is a correspondence between static latency and relia- bility (i.e., probability of successful data delivery). By utilizing function Eq.9, both reliability and security can be guaranteed. Λ[t]denotes the number of Psarriving in thet-th timeslot.We assume that the application layer input {Λ[t], t≥0}, the number of packets arriving in each slot is i.i.d. , the upper bound of Λ[t]isN, denote the probability distribution of Λ[t]asλ= [λ0, λ1, ..., λ N]T, where we define λn=P{Λ[t] =n}, the average arrival rate asPNΛ n=0nλn. Using a buffer with a size of Z, randomly arriving packets are accumulated, and gpackets are selected from the cache once the encoding of the previous block of packets is completed.
2402.00002v1.pdf
b38d0ca5-331c-45d0-9930-aed32d9aa97e
Therefore, q[t]∈ {0,1, ...,Z}, in the [t+ 1]-th timeslot, q[t] evolves as11 q[t+ 1] = min {(q[t]−g[t])∗+ Λ[t+ 1],Z} (12) V. T RADE -OFFDELAY -SECURITY FORVARIABLE BLOCK -LENGTH SCLER S TRATEGY A. Constrained Markov Decision Process Formulation In the context of edge networks, ensuring both the security and low latency of data transmission is critical. To address these challenges, we propose a Raptor-encoded multi-session distributed delay-optimized transport method called SCLER that considers these constraints. To achieve this, we utilize the queue length as the system state information and propose a novel queue-aware variable block length encoding method that effectively models the SCLER strategy as a Constrained 11we define (x)∗= max {x,0}
2402.00002v1.pdf
03ff1463-2ac4-489d-adf4-9db4aaf8413c
PREPRINT SUBMITTED TO IET 8 Markov Decision Process (CMDP). We formulate the problem as a constrained optimization problem to obtain the trade- off between delay and reliability, which is a crucial factor in designing efficient data transmission mechanisms in edge networks. Specifically, we introduce the SCLER strategies by leveraging the probabilities f(q, g, γj υ), f(q, g, γj υ) =P{g[t] =g, γj υ[t] =γj υ|q[t] =q}. (13) We assume a temporary steady-state condition where no PDU session is being established or released, that is ∀q,ΣB g=1Σγj υ∈ΓNj υf(q, g, γj υ) = 1 .Therefore, we can get the strategy function of SCLER, S= f q, g, γj υ : 0≤q≤M,0≤g≤B,1≤γυ< N L,0< γj≤1 , to prevent the sender buffer from overflowing or underflowing, 0≤q[t]−g[t]≤M−NΛ, and {γj υ∈ΓNjυ|C{g>0}≤γυ≤NLC{g>0},0< γj≤C{g>0}}. The state of the system q evolves based on the Eq.12. We denote the overall redundancy of a generation of data by γυ=PNL j=1γj. Given a particular strategy and corresponding system constraints, if T→ ∞ , then lim T→∞F T, γj υ, g =L≤1−Pe, L denotes the upper limit of information security transmission, and the reliability value of the s ystem will not exceed its theoretical performance.Using the delay-safety function, we can identify the feasible region F(ϵ) = ∀γj υ, g, F T, γj υ, g |1−ϵ≤F γτT, γj υ, g ≤1−Pe (14) The fountain code transmission scheme in edge networks results in a long-tailed latency distribution. To address this issue, the SCLER algorithm is proposed to reduce the average transmission delay and achieve a balance between reliability and security.Based on Little’s Law, lim T→∞1 TPT t=1E{q[t] λ}, this can be used as a latency metric for MEN, which we describe by the probability of constraints violation Pvc: Pvc= lim T→∞1 TXT t=1P{q[t] λ≥dth} (15) where dthis the threshold of the latency indicator, dth∈ [0,∞)Building upon the SCLER strategy described above, this paper investigates the provision of low-latency, secure, and reliable transmission services. A comprehensive analysis is conducted, considering indicators such as information leak- age rate, PDU session quality, occupied bandwidth, decoding function, and delay. The delay and security of the MEN in the B5G era are key performance indicators that are determined by the state (q[n], εj υ[n])and action (g, γj υ). Considering the limitations of service characteristics, this section proposes a constrained optimization problem based on CMDP, and the next section will analyze the trade-off between reliability and delay while considering security.B. The Optimal Delay-Reliability Trade-off under SCLER In this subsection, we will focus on achieving a trade-off between transmission reliability and delay while ensuring data security in the face of Eq.7. We refer to Eq.9 as the reliabilityfunction, and successful transmission of data in SCLER in- volves two parts: receiving and recovering. As shown in the Fig.2, SCLER determines the transmission strategy {g, γj υ} based on the state information of the queue length q[t]. We describe the SCLER strategy Sas a Markov decision process with the buffer queue q(t), we define the transition probability asλq,q′=P{q[t+ 1] = q′|q[t] =q}.
2402.00002v1.pdf
6643f60c-9313-40d7-941f-98cfa0d86a17
Based on Eq.12, we formulate λq,q′as follows: λq,q′=NX n=0λnBX g=0f(q, g, γj υ)C{q′=min{(q−g)∗+n,Z}12(16) The steady state distribution of the system state q[t]of SCLER is formulated as follows: (Pmin{Z,q′+B} q=max{0,q′−N}π(q)λq,q′=π(q′),∀q′∈ {0,1,...,M},PM q=0π(q) =1. (17) The queue length, denoted as qandq′, takes on values in the set{0,1, . . . , Z}, subject to the constraint that the summation ofπ(q)over all possible values of qis equal to one. The queue length is influenced by the random arrival of packets and selection of.The queue length is influenced by the random arrival of packets and selection of. To express the balance equations in Eq.17 as a matrix form, we represent the steady-state probability distribution πas a vector [π0, ..., π Z]T, ΛSπ=π, 1Tπ= 1,(18) The matrix ΛSis defined with the element λq,q′at the qth row and q′th column. Additionally, the vector 1is defined as a vector with all its components being 1. Based on the stationary distribution π, the SCLER strategy’s average delay can be expressed using Little’s law.Specifically, the average delay LSbased on the SCLER strategy Sis ¯LS=1 λZX q=0qπq (19) The occupied PDU session resource occupancy is expressed as WS=ZX q=0BX g=0Wj S(g, γj υ)fq,g,γj υπq (20) SCLER presents an optimal trade-off scheme for delay- reliability that takes into account security considerations, based on the average delay and bandwidth occupancy. The proposed approach formulates an optimization problem of Psencoding and CMT, with the queue length serving as state information, and subject to reliability and security constraints. 12C{·}denotes the characteristic function.
2402.00002v1.pdf
7158d102-f4a4-48e7-a04d-044655e33916
PREPRINT SUBMITTED TO IET 9 min {fq,g,γj υ,πq}¯LS (21a) s.t. F S≥rth(21b) WS≤Wth j (21c) ΛSπ=π (21d) 1Tπ= 1 (21e) BX g=0X γj υ∈ΓNj υfq,g,γj υ= 1,∀q (21f) πq≥0, fq,g,γj υ≥0,∀q, g. (21g) The goal of SCLER is to find the optimal delay under the constraint of bandwidth Wth jin the MEN. In order to achieve the optimal trade off between delay and reliability with secure consideration, we have transformed the encoding CMT problem into an Linear Programming (LP) problem: min {xq,g,γj υ}1 λZX q=0BX g=0X γj υ∈ΓNj υqxq,g,g,γj υ(22a) s.t.MX q=0BX g=0X γj υ∈ΓNj υF(g, γj υ)xq,g,γj υ≥rth(22b) ZX q=0BX g=0X γj υ∈ΓNj υWj S(g, γj υ)xq,g,γj υ≤Wth j (22c) XZ q=0NX n=0BX g=0X γj υ∈ΓNj υλnxq,g,γj υC{q′=min{(q−g)∗+n,Z} =BX g=0X γj υ∈ΓNj υxq′,g,γj υ(22d) ZX q=0BX g=0X γj υ∈ΓNj υxq,g,γj υ= 1 (22e) xq,g,g,γj υ= 1 (22e) xq,g,γj υ≥0,∀q, g (22f) xq,g,γj υ= 0,∀q−g <0or q−g >(Z−N) (22g) we define the optimization variable xq,g,γj υas πqfq,g,γj υ, its long-run average can be expressed as lim T→∞1 TPT t=1P{q[t] =q, g[t] =g, γj υ=γj υ[t]}, one can obtain the optimal trade-off between delay and reliability for SCLER by solving the LP problem Eq.22 through the variable xq,g,γj υ. In algorithm 2, we transform the constrained optimization problem Eq.22 into a matrix form, we set the combination of solution space {xq,g,γj υ}as a vector ⃗ x,g,γj υ}as a vector ⃗ x, the feasible region in matrix form as ℜ=( ⃗ x|1T |⃗ x|⃗ x= 1,HS⃗ x=0M+1, 0≤xq,g,γj υ≤C{g∈N(q), γj υ∈ΓNj υ}) .13(23) Eq.22d are also presented in the form of coefficient matrix HS, where HS=˙HS−¨HS, let ˙HSand¨HSdenote the left- hand and right-hand coefficients of Eq. (22d), respectively. We 131Nand0Ndenote Ndimensional all-ones and all-zeros vectors, respec- tively.Algorithm 2 Algorithm to generate constraints matrix HS Input: λ= [λ0, λ1, . λ N]T; Output: HS 1:forq= 0 toMdo 2: ˙Hq S←0M+10T B+1,¨Hq S←0B+1; 3: forg= 0 toBdo 4: ˙Hq,g S←0max{q−g+N,M}+1; 5: ˙Hq,g S(q−g+ 1 : q−g+N+ 1)←λ; 6: ˙Hq S(1 :M, g + 1)←C{g∈N(q)}¨Hq,g S(1 :M); 7: ¨Hq S(g+ 1)←C{g∈N(q)}; 8: end for 9: ˙Hq S←˙Hq S,¨Hq S←eM+1,q+1(¨Hq S)T; 10: ˙HS←[˙HS,˙Hq S],¨HS←[¨HS,¨Hq S]; 11:end for 12:HS←˙HS−¨HS; utilize Sto obtain the optimal trade-off solution x∧ q,g,
2402.00002v1.pdf
a3ce904b-8140-4712-8f29-de58c47b88c1
utilize Sto obtain the optimal trade-off solution x∧ q,g,γj υbe- tween delay and reliability, where x∧ q,g,γj υis obtained through πqf∧ q,g,γj υ. Thus, the optimal strategy S∧can be expressed as S∧={f∧ q,g,γj υ:∀q, g, γj υ}, where f∧ q,g,γj υis defined as: f∧ q,g,γj υ=  x∧ q,g,γj υ π∧qifπ∧ q>0 C{g=gmax q}ifπ∧ q= 0,(24) As a consequence, the optimal delay-reliability trade off under secure consideration for SCLER is obtained. C. The threshold-based Strategy We aim to offer edge network users a secure, high- reliability, and low-latency service.To achieve this, we propose transforming the LP problem into a reliability-delay pairing based on the reliability function (Eq.9). As a result, the LP problem can be redefined as: min (ˆr,ˆL)∈ℵˆL (25a) s.t. ˆr≥rth j (25b) WS≤Wth j (25c) the set ℵcomprises all admissible ”delay-reliability” pairs under the SCLER strategy S. Specifically, ℵcan be obtained on the two-dimensional plane of delay and reliability, where delay and reliability are determined by Eq.22a and Eq.22b, respectively. Each point in ℵcorresponds to a particular type of SCLER strategy Ssubject to the constraints specified by Eqs.22c-22g.Using variable block length coding under given PDU ses- sion conditions Wth jand arbitrary initial queue conditions, we obtain an optimal delay–reliability trade-off f∧ q,g,γj υ. We also examine how our SCLER behaves under this optimal coding strategy S∧and show that each queue length selects either maximum or minimum block lengths ( Bmax g[t],Bmin g[t]): maximum lengths improve coding efficiency and reliability Eq.9; packets dispersion CMT with a security threshold γs impose a lower limit on minimum Pcencoding block lengths.
2402.00002v1.pdf
28850437-3c3b-41e8-80f2-5acf5a1cabcd
PREPRINT SUBMITTED TO IET 10 When gfalls below this threshold Bmin g[t], we fill out coding blocks with randomly generated packets.( f∧ q,g,γj υ≥0,ifgmax q orgmin q f∧ q,g,γj υ= 0,otherwise(26) The optimal SCLER encoding strategy exhibits characteristics of action-limited decision-making, where the strategy of S is constrained by state information and a threshold q∼related to q[t]:   f∧ q,gmaxq,γj υ= 1 ifq > q∼ f∧ q,gminq,γj υ= 1 ifq < q∼ f∧ q,gminq,γj υ+f∧ q,gmaxq,γj υ= 1 ifq=q∼(27) In addition, to achieve the optimal trade-off between delay and reliability, the allocation coefficient γj υselects the maximum value within the allowable range of the safety threshold. As a result, we can obtain the minimum LSwhile satisfying the reliability and safety constraint.The trade-off between delay and reliability can be obtained by adjusting the reliability constraints. VI. P ERFORMANCE RESULTS We constructed a set of edge networks to evaluate our proposed SCLER. The entire mobile core network is imple- mented based on the modified Free5GC. The control plane and user plane network elements of the core network are de- ployed on two separate virtual machines running Ubuntu18.04 with 16GB memory. We used two access points, two cus- tomized base stations (NR01), and one TP-LINK AX3000 Wi-Fi device. We have modified the existing PDU session establishment process (see Appendix A) by transforming the core network control plane network element to support the establishment of multiple PDU sessions. Our experimental section is divided into two parts: testing the basic environment and presenting the numerical results of the SCLER strategy. 0 10 20 30 Index of test seq-num024681012141618Latency(ms) (a) WiFi & NR latency result.
2402.00002v1.pdf
0cb2e3ee-7452-464c-a97d-6198a09448fd
0 20 40 60 Index of test seq-num0.00.10.20.30.40.50.60.70.8Process time(s) (b) UE initialization procedure delay result. Fig. 6: DIEN performance test result. A. Basic Performance Results Fig.6 shows the transmission performance test results of DIEN basic environment. As shown in Fig.6a, we tested the transmission delay of NR and WiFi by sending an ICMP packet to the DN end on the UE. To determine the delay of the basic propagation of the PDU session that is not related to the carrying data packet. We recorded the delay of a singleNR/WiFi access PDU session. The average delay of NR was 6.25ms, while that of WiFi was 9.927ms for 60 tests. Furthermore, we conducted UE initialization procedure test Fig.6b to measure the system’s initialization delay. The ex- perimental object is the procedure proposed by our Appendix A. 1.Registration procedure is usually triggered during power- on or switching flight mode.1.Registration procedure is usually triggered during power- on or switching flight mode. 2.Establishment of PDU session procedure triggers when the UE moves between gNB. We recorded the delay of the initialization process 30 times. The average time taken for Procedure1+2 and Procedure2 were 609ms and 194ms, respectively. The analysis of SCLER performance under the steady state after connecting the es- tablishment of connection does not involve two initialization procedures. 0 2 4 6 8 10 12 14 16 18 20 transmission delay00.10.20.30.40.50.60.70.80.91 Wifi LTE NR (a) Latency-reliability curves Fj for considered technologies for ϕ= 1500.0 2 4 6 8 10 12 14 16 18 20 Transmission delay(ms) 00.9 0.99 0.999 0.9999 0 2 4 6 8 10 12 14 16 18 20 Transmission delay(ms) 00.9 0.99 0.999 0.9999 (b) Delayed reliability function FSCLER with security consider- ation described in Eq.9 . Fig. 7: Example showing the reliability diagram of a single PDU session and DIEN-based reliability function of the entire SCLER system. As shown in Fig.7, we want to use Fjto describe the delay characteristics of PDU sessions with different interfaces. The end-to-end transmission delay Tof the PDU session we consider may be affected by high load packet loss at the network layer [54] and data link layer packet loss [55]. Therefore, without considering retransmission, Tshould obey the Gaussian distribution, consequently we have T=tp+tc, where tcrepresents the data transmission delay, related to packet size and bandwidth, i.e.t c=W∗ϕ−1∗1.25∗106, the propagation delay tpcaused by protocol flow and physical signal propagation, corresponds to the position of the first non-zero point in Fig.7a, where tp= [9 .927,12,6.25]ms, Wj= [500 ,100,200]Mbit/s, We regard the cumulative dis- tribution of the delay probability as Fj. This indicates that the transmission reliability of the current session changes with the transmission delay, and its extreme value approaches {1−Pe}, where Pj e= [0.9,0.92,0.95], corresponding to the highest reliability that can be guaranteed. The rising rate of Fjis related to tc. As shown in 7b, we have illustrated FSCLER and pre- sented the changes in reliability values under different typical strategies based on Eq.9.The orange and red lines show FSCLER values that increase with delay, FSCLER represents the probability of the system successfully decoding γj υin the legal range, when the allocation weight exceeds the decoding threshold γd, the method can be decoded successfully; When γj υ= [0.2 0.2 0.9], where γ3exceeds the safety threshold γj s= 0.8, and FSCLER is always zero. We noticed that
2402.00002v1.pdf
92532b73-bc11-4eb3-b363-f59dda51a469
PREPRINT SUBMITTED TO IET 11 TABLE II: Simulation Parameter Settings.
2402.00002v1.pdf
dce0e6a8-e94d-4421-9223-53d5fefb6d10
PREPRINT SUBMITTED TO IET 11 TABLE II: Simulation Parameter Settings. Packet Arrival Rate Channel Transmission State Packet Arrival Statistics E[Λ] λ= [λ25, ..., λ 100] rthεj υ(%) E[Λ] σ2λ= [λ25, ..., λ 100] 25 [0.24,0.10,0.12,0.05] 0.99 [22,25,25] 45 0.78 [0.39,0.42,0.11,0.06] 45 [0.34,0.27,0.16,0.11] 0.999 [9,22,10] 45 1.16 [0.39,0.31,0.13,0.10] 60 [0.16,0.30,0.20,0.26] 0.9996 [6,14,10] 45 1.38 [0.34,0.27,0.16,0.11] [ ] 25 L = ] [ ] 45 L = ] [ ] 60 L = ] (a) Impact of different E[Λ]on the results.0.9 0.99 0.999 0.999900.30.60.91.21.5 (b) Impact of different σ2on the results. 0.9 0.99 0.999 0.999900.30.60.91.21.5 (c) Impact of different εj υ(%) on the results. Fig. 8: Optimal Delay-Reliability Tradeoff Curves for Various Scenarios. although NR has the advantage of tp= 6.25, however the first non-zero point of the FSCLER -curve is still around 10. This is because, under the limit of the safety threshold γs, the decoding cannot be completed based on the bearer Pc of single path. Determined by the characteristics of fountain codes, DIEN will be unreliable if and only when all three channels are error-coded, so Pe= 1−NLQ j=1(1−Pj e), the extreme value of FSCLER is 0.9996. The strategy Stakes effect based on FSCLER 22b, which is one of the foundations of this paper.B. Numerical Results The SCLER strategy Sis based on DIEN transmission, and we have analyzed the data protection capabilities in the face of passive attackers in Fig.5. This section will focus on analyzing the optimal trade-off between delay and reliability under the premise of security considerations. In this subsection, we analyze the network characteristic values based on the basic performance results. We set the maximum transmission block length B= 100 , considering the encoding characteristics, when g[t]<100, random redundant Pswill be added to ensure that γjγτ≥γd. We consider B5G DIEN containing three PDU sessions, whose transmission characteristics are shown in Fig.7a. The accumulation and arrival of Psfollow the probability distribution λ(·), and the maximum arrival rate is Nmaxλ= 300 . For the convenience of analysis, we assume that the minimum granularity of a single timeslot data arrival is 25, namely ΛN= 0,25,50,75,100. We sort the PDU sessions as 1-3 according to NR, Wifi, and LTE bearers.Pcerasure at the PDU session layer is considered a separate unreliability other than Pe,ε[n]does not vary with time under the consider of there is no retransmission, and this assumption is reasonable in mobile networks. The number of time slots for each simulation run is NT= 105. Theoretical results are plotted with diamond-shaped dots, while simulationresults are marked with lines. The basic simulation parameter settings can be found in Table.II. The Fig.8a shows the numerical results of the delay- reliability trade-off. It illustrates that for fixed deletion prob- abilities of εj υ= [6,14,10],FSCLER can achieve the min- imum average waiting delay while ensuring reliability for average arrival rates E[Λ]of 25, 45, and 60. The simulation results match well with the theoretical analysis shown by the diamond-shaped dots, which shows that the derived optimiza- tion problem of the threshold-based strategy accurately solves the Eq.21. The delay-reliability trade-off curve is segmented, which is consistent with the characteristics of the strategy.As the reliability FSCLER approaches its extreme value, the delay increases rapidly, and the queue state becomes more unstable. Under the same reliability constraints, as E[Λ] increases, the corresponding average queue delay ¯LSalso increases due to the higher throughput of DIEN at this time. In summary, SCLER can achieve a latency-reliability trade-off, and the threshold-based strategy is effective. In Fig.8b, we use the same setting as in Fig.8a to analyze the delay-reliability trade-off when E[Λ] = 45 andσ2=[0.78, 1.16, 1.38]. We observe that the arrival process λwith a larger second-order moment σ2has a higher corresponding average queue delay ¯LS, which is longer. As the reliability F approaches 1−Pe, more delay overhead needs to be added due to the long-tailed distribution of the reliability function. This causes FSCLER to slowly approach the extreme value. In conclusion, the variance has an effect on the reliability-delay trade-off, which helps us to further analyze the threshold-based strategy.Fig.8c shows the analysis of the delay-reliability trade-off under different deletion probabilities for E[Λ] = 45 and three channel transmission state as shown in Table.II. With the deletion probability increases, a lower code rate is required to achieve the same reliability value. In this case, Stends to generate a smaller gto improve the coding redundancy, which
2402.00002v1.pdf
6d1be6c4-ffce-4114-b98d-59e39954d97b
PREPRINT SUBMITTED TO IET 12 increases the queue delay in the DIEN. (a)rth= 0.9996 (b)rth= 0.999 Fig. 9: Threshold-based strategy S,E[Λ]=45. Fig.9 shows the specific strategy probability value of the threshold policy. We analyze the change of Sunder different reliability requirements rthforE[Λ]=45. The results in Fig.8a have confirmed the effectiveness of the threshold strategy in solving derivative problems. In Fig.9a, the threshold point is at q[t] = 25 , and the probability of transmission is 0.75, while in Fig.9b, the threshold point is at q[t] = 50 , and the probability of transmission is 0.47. Considering both reliability and delay, SCLER adjust the threshold policy point to achieve optimal trade-off optimization. VII.VII. C ONCLUSION This paper investigates how to provide end-to-end low- latency, high-reliability transmission methods between termi- nal devices and edge nodes in Beyond 5G edge networks, while considering potential eavesdroppers. We propose a se- cure and reliable Raptor encoding-based transmission scheme that mitigates the impact of asymmetric delay and bandwidth differences in multi-path transmission, thus enhancing the interaction between paths. We develop a sender-side queue length-aware variable block-length encoding method and im- plement multi-path split transmission, taking into account a data security threshold that reduces data leakage risks on a larger attack surface in CMT. By analyzing the optimal trade- off decision problem for delay and reliability, we address the constraint optimization problem using a threshold-based strategy. Performance results demonstrate that our approach is effective in achieving the optimization of both delay and reliability, while ensuring data security. APPENDIX A MULTI -ACCESS PDU SESSION ESTABLISHMENT PROCEDURE The current existing mobile network does not yet support the establishment of physically isolated multi-PDU sessions.Therefore, we propose the procedure of establishing diversity interface PDU session suitable for SCLER 1) In SCLER, both UE and DN can initiate a PDU session establishment request. The corresponding message is PDU Session Establishment Request, which needs to carry the requested DNN (Data Network Name), PDU session type, etc.2) AMF will send the message to SMF in SBI(service- based interface) format and will report the access type currently supported by UE to the core network. 3) SMF will perform the authentication and authorization of the PDU session, and register on the Unified Data Management (UDM). These contents are not shown in Fig. 3. SMF reads the service data of the user subscribed by the user in the SCLER and invokes the session management policy rule corresponding to the user, which is used for the PDU session QoS control, At this time, SMF has selected the DN and the Anchor UPF.4) SMF sends PDR to UPF, (PDR is a kind of cell, used to carry policy control information, including rule name, forwarding action, service processing action, etc.), UPF will be assigned with RAN and N3IWF addresses, namely TEID, for RAN and N3IWF uplink data transmission, corresponding to UPF-1 and UPF-2 respectively, 5) SMF requires AMF to relay the SMF’s NAS messages (i.e.the session establishment accept the message and the UPF’s core network tunnel information for uplink from the RAN) to the UE.6) AMF initiates a radio resource request to the access point, including 3GPP access and non-3GPP access, and requires relaying NAS messages 7) The NG-RAN and Wifi set up the radio bearer and RAN tunnel after receiving the request, and sending the NAS message to the UE 8) NG-RAN and Wifi use session information (including session id and RAN tunnel) to provide response to AMF 9) AMF relays session information to SMF 10) SMF updates the UPF after receiving the reply and establishes the downlink tunnel from the UPF to the base station 11) Finally, the tunnel from the access point to UPF-A is generated. The UE and UPF-A split and aggregate the data, and the encoding and decoding are also completed in the UE and UPF-A. REFERENCES [1] 3GPP, “Summary of Rel-17 Work Items,” Technical report (TR) 21.917, 01 2023, version 17.0.1. [Online].[Online]. Available: https://www.3gpp.org/ftp/ Specs/archive/21 series/21.917/ [2] A. R. Javed, F. Shahzad, S. ur Rehman, Y . B. Zikria, I. Razzak, Z. Jalil, and G. Xu, “Future smart cities requirements, emerging technologies, applications, challenges, and future aspects,” Cities , vol. 129, p. 103794, 2022. [3] J. Navarro-Ortiz, P. Romero-Diaz, S. Sendra, P. Ameigeiras, J. J. Ramos- Munoz, and J. M. Lopez-Soler, “A survey on 5g usage scenarios and traffic models,” IEEE Communications Surveys & Tutorials , vol. 22, no. 2, pp. 905–929, 2020.
2402.00002v1.pdf
313f7da3-341c-4b01-b4c9-cdfefc8bd477
22, no. 2, pp. 905–929, 2020. [4] Z. Li, M. A. Uusitalo, H. Shariatmadari, and B. Singh, “5g urllc: Design challenges and system concepts,” in 2018 15th international symposium on wireless communication systems (ISWCS) . IEEE, 2018, pp. 1–6. [5] M. Adhikari and A. Hazra, “6g-enabled ultra-reliable low-latency communication in edge networks,” IEEE Communications Standards Magazine , vol. 6, no. 1, pp. 67–74, 2022. [6] Y . Zhang and Y . Zhang, “Mobile edge computing for beyond 5g/6g,” Mobile Edge Computing , pp. 37–45, 2022. [7] N. Hassan, K.-L. A. Yau, and C. Wu, “Edge computing in 5g: A review,” IEEE Access , vol. 7, pp. 127 276–127 289, 2019.
2402.00002v1.pdf
dbafc545-b425-4936-907e-e14dbe089451
PREPRINT SUBMITTED TO IET 13 [8] Y . Hui, N. Cheng, Z. Su, Y . Huang, P. Zhao, T. H. Luan, and C. Li, “Secure and personalized edge computing services in 6g heterogeneous vehicular networks,” IEEE Internet of Things Journal , vol. 9, no. 8, pp. 5920–5931, 2021. [9] P. Tedeschi and S. Sciancalepore, “Edge and fog computing in critical infrastructures: Analysis, security threats, and research challenges,” in 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) . IEEE, 2019, pp. 1–10. [10] T. Yoshizawa, S. B. M. Baskaran, and A. Kunz, “Overview of 5g urllc system and security aspects in 3gpp,” in 2019 IEEE Conference on Standards for Communications and Networking (CSCN) . IEEE, 2019, pp. 1–5.IEEE, 2019, pp. 1–5. [11] R. Chen, C. Li, S. Yan, R. Malaney, and J. Yuan, “Physical layer secu- rity for ultra-reliable and low-latency communications,” IEEE Wireless Communications , vol. 26, no. 5, pp. 6–11, 2019. [12] J. M. Hamamreh, E. Basar, and H. Arslan, “Ofdm-subcarrier index selection for enhancing security and reliability of 5g urllc services,” IEEE Access , vol. 5, pp. 25 863–25 875, 2017. [13] S.-Y . Lien, S.-L. Shieh, Y . Huang, B. Su, Y .-L. Hsu, and H.-Y . Wei, “5g new radio: Waveform, frame structure, multiple access, and initial access,” IEEE communications magazine , vol. 55, no. 6, pp. 64–71, 2017. [14] V .6, pp. 64–71, 2017. [14] V . K. Shrivastava, S. Baek, and Y . Baek, “5g evolution for multicast and broadcast services in 3gpp release 17,” IEEE Communications Standards Magazine , vol. 6, no. 3, pp. 70–76, 2022. [15] Y . Xie and P. Ren, “Optimizing training and transmission overheads for secure urllc against randomly distributed eavesdroppers,” IEEE Transactions on Vehicular Technology , vol. 71, no. 11, pp. 11 921– 11 935, 2022. [16] D. Xu and P. Ren, “Quantum learning based nonrandom superimposed coding for secure wireless access in 5g urllc,” IEEE Transactions on Information Forensics and Security , vol. 16, pp. 2429–2444, 2021.16, pp. 2429–2444, 2021. [17] J. Farhat, G. Brante, R. D. Souza, and J. P. Vilela, “On the secure spectral efficiency of urllc with randomly located colluding eavesdroppers,” IEEE Internet of Things Journal , vol. 8, no. 19, pp. 14 672–14 682, 2021. [18] 3GPP, “System architecture for the 5G System (5GS),” Technical Specification (TS) 23.501, 09 2022, version 17.6.0. [Online]. Available: https://www.3gpp.org/ftp/Specs/archive/23 series/23.501/ [19] H. Chen, R. Abbas, P. Cheng, M. Shirvanimoghaddam, W. Hardjawana, W. Bao, Y . Li, and B. Vucetic, “Ultra-reliable low latency cellular networks: Use cases, challenges and approaches,” IEEE Communications Magazine , vol. 56, no.56, no. 12, pp. 119–125, 2018. [20] M.-T. Suer, C. Thein, H. Tchouankem, and L. Wolf, “Multi-connectivity as an enabler for reliable low latency communications—an overview,” IEEE Communications Surveys & Tutorials , vol. 22, no. 1, pp. 156–169, 2019. [21] M. Li, A. Lukyanenko, Z. Ou, A. Yl ¨a-J¨a¨aski, S. Tarkoma, M. Coudron, and S. Secci, “Multipath transmission for the internet: A survey,” IEEE Communications Surveys & Tutorials , vol. 18, no. 4, pp. 2887–2925, 2016. [22] J. Ha and Y .-I. Choi, “Support of a multi-access session in 5g mobile network,” in 2019 25th Asia-Pacific Conference on Communications (APCC) . IEEE, 2019, pp. 378–383.IEEE, 2019, pp. 378–383. [23] J. Wang and J. Liu, “Secure and reliable slicing in 5g and beyond vehicular networks,” IEEE Wireless Communications , vol. 29, no. 1, pp. 126–133, 2022. [24] A. Cohen, R. G. D’Oliveira, S. Salamatian, and M. M ´edard, “Network coding-based post-quantum cryptography,” IEEE Journal on Selected Areas in Information Theory , vol. 2, no. 1, pp. 49–64, 2021. [25] L. Huang, P. Ren, and D. Xu, “Cross-locking enabled multi-route fountain coding for secure transmission,” in 2022 IEEE 95th Vehicular Technology Conference:(VTC2022-Spring) . IEEE, 2022, pp. 1–5. [26] M. Luby, “Lt codes,” in The 43rd Annual IEEE Symposium on Founda- tions of Computer Science, 2002. Proceedings. IEEE Computer Society, 2002, pp.Proceedings. IEEE Computer Society, 2002, pp. 271–271. [27] M. He, C. Hua, W. Xu, P. Gu, and X. S. Shen, “Delay optimal concurrent transmissions with raptor codes in dual connectivity networks,” IEEE Transactions on Network Science and Engineering , vol. 8, no. 2, pp. 1478–1491, 2021. [28] Y . Cui, L. Wang, X. Wang, H. Wang, and Y . Wang, “Fmtcp: A fountain code-based multipath transmission control protocol,” IEEE/ACM Trans- actions on Networking , vol. 23, no. 2, pp. 465–478, 2014. [29] M. Luby, A. Shokrollahi, M. Watson, and T. Stockhammer, “Raptor forward error correction scheme for object delivery,” Tech. Rep., 2007. [30] R. Abbas, M. Shirvanimoghaddam, T. Huang, Y .Li, and B. Vucetic, “Performance analysis of short analog fountain codes,” in 2019 IEEE Globecom Workshops (GC Wkshps) . IEEE, 2019, pp. 1–6.[31] S. Jain and R. Bose, “Rateless-code-based secure cooperative transmis- sion scheme for industrial iot,” IEEE Internet of Things Journal , vol. 7, no. 7, pp. 6550–6565, 2020. [32] M. Yi, X. Ji, K. Huang, H. Wen, and B. Wu, “Achieving strong security based on fountain code with coset pre-coding,” IET Communications , vol. 8, no. 14, pp. 2476–2483, 2014. [33] Z. Guo, X. Ji, W. You, M. Xu, Y . Zhao, Z. Cheng, and D. Zhou, “Delay optimal for reliability-guaranteed concurrent transmissions with raptor code in multi-access 6g edge network,” Computer Networks , p. 109716, 2023. [Online].109716, 2023. [Online]. Available: https://www.sciencedirect.com/ science/article/pii/S1389128623001615 [34] O. C. Kwon, Y . Go, Y . Park, and H. Song, “Mpmtp: Multipath mul- timedia transport protocol using systematic raptor codes over wireless networks,” IEEE Transactions on Mobile Computing , vol. 14, no. 9, pp. 1903–1916, 2014. [35] J. J. Nielsen, R. Liu, and P. Popovski, “Ultra-reliable low latency communication using interface diversity,” IEEE Transactions on Com- munications , vol. 66, no. 3, pp. 1322–1334, 2017. [36] 3GPP, “Interface between the Control Plane and the User Plane Nodes,” Technical Specification (TS) 29.244, 12 2022, version 18.0.1. [Online].
2402.00002v1.pdf
821a886e-ac5a-40ed-9ad5-9574794ca786
[Online]. Available: https://www.3gpp.org/ftp/Specs/archive/29 series/29.244/ [37] M. Jadin, G. Tihon, O. Pereira, and O. Bonaventure, “Securing multi- path tcp: Design & implementation,” in IEEE INFOCOM 2017-IEEE Conference on Computer Communications . IEEE, 2017, pp. 1–9. [38] Ł. Apiecionek, M. Sobczak, W. Makowski, and T. Vince, “Multi path transmission control protocols as a security solution,” in 2015 IEEE 13th International Scientific Conference on Informatics . IEEE, 2015, pp. 27–31. [39] J. Liu, J. Xu, S. Li, X. Cui, and Y . Zhang, “A secure multi-path trans- mission algorithm based on fountain codes,” Transactions on Emerging Telecommunications Technologies , vol. 33, no. 5, p. e4450, 2022.33, no. 5, p. e4450, 2022. [40] H. N. Noura, R. Melki, and A. Chehab, “Network coding and mptcp: Enhancing security and performance in an sdn environment,” Journal of Information Security and Applications , vol. 66, p. 103165, 2022. [41] J. Yang and S. Papavassiliou, “Improving network security by multipath traffic dispersion,” in 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No. 01CH37277) , vol. 1. IEEE, 2001, pp. 34–38. [42] S. K. Singh, T. Das, and A. Jukan, “A survey on internet multipath routing and provisioning,” IEEE Communications Surveys & Tutorials , vol. 17, no. 4, pp. 2157–2175, 2015. [43] C.-F. Kuo, A.-C. Pang, and S.-K.
2402.00002v1.pdf
ea19ea58-28b6-4078-815c-375256773ad5
Kuo, A.-C. Pang, and S.-K. Chan, “Dynamic routing with security considerations,” IEEE transactions on parallel and distributed systems , vol. 20, no. 1, pp. 48–58, 2008. [44] 3GPP, “Procedures for the 5G System (5GS),” Technical Specification (TS) 23.502, 09 2022, version 17.6.0. [Online]. Available: https: //www.3gpp.org/ftp/Specs/archive/23 series/23.502/ [45] Y . R. Julio, I. G. Garcia, and J. Marquez, “R-iot: An architecture based on recoding rlnc for iot wireless network with erase channel,” inInformation Technology and Systems: Proceedings of ICITS 2020 . Springer, 2020, pp. 579–588. [46] S. Yang and R. W. Yeung, “Network communication protocol design from the perspective of batched network coding,” IEEE Communications Magazine , vol. 60, no. 1, pp.60, no. 1, pp. 89–93, 2022. [47] A. Boualouache and T. Engel, “Federated learning-based scheme for detecting passive mobile attackers in 5g vehicular edge computing,” Annals of Telecommunications , pp. 1–20, 2022. [48] W. Huang, “Coding for security and reliability in distributed systems,” Ph.D. dissertation, California Institute of Technology, 2017. [49] A. Shokrollahi, “Raptor codes,” IEEE transactions on information theory , vol. 52, no. 6, pp. 2551–2567, 2006. [50] R. Karp, M. Luby, and A. Shokrollahi, “Finite length analysis of lt codes,” in International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings. IEEE, 2004, p. 39. [51] A. Shokrollahi, “Theory and applications of raptor codes,” Proceedings of MathKnow , pp. 59–89, 2009.59–89, 2009. [52] P. Wang, G. Mao, Z. Lin, M. Ding, W. Liang, X. Ge, and Z. Lin, “Perfor- mance analysis of raptor codes under maximum likelihood decoding,” IEEE Transactions on Communications , vol. 64, no. 3, pp. 906–917, 2016. [53] E. G. Str ¨om, P. Popovski, and J. Sachs, “5g ultra-reliable vehicular communication,” arXiv preprint arXiv:1510.01288 , 2015. [54] F. Wang, G. Wen, Z. Peng, T. Huang, and Y . Yu, “Event-triggered consensus of general linear multiagent systems with data sampling and random packet losses,” IEEE Transactions on Systems, Man, and Cybernetics: Systems , vol. 51, no. 2, pp. 1313–1321, 2019.
2402.00002v1.pdf
7c3a0cf3-1a52-48fb-9d14-3f1cda86ed3a
PREPRINT SUBMITTED TO IET 14 [55] P. K. Khatua, V . K. Ramachandaramurthy, P. Kasinathan, J. Y . Yong, J. Pasupuleti, and A. Rajagopalan, “Application and assessment of internet of things toward the sustainability of energy systems: Challenges and issues,” Sustainable Cities and Society , vol. 53, p. 101957, 2020.
2402.00002v1.pdf
20f39eaa-3df0-4a6f-ac5b-13a832084a02
Draft version January 2, 2024 Typeset using L ATEXtwocolumn style in AASTeX63 Prompt emission of relativistic protons up to GeV energies from M6.4-class solar flare on July 17, 2023 C.E. Navia,1M.N. de Oliveira,1and A.A. Nepomuceno2 1Instituto de F´ ısica, Universidade Federal Fluminense, 24210-346, Niter´ oi, RJ, Brazil 2Departamento de Ciˆ encias da Natureza, Universidade Federal Fluminense, 28890-000, Rio das Ostras, RJ, Brazil ABSTRACT We show evidence of particle acceleration at GEV energies associated directly with protons from the prompt emission of a long-duration M6-class solar flare on July 17, 2023, rather than from protons acceleration by shocks from its associated Coronal Mass Ejection (CME), which erupted with a speed of 1342 km/s.Solar Energetic Particles (SEP) accelerated by the blast have reached Earth, up to an almost S3 (strong) category of a radiation storm on the NOAA scale. Also, we show a temporal correlation between the fast rising of GOES-16 proton and muon excess at ground level in the count rate of the New-Tupi muon detector at the central SAA region. A Monte Carlo spectral analysis based on muon excess at New-Tupi is consistent with the acceleration of electrons and protons (ions) up to relativistic energies (GeV energy range) in the impulsive phase of the flare. In addition, we present another two marginal particle excesses (with low confidence) at ground-level detectors in correlation with the solar flare prompt emission. Keywords: sun:activity, high-speed stream, cosmic rays modulation 1.INTRODUCTION Since 1950 the observation of solar energetic particles from the solar flares and coronal mass ejections (CMEs) have been done with ground-level experiments, such as the neutron monitors (NMs) (Meyer et al. 1956; Simp- son 2000; Moraal et al.1956; Simp- son 2000; Moraal et al. 2000) as well as the solar neutron telescope network (Hu & Semones 2022; Vald´ es-Galicia et al. 2009), all around the world. These observations have yielded a lot of new information. For instance, the existence of a prompt and gradual emission of solar energetic particles (SEP) in flares and CMEs, respec- tively, the correlations of the cosmic ray intensity with CMEs and other solar disturbances crossing the Earth, etc. (Chupp et al. 1987; Moraal et al. 2000) Also, the solar modulation of galactic cosmic rays is inversely correlated with solar activity, inferred through the number of sunspots, which can be the key to under- standing more about space weather (Cade III & Chan- Park 2015). Nowadays, particles accelerated to near the Sun can be detected by space-borne instruments such as the Corresponding author: C.E.Navia carlos navia@id.uff.brHigh-Energy Proton and Alpha Detector (HEPAD) on the Geostationary Operations Environmental Satel- lite (GOES) and the Advanced Composition Explorer (ACE) spacecraft at Lagrange L1 point, through the Electron Proton Alpha Monitor (EPAM) and the Solar Isotope Spectrometer (SIS), among others. Not all of the solar energetic particles can be measured at ground level. Even those SEPs from solar events with a good geoeffectiveness can be dissipated by the IMF, or deflected or captured by the Earth’s magnetic field or until absorbed by atmosphere. On the other hand, ground-level enhancements (GLEs), typically in the MeV-GeV energy range, are sudden increases in cosmic ray intensities registered in most cases by NMs. GLEs are quite rare events, and fewer than 100 GLEs have been observed by NMs in the last 70 years.
2401.00002v1.pdf
a7028f4f-c7a6-4db9-8355-b1b8e6ec089f
In most cases, the NMs that observed GLEs are located at regions with small geomagnetic rigidity cutoff, that is, at high latitudes (Shea & Smart 2012). The GLEs follow the solar radiation storms, solar en- ergetic particles (mostly protons) observed by GOES. They occur when a large-scale magnetic eruption, a coronal mass ejection and associated solar flare, accel- erates charged particles in the solar atmosphere to high energies.arXiv:2401.00002v1 [astro-ph.SR] 28 Nov 2023
2401.00002v1.pdf
94e6f8c4-defa-4b8b-898d-9d43513d9783
2 Figure 1. Top panel: strength of Earth’s magnetic field in 2000, according to measurements by the European Spacing Agency’s SWARM satellites. Bottom left panel: Corsika-Fluka simulation results of the lateral particle distribution in proton air-showers of cosmic rays, as detected from several ground level detectors. Bottom right panel: correlation between Rmax(from Corsika- Fluka) versus the geomagnetic Stormer rigidity cutoff of six different places (black circles) including the SAA-CR region (blue square). The red solid line is a linear fit, and the two dotted red lines delimit the region with a confidence of ±1σ.However, in the present case, despite a radiation storm reaching above the S2-class on the NOAA scale on July 18, 2023, it did not generate a GLE, only a prompt emis- sion of relativistic protons (ions) above GeV energies, during the phase eruptive, and observed by ground-level detectors strategically located, within the SAA central region (New-Tupi muon detector) and by the (Yangba- gin muon telescope) at the Yangbajing Cosmic Ray Ob- servatory (Tibet 4440 m a.s.l) (Zhang et al. 2010). Also, we looked for any signal in the counting rate at the Neutron Monitor’s (NM) network around the world from Neutron Monitor Data Base (NMDB) https: //www.nmdb.eu/nest/ , with negative results. However, we found a low confidence signal only at Kerguelen NM, at geographical coordinates (49.3S, 70.3E), altitude of 33 m a.s.l, and an effective vertical cutoff rigidity of 1.14 GV. We present details of these observations.
2401.00002v1.pdf
450e0a41-393c-4d77-8a17-ebf4da1a2ecf
We present details of these observations. 2.NEW-TUPI TELESCOPE WITHIN THE SOUTH ATLANTIC ANOMALYThe New-Tupi muon detector is completely unmoder- ated (without no surrounding lead or other material). The muon detection energy threshold is about 200 MeV (see Appendix A). That contrasts with other muon de- tectors that have, in most cases, a surrounding lead ma- terial with a thickness of up to 5 cm. The shielding effect of the Earth’s magnetic field on cosmic ray particles is quantified by the magnetic rigid- ity cutoff from a specific location (Smart & Shea 2009). The smaller the rigidity cutoff, the lower the energy cosmic ray particles penetrate the magnetosphere. On the other hand, a restricted area between latitudes 20 and 40 of the southern hemisphere, over South Amer- ica and the Atlantic Ocean poses a geomagnetic field with an anomalously lower intensity (around 22,000 nT). The region is known as the South Atlantic Anomaly (SAA) (Pav´ on-Carrasco & De Santis 2016).According to Swarm’s satellite observations (Finlay et al. 2020), the SAA appears splitting into two, a smaller area over the Atlantic Ocean in southwest Africa and a larger area
2401.00002v1.pdf
6fd1c3d2-ea16-45cd-9860-a6a9bd948f68
3 over eastern South America. Fig. 1 (top panel) summa- rizes the situation. We would like to point out that the location of the New-Tupi telescope coincides with the central part of the SAA indicated by the arrow on the left of Fig. 1 (top panel). The main effect of the SAA is on the satellites since the ’70s. We know the frequent failures when they pass through the SAA region. A large amount of charged particles precipitation in this region damages and per- turbates the satellites’ electronics. Also, according to the results from the PAMELA detector at satellite’s al- titudes (Casolino et al. 2009), the effect of geomagnetic cutoff on low-energy particles is present in high latitudes close to the poles and also in the SAA region, composed mostly of low energy cosmic protons (E <200 MeV ). In other words, the Pamella satellite has shown that the SAA introduces a sub-cutoff in the magnetic rigid- ity, below the Stormer’s magnetic rigidity cutoff.We show that the SAA also affects secondary cosmic rays detected at ground level. As the horizontal magnetic component on Earth’s surface is smaller on the SAA, the magnetic lateral dispersion of the secondary parti- cles forming an air shower is smaller too. The effect in- creases the number of particles reaching a detector. In other words, this behavior mimics a magnetic rigidity sub-cutoff below the Stormer’s rigidity cutoff. We show that effect through a Monte Carlo simulation based on CORSIKA-Fluka code (Heck et al. 2012; Battistoni et al. 2008), where 1 .0×106proton air-showers are simulated, taking into account the magnetic coordinates (latitude, longitude) and height of several places where detectors are installed (mostly neutron monitors). Fig. 1 bottom left panel shows the lateral particle dis- tribution in air-showers of cosmic rays, as detected from several ground-level detectors.In all cases, there is a fast rise of particles with the shower lateral development un- til reach um maximum value that happens for different values of R, called hereafter as RmaxWe can see that the number of shower particles at Rmaxin the SAA central region (SAA-CR) rigidity 9.6 GV is higher than at Rome and Athens, both with the rigidity of 6.3 GV, and 8.5 GV, respectively, i.e., minors than the SAA-CR. Already Fig. 1 bottom right panel, shows a correlation between Rmaxversus the geomagnetic Stormer rigidity cutoff of six different places (black circles), including the SAA- CR (blue square). The solid red line is a linear fit, and the two dotted red lines delimit the region with signifi- cance of ±1σ. Only two places are out from the ±1.0σ significance region, the Thule (Groenlandia) in the low- est rigidity region and SAA-CR in the highest rigidity region.
2401.00002v1.pdf
1afd5f33-0e3c-45ee-a2fa-3a4698f6b95c
The high Stormer’s rigidity of SAA-CR does not correspond to the high value of Rmaxexpected by the Figure 2. Left panel: NASA’s Solar Dynamics Observatory image of a blast near the sun’s southwestern limb, erupted from a big sunspot AR3363, with onset at the last hours of July 17, 2023. Right panel: LASCO-C2 coronograph image on July 18, 2023, at 00:42 UT showing the CME eruption associated to M6-class flare with a speed of 1342 km/s. correlation. From an interpolation, it is possible to see that the small value of Rmaxat SAA-CR correspond to the rigidity of only 3 .1+3.0 −1.7GV, within a confidence of ±1.0σ. This behavior of having a location close to the Equator, with a nominal lower magnetic rigidity cutoff, favors the observation of phenomena such as the SEPs.3.ANALYSIS On July 17, 2023, at ∼18h UT, the active region AR 13363 had an explosion, reaching an M6-class solar flare followed by a resplendent coronal mass ejection. Fig. 2 left panel shows the image from the Solar Dynamo ob- servatory of the blaze of fire responsible for the X-ray flux reaching M6-class flare. Already the right panel shows the LASCO-C2 coronograph image of its associ- ated CME on July 18, 2023, at 00:42 UT. NOAA prediction models confirmed that a CME orig- inated in the powerful M6-class flare from sunspot AR3363 would pass through the magnetosphere on July 20, triggering at least a G1-class (minor) geomagnetic storm. However, no magnetic storms were observed. Fig. 3 shows the GOES-18 X-ray flux (upper panel) and the GOES-16 proton flux (bottom panel). The X- ray flux peaks at 18:00 UT, while the proton flux has two peaks.The first (in orange) is due to the acceleration of protons during the impulsive fast-rising phase of the flare peaking at 18:09 UT. The delay between the X-ray and proton flux peaks is because the proton velocity is slightly less than c, and the proton path is longer. The second peak are the protons accelerated by CME shocks, peaking at 18:14 UT, and it’s the so-called gradual phase and is characterized by its long duration, up to several days. Fig. 4 shows the temporal coincidence between the GOES proton flux in the impulsive phase and New-Tupi
2401.00002v1.pdf
ddaad891-d4a2-446c-8f45-d42ab79f5630
4 Figure 3. Top panel: GOES-18 X-ray flux in two wave- lengths. Bottom panel: GOES-16 proton flux in three energy bands. Both on July 17-18, 2023. The orange area at the bottom (is a visual guide only) highlights the proton prompt emission during the flare impulsive phase. Figure 4. Top panel: GOES-16 proton flux in three energy bands. Bottom panel: New-Tupi counting rate expressed in variation (%). Both on July 17-18, 2023. The orange area at the top (is a visual guide only) highlights the proton prompt emission during the flare impulsive phase. Figure 5. From top to bottom: GOES-16 proton flux in three energy bands, 2nd to 4th panels, counting rate at New- Tupi muon detector, Yan ba Jing muon telescope, and Ker- guelen Neutron Monitor, respectively. To five consecutive days, from July 15-19, 2023. muon excess.Particles (mostly proton) are accelerated in this phase exclusively by the flare, during the fast- rising until to reach the first peak (orange sector) in Fig. 4. However, in the so-called gradual phase, protons ac- celerated by CME’s shocks, the proton flux does not reach the GeV energy range because there are no excess muons at ground level. 4.SPECTRAL ANALYSIS We perform a Monte Carlo simulation of air showers initiated by SEP (protons) using the CORSIKA code (Heck et al. 2012), together with the FLUKA interac- tion model (Battistoni et al. 2008), that works well at GeV and sub-GeV energies, including secondary parti- cle decay. The surviving particles are tracked through the atmosphere until they reach ground level (sea level). Most particles are muons with a small contribution of electrons and nucleons.
2401.00002v1.pdf
5918ad2b-e1d1-4049-b4de-a53cead731ac
Most particles are muons with a small contribution of electrons and nucleons. The aim is to obtain the yield function, Sµ(EP), that is, the number of muons at sea level per primary proton, for an estimate of the upper limit of the integral proton flux in the GeV energy range, associated with the im- pulsive phase of M-6-class flare with onset on July 17, 2023, at ∼18 UT. Fig. 6 (black squares) shows the Monte Carlo output under the New-Tupi geomagnetic conditions and vertical proton incidence, and fitting as
2401.00002v1.pdf
52f0820f-75d9-4244-96b0-689d39b24885
5 Figure 6. Yield function, as the number of muons at the sea level per proton (vertical incidence), as a function of incident proton energy, from CORSIKA-FLUKA simulations, taking into account the SAA’s central region magnetic conditions. The red dashed curve shows a fit function. Figure 7. Correlation between the coefficient Ap and the spectral index β. All possible values of Ap and βcompatible with the New-Tupi muon counting rate excess (black solid curve) and the high-energy GOES-16 proton fluence F (red dot curve). These quantities are defined by equations 3 and 5, respectively. Sµ(EP) =AµEν Pexp(−E0/EP), (1) where Aµ= (6.8±1.4)×10−3,ν= 1.18±0.24, and E0= 10.2±2.1 GeV. Fig. 6 shows the fits (red dot line). Figure 8. Integral proton flux: the red circles represent the GOES-16 data.Integral proton flux: the red circles represent the GOES-16 data. It corresponds to the GOES-16 proton flux prompt emission (orange area in Fig. 3. The black square represents the proton flux obtained from the muon excess on the New-Tupi detector (and Monte Carlo calculations), observed in coincidence with the radiation storm. In addition, we assume here that the energy spectrum of solar protons in the GeV energy range, which is in the high-energy tail of the SEP spectrum, can be fitted by a single power-law function. JP(EP) =APEβ P. (2) There are two unknown quantities in the above power- law function: the coefficient APand the spectral index β. A convolution between the yield function Sµ(EP) and the proton spectrum JP(EP) gives the response function (Augusto et al.
2401.00002v1.pdf
51e91cd1-dead-4397-823d-4e1c447ad045
2016b), which is the number of muons in the excess signal at New-Tupi detector generated by the SEP during the period T. We express this convolution as Jµ=Z∞ EminSµ(EP)F(θ)APEβ PdEP, (3) where F(θ)∼exp(θ/C) is the pitch angle distribution (Shea & Smart 1982; Miroshnichenko et al. 2005). In the central region of SAA (New-Tupi), the transverse geomagnetic component is only B⊥= 18 .3 mT, that is, almost 80% smaller than the transverse component, at the same latitude, but outside from the SAA region, favoring the focusing factor of the geomagnetic parallel
2401.00002v1.pdf
c4a4ec30-6878-4de3-bdb9-369c158b9bf9
6 geomagnetic on the incident solar protons (small pitch angles). For the present event, we found exp( θ/C)∼1. The muon excess associated with protons emitted dur- ing the impulsive phase (see Fig. 4), and considering an effective angular aperture of 60 degrees around the zenith of the New-Tupi detector, the counting rate ex- cess is Jµ= (3.20±2.51)×10−3muons/ (cm2s sr),(4) Furthermore, we also obtain the integrated time pri- mary fluence as F=TZ∞ EmindEPAPEβ PEP . (5) For the present case, the GOES-proton fluence in the high-energy region (Ep ≥50) MeV is F∼(46.0±34.9)MeV/ (cm2sr), (6) The terms on the left side of Eq. 1 and Eq. 5 are known.1 and Eq. 5 are known. Thus, we can consider all possible values of β andAPcompatible with the observed muon counting rate excess, Jµ, and the integrated GOES-proton fluence F. Fig. 7 summarizes the situation. Giving: Ap= (1.20±0.96)×10−3/(cm2s sr GeV ) andβ= 1.89±1.10. To make a comparison with satellite GOES data, we obtain the integral proton flux in the GeV energy range as JP(> E P) =Z∞ EminAPE−β PdEP. (7) Fig. 8 shows the results of the integral proton flux ob- tained from the New-Tupi muon excess observed in co- incidence with the radiation. The red circles represent the GOES-16 data, and the black squares represent the expected proton flux in the GeV energy range obtained from Monte Carlo, muon excess at the New-Tupi detec- tor, and the GOES-proton fluence.The origin of this transient event was the solar eruption, an M6-class flare (prompt emission), accelerating protons (ions) up to rel- ativistic energies, GeV energy range. 5.CONCLUSIONS We have reported evidence of SEPs accelerated up to GeV energies during the eruptive phase of the M6-class solar flare on July 17, 2023. The result comes from a timing analysis of a muon excess from the New-Tupidetector at the SAA central region. Muons at New-Tupi are produced by protons (ions) interaction in the upper atmosphere reaching the Earth with a magnetic rigidity above 3 GV ( ∼3 GeV for protons). In most cases, SEP (mostly protons) detected by the GOES-16 spacecraft shows two steps. An impulsive phase, where the acceleration of protons (ions) is by the prompt emission of flare, followed by a gradual phase of long duration, where the acceleration of protons (ions) is by the associated CME shock waves.We want to point out that the muon excess produced by SEPs with an effective rigidity above the cutoff ( ∼ 3 GV) at the New-Tupi muon detector is in temporal coincidence only with the GOES proton flux from the impulsive phase (see Fig. 4) . Consequently, in the grad- ual phase, the protons accelerated by CME’s shocks do not reach the GeV energy range because a muon excess is absent at ground level. A marginal muon excess also appears on the Yan ba Jing S-21(pointing 21 degrees south) muon telescope (in Tibet). Also, a marginal particle excess is seen only in the French Kerguel NM (close to the South polar re- gion). In both cases, the excesses are in (temporal) co- incidence with the GOES proton flux (impulsive phase). However, it is hard to verify whether these excesses are genuine due to low confidence or simply fluctuations in the detectors’ count rate.
2401.00002v1.pdf
93441254-0e4a-49df-b252-4b445ce4214e
From a Monte Carlo analysis, we show that the SAA central region is favourable to the observation of tran- sient solar events, especially SEP, because the magneto- sphere has a ”dip ´´in this region, weakening the geo- magnetic field strength and allowing the entrance of charged particles at large deeps in a region not far from the geo- graphic Equator, giving a rigidity sub-cutoff around 3.1 GV in a place where the conventional Stormer geomag- netic rigidity cutoff is around 10 GV. 6.ACKNOWLEDGMENTS This work is supported by the Rio de Janeiro Research Foundation (FAPERJ) under Grant E- 26/010.101128/2018. We thank to NMDB Database (www.nmdb.eu), founded under the European Union FP7 Program (Contract No. 213007) by provide NMs data and the Space Weather Prediction Center from NOAA for its open data policy. APPENDIX
2401.00002v1.pdf
994d5272-abf0-4345-9e07-42a701d1035c
7 A.NEW-TUPI DETECTOR The New-Tupi telescope is built with four identical particle detectors, forming two telescopes, as shown in Fig. 8 from Augusto et al. (2016a). Each detector consisting of an Eljen EJ-208 plastic scintillator slab of 150 cm x 75 cm x 5 cm and a Hamamatsu R877 photomultiplier of 127 millimeters in diameter, packaged in a pyramidal box. The PMT high voltage divider, amplifier, and high voltage power supplier are in the ORTEC ScintiPackTM Photomultiplier Base 296. From February 6, 2023, we have implemented a data acquisition system using a VERTILON high-speed pulse counting system (MCPC618-8 Channel). allowing for direct connection with the PMTs without the need for external preamplifiers, with a 250 MHz count rate per channel. Now the detector is working only in scaler mode or single particle technique (Aglietta et al. 1996), where the single hit rates of all four PMTs, are recorded once a second.However, so far, only two detectors are working. The coincidences among these detectors of each telescope will be implanted. Also, the barometric coefficients for cosmic muon fluxes at the Earth’s surface can be obtained using the CORSICA code in Kovylyaeva et al. (2013). For New-Tupi detector conditions and at sea level, the barometric coefficient is about -0.14% per mb, about eight to nine times less than the typical barometric coefficient in NMs.
2401.00002v1.pdf
8d39a3bd-2393-479c-8fde-720ba10f0558
8 REFERENCES Aglietta, M., Alessandro, B., Antonioli, P., et al. 1996, Astrophysical Journal, 469, 305 Augusto, C., Navia, C., de Oliveira, M., Nepomuceno, A., & Fauth, A. 2016a, arXiv preprint arXiv:1603.08863 Augusto, C., Navia, C., de Oliveira, M. N., Fauth, A., & Nepomuceno, A. 2016b, Publications of the Astronomical Society of Japan, 68, 8 Battistoni, G., Cerutti, F., Empl, A., et al. 2008, Nuclear Physics B-Proceedings Supplements, 175, 88 Cade III, W. B., & Chan-Park, C. 2015, Space Weather, 13, 99 Casolino, M., De Simone, N., De Pascale, M. e., et al.2009, Nuclear Physics B-Proceedings Supplements, 190, 293 Chupp, E., Debrunner, H., Fl¨ uckiger, E., et al. 1987, The Astrophysical Journal, 318, 913 Finlay, C. C., Kloss, C., Olsen, N., et al. 2020, Earth, Planets and Space, 72, 1 Heck, D., Pierog, T., & Knapp, J. 2012, Astrophysics Source Code Library, ascl Hu, S., & Semones, E. 2022, Journal of Space Weather and Space Climate, 12, 5 Kovylyaeva, A., Dmitrieva, A., Tolkacheva, N., & Yakovleva, E. 2013, Journal of Physics: Conference Series, 409, 012128Meyer, P., Parker, E., & Simpson, J. 1956, Physical Review, 104, 768 Miroshnichenko, L., Klein, K.-L., Trottet, G., et al.
2401.00002v1.pdf
af917804-60e9-4a93-bcfd-54583ba90713
2005, Journal of Geophysical Research: Space Physics, 110 Moraal, H., Belov, A., & Clem, J. 2000, Space Science Reviews, 93, 285 Pav´ on-Carrasco, F. J., & De Santis, A. 2016, Frontiers in Earth Science, 4, 40 Shea, M., & Smart, D. 1982, Space Science Reviews, 32, 251 —. 2012, Space science reviews, 171, 161 Simpson, J. A. 2000, in Cosmic Rays and Earth: Proceedings of an ISSI Workshop, 21–26 March 1999, Bern, Switzerland, Springer, 11–32 Smart, D., & Shea, M. 2009, Advances in Space Research, 44, 1107 Vald´ es-Galicia, J., Muraki, Y., Watanabe, K., et al. 2009, Advances in Space Research, 43, 565 Zhang, J., Tan, Y., Wang, H., et al.2010, Nuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment, 623, 1030
2401.00002v1.pdf
35aae815-6a3f-4d4c-a9ba-917154325074
arXiv:2312.00001v1 [math.ST] 8 Jul 2023ON RANDOM PAIRWISE COMPARISONS MATRICES AND THEIR GEOMETRY. JEAN-PIERRE MAGNOT Abstract. We describe a framework for random pairwise comparisons matrices, inspired by selected constructions releted to th e so called inconsistency reduction of pairwise comparisons (PC) matr ices. In to build up structures on random pairwise comparisons matrice s, the set up for (deterministic) PC matrices for non-reciprocal PC ma trices is completed. The extension of basic concepts such as inconsis tency indexes and geometric mean method are extended to random pairwise co mparisons matrices and completed by new notions which seem useful to us . Two procedures for (random) inconsistency reduction are sketc hed, based on well-known existing objects, and a fiber bundle-like decomp osition of random pairwise comparisons is proposed. Keywords: Pairwise comparisons, stochastic models, Abelian Yang-Mi lls theory, inconsitency, reciprocity.MSC (2020): 90B50, 81T13, 91B06 Contents Introduction 2 1. A not-so-short introduction to pairwise comparisons as a class of abelian Yang-Mills theory 3 2. A theory of non reciprocal pairwise comparisons and weigh ts: deterministic settings 6 2.1. Preliminary settings on Mn(R∗ +)and its remarkable subsets 6 2.2. Weights as projective coordinates 7 2.3. (Reciprocal) pairwise comparisons 8 2.4. Non-reciprocal pairwise comparisons and related indi cators 9 2.5. On the geometry of the tower CPCn⊂PCn⊂Mn(R∗ +). 10 2.6. Inconsistency on Mn(R∗ +) 12 3. Random pairwise comparisons 14 3.1. The settings 14 3.2. Stochastic analogs to deterministic constructions 15 3.3. Minimizing inconsitency: a sketch of two methods 16 4.
2312.00001v1.pdf
e1a999e8-36fa-4b8f-bdc4-17eb2ad19a2d
Minimizing inconsitency: a sketch of two methods 16 4. A formal geometric picture for random pairwise compariso ns and geometric concerns 18 5. Outlook 19 Appendix: One motivating example on exchange rates 19 References 20 1
2312.00001v1.pdf
dfa9e135-d4ee-4b25-a1e0-08f20e025d6e
2 JEAN-PIERRE MAGNOT Introduction The wide popularity of the pairwise comparison methods in th e field of multi- criteria decision analysis mostly due to their simpl icity and their adaptability. Since it is a natural approach to compair two b y two the items under control, it is not surprising that the first systematic use of pairwise comparisons is attributed to Ramon Llull [5] during the thir teenth-century. Very probabily, people interested in comparisons passed fr om qualitative to quantitative evaluations for the obvious gan in simplici ty of interpretation. The twentieth-century precursor of the quantitative use of pairwise comparison was Thurstone [39] and the pairwise comparison method has be en progressively improved till the groundbreaking work of Saaty [36]. In this article Saaty proposed the Analytic Hierarchy Process (AHP), a new multip le-criteria decision-making method. Thanks to the popularity of AHP the pairwise comparison method has become one of the most frequently used decision- making techniques. Its numerous applications include most existing fields such as economy (see e.g.Its numerous applications include most existing fields such as economy (see e.g.[32]), consumer research [10], man agement [40], military science [6, 13], education and science (see e.g. [2 5]) among others. Besides its great popularity, its wide and intensive applica tion in everyday’s life highlights tremendouly its weakness with respect to th e following to aspects: •Popularity of the decision-making methods also makes them v ulnerable to at- tacks and manipulations. This problem has been studie d by several researchers including Sasaki [37], on strategic ma nipulation in the context of group decisions with pairwise comparisons . Some aspects of decision manipulation in the context of electora l systems are presented in e.g. [38]. •Even in honestly made evaluations, a small change in the scor es in the pairwise comparisons [43] or of the secondary criteria s uch as the so-called inconsistency index [31] can change drastica lly the final result of the ranking procedure.
2312.00001v1.pdf
7c49cc01-cb37-46ac-b44c-ee637878c8ca
We have recently linked explicitely inconsistency in pairw ise comparisons (PC) with Yang-Mills theories, showing a possible (non-Abe lian) generalization of the classical framework [27, 29]. Our approach is not the o nly one where pairwise comparisons coefficients are not numerals, see e.g. [2, 20, 32, 45], but the link with existing lattice-based or distretized gauge t heories appears to us very promising, not only because of the very wide literature on the subject, but also because gauge theories also seem to be promising can didates to furnish applications out of the field of physics, see e.g. the amazing [26], or [42] in Neuronal network and [8, 14, 47] in finance. We have her e to precise that discretization of gauge theories (in order to recover a continuum limit) are very often treated under the lights of Whitney approxima tions [46] of differential forms and connections on trivial principal bun dles, see e.g.[1], and very rarely from the viewpoint of the discretization com monly proposed by quantum gravity [35] based on the computation of the holon omies (in the
2312.00001v1.pdf
ef767ad2-1683-4162-b6f9-b37fc98a6f28
ON RANDOM PAIRWISE COMPARISONS MATRICES AND THEIR GEOMETRY . 3 physics sense) of the connections along the 1-vertices of th e triangulation (see [28] for a rigorous description of the discretization p rocedure). These are holonomy-like discretized connections that we conside r in this work, that can therefore be identified with function from oriented 1-ve rtices with values in the structure group, that satisfy so-called reciprocity conditions. In this communication, we intend to develop a theory of rando m pairwise comparisons matrices that was shortly sketched at the end of [29], and describe the structures of the proposed sets, in order to ext end the notions of weight, consistency, inconsistency indicator, in a stocha stic context focusing on the very usual choice of R∗ +as a structure group.Inspired by the correspondence between R∗ +−gauge theories in quantum gravity and classical pairwise comparisons (PC) matrices highlighted in [29], we follow up this first approach by replacing a pairwise comparisons matrix by a pro bability on the space of pairwise comparisons matrices, understood as a ran dom variable, in the same spirit as the statistical mechanics replace a par ticule with fixed position by a probability. In other words, we propose here a fi rst quantization of pairwise comparisons. This seems necessary to us in view o f the variations, dishonest or not, that it is important to modelize in order to have a better control on them as explained before. For this, the necessity of the use of non-reciprocal pairwise comparisons matrices, an extende d class of pairwise comparisons that may not follow the logic rule of reciprocit y, also appears to us as mandatory.Therefore, after an oriented summary of the existing framew ork (of interest for us) in this direction, mostly based on [29], in order to de fine safely random pairwise comparisons matrices, we extend the geomet ry of classical PC matrices understood as an abelian group, to non reciproca l PC matrices which project to the total tangent space of the first group. Th is enables us to extend the notion of consistency to non-reciprocal (de terministic) PC matrices and define canonical projections on remarkable sub sets, inconsistency indicators, reciprocity indicators and so-called total in dexes that “gather” the two criteria, consistency and reciprocity, in their eva luation. With these deterministic tools at hand, we define their stochatic analo gs on random PC matrices and stochastic projections on remarkable subse ts of random matrices.
2312.00001v1.pdf
9730f095-6406-47db-b525-c6679da4abcb
Meaningful decompositions of the space of random matrices are described, and two complementary stochastic methods are pr oposed for reduction of stochastic non-reciprocity, stochastic inconsistency , with in mind the problem of finding out weights for a final evaluation of the items at han d. 1.A not-so-short introduction to pairwise comparisons as a class of abelian Yang-Mills theory A paiswise comparisons matrix (ai,j)is an×nmatrix with coefficients in R∗ +={x∈R|x >0}such that ∀i,j, a j,i=a−1 i,j.
2312.00001v1.pdf
7fe07aa3-6ed4-4dba-8ee1-ecbe21d17576
4 JEAN-PIERRE MAGNOT It is easy to explain the inconsistency in pairwise comparis ons when we consider cycles of three comparisons, called triad and repr esented here as (x,y,z), which do not have the “morphism of groupoid” property such a s x∗z̸=y, which reads as xz̸=y in the multiplicative group R∗ +.The use of “inconsistency” has a meaning of a measure of inconsistency in this study; not the concept its elf. An approach to inconsistency (originated in [16]) can be reduced to a sim ple observation: •search all triads (which generate all 3 by 3 PC sub matrices) a nd locate the worst triad with a so-called inconsistency indic ator (ii), •iiof the worst triad becomes iiof the entire PC matrix. Expressing it a bit more formally in terms of triads (the uppe r triangle of a PC sub matrix 3×3), we have Koczkodaj’s index , see e.g.[4, 21]: (1) Kii(x,y,z) = 1−min{y xz,xz y} = 1−e−|ln(y xz)|. For the sake of completeness, we notice here that this definit ion allows us to localize the inconsistency in the matrix PC and it is of a co nsiderable importance for most applications. But this aspect will be wor ked out in future works, and we prefer here to concentrate of reduction of the inconsistency. This inconsistency indicator extends to n×nPC matrices by: (2) Kiin(A) = max (i,j)∈N2n,i<j( 1−e−⏐⏐⏐⏐ln( aij ai,i+1ai+1,i+2...aj−1,j)⏐⏐⏐⏐) whereNn={1,···,n} ⊂N,but also by various ways to combine inconsistency of triads, see e.g. the examples studied in the recent work [3 1].
2312.00001v1.pdf
fb5f3470-5a66-4405-bb90-c5da5c8e4dbe
the examples studied in the recent work [3 1]. Another common procedure on pairwise comparisons matrices changes the multiplicative group (R∗ +,.)to the additive group (R,+)with the same (obvious) adaptations of the formulas. These transformati ons, natural from a group-theoric viewpoint and in one-to-one correspondenc e via logarithmic maps, are actually perceived as no-so natural in the framewo rk of decision theory. Out of psychological reasons, this basically comes from the fact that in the framework of pairwise comparisons, the important pro cedure consists in finding an efficient way to reduce an inconsistency indicato r, which may not beKii3orKiinbut another, which is chosen because more adapted to the contextual problems. For this, one defines priority vectors which intend to give a “best way” to reduce in a satisfying manner th e inconsistency, that is, the “score” of inconsistency produced by the incons istency index.Therefore, the correspondence between additive and multip licative pairwise comparisons matrices enables one to produce more simple for mulas and algorithms in the additive case. This correspondence is the key motivation for e.g. [19] where an apparently natural way to link any PC ma trix with
2312.00001v1.pdf
4c137b43-5c76-4988-94ac-5f420fb294ad
ON RANDOM PAIRWISE COMPARISONS MATRICES AND THEIR GEOMETRY . 5 a “prefered” consistent one is described. This impression o f simplicity and clarity is obtained by the use of basic geometrical methods, mostly the use of orthogonal vector spaces. However, in the actual state of knowledge, the choice any method for inconsistency reduction appears as ar bitrary from the viewpoint of applications while almost canonical from t he viewpoint of mathematical structures, because the procedure of reducti on of inconsistency may produce very far pairwise comparisons matrices that can be controlled by a small enough inconsistency indicator value [31]. Following [27, 29], let nbe the dimension of the PC matrices under consideration, and let us consider the n−simplex ∆n={ (x0,...,x n)∈Rn+1| (n∑ i=0xi= 1) ∧(∀i∈ {0,....n},xi≥0)} as a graph, made ofn(n−1) 2edges linking nvertices, equipped with a pre-fixed numerotation.Then there is a one-to-one and onto correspon dence between edges and the positions of the coefficients in the PC matrix. He nce, each PC matrix (ai,j)assigns the coefficient ai,jto the (oriented) edge from the i−th vertex to the j−th vertex. These are the holonomies of a connection, understood in its discretized analog (in a discretization t hrouhg holonomy around the oriented 1-vertices of the simplex). Minimizing holonomies is a quantum gravity analog of a classical R∗ +−Yang-Mills theory [35, 41]. Indeed, in the quantum gravity approach [35], the seek of flatness of t he curvature relies in the minimization of the distance between the loop h olonomies and 1,which is exactly the basic requirement of reduction of incon sistencies on triads.
2312.00001v1.pdf
34cfd52f-7c1e-43a0-a22d-108aab234c21
Following the preliminary note [27], there is one co nceptual problem in the correspondence between Koczkodaj’s inconsistency i ndex and the Yang-Mills functional, highlighted from a psychological v iewpoint in [31]. Koczkodaj’s inconsistency indicators read as: Kiin(A) = 1−exp( −max 1≤i<j≤n⏐⏐⏐⏐ln(aij ai,i+1ai+1,i+2...aj−1,j)⏐⏐⏐⏐) . In order to recover now the quamtum gravity analog [35] of the Yang-Mills action functional, one replaces max 1≤i<j≤n(...) by a quadratic mean. The choice of an inconsistency indicato r is not so easy and Koczdodaj’s, even if quite simple and easy to understand , cannot be such easily considered as the only interesting indicator fo r inconsistency in pairwise comparisons, see e.g. Saaty’s [4, 36].
2312.00001v1.pdf
fe9d92ba-c741-4218-8316-0c1a841fbcf1
6 JEAN-PIERRE MAGNOT These are all these relations that we now reinforce in this wo rk, by analyzing non-reciprocal pairwise comparisons matrices from this vi ewpoint with the help of complementary notions. 2.A theory of non reciprocal pairwise comparisons and weights: deterministic settings In the rest of the text, nis the dimension of the square matrices under consideration. 2.1.Preliminary settings on Mn(R∗ +)and its remarkable subsets. We consider here Mn(R∗ +)ans a smooth manifold of dimension n2with tangent spaceMn(R).We also define Gn= (R∗ +)n(this notation will be explained later).We recall that we note by PCnthe subset of Mn(R∗ +)made of matrices (ai,j)(i,j)∈N2nsuch that ∀(i,j)∈N2 n,ai,j=a−1 j,i (which implies that ∀i∈Nn, ai,i= 1) We define the following operations: (1)Mn(R∗ +)is stable for the matrix multiplication in Mn(R),noted by (M,N)↦→MN and we choose to keep the same notation for its restriction to Mn(R∗ +).
2312.00001v1.pdf
40155023-d18d-4a1c-827c-d8e60988cd8a
(2) The group multiplication in R∗ +extends to Mn(R∗ +)by identifying the matrices of Mn(R∗ +)with its coefficients, that is we make the identification Mn(R∗ +) = (R∗ +)n2.We therefore define a free Lie group structure on Mn(R∗ +)that we note by (A,B)∈Mn(R∗ +)2↦→C∈ Mn(R∗ +)whereC= (ci,j)(i,j)∈N2nand ∀(i,j)∈N2 n, ci,j=ai,jbi,j withA= (ai,j)(i,j)∈N2nandB= (bi,j)(i,j)∈N2n. PCnandCPCnare Lie subgroups of Mn(R∗ +)equipped with this multiplication.(3) The same way, reformulating and extending [29], ∗can be also applied toGnand there are three smooth actions of GnonMn(R∗ +)noted by L,RandAdand, noting G= (gk)k∈Nn∈GnandA= (ai,j)(i,j)∈N2n∈ Mn(R∗ +),they are defined respectively by L: (G,A)↦→(giai,j)(i,j)∈N2n ifi < j and L: (G,A)↦→(g−1 iai,j)(i,j)∈N2n ifi > j, R: (G,A)↦→(gjai,j)(i,j)∈N2n ifi < j and R: (G,A)↦→(g−1 jai,j)(i,j)∈N2n
2312.00001v1.pdf
69729b67-eced-48ec-86a1-c15ad03ad620
ON RANDOM PAIRWISE COMPARISONS MATRICES AND THEIR GEOMETRY . 7 ifi > j, and Ad(G,A) =L(G,R(G−1,A)). The last formula highlights the link of Gwith the gauge group of a discretized connection as described in [29] in a study on PCninstead ofMn(R∗ +).One can remark that the actions LandRcorrespond to∗−multiplicaton by matrices with constant lines (resp. const ant columns). (4) LetGnbe the group of n−permutations understood as the group of bijections of Nn.ThenGnacts indexwise (and hence smoothly) on Mn(R∗ +)and the submanifolds PCnandCPCnare stable under this action. 2.2.Weights as projective coordinates.2.2.Weights as projective coordinates. We recall that family of weights (wi)i∈Nn∈(R∗ +)nis relative to a consistent PC matrix A= (ai,j)(i,j)∈N2n∈ CPCn(R∗ +)if and only if ∀(i,j)∈N2 n,ai,j=wj wi. Therefore, we have another interpretation of weights of a co nsistent pairwise comparisons matrix: Proposition 2.1. There exists a smooth embedding φfromCPCn(R∗)to Pn(R)such that, for each A= (ai,j)(i,j)∈N2n∈CPCn,(wi)i∈Nn⊂(R∗ +)nare projective coordinates for φ(A)if and only if ai,j=wi/wj. The proof of the fact that φis an embedding is obvious. Proposition 2.2. φ(CPCn)is open and dense in Pn(R)and the map φis proper.
2312.00001v1.pdf
233ea54c-e09b-420a-ac43-f1645baca2dc
Proof.dimCPC n=dimPn(R) =n−1andφis an embedding therefore φ(A) is an open submanifold of Pn(R)andφis a diffeomorphism from CPCnto φ(CPCn),which implies that φis proper. Moreover, if we consider the canonical embaddings of Pn−1(R)intoPn(R),defined by sending (n−1) homogeneous coordinates into nhomogeneous coordinates after fixing one of them equal to 0,the set Pn(R)−φ(CPCn) is composed of the images of these nembeddings of Pn−1(R)intoPn(R), and, because each of them is of dimension n−2< n−1 =dimPn(R),each of them has an empty interior. Therefore φ(CPCn)is dense in Pn(R).□
2312.00001v1.pdf
1f429f25-f7fd-486b-a09e-b0a4ce292df2
8 JEAN-PIERRE MAGNOT 2.3.(Reciprocal) pairwise comparisons. We recall that a pairwise comparisons matrix is a matrix A∈Mn(R∗ +),such that ∀(i,j)∈N2 n, aj,i=a−1 i,j. This condition is called the reciprocity condition, and the word “reciprocal” is often omitted in the literature. However, since we consid er here a wider class of pairwise comparisons, that can fulfill the reciproc ity condition or not, we can use the more precise terminology “reciprocal pairwis e comparisons” when we feel a possible ambiguity in the text that could lead t o misleading statements. Following [29], PCnis a smooth manifold of dimensionn(n−1) 2. As a free abelian Lie group, it is a Riemannian exponential Li e group, as well asCPCn.Moreover, Theorem 2.3. [29]L(G3,CPC3) =PC3and∀n≥4,L(Gn,CPCn)̸= PCn.For application purposes, one not only needs to decide if a pa irwise comparisons matrix is consistent, but also if an inconsistent pairwise c omparisons matrix is “very” inconsistent or “not so much” inconsistent. This l eads to the definition of the following objects. Definition 2.4. Aninconsistency index is a map ii:PCn→R+such that ii−1(0) =CPCn. Aninconsistency indicator is an inconsistency index with values in [0,1]. Remark 2.5. This terminology is common in the literature, and it is somet imes applied to maps for which ii−1(0)also contains non consistent pairwise comparisons matrices. This ambiguity is due, to our feeling and to our kno wledge, mostly to the development of the theory with very popular maps, used historically to detect submatrices with the “highest” possible inconsis tency.
2312.00001v1.pdf
fc629182-8c74-4008-b827-62d2a8bdbeac
There are propositions on the conditions that must fulfill an inconsis tency index, which are not all equivalent, but most of them require that ii−1(0) =CPCn.This work is not the place for controversies on this subject, and w e decide to work in the context here announced. The same way, the actual state of knowledge do not produce a sh ared requirement for the regularity of the map ii.Does it need to be continuous, derivable or smooth? There are divergent opinions due to the various fields of interest of the authors and, again, to the historical develo pment of the theory. For example, one of the most famous scales for inconsistency envolves natural numbers from 0to9(Saaty’s scale). The regularity that we assume for an inconsistency index will be precised in the statements. The family{ ii−1([0,ǫ))|ǫ∈R∗ +} forms a base of filter around CPCn[29].In [31], inconsistency indexes of sufficient regularity are treated as scalar potentials on PCnthat have to be minimized by a gradient method.
2312.00001v1.pdf
b21421ce-cd92-47de-87b3-afc51c3d3d3b
ON RANDOM PAIRWISE COMPARISONS MATRICES AND THEIR GEOMETRY . 9 2.4.Non-reciprocal pairwise comparisons and related indicator s. We recall that a non-reciprocal pairwise comparisons matri x is a matrix A∈Mn(R∗ +),without any further assumption. In particular, if Ais not reciprocal, ∃(i,j)∈N2 n, ai,j̸=a−1 j,i, and more generally in our terminology, a non-reciprocal mat rix may be reciprocal or not reciprocal. We can then adapt the followin g definition from the notion of inconsistency index: Definition 2.6. Areciprocity index is a map ri:Mn(R∗ +)→R+such that ri−1(0) =PCn. Areciprocity indicator is an reciprocity index with values in [0,1]. Remark 2.7.Remark 2.7. In order to be coherent with the terminology of Definition 2.4 , we should prefer the terminology ”non-reciprocity index” i n the last definition. However, since this notion is new, we feel that it is subject t o adaptations in future developments and hence the terminology will be fixe d naturally by practice. In the same spirit, we have Definition 2.8. Aninconsistency and reciprocity index (ortotal index ) is a map iri:Mn(R∗ +)→R+such that iri−1(0) =CPCn. Aninconsistency and reciprocity indicator (ortotal indicator ) is an inconsistency and reciprocity index with values in [0,1]. Let us give now few classes of examples: Example 2.9.
2312.00001v1.pdf
af7dad1b-2d21-4111-90ae-6866c1540c31
Let us give now few classes of examples: Example 2.9. Letdbe the canonical Riemannian metric on the Lie group (Mn(R∗ +),∗)Then, for any γ∈R∗ +, A∈Mn(R∗ +)↦→d(A,PCn)γ is a reciprocity index and A∈Mn(R∗ +)↦→d(A,CPC n)γ is an inconsistency and reciprocity index. Moreover, if we r eplacedby another distance, we get another inconsistency index, and i f we moreover assume that the diameter of Mn(R∗ +)is 1, we get an inconsistency indicator. This class of indicators is different, but may be treated in th e same spirit, as those taken as case studies in [31].
2312.00001v1.pdf
0d27c7c5-2939-4d11-aaeb-7fa0bf4544c4
10 JEAN-PIERRE MAGNOT 2.5.On the geometry of the tower CPCn⊂PCn⊂Mn(R∗ +)..Indeed, Mn(R∗ +)completes the tower of Riemannian abelian Lie groups Mn(R∗ +)⊃PCn⊃CPCn and we now feel the need to investigate intrinsic geometric p roperties of these inclusions. Let us in particular study the inclusion PCn⊂Mn(R∗ +). Proposition 2.10. Mn(R)is the (abelian) Lie algebra of Mn(R∗ +)and the Lie algebra pcn⊂Mn(R)ofPCnis the vector space of skew-symmetric matrices with coefficients in R. Proof. SinceMn(R∗ +)andPCnare abelian Lie groups, the Lie bracket on their Lie algeba is vanishing. Moreover, since multiplicat ion is coefficientwise, its is trivial that Mn(R)is the Lie algebra of Mn(R∗ +).Finally, since (ai,j)(i,j)∈N2n∈Mn(R∗ +)is reciprocal if and only if ∀(i,j)∈N2 n, ai,j=a−1 j,i, we get, by differentiation of this constraint at ai,j= 1, that(ai,j)(i,j)∈N2n∈ Mn(R)is moreover in pcnif and only if ∀(i,j)∈N2 n, bi,j=−bj,i. □ Let us now split Mn(R∗ +)in order to recover, in some way that we will soon precise, a reciprocal and a non-reciprocal part.
2312.00001v1.pdf
97f45ad5-594d-4bf4-a44a-988b90ba03b2
Before that, we feel the need to recall the geometric mean method which projects PCntoCPCn through the projection πGMM defined by πGMM( (ai,j)(i,j)∈N2n) = (bi,j)(i,j)∈N2n with ∀(i,j)∈N2 n, bi,j=n√∏n k=1ai,k∏n k=1al,j. Remark 2.11. This method is also described in the case of additive pairwise comparisons matrices [19]but it is a simple fact that additive and multiplicative pairwise comparisons are in one to one correspondence, see e .g. the brief but very clear exposition in [43]. From a geometric viewpoint, additive pairwise comparisons form the Lie algebra of the group of multiplicat ive pairwise comparisons, which is trivially an exponential group. This easy fact will be of central interest very soon in our work.This easy fact will be of central interest very soon in our work. There is a straightforward projection πPC:Mn(R∗ +)→PCndefined by πPC( (ai,j)(i,j)∈N2n) = (bi,j)(i,j)∈N2n with ∀(i,j)∈N2 n, bi,j=√ ai,j/aj,i. Remark 2.12. If we analyze the diagonal coefficients of the image we get trivially that ∀i∈Nn, bi,i= 1
2312.00001v1.pdf
e6c50d8d-2db2-4c30-8edf-6586776581be
ON RANDOM PAIRWISE COMPARISONS MATRICES AND THEIR GEOMETRY . 11 Therefore, there is another natural projection that we call πNRdefined by πPC( (ai,j)(i,j)∈N2n) = (bi,j)(i,j)∈N2n with ∀(i,j)∈N2 n, bi,j=√ai,jaj,i. Next proposition is straigthforward: Proposition 2.13. ∀A∈Mn(R∗ +),A=πPC(A)∗πNR(A),and •ifA= (ai,j)(i,j)∈N2n, πPC(A) =πNR(A)⇔ ∀(i,j)∈N2 n,ai,j= 1 •πPC(Mn(R∗ +))∩πNR(Mn(R∗ +))is uniquely composed by the matrix A= (ai,j)(i,j)∈N2n,such that ∀(i,j)∈N2 n, ai,j= 1.In other words, the Lie group Mn(R∗ +)decomposes into a direct product of πPC(A)and ofπNR(A).Moreover, projections are Lie group morphisms. Lemma 2.14. dim( πNR(Mn(R∗ +))) =n(n+1) 2. Proof. A matrix in πNR(Mn(R∗ +))is symmetric in its off-diagonal coefficients, but it has its ndiagonal coefficients that may be different from 1.Therefore, the dimension of this Lie group isn(n+1) 2+n=n(n+1) 2. □ Proof of Proposition 2.13. Through direct calculations, the multiplication map ∗:πPC(Mn(R∗ +))×πNR(Mn(R∗ +))→Mn(R∗ +) is a morphism of connected Lie groups of the same dimension wi th trivial kernel, with ImπNR=KerπPCandImπPC=KerπNR.□ Let us now investigate a relationship with discretized conn ections that extends the existing identifications in PCn.For this, we first remark that Lemma 2.14 shows that the decomposition is not exactly a doub ling of the structure group from PCntoMn(R∗ +)becausedim( πNR(Mn(R∗ +))) > dim(PCn).Roughly speaking, the dimensions that we have “in more” in πNR(Mn(R∗ +)are the diagonal coefficients of the matrices. Therefore, we propose a new structure group G=TR∗ +=R∗ +×R.
2312.00001v1.pdf
499c8d3e-1c41-4345-8499-9047f1fa95e4