Defending against Internet worms using a phase space method from chaos theory

Size: px
Start display at page:

Download "Defending against Internet worms using a phase space method from chaos theory"

Transcription

1 Defending against Internet worms using a phase space method from chaos theory Jing Hu and Jianbo Gao Department of Electrical & Computer Engineering University of Florida Nageswara S. Rao Computer Science and Mathematics Division Oak Ridge National Laboratory 1

2 Outline Motivations Theoretical background: phase space reconstruction by time delay embedding Detecting network intrusions and worms by phase space based method Concluding discussions 2

3 Motivations Enterprise networks are facing ever-increasing security threats from worms, viruses, intrusions, etc., causing billions of dollars of loss Existing monitoring methods can not detect worms effectively in real-time Purpose: to develop effective methods to defend against Internet worms in a real-time manner 3

4 Worm detection: state-of-the-art and challenges Internet worm: a self-propagating program that automatically replicates itself to vulnerable systems and spreads across the Internet. Basic strategies: Monitor network traffic data Look for specific byte sequences (attack signatures) that are known to appear in the attack traffic Challenges: How to find a good attack signature fast enough for real-time use? A good attack signature should be general enough to capture all attack traffic of certain type specific enough to avoid overlapping with normal traffic to reduce false alarms Existing methods (e.g., expectation maximization and hidden Markov models) need extensive training, thus can not be applied in real-time 4

5 Phase space reconstruction Phase space: enables one to study dynamics of a complicated system geometrically X 1 (t) X 2 (t) X 2 t 2 t 1 t o t 1 t 2 t t o t 1 t 2 a) (b) (c) t o t 2 t 1 t o t X 1 Phase space reconstruction (Takens 1981; Sauer et al. 1991) V i = [x(i),x(i + L),...,x(i + (m 1)L)] x(i): given time series, m: embedding dimension, L: delay time 5

6 Optimal embedding The dynamics of the harmonic oscillator can be described by Equivalently, dx dt = y, dy dt = ωx d 2 x dt 2 = ωx The general solution is: x(t) = Acos(ωt + φ ), y(t) = Asin(ωt + φ ) If we embed x(t) to a 2-D space, then V t = [x(t),x(t + τ)] 6

7 Optimal embedding (Cont) Time-Dependent Exponent (TDE) curves (Gao & Zheng 1993, 1994) ( ) Vi+k V j+k Λ(m,L,k) = ln V i V j (1) Introduce a sequence of shells ε i V i V j ε i + ε i, i = 1,2,3, (2) where ε i and ε i are arbitrarily chosen small distances The angle brackets denote the ensemble average within a shell It is suggested that for a fixed small k, an optimal m is such that Λ(m,L,k) no longer decreases much when further increasing m. After m is chosen, L can be selected by minimizing Λ(m,L,k) 7

8 Normal and worm traffic trace 3 datasets are collected from a double-honeypot system deployed in a local network for automatic detection of worm attacks from the Internet. Courtesy of Dr. Chen at the Univ. of Florida 3 Package Sequence 2 Normal Worm

9 $ ' Phase diagrams for normal and worm traffic Left: worm traffic; Right: normal traffic Region x(n+1) x(n+1) Region x(n) Region 1 & 1 15 x(n) 2 25 Region 4 % 9

10 Accuracy of the phase space based method index based on percentage of number of points in region 1 35 index based on percentage of number of points in region Normal Worm 3 Normal Worm Frequency Frequency Percentage of points (%) Percentage of points (%) 1

11 Accuracy of the phase space based method (Cont) 7 6 index based on percentage of number of points in regions 3 and 4 Normal Worm 5 Frequency Percentage of points (%) 11

12 Comparison with other methods The separation between normal and worm traffic data is much smaller than that of our method! Adapted from Tang & Chen 25 12

13 Concluding discussions Proposed a phase space based method for detecting Internet intrusions and worms The method is simple, computationally fast and very effective The method can automatically indicate the attack signature of a specific worm (a) it identifies a subspace that contains the signature sequence of the worm in the phase space (b) it depends only on the rules (or dynamics) that the worm signature sequence is generated (a) & (b) together define an invariant subspace of the specific worm 13

14 Q & A Collaborations are highly welcomed! Thank you! 14

Characterizing chaotic time series

Characterizing chaotic time series Characterizing chaotic time series Jianbo Gao PMB InTelliGence, LLC, West Lafayette, IN 47906 Mechanical and Materials Engineering, Wright State University jbgao.pmb@gmail.com http://www.gao.ece.ufl.edu/

More information

Complex system approach to geospace and climate studies. Tatjana Živković

Complex system approach to geospace and climate studies. Tatjana Živković Complex system approach to geospace and climate studies Tatjana Živković 30.11.2011 Outline of a talk Importance of complex system approach Phase space reconstruction Recurrence plot analysis Test for

More information

Roberto Perdisci^+, Guofei Gu^, Wenke Lee^ presented by Roberto Perdisci. ^Georgia Institute of Technology, Atlanta, GA, USA

Roberto Perdisci^+, Guofei Gu^, Wenke Lee^ presented by Roberto Perdisci. ^Georgia Institute of Technology, Atlanta, GA, USA U s i n g a n E n s e m b l e o f O n e - C l a s s S V M C l a s s i f i e r s t o H a r d e n P a y l o a d - B a s e d A n o m a l y D e t e c t i o n S y s t e m s Roberto Perdisci^+, Guofei Gu^, Wenke

More information

IV. Covariance Analysis

IV. Covariance Analysis IV. Covariance Analysis Autocovariance Remember that when a stochastic process has time values that are interdependent, then we can characterize that interdependency by computing the autocovariance function.

More information

Phase-Space Reconstruction. Gerrit Ansmann

Phase-Space Reconstruction. Gerrit Ansmann Phase-Space Reconstruction Gerrit Ansmann Reprise: The Need for Non-Linear Methods. Lorenz oscillator x = 1(y x), y = x(28 z) y, z = xy 8z 3 Autoregressive process measured with non-linearity: y t =.8y

More information

Distinguishing chaos from noise

Distinguishing chaos from noise Distinguishing chaos from noise Jianbo Gao PMB InTelliGence, LLC, West Lafayette, IN 47906 Mechanical and Materials Engineering, Wright State University jbgao.pmb@gmail.com http://www.gao.ece.ufl.edu/

More information

Network Anomaly Detection based on Multi-scale Dynamic Characteristics of Traffic

Network Anomaly Detection based on Multi-scale Dynamic Characteristics of Traffic INT J COMPUT COMMUN, ISSN 84-9836 9():-2, February, 24. Network Anomaly Detection based on Multi-scale Dynamic Characteristics of Traffic J. Yuan, R. Yuan, X. Chen Jing Yuan*, Ruixi Yuan, Xi Chen Department

More information

On Susceptible-Infected-Susceptible Epidemic Spreading: an Overview of Recent Study

On Susceptible-Infected-Susceptible Epidemic Spreading: an Overview of Recent Study The 1 st Net-X (2017) On Susceptible-Infected-Susceptible Epidemic Spreading: an Overview of Recent Study Cong Li Adaptive Networks and Control Lab, Fudan University Collaborators: Xiaojie Li, Jianbo Wang,

More information

No. 6 Determining the input dimension of a To model a nonlinear time series with the widely used feed-forward neural network means to fit the a

No. 6 Determining the input dimension of a To model a nonlinear time series with the widely used feed-forward neural network means to fit the a Vol 12 No 6, June 2003 cfl 2003 Chin. Phys. Soc. 1009-1963/2003/12(06)/0594-05 Chinese Physics and IOP Publishing Ltd Determining the input dimension of a neural network for nonlinear time series prediction

More information

( ) ( ). ( ) " d#. ( ) " cos (%) " d%

( ) ( ). ( )  d#. ( )  cos (%)  d% Math 22 Fall 2008 Solutions to Homework #6 Problems from Pages 404-407 (Section 76) 6 We will use the technique of Separation of Variables to solve the differential equation: dy d" = ey # sin 2 (") y #

More information

Unsupervised Anomaly Detection for High Dimensional Data

Unsupervised Anomaly Detection for High Dimensional Data Unsupervised Anomaly Detection for High Dimensional Data Department of Mathematics, Rowan University. July 19th, 2013 International Workshop in Sequential Methodologies (IWSM-2013) Outline of Talk Motivation

More information

Estimating Lyapunov Exponents from Time Series. Gerrit Ansmann

Estimating Lyapunov Exponents from Time Series. Gerrit Ansmann Estimating Lyapunov Exponents from Time Series Gerrit Ansmann Example: Lorenz system. Two identical Lorenz systems with initial conditions; one is slightly perturbed (10 14 ) at t = 30: 20 x 2 1 0 20 20

More information

Multiple Integrals. Chapter 4. Section 7. Department of Mathematics, Kookmin Univerisity. Numerical Methods.

Multiple Integrals. Chapter 4. Section 7. Department of Mathematics, Kookmin Univerisity. Numerical Methods. 4.7.1 Multiple Integrals Chapter 4 Section 7 4.7.2 Double Integral R f ( x, y) da 4.7.3 Double Integral Apply Simpson s rule twice R [ a, b] [ c, d] a x, x,..., x b, c y, y,..., y d 0 1 n 0 1 h ( b a)

More information

Math 162: Calculus IIA

Math 162: Calculus IIA Math 62: Calculus IIA Final Exam ANSWERS December 9, 26 Part A. (5 points) Evaluate the integral x 4 x 2 dx Substitute x 2 cos θ: x 8 cos dx θ ( 2 sin θ) dθ 4 x 2 2 sin θ 8 cos θ dθ 8 cos 2 θ cos θ dθ

More information

The analog data assimilation: method, applications and implementation

The analog data assimilation: method, applications and implementation The analog data assimilation: method, applications and implementation Pierre Tandeo pierre.tandeo@imt-atlantique.fr IMT-Atlantique, Brest, France 16 th of February 2018 Before starting Works in collaboration

More information

Chapter 1 Fundamental Concepts

Chapter 1 Fundamental Concepts Chapter 1 Fundamental Concepts 1 Signals A signal is a pattern of variation of a physical quantity, often as a function of time (but also space, distance, position, etc). These quantities are usually the

More information

The Research of Railway Coal Dispatched Volume Prediction Based on Chaos Theory

The Research of Railway Coal Dispatched Volume Prediction Based on Chaos Theory The Research of Railway Coal Dispatched Volume Prediction Based on Chaos Theory Hua-Wen Wu Fu-Zhang Wang Institute of Computing Technology, China Academy of Railway Sciences Beijing 00044, China, P.R.

More information

Dynamic Data-Driven Adaptive Sampling and Monitoring of Big Spatial-Temporal Data Streams for Real-Time Solar Flare Detection

Dynamic Data-Driven Adaptive Sampling and Monitoring of Big Spatial-Temporal Data Streams for Real-Time Solar Flare Detection Dynamic Data-Driven Adaptive Sampling and Monitoring of Big Spatial-Temporal Data Streams for Real-Time Solar Flare Detection Dr. Kaibo Liu Department of Industrial and Systems Engineering University of

More information

Fig 1: Stationary and Non Stationary Time Series

Fig 1: Stationary and Non Stationary Time Series Module 23 Independence and Stationarity Objective: To introduce the concepts of Statistical Independence, Stationarity and its types w.r.to random processes. This module also presents the concept of Ergodicity.

More information

Temporal Multi-View Inconsistency Detection for Network Traffic Analysis

Temporal Multi-View Inconsistency Detection for Network Traffic Analysis WWW 15 Florence, Italy Temporal Multi-View Inconsistency Detection for Network Traffic Analysis Houping Xiao 1, Jing Gao 1, Deepak Turaga 2, Long Vu 2, and Alain Biem 2 1 Department of Computer Science

More information

Chapter 3 Convolution Representation

Chapter 3 Convolution Representation Chapter 3 Convolution Representation DT Unit-Impulse Response Consider the DT SISO system: xn [ ] System yn [ ] xn [ ] = δ[ n] If the input signal is and the system has no energy at n = 0, the output yn

More information

Prompt Network Anomaly Detection using SSA-Based Change-Point Detection. Hao Chen 3/7/2014

Prompt Network Anomaly Detection using SSA-Based Change-Point Detection. Hao Chen 3/7/2014 Prompt Network Anomaly Detection using SSA-Based Change-Point Detection Hao Chen 3/7/2014 Network Anomaly Detection Network Intrusion Detection (NID) Signature-based detection Detect known attacks Use

More information

Collaborative Target Detection in Wireless Sensor Networks with Reactive Mobility

Collaborative Target Detection in Wireless Sensor Networks with Reactive Mobility 1 / 24 Collaborative Target Detection in Wireless Sensor Networks with Reactive Mobility Rui Tan 1 Guoliang Xing 1 Jianping Wang 1 Hing Cheung So 2 1 Department of Computer Science City University of Hong

More information

Stochastic Processes. M. Sami Fadali Professor of Electrical Engineering University of Nevada, Reno

Stochastic Processes. M. Sami Fadali Professor of Electrical Engineering University of Nevada, Reno Stochastic Processes M. Sami Fadali Professor of Electrical Engineering University of Nevada, Reno 1 Outline Stochastic (random) processes. Autocorrelation. Crosscorrelation. Spectral density function.

More information

Delay Coordinate Embedding

Delay Coordinate Embedding Chapter 7 Delay Coordinate Embedding Up to this point, we have known our state space explicitly. But what if we do not know it? How can we then study the dynamics is phase space? A typical case is when

More information

Stabilization of Hyperbolic Chaos by the Pyragas Method

Stabilization of Hyperbolic Chaos by the Pyragas Method Journal of Mathematics and System Science 4 (014) 755-76 D DAVID PUBLISHING Stabilization of Hyperbolic Chaos by the Pyragas Method Sergey Belyakin, Arsen Dzanoev, Sergey Kuznetsov Physics Faculty, Moscow

More information

Long-Term Prediction, Chaos and Artificial Neural Networks. Where is the Meeting Point?

Long-Term Prediction, Chaos and Artificial Neural Networks. Where is the Meeting Point? Engineering Letters, 5:, EL_5 Long-Term Prediction, Chaos and Artificial Neural Networks. Where is the Meeting Point? Pilar Gómez-Gil Abstract This paper presents the advances of a research using a combination

More information

Solutions to Homework 2

Solutions to Homework 2 Solutions to Homewor Due Tuesday, July 6,. Chapter. Problem solution. If the series for ln+z and ln z both converge, +z then we can find the series for ln z by term-by-term subtraction of the two series:

More information

Reconstruction Deconstruction:

Reconstruction Deconstruction: Reconstruction Deconstruction: A Brief History of Building Models of Nonlinear Dynamical Systems Jim Crutchfield Center for Computational Science & Engineering Physics Department University of California,

More information

INTRODUCTION TO CHAOS THEORY T.R.RAMAMOHAN C-MMACS BANGALORE

INTRODUCTION TO CHAOS THEORY T.R.RAMAMOHAN C-MMACS BANGALORE INTRODUCTION TO CHAOS THEORY BY T.R.RAMAMOHAN C-MMACS BANGALORE -560037 SOME INTERESTING QUOTATIONS * PERHAPS THE NEXT GREAT ERA OF UNDERSTANDING WILL BE DETERMINING THE QUALITATIVE CONTENT OF EQUATIONS;

More information

Lecture 1 From Continuous-Time to Discrete-Time

Lecture 1 From Continuous-Time to Discrete-Time Lecture From Continuous-Time to Discrete-Time Outline. Continuous and Discrete-Time Signals and Systems................. What is a signal?................................2 What is a system?.............................

More information

Bayesian Inference and the Symbolic Dynamics of Deterministic Chaos. Christopher C. Strelioff 1,2 Dr. James P. Crutchfield 2

Bayesian Inference and the Symbolic Dynamics of Deterministic Chaos. Christopher C. Strelioff 1,2 Dr. James P. Crutchfield 2 How Random Bayesian Inference and the Symbolic Dynamics of Deterministic Chaos Christopher C. Strelioff 1,2 Dr. James P. Crutchfield 2 1 Center for Complex Systems Research and Department of Physics University

More information

An Optimization Approach In Information Security Risk Management

An Optimization Approach In Information Security Risk Management Advances in Management & Applied Economics, vol.2, no.3, 2012, 1-12 ISSN: 1792-7544 (print version), 1792-7552 (online) Scienpress Ltd, 2012 An Optimization Approach In Information Security Risk Management

More information

The peculiarities of the model: - it is allowed to use by attacker only noisy version of SG C w (n), - CO can be known exactly for attacker.

The peculiarities of the model: - it is allowed to use by attacker only noisy version of SG C w (n), - CO can be known exactly for attacker. Lecture 6. SG based on noisy channels [4]. CO Detection of SG The peculiarities of the model: - it is alloed to use by attacker only noisy version of SG C (n), - CO can be knon exactly for attacker. Practical

More information

Data assimilation with and without a model

Data assimilation with and without a model Data assimilation with and without a model Tim Sauer George Mason University Parameter estimation and UQ U. Pittsburgh Mar. 5, 2017 Partially supported by NSF Most of this work is due to: Tyrus Berry,

More information

Applications of Information Geometry to Hypothesis Testing and Signal Detection

Applications of Information Geometry to Hypothesis Testing and Signal Detection CMCAA 2016 Applications of Information Geometry to Hypothesis Testing and Signal Detection Yongqiang Cheng National University of Defense Technology July 2016 Outline 1. Principles of Information Geometry

More information

Spectral Graph Theory for. Dynamic Processes on Networks

Spectral Graph Theory for. Dynamic Processes on Networks Spectral Graph Theory for Dynamic Processes on etworks Piet Van Mieghem in collaboration with Huijuan Wang, Dragan Stevanovic, Fernando Kuipers, Stojan Trajanovski, Dajie Liu, Cong Li, Javier Martin-Hernandez,

More information

Experimental Characterization of Nonlinear Dynamics from Chua s Circuit

Experimental Characterization of Nonlinear Dynamics from Chua s Circuit Experimental Characterization of Nonlinear Dynamics from Chua s Circuit John Parker*, 1 Majid Sodagar, 1 Patrick Chang, 1 and Edward Coyle 1 School of Physics, Georgia Institute of Technology, Atlanta,

More information

Dyson series for the PDEs arising in Mathematical Finance I

Dyson series for the PDEs arising in Mathematical Finance I for the PDEs arising in Mathematical Finance I 1 1 Penn State University Mathematical Finance and Probability Seminar, Rutgers, April 12, 2011 www.math.psu.edu/nistor/ This work was supported in part by

More information

Randomized Algorithms

Randomized Algorithms Randomized Algorithms Saniv Kumar, Google Research, NY EECS-6898, Columbia University - Fall, 010 Saniv Kumar 9/13/010 EECS6898 Large Scale Machine Learning 1 Curse of Dimensionality Gaussian Mixture Models

More information

Copyright (c) 2006 Warren Weckesser

Copyright (c) 2006 Warren Weckesser 2.2. PLANAR LINEAR SYSTEMS 3 2.2. Planar Linear Systems We consider the linear system of two first order differential equations or equivalently, = ax + by (2.7) dy = cx + dy [ d x x = A x, where x =, and

More information

Linear Regression. CSL603 - Fall 2017 Narayanan C Krishnan

Linear Regression. CSL603 - Fall 2017 Narayanan C Krishnan Linear Regression CSL603 - Fall 2017 Narayanan C Krishnan ckn@iitrpr.ac.in Outline Univariate regression Multivariate regression Probabilistic view of regression Loss functions Bias-Variance analysis Regularization

More information

Linear Regression. CSL465/603 - Fall 2016 Narayanan C Krishnan

Linear Regression. CSL465/603 - Fall 2016 Narayanan C Krishnan Linear Regression CSL465/603 - Fall 2016 Narayanan C Krishnan ckn@iitrpr.ac.in Outline Univariate regression Multivariate regression Probabilistic view of regression Loss functions Bias-Variance analysis

More information

Classical Statistical Mechanics: Part 1

Classical Statistical Mechanics: Part 1 Classical Statistical Mechanics: Part 1 January 16, 2013 Classical Mechanics 1-Dimensional system with 1 particle of mass m Newton s equations of motion for position x(t) and momentum p(t): ẋ(t) dx p =

More information

Universality. Why? (Bohigas, Giannoni, Schmit 84; see also Casati, Vals-Gris, Guarneri; Berry, Tabor)

Universality. Why? (Bohigas, Giannoni, Schmit 84; see also Casati, Vals-Gris, Guarneri; Berry, Tabor) Universality Many quantum properties of chaotic systems are universal and agree with predictions from random matrix theory, in particular the statistics of energy levels. (Bohigas, Giannoni, Schmit 84;

More information

ENSC327 Communications Systems 2: Fourier Representations. Jie Liang School of Engineering Science Simon Fraser University

ENSC327 Communications Systems 2: Fourier Representations. Jie Liang School of Engineering Science Simon Fraser University ENSC327 Communications Systems 2: Fourier Representations Jie Liang School of Engineering Science Simon Fraser University 1 Outline Chap 2.1 2.5: Signal Classifications Fourier Transform Dirac Delta Function

More information

Wavelet Neural Networks for Nonlinear Time Series Analysis

Wavelet Neural Networks for Nonlinear Time Series Analysis Applied Mathematical Sciences, Vol. 4, 2010, no. 50, 2485-2495 Wavelet Neural Networks for Nonlinear Time Series Analysis K. K. Minu, M. C. Lineesh and C. Jessy John Department of Mathematics National

More information

Differential equations

Differential equations Differential equations Math 27 Spring 2008 In-term exam February 5th. Solutions This exam contains fourteen problems numbered through 4. Problems 3 are multiple choice problems, which each count 6% of

More information

Pricing of Cyber Insurance Contracts in a Network Model

Pricing of Cyber Insurance Contracts in a Network Model Pricing of Cyber Insurance Contracts in a Network Model Stefan Weber Leibniz Universität Hannover www.stochastik.uni-hannover.de (joint work with Matthias Fahrenwaldt & Kerstin Weske) WU Wien December

More information

SIS epidemics on Networks

SIS epidemics on Networks SIS epidemics on etworks Piet Van Mieghem in collaboration with Eric Cator, Ruud van de Bovenkamp, Cong Li, Stojan Trajanovski, Dongchao Guo, Annalisa Socievole and Huijuan Wang 1 EURADOM 30 June-2 July,

More information

WHEELSET BEARING VIBRATION ANALYSIS BASED ON NONLINEAR DYNAMICAL METHOD

WHEELSET BEARING VIBRATION ANALYSIS BASED ON NONLINEAR DYNAMICAL METHOD 15 th November 212. Vol. 45 No.1 25-212 JATIT & LLS. All rights reserved. WHEELSET BEARING VIBRATION ANALYSIS BASED ON NONLINEAR DYNAMICAL METHOD 1,2 ZHAO ZHIHONG, 2 LIU YONGQIANG 1 School of Computing

More information

Solutions of Chapter 3 Part 1/2

Solutions of Chapter 3 Part 1/2 Page 1 of 7 Solutions of Chapter 3 Part 1/ Problem 3.1-1 Find the energy of the signals depicted in Figs.P3.1-1. Figure 1: Fig3.1-1 (a) E x n x[n] 1 + + 3 + + 1 19 (b) E x n x[n] 1 + + 3 + + 1 19 (c) E

More information

Formal Design of Composite Physically Unclonable Function

Formal Design of Composite Physically Unclonable Function Formal Design of Composite Physically Unclonable Function Durga Prasad Sahoo Debdeep Mukhopadhyay Rajat Subhra Chakraborty Computer Science and Engineering Indian Institute of Technology, Kharagpur, India

More information

Computational Methods in Plasma Physics

Computational Methods in Plasma Physics Computational Methods in Plasma Physics Richard Fitzpatrick Institute for Fusion Studies University of Texas at Austin Purpose of Talk Describe use of numerical methods to solve simple problem in plasma

More information

Ricci Dark Energy Chao-Jun Feng SUCA, SHNU

Ricci Dark Energy Chao-Jun Feng SUCA, SHNU Ricci Dark Energy 21 2011.3.18-19 Chao-Jun Feng SUCA, SHNU Outline n Introduction to Ricci Dark Energy (RDE) n Stability and the constraint on the parameter n Age problem alleviated in viscous version

More information

5.6 Nonparametric Logistic Regression

5.6 Nonparametric Logistic Regression 5.6 onparametric Logistic Regression Dmitri Dranishnikov University of Florida Statistical Learning onparametric Logistic Regression onparametric? Doesnt mean that there are no parameters. Just means that

More information

UNIVERSITY OF CAMBRIDGE LOCAL EXAMINATIONS SYNDICATE General Certificate of Education Advanced Level FURTHER MATHEMATICS 9221/1 PAPER 1

UNIVERSITY OF CAMBRIDGE LOCAL EXAMINATIONS SYNDICATE General Certificate of Education Advanced Level FURTHER MATHEMATICS 9221/1 PAPER 1 ,--, ~"\, \ "~. "',,~ \ ~ 1.f8P;)1!,'" ;i *.~ UNIVERSITY OF CAMBRIDGE LOCAL EXAMINATIONS SYNDICATE General Certificate of Education Advanced Level FURTHER MATHEMATICS 9221/1 PAPER 1 MAY/JUNE SESSION 2001

More information

Practice Problems For Test 3

Practice Problems For Test 3 Practice Problems For Test 3 Power Series Preliminary Material. Find the interval of convergence of the following. Be sure to determine the convergence at the endpoints. (a) ( ) k (x ) k (x 3) k= k (b)

More information

CMPT 889: Lecture 2 Sinusoids, Complex Exponentials, Spectrum Representation

CMPT 889: Lecture 2 Sinusoids, Complex Exponentials, Spectrum Representation CMPT 889: Lecture 2 Sinusoids, Complex Exponentials, Spectrum Representation Tamara Smyth, tamaras@cs.sfu.ca School of Computing Science, Simon Fraser University September 26, 2005 1 Sinusoids Sinusoids

More information

Discussion Section #2, 31 Jan 2014

Discussion Section #2, 31 Jan 2014 Discussion Section #2, 31 Jan 2014 Lillian Ratliff 1 Unit Impulse The unit impulse (Dirac delta) has the following properties: { 0, t 0 δ(t) =, t = 0 ε ε δ(t) = 1 Remark 1. Important!: An ordinary function

More information

Boundary Conflicts and Cluster Coarsening: Waves of Life and Death in the Cyclic Competition of Four Species

Boundary Conflicts and Cluster Coarsening: Waves of Life and Death in the Cyclic Competition of Four Species Boundary Conflicts and Cluster Coarsening: Waves of Life and Death in the Cyclic Competition of Four Species Ahmed Roman, Michel Pleimling Virginia Tech, Blacksburg Friday, October 21 Roman A., Pleimling

More information

Sjoerd Verduyn Lunel (Utrecht University)

Sjoerd Verduyn Lunel (Utrecht University) Universiteit Utrecht, February 9, 016 Wasserstein distances in the analysis of time series and dynamical systems Sjoerd Verduyn Lunel (Utrecht University) S.M.VerduynLunel@uu.nl Abstract A new approach

More information

Research Article An Impulse Model for Computer Viruses

Research Article An Impulse Model for Computer Viruses Discrete Dynamics in Nature and Society Volume 2012, Article ID 260962, 13 pages doi:10.1155/2012/260962 Research Article An Impulse Model for Computer Viruses Chunming Zhang, Yun Zhao, and Yingjiang Wu

More information

How to do backpropagation in a brain

How to do backpropagation in a brain How to do backpropagation in a brain Geoffrey Hinton Canadian Institute for Advanced Research & University of Toronto & Google Inc. Prelude I will start with three slides explaining a popular type of deep

More information

Intelligent Systems (AI-2)

Intelligent Systems (AI-2) Intelligent Systems (AI-2) Computer Science cpsc422, Lecture 19 Oct, 23, 2015 Slide Sources Raymond J. Mooney University of Texas at Austin D. Koller, Stanford CS - Probabilistic Graphical Models D. Page,

More information

Christian Mohr

Christian Mohr Christian Mohr 20.12.2011 Recurrent Networks Networks in which units may have connections to units in the same or preceding layers Also connections to the unit itself possible Already covered: Hopfield

More information

PATTERN RECOGNITION AND MACHINE LEARNING

PATTERN RECOGNITION AND MACHINE LEARNING PATTERN RECOGNITION AND MACHINE LEARNING Slide Set 3: Detection Theory January 2018 Heikki Huttunen heikki.huttunen@tut.fi Department of Signal Processing Tampere University of Technology Detection theory

More information

Practice Problems For Test 3

Practice Problems For Test 3 Practice Problems For Test 3 Power Series Preliminary Material. Find the interval of convergence of the following. Be sure to determine the convergence at the endpoints. (a) ( ) k (x ) k (x 3) k= k (b)

More information

Nonlinear Dynamics. Moreno Marzolla Dip. di Informatica Scienza e Ingegneria (DISI) Università di Bologna.

Nonlinear Dynamics. Moreno Marzolla Dip. di Informatica Scienza e Ingegneria (DISI) Università di Bologna. Nonlinear Dynamics Moreno Marzolla Dip. di Informatica Scienza e Ingegneria (DISI) Università di Bologna http://www.moreno.marzolla.name/ 2 Introduction: Dynamics of Simple Maps 3 Dynamical systems A dynamical

More information

A Hybrid Method with Lorenz attractor based Cryptography and LSB Steganography

A Hybrid Method with Lorenz attractor based Cryptography and LSB Steganography International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article A Hybrid

More information

ECE 301 Division 1 Exam 1 Solutions, 10/6/2011, 8-9:45pm in ME 1061.

ECE 301 Division 1 Exam 1 Solutions, 10/6/2011, 8-9:45pm in ME 1061. ECE 301 Division 1 Exam 1 Solutions, 10/6/011, 8-9:45pm in ME 1061. Your ID will be checked during the exam. Please bring a No. pencil to fill out the answer sheet. This is a closed-book exam. No calculators

More information

Data-driven methods in application to flood defence systems monitoring and analysis Pyayt, A.

Data-driven methods in application to flood defence systems monitoring and analysis Pyayt, A. UvA-DARE (Digital Academic Repository) Data-driven methods in application to flood defence systems monitoring and analysis Pyayt, A. Link to publication Citation for published version (APA): Pyayt, A.

More information

A Chaotic Encryption System Using PCA Neural Networks

A Chaotic Encryption System Using PCA Neural Networks A Chaotic Encryption System Using PCA Neural Networks Xiao Fei, Guisong Liu, Bochuan Zheng Computational Intelligence Laboratory, School of Computer Science and Engineering, University of Electronic Science

More information

A posteriori analysis of a discontinuous Galerkin scheme for a diffuse interface model

A posteriori analysis of a discontinuous Galerkin scheme for a diffuse interface model A posteriori analysis of a discontinuous Galerkin scheme for a diffuse interface model Jan Giesselmann joint work with Ch. Makridakis (Univ. of Sussex), T. Pryer (Univ. of Reading) 9th DFG-CNRS WORKSHOP

More information

Output Analysis for a Single Model

Output Analysis for a Single Model Output Analysis for a Single Model Output Analysis for a Single Model Output analysis is the examination of data generated by a simulation. Its purpose is to predict the performance of a system or to compare

More information

Time-Series Based Prediction of Dynamical Systems and Complex. Networks

Time-Series Based Prediction of Dynamical Systems and Complex. Networks Time-Series Based Prediction of Dynamical Systems and Complex Collaborators Networks Ying-Cheng Lai ECEE Arizona State University Dr. Wenxu Wang, ECEE, ASU Mr. Ryan Yang, ECEE, ASU Mr. Riqi Su, ECEE, ASU

More information

Grades will be determined by the correctness of your answers (explanations are not required).

Grades will be determined by the correctness of your answers (explanations are not required). 6.00 (Fall 2011) Final Examination December 19, 2011 Name: Kerberos Username: Please circle your section number: Section Time 2 11 am 1 pm 4 2 pm Grades will be determined by the correctness of your answers

More information

NONLINEAR TIME SERIES ANALYSIS, WITH APPLICATIONS TO MEDICINE

NONLINEAR TIME SERIES ANALYSIS, WITH APPLICATIONS TO MEDICINE NONLINEAR TIME SERIES ANALYSIS, WITH APPLICATIONS TO MEDICINE José María Amigó Centro de Investigación Operativa, Universidad Miguel Hernández, Elche (Spain) J.M. Amigó (CIO) Nonlinear time series analysis

More information

Evolutionary Games on Networks. Wen-Xu Wang and G Ron Chen Center for Chaos and Complex Networks

Evolutionary Games on Networks. Wen-Xu Wang and G Ron Chen Center for Chaos and Complex Networks Evolutionary Games on Networks Wen-Xu Wang and G Ron Chen Center for Chaos and Complex Networks Email: wenxuw@gmail.com; wxwang@cityu.edu.hk Cooperative behavior among selfish individuals Evolutionary

More information

Entropy Gradient Maximization for Systems with Discoupled Time

Entropy Gradient Maximization for Systems with Discoupled Time Entropy Gradient Maximization for Systems with Discoupled Time I. V. Drozdov Abstract The conventional definition of time based on the period of oscillations or fluctuations around equilibrium states is

More information

Review (11.1) 1. A sequence is an infinite list of numbers {a n } n=1 = a 1, a 2, a 3, The sequence is said to converge if lim

Review (11.1) 1. A sequence is an infinite list of numbers {a n } n=1 = a 1, a 2, a 3, The sequence is said to converge if lim Announcements: Note that we have taking the sections of Chapter, out of order, doing section. first, and then the rest. Section. is motivation for the rest of the chapter. Do the homework questions from

More information

Invariant Lagrangian Systems on Lie Groups

Invariant Lagrangian Systems on Lie Groups Invariant Lagrangian Systems on Lie Groups Dennis Barrett Geometry and Geometric Control (GGC) Research Group Department of Mathematics (Pure and Applied) Rhodes University, Grahamstown 6140 Eastern Cape

More information

I have read and understood the instructions regarding academic dishonesty:

I have read and understood the instructions regarding academic dishonesty: Name Final Exam MATH 6600 SPRING 08 MARK TEST 0 ON YOUR SCANTRON! Student ID Section Number (see list below 03 UNIV 03 0:30am TR Alper, Onur 04 REC 3:30pm MWF Luo, Tao 05 UNIV 03 :30pm TR Hora, Raphael

More information

A Bayesian Perspective on Residential Demand Response Using Smart Meter Data

A Bayesian Perspective on Residential Demand Response Using Smart Meter Data A Bayesian Perspective on Residential Demand Response Using Smart Meter Data Datong-Paul Zhou, Maximilian Balandat, and Claire Tomlin University of California, Berkeley [datong.zhou, balandat, tomlin]@eecs.berkeley.edu

More information

Pentahedral Volume, Chaos, and Quantum Gravity

Pentahedral Volume, Chaos, and Quantum Gravity Pentahedral Volume, Chaos, and Quantum Gravity Hal Haggard May 30, 2012 Volume Polyhedral Volume (Bianchi, Doná and Speziale): ˆV Pol = The volume of a quantum polyhedron Outline 1 Pentahedral Volume 2

More information

ONR Mine Warfare Autonomy Virtual Program Review September 7, 2017

ONR Mine Warfare Autonomy Virtual Program Review September 7, 2017 ONR Mine Warfare Autonomy Virtual Program Review September 7, 2017 Information-driven Guidance and Control for Adaptive Target Detection and Classification Silvia Ferrari Pingping Zhu and Bo Fu Mechanical

More information

Shortest Paths & Link Weight Structure in Networks

Shortest Paths & Link Weight Structure in Networks Shortest Paths & Link Weight Structure in etworks Piet Van Mieghem CAIDA WIT (May 2006) P. Van Mieghem 1 Outline Introduction The Art of Modeling Conclusions P. Van Mieghem 2 Telecommunication: e2e A ETWORK

More information

ENGIN 211, Engineering Math. Laplace Transforms

ENGIN 211, Engineering Math. Laplace Transforms ENGIN 211, Engineering Math Laplace Transforms 1 Why Laplace Transform? Laplace transform converts a function in the time domain to its frequency domain. It is a powerful, systematic method in solving

More information

Nonlinear Dimensionality Reduction. Jose A. Costa

Nonlinear Dimensionality Reduction. Jose A. Costa Nonlinear Dimensionality Reduction Jose A. Costa Mathematics of Information Seminar, Dec. Motivation Many useful of signals such as: Image databases; Gene expression microarrays; Internet traffic time

More information

Research Article Propagation of Computer Virus under Human Intervention: A Dynamical Model

Research Article Propagation of Computer Virus under Human Intervention: A Dynamical Model Discrete Dynamics in Nature and ociety Volume 2012, Article ID 106950, 8 pages doi:10.1155/2012/106950 Research Article Propagation of Computer Virus under Human Intervention: A Dynamical Model Chenquan

More information

Cyber and Physical Information Fusion for Infrastructure Protection: A Game-Theoretic Approach

Cyber and Physical Information Fusion for Infrastructure Protection: A Game-Theoretic Approach Cyber and Physical Information Fusion for Infrastructure Protection: A Game-Theoretic Approach Nageswara S V Rao Steve W Poole Chris Y T Ma Fei He Jun Zhuang David K Y Yau Oak Ridge National Laboratory

More information

Grades will be determined by the correctness of your answers (explanations are not required).

Grades will be determined by the correctness of your answers (explanations are not required). 6.00 (Fall 20) Final Examination December 9, 20 Name: Kerberos Username: Please circle your section number: Section Time 2 am pm 4 2 pm Grades will be determined by the correctness of your answers (explanations

More information

ENSC327 Communications Systems 2: Fourier Representations. School of Engineering Science Simon Fraser University

ENSC327 Communications Systems 2: Fourier Representations. School of Engineering Science Simon Fraser University ENSC37 Communications Systems : Fourier Representations School o Engineering Science Simon Fraser University Outline Chap..5: Signal Classiications Fourier Transorm Dirac Delta Function Unit Impulse Fourier

More information

Introduction to Differential Equations

Introduction to Differential Equations Chapter 1 Introduction to Differential Equations 1.1 Basic Terminology Most of the phenomena studied in the sciences and engineering involve processes that change with time. For example, it is well known

More information

Patrol: Revealing Zero-day Attack Paths through Network-wide System Object Dependencies

Patrol: Revealing Zero-day Attack Paths through Network-wide System Object Dependencies Patrol: Revealing Zero-day Attack Paths through Network-wide System Object Dependencies Jun Dai, Xiaoyan Sun, and Peng Liu College of Information Sciences and Technology Pennsylvania State University,

More information

AP Calculus 2004 AB FRQ Solutions

AP Calculus 2004 AB FRQ Solutions AP Calculus 4 AB FRQ Solutions Louis A. Talman, Ph. D. Emeritus Professor of Mathematics Metropolitan State University of Denver July, 7 Problem. Part a The function F (t) = 8 + 4 sin(t/) gives the rate,

More information

Lesson 4: Non-fading Memory Nonlinearities

Lesson 4: Non-fading Memory Nonlinearities Lesson 4: Non-fading Memory Nonlinearities Nonlinear Signal Processing SS 2017 Christian Knoll Signal Processing and Speech Communication Laboratory Graz University of Technology June 22, 2017 NLSP SS

More information

Topic 3: Fourier Series (FS)

Topic 3: Fourier Series (FS) ELEC264: Signals And Systems Topic 3: Fourier Series (FS) o o o o Introduction to frequency analysis of signals CT FS Fourier series of CT periodic signals Signal Symmetry and CT Fourier Series Properties

More information

Anomaly Detection. Jing Gao. SUNY Buffalo

Anomaly Detection. Jing Gao. SUNY Buffalo Anomaly Detection Jing Gao SUNY Buffalo 1 Anomaly Detection Anomalies the set of objects are considerably dissimilar from the remainder of the data occur relatively infrequently when they do occur, their

More information

Rough paths methods 1: Introduction

Rough paths methods 1: Introduction Rough paths methods 1: Introduction Samy Tindel Purdue University University of Aarhus 216 Samy T. (Purdue) Rough Paths 1 Aarhus 216 1 / 16 Outline 1 Motivations for rough paths techniques 2 Summary of

More information