Observability of linear systems under adversarial attacks*

Size: px
Start display at page:

Download "Observability of linear systems under adversarial attacks*"

Transcription

1 Observabiity of inear systems under adversaria attacks* Michee S. Chong 1, Masashi Wakaiki 1 and João P. Hespanha 1 Abstract We address the probem of state estimation for muti-output continuous-time inear systems, for which an attacker may have contro over some of the sensors and inject (potentiay unbounded) additive noise into some of the measured outputs. To characterize the resiience of a system against such sensor attacks, we introduce a new notion of observabiity termed observabiity under attacks that addresses the question of whether or not it is possibe to uniquey reconstruct the state of the system by observing its inputs and outputs over a period of time, with the understanding that some of the avaiabe system s outputs may have been corrupted by the opponent. We provide computationay efficient tests for observabiity under attacks that amount to testing the (standard) observabiity for an appropriate finite set of systems. In addition, we propose two state estimation agorithms that permit the state reconstruction in spite of the attacks. One of these agorithms uses observabiity Gramians and a finite window of measurements to reconstruct the initia state. The second agorithm, takes the form of a switched observer that asymptoticay converges to the correct state estimate in the absence of additive noise and disturbances, or to a neighborhood of the correct state estimate in the presence of bounded noise and disturbances. I. INTRODUCTION This paper is motivated by the observation that computer contro systems can be especiay vunerabe to cyber attacks; most particuary remote sensors that can be infitrated and reprogrammed to report erroneous measurements. The issue of security is not new to the contro fied, in particuar in the areas of faut detection and identification (FDI) [7] and game theory [5]. Some of the recent work on the cyber security of contro systems has been focused on the effect of specific types of attacks on stabiity and/or estimation [12], such as fase data injection attacks [6], [3], denia-of-service attacks [1], [11] and integrity attacks [8]. Coser to the work presented here, there has aso been an effort to derive resuts that are independent of the attack type in works such as [9] and [2]. In [9], the authors mode the attacked system as a continuous-time descriptor system and view the attack signa as an unknown input. The authors then propose an agorithm that detects the presence of an attack. Another reated work focused on robust state estimation appeared in [2]. The authors of [2] characterized This materia is based upon work supported by the Nationa Science Foundation under Grant No. CNS and by the U.S. Army Research Laboratory and the U.S. Army Research Office under MURI grant No. W911NF M. Chong acknowedges the American Austraian Association for their support of this work. M. Wakaiki is supported by The Kyoto University Foundation. 1 The authors are with the Center for Contro, Dynamicasystems and Computation (CCDC), University of Caifornia, Santa Barbara, CA USA. {mchong, mwakaiki, hespanha}@ece.ucsb.edu the resiience of a discrete-time LTI system against attacks by the number of attacked sensors aowed for accurate state reconstruction. They aso proposed an error correction agorithm which exacty reconstructs the state and is made computationay efficient by transforming the optimization probem into a convex one, which is possibe ony under certain conditions. The scenario considered in this paper considers a continuous-time LTI system with N outputs, each measured by a potentiay vunerabe sensor. One then asks whether or not it is possibe to reconstruct the initia state of the system from an input/output time series if M ď N of these sensors have been taken over by an adversary that has fu contro over the measurement reported by the M infitrated sensors, with the understanding that we do not know which of the M sensors have been infitrated and, in fact, if they have been infitrated at a. When it is possibe to do state reconstruction under this scenario, we say that the LTI system is observabe under M attacks. The first key resut of this paper is a necessary and sufficient condition presented in Section II for observabiity under M attacks. This condition requires the number of sensors N to be arger than 2M and aso that a famiy of LTI systems (derived from our origina system) is observabe, under the usua notion of observabiity. It was expected for N ą M to be necessary for an N-output system to be observabe under M attacks since with N ď M there woud be no attack-free measurements eft to use for estimation. However, it is somewhat unexpected to see that N ą 2M is actuay necessary for an N-output system to be observabe under M attacks. The second key resut of the paper is an agorithm presented in Section III-A that ooks at the vaues of the system s input and a N measured outputs over a finite interva r, T s, T ă 8 and provides a correct estimate of the system s initia state, in spite of the fact that M of the N measured outputs may have been compromised by an attacker. As expected, this agorithm is ony appicabe to systems that are observabe under M attacks. In essence, the agorithm proposed constructs mutipe state estimates using observabiity Gramians and utiizes a consistency condition to seect the correct estimate. The third key resut is an observer-ike agorithm presented in Section III-B that (causay) creates an asymptoticay correct estimate of the system s current state based on the vaues of its past input and N (potentiay compromised) outputs. This agorithm is appicabe when the system is observabe under M attacks, but it actuay requires ess than that. In practice, it ony requires a notion of detectabiity

2 under M attacks. This is not surprising in view of the fact that this observer-ike agorithm does not promise state reconstruction in finite time (ony asymptoticay). For this agorithm, we actuay prove more than just asymptoticay correct state reconstruction, as we aso show that an additive bounded disturbance and additive bounded measurement noise to a N outputs wi resut in a bounded estimation error, by providing an input-to-state stabiity-ike bound on the estimation error, in terms of bounds on the disturbance and measurement noise [1]. Notation We denote the cardinaity of a set S as cardpsq. x denotes the Eucidean norm of a vector x P R n. }z} T denotes the supremum norm of a signa z on an interva T Ă r, 8q. The binomia coefficient is denoted `a b, where a, b are nonnegative integers. II. OBSERVABILITY UNDER ATTACKS Consider the foowing continuous-time LTI system with N outputs: 9x Ax ` Bu y i C i x ` D i u ` η i, i P t1,..., Nu, where the state vector is x P R nx, the input vector is u P R nu, the measured outputs are y i P R ni, and the η i P R ni denote additive, possiby unbounded attack signas that cannot be measured. We denote the soution to (1) for the input u and initia condition xpq x as xptq xpt; x, uq and the corresponding measured outputs as y i ptq y i pt; x, u, η i P t1,..., Nu. We seek to derive conditions under which the initia condition xpq of (1) can be reconstructed from the measured outputs y However, we are interested in the the possibiity that a subset y i, i P I Ă t1,..., Nu of the sensor outputs have been attacked, but we do not know which. Specificay, we assume that there is an unknown subset I Ă t1,..., Nu with at most M eements for which the corresponding η i, i P I are nonzero and coud be unbounded. This motivates the foowing definition of observabiity under attacks. Definition 1: The system (1) is observabe under M- attacks on the interva r, T s, T ă 8 if for every initia conditions xpq, xpq P R nx, input uptq, t ě, sets I, Ī Ă t1,..., Nu with at most M eements, and attack vectors η pη 1,..., η N q P N I, η p η 1,..., η N q P N Ī we have y i pt; xpq, u, η i q y i pt; xpq, u, η i q, P r, T s, i P t1,..., Nu ùñ xpq xpq. (2) The notation N I denotes the set tpη 1,..., η N q : η i P r, R Iu. In essence, this definition means that, when a system is observabe under M-attacks, there is at most one initia condition that is compatibe with the input signa u and the measured outputs y i P t1,..., Nu on the interva r, T s, regardess of which M of the N sensors have been attacked and the corresponding attack signas η i seected by the opponent. The foowing resut provides a necessary and sufficient condition for system (1) to be observabe under M-attacks, which permits checking whether a system is observabe under attacks using standard observabiity tests [4, Section 15.9]. The proof is provided in Section II-A. Theorem 1: For every integer M ě, the foowing statements are equivaent: (i) System (1) is observabe under M-attacks on the time interva r, T s, T ă 8. (ii) N ą 2M and, for every set J Ă t1,..., Nu with cardpj q ě N 2M, the pair pa, C J q is observabe, where C J is a matrix obtained by stacking a the output matrices C i, i P J from system (1). Theorem 1 impicity restricts the number of attacked outputs M to be ess than haf of the number of outputs N, which is consistent with the resut in [2] for the state estimation of discrete-time LTI systems under attacks. Remark 1: Since condition (ii) in Theorem 1 does not depend on T, we concude that if a system is observabe under attack on the interva r, T 1 s, T 1 ă 8, it is aso observabe under attack on r, T 2 s, for every T 2 ă 8. This means that xpq can be determined from future inputs uptq and outputs y i ptq, i P t1,..., Nu over an arbitrariy sma time interva r, T s. Remark 2: By defining M-attack observabiity for a cass of noninear systems of this form: 9x Ax ` φpuq, y i C i x ` ψ i puq ` η i for i P t1,..., Nu, in the same manner as Definition 1, the resuts of Theorem 1 can be extended to this cass of noninear systems under the assumption that the system is forward compete, i.e. the soution xptq exists for a t ě, for any initia condition xpq, input u and attack signa η i. In this case, this system is M-attack observabe if and ony if N ą 2M and, for every set J Ă t1,..., Nu with cardpj q ě N 2M, the pair pa, C J q is observabe in the usua sense. The foowing simpe exampes iustrate the use of Theorem 1 in checking the observabiity of the system (1) when M of the N outputs are under attack. Exampe 1: Consider the system 9x 1 x 2 ` u 9x 2 a 2 x 1 2ax 2, a ą, with N 3 outputs y i x T 1, x T T 2 ` ηi, for i P t1, 2, 3u. (4) The system (3) with outputs (4) is observabe in the usua sense. Since there are N 3 outputs, the maximum aowabe number of attacked outputs is M 1. We wi see that it is 1-attack observabe by writing system (3)-(4) in the form of (1) and appying Theorem 1. There are ony 3 sets J with N 2M 1 eement: t1u, t2u, t3u and the pairs pa, C 1 q, pa, C 2 q and pa, C 3 q are a observabe. Hence, the system is 1-attack observabe. However, we wi see in the next exampe that observabiity through every output does not necessariy coincide with M-attack observabiity. (3)

3 We now consider the same system (3), but with N 6 outputs defined as foows y i x 1 ` η i, for i P t1, 2, 3u, y i x 2 ` η i, for i P t4, 5, 6u. First, observe that this system is observabe in the usua sense. With N 6, the maximum aowabe number of attacked outputs is M 2. However, we wi see that this system is not 2-attack observabe, it is ony 1-attack observabe. By writing system (3) and (5) in the form of (1) and checking condition (ii) of Theorem 1, when M 1, we obtain ` N N 2M 15 combinations of J t3, 4, 5, 6u, t2, 4, 5, 6u, t1, 4, 5, 6u etc. where cardpj q 4 (ě N 2M) and we need to check the observabiity of the pairs `A, rc3 T, C4 T, C5 T, C6 T s, `A, T rc T 2, C4 T, C5 T, C6 T s, `A, T rc T 1, C4 T, C5 T, C6 T s, T etc. Since a such pairs are observabe, the system (3) with outputs defined in (5) is 1- attack observabe. However, when there are M 2 attacked outputs, we obtain 15 combinations of J t1, 2u, t1, 3u, t1, 4u, t1, 5u etc. where cardpj q 2 (ě N 2M) and we see that not a pairs pa, C J q are observabe, e.g. the pairs pa, rc1 T, C2 T s T q, pa, rc1 T, C3 T s T q, pa, rc2 T, C3 T s T q etc. are not observabe. Therefore, this system is not 2-attack observabe. A. Proof of Theorem 1 We first note that, in view of [4, Definition 15.2], condition (ii) in Theorem 1 can be equivaenty re-stated as (5) (ii) N ą 2M and for every set J Ă t1,..., Nu with cardpj q ě N 2M, and for every initia condition xpq P R nx, we have C i e At P J, t P r, T s ùñ xpq. (6) We wi thus prove Theorem 1 by showing that condition (i) is equivaent to (ii) above. (i) ùñ (ii) : Suppose by contradiction that (i) hods, but (ii) is fase, i.e., N ď 2M or there exists a set J Ă t1,..., Nu with cardpj q ě N 2M and an initia condition xpq P R nx, such that C i e At P J, t P r, T s and xpq. (7) First note that if N ď 2M, the empty set J H and an arbitrary non-zero initia condition satisfy (7). Henceforth, when (ii) is fase it is aways true that there exists a set J Ă t1,..., Nu with cardpj q ě N 2M and an initia condition xpq P R nx, such that (7) hods. We sha prove that this contradicts (i). To this effect, seect two disjoint sets I, Ī Ă t1,..., Nu, each with at most M eements, so that J t1, 2,..., NuzpI Y Īq. Next define attack vectors η pη 1,..., η N q P N I, η p η 1,..., η N q P N Ī so that η i ptq C i e At P I, η i ptq C i e At P where xpq is the non-zero initia condition from (7). Since η i ě, i R I and η i ě, i R Ī, this choice for the attack vectors eads to C i e At xpq ` η i ptq, η i ptq, C i e At xpq η i ptq, η i ptq, C i e At xpq, η i ptq η i ptq, and P J t1, 2,..., NuzpI Y P P Ī C i e At xpq ` η i ptq η i P t1,..., Nu, t P r, T s, (8) for some xpq. However, we can view the eft-hand side expression C i e At xpq ` η i ptq as the output y i ptq associated with the initia condition xpq, the zero input, and the attack η P N I ; whereas the right-hand side expression η i ptq can be considered as the output y i ptq associated with the zero initia condition, zero input, and attack η P N Ī. We have thus found two distinct initia conditions compatibe with the same outputs, which contradicts observabiity under M attacks and thus (i). (ii) ùñ (i): Suppose by contradiction that (ii) hods, but that (i) does not, and therefore that there exist initia conditions xpq, xpq P R nx, an input uptq, t ě, sets I, Ī Ă t1,..., Nu with at most M eements, and attack vectors η pη 1,..., η N q P N I, η p η 1,..., η N q P N Ī such that y i pt; xpq, u, η i q y i pt; xpq, u, η i P t1,..., Nu, t P r, T s and xpq xpq, which, using the variation of constants formua, means that C i e At xpq ` µ i ptq ` η i ptq C i e At xpq ` µ i ptq ` η i P t1,..., Nu, t P r, T s and xpq xpq, ş t where µ i ptq C eapt sq i Bupsqds. Since η i ě, i R I and η i ě, i R Ī, we concude that C i e At`xpq P J, t P r, T s and xpq xpq, where J t1, 2,..., NuzpI Y Īq is a set with no ess than N 2M eements, which is in contradiction with (ii). Therefore, we have shown that (ii) impies (i) and we have competed the proof. III. ESTIMATION ALGORITHMS From Theorem 1, we know that an N-output system (1) is M-attack observabe on r, T s if and ony if for every subset J of t1, 2,..., Nu with at east N 2M eements, the pair pa, C J q is observabe. In this case, we can construct state estimators based on measurements from N 2M or more outputs on the interva r, T s, which woud provide accurate state estimates in the absence of the attack signas η i. An essentia observation behind the design of the state estimators proposed here is that, for each combination of the

4 N M (greater than N 2M) outputs, we can construct one state estimator that woud produce a correct state estimate based on measurements from those outputs in the interva r, T s, in the absence of attacks η i on the chosen outputs. Moreover, assuming that at most M sensors have been attacked, for each of these sets of N M outputs, there is at east one subset of N 2M outputs that consists of attack-free outputs. Hence, a state estimator based on this subset of N 2M outputs wi resut in an accurate estimate. We expoit this fact by proposing agorithms that choose wisey among severa potentia estimates to obtain good state estimates for the system (1). We propose an estimator that uses observabiity Gramians for state reconstruction in finitetime in Section III-A and an observer-based estimator in Section III-B, which we prove to be robust with respect to noise and disturbances. A. A Gramian-based estimator Assume that the system (1) is M-attack observabe on r, T s. Given a set J Ă t1, 2,..., Nu with N 2M or more eements, we denote by ˆx J pq the initia state estimate produced by the observabiity Gramians using the input uptq and the outputs y i ptq, for a i P J coected in the interva r, T s, that woud be accurate if η i ptq, for every i P J and t P r, T s. One can show that such estimate is given by ˆx J pq W J p, T ş q 1 T s C T eat J ỹj psqds, (9) where ỹ J psq y J psq şs C J e Ar Buprqdr D J upsq (where y J and D J denotes the stacking of a y i and D i for i P J, respectivey) and W J p, T q ş T s C T eat J C J e As ds is the observabiity Gramian (see [4, Section 15.5]), which is invertibe because the pair pa, C J q is observabe (by Theorem 1). For each subset J Ă t1, 2,..., Nu with N M (ě N 2M) eements, define π J to be the argest deviation between the estimate ˆx J pq and any estimate that uses an N 2M subset P Ă J of the outputs used to construct ˆx J pq: π J max ˆx J pq ˆx P pq. (1) PĂJ :cardppq N 2M When a the η i, i P J are equa to zero, a the estimates that appear in the definition of π J wi be consistent and we have π J. This motivates the foowing state estimate: ˆxpq ˆx σ pq, σ arg min π J. (11) J Ăt1,2,...,Nu:cardpJ q N M When more than one π J achieve the minimum simutaneousy, we can choose σ to be any of them. We ca this scheme a finite-time Gramian-based estimator. The foowing can be proved about this state estimator. Theorem 2: Assume that the N-output system (1) is M- attack observabe and that the attack vector η beongs to N I for some set I Ă t1,..., Nu with cardpiq ď M. For every initia conditions xpq P R nx and input u, the foowing hods ˆxpq xpq, (12) where ˆxpq is the estimate produced by the Gramian-based estimator (9)-(11). Proof of Theorem 2. Since system (1) is M-attack observabe, we have from Theorem 1 that for any set J Ă t1, 2,..., Nu with cardpj q ě N 2M, the pair pa, C J q is observabe. Foowing standard deveopments for Gramianbased reconstruction (see Section 15.6 of [4]), we rewrite the estimate ˆx J pq of the initia condition (9) in terms of the true initia condition xpq as foows ˆx J pq W J p, T q 1 e AT s CJ T ỹ J psqds W J p, T q 1 e AT s CJ T C J xpsqds W J p, T q 1 e AT s CJ T ż s W J p, T q 1 e AT s CJ T D J upsqds ` W J p, T q 1 e AT s CJ T η J psqds, C J e Ar Buprqdrds xpq ` W J p, T q 1 e AT s CJ T η J psqds, (13) where η J denotes the stacking of a η i, for i P J. We obtain the ast equaity since the first three (attack-free) terms reconstruct the true initia condition xpq exacty according to [4, Section 15.6]. Since η pη 1, η 2,..., η N q P N I, we concude from (13) with J Ī Ă t1,..., NuzI with cardpīq N M and aso with J P Ă Ī, cardppq N 2M that ˆx Ī pq ˆx P pq xpq (14) which means that π Ī. Since π Ī and σ arg min π J, we have that π σ and therefore, J ˆx σ pq ˆx P Ă σ : cardppq N 2M. (15) Most importanty, since we are removing an additiona M eements from σ to obtain the sets P, regardess of what σ turns out to be, there is aways one set P Ă σ, with cardppq N 2M for which η i ptq, for a i P P, t ě. For this set ˆx P pq xpq and therefore we must necessariy have ˆx σ pq xpq, because of (15). Once we obtain an estimate of the initia condition ˆxpq, we can then generate the state estimate for system (1) at any time t ě using ˆxptq e Atˆxpq ` ż t e Apt sq Bupsqds. (16) Since we obtain ˆxpq xpq using the data uptq and yptq on the interva r, T s, we achieve a correct estimate in finite-time, which is an advantage over the observerbased estimator introduced in the next section. However, the impementation of the Gramian-based estimator requires the

5 inversion of the observabiity Gramians for each interva of time considered, which woud be computationay very intensive if we wanted to construct a time series of state estimates. We wi see that the observer-based estimator in the foowing section, ony invoves the soution of an ordinary differentia equations (ODEs), for which numericay efficient sovers are widey avaiabe. B. An observer-based estimator We now consider an augmented version of system (1) with a process disturbance d : r, T s Ñ R nx and measurement noise m i : r, T s Ñ R ny that enter the system in the foowing manner: 9x Ax ` Bu ` Bd y i C i x ` D i u ` η i ` m i, i P t1,..., Nu, (17) Opposite to the attack signas η i, a the measurement noise signas m i may be nonzero, but are typicay bounded. Our goa is to show that the observer-based estimated proposed beow is robust with respect to the process disturbance d and the measurement noise m i. Foowing the same framework as the Gramian-based estimator in Section III-A, we assume that the N-output system (17) is observabe through any N 2M outputs and construct an observer for every set J Ă t1,..., Nu with N M (ě N 2M) eements as foows: 9ˆx J Aˆx J ` Bu ` L J pŷ J y J q (18) ŷ J C J ˆx J ` D J u, where the matrix L J is chosen such that A ` L J C J is Hurwitz, which is aways possibe since every pair pa, C J q is observabe (and therefore detectabe) in view of Theorem 1. From the bank of ` N N M estimates ˆxJ, we choose the state estimate aong the ines foowed by the Gramian-based estimator in Section III-A: ˆxptq ˆx σptq ptq, (19) σptq π J ptq arg min π J ptq, (2) J Ăt1,2,...,Nu:cardpJ q N M max ˆx J ptq ˆx P ptq, (21) PĂJ :cardppq N 2M where the state estimate ˆx P for P Ă J with N 2M eements is generated in the same manner as (18). The foowing resut states that the proposed estimator is robust with respect to the disturbance d and measurement noise m i, where we denote the stacking of a m i, i P J as m J. Theorem 3: Assume that the augmented N-output system (17) is M-attack observabe and η i in (17) beongs to N I for some set I Ă t1,..., Nu with cardpiq ď M. There exist constants k, ᾱ, γ x and γ y ą such that for every initia condition xpq P R nx and input uptq, t ě, the foowing inequaity hods: xptq ˆxptq ď k expp ᾱtq max J ` γ x }d} r,ts ` γ y ˆmax }m J } r,ts J p xpq ˆx J pq q, t ě, (22) for any initia conditions xpq, ˆx J pq, ˆx P pq P R nx, for every P Ă J Ă t1,..., Nu where cardppq N 2M and cardpj q N M, as we as bounded signas d and m i, i P t1,..., Nu. Proof of Theorem 3. For an arbitrary set J Ă t1,..., Nu with cardpj q ě N 2M, the state estimation error x J : x ˆx J has the foowing error dynamics aong soutions to the process (17) and the observer (18): 9 x J pa ` L J C J q x J L J η J L J m J ` Bd. (23) Since A ` L J C J is Hurwitz, the soution to (23) satisfies x J ptq ď k J expp α J tq x J pq ` γ η }η J } r,ts `γ y }m J } r,ts ` γ x }d} ě, (24) where k J, α J, γ η, γ y and γ x ą. Since η i ptq, for a i P t1,..., NuzI and t ě, we concude from (24) with J Ī Ď t1,..., NuzI with cardpīq N M that x Ī ptq ď k Ī expp α Ī tq x Ī pq ` γ y }m Ī } r,ts `γ x }d} r,ts, t ě. (25) and aso for any set P Ă Ī with cardppq N 2M, we have from (24) with J P that x P ptq ď k P expp α P tq x P pq ` γ y }m P } r,ts `γ x }d} r,ts, t ě. (26) Recaing the definition of π Ī from (1), we have that π Ī ptq max ˆx Ī ptq ˆx P ptq max ď ˆx Ī ptq xptq ` xptq ˆx P ptq x Ī ptq ` max From (25) and (26), we obtain x P ptq. (27) π Ī ptq ď 2k expp αtq} x Ī pq} ` 2γ y }m Ī } r,ts ` 2γ x }d} r,ts, t ě, (28) where k : max that since P Ă tk Ī, k P u and α : min tα Ī, α P u. Observe Ī with cardppq N 2M, we have from Theorem 1 that there is at east 1 set of P, denoted by P, which satisfies x Pptq ď k expp αtq x Ppq `γ y }m P} r,ts ` γ x }d} r,ts, t ě. (29) Reca from (21) that ˆxptq ˆx σptq ptq where σptq arg min π J ptq, hence π σptq ptq ď π Ī ptq. Using the J :cardpj q N M ˇ fact that π σptq ptq : max ˇˆxσptq ptq ˆx P ptqˇˇ ě PĂσ:cardpPq N 2M ˆx σptq ptq ˆx P, we have from triange inequaity that xptq ˆx σptq ptq x σptq ptq xptq ˆx Pptq ` ˆx Pptq ˆx σptq ptq ď x Pptq ` ˆx Pptq ˆx σptq ptq ď x Pptq ` π σptq ptq ď x Pptq ` π Ī ptq, t ě. (3)

6 From (28) and (29), we have x σptq ptq ď 3k expp αtq maxt x Ppq, x Ī pq u `3γ y `maxt}m P} r,ts, }m Ī } r,ts u `3γ x }d} r,ts, t ě. (31) We see that (31) satisfies (22) by setting k : 3k, ᾱ : α, γ y : 3γ y and γ x : 3γ x, which concudes the proof. The proposed observer-based estimator provides exponentia convergence of the estimates to a neighborhood of the true states x under the assumption that the perturbed system (17) is M-attack observabe. In other words, the robust observer (18)-(21) generates an error system that is input-to-state stabe (ISS) according to the definition of [1] with respect to the process disturbance d and output measurement noises m i. When there are no disturbances, we obtain exponentia convergence of the estimates to the true states for a initia conditions. Remark 3: The observer-based estimator ony requires detectabiity as opposed to observabiity in the Gramian-based estimator, which is counterpointed by asymptotic, instead of finite-time convergence of the states. [9] F. Pasquaetti, F. Dorfer, and F. Buo. Attack detection and identification in cyber-physica systems. IEEE Transactions on Automatic Contro, 58(11): , November 213. [1] E.D. Sontag. Input to state stabiity: Basic concepts and resuts. Noninear and Optima Contro Theory, 1932:163 22, 28. [11] A. Teixeira, S. Amin, H. Sandberg, K.H. Johansson, and S.S. Sastry. Cyber security anaysis of state estimators in eectric power systems. In Proccedings of the 49th IEEE Conference on Decision and Contro (CDC), pages , 21. [12] A. Teixeira, I. Shames, H. Sandberg, and K.H. Johansson. A secure contro framework for resource-imited adversaries. Automatica, 214. Submitted. IV. CONCLUSIONS We introduced a new notion of observabiity for mutioutput continuous-time LTI systems, for which a subset of the outputs can be attacked by an adversary. A necessary and sufficient condition is derived which aows standard observabiity tests to be empoyed in checking whether a system is observabe under attacks. We propose two stateestimation agorithms: a finite-time Gramian-based estimator and an asymptotic observer-based estimator. For the atter, we show that it provides bounded estimation errors in an ISS-ike manner in the presence of bounded disturbances and measurement noise. Future works incude the consideration of the stabiization probem and reducing the computationa compexity of the proposed estimation agorithms. REFERENCES [1] S. Amin, A.A. Cárdenas, and S.S. Sastry. Safe and secure networked contro systems under denia-of-service attacks. In Hybrid Systems: Computation and Contro, pages Springer, 29. [2] H. Fawzi, P. Tabuada, and S. Diggavi. Secure estimation and contro for cyber-physica systems under adversaria attacks. IEEE Transactions on Automatic Contro, 59(6): , June 214. [3] J.M. Hendrickx, K.H. Johansson, R.M. Jungers, H. Sandberg, and K.C. Sou. Efficient computations of a security index for fase data attacks in power networks. IEEE Transactions on Automatic Contro, 214. Accepted. [4] J.P. Hespanha. Linear systems theory. Princeton University Press, 29. [5] M. Jones, G. Kotsais, and J.S. Shamma. Cyber-attack forecast modeing and compexity reduction using a game-theoretic framework. In Contro of Cyber-Physica Systems, pages Springer, 213. [6] Y. Liu, P. Ning, and M.K. Reiter. Fase data injection attacks against state estimation in eectric power grids. ACM Transactions on Information and System Security (TISSEC), 14(1):13, 211. [7] M.A. Massoumnia, G.C. Verghese, and A.S. Wisky. Faiure detection and identification. IEEE Transactions on Automatic Contro, 34(3): , March [8] Y. Mo, J.P. Hespanha, and B. Sinopoi. Resiient detection in the presence of integrity attacks. IEEE Transactions on Signa Processing, 62(1):31 43, January 214.

A Brief Introduction to Markov Chains and Hidden Markov Models

A Brief Introduction to Markov Chains and Hidden Markov Models A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,

More information

Input-to-state stability for a class of Lurie systems

Input-to-state stability for a class of Lurie systems Automatica 38 (2002) 945 949 www.esevier.com/ocate/automatica Brief Paper Input-to-state stabiity for a cass of Lurie systems Murat Arcak a;, Andrew Tee b a Department of Eectrica, Computer and Systems

More information

XSAT of linear CNF formulas

XSAT of linear CNF formulas XSAT of inear CN formuas Bernd R. Schuh Dr. Bernd Schuh, D-50968 Kön, Germany; bernd.schuh@netcoogne.de eywords: compexity, XSAT, exact inear formua, -reguarity, -uniformity, NPcompeteness Abstract. Open

More information

Analysis of Emerson s Multiple Model Interpolation Estimation Algorithms: The MIMO Case

Analysis of Emerson s Multiple Model Interpolation Estimation Algorithms: The MIMO Case Technica Report PC-04-00 Anaysis of Emerson s Mutipe Mode Interpoation Estimation Agorithms: The MIMO Case João P. Hespanha Dae E. Seborg University of Caifornia, Santa Barbara February 0, 004 Anaysis

More information

Conditions for Saddle-Point Equilibria in Output-Feedback MPC with MHE

Conditions for Saddle-Point Equilibria in Output-Feedback MPC with MHE Conditions for Sadde-Point Equiibria in Output-Feedback MPC with MHE David A. Copp and João P. Hespanha Abstract A new method for soving output-feedback mode predictive contro (MPC) and moving horizon

More information

THE REACHABILITY CONES OF ESSENTIALLY NONNEGATIVE MATRICES

THE REACHABILITY CONES OF ESSENTIALLY NONNEGATIVE MATRICES THE REACHABILITY CONES OF ESSENTIALLY NONNEGATIVE MATRICES by Michae Neumann Department of Mathematics, University of Connecticut, Storrs, CT 06269 3009 and Ronad J. Stern Department of Mathematics, Concordia

More information

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES Separation of variabes is a method to sove certain PDEs which have a warped product structure. First, on R n, a inear PDE of order m is

More information

4 1-D Boundary Value Problems Heat Equation

4 1-D Boundary Value Problems Heat Equation 4 -D Boundary Vaue Probems Heat Equation The main purpose of this chapter is to study boundary vaue probems for the heat equation on a finite rod a x b. u t (x, t = ku xx (x, t, a < x < b, t > u(x, = ϕ(x

More information

Separation of Variables and a Spherical Shell with Surface Charge

Separation of Variables and a Spherical Shell with Surface Charge Separation of Variabes and a Spherica She with Surface Charge In cass we worked out the eectrostatic potentia due to a spherica she of radius R with a surface charge density σθ = σ cos θ. This cacuation

More information

Symbolic models for nonlinear control systems using approximate bisimulation

Symbolic models for nonlinear control systems using approximate bisimulation Symboic modes for noninear contro systems using approximate bisimuation Giordano Poa, Antoine Girard and Pauo Tabuada Abstract Contro systems are usuay modeed by differentia equations describing how physica

More information

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries c 26 Noninear Phenomena in Compex Systems First-Order Corrections to Gutzwier s Trace Formua for Systems with Discrete Symmetries Hoger Cartarius, Jörg Main, and Günter Wunner Institut für Theoretische

More information

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After

More information

Lecture Note 3: Stationary Iterative Methods

Lecture Note 3: Stationary Iterative Methods MATH 5330: Computationa Methods of Linear Agebra Lecture Note 3: Stationary Iterative Methods Xianyi Zeng Department of Mathematica Sciences, UTEP Stationary Iterative Methods The Gaussian eimination (or

More information

Asynchronous Control for Coupled Markov Decision Systems

Asynchronous Control for Coupled Markov Decision Systems INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of

More information

NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS

NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS TONY ALLEN, EMILY GEBHARDT, AND ADAM KLUBALL 3 ADVISOR: DR. TIFFANY KOLBA 4 Abstract. The phenomenon of noise-induced stabiization occurs

More information

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete Uniprocessor Feasibiity of Sporadic Tasks with Constrained Deadines is Strongy conp-compete Pontus Ekberg and Wang Yi Uppsaa University, Sweden Emai: {pontus.ekberg yi}@it.uu.se Abstract Deciding the feasibiity

More information

Control with Minimum Communication Cost per Symbol

Control with Minimum Communication Cost per Symbol Contro with Minimum Communication Cost per ymbo Justin Pearson, João P. Hespanha, Danie Liberzon Abstract We address the probem of stabiizing a continuous-time inear time-invariant process under communication

More information

8 Digifl'.11 Cth:uits and devices

8 Digifl'.11 Cth:uits and devices 8 Digif'. Cth:uits and devices 8. Introduction In anaog eectronics, votage is a continuous variabe. This is usefu because most physica quantities we encounter are continuous: sound eves, ight intensity,

More information

Primal and dual active-set methods for convex quadratic programming

Primal and dual active-set methods for convex quadratic programming Math. Program., Ser. A 216) 159:469 58 DOI 1.17/s117-15-966-2 FULL LENGTH PAPER Prima and dua active-set methods for convex quadratic programming Anders Forsgren 1 Phiip E. Gi 2 Eizabeth Wong 2 Received:

More information

Nonlinear Output-Feedback Model Predictive Control with Moving Horizon Estimation

Nonlinear Output-Feedback Model Predictive Control with Moving Horizon Estimation Noninear Output-Feedback Mode Predictive Contro with Moving Horizon Estimation David A. Copp and João P. Hespanha Abstract We introduce an output-feedback approach to mode predictive contro that combines

More information

C. Fourier Sine Series Overview

C. Fourier Sine Series Overview 12 PHILIP D. LOEWEN C. Fourier Sine Series Overview Let some constant > be given. The symboic form of the FSS Eigenvaue probem combines an ordinary differentia equation (ODE) on the interva (, ) with a

More information

Another Class of Admissible Perturbations of Special Expressions

Another Class of Admissible Perturbations of Special Expressions Int. Journa of Math. Anaysis, Vo. 8, 014, no. 1, 1-8 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.1988/ijma.014.31187 Another Cass of Admissibe Perturbations of Specia Expressions Jerico B. Bacani

More information

Problem set 6 The Perron Frobenius theorem.

Problem set 6 The Perron Frobenius theorem. Probem set 6 The Perron Frobenius theorem. Math 22a4 Oct 2 204, Due Oct.28 In a future probem set I want to discuss some criteria which aow us to concude that that the ground state of a sef-adjoint operator

More information

Available online at ScienceDirect. IFAC PapersOnLine 50-1 (2017)

Available online at   ScienceDirect. IFAC PapersOnLine 50-1 (2017) Avaiabe onine at www.sciencedirect.com ScienceDirect IFAC PapersOnLine 50-1 (2017 3412 3417 Stabiization of discrete-time switched inear systems: Lyapunov-Metzer inequaities versus S-procedure characterizations

More information

Introduction to Simulation - Lecture 14. Multistep Methods II. Jacob White. Thanks to Deepak Ramaswamy, Michal Rewienski, and Karen Veroy

Introduction to Simulation - Lecture 14. Multistep Methods II. Jacob White. Thanks to Deepak Ramaswamy, Michal Rewienski, and Karen Veroy Introduction to Simuation - Lecture 14 Mutistep Methods II Jacob White Thans to Deepa Ramaswamy, Micha Rewiensi, and Karen Veroy Outine Sma Timestep issues for Mutistep Methods Reminder about LTE minimization

More information

4 Separation of Variables

4 Separation of Variables 4 Separation of Variabes In this chapter we describe a cassica technique for constructing forma soutions to inear boundary vaue probems. The soution of three cassica (paraboic, hyperboic and eiptic) PDE

More information

Integrating Factor Methods as Exponential Integrators

Integrating Factor Methods as Exponential Integrators Integrating Factor Methods as Exponentia Integrators Borisav V. Minchev Department of Mathematica Science, NTNU, 7491 Trondheim, Norway Borko.Minchev@ii.uib.no Abstract. Recenty a ot of effort has been

More information

An approximate method for solving the inverse scattering problem with fixed-energy data

An approximate method for solving the inverse scattering problem with fixed-energy data J. Inv. I-Posed Probems, Vo. 7, No. 6, pp. 561 571 (1999) c VSP 1999 An approximate method for soving the inverse scattering probem with fixed-energy data A. G. Ramm and W. Scheid Received May 12, 1999

More information

Combining reaction kinetics to the multi-phase Gibbs energy calculation

Combining reaction kinetics to the multi-phase Gibbs energy calculation 7 th European Symposium on Computer Aided Process Engineering ESCAPE7 V. Pesu and P.S. Agachi (Editors) 2007 Esevier B.V. A rights reserved. Combining reaction inetics to the muti-phase Gibbs energy cacuation

More information

VALIDATED CONTINUATION FOR EQUILIBRIA OF PDES

VALIDATED CONTINUATION FOR EQUILIBRIA OF PDES VALIDATED CONTINUATION FOR EQUILIBRIA OF PDES SARAH DAY, JEAN-PHILIPPE LESSARD, AND KONSTANTIN MISCHAIKOW Abstract. One of the most efficient methods for determining the equiibria of a continuous parameterized

More information

LECTURE NOTES 8 THE TRACELESS SYMMETRIC TENSOR EXPANSION AND STANDARD SPHERICAL HARMONICS

LECTURE NOTES 8 THE TRACELESS SYMMETRIC TENSOR EXPANSION AND STANDARD SPHERICAL HARMONICS MASSACHUSETTS INSTITUTE OF TECHNOLOGY Physics Department Physics 8.07: Eectromagnetism II October, 202 Prof. Aan Guth LECTURE NOTES 8 THE TRACELESS SYMMETRIC TENSOR EXPANSION AND STANDARD SPHERICAL HARMONICS

More information

THINKING IN PYRAMIDS

THINKING IN PYRAMIDS ECS 178 Course Notes THINKING IN PYRAMIDS Kenneth I. Joy Institute for Data Anaysis and Visuaization Department of Computer Science University of Caifornia, Davis Overview It is frequenty usefu to think

More information

A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC

A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC (January 8, 2003) A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC DAMIAN CLANCY, University of Liverpoo PHILIP K. POLLETT, University of Queensand Abstract

More information

CS229 Lecture notes. Andrew Ng

CS229 Lecture notes. Andrew Ng CS229 Lecture notes Andrew Ng Part IX The EM agorithm In the previous set of notes, we taked about the EM agorithm as appied to fitting a mixture of Gaussians. In this set of notes, we give a broader view

More information

Partial permutation decoding for MacDonald codes

Partial permutation decoding for MacDonald codes Partia permutation decoding for MacDonad codes J.D. Key Department of Mathematics and Appied Mathematics University of the Western Cape 7535 Bevie, South Africa P. Seneviratne Department of Mathematics

More information

14 Separation of Variables Method

14 Separation of Variables Method 14 Separation of Variabes Method Consider, for exampe, the Dirichet probem u t = Du xx < x u(x, ) = f(x) < x < u(, t) = = u(, t) t > Let u(x, t) = T (t)φ(x); now substitute into the equation: dt

More information

Tracking Control of Multiple Mobile Robots

Tracking Control of Multiple Mobile Robots Proceedings of the 2001 IEEE Internationa Conference on Robotics & Automation Seou, Korea May 21-26, 2001 Tracking Contro of Mutipe Mobie Robots A Case Study of Inter-Robot Coision-Free Probem Jurachart

More information

DISTRIBUTION OF TEMPERATURE IN A SPATIALLY ONE- DIMENSIONAL OBJECT AS A RESULT OF THE ACTIVE POINT SOURCE

DISTRIBUTION OF TEMPERATURE IN A SPATIALLY ONE- DIMENSIONAL OBJECT AS A RESULT OF THE ACTIVE POINT SOURCE DISTRIBUTION OF TEMPERATURE IN A SPATIALLY ONE- DIMENSIONAL OBJECT AS A RESULT OF THE ACTIVE POINT SOURCE Yury Iyushin and Anton Mokeev Saint-Petersburg Mining University, Vasiievsky Isand, 1 st ine, Saint-Petersburg,

More information

Math 124B January 31, 2012

Math 124B January 31, 2012 Math 124B January 31, 212 Viktor Grigoryan 7 Inhomogeneous boundary vaue probems Having studied the theory of Fourier series, with which we successfuy soved boundary vaue probems for the homogeneous heat

More information

Distributed average consensus: Beyond the realm of linearity

Distributed average consensus: Beyond the realm of linearity Distributed average consensus: Beyond the ream of inearity Usman A. Khan, Soummya Kar, and José M. F. Moura Department of Eectrica and Computer Engineering Carnegie Meon University 5 Forbes Ave, Pittsburgh,

More information

FRIEZE GROUPS IN R 2

FRIEZE GROUPS IN R 2 FRIEZE GROUPS IN R 2 MAXWELL STOLARSKI Abstract. Focusing on the Eucidean pane under the Pythagorean Metric, our goa is to cassify the frieze groups, discrete subgroups of the set of isometries of the

More information

A Statistical Framework for Real-time Event Detection in Power Systems

A Statistical Framework for Real-time Event Detection in Power Systems 1 A Statistica Framework for Rea-time Event Detection in Power Systems Noan Uhrich, Tim Christman, Phiip Swisher, and Xichen Jiang Abstract A quickest change detection (QCD) agorithm is appied to the probem

More information

Efficient Generation of Random Bits from Finite State Markov Chains

Efficient Generation of Random Bits from Finite State Markov Chains Efficient Generation of Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

arxiv: v1 [math.co] 17 Dec 2018

arxiv: v1 [math.co] 17 Dec 2018 On the Extrema Maximum Agreement Subtree Probem arxiv:1812.06951v1 [math.o] 17 Dec 2018 Aexey Markin Department of omputer Science, Iowa State University, USA amarkin@iastate.edu Abstract Given two phyogenetic

More information

Math 124B January 17, 2012

Math 124B January 17, 2012 Math 124B January 17, 212 Viktor Grigoryan 3 Fu Fourier series We saw in previous ectures how the Dirichet and Neumann boundary conditions ead to respectivey sine and cosine Fourier series of the initia

More information

Some Measures for Asymmetry of Distributions

Some Measures for Asymmetry of Distributions Some Measures for Asymmetry of Distributions Georgi N. Boshnakov First version: 31 January 2006 Research Report No. 5, 2006, Probabiity and Statistics Group Schoo of Mathematics, The University of Manchester

More information

BALANCING REGULAR MATRIX PENCILS

BALANCING REGULAR MATRIX PENCILS BALANCING REGULAR MATRIX PENCILS DAMIEN LEMONNIER AND PAUL VAN DOOREN Abstract. In this paper we present a new diagona baancing technique for reguar matrix pencis λb A, which aims at reducing the sensitivity

More information

BASIC NOTIONS AND RESULTS IN TOPOLOGY. 1. Metric spaces. Sets with finite diameter are called bounded sets. For x X and r > 0 the set

BASIC NOTIONS AND RESULTS IN TOPOLOGY. 1. Metric spaces. Sets with finite diameter are called bounded sets. For x X and r > 0 the set BASIC NOTIONS AND RESULTS IN TOPOLOGY 1. Metric spaces A metric on a set X is a map d : X X R + with the properties: d(x, y) 0 and d(x, y) = 0 x = y, d(x, y) = d(y, x), d(x, y) d(x, z) + d(z, y), for a

More information

Componentwise Determination of the Interval Hull Solution for Linear Interval Parameter Systems

Componentwise Determination of the Interval Hull Solution for Linear Interval Parameter Systems Componentwise Determination of the Interva Hu Soution for Linear Interva Parameter Systems L. V. Koev Dept. of Theoretica Eectrotechnics, Facuty of Automatics, Technica University of Sofia, 1000 Sofia,

More information

Cryptanalysis of PKP: A New Approach

Cryptanalysis of PKP: A New Approach Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in

More information

An explicit Jordan Decomposition of Companion matrices

An explicit Jordan Decomposition of Companion matrices An expicit Jordan Decomposition of Companion matrices Fermín S V Bazán Departamento de Matemática CFM UFSC 88040-900 Forianópois SC E-mai: fermin@mtmufscbr S Gratton CERFACS 42 Av Gaspard Coriois 31057

More information

In-plane shear stiffness of bare steel deck through shell finite element models. G. Bian, B.W. Schafer. June 2017

In-plane shear stiffness of bare steel deck through shell finite element models. G. Bian, B.W. Schafer. June 2017 In-pane shear stiffness of bare stee deck through she finite eement modes G. Bian, B.W. Schafer June 7 COLD-FORMED STEEL RESEARCH CONSORTIUM REPORT SERIES CFSRC R-7- SDII Stee Diaphragm Innovation Initiative

More information

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR 1 Maximizing Sum Rate and Minimizing MSE on Mutiuser Downink: Optimaity, Fast Agorithms and Equivaence via Max-min SIR Chee Wei Tan 1,2, Mung Chiang 2 and R. Srikant 3 1 Caifornia Institute of Technoogy,

More information

Approximate Bandwidth Allocation for Fixed-Priority-Scheduled Periodic Resources (WSU-CS Technical Report Version)

Approximate Bandwidth Allocation for Fixed-Priority-Scheduled Periodic Resources (WSU-CS Technical Report Version) Approximate Bandwidth Aocation for Fixed-Priority-Schedued Periodic Resources WSU-CS Technica Report Version) Farhana Dewan Nathan Fisher Abstract Recent research in compositiona rea-time systems has focused

More information

6 Wave Equation on an Interval: Separation of Variables

6 Wave Equation on an Interval: Separation of Variables 6 Wave Equation on an Interva: Separation of Variabes 6.1 Dirichet Boundary Conditions Ref: Strauss, Chapter 4 We now use the separation of variabes technique to study the wave equation on a finite interva.

More information

Paper presented at the Workshop on Space Charge Physics in High Intensity Hadron Rings, sponsored by Brookhaven National Laboratory, May 4-7,1998

Paper presented at the Workshop on Space Charge Physics in High Intensity Hadron Rings, sponsored by Brookhaven National Laboratory, May 4-7,1998 Paper presented at the Workshop on Space Charge Physics in High ntensity Hadron Rings, sponsored by Brookhaven Nationa Laboratory, May 4-7,998 Noninear Sef Consistent High Resoution Beam Hao Agorithm in

More information

Introduction to Simulation - Lecture 13. Convergence of Multistep Methods. Jacob White. Thanks to Deepak Ramaswamy, Michal Rewienski, and Karen Veroy

Introduction to Simulation - Lecture 13. Convergence of Multistep Methods. Jacob White. Thanks to Deepak Ramaswamy, Michal Rewienski, and Karen Veroy Introduction to Simuation - Lecture 13 Convergence of Mutistep Methods Jacob White Thans to Deepa Ramaswamy, Micha Rewiensi, and Karen Veroy Outine Sma Timestep issues for Mutistep Methods Loca truncation

More information

VALIDATED CONTINUATION FOR EQUILIBRIA OF PDES

VALIDATED CONTINUATION FOR EQUILIBRIA OF PDES SIAM J. NUMER. ANAL. Vo. 0, No. 0, pp. 000 000 c 200X Society for Industria and Appied Mathematics VALIDATED CONTINUATION FOR EQUILIBRIA OF PDES SARAH DAY, JEAN-PHILIPPE LESSARD, AND KONSTANTIN MISCHAIKOW

More information

A. Distribution of the test statistic

A. Distribution of the test statistic A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch

More information

Volume 13, MAIN ARTICLES

Volume 13, MAIN ARTICLES Voume 13, 2009 1 MAIN ARTICLES THE BASIC BVPs OF THE THEORY OF ELASTIC BINARY MIXTURES FOR A HALF-PLANE WITH CURVILINEAR CUTS Bitsadze L. I. Vekua Institute of Appied Mathematics of Iv. Javakhishvii Tbiisi

More information

PHYS 110B - HW #1 Fall 2005, Solutions by David Pace Equations referenced as Eq. # are from Griffiths Problem statements are paraphrased

PHYS 110B - HW #1 Fall 2005, Solutions by David Pace Equations referenced as Eq. # are from Griffiths Problem statements are paraphrased PHYS 110B - HW #1 Fa 2005, Soutions by David Pace Equations referenced as Eq. # are from Griffiths Probem statements are paraphrased [1.] Probem 6.8 from Griffiths A ong cyinder has radius R and a magnetization

More information

STA 216 Project: Spline Approach to Discrete Survival Analysis

STA 216 Project: Spline Approach to Discrete Survival Analysis : Spine Approach to Discrete Surviva Anaysis November 4, 005 1 Introduction Athough continuous surviva anaysis differs much from the discrete surviva anaysis, there is certain ink between the two modeing

More information

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks ower Contro and Transmission Scheduing for Network Utiity Maximization in Wireess Networks Min Cao, Vivek Raghunathan, Stephen Hany, Vinod Sharma and. R. Kumar Abstract We consider a joint power contro

More information

u(x) s.t. px w x 0 Denote the solution to this problem by ˆx(p, x). In order to obtain ˆx we may simply solve the standard problem max x 0

u(x) s.t. px w x 0 Denote the solution to this problem by ˆx(p, x). In order to obtain ˆx we may simply solve the standard problem max x 0 Bocconi University PhD in Economics - Microeconomics I Prof M Messner Probem Set 4 - Soution Probem : If an individua has an endowment instead of a monetary income his weath depends on price eves In particuar,

More information

Theory of Generalized k-difference Operator and Its Application in Number Theory

Theory of Generalized k-difference Operator and Its Application in Number Theory Internationa Journa of Mathematica Anaysis Vo. 9, 2015, no. 19, 955-964 HIKARI Ltd, www.m-hiari.com http://dx.doi.org/10.12988/ijma.2015.5389 Theory of Generaized -Difference Operator and Its Appication

More information

Nonlinear Gaussian Filtering via Radial Basis Function Approximation

Nonlinear Gaussian Filtering via Radial Basis Function Approximation 51st IEEE Conference on Decision and Contro December 10-13 01 Maui Hawaii USA Noninear Gaussian Fitering via Radia Basis Function Approximation Huazhen Fang Jia Wang and Raymond A de Caafon Abstract This

More information

Resilient State Estimation against Switching Attacks on Stochastic Cyber-Physical Systems

Resilient State Estimation against Switching Attacks on Stochastic Cyber-Physical Systems Resiient State Estimation against Switching Attacs on Stochastic Cyber-Physica Systems Sze Zheng Yong a Minghui Zhu b Emiio Frazzoi a Abstract In this paper, we address the resiient state estimation probem

More information

Efficiently Generating Random Bits from Finite State Markov Chains

Efficiently Generating Random Bits from Finite State Markov Chains 1 Efficienty Generating Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE

THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE KATIE L. MAY AND MELISSA A. MITCHELL Abstract. We show how to identify the minima path network connecting three fixed points on

More information

arxiv: v1 [math.fa] 23 Aug 2018

arxiv: v1 [math.fa] 23 Aug 2018 An Exact Upper Bound on the L p Lebesgue Constant and The -Rényi Entropy Power Inequaity for Integer Vaued Random Variabes arxiv:808.0773v [math.fa] 3 Aug 08 Peng Xu, Mokshay Madiman, James Mebourne Abstract

More information

K a,k minors in graphs of bounded tree-width *

K a,k minors in graphs of bounded tree-width * K a,k minors in graphs of bounded tree-width * Thomas Böhme Institut für Mathematik Technische Universität Imenau Imenau, Germany E-mai: tboehme@theoinf.tu-imenau.de and John Maharry Department of Mathematics

More information

Coupling of LWR and phase transition models at boundary

Coupling of LWR and phase transition models at boundary Couping of LW and phase transition modes at boundary Mauro Garaveo Dipartimento di Matematica e Appicazioni, Università di Miano Bicocca, via. Cozzi 53, 20125 Miano Itay. Benedetto Piccoi Department of

More information

The ordered set of principal congruences of a countable lattice

The ordered set of principal congruences of a countable lattice The ordered set of principa congruences of a countabe attice Gábor Czédi To the memory of András P. Huhn Abstract. For a attice L, et Princ(L) denote the ordered set of principa congruences of L. In a

More information

(f) is called a nearly holomorphic modular form of weight k + 2r as in [5].

(f) is called a nearly holomorphic modular form of weight k + 2r as in [5]. PRODUCTS OF NEARLY HOLOMORPHIC EIGENFORMS JEFFREY BEYERL, KEVIN JAMES, CATHERINE TRENTACOSTE, AND HUI XUE Abstract. We prove that the product of two neary hoomorphic Hece eigenforms is again a Hece eigenform

More information

Maximum likelihood decoding of trellis codes in fading channels with no receiver CSI is a polynomial-complexity problem

Maximum likelihood decoding of trellis codes in fading channels with no receiver CSI is a polynomial-complexity problem 1 Maximum ikeihood decoding of treis codes in fading channes with no receiver CSI is a poynomia-compexity probem Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department

More information

Approximated MLC shape matrix decomposition with interleaf collision constraint

Approximated MLC shape matrix decomposition with interleaf collision constraint Approximated MLC shape matrix decomposition with intereaf coision constraint Thomas Kainowski Antje Kiese Abstract Shape matrix decomposition is a subprobem in radiation therapy panning. A given fuence

More information

King Fahd University of Petroleum & Minerals

King Fahd University of Petroleum & Minerals King Fahd University of Petroeum & Mineras DEPARTMENT OF MATHEMATICAL SCIENCES Technica Report Series TR 369 December 6 Genera decay of soutions of a viscoeastic equation Saim A. Messaoudi DHAHRAN 3161

More information

Module 22: Simple Harmonic Oscillation and Torque

Module 22: Simple Harmonic Oscillation and Torque Modue : Simpe Harmonic Osciation and Torque.1 Introduction We have aready used Newton s Second Law or Conservation of Energy to anayze systems ike the boc-spring system that osciate. We sha now use torque

More information

On Some Basic Properties of Geometric Real Sequences

On Some Basic Properties of Geometric Real Sequences On Some Basic Properties of eometric Rea Sequences Khirod Boruah Research Schoar, Department of Mathematics, Rajiv andhi University Rono His, Doimukh-791112, Arunacha Pradesh, India Abstract Objective

More information

Asymptotic Properties of a Generalized Cross Entropy Optimization Algorithm

Asymptotic Properties of a Generalized Cross Entropy Optimization Algorithm 1 Asymptotic Properties of a Generaized Cross Entropy Optimization Agorithm Zijun Wu, Michae Koonko, Institute for Appied Stochastics and Operations Research, Caustha Technica University Abstract The discrete

More information

On colorings of the Boolean lattice avoiding a rainbow copy of a poset arxiv: v1 [math.co] 21 Dec 2018

On colorings of the Boolean lattice avoiding a rainbow copy of a poset arxiv: v1 [math.co] 21 Dec 2018 On coorings of the Booean attice avoiding a rainbow copy of a poset arxiv:1812.09058v1 [math.co] 21 Dec 2018 Baázs Patkós Afréd Rényi Institute of Mathematics, Hungarian Academy of Scinces H-1053, Budapest,

More information

Wave Equation Dirichlet Boundary Conditions

Wave Equation Dirichlet Boundary Conditions Wave Equation Dirichet Boundary Conditions u tt x, t = c u xx x, t, < x 1 u, t =, u, t = ux, = fx u t x, = gx Look for simpe soutions in the form ux, t = XxT t Substituting into 13 and dividing

More information

ACTIVE electrical networks, which require energizing sources for their operation, are most widely

ACTIVE electrical networks, which require energizing sources for their operation, are most widely 1 Stabiization heory For Active Muti-port Networks Mayuresh Bakshi Member, IEEE,, Virendra R Sue and Maryam Shoejai Baghini, Senior Member, IEEE, arxiv:1606.03194v1 [cs.sy] 10 Jun 2016 Abstract his paper

More information

Preconditioned Locally Harmonic Residual Method for Computing Interior Eigenpairs of Certain Classes of Hermitian Matrices

Preconditioned Locally Harmonic Residual Method for Computing Interior Eigenpairs of Certain Classes of Hermitian Matrices MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.mer.com Preconditioned Locay Harmonic Residua Method for Computing Interior Eigenpairs of Certain Casses of Hermitian Matrices Vecharynski, E.; Knyazev,

More information

Section 6: Magnetostatics

Section 6: Magnetostatics agnetic fieds in matter Section 6: agnetostatics In the previous sections we assumed that the current density J is a known function of coordinates. In the presence of matter this is not aways true. The

More information

IE 361 Exam 1. b) Give *&% confidence limits for the bias of this viscometer. (No need to simplify.)

IE 361 Exam 1. b) Give *&% confidence limits for the bias of this viscometer. (No need to simplify.) October 9, 00 IE 6 Exam Prof. Vardeman. The viscosity of paint is measured with a "viscometer" in units of "Krebs." First, a standard iquid of "known" viscosity *# Krebs is tested with a company viscometer

More information

Mode in Output Participation Factors for Linear Systems

Mode in Output Participation Factors for Linear Systems 2010 American ontro onference Marriott Waterfront, Batimore, MD, USA June 30-Juy 02, 2010 WeB05.5 Mode in Output Participation Factors for Linear Systems Li Sheng, yad H. Abed, Munther A. Hassouneh, Huizhong

More information

Error-free Multi-valued Broadcast and Byzantine Agreement with Optimal Communication Complexity

Error-free Multi-valued Broadcast and Byzantine Agreement with Optimal Communication Complexity Error-free Muti-vaued Broadcast and Byzantine Agreement with Optima Communication Compexity Arpita Patra Department of Computer Science Aarhus University, Denmark. arpita@cs.au.dk Abstract In this paper

More information

Distributed rendez-vous algorithms for a class of cyberphysical systems De Persis, Claudio; Postoyan, Romain

Distributed rendez-vous algorithms for a class of cyberphysical systems De Persis, Claudio; Postoyan, Romain University of Groningen Distributed rendez-vous agorithms for a cass of cyberphysica systems De Persis, Caudio; Postoyan, Romain Pubished in: Proceedings of the European Contro Conference IMPORTANT NOTE:

More information

1 Heat Equation Dirichlet Boundary Conditions

1 Heat Equation Dirichlet Boundary Conditions Chapter 3 Heat Exampes in Rectanges Heat Equation Dirichet Boundary Conditions u t (x, t) = ku xx (x, t), < x (.) u(, t) =, u(, t) = u(x, ) = f(x). Separate Variabes Look for simpe soutions in the

More information

Statistical Learning Theory: A Primer

Statistical Learning Theory: A Primer Internationa Journa of Computer Vision 38(), 9 3, 2000 c 2000 uwer Academic Pubishers. Manufactured in The Netherands. Statistica Learning Theory: A Primer THEODOROS EVGENIOU, MASSIMILIANO PONTIL AND TOMASO

More information

MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES

MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES ANDRZEJ DUDEK AND ANDRZEJ RUCIŃSKI Abstract. For positive integers k and, a k-uniform hypergraph is caed a oose path of ength, and denoted by

More information

FOURIER SERIES ON ANY INTERVAL

FOURIER SERIES ON ANY INTERVAL FOURIER SERIES ON ANY INTERVAL Overview We have spent considerabe time earning how to compute Fourier series for functions that have a period of 2p on the interva (-p,p). We have aso seen how Fourier series

More information

The Group Structure on a Smooth Tropical Cubic

The Group Structure on a Smooth Tropical Cubic The Group Structure on a Smooth Tropica Cubic Ethan Lake Apri 20, 2015 Abstract Just as in in cassica agebraic geometry, it is possibe to define a group aw on a smooth tropica cubic curve. In this note,

More information

Lecture 6 Povh Krane Enge Williams Properties of 2-nucleon potential

Lecture 6 Povh Krane Enge Williams Properties of 2-nucleon potential Lecture 6 Povh Krane Enge Wiiams Properties of -nuceon potentia 16.1 4.4 3.6 9.9 Meson Theory of Nucear potentia 4.5 3.11 9.10 I recommend Eisberg and Resnik notes as distributed Probems, Lecture 6 1 Consider

More information

Formulas for Angular-Momentum Barrier Factors Version II

Formulas for Angular-Momentum Barrier Factors Version II BNL PREPRINT BNL-QGS-06-101 brfactor1.tex Formuas for Anguar-Momentum Barrier Factors Version II S. U. Chung Physics Department, Brookhaven Nationa Laboratory, Upton, NY 11973 March 19, 2015 abstract A

More information

B. Brown, M. Griebel, F.Y. Kuo and I.H. Sloan

B. Brown, M. Griebel, F.Y. Kuo and I.H. Sloan Wegeerstraße 6 53115 Bonn Germany phone +49 8 73-347 fax +49 8 73-757 www.ins.uni-bonn.de B. Brown, M. Griebe, F.Y. Kuo and I.H. Soan On the expected uniform error of geometric Brownian motion approximated

More information

More Scattering: the Partial Wave Expansion

More Scattering: the Partial Wave Expansion More Scattering: the Partia Wave Expansion Michae Fower /7/8 Pane Waves and Partia Waves We are considering the soution to Schrödinger s equation for scattering of an incoming pane wave in the z-direction

More information

Integral Action in Output Feedback for multi-input multi-output nonlinear systems

Integral Action in Output Feedback for multi-input multi-output nonlinear systems 1 Integra Action in Output Feedback for muti-input muti-output noninear systems Daniee Astofi and Laurent Pray arxiv:1508.00476v1 [cs.sy] 3 Aug 015 Abstract We address a particuar probem of output reguation

More information

#A48 INTEGERS 12 (2012) ON A COMBINATORIAL CONJECTURE OF TU AND DENG

#A48 INTEGERS 12 (2012) ON A COMBINATORIAL CONJECTURE OF TU AND DENG #A48 INTEGERS 12 (2012) ON A COMBINATORIAL CONJECTURE OF TU AND DENG Guixin Deng Schoo of Mathematica Sciences, Guangxi Teachers Education University, Nanning, P.R.China dengguixin@ive.com Pingzhi Yuan

More information