Detecting Intrusion Faults in Remotely Controlled Systems

Size: px
Start display at page:

Download "Detecting Intrusion Faults in Remotely Controlled Systems"

Transcription

1 2009 Aerican Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 10-12, 2009 FrB11.3 Detecting Intrusion Faults in Reotely Controlled Systes Salvatore Candido and Seth Hutchinson Abstract In this paper, we propose a ethod to detect an unauthorized control signal being sent to a reote-controlled syste (deeed an intrusion fault or intrusion ) despite attepts to conceal the intrusion. We propose adding a rando perturbation to the control signal and using signal detection techniques to deterine the presence of that signal in observations of the syste. Detection of these perturbations indicates that an authorized or trusted operator is in control of the syste. We analyze a worst case scenario (in ters of detection of the intrusion), discuss construction of signal detectors, and deonstrate our ethod through a siple exaple of a point robot with dynaics. I. INTRODUCTION Recently, there has been increased interest in networked control systes. While the possibility of controlling systes over established wireless, shared, or public networks has any benefits, it also requires that security join established perforance characteristics such as perforance, reliability, and efficiency during the design process. With this in ind, researchers have begun to address security issues specific to control systes, e.g. [1], [2], and have continued to develop control schees to identify alfunctioning or alicious systes coponents, e.g. [3], [4], [5]. Typically protection of counication between an operator and a reote control syste involves cryptography. Whether using encryption, essage signing, or authentication, protection fro a unauthorized user, an intruder, relies on a secret key unknown to intruders [6], [7]. If an intruder finds away to disrupt the counication channel and route an alternate control signal to replace the operator s signal, it is possible that the loss of control ay go undetected for soe length of tie. If the intruder s goal is to conceal the intrusion and the operator s noinal control input is known or can be deduced in advance, the intruder can iic that control input and the operator will be oblivious to intrusion. This could be desirable because the intruder ay want to take control of the syste as soon as possible, to ensure that the intrusion will be successful, but not utilize that control until a tie when the operator has no recourse to stop the intruder s alicious actions. If alerted quickly enough, the operator could possibly take action to preept the alicious action of the intruder. However, typically no echanis is in place to detect loss of control if the intruder is content to wait patiently for S. Candido is in the Departent of Electrical and Coputer Engineering, University of Illinois, Urbana, IL 61801, USA candido@illinois.edu S. Hutchinson is a Professor in the Departent of Electrical and Coputer Engineering, University of Illinois, Urbana, IL 61801, USA seth@illinois.edu the opportune oent to act. Our goal is to autoate the detection of such an intrusion. To this end, we propose an augentation to typical security systes that uses the constant observations of the syste which are already present in any control applications. We propose to send a randoized secret signal through the control syste, which will allow the operator to authenticate that his signal is reaching and controlling the syste. Chosen properly, sall perturbations in the syste s input should produce subtle, yet detectable fluctuations in observations of the syste. Since this signal is randoized, the intruder cannot replicate it fro a priori knowledge. Thus, if it is detected during observation of the syste, it provides good evidence that the operator s control signal is, in fact, driving the reote syste. If these fluctuations cannot be found in the output, the operator is ade aware that the syste ay be coproised and can begin taking easures to assure or regain control. It is iportant to ephasize that our proposed ethod is intended to add an additional failsafe to an already secured syste, not stand alone as a security schee. It is eant for cases where the intruder is able to prevent the operator s control signal fro reaching the plant and replace it with another signal. It is not eant for situations where the intruder is able to gain control of the the coputer on board the reote syste. The type of attacks we consider, while not coprehensive, are increasingly iportant because of the escalating aount of control counication being relayed over networks with interediate routing points that ay vulnerable to or owned by an intruder. Our approach to this proble is, to the knowledge of the authors, novel but the atheatical tools used to ipleent the solution are siilar to those used in a filtering based approach to active fault detection [8]. In active fault detection [9], [10], [11], [12], [13] and active paraeter detection approaches [14], [15], a control signal is designed for the purpose of driving the syste in such a way as to allow the operator to decide, based on output, which of a set of possible odels best describes the syste. In our case, the control input is chosen to be rando so the intruder cannot reproduce it. We, therefore, design an optial decision rule that decides if the sequence of observations is best explained by the rando signal being present or not. There is a significant conceptual reseblance between our approach and digital waterarking (e.g. [16]). We wish to ebed a hidden signal in a sequence of observations of our syste and detect its presence to verify the control signal being sent to the syste is legitiate. However, there are a nuber of significant differences between this and the /09/$ AACC 4968

2 Fig. 1. Reote control syste block diagra. canonical waterarking proble. For exaple, the output of the syste, the signal to be waterarked, is not known when the auxiliary signal is applied and there are no concerns about an intruder intentionally reoving the waterark. While enhancing the security of the syste, this ethod has the downside of adding additional rando noise to the syste dynaics. However, in soe cases, sall perturbations in soe syste coponents can be negligible in the perforance of the overall syste. For exaple, a convoy of trucks oving hazardous aterials could slightly vary their noinal speed or position within a lane of a road. Both of these quantities can easily be onitored externally fro an observer watching the convoy fro above. Candidate systes to eploy this ethod should have stable basins of attraction around their noinal trajectory, be observed in a anner that cannot easily be coproised, and not attenuate high frequency signal coponents beyond detection. The contribution of this paper is to propose a new ethod for verifying control signals sent over a link between an operator and control syste by detecting when that link is coproised. We consider different types of systes and give conditions under which we can use an efficient, recursive decision rule. In cases where we can not, we discuss the theoretical difficulties and where nuerical algoriths ay be sufficient. We then present an exaple of our ethod on a siple hypothetical syste. Finally, we discuss soe shortcoings of our ethod and a nuber of questions that will need to be answered beyond our exploratory analysis. II. GENERAL SYSTEMS Consider the block diagra in Figure 1. We odel reote systes using stochastic, nonlinear differential equations of the for ẋ(t) = f (x(t), u(t)) + w(t) (1) y(t) = h (x(t), u(t)) + v(t) (2) where w(t) and v(t) are rando vectors corresponding to noise in the state and output odels, respectively. The vector x(t) is the state of the syste, f( ) is the syste equation which encodes syste dynaics, and h( ) is the output equation. The control u(t) is the input to the reote syste and y(t) is the observation. This reote syste is controlled over a counication channel and the desired control signal is r(t). A signal s(t) is randoly generated and added to r(t) by the trusted operator and then sent to the reote syste. This signal is the ain addition to the standard reote-controlled syste odel and the core idea is to detect intrusions by noting the absence of its effects in the observation of the syste s dynaics. Since s(t) is generated as needed, it is unknown to all parties except the trusted operator who records it as it is sent. This eans that detection of this signal in observations of the syste provides good evidence that the control signal sent over the channel has not been coproised by an intruder. We odel the signal received by the reote syste as u(t) = r(t) + s(t) + (t) where (t) is a rando vector corresponding to channel noise. We use the notation s(t) to indicate the part of the signal received by the reote syste. This signal will be different depending on whether the control signal originates fro the trusted operator or an intruder. The signal s(t) can either equal s(t), if the trusted operator s signal reaches the control syste, or soe other value, if an intruder has connected to the control syste. In our analysis, we consider the case where the intruder sends s(t) = 0 to iniize the difference between the u(t) with and without s(t). The operator observes z(t) = y(t) + n(t) where n(t) is also a rando vector and again corresponds to noise inherent in retrieving an observation over a counication channel. Several conditions, consistent with the goals of this ethod, ust be et for this schee to be practical. First, the operator s observations of the syste should be taken externally to the syste. This is iportant because if the observations are sent over the sae counication channel that is controlled by the intruder, the operator s inforation state could be anipulated. Secondly, we assue the intruder cannot siply switch control between the operator and hiself instantaneously. This assuption is reasonable as this ethod should be used in conjunction with other security easures that will be nontrivial for the intruder to break. If an intruder can break the security instantly and at will, then the otivation to conceal an intrusion is reoved. Finally, the intruder ust not be able to read the control signal being sent in real tie, and consequently learn s(t) in real tie. Although the intruder ay have prior knowledge of r(t), if he can siply detect s(t) as it is being transitted he ay be able to use that inforation to deceive the trusted operator. This condition can often be guaranteed by use of a provably secure encryption protocol [6] for securing the operator s control signal before transission over the channel. In this case, even if the intruder was able to obtain the encrypted version of the control signal, he could not extract the contents in real tie. Soe protocols coonly used to encrypt data for transission over an insecure network are RSA [17] and AES [18]. In this proble, we propose a strategy to detect an intruder attepting to conceal an intrusion by iicking the control strategy of the operator. Thus, the worst-case scenario will be an intruder who knows the operator s noinal reference control signal (without s(t)) exactly and also the probability distribution fro which s(t) is drawn. We consider the case where the intruder sends s(t) = 0 because it is the MMSE estiator for an intruder trying to predict s(t). By coparing 4969

3 predicted observations with and without rando perturbation to actual observations of the syste, the trusted operator can deterine if the rando perturbations added to the signal are influencing the control syste. Unfortunately, due to the stochastic nature of the syste, this deterination cannot be ade with coplete certainty in the general case. This is then a signal detection proble [19] with the signal being sent over an unorthodox transission channel. In this paper, we consider the discrete proble in which observations of the syste are given by the sequence {z(t)}. We will also treat {u t }, {r t }, and {s t } as discrete sequences.we will use the notation z i:j to denote a history of the signal z t between (and including) saples i and j, i.e. z i:j denotes {z i, z i+1,, z j }. The deterination of whether s t is present in u t is ade based the observations of z t by the trusted operator. We frae our decision as a hypothesis testing proble. After observing a sequence of N saples of the output, the proble is to decide between two possible hypotheses of the transitted signal: 1) H 0 : s 1:N = s 1:N, i.e. the trusted operator s control signal is received 2) H 1 : s 1:N = 0, i.e. an intruder s signal is received The decision is based on our observed output saples over that interval z 1:N. If we can say with certainty that s t is affecting the syste dynaics over a long enough tie span, this provides good evidence that the trusted operator is controlling the syste as no other party has a priori knowledge of s t, and the likelihood of an intruder replicating it fro only knowledge of the distribution of s t goes to zero as the nuber of saples increase. There are two ain issues to be overcoe to ipleent this fraework. First, we ust choose a decision rule that, given s 1:N, decides the hypothesis in a way that iniizes the probability of error. Secondly, in order to decide between these two hypotheses, we will need to copute the distributions P 1:N H 0 (z 1:N H 0 ) and P 1:N H 1 (z 1:N H 1 ), the probability density functions of 1:N under both hypotheses. Thus, we ust build a data representation that paraetrizes or coputes the pdf s. In cases where one cannot easily copute the distributions, an approxiation ay be sufficient. The decision rule will separate all saple histories z 1:N into two classes, R N and C = R N \. Based on the boundary of the decision set, a decision rule can be defined, δ : R N {0, 1}. We accept hypothesis H δ based on z 1:N. The decision rule and have the following relationship δ(z 1:N ) = { 1 z1:n 0 z 1:N C (3) In Sections II-A and II-B we show decision rules assuing we have an a priori distribution on the probability of intrusion and, for the case where we do not have this inforation, assuing the worst case. A. A Priori Knowledge of Probability of Intrusion In soe cases, it is feasible to estiate the frequency of attack on the syste. Assuing that we can estiate the probability of intrusion, we design a decision rule that iniizes p e, the probability of erroneous decision. Let π denote the probability that s t = s t, i.e. the trusted operator is in control of the syste. With probability 1 π, an intruder will control the syste. To deterine the optial with respect to p e, we iniize [ in p e(, π) = in (1 π) p 1:N H 1 (x H 1 )dx (4) C ] + π p 1:N H 0 (x H 0 )dx ( =(1 π) + in πp1:n H 0 (x H 0 ) (5) (1 π)p 1:N H 1 (x H 1 ) ) dx Since π, p 1:N H i (x H i ) 0, p e is iniized by choosing to be the set of locations where the integrand in (5) is negative. Thus, = { x R N : πp 1:N H 0 (x H 0 ) (1 π)p 1:N H 1 (x H 1 ) } and the optial decision rule is to accept H 1 if p 1:N H 0 (z 1:N H 0 ) p 1:N H 1 (z 1:N H 1 ) 1 π π is satisfied. The probability of error p e under this decision rule can be expressed as p e = in { πp 1:N H 0 (x H 0 ), (1 π)p 1:N H 1 (x H 1 ) } dx R N (7) although, in general, this quantity ay be expensive or ipossible to copute exactly. If z t is independent of z s for all t s, then the likelihood of any sequence z 1:N is just the product of the likelihoods of the eleents of the sequence. In this case, we can factor the likelihood ratio and the decision rule will be to accept H 1 if N [ ] pi H 0 (z i H 0 ) 1 π (8) p i H 1 (z i H 1 ) π i=1 This expression is, in general, coputationally feasible, while (6) ay be difficult or ipossible to copute. If the likelihood ratio can be factored then the likelihood ratio for t = N +1 can be coputed by ultiplying the single saple likelihood at t = N +1 by the likelihood ratio for t = N. The optiality condition in (4) can also be odified to weight the cost of the total probability of a false positive and false negative with respect to one another. However, the quantity iniized would no longer be the probability of error. B. No Prior Knowledge of Probability of Intrusion In cases where it is not feasible to estiate a probability of attack, the ethod of the previous section ay not be a practical solution. If we cannot deterine π a priori and prefer not to treat it as an arbitrary scaling of the decision (6) 4970

4 Fig. 2. Reote controlled stochastic, linear syste rule, we ay choose to ipleent the iniax decision rule. The cost function is in ax π p e (, π). [ ( ) p e (, π) = π p 1:N H 0 (x)dx p 1:N H 1 (x)dx ] C + p 1:N H 1 (x)dx (9) C Let (π) be the optial (iniizes p e ) given in the previous section for a fixed π. The function ax p e( (π), π) π over π [0, 1] is continuous and concave [19]. Fro (9) we can see that p e (, π) is linear in π given so, unless is chosen so that p e (, π) is independent of the choice π, the π that axiizes p e (, π) will be either zero or one. At the boundaries of the interval, p e ( (0), 0) = p e ( (1), 1) = 0 so the iniu average error ust be strictly zero or on the interior of the interval. Using Prop. II.C.1 fro [19], is a iniax rule if π (0, 1) and p 1:N H 0 (x H 0 )dx = p 1:N H 1 (x H 1 )dx (10) C For an arbitrary distribution, finding the set that satisfies (10) analytically ay not be possible. To find an approxiate nuerically, one can search [0, 1] for the optial π. This is done by choosing π i, the value to check at step i of the algorith and approxiating (π i ). Once the optial decision set for π i has been chosen by the criteria of Section II-A, copute p e ( (π i ), π i ) by perforing a nuerical integration. Based on the history of the π i s chosen and the probabilities of error coputed at those saples, one can choose π i+1 to reduce the interval in which π ay lie. If we reach arbitrarily close to π, check to ensure it is a iniax solution by testing to see if (10) is satisfied or if π is zero or one. If these conditions are not et, a non-randoized iniax decision rule ay not exist. In general, the perforance of this decision rule will not be as good as the one of the previous section but reoves the requireent for an estiate of the probability of intrusion. III. LINEAR SYSTEMS WITH GAUSSIAN NOISE As shown in the previous section, if the likelihood ratio can be factored, we can easily copute recursive decision rules. In this section, we discuss the special case of linear systes with Gaussian noise. A wide range of physical systes can be odeled or approxiated in this class of systes. We first briefly consider the special case of a eoryless syste, where no state estiator is required for the decision rule, and then the ore general case. Consider the special case of a eoryless channel with Gaussian, white noise. Since estiates of t do not depend on previous values of z t, the history of the output does not need to be paraetrized to copute the pdf of t. Let the syste equation be z t = D t u t + v t and, without loss of generality, consider v t to be both the noise fro the channel and within the reote controlled syste. The channel noise is v t N (0, Σ vt ) and {v t } is independent and identically distributed (iid). Since t has a Gaussian distribution, we can specify its distribution with the paraeters E t = D t (s t +r t ) and Var ( t ) = Σ vt. The rando variable t will be drawn fro the probability distribution P t H 0 (z t H 0 ) = N (D t (s t + r t ), Σ vt ) if s t = s t. If s t = 0 then t will be drawn fro P t H 0 (z t H 0 ) = N (D t r t, Σ vt ). Since the noise between saples is independent, the likelihood of any sequence z 1:N is just the product of the likelihoods of the eleents of the sequence between so the optial decision rule is to use the criterion of (8). In the ore general case, we consider a discrete stochastic, linear syste with additive, zero-ean Gaussian noise is odeled by the standard equations x t+1 = A t x t + B t u t + w t (11) z t = C t x t + D t u t + v t (12) where w t N (0, Σ wt ) and v t N (0, Σ vt ) as shown in Figure 2. Again, the rando variables w t and v t are due to both noise within the syste and on the counication channel. Once a state is added to the syste, two difficulties arise. First, Prob{ t = c} = Prob{ t = c z 1:t 1 } which eans we lose inforation by coputing the distribution of t without taking into account previous observations. Second, since t+1 depends on the noise at t as well as t + 1, t and s are no longer independent for t s. This eans the likelihood of z 1:N cannot necessarily be factored into the products of the likelihoods of the individual observations. Without this property, the pdf of 1:N could be a coplicated function that is possibly infeasible to copute or represent. We deal with the first proble by using a Kalan filter [20] to recursively copute an estiate of X t, the syste s state vector, conditioned on z 1:t 1. The second proble we will bypass by testing the innovation error between the observation and prediction of t. This quantity is Gaussian and uncorrelated with, thus independent of, previous innovation errors. We will copute the pdf s of sequences of innovation errors under H 0 and H 1 and use the likelihoods of the observed z 1:t 1 to decide intrusion. Define z t := t (C t E[X t z 1:t 1 ] + D t u t ) to be the innovation error of the observation process. It is a linear cobination of the rando variables t and E[X t z 1:t 1 ] and the output of the syste is a linear cobination of the rando variables X 0, {W t }, and V t. The syste odel requires these rando variables to be independent so they are jointly Gaussian (jg). Since t and E[X t z 1:t 1 ] are both linear cobinations of these jg rando variables, they theselves are jg and, since z t is a linear cobination of t and E[X t z 1:t 1 ], the innovation error is jg. 4971

5 The paraeters of the distribution z t conditioned on 1:t 1 are E[ z t 1:t 1 ] = 0 and Cov( z t 1:t 1 ) = C t Cov(X t ˆx t z 1:t 1 )Ct T + Σ vt. Since z t is jg, this copletely specifies the distribution z t N (0, C t Cov(X t ˆx t 1:t 1 )Ct T + Σ vt ). Now that we have deterined the distribution of z t, in order to use it at every stage of detection we will use the Kalan filter to store and propagate the paraeters of the distribution as new observations fro the syste becoe available [20]. Define ˆx t := E [X t 1:t 1 ] and Σˆxt := Var (X t ˆx t 1:t 1 ). The Kalan filter updates these two quantities recursively fro initial conditions ˆx 0 and Σˆx0 based on the uncertainty the initial state. We will only ention that the Kalan filter is the optial MMSE estiate for linear systes with Gaussian noise. For ore inforation on the Kalan filter, see [20], [21]. Our strategy is to use two Kalan filters to estiate the state of the syste. Both are given {z s } t 1 s=0 and one uses u t = r t +s t as the input, the other uses u t = r t as the input. As described above, we use these estiators to construct the paraetrization of the pdf of z t, the innovation error between the next observation and our prediction of that observation. We will test the likelihood of z t using both hypotheses and we will denote the ean and covariance of z t working under hypothesis H i as z t Hi and Σ zt Hi. We know fro the orthogonality principle [22] that E [ z t z s ] = 0 for all t s because the innovation error of the MMSE estiator is orthogonal to any function of the eleents of 1:t 1, which includes z s (assuing without loss of generality that t > s). Since z t and z s are uncorrelated and jg, they are independent. As the distribution of each z t is jg, the distribution of z 1:N will also be Gaussian. Since all the innovations are zero ean and independent of one another, the ean of z 1:N will be the zero vector of length N and the covariance atrix will be block diagonal with the i th block equaling C t Σˆxt Ct T + Σ vt. We will use the decision rules of Section II to decide intrusion using the likelihoods fro the two pdf s corresponding to H 0 and H 1. The optial decision rule when there is an a priori estiate of intrusion is analogous to (8), only using innovation errors. N ( ) p zi H 0 ( z i H 0 ) 1 π (13) p zi H 1 ( z i H 1 ) π i=1 In the case of no estiate of π, the decision boundary can be found analytically in the case of the pdf s being Gaussian. By varying π i and using nuerical approxiations to the Gaussian cdf, one can find the decision boundary that approxiately satisfies (10), the condition for a iniax solution. IV. EXAMPLE We now present an exaple of our fraework. Consider a point robot with ass and second order dynaics, oving on the real nuber line. The operator s control input is a scalar specifying the desired position of the robot to a PD controller. A specific trajectory for the robot r t is planned in Fig. 3. Exaple syste block diagra. advance by the trusted operator. At t = 0, an intruder ay have taken over the syste. If an intrusion has occurred, the goal of the intruder will be to avoid detection for as long as possible. The intruder has full knowledge of r t, the syste odel, and the distribution of s t. The trusted operator s goal is to detect an intrusion without deviating (ore than an additive rando Gaussian signal) away fro the preplanned r t. We will assue the noise in the process odel is Gaussian having zero ean and a diagonal covariance atrix with σ i, σ j, and σ k as the diagonal ters. The observation shows robot s position with additive Gaussian noise distributed according to N (0, σ o ). There is also channel noise with distributions N (0, σ ) and N (0, σ n ). This eans our full syste odel is x t+1 = z t = 1 t t x t + kp [ kp k d 0 k d u t + w t (14) ] x t + v t (15) where both w t and v t are ean zero and Gaussian.The atrix Σ w is diagonal with diagonal entries σ i, σ j, and σ + σ k and σ v = σ o + σ n. We have the option of choosing s t, so let it be another iid, Gaussian rando variable with zero ean and variance of σ s. This is the rando perturbation of which only the operator has knowledge, as it is generated online. We will track the state trajectory of the syste with two Kalan filters. We use the non-identity atrix coefficients of (14)-(15) along with the variances of v t and w t in the Kalan filters to estiate state. The two Kalan filters differ only in the signal u t given to the. The first, siulating H 0, will receive u t = r t + s t. The other, siulating H 1, will receive u t = r t. Then the likelihood of an innovation error of z = z t (C ˆx t Hi + Du t ) under hypothesis H i for the saple at tie t is [ L { z t H i } = (CΣˆxt Hi C T + σ v )] 1 2 2π { [ zt (C ˆx t Hi + Du t ) ] } 2 exp 2CΣˆxt Hi C T. (16) + σ v Since this is a linear syste and x 0, {w t }, and {v t } are jg, we know the likelihood ratio fro (8) is our optial decision rule. Thus, we can copute the likelihood ratio recursively for every t using L { z 1:t H 0 } L { z 1:t H 1 } = t s=1 L { z s H 0 } L { z s H 1 } = L { z 1:t 1 H 0 } L { z 1:t 1 H 1 } L { z t H 0 } L { z t H 1 } 4972

6 starting fro the initial condition where the likelihood ratio is one. If we have an a priori belief in the probability of intrusion, π, our decision rule will be L { z 1:t H 0 } L { z 1:t H 1 } 1 π π (17) If this inequality is satisfied, it signals the trusted operator that an intrusion is likely to have occurred. V. DISCUSSION The work presented in this paper is a proposed ethod, and significant exploration reains before a syste utilizing the principles discussed in this paper is deployed. This fraework is not designed to provide foolproof, coplete security for reotely controlled systes. Instead, we seek to augent current security easures by verifying the control signals sent to reote syste in environents where an intrusion ay go undetected due to a clever choice of control signals by the intruder. One cause for concern with this fraework is that if the reotely controlled syste is, for exaple, a low-pass filter, a high frequency s t ay not cause any significant effects in z t. Work will have to be done to quantify how large the agnitude of the rando signal will need to be in order to be detected in sufficiently few saples. Conversely, an s t with ore pronounced effects on the output will be easier to detect in the syste output. However, it will also, by definition, perturb the reote syste further away fro the noinal trajectory. As the reote syste oves along it s trajectory, it ay be possible to deterine criteria by which the distribution of s t could be adjusted autoatically based on the stability argin of the syste. For exaple, perhaps s t could be chosen to have a large effect in certain very stable configurations of the syste but when the syste is in a configuration where it could be easily pushed to instability, s t could be attenuated or set to zero teporarily. It ay also be possible to isolate the effects of s t on the overall trajectory of the syste if it is redundant. We ainly discussed the decision rule that used an a priori estiate of the probability of intrusion π. However, in practice, this will typically not be feasible to estiate, and using a iniax decision rule ay not be desirable. However, since π siply deterines the scaling factor of the likelihood ratio, it ay be chosen experientally. Another possible scenario if the operator is controlling any reote systes is to copute the likelihood ratios for each of the systes and attept to deterine if there is an outlier ratio, which would signal a possible intrusion. For the purpose of this paper, we assued that the intruder will sent u t = r t and not introduce an additional perturbation. Any additional perturbation would increase the expected ean square error between the operator s and intruder s control signals and it sees would ake intrusion easier for the operator to detect. However, it is possible that there is a perturbation that would be advantageous to the intruder. While ore exploration ust be done to deterine whether sending the MMSE of s t is an optial intruder strategy, we feel that the preliinary analysis perfored in this paper deonstrates the utility and the need for further exploration of this intrusion detection strategy. VI. CONCLUSIONS In suary, we have proposed a ethod to detect intrusions in reote-controlled systes. We have discussed the theory and ipleentation of this ethod and have shown a theoretical exaple of it on a siple robot syste. More exploration ust be done before this syste is ready for deployent but we are optiistic about the possibilities of intrusion detection using this ethod. REFERENCES [1] G. Baliga, S. Graha, C. Gunter, and P. Kuar, Reducing risk by anaging software related failures in networked control systes, in IEEE Conference on Decision and Control, 2006, pp [2] A. Saboori and C. Hadjicostis, Notions of security and opacity in discrete event systes, in CDC, 2007, pp [3] M. Franceschelli, M. Egerstedt, and A. Giua, Motion probes for fault detection and recovery in networked control systes, in Aerican Control Conference, 2008, pp [4] W. Chen and M. Saif, Output estiator based fault detection for a class of nonlinear systes with unknown inputs, in Aerican Control Conference, 2008, pp [5] R. Iserann, Fault-Diagnosis Systes: An Introduction Fro Fault Detection To Fault Tolerance. Springer, [6] O. Goldreich, Foundations of Cryptography. Cabridge University Press, [7] M. Benantar, Access Control Systes: Security, Identity Manageent and Trust Models. Springer, [8] X. hang, Auxiliary signal design in fault detection and diagnosis. Springer Verlag, [9] M. Siandl and I. Puncochar, Unified solution of optial active fault detection and optial control, in Aerican Control Conference, 2007, pp [10] F. Kerestecioglu and M. arrop, Input design for detection of abrupt changes in dynaical systes, International Journal of Control, vol. 59, no. 4, pp , [11] R. Nikoukhah, Guaranteed active failure detection and isolation for linear dynaical systes, Autoatica, vol. 34, no. 11, pp , [12] E. Courses and T. Surveys, Stochastic change detection based on an active fault diagnosis approach, in IEEE Conference on Decision and Control, 2007, pp [13] I. Andjelkovic, K. Sweetingha, and S. Capbell, Active fault detection in nonlinear systes using auxiliary signals, in Aerican Control Conference, 2008, pp [14] R. Mehra, Optial input signals for paraeter estiation in dynaic systes survey and new results, IEEE Transactions on Autoatic Control, vol. 19, no. 6, pp , [15] M. arrop, Optial experient design for dynaic syste identification. Springer Verlag, [16] I. Cox, M. Miller, J. Bloo, J. Fridrich, and T. Kalker, Digital Waterarking and Steganography. Morgan Kaufann, [17] R. Rivest, A. Shair, and L. Adlean, A ethod for obtaining digital signatures and public-key cryptosystes, Counications of the ACM, vol. 21, no. 2, pp , [18] J. Daeen and V. Rijen, The Design of Rijndael. Springer-Verlag, [19] H. V. Poor, An Introduction to Signal Detection and Estiation. Springer-Verlag, [20] R. Stengel, Optial Control and Estiation. Courier Dover Publications, [21] I. Rhodes, A tutorial introduction to estiation and filtering, IEEE Transactions on Autoatic Control, vol. 16, no. 6, pp , [22] H. Stark and J. Woods, Probability, Rando Processes, and Estiation Theory for Engineers. Prentice-Hall,

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

Using EM To Estimate A Probablity Density With A Mixture Of Gaussians

Using EM To Estimate A Probablity Density With A Mixture Of Gaussians Using EM To Estiate A Probablity Density With A Mixture Of Gaussians Aaron A. D Souza adsouza@usc.edu Introduction The proble we are trying to address in this note is siple. Given a set of data points

More information

SPECTRUM sensing is a core concept of cognitive radio

SPECTRUM sensing is a core concept of cognitive radio World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile

More information

Warning System of Dangerous Chemical Gas in Factory Based on Wireless Sensor Network

Warning System of Dangerous Chemical Gas in Factory Based on Wireless Sensor Network 565 A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 59, 07 Guest Editors: Zhuo Yang, Junie Ba, Jing Pan Copyright 07, AIDIC Servizi S.r.l. ISBN 978-88-95608-49-5; ISSN 83-96 The Italian Association

More information

An Improved Particle Filter with Applications in Ballistic Target Tracking

An Improved Particle Filter with Applications in Ballistic Target Tracking Sensors & ransducers Vol. 72 Issue 6 June 204 pp. 96-20 Sensors & ransducers 204 by IFSA Publishing S. L. http://www.sensorsportal.co An Iproved Particle Filter with Applications in Ballistic arget racing

More information

Extension of CSRSM for the Parametric Study of the Face Stability of Pressurized Tunnels

Extension of CSRSM for the Parametric Study of the Face Stability of Pressurized Tunnels Extension of CSRSM for the Paraetric Study of the Face Stability of Pressurized Tunnels Guilhe Mollon 1, Daniel Dias 2, and Abdul-Haid Soubra 3, M.ASCE 1 LGCIE, INSA Lyon, Université de Lyon, Doaine scientifique

More information

A Simple Regression Problem

A Simple Regression Problem A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where

More information

Ufuk Demirci* and Feza Kerestecioglu**

Ufuk Demirci* and Feza Kerestecioglu** 1 INDIRECT ADAPTIVE CONTROL OF MISSILES Ufuk Deirci* and Feza Kerestecioglu** *Turkish Navy Guided Missile Test Station, Beykoz, Istanbul, TURKEY **Departent of Electrical and Electronics Engineering,

More information

CS Lecture 13. More Maximum Likelihood

CS Lecture 13. More Maximum Likelihood CS 6347 Lecture 13 More Maxiu Likelihood Recap Last tie: Introduction to axiu likelihood estiation MLE for Bayesian networks Optial CPTs correspond to epirical counts Today: MLE for CRFs 2 Maxiu Likelihood

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

Combining Classifiers

Combining Classifiers Cobining Classifiers Generic ethods of generating and cobining ultiple classifiers Bagging Boosting References: Duda, Hart & Stork, pg 475-480. Hastie, Tibsharini, Friedan, pg 246-256 and Chapter 10. http://www.boosting.org/

More information

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna

More information

COS 424: Interacting with Data. Written Exercises

COS 424: Interacting with Data. Written Exercises COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information Cite as: Straub D. (2014). Value of inforation analysis with structural reliability ethods. Structural Safety, 49: 75-86. Value of Inforation Analysis with Structural Reliability Methods Daniel Straub

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

Reducing Vibration and Providing Robustness with Multi-Input Shapers

Reducing Vibration and Providing Robustness with Multi-Input Shapers 29 Aerican Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June -2, 29 WeA6.4 Reducing Vibration and Providing Robustness with Multi-Input Shapers Joshua Vaughan and Willia Singhose Abstract

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

The Transactional Nature of Quantum Information

The Transactional Nature of Quantum Information The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.

More information

Ch 12: Variations on Backpropagation

Ch 12: Variations on Backpropagation Ch 2: Variations on Backpropagation The basic backpropagation algorith is too slow for ost practical applications. It ay take days or weeks of coputer tie. We deonstrate why the backpropagation algorith

More information

Optimal Jamming Over Additive Noise: Vector Source-Channel Case

Optimal Jamming Over Additive Noise: Vector Source-Channel Case Fifty-first Annual Allerton Conference Allerton House, UIUC, Illinois, USA October 2-3, 2013 Optial Jaing Over Additive Noise: Vector Source-Channel Case Erah Akyol and Kenneth Rose Abstract This paper

More information

CONTROL SYSTEMS, ROBOTICS, AND AUTOMATION Vol. IX Uncertainty Models For Robustness Analysis - A. Garulli, A. Tesi and A. Vicino

CONTROL SYSTEMS, ROBOTICS, AND AUTOMATION Vol. IX Uncertainty Models For Robustness Analysis - A. Garulli, A. Tesi and A. Vicino UNCERTAINTY MODELS FOR ROBUSTNESS ANALYSIS A. Garulli Dipartiento di Ingegneria dell Inforazione, Università di Siena, Italy A. Tesi Dipartiento di Sistei e Inforatica, Università di Firenze, Italy A.

More information

Tracking using CONDENSATION: Conditional Density Propagation

Tracking using CONDENSATION: Conditional Density Propagation Tracking using CONDENSATION: Conditional Density Propagation Goal Model-based visual tracking in dense clutter at near video frae rates M. Isard and A. Blake, CONDENSATION Conditional density propagation

More information

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul

More information

Detection and Estimation Theory

Detection and Estimation Theory ESE 54 Detection and Estiation Theory Joseph A. O Sullivan Sauel C. Sachs Professor Electronic Systes and Signals Research Laboratory Electrical and Systes Engineering Washington University 11 Urbauer

More information

Topic 5a Introduction to Curve Fitting & Linear Regression

Topic 5a Introduction to Curve Fitting & Linear Regression /7/08 Course Instructor Dr. Rayond C. Rup Oice: A 337 Phone: (95) 747 6958 E ail: rcrup@utep.edu opic 5a Introduction to Curve Fitting & Linear Regression EE 4386/530 Coputational ethods in EE Outline

More information

MSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE

MSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE Proceeding of the ASME 9 International Manufacturing Science and Engineering Conference MSEC9 October 4-7, 9, West Lafayette, Indiana, USA MSEC9-8466 MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

Bootstrapping Dependent Data

Bootstrapping Dependent Data Bootstrapping Dependent Data One of the key issues confronting bootstrap resapling approxiations is how to deal with dependent data. Consider a sequence fx t g n t= of dependent rando variables. Clearly

More information

Analyzing Simulation Results

Analyzing Simulation Results Analyzing Siulation Results Dr. John Mellor-Cruey Departent of Coputer Science Rice University johnc@cs.rice.edu COMP 528 Lecture 20 31 March 2005 Topics for Today Model verification Model validation Transient

More information

On Conditions for Linearity of Optimal Estimation

On Conditions for Linearity of Optimal Estimation On Conditions for Linearity of Optial Estiation Erah Akyol, Kuar Viswanatha and Kenneth Rose {eakyol, kuar, rose}@ece.ucsb.edu Departent of Electrical and Coputer Engineering University of California at

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths

More information

Fixed-to-Variable Length Distribution Matching

Fixed-to-Variable Length Distribution Matching Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de

More information

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Proc. of the IEEE/OES Seventh Working Conference on Current Measureent Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Belinda Lipa Codar Ocean Sensors 15 La Sandra Way, Portola Valley, CA 98 blipa@pogo.co

More information

Data-Driven Imaging in Anisotropic Media

Data-Driven Imaging in Anisotropic Media 18 th World Conference on Non destructive Testing, 16- April 1, Durban, South Africa Data-Driven Iaging in Anisotropic Media Arno VOLKER 1 and Alan HUNTER 1 TNO Stieltjesweg 1, 6 AD, Delft, The Netherlands

More information

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm Acta Polytechnica Hungarica Vol., No., 04 Sybolic Analysis as Universal Tool for Deriving Properties of Non-linear Algoriths Case study of EM Algorith Vladiir Mladenović, Miroslav Lutovac, Dana Porrat

More information

Physically Based Modeling CS Notes Spring 1997 Particle Collision and Contact

Physically Based Modeling CS Notes Spring 1997 Particle Collision and Contact Physically Based Modeling CS 15-863 Notes Spring 1997 Particle Collision and Contact 1 Collisions with Springs Suppose we wanted to ipleent a particle siulator with a floor : a solid horizontal plane which

More information

Use of PSO in Parameter Estimation of Robot Dynamics; Part One: No Need for Parameterization

Use of PSO in Parameter Estimation of Robot Dynamics; Part One: No Need for Parameterization Use of PSO in Paraeter Estiation of Robot Dynaics; Part One: No Need for Paraeterization Hossein Jahandideh, Mehrzad Navar Abstract Offline procedures for estiating paraeters of robot dynaics are practically

More information

Average Consensus and Gossip Algorithms in Networks with Stochastic Asymmetric Communications

Average Consensus and Gossip Algorithms in Networks with Stochastic Asymmetric Communications Average Consensus and Gossip Algoriths in Networks with Stochastic Asyetric Counications Duarte Antunes, Daniel Silvestre, Carlos Silvestre Abstract We consider that a set of distributed agents desire

More information

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer

More information

Qualitative Modelling of Time Series Using Self-Organizing Maps: Application to Animal Science

Qualitative Modelling of Time Series Using Self-Organizing Maps: Application to Animal Science Proceedings of the 6th WSEAS International Conference on Applied Coputer Science, Tenerife, Canary Islands, Spain, Deceber 16-18, 2006 183 Qualitative Modelling of Tie Series Using Self-Organizing Maps:

More information

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS A Thesis Presented to The Faculty of the Departent of Matheatics San Jose State University In Partial Fulfillent of the Requireents

More information

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair Proceedings of the 6th SEAS International Conference on Siulation, Modelling and Optiization, Lisbon, Portugal, Septeber -4, 006 0 A Siplified Analytical Approach for Efficiency Evaluation of the eaving

More information

Asynchronous Gossip Algorithms for Stochastic Optimization

Asynchronous Gossip Algorithms for Stochastic Optimization Asynchronous Gossip Algoriths for Stochastic Optiization S. Sundhar Ra ECE Dept. University of Illinois Urbana, IL 680 ssrini@illinois.edu A. Nedić IESE Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu

More information

Effective joint probabilistic data association using maximum a posteriori estimates of target states

Effective joint probabilistic data association using maximum a posteriori estimates of target states Effective joint probabilistic data association using axiu a posteriori estiates of target states 1 Viji Paul Panakkal, 2 Rajbabu Velurugan 1 Central Research Laboratory, Bharat Electronics Ltd., Bangalore,

More information

Impulsive Control of a Mechanical Oscillator with Friction

Impulsive Control of a Mechanical Oscillator with Friction 9 Aerican Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June -, 9 ThC8. Ipulsive Control of a Mechanical Oscillator with Friction Yury Orlov, Raul Santiesteban, and Luis T. Aguilar Abstract

More information

Pattern Recognition and Machine Learning. Artificial Neural networks

Pattern Recognition and Machine Learning. Artificial Neural networks Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lessons 7 20 Dec 2017 Outline Artificial Neural networks Notation...2 Introduction...3 Key Equations... 3 Artificial

More information

Elliptic Curve Scalar Point Multiplication Algorithm Using Radix-4 Booth s Algorithm

Elliptic Curve Scalar Point Multiplication Algorithm Using Radix-4 Booth s Algorithm Elliptic Curve Scalar Multiplication Algorith Using Radix-4 Booth s Algorith Elliptic Curve Scalar Multiplication Algorith Using Radix-4 Booth s Algorith Sangook Moon, Non-eber ABSTRACT The ain back-bone

More information

Estimation of the Mean of the Exponential Distribution Using Maximum Ranked Set Sampling with Unequal Samples

Estimation of the Mean of the Exponential Distribution Using Maximum Ranked Set Sampling with Unequal Samples Open Journal of Statistics, 4, 4, 64-649 Published Online Septeber 4 in SciRes http//wwwscirporg/ournal/os http//ddoiorg/436/os4486 Estiation of the Mean of the Eponential Distribution Using Maiu Ranked

More information

Intelligent Systems: Reasoning and Recognition. Artificial Neural Networks

Intelligent Systems: Reasoning and Recognition. Artificial Neural Networks Intelligent Systes: Reasoning and Recognition Jaes L. Crowley MOSIG M1 Winter Seester 2018 Lesson 7 1 March 2018 Outline Artificial Neural Networks Notation...2 Introduction...3 Key Equations... 3 Artificial

More information

An Adaptive UKF Algorithm for the State and Parameter Estimations of a Mobile Robot

An Adaptive UKF Algorithm for the State and Parameter Estimations of a Mobile Robot Vol. 34, No. 1 ACTA AUTOMATICA SINICA January, 2008 An Adaptive UKF Algorith for the State and Paraeter Estiations of a Mobile Robot SONG Qi 1, 2 HAN Jian-Da 1 Abstract For iproving the estiation accuracy

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

Support recovery in compressed sensing: An estimation theoretic approach

Support recovery in compressed sensing: An estimation theoretic approach Support recovery in copressed sensing: An estiation theoretic approach Ain Karbasi, Ali Horati, Soheil Mohajer, Martin Vetterli School of Coputer and Counication Sciences École Polytechnique Fédérale de

More information

Decentralized Adaptive Control of Nonlinear Systems Using Radial Basis Neural Networks

Decentralized Adaptive Control of Nonlinear Systems Using Radial Basis Neural Networks 050 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 44, NO., NOVEMBER 999 Decentralized Adaptive Control of Nonlinear Systes Using Radial Basis Neural Networks Jeffrey T. Spooner and Kevin M. Passino Abstract

More information

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp

More information

3.3 Variational Characterization of Singular Values

3.3 Variational Characterization of Singular Values 3.3. Variational Characterization of Singular Values 61 3.3 Variational Characterization of Singular Values Since the singular values are square roots of the eigenvalues of the Heritian atrices A A and

More information

OPTIMIZATION in multi-agent networks has attracted

OPTIMIZATION in multi-agent networks has attracted Distributed constrained optiization and consensus in uncertain networks via proxial iniization Kostas Margellos, Alessandro Falsone, Sione Garatti and Maria Prandini arxiv:603.039v3 [ath.oc] 3 May 07 Abstract

More information

Bayesian Approach for Fatigue Life Prediction from Field Inspection

Bayesian Approach for Fatigue Life Prediction from Field Inspection Bayesian Approach for Fatigue Life Prediction fro Field Inspection Dawn An and Jooho Choi School of Aerospace & Mechanical Engineering, Korea Aerospace University, Goyang, Seoul, Korea Srira Pattabhiraan

More information

Pattern Recognition and Machine Learning. Artificial Neural networks

Pattern Recognition and Machine Learning. Artificial Neural networks Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2016 Lessons 7 14 Dec 2016 Outline Artificial Neural networks Notation...2 1. Introduction...3... 3 The Artificial

More information

Recursive Algebraic Frisch Scheme: a Particle-Based Approach

Recursive Algebraic Frisch Scheme: a Particle-Based Approach Recursive Algebraic Frisch Schee: a Particle-Based Approach Stefano Massaroli Renato Myagusuku Federico Califano Claudio Melchiorri Atsushi Yaashita Hajie Asaa Departent of Precision Engineering, The University

More information

ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER

ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER IEPC 003-0034 ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER A. Bober, M. Guelan Asher Space Research Institute, Technion-Israel Institute of Technology, 3000 Haifa, Israel

More information

BALLISTIC PENDULUM. EXPERIMENT: Measuring the Projectile Speed Consider a steel ball of mass

BALLISTIC PENDULUM. EXPERIMENT: Measuring the Projectile Speed Consider a steel ball of mass BALLISTIC PENDULUM INTRODUCTION: In this experient you will use the principles of conservation of oentu and energy to deterine the speed of a horizontally projected ball and use this speed to predict the

More information

Multi-Dimensional Hegselmann-Krause Dynamics

Multi-Dimensional Hegselmann-Krause Dynamics Multi-Diensional Hegselann-Krause Dynaics A. Nedić Industrial and Enterprise Systes Engineering Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu B. Touri Coordinated Science Laboratory

More information

STOPPING SIMULATED PATHS EARLY

STOPPING SIMULATED PATHS EARLY Proceedings of the 2 Winter Siulation Conference B.A.Peters,J.S.Sith,D.J.Medeiros,andM.W.Rohrer,eds. STOPPING SIMULATED PATHS EARLY Paul Glasseran Graduate School of Business Colubia University New Yor,

More information

Estimation of ADC Nonlinearities from the Measurement in Input Voltage Intervals

Estimation of ADC Nonlinearities from the Measurement in Input Voltage Intervals Estiation of ADC Nonlinearities fro the Measureent in Input Voltage Intervals M. Godla, L. Michaeli, 3 J. Šaliga, 4 R. Palenčár,,3 Deptartent of Electronics and Multiedia Counications, FEI TU of Košice,

More information

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder Convolutional Codes Lecture Notes 8: Trellis Codes In this lecture we discuss construction of signals via a trellis. That is, signals are constructed by labeling the branches of an infinite trellis with

More information

THE KALMAN FILTER: A LOOK BEHIND THE SCENE

THE KALMAN FILTER: A LOOK BEHIND THE SCENE HE KALMA FILER: A LOOK BEHID HE SCEE R.E. Deain School of Matheatical and Geospatial Sciences, RMI University eail: rod.deain@rit.edu.au Presented at the Victorian Regional Survey Conference, Mildura,

More information

Uncertainty Propagation and Nonlinear Filtering for Space Navigation using Differential Algebra

Uncertainty Propagation and Nonlinear Filtering for Space Navigation using Differential Algebra Uncertainty Propagation and Nonlinear Filtering for Space Navigation using Differential Algebra M. Valli, R. Arellin, P. Di Lizia and M. R. Lavagna Departent of Aerospace Engineering, Politecnico di Milano

More information

IN modern society that various systems have become more

IN modern society that various systems have become more Developent of Reliability Function in -Coponent Standby Redundant Syste with Priority Based on Maxiu Entropy Principle Ryosuke Hirata, Ikuo Arizono, Ryosuke Toohiro, Satoshi Oigawa, and Yasuhiko Takeoto

More information

Probability Distributions

Probability Distributions Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples

More information

Machine Learning Basics: Estimators, Bias and Variance

Machine Learning Basics: Estimators, Bias and Variance Machine Learning Basics: Estiators, Bias and Variance Sargur N. srihari@cedar.buffalo.edu This is part of lecture slides on Deep Learning: http://www.cedar.buffalo.edu/~srihari/cse676 1 Topics in Basics

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 9, September ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 9, September ISSN International Journal of Scientific & Engineering Research, Volue 4, Issue 9, Septeber-3 44 ISSN 9-558 he unscented Kalan Filter for the Estiation the States of he Boiler-urbin Model Halieh Noorohaadi,

More information

ma x = -bv x + F rod.

ma x = -bv x + F rod. Notes on Dynaical Systes Dynaics is the study of change. The priary ingredients of a dynaical syste are its state and its rule of change (also soeties called the dynaic). Dynaical systes can be continuous

More information

Birthday Paradox Calculations and Approximation

Birthday Paradox Calculations and Approximation Birthday Paradox Calculations and Approxiation Joshua E. Hill InfoGard Laboratories -March- v. Birthday Proble In the birthday proble, we have a group of n randoly selected people. If we assue that birthdays

More information

Optimal nonlinear Bayesian experimental design: an application to amplitude versus offset experiments

Optimal nonlinear Bayesian experimental design: an application to amplitude versus offset experiments Geophys. J. Int. (23) 155, 411 421 Optial nonlinear Bayesian experiental design: an application to aplitude versus offset experients Jojanneke van den Berg, 1, Andrew Curtis 2,3 and Jeannot Trapert 1 1

More information

In this chapter, we consider several graph-theoretic and probabilistic models

In this chapter, we consider several graph-theoretic and probabilistic models THREE ONE GRAPH-THEORETIC AND STATISTICAL MODELS 3.1 INTRODUCTION In this chapter, we consider several graph-theoretic and probabilistic odels for a social network, which we do under different assuptions

More information

A Theoretical Analysis of a Warm Start Technique

A Theoretical Analysis of a Warm Start Technique A Theoretical Analysis of a War Start Technique Martin A. Zinkevich Yahoo! Labs 701 First Avenue Sunnyvale, CA Abstract Batch gradient descent looks at every data point for every step, which is wasteful

More information

Comparison of Stability of Selected Numerical Methods for Solving Stiff Semi- Linear Differential Equations

Comparison of Stability of Selected Numerical Methods for Solving Stiff Semi- Linear Differential Equations International Journal of Applied Science and Technology Vol. 7, No. 3, Septeber 217 Coparison of Stability of Selected Nuerical Methods for Solving Stiff Sei- Linear Differential Equations Kwaku Darkwah

More information

C na (1) a=l. c = CO + Clm + CZ TWO-STAGE SAMPLE DESIGN WITH SMALL CLUSTERS. 1. Introduction

C na (1) a=l. c = CO + Clm + CZ TWO-STAGE SAMPLE DESIGN WITH SMALL CLUSTERS. 1. Introduction TWO-STGE SMPLE DESIGN WITH SMLL CLUSTERS Robert G. Clark and David G. Steel School of Matheatics and pplied Statistics, University of Wollongong, NSW 5 ustralia. (robert.clark@abs.gov.au) Key Words: saple

More information

On Constant Power Water-filling

On Constant Power Water-filling On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives

More information

DISSIMILARITY MEASURES FOR ICA-BASED SOURCE NUMBER ESTIMATION. Seungchul Lee 2 2. University of Michigan. Ann Arbor, MI, USA.

DISSIMILARITY MEASURES FOR ICA-BASED SOURCE NUMBER ESTIMATION. Seungchul Lee 2 2. University of Michigan. Ann Arbor, MI, USA. Proceedings of the ASME International Manufacturing Science and Engineering Conference MSEC June -8,, Notre Dae, Indiana, USA MSEC-7 DISSIMILARIY MEASURES FOR ICA-BASED SOURCE NUMBER ESIMAION Wei Cheng,

More information

Compression and Predictive Distributions for Large Alphabet i.i.d and Markov models

Compression and Predictive Distributions for Large Alphabet i.i.d and Markov models 2014 IEEE International Syposiu on Inforation Theory Copression and Predictive Distributions for Large Alphabet i.i.d and Markov odels Xiao Yang Departent of Statistics Yale University New Haven, CT, 06511

More information

An Approximate Model for the Theoretical Prediction of the Velocity Increase in the Intermediate Ballistics Period

An Approximate Model for the Theoretical Prediction of the Velocity Increase in the Intermediate Ballistics Period An Approxiate Model for the Theoretical Prediction of the Velocity... 77 Central European Journal of Energetic Materials, 205, 2(), 77-88 ISSN 2353-843 An Approxiate Model for the Theoretical Prediction

More information

Hybrid System Identification: An SDP Approach

Hybrid System Identification: An SDP Approach 49th IEEE Conference on Decision and Control Deceber 15-17, 2010 Hilton Atlanta Hotel, Atlanta, GA, USA Hybrid Syste Identification: An SDP Approach C Feng, C M Lagoa, N Ozay and M Sznaier Abstract The

More information

CHAPTER 19: Single-Loop IMC Control

CHAPTER 19: Single-Loop IMC Control When I coplete this chapter, I want to be able to do the following. Recognize that other feedback algoriths are possible Understand the IMC structure and how it provides the essential control features

More information

8.1 Force Laws Hooke s Law

8.1 Force Laws Hooke s Law 8.1 Force Laws There are forces that don't change appreciably fro one instant to another, which we refer to as constant in tie, and forces that don't change appreciably fro one point to another, which

More information

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Soft Coputing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Beverly Rivera 1,2, Irbis Gallegos 1, and Vladik Kreinovich 2 1 Regional Cyber and Energy Security Center RCES

More information

Verifying the Authenticity of Nuclear Warheads Without Revealing Sensitive Design Information

Verifying the Authenticity of Nuclear Warheads Without Revealing Sensitive Design Information Verifying the Authenticity of Nuclear Warheads Without Revealing Sensitive Design Inforation Steve Fetter and Thoas B. Cochran Verifying the disantleent of nuclear warheads will require reconciling two

More information

Statistical Logic Cell Delay Analysis Using a Current-based Model

Statistical Logic Cell Delay Analysis Using a Current-based Model Statistical Logic Cell Delay Analysis Using a Current-based Model Hanif Fatei Shahin Nazarian Massoud Pedra Dept. of EE-Systes, University of Southern California, Los Angeles, CA 90089 {fatei, shahin,

More information

Department of Physics, Sri Venkateswara University, Tirupati Range Operations, Satish Dhawan Space Centre SHAR, ISRO, Sriharikota

Department of Physics, Sri Venkateswara University, Tirupati Range Operations, Satish Dhawan Space Centre SHAR, ISRO, Sriharikota Trajectory Estiation of a Satellite Launch Vehicle Using Unscented Kalan Filter fro Noisy Radar Measureents R.Varaprasad S.V. Bhaskara Rao D.Narayana Rao V. Seshagiri Rao Range Operations, Satish Dhawan

More information

General Properties of Radiation Detectors Supplements

General Properties of Radiation Detectors Supplements Phys. 649: Nuclear Techniques Physics Departent Yarouk University Chapter 4: General Properties of Radiation Detectors Suppleents Dr. Nidal M. Ershaidat Overview Phys. 649: Nuclear Techniques Physics Departent

More information

Sharp Time Data Tradeoffs for Linear Inverse Problems

Sharp Time Data Tradeoffs for Linear Inverse Problems Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used

More information

lecture 37: Linear Multistep Methods: Absolute Stability, Part I lecture 38: Linear Multistep Methods: Absolute Stability, Part II

lecture 37: Linear Multistep Methods: Absolute Stability, Part I lecture 38: Linear Multistep Methods: Absolute Stability, Part II lecture 37: Linear Multistep Methods: Absolute Stability, Part I lecture 3: Linear Multistep Methods: Absolute Stability, Part II 5.7 Linear ultistep ethods: absolute stability At this point, it ay well

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

Neural Network-Aided Extended Kalman Filter for SLAM Problem

Neural Network-Aided Extended Kalman Filter for SLAM Problem 7 IEEE International Conference on Robotics and Autoation Roa, Italy, -4 April 7 ThA.5 Neural Network-Aided Extended Kalan Filter for SLAM Proble Minyong Choi, R. Sakthivel, and Wan Kyun Chung Abstract

More information

TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES

TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES S. E. Ahed, R. J. Tokins and A. I. Volodin Departent of Matheatics and Statistics University of Regina Regina,

More information

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy Storage Capacity and Dynaics of Nononotonic Networks Bruno Crespi a and Ignazio Lazzizzera b a. IRST, I-38050 Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I-38050 Povo (Trento) Italy INFN Gruppo

More information