Multi-dimensional state estimation in adversarial environment

Size: px
Start display at page:

Download "Multi-dimensional state estimation in adversarial environment"

Transcription

1 Submitted, 5 Chinese Control Conference (CCC) htt://wwwcdscaltechedu/~murray/aers/mm5-ccchtml Multi-dimensional state estimation in adversarial environment Yilin Mo, Richard M Murray California nstitute of Technology, E California Blvd, Pasadena, CA 95, United States yilinmo@caltechedu,murray@cdscaltechedu Abstract: We consider the estimation of a vector state based on m measurements that can be otentially maniulated by an adversary The attacker is assumed to have limited resources and can only maniulate u to l of the m measurements However, it can the comromise measurements arbitrarily The roblem is formulated as a mini otimization, where one seeks to construct an otimal estimator that minimizes the worst-case error against all ossible maniulations by the attacker and all ossible sensor noises We show that if the system is not observable after removing l sensors, then the worst-case error is infinite, regardless of the estimation strategy f the system remains observable after removing arbitrary set of l sensor, we rove that the otimal state estimation can be comuted by solving a semidefinite rogramming roblem A numerical examle is rovided to illustrate the effectiveness of the roosed state estimator Key Words: Security, Estimation ntroduction The increasing use of networked embedded sensors to monitor and control critical infrastructures rovides otential malicious agents with the oortunity to disrut their oerations by corruting sensor measurements Suervisory Control And Data Acquisition (SCADA) systems, for examle, run a wide range of safety critical lants and rocesses, including manufacturing, water and gas treatment and distribution, facility control, and ower grids A wide variety of motivations exists for launching an attack on the such systems, ranging from financial reasons, eg, reducing the electricity bill, all the way to terrorism, eg, threatening the life of ossibly an entire oulation by controlling electricity and other life-critical resources A successful attack to such kind of systems may significantly hamer the economy, the environment, and may even lead to the loss of human life The first-ever SCADA system malware (called Stuxnet) was found in July and rose significant concern about SCADA system security [, ] The research community has acknowledged the imortance of addressing the challenge of designing secure detection, estimation and control systems [] We consider a secure estimation roblem insired by security concerns that arise from the ossible maniulation of sensor data We focus our attention on the estimation of a vector state x R n from measurements collected by m sensors, with the caveat that the measurements are disturbed by an L bounded noise and some of them can be further maniulated by a malicious third arty Limitations in the resources available to the attacker enable it to only maniulate l of the m sensors However, the attacker has total control over the corruted sensors, as it can change the measurements of the comromised sensors arbitrarily To minimize the estimator s erformance degradation in the resence of such attacks, we construct mini estimator that minimize the worst-case exected cost against all ossible noise and attacker s maniulate We show that if the system becomes unobservable after removing l sensor measurements, then even the otimal state This work is suorted in art by BM and UTC through icyphy consortium estimator will have a worst-case unbounded error For the case where the system remains observable after removing an arbitrary set of l sensors, we rovide the exlicit form of the otimal estimation, which is given by the Chebyshev center of a union of ellisoids, which can be comuted via semidefinite rogramming Related Work Robust estimators such as M-estimator, L-estimator, R- estimator and etc have also been extensively studied in the literature [ ] However, such aroaches usually assume that the outliers of the data are generated indeendently by some other robability distribution different from the model assumtions Furthermore, the robustness is usually measured by breakdown oints [, 8] or influence functions [9] However, the indeendent assumtions do not hold in security settings As the attacker can take control over multile sensors, the comromised measurements from these sensors can be jointly selected by the adversary to imize the estimation error As a result, in this aer, we design our estimator to minimize the worst-case L error against all ossible attacks Therefore, the concets of robustness and security are different from each other n other words, a robust estimator may not necessarily be secure and thus the techniques develoed for robust estimation need to be re-examined before they can be alied in the context of security Furthermore, bad data detection and identification techniques, which are based on truncating the atyical data, have been widely used in large scale systems such as the ower grid [] While such aroaches are very successful in detecting and removing random failures, they are not effective against integrity attacks Liu et al [] illustrate how an adversary can inject a stealthy inut into the measurements to change the state estimate, without being detected by the bad data detector Sandberg et al [] consider how to find a sarse stealthy inut, which enables the adversary to launch an attack with a minimum number of comromised sensors Xie et al [] further illustrate that the stealthy integrity attacks on state estimation can lead to a financial gain in the electricity market for the adversary For dynamical systems, a widely used aroach is to construct failure-sensitive filters [] This detection scheme

2 has been investigated recently in the context of cyberhysical security [5 8] n these scenarios, the attacker can either arbitrarily erturb the system along certain directions without being detected by any filter or cannot induce any erturbation, without incurring detection However, in the majority of these contributions, the system model is assumed to be noiseless, which greatly favors the failure detector, since the evolution of the system is deterministic and any deviation from the redetermined trajectory can be detected A more realistic system model with bounded noise is considered by Pajic et al [9] They roose an estimator by solving an L norm minimization roblem and rovide erformance bound on the estimation error n [, ], the authors also consider a noisy system, roviding an algebraic condition under which an attacker can successfully destabilize the system and characterizing the erformance of state estimators in this scenario This aer generalizes our revious works on secure estimation [, ], which consider designing the otimal estimator for a scalar state and minimizes the worst-case mean squared error n this aer, we derive the otimal estimator for a vector state, with the caveat that the noise is L bounded The rest of aer is organized as follows: n Section we rovide some reliminary results on the radius and diameter of comact set in Euclidean sace n Section we formulate the roblem of secure estimation with l maniulated measurements from m total measurements n Section, we characterize the erformance of the otimal estimator and rovide an observability condition under which the estimator can have an unbounded error n Section 5, we rovide an algorithm to comute the otimal state estimate via semidefinite rogramming n Section we rovide a numerical examle to illustrate the roosed algorithm Finally, Section concludes the aer Notation Let x R n be a vector, then kxk is the -norm of x kxk is the zero norm of x, ie, the number of non-zero entries of x All comarisons between matrices are in the ositive semidefinite sense Preliminary A ball B(x, r) R n is defined as B(x, r), {x R n : kx xk r} Consider a set S R n A ball B(x, r) covers S if and only if S B(x, r) For any oint x R n, define (x, S), inf{r R + : S B(x, r)} We will assume that the infimum over an emty set is Hence, if S is unbounded, then (x, S) = for any x For a bounded set S, define the radius r(s) R + and Chebyshev center c(s) R n of S to be r(s), inf (x, S), xrn c(s), arg min xr n (x, S) n an essence, B(c(S),r(S)) is the smallest radius ball that covers S Notice that c(s) may not necessarily belong to S For an unbounded S, we define r(s) = We further define the diameter d(s) of the set S as d(s), su (x, S) xs Notice that in general d(s) = r(s) For examle, for a equilateral triangle with side length, we have d(s) =, while r(s) =/ n general, the following relation between r(s) and d(s) holds: Theorem Let S R n be a non-emty and bounded set, then the following inequalities hold on r(s) and d(s) r d(s) n r(s) d(s) d(s) n + Proof The first inequality is due to the fact that S B(c(S),r(S)), which imlies that d(s) d[b(c(s),r(s))] = r(s) The second inequality is from Jung s theorem [] The third inequality is trivial Problem Formulation The goal is to estimate the state x R n from a vector y, [y,,y m ] T R m consisting of m sensor measurements y i R, where the index i S, {,,,m} The measurements could otentially be comromised by an adversary Therefore, we assume that x and y satisfies the following equation: y = Hx + Gw + a, () where kwk is the sensor noise, which is assumed to be bounded, and G R m m is assumed to be full rank The vector a is the bias injected by the attacker The non-zero entries of a indicates the set of comromised sensors n this aer, we assume that the attacker can only maniulate u to l sensors As a result, kak l Remark The arameter l can also be interreted as a design arameter for the system oerator n general, increasing l will increase the resilience of the estimator under attack However, a large l could result in erformance degradation during normal oeration when no sensor is comromised Therefore, there exists a trade-off between resilience and efficiency (under normal oeration), which can be tuned by choosing a suitable arameter l Define H, h h m 5,w, w w m 5,a, a a m 5, and define the set Y as the set of all ossible maniulated measurements, ie, Y, {y R m : 9 x, w, a, such that kwk, kak l and y = Hx + Gw + a}

3 For any y Y, we can define the set X(y) as the set of feasible x that can generate y, ie, X(y), {x R n : 9 w, a, such that kwk, kak l and y = Hx + Gw + a} An estimator is a function f : Y! R n, where ˆx = f(y) Given y, the magnitude of the worst case estimation error is defined as e(y), su xx(y) kf(y) xk From the definition of the Chebyshev center, we know that the otimal estimator with smallest worst case error e is given by f (y), c(x(y)), with worst case error e(y) =r(x(y)) Therefore, the worst case error magnitude for all ossible y is given by e, su r(x(y)) yy n the following sections, we rovides an uer and lower bound for e We further roose an algorithm to comute c(x(y)) via convex otimization Performance Bounds for the Otimal Estimator This section is devoted to analyzing the erformance of the otimal estimator To this end, for any index set = {i,,i j }, define the comlement set c = S\ and define subsace V, san(e i,,e ij ) R m, where e i R m is the ith canonical basis vector Define the following set: X (y), {x R n : 9 w, a V c, such that kwk and y = Hx + Gw + a} Hence, X (y) reresents all ossible states that can generate measurement y when the sensors in are good and the sensors in c are comromised By enumerating all ossible s, it is easy to see that X(y) can be written as X(y) = [ X (y) =m For any = {i,,i j }, we can define H, h i h ij 5,G, l g i g ij where g i is the ith row vector of G F, G G T 5,y, y i y ij 5, Since G is full rank, G is full row rank, which imlies that F is full rank Thus, if H is full column rank, we can define K, H T F H H T F,, P, H T F H U, ( H K ) T F ( H K ) The following theorem rovides bounds on e : Theorem f there exists an index set K Swith cardinality m l, such that H K is not of full column rank, then e = f for all K = m l, H K is full column rank, then for all ossible y Y, we have su d(x(y)) = (PK ) () yy K =m l Therefore, e satisfies (PK ) e K =m l K =m l where (P ) is the sectral radius of P (PK ), () Before roving Theorem, we need the following lemma: Lemma f K K Sand H K is full column rank, then the following statement holds: ) H K is also full column rank ) P K P K Proof Without loss of generality, let us assume that HK H K = () H K Therefore, n rank(h K ) rank(h K )=n Hence, H K is full column rank, which imlies that P K is well-defined To rove P K P K, we only need to rove that H T K F K H K H T K F K H K (5) From definition of F, we can write F K as F F F K = F F, where F = F K Using Schur comlements, we have F F K = F + F F FF F F F Combining with (), we can rove (5) We are now ready to rove Theorem : Proof of Theorem We first rove () Suose that for all K Swith cardinality m l, H K is full column rank Let us consider a air of set, J with cardinality m l Define K as K = \ J = S\ [ c J c Clearly, K m l and it includes a index set of size m l Hence, by Lemma, H K is also full column rank Now for any oint x X (y) and x X J (y), we have: Hx + Gw + a = Hx + Gw + a = y, () where a V c and a V J c Since both a and a have zero entries on the ith entry, where i K, () imlies that H K x + G K w )=H K x + G K w ) ()

4 which imlies that By the fact that kw x x = K K G K (w w ) (8) w k, we have kx x kkk K G K k = (P K ), where kk K G K k is the largest singular value of K K G K Therefore, by Lemma, we have su d(x(y)) yy K m l = K =m l (PK ) (PK ) Now we need to rove that the equality of () holds Suose that we find x,x and kw k, kw k that satisfies () and kx x k = (P K ) We know that H K x + G K w = H K x + G K w (9) Therefore, let us create a y, such that Thus, y K = H K x + G K w, y \K = H \K x + G \K w, y J\K = H J\K x + G J\K w, y S\([J) = y K H K x = G K w, y \K H \K x = G \K w, which imlies that x X (y) On the other hand, y K H K x = H K (x x )+G K w = G K w, y J\K H J\K x = G J\K w, which imlies that x X J (y) Therefore, () holds () can be roved by alying Theorem Now suose there exists an K = m l, such that H K is not full column rank We can find index set, J, such that = J = m l and T J = K Furthermore, we know that there exists x =, such that H K x = As a result, if we choose x =, w = w =, then (9) holds for x,x,w,w Now by the similar argument, we can construct a y, such that x X (y) and x = X J (y) Moreover, by linearity, we know that Hence, by Theorem, e x X ( y), = x X J ( y) d(x(y)) su yy k x k su = R 5 Estimator Design n this section, we first characterize the shae of X (y): Theorem Define the function V (x) :R n! R as the solution of the following otimization roblem: kwk minimize wr m subject to G w = y H x () Then V (x) is given by V (x) =(x ˆx (y)) T P (x ˆx (y)) + " (y), () where and ˆx (y) =K y, () " (y) =y T U y () Proof Consider the constraint of the otimization roblem () y H x = G w () As G is full row rank, G is also full row rank Consider the singular value decomosition of G, we get G = Q Q, where Q,Q are orthogonal matrices with roer dimensions and is an invertible and diagonal matrix Hence, () imlies that Q T y Q T H x = v (5) where v = Q w and kvk = kwk By rojecting Q T y into the subsace san( Q T H ), we have Q T y Q T H ˆx (y) + Q T H [x ˆx (y)] = v () The first term on the LHS of () is erendicular to the second term Thus, () is equivalent to " (y)+(x ˆx (y)) T P (x ˆx (y)) = v kvk = kwk Clearly, the equality holds when v = v,,v,,, Hence V (x) =" (y)+(x ˆx (y)) T P (x ˆx (y)) By Theorem, we immediately have the following corollary: Corollary f " (y) >, then X (y) is an emty set Otherwise, X (y) is an ellisoid given by X (y) ={x :(x ˆx (y)) T P (x ˆx (y)) " (y)} ()

5 Proof By definition, x X (y) is equivalent to the existence of w, such that kwk and y = H x + G w Hence, the corollary holds by Theorem Remark One can view " (y) as the deviation of the measurement from the attack model f " (y), ie, the deviation cannot be exlained by the noise, then X (y) is emty, which imlies that the good sensor set is not Let us define set as, { S : = m l, " (y)} (8) Since X(y) = S =l X (y) = S X (y), we know that X(y) is a union of ellisoids To check if a ball covers a union of ellisoids, we have the following theorem [5]: Theorem A ball B(x, r) covers X(y) if and only if for every index set = m l, such that " (y), there exists, such that x x T r x T 5, (9) x where is defined as, = P P ˆx (y) ˆx (y) T P ˆx (y) T P ˆx (y)+" (y) 5 Proof This theorem can be roved by Lemma 8 in [5] Therefore, we can derive the otimal state estimate as the solution of the following semidefinite rogramming roblem: minimize ' () ˆx,', subject to ',, 8, ˆx ˆx T ' ˆx T 5, 8 ˆx where the radius of the Chebyshev ball is r = ' n conclusion, the otimal state estimation can be comuted via the following algorithm: ) Enumerate all ossible = m l, comute ˆx (y) and " (y) via () and () ) Check whether " (y) is no greater than Comute the index set via (8) ) Solve the otimization roblem () Numerical Examle n this section, we rovide a numerical examle to illustrate our estimator design We assume that n =, m = and one sensor is comromised The noise is assume to satisfy kwk = We further assume that H = 5,G= t is easy to check that for any K = m l =, H K is full column rank We first consider the worst case erformance of our estimator One can verify that K = (P K)=8 where the corresonding K = {, } Using the rocedure described in the roof of Theorem, we choose = {,, }, J = {,, } We can then construct the following variables: and x = 5 x =,w =,w = The corresonding y is given by y = The otimal state estimate ˆx and worst-case error e(y) is given by ˆx = 85,e(y) =8 On the other hand, if the system oerator is unaware of the existence of the adversary, it is easy to rove that the otimal estimator designed for the non-adversarial environment is given by ˆx = H T (GG T ) H H T (GG T ) y () For our case, the state estimate given by () is ˆx = 8 9 for which the worst case error e(y) =,

6 X {,,} (y) X {,,} (y) Fig : The erformance of the otimal state estimator The green ellise corresonds to X {,,} (y) and the red ellise corresonds to X {,,} (y) The set X {,,} (y) and X {,,} (y) is emty The black + is the otimal state estimate while the black dashed line is the Chebyshev ball for X(y) The red corresonds to the outut of the otimal state estimator designed for benign sensors and the red dashed line is the minimum covering ball of X(y) centered at Conclusion and Future Work We consider the estimation of a vector state x based on m measurements, where l of them are malicious and can be changed arbitrarily by an adversary We rove that if the system is not observable after removing l sensor measurements, then the attacker can make the worst case estimation error to be infinite On the other hand, we rovides uer and lower bound for the worst case estimation error when the system remains observable after removing any set of l sensors We then derive the otimal state estimation as the solution of a semidefinite rogramming roblem n the future, we want to find a near otimal state estimator with lower comutation comlexity Furthermore, we would like to consider stochastic noise models References [] T M Chen, Stuxnet, the real start of cyber warfare? [editor s note], vol, no,, [] D P Fidler, Was stuxnet an act of war? decoding a cyberattack, EEE Security & Privacy, vol 9, no, 5 59, [] A A Cárdenas, S Amin, and S Sastry, Research challenges for the security of control systems, in HOTSEC 8: Proceedings of the rd conference on Hot toics in security Berkeley, CA, USA: USENX Association, 8, [] S A Kassam and H V Poor, Robust techniques for signal rocessing: A survey, vol, no, 8, 985 [5] R A Maronna, D R Martin, and V J Yohai, Robust Statistics: Theory and Methods Wiley, [] P J Huber and E M Ronchetti, Robust Statistics Wiely, 9 [] F R Hamel, A general qualitative definition of robustness, The Annals of Mathematical Statistics, vol, no, 88 89, Dec 9 [8] D L Donoho and P J Huber, The notion of breakdown oint, A Festschrift for Erich L Lehmann, 5 8, 98 [9] F R Hamel, The influence curve and its role in robust estimation, Journal of the American Statistical Association, vol 9, no, 8 9, 9 [] A Abur and A G Exósito, Power System State Estimation: Theory and mlementation CRC Press, [] Y Liu, M Reiter, and P Ning, False data injection attacks against state estimation in electric ower grids, in Proceedings of the th ACM conference on Comuter and communications security, 9 [] H Sandberg, A Teixeira, and K H Johansson, On security indices for state estimators in ower networks, in First Worksho on Secure Control Systems, [] L Xie, Y Mo, and B Sinooli, ntegrity data attacks in ower market oerations, EEE Transactions on Smart Grid, vol, no, 59, [] A Willsky, A survey of design methods for failure detection in dynamic systems, Automatica, vol,, Nov 9 [5] F Pasqualetti, A Bicchi, and F Bullo, Consensus comutation in unreliable networks: A system theoretic aroach, EEE Transactions on Automatic Control, vol 5, no, 9, Jan [] F Pasqualetti, F Dorfler, and F Bullo, Cyber-hysical attacks in ower networks: models, fundamental limitations and monitor design, in Proc 5th EEE Conf Decision and Control and Euroean Control Conf (CDC-ECC),, 95 [] S Sundaram, M Pajic, C Hadjicostis, R Mangharam, and G J Paas, The wireless control network: monitoring for malicious behavior, in EEE Conference on Decision and Contro, Atlanta, GA, Dec [8] H Fawzi, P Tabuada, and S Diggavi, Security for control systems under sensor and actuator attacks, in Proc EEE 5st Annual Conf Decision and Control (CDC), Maui, H,, [9] M Pajic, J Weimer, N Bezzo, P Tabuada, O Sokolsky, Lee, and G Paas, Robustness of attack-resilient state estimators, in Cyber-Physical Systems (CCPS), ACM/EEE nternational Conference on, Aril, [] Y Mo, E Garone, A Casavola, and B Sinooli, False data injection attacks against state estimation in wireless sensor networks, in Proc 9th EEE Conf Decision and Control (CDC), Atlanta, Georgia,, [] Y Mo and B Sinooli, False data injection attacks in cyber hysical systems, in First Worksho on Secure Control Systems, Stockholm, Sweden, Aril [], Robust estimation in the resence of integrity attacks, in 5nd EEE Conference on Decision and Control,, 85 9 [], Secure estimation in the resence of integrity attacks, Automatic Control, EEE Transactions on, vol PP, no 99,, [] L Danzer, B Grünbaum, and V Klee, Helly s Theorem and ts Relatives, ser Proceedings of symosia in ure mathematics: Convexity American Mathematical Society, 9 [5] E Yildirim, On the minimum volume covering ellisoid of ellisoids, SAM Journal on Otimization, vol, no,, [Online] Available: htt: //dxdoiorg//55

Dynamic State Estimation in the Presence of Compromised Sensory Data

Dynamic State Estimation in the Presence of Compromised Sensory Data 2015 IEEE 54th Annual Conference on Decision and Control (CDC) December 15-18, 2015. Osaka, Japan Dynamic State Estimation in the Presence of Compromised Sensory Data Yorie Nakahira, Yilin Mo Abstract

More information

Secure Dynamic State Estimation via Local Estimators

Secure Dynamic State Estimation via Local Estimators Secure Dynamic State Estimation via Local Estimators Yilin Mo, Emanuele Garone Abstract We consider the problem of estimating the state of a linear time-invariant Gaussian system using m sensors, where

More information

Coding Sensor Outputs for Injection Attacks Detection

Coding Sensor Outputs for Injection Attacks Detection 53rd IEEE Conference on Decision and Control December 15-17, 2014 Los Angeles, California, USA Coding Sensor Outputs for Injection Attacks Detection Fei Miao Quanyan Zhu Miroslav Pajic George J Pappas

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

Robustness of classifiers to uniform l p and Gaussian noise Supplementary material

Robustness of classifiers to uniform l p and Gaussian noise Supplementary material Robustness of classifiers to uniform l and Gaussian noise Sulementary material Jean-Yves Franceschi Ecole Normale Suérieure de Lyon LIP UMR 5668 Omar Fawzi Ecole Normale Suérieure de Lyon LIP UMR 5668

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

Research Article Controllability of Linear Discrete-Time Systems with Both Delayed States and Delayed Inputs

Research Article Controllability of Linear Discrete-Time Systems with Both Delayed States and Delayed Inputs Abstract and Alied Analysis Volume 203 Article ID 97546 5 ages htt://dxdoiorg/055/203/97546 Research Article Controllability of Linear Discrete-Time Systems with Both Delayed States and Delayed Inuts Hong

More information

Chater Matrix Norms and Singular Value Decomosition Introduction In this lecture, we introduce the notion of a norm for matrices The singular value de

Chater Matrix Norms and Singular Value Decomosition Introduction In this lecture, we introduce the notion of a norm for matrices The singular value de Lectures on Dynamic Systems and Control Mohammed Dahleh Munther A Dahleh George Verghese Deartment of Electrical Engineering and Comuter Science Massachuasetts Institute of Technology c Chater Matrix Norms

More information

Positive decomposition of transfer functions with multiple poles

Positive decomposition of transfer functions with multiple poles Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.

More information

State Estimation with ARMarkov Models

State Estimation with ARMarkov Models Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,

More information

General Linear Model Introduction, Classes of Linear models and Estimation

General Linear Model Introduction, Classes of Linear models and Estimation Stat 740 General Linear Model Introduction, Classes of Linear models and Estimation An aim of scientific enquiry: To describe or to discover relationshis among events (variables) in the controlled (laboratory)

More information

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces Abstract and Alied Analysis Volume 2012, Article ID 264103, 11 ages doi:10.1155/2012/264103 Research Article An iterative Algorithm for Hemicontractive Maings in Banach Saces Youli Yu, 1 Zhitao Wu, 2 and

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

MATH 6210: SOLUTIONS TO PROBLEM SET #3

MATH 6210: SOLUTIONS TO PROBLEM SET #3 MATH 6210: SOLUTIONS TO PROBLEM SET #3 Rudin, Chater 4, Problem #3. The sace L (T) is searable since the trigonometric olynomials with comlex coefficients whose real and imaginary arts are rational form

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

ON THE NORM OF AN IDEMPOTENT SCHUR MULTIPLIER ON THE SCHATTEN CLASS

ON THE NORM OF AN IDEMPOTENT SCHUR MULTIPLIER ON THE SCHATTEN CLASS PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY Volume 00, Number 0, Pages 000 000 S 000-9939XX)0000-0 ON THE NORM OF AN IDEMPOTENT SCHUR MULTIPLIER ON THE SCHATTEN CLASS WILLIAM D. BANKS AND ASMA HARCHARRAS

More information

Attack-Resilient H 2, H, and l 1 State Estimator

Attack-Resilient H 2, H, and l 1 State Estimator Attack-Resilient H, H, and l State Estimator Yorie Nakahira, Student Member, IEEE, and Yilin Mo, Member, IEEE, Abstract This paper considers the secure state estimation problem for noisy systems in the

More information

Recursive Estimation of the Preisach Density function for a Smart Actuator

Recursive Estimation of the Preisach Density function for a Smart Actuator Recursive Estimation of the Preisach Density function for a Smart Actuator Ram V. Iyer Deartment of Mathematics and Statistics, Texas Tech University, Lubbock, TX 7949-142. ABSTRACT The Preisach oerator

More information

STABILITY ANALYSIS TOOL FOR TUNING UNCONSTRAINED DECENTRALIZED MODEL PREDICTIVE CONTROLLERS

STABILITY ANALYSIS TOOL FOR TUNING UNCONSTRAINED DECENTRALIZED MODEL PREDICTIVE CONTROLLERS STABILITY ANALYSIS TOOL FOR TUNING UNCONSTRAINED DECENTRALIZED MODEL PREDICTIVE CONTROLLERS Massimo Vaccarini Sauro Longhi M. Reza Katebi D.I.I.G.A., Università Politecnica delle Marche, Ancona, Italy

More information

where x i is the ith coordinate of x R N. 1. Show that the following upper bound holds for the growth function of H:

where x i is the ith coordinate of x R N. 1. Show that the following upper bound holds for the growth function of H: Mehryar Mohri Foundations of Machine Learning Courant Institute of Mathematical Sciences Homework assignment 2 October 25, 2017 Due: November 08, 2017 A. Growth function Growth function of stum functions.

More information

Introduction to MVC. least common denominator of all non-identical-zero minors of all order of G(s). Example: The minor of order 2: 1 2 ( s 1)

Introduction to MVC. least common denominator of all non-identical-zero minors of all order of G(s). Example: The minor of order 2: 1 2 ( s 1) Introduction to MVC Definition---Proerness and strictly roerness A system G(s) is roer if all its elements { gij ( s)} are roer, and strictly roer if all its elements are strictly roer. Definition---Causal

More information

Beyond Worst-Case Reconstruction in Deterministic Compressed Sensing

Beyond Worst-Case Reconstruction in Deterministic Compressed Sensing Beyond Worst-Case Reconstruction in Deterministic Comressed Sensing Sina Jafarour, ember, IEEE, arco F Duarte, ember, IEEE, and Robert Calderbank, Fellow, IEEE Abstract The role of random measurement in

More information

Strong Matching of Points with Geometric Shapes

Strong Matching of Points with Geometric Shapes Strong Matching of Points with Geometric Shaes Ahmad Biniaz Anil Maheshwari Michiel Smid School of Comuter Science, Carleton University, Ottawa, Canada December 9, 05 In memory of Ferran Hurtado. Abstract

More information

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction GOOD MODELS FOR CUBIC SURFACES ANDREAS-STEPHAN ELSENHANS Abstract. This article describes an algorithm for finding a model of a hyersurface with small coefficients. It is shown that the aroach works in

More information

Numerical Linear Algebra

Numerical Linear Algebra Numerical Linear Algebra Numerous alications in statistics, articularly in the fitting of linear models. Notation and conventions: Elements of a matrix A are denoted by a ij, where i indexes the rows and

More information

Figure : An 8 bridge design grid. (a) Run this model using LOQO. What is the otimal comliance? What is the running time?

Figure : An 8 bridge design grid. (a) Run this model using LOQO. What is the otimal comliance? What is the running time? 5.094/SMA53 Systems Otimization: Models and Comutation Assignment 5 (00 o i n ts) Due Aril 7, 004 Some Convex Analysis (0 o i n ts) (a) Given ositive scalars L and E, consider the following set in three-dimensional

More information

Additive results for the generalized Drazin inverse in a Banach algebra

Additive results for the generalized Drazin inverse in a Banach algebra Additive results for the generalized Drazin inverse in a Banach algebra Dragana S. Cvetković-Ilić Dragan S. Djordjević and Yimin Wei* Abstract In this aer we investigate additive roerties of the generalized

More information

Supplementary Materials for Robust Estimation of the False Discovery Rate

Supplementary Materials for Robust Estimation of the False Discovery Rate Sulementary Materials for Robust Estimation of the False Discovery Rate Stan Pounds and Cheng Cheng This sulemental contains roofs regarding theoretical roerties of the roosed method (Section S1), rovides

More information

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators S. K. Mallik, Student Member, IEEE, S. Chakrabarti, Senior Member, IEEE, S. N. Singh, Senior Member, IEEE Deartment of Electrical

More information

arxiv: v1 [quant-ph] 20 Jun 2017

arxiv: v1 [quant-ph] 20 Jun 2017 A Direct Couling Coherent Quantum Observer for an Oscillatory Quantum Plant Ian R Petersen arxiv:76648v quant-h Jun 7 Abstract A direct couling coherent observer is constructed for a linear quantum lant

More information

Feedback-error control

Feedback-error control Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller

More information

Sums of independent random variables

Sums of independent random variables 3 Sums of indeendent random variables This lecture collects a number of estimates for sums of indeendent random variables with values in a Banach sace E. We concentrate on sums of the form N γ nx n, where

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

An Abrupt Change Detection Heuristic with Applications to Cyber Data Attacks on Power Systems π

An Abrupt Change Detection Heuristic with Applications to Cyber Data Attacks on Power Systems π An Abrupt Change Detection Heuristic with Applications to Cyber Data Attacks on Power Systems π Borhan M. Sanandaji Eilyan Bitar Kameshwar Poolla and Tyrone L. Vincent Abstract We present an analysis of

More information

LECTURE 7 NOTES. x n. d x if. E [g(x n )] E [g(x)]

LECTURE 7 NOTES. x n. d x if. E [g(x n )] E [g(x)] LECTURE 7 NOTES 1. Convergence of random variables. Before delving into the large samle roerties of the MLE, we review some concets from large samle theory. 1. Convergence in robability: x n x if, for

More information

On Wald-Type Optimal Stopping for Brownian Motion

On Wald-Type Optimal Stopping for Brownian Motion J Al Probab Vol 34, No 1, 1997, (66-73) Prerint Ser No 1, 1994, Math Inst Aarhus On Wald-Tye Otimal Stoing for Brownian Motion S RAVRSN and PSKIR The solution is resented to all otimal stoing roblems of

More information

Positive Definite Uncertain Homogeneous Matrix Polynomials: Analysis and Application

Positive Definite Uncertain Homogeneous Matrix Polynomials: Analysis and Application BULGARIA ACADEMY OF SCIECES CYBEREICS AD IFORMAIO ECHOLOGIES Volume 9 o 3 Sofia 009 Positive Definite Uncertain Homogeneous Matrix Polynomials: Analysis and Alication Svetoslav Savov Institute of Information

More information

Use of Transformations and the Repeated Statement in PROC GLM in SAS Ed Stanek

Use of Transformations and the Repeated Statement in PROC GLM in SAS Ed Stanek Use of Transformations and the Reeated Statement in PROC GLM in SAS Ed Stanek Introduction We describe how the Reeated Statement in PROC GLM in SAS transforms the data to rovide tests of hyotheses of interest.

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

2-D Analysis for Iterative Learning Controller for Discrete-Time Systems With Variable Initial Conditions Yong FANG 1, and Tommy W. S.

2-D Analysis for Iterative Learning Controller for Discrete-Time Systems With Variable Initial Conditions Yong FANG 1, and Tommy W. S. -D Analysis for Iterative Learning Controller for Discrete-ime Systems With Variable Initial Conditions Yong FANG, and ommy W. S. Chow Abstract In this aer, an iterative learning controller alying to linear

More information

AKRON: An Algorithm for Approximating Sparse Kernel Reconstruction

AKRON: An Algorithm for Approximating Sparse Kernel Reconstruction : An Algorithm for Aroximating Sarse Kernel Reconstruction Gregory Ditzler Det. of Electrical and Comuter Engineering The University of Arizona Tucson, AZ 8572 USA ditzler@email.arizona.edu Nidhal Carla

More information

Cryptanalysis of Pseudorandom Generators

Cryptanalysis of Pseudorandom Generators CSE 206A: Lattice Algorithms and Alications Fall 2017 Crytanalysis of Pseudorandom Generators Instructor: Daniele Micciancio UCSD CSE As a motivating alication for the study of lattice in crytograhy we

More information

POINTS ON CONICS MODULO p

POINTS ON CONICS MODULO p POINTS ON CONICS MODULO TEAM 2: JONGMIN BAEK, ANAND DEOPURKAR, AND KATHERINE REDFIELD Abstract. We comute the number of integer oints on conics modulo, where is an odd rime. We extend our results to conics

More information

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO) Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment

More information

Linear diophantine equations for discrete tomography

Linear diophantine equations for discrete tomography Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,

More information

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar 15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider

More information

Convex Analysis and Economic Theory Winter 2018

Convex Analysis and Economic Theory Winter 2018 Division of the Humanities and Social Sciences Ec 181 KC Border Conve Analysis and Economic Theory Winter 2018 Toic 16: Fenchel conjugates 16.1 Conjugate functions Recall from Proosition 14.1.1 that is

More information

Sampling and Distortion Tradeoffs for Bandlimited Periodic Signals

Sampling and Distortion Tradeoffs for Bandlimited Periodic Signals Samling and Distortion radeoffs for Bandlimited Periodic Signals Elaheh ohammadi and Farokh arvasti Advanced Communications Research Institute ACRI Deartment of Electrical Engineering Sharif University

More information

Anytime communication over the Gilbert-Eliot channel with noiseless feedback

Anytime communication over the Gilbert-Eliot channel with noiseless feedback Anytime communication over the Gilbert-Eliot channel with noiseless feedback Anant Sahai, Salman Avestimehr, Paolo Minero Deartment of Electrical Engineering and Comuter Sciences University of California

More information

216 S. Chandrasearan and I.C.F. Isen Our results dier from those of Sun [14] in two asects: we assume that comuted eigenvalues or singular values are

216 S. Chandrasearan and I.C.F. Isen Our results dier from those of Sun [14] in two asects: we assume that comuted eigenvalues or singular values are Numer. Math. 68: 215{223 (1994) Numerische Mathemati c Sringer-Verlag 1994 Electronic Edition Bacward errors for eigenvalue and singular value decomositions? S. Chandrasearan??, I.C.F. Isen??? Deartment

More information

Quantitative estimates of propagation of chaos for stochastic systems with W 1, kernels

Quantitative estimates of propagation of chaos for stochastic systems with W 1, kernels oname manuscrit o. will be inserted by the editor) Quantitative estimates of roagation of chaos for stochastic systems with W, kernels Pierre-Emmanuel Jabin Zhenfu Wang Received: date / Acceted: date Abstract

More information

Uniform Law on the Unit Sphere of a Banach Space

Uniform Law on the Unit Sphere of a Banach Space Uniform Law on the Unit Shere of a Banach Sace by Bernard Beauzamy Société de Calcul Mathématique SA Faubourg Saint Honoré 75008 Paris France Setember 008 Abstract We investigate the construction of a

More information

Radial Basis Function Networks: Algorithms

Radial Basis Function Networks: Algorithms Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.

More information

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition A Qualitative Event-based Aroach to Multile Fault Diagnosis in Continuous Systems using Structural Model Decomosition Matthew J. Daigle a,,, Anibal Bregon b,, Xenofon Koutsoukos c, Gautam Biswas c, Belarmino

More information

Controllability and Resiliency Analysis in Heat Exchanger Networks

Controllability and Resiliency Analysis in Heat Exchanger Networks 609 A ublication of CHEMICAL ENGINEERING RANSACIONS VOL. 6, 07 Guest Editors: Petar S Varbanov, Rongxin Su, Hon Loong Lam, Xia Liu, Jiří J Klemeš Coyright 07, AIDIC Servizi S.r.l. ISBN 978-88-95608-5-8;

More information

Multiplicity of weak solutions for a class of nonuniformly elliptic equations of p-laplacian type

Multiplicity of weak solutions for a class of nonuniformly elliptic equations of p-laplacian type Nonlinear Analysis 7 29 536 546 www.elsevier.com/locate/na Multilicity of weak solutions for a class of nonuniformly ellitic equations of -Lalacian tye Hoang Quoc Toan, Quô c-anh Ngô Deartment of Mathematics,

More information

On Isoperimetric Functions of Probability Measures Having Log-Concave Densities with Respect to the Standard Normal Law

On Isoperimetric Functions of Probability Measures Having Log-Concave Densities with Respect to the Standard Normal Law On Isoerimetric Functions of Probability Measures Having Log-Concave Densities with Resect to the Standard Normal Law Sergey G. Bobkov Abstract Isoerimetric inequalities are discussed for one-dimensional

More information

ECE 534 Information Theory - Midterm 2

ECE 534 Information Theory - Midterm 2 ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You

More information

The Algebraic Structure of the p-order Cone

The Algebraic Structure of the p-order Cone The Algebraic Structure of the -Order Cone Baha Alzalg Abstract We study and analyze the algebraic structure of the -order cones We show that, unlike oularly erceived, the -order cone is self-dual for

More information

Introduction to Banach Spaces

Introduction to Banach Spaces CHAPTER 8 Introduction to Banach Saces 1. Uniform and Absolute Convergence As a rearation we begin by reviewing some familiar roerties of Cauchy sequences and uniform limits in the setting of metric saces.

More information

On split sample and randomized confidence intervals for binomial proportions

On split sample and randomized confidence intervals for binomial proportions On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have

More information

On the Chvatál-Complexity of Knapsack Problems

On the Chvatál-Complexity of Knapsack Problems R u t c o r Research R e o r t On the Chvatál-Comlexity of Knasack Problems Gergely Kovács a Béla Vizvári b RRR 5-08, October 008 RUTCOR Rutgers Center for Oerations Research Rutgers University 640 Bartholomew

More information

TRACES OF SCHUR AND KRONECKER PRODUCTS FOR BLOCK MATRICES

TRACES OF SCHUR AND KRONECKER PRODUCTS FOR BLOCK MATRICES Khayyam J. Math. DOI:10.22034/kjm.2019.84207 TRACES OF SCHUR AND KRONECKER PRODUCTS FOR BLOCK MATRICES ISMAEL GARCÍA-BAYONA Communicated by A.M. Peralta Abstract. In this aer, we define two new Schur and

More information

CMSC 425: Lecture 4 Geometry and Geometric Programming

CMSC 425: Lecture 4 Geometry and Geometric Programming CMSC 425: Lecture 4 Geometry and Geometric Programming Geometry for Game Programming and Grahics: For the next few lectures, we will discuss some of the basic elements of geometry. There are many areas

More information

On the capacity of the general trapdoor channel with feedback

On the capacity of the general trapdoor channel with feedback On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:

More information

Commutators on l. D. Dosev and W. B. Johnson

Commutators on l. D. Dosev and W. B. Johnson Submitted exclusively to the London Mathematical Society doi:10.1112/0000/000000 Commutators on l D. Dosev and W. B. Johnson Abstract The oerators on l which are commutators are those not of the form λi

More information

MODEL-BASED MULTIPLE FAULT DETECTION AND ISOLATION FOR NONLINEAR SYSTEMS

MODEL-BASED MULTIPLE FAULT DETECTION AND ISOLATION FOR NONLINEAR SYSTEMS MODEL-BASED MULIPLE FAUL DEECION AND ISOLAION FOR NONLINEAR SYSEMS Ivan Castillo, and homas F. Edgar he University of exas at Austin Austin, X 78712 David Hill Chemstations Houston, X 77009 Abstract A

More information

Some Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size

Some Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., DECEMBER 4 336 Some Unitary Sace Time Codes From Shere Packing Theory With Otimal Diversity Product of Code Size Haiquan Wang, Genyuan Wang, and Xiang-Gen

More information

A Note on Guaranteed Sparse Recovery via l 1 -Minimization

A Note on Guaranteed Sparse Recovery via l 1 -Minimization A Note on Guaranteed Sarse Recovery via l -Minimization Simon Foucart, Université Pierre et Marie Curie Abstract It is roved that every s-sarse vector x C N can be recovered from the measurement vector

More information

Damage Identification from Power Spectrum Density Transmissibility

Damage Identification from Power Spectrum Density Transmissibility 6th Euroean Worksho on Structural Health Monitoring - h.3.d.3 More info about this article: htt://www.ndt.net/?id=14083 Damage Identification from Power Sectrum Density ransmissibility Y. ZHOU, R. PERERA

More information

arxiv:math/ v4 [math.gn] 25 Nov 2006

arxiv:math/ v4 [math.gn] 25 Nov 2006 arxiv:math/0607751v4 [math.gn] 25 Nov 2006 On the uniqueness of the coincidence index on orientable differentiable manifolds P. Christoher Staecker October 12, 2006 Abstract The fixed oint index of toological

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

Analysis of some entrance probabilities for killed birth-death processes

Analysis of some entrance probabilities for killed birth-death processes Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction

More information

Event-triggering stabilization of complex linear systems with disturbances over digital channels

Event-triggering stabilization of complex linear systems with disturbances over digital channels Event-triggering stabilization of comlex linear systems with disturbances over digital channels Mohammad Javad Khojasteh, Mojtaba Hedayatour, Jorge Cortés, Massimo Franceschetti Abstract As stos and auses

More information

CSE 599d - Quantum Computing When Quantum Computers Fall Apart

CSE 599d - Quantum Computing When Quantum Computers Fall Apart CSE 599d - Quantum Comuting When Quantum Comuters Fall Aart Dave Bacon Deartment of Comuter Science & Engineering, University of Washington In this lecture we are going to begin discussing what haens to

More information

Minimax Design of Nonnegative Finite Impulse Response Filters

Minimax Design of Nonnegative Finite Impulse Response Filters Minimax Design of Nonnegative Finite Imulse Resonse Filters Xiaoing Lai, Anke Xue Institute of Information and Control Hangzhou Dianzi University Hangzhou, 3118 China e-mail: laix@hdu.edu.cn; akxue@hdu.edu.cn

More information

Generalized optimal sub-pattern assignment metric

Generalized optimal sub-pattern assignment metric Generalized otimal sub-attern assignment metric Abu Sajana Rahmathullah, Ángel F García-Fernández, Lennart Svensson arxiv:6005585v7 [cssy] 2 Se 208 Abstract This aer resents the generalized otimal subattern

More information

Research Article Circle Numbers for Star Discs

Research Article Circle Numbers for Star Discs International Scholarly Research Network ISRN Geometry Volume 211, Article ID 479262, 16 ages doi:1.542/211/479262 Research Article Circle Numbers for Star Discs W.-D. Richter Institute of Mathematics,

More information

GENERICITY OF INFINITE-ORDER ELEMENTS IN HYPERBOLIC GROUPS

GENERICITY OF INFINITE-ORDER ELEMENTS IN HYPERBOLIC GROUPS GENERICITY OF INFINITE-ORDER ELEMENTS IN HYPERBOLIC GROUPS PALLAVI DANI 1. Introduction Let Γ be a finitely generated grou and let S be a finite set of generators for Γ. This determines a word metric on

More information

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems Int. J. Oen Problems Comt. Math., Vol. 3, No. 2, June 2010 ISSN 1998-6262; Coyright c ICSRS Publication, 2010 www.i-csrs.org Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

Robust Beamforming via Matrix Completion

Robust Beamforming via Matrix Completion Robust Beamforming via Matrix Comletion Shunqiao Sun and Athina P. Petroulu Deartment of Electrical and Comuter Engineering Rutgers, the State University of Ne Jersey Piscataay, Ne Jersey 8854-858 Email:

More information

Resilient Distributed Optimization Algorithm against Adversary Attacks

Resilient Distributed Optimization Algorithm against Adversary Attacks 207 3th IEEE International Conference on Control & Automation (ICCA) July 3-6, 207. Ohrid, Macedonia Resilient Distributed Optimization Algorithm against Adversary Attacks Chengcheng Zhao, Jianping He

More information

E-companion to A risk- and ambiguity-averse extension of the max-min newsvendor order formula

E-companion to A risk- and ambiguity-averse extension of the max-min newsvendor order formula e-comanion to Han Du and Zuluaga: Etension of Scarf s ma-min order formula ec E-comanion to A risk- and ambiguity-averse etension of the ma-min newsvendor order formula Qiaoming Han School of Mathematics

More information

Multivariable Generalized Predictive Scheme for Gas Turbine Control in Combined Cycle Power Plant

Multivariable Generalized Predictive Scheme for Gas Turbine Control in Combined Cycle Power Plant Multivariable Generalized Predictive Scheme for Gas urbine Control in Combined Cycle Power Plant L.X.Niu and X.J.Liu Deartment of Automation North China Electric Power University Beiing, China, 006 e-mail

More information

Finding a sparse vector in a subspace: linear sparsity using alternating directions

Finding a sparse vector in a subspace: linear sparsity using alternating directions IEEE TRANSACTION ON INFORMATION THEORY VOL XX NO XX 06 Finding a sarse vector in a subsace: linear sarsity using alternating directions Qing Qu Student Member IEEE Ju Sun Student Member IEEE and John Wright

More information

Frequency-Weighted Robust Fault Reconstruction Using a Sliding Mode Observer

Frequency-Weighted Robust Fault Reconstruction Using a Sliding Mode Observer Frequency-Weighted Robust Fault Reconstruction Using a Sliding Mode Observer C.P. an + F. Crusca # M. Aldeen * + School of Engineering, Monash University Malaysia, 2 Jalan Kolej, Bandar Sunway, 4650 Petaling,

More information

Asymptotically Optimal Simulation Allocation under Dependent Sampling

Asymptotically Optimal Simulation Allocation under Dependent Sampling Asymtotically Otimal Simulation Allocation under Deendent Samling Xiaoing Xiong The Robert H. Smith School of Business, University of Maryland, College Park, MD 20742-1815, USA, xiaoingx@yahoo.com Sandee

More information

Dynamic Attack Detection in Cyber-Physical. Systems with Side Initial State Information

Dynamic Attack Detection in Cyber-Physical. Systems with Side Initial State Information Dynamic Attack Detection in Cyber-Physical 1 Systems with Side Initial State Information Yuan Chen, Soummya Kar, and José M. F. Moura arxiv:1503.07125v1 math.oc] 24 Mar 2015 Abstract This paper studies

More information

Convexification of Generalized Network Flow Problem with Application to Power Systems

Convexification of Generalized Network Flow Problem with Application to Power Systems 1 Convexification of Generalized Network Flow Problem with Alication to Power Systems Somayeh Sojoudi and Javad Lavaei + Deartment of Comuting and Mathematical Sciences, California Institute of Technology

More information

A Special Case Solution to the Perspective 3-Point Problem William J. Wolfe California State University Channel Islands

A Special Case Solution to the Perspective 3-Point Problem William J. Wolfe California State University Channel Islands A Secial Case Solution to the Persective -Point Problem William J. Wolfe California State University Channel Islands william.wolfe@csuci.edu Abstract In this aer we address a secial case of the ersective

More information

On the Field of a Stationary Charged Spherical Source

On the Field of a Stationary Charged Spherical Source Volume PRORESS IN PHYSICS Aril, 009 On the Field of a Stationary Charged Sherical Source Nikias Stavroulakis Solomou 35, 533 Chalandri, reece E-mail: nikias.stavroulakis@yahoo.fr The equations of gravitation

More information

Research of power plant parameter based on the Principal Component Analysis method

Research of power plant parameter based on the Principal Component Analysis method Research of ower lant arameter based on the Princial Comonent Analysis method Yang Yang *a, Di Zhang b a b School of Engineering, Bohai University, Liaoning Jinzhou, 3; Liaoning Datang international Jinzhou

More information

Robust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System

Robust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System Vol.7, No.7 (4),.37-38 htt://dx.doi.org/.457/ica.4.7.7.3 Robust Predictive Control of Inut Constraints and Interference Suression for Semi-Trailer System Zhao, Yang Electronic and Information Technology

More information

Cyber Attacks, Detection and Protection in Smart Grid State Estimation

Cyber Attacks, Detection and Protection in Smart Grid State Estimation 1 Cyber Attacks, Detection and Protection in Smart Grid State Estimation Yi Zhou, Student Member, IEEE Zhixin Miao, Senior Member, IEEE Abstract This paper reviews the types of cyber attacks in state estimation

More information

Journal of Mathematical Analysis and Applications

Journal of Mathematical Analysis and Applications J. Math. Anal. Al. 44 (3) 3 38 Contents lists available at SciVerse ScienceDirect Journal of Mathematical Analysis and Alications journal homeage: www.elsevier.com/locate/jmaa Maximal surface area of a

More information

Stochastic Optimal Linear Control of Wireless Networked Control Systems with Delays and Packet Losses

Stochastic Optimal Linear Control of Wireless Networked Control Systems with Delays and Packet Losses Stochastic Otimal Linear Control of Wireless Networked Control Systems with Delays and Packet Losses arxiv:446v [cssy 6 Oct 24 Zhuwei Wang, Xiaodong Wang, Fellow, IEEE, and Lihan Liu Abstract In this aer,

More information

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms

More information

Approximation of the Euclidean Distance by Chamfer Distances

Approximation of the Euclidean Distance by Chamfer Distances Acta Cybernetica 0 (0 399 47. Aroximation of the Euclidean Distance by Chamfer Distances András Hajdu, Lajos Hajdu, and Robert Tijdeman Abstract Chamfer distances lay an imortant role in the theory of

More information

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle]

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle] Chater 5 Model checking, verification of CTL One must verify or exel... doubts, and convert them into the certainty of YES or NO. [Thomas Carlyle] 5. The verification setting Page 66 We introduce linear

More information