System-state-free false data injection attack for nonlinear state estimation in smart grid

Size: px
Start display at page:

Download "System-state-free false data injection attack for nonlinear state estimation in smart grid"

Transcription

1 Internatonal Journal of Smart Grd and Clean Energy System-state-free false data njecton attac for nonlnear state estmaton n smart grd Jngxuan Wang, Lucas C. K. Hu, S. M. Yu * Department of Computer Scence, The Unversty of Hong Kong, Hong Kong Abstract Cyber-physcal securty of smart grd under attacs s a serous ssue today. The technque of state estmaton has been employed n such a large-scale system to ensure the relablty. Successful attacs on tamperng these readngs were shown for lnear state estmaton. For the more realstc nonlnear state estmaton are used n real systems, the attac that requres the nowledge of system states (whch are dffcult to obtan, even for nsders) was proposed. Up to our best nowledge, there are no research results that are able to gve an attac to any buses wthout the nowledge of system states. Ths research paper provdes such an attac. Demonstratons on IEEE test system show that the smart grd can be exploted by launchng such attacs even wthout system state nformaton. The strategy to generate such an attac s smple and easy to mplement. Thus, the results n ths paper show that a more realstc threat to the smart grd system. Hopefully the communty could revst the tampered readng detecton algorthms to come up wth a more sophstcated soluton to avod ths vulnerablty. Keywords: False data njecton attac, state estmaton, cyber-physcal system, smart grd, nformaton securty 1. Introducton Cyber Physcal System (CPS) s an ntegrated system n whch computatonal elements collaborate to control physcal enttes. CPS was regarded as a top-prorty research area snce 27 [1]. Beng a crtcal nfrastructure, smart grd s a typcal example of CPS (e.g. wth the sensors and smart meters as the physcal enttes, the SCADA (Supervsory Control and Data Acquston) control system as one of the computatonal elements). The current trend of smart grd s to provde on-demand power supply accordng to real-tme user requrements [2]. One of the major securty concerns of a smart grd system s on the communcatons of the cyber components (.e. software n the SCADA system) and the physcal components (.e. sensors/meters). Several attacs ndcate that the physcal components, such as smart meters, can be compromsed n order to msuse prvate customer data or manpulate meter readngs [3]. To ensure the relablty of such a system, the followng system montorng procedure s beng used. Meters (sensors) are placed at dfferent (crtcal) ponts of the system and the status of the system can be computed/predcted to mae sure that the system s n a secure state. Example readngs from these meters nclude bus voltages, bus power njectons, and branch power flows [4]. The readngs are transmtted from the meters to the SCADA system and the state of the system wll be estmated (ths process s called "state estmaton"). In the computaton of the state estmaton, the electrcty flows n the smart grd are needed to be modeled. There are two approaches: Alternatng Current (AC) model and Drect Current (DC) model. The AC model s more realstc and the flow s usually modeled by a set of nonlnear equatons whle the DC model s a smplfed model to approxmate the AC model. The DC model s not as accurate as the AC model and the flow s only modeled by lnear equatons. The state of the system (.e., the output of the state estmaton) s usually represented by a vector of state varables (e.g. voltage * Manuscrpt receved March 3, 215; revsed August 21, 215. Correspondng author. Tel.: ; E-mal address: jxwang@cs.hu.h. do: /sgce

2 17 Internatonal Journal of Smart Grd and Clean Energy, vol. 4, no. 3, July 215 magntudes and angles for dfferent buses). The values of these state varables are used to control or adjust the smart grd components. The bad news s that exstng hacng technques are able to compromse meters wth malcous attacs. In vew of ths, there exst methods to detect whether the readngs have been tampered (or are ncorrect due to other reasons). These methods are referred as "bad data detecton methods (algorthms)" [5]. Most, f not all, of these methods rely on the same prncple: f the readngs (measurements sent bac from the meters) are bad (e.g. beng tampered), the dfference between these observed readngs and the computed readngs based on the estmated state varables. Ths dfference s called "resdual" and ths observaton s referred as the "resdual prncple". Recently, a new class of man-n-the-mddle attacs, namely false data njecton attacs (FDIAs) was frst proposed n [6]. They successfully showed that FDIAs could bypass exstng bad data detecton algorthms for the DC power flow model. Such an attac, f successful, would mean a bg loss to the system [7]. For example, [7] llustrated that for the IEEE 14-bus system, f the output of the generator on one bus was modfed and ths attac lasted for one wee, t would brng more than 4.7 mllon dollars benefts to the generaton company. Whle FDIAs were wdely explored n DC model [6], the proposed adversary models could not be appled to AC power flow model [8]. Paper wors towards constructng FDIAs n AC power flow model were very few [9]-[11]. [9], [1] concentrated on how many and whch measurement should be tampered n the AC model wth the nowledge of system states. These system states were usually stored n the secure part of the SCADA system and were dffcult to access (even for nsders). [11] followed the wor n [9] and proposed a feasble approach to obtan those system states. Ther analyss can only cover some of the buses whch they called "njecton-bus", but not all. So up to our best nowledge, there are no research results that are able to gve an attac to any buses. Ths research paper provdes such an attac. The dffculty for constructng stealthy errors n AC model led on the complexty of the set of nonlnear equatons. It s not easy to construct a set of tampered readngs to satsfy the equatons so that t can bypass the bad data detecton algorthm. Also, for AC model, the number of measurements s also more than that of DC model, whch ncreases the dffculty of the problem. The man contrbuton of ths paper s to present a smple strategy to launch FDIA aganst nonlnear state estmaton from the attacer's perspectve. Ths strategy can be appled to any types of buses wthout the nowledge of system states. One theorem s ntroduced to show that t s lely to fnd such an attac vector when satsfyng a smple rule. Two realstc attac goals are consdered: random false data njecton attacs, n whch the attacer wants to nject any attac vectors as long as leadng some wrong state varables n AC power flow model and specfc false data njecton attacs, n whch the attacer wants to nject specfc error nto state varables n AC power flow model. Ths paper then proposes a procedure to generate such attac and llustrates that t s possble to construct attac vectors aganst nonlnear systems through smulatons on several IEEE test systems (IEEE 14-bus, 3-bus, and 118-bus). The rest of ths paper s organzed as follows. Some prelmnares of nonlnear state estmaton n a smart grd system are gven n Secton 2. In Secton 3, models of launchng FDIAs n nonlnear system are ntroduced. Secton 4 presents the evaluatons on the proposed attacs and Secton 5 concludes the paper. 2. Nonlnear State Estmaton Consder a set of measurements gven by the vector z h( x) e, where x s state vector, hx ( ) s a functon vector relatng z to x and e [ e1, e2,..., e ] T m s the vector of measurement errors. In an AC power flow model, there are 2l 1 elements n a state vector, whch can be represented as x 2 3 l 1 2 l [,,...,,V,V,...,V ] T (1)

3 Jngxuan Wang et al.: System-state-free false data njecton attac for nonlnear state estmaton n smart grd 171 where,v s voltage angle and voltage magntude at bus.wthout loss of generalty, bus 1 s chosen as the reference ( 1 ). Furthermore, measurements nclude real/reactve power njectons and real/reactve power flows. More detals about measurements can be found n [4]. When gven measurement vector z, state varables are often estmated by weghted least-square crteron (WLS), maxmum lelhood crteron and mnmum varance crteron. These crterons are the most popular methods when dealng wth state estmaton problem, thus are used n ths paper. The WLS estmator s used to mnmze the followng objectve functon: m 2 T 1 ( ) (z h (x)) [z h(x)] [z h(x)] 1 J x R R (2) where: (1) Ee [ ],where 1,2,..., m; (2) Measurement errors are ndependent (.e. E[ e e ] ); T (3) 11 22, R E[ e e ] dag{r,r...,r nn} and R s the varance of the error n measurement Bad data detecton(bdd) State varables n control center wll be re-estmated when the system s njected by ether mnor physcal errors or malcous attacs. Most BDD programs use "resdual prncples" to detect the presence of bad measurements. Upon detecton of bad data n smart meters, the dentfcaton can be accomplshed by further processng resduals. Measurement resduals (dfferences between observed measurements and estmated measurements) can be represented as, j r z h(x) ˆ (3) Mostly, 2 ( m n),(1 ) 2 Test s used to test whether there exsts bad measurements, denotes the value n freedom v m n. 3. False Data Injecton Attacs n AC Model J( x) m n 2 ( ),(1 ), where 2 dstrbuton table wth a sgnfcance level and the degree of Snce ntrudng the control center s qute dffcult, system states ( x) cannot be easly obtaned n realty, the assumptons n the smart grd envronment are summarzed as follows: Control center cannot be read or falsfed by anyone, ncludng system operators; Attacer needs to now the topology of the system; Attacer only has resources to ntrude (read/modfy) at most f meters among all meters (nowledge about complete measurement nformaton s not necessary). It needs to be ponted out that n prevous wors [9], [1], whch constructng FDIAs n nonlnear systems, do pose strong requrements for the attacers. They requre the attacers to now the topology of the targeted system. Moreover, the attacers need to get the nowledge of the system states, whch s n general not easy to obtan, even for nsders. Notwthstandng, t s mportant for securty researchers to derve one nd of attac wthout the nowledge of system states, whch can nject errors on any buses n nonlnear system. The rest of ths secton frst gves basc prncples on adversary models n nonlnear systems. Then two nds of attacs are addressed: random false data njecton attacs and specfc false data njecton attacs. Both attacs are under the realstc attac scenaros that the attacer s lmted to modfy any f meters. The frst attac s to generate an attac vector wthout consderng the mpacts on estmated state varables (system states) n the control center. The whole system may be dsordered when

4 172 Internatonal Journal of Smart Grd and Clean Energy, vol. 4, no. 3, July 215 launchng ths nd of attac. The second nd of attac s more focused and t tres to generate specfc errors on targeted state varables. In ths case, the attacer does not need to concern f hs attac mpacts other state varables when attacng the chosen one(s) Basc prncple It s noted that there are m measurements (z 1,z 2,...z ) T m and n state varables ( x1, x2,..., x ) T n n a smart grd system. The relatonshp characterzed between z and x s the functon h ( x ), as s dscussed n Secton 2. Let za z a be the measurements after attacs, where z s the current measurements and a s referred as the stealthy attacs [12]. The L2 norm of the measurement resdual after an attac, can be represented by r z h(x ˆ ) z a h(x ˆ ) (4) a a bad bad where h(x ˆ bad ) s denoted as the vector of estmated state varables obtaned from z a. As dscussed above, BDD computes the dfference between za and h (x ˆ bad ). Theorem 1 shows a smple crteron that maes z a bypass BDD based on resdual prncple when all measurement nformaton can be collected by the attacer. In detals, the attac vector a can be computed as a a r, where a s an arbtrary vector and r s ts resdual. In other words, there exsts a way of calculatng an attac vector that can bypass the detecton qute easly. Theorem 1: Assume that the meter errors are very small (n the parameters gven by IEEE test 4 systems, t s about1 ), there always exsts a stealthy attac a that can bypass the bad data detecton scheme wthout detected when there exsts a vector a, whch can mae the nonlnear system observable. Proof: When there exsts a malcous vector a that can lead to an estmaton of state estmaton n the nonlnear system, t s easy to compute the system resdual r by Equatons (3). Based on the assumpton that the meter errors are very small, we can have z a r h(x ˆ ) (5) where h(x ˆ ) s the state varables estmated by z a r. Consderng f an attac a a r, the measurement resdual r a (after attac a ) can be descrbed as, r z a r h(x ˆ ) (6) a Snce observablty s defned as the ablty to unquely estmate the system states usng the gven measurements [13], a wll have a unque vector of state varables (denoted as ˆx ). That s, ra. The attac a a rcan bypass the bad data detecton scheme. Therefore, the proof s complete Random false data njecton attac In a random FDIA, the attacer ntends to fnd any attac vector a as long as t can result n a wrong estmaton of state varables [6]. As dscussed earler, the attacer can get the nowledge of system topology h(). When consderng the networ parameters are tme nvarant, t s feasble to perform the process of constructng random FDIAs based on THEOREM 1. Assume that the attacer can read/modfy at most any f meters n a smart grd system. Let z ( z,...,z ) 1 f T and z count ( za z) denotes the number of meters need to be modfed n set S p, where ( z,...,z ) T a a1 af. And let S p s the meter set

5 Jngxuan Wang et al.: System-state-free false data njecton attac for nonlnear state estmaton n smart grd 173 ncludes all crtcal meters [14] and at least one meter exsts n every crtcal -tuple wthn the system. Algorthm 1 s the pseudocode of constructng random false data njecton attacs on behalf of an attacer. The nput of ths algorthm s the topology nformaton (.e. admttance matrxes). The output of ths algorthm s to return an attac vector ( a ). Step 3-18, t tests whether there exsts a soluton x based on z and h(), where s the teraton ndex. The teraton ndex s closely based on a snce z s fxed. When consderng Step 16, f count ( a) f, the attac vector does exst. Specfcally, n each teraton, the measurement functon hx ( ) and measurement Jacoban H x x are calculated based on equatons of dfferent measurement types [4]. Furthermore, gan matrx Gx ( ) can be computed as: G( x ) H H (7) 1 R x x x x Algorthm 1 Random FDIA of Nonlnear SE Input: Admttance matrxes h() ; A set of current measurements {z }; Number of meters that can be read/modfed, f. Output: Random false data njecton attac z a. 1: Intalze a random nonzero attac vector (a ) m 1; 1 2: Intalze x (,,...,1,1,...,1) T ; 3: for 1:1 do T 1 4: Compute g (x ) based on g( x) J ( x) x [ h( x) x] R [z h( x)] ; 5: Compute G(x ) g(x) x ; 6: f G(x ) s postve defnte && 1 then T 1 7: Compute x by G( x) x [ h( x) x] R [z h( x)] ; 8: f x then T 1 1 T 1 9: a h((h R H ) H R (z a )) z ; 1: Go to Step 16; 11: end f 12: else 13: Go to Step 1; 14: end f 15: end for 16: f count ( a) f ; then 17: return a ; 18: end f Measurements can be modfed by ntrudng the smart meters. By launchng such attacs, arbtrary or specfc errors () c can be successfully njected on state varables (n control center) Specfc false data njecton attac The specfc FDIAs are the attacs that can generate specfc errors on state varables wthout beng x x

6 174 Internatonal Journal of Smart Grd and Clean Energy, vol. 4, no. 3, July 215 detected. As s dscussed earler n ths paper, the attacer does not need to consder the mpacts on other state varables when attacng the targeted ones. To construct an attac vector wth specfc errors on x, the attacer needs to fnd a p-sparse vector T 1 T 1 ( H R H ) x H R ( z a ) x x, whch satsfes (8) Noted that z s the current measurement vector and a s a non-zero random selected attac vector. Equaton (8) can be reformulated as a NP-Complete problem [15]: The computaton of non-zero elements of ( xˆ xˆ ) satsfyng Ax b are at most q. Note that attacer cannot obtan state varables by accessng the control center. Ths paper gves a heurstc method to construct a set of attac vectors wth ther correspondng estmated state varables. The attacer can then pc up deal attacs by usng the least smart meters (when njectng specfc errors c onto state varables). If there are multple attacs that can fulfll the requrements above, the attacer can select a vector a wth the smallest number of modfed meters. Ths enables the attacer to nject an attac wth meters as few as possble. 4. Expermental Results In ths secton, the proposed FDIAs are valdated through experments based on IEEE test systems, ncludng 14-bus, 3-bus and 118-bus systems. The dataset used n ths secton can be found n [16]. Ths paper prmarly focuses on the feasblty of generatng FDIAs aganst AC power flow model as well as the efforts needed for a successful attac. The nformaton of state varables and measurements wthn varous IEEE test systems s gven n Table 1 and s set to be 2.. Table 1. Number of state varables and measurements n the IEEE test systems 4.1. Tme and probablty IEEE Bus System 14-bus 3-bus 118-bus No. of voltage measurements No. of real power nject measurements No. of reactve power nject measurements No. of real power flow measurements No. of reactve power flow measurements No. of total measurements No. of state varables The performance of probablty of constructng random FDIAs s frst evaluated when f s not fxed. The experments are performed as follows. Let the parameter f vares from 1 to maxmum number of meters n each system. For each f, randomly choose f meters to attempt an attac vector constructon. Repeat ths process 1 tmes and estmate the success probablty p f = # successful trals/1. Fg. 1(a) shows the relatonshp between the probablty of fndng proposed attacs and the percentage of modfed meters. It can be seen that the probablty ncreases as the number of modfed measurements ncreases. Attac can be constructed wth the probablty close to 1% when f s large. For example, probablty s 1% when f s set to 59.38%, 76.92%, 8.26% of the whole measurements for IEEE 14- bus, 3-bus and 118-bus respectvely. For example, the attacer can always fnd a random FDIA n IEEE 14-bus system, when he can modfy at least 19 smart meters. As s shown n Fg. 1(b), constructng specfc FDIA s more challengng for the attacer. The am of specfc FDIAs s to nject specfc errors on state varables. Monte Carlo method s used to perform the experments. These experment results demonstrate that FDIAs n nonlnear systems can be systematcally constructed by algorthms proposed n ths paper. Also the results show that t s possble and practcal to

7 Jngxuan Wang et al.: System-state-free false data njecton attac for nonlnear state estmaton n smart grd 175 launch FDIAs n nonlnear system wth the nowledge of system's topology but wthout the nowledge of system states. (a) Fg. 1. Probablty of fndng an attac: (a) random FDIAs and (b) specfc FDIAs. (b) Table 2. Tme and Probablty on Random FDIAs IEEE Bus System Tmng Cost(s) Probablty 14-bus % 3-bus % 118-bus % When f s set to be f.3 (# of meters), based on evaluaton objectves, two ndces are analyzed: tmng cost that constructs an attac vector and probablty that the attac can be successfully constructed among 1 trals for each test system, whch s shown n Table 2. When the attac s feasble, the speed for generatng such an attac s farly quc. Moreover, the tme s manly spent on Cholesy factorzaton. Despte the fact that the topology of nonlnear system s more complex, the executon tme of our method ( ms) s comparable to that of [8] ( ms) Impacts on state varables The mpacts after random FDIAs are analyzed. A good attac s defned as successful njectng large errors on x. (a) Fg. 2. State varables (voltage magntudes and angles) range after attacs n IEEE 3-bus system. Fg. 2. shows the maxmum and mnmum values of voltage magntudes and angles of all buses among 1 tmes attaced by random FDIA n IEEE-3 bus system. From analyzng our results, FDIA can nject errors at most 5 tmes larger than orgnal estmated magntudes (for example, the range of voltage magntude at bus 11 s [.5411,5.4699] and the orgnal estmated voltage magntude at bus 11 s 1.82 ), and can nject errors that change the angle to nearly 18. Snce these results are based on 1 (b)

8 176 Internatonal Journal of Smart Grd and Clean Energy, vol. 4, no. 3, July 215 trals, renforce these conclusons are very convncng. 5. Concluson Ths paper proposes a false data njecton attac aganst nonlnear state estmaton n a cyberadversaral system (.e. smart grd). The nnovatve dea of ths algorthm s that t does not need the nowledge of system state and can nject errors nto an AC power flow system wthout beng detected. Ths paper strengthens the attacs to cyber-adversaral systems, and therefore research on protectons n wth cyber-adversaral systems wll be n a greater need n near future. Furthermore, ths wor focuses on the smart grd envronment, the general applcaton and nfrastructure wor can be extended to other domans, such as avaton cyber-physcal systems or smart mcro-grds. Acnowledgements The wor descrbed n ths paper was partally supported by the HKU Seed Fundng s for Appled Research , and HKU Seed Fundng s for Basc Res and References [1] Bush PGW. Leadershp Under Chal-lenge: Informaton Technology R & D n a Compettve World, August 27. [2] Srdhar S, Hahn A, Govndarasu M. Cyber physcal system securty for the electrc power grd. Proceedngs of the IEEE, 212; 1(1): [3] Wdl E, Palensy P, Sano P, Rehtanz C. Guest edtoral: modelng, smulaton, and applcaton of cyber-physcal energy systems. IEEE Transactons on Industral Informatcs, 214; 1(4): [4] Abur A, Gomez Exposto A. Power System State Estmaton: Theory and Implementaton. CRC Press; 24. [5] Chen J, Abur A. Placement of pmus to enable bad data detecton n state estmaton. IEEE Transactons on Power Systems, 26; 21(4): [6] Lu Y, Nng P, Reter MK. False data njecton attacs aganst state estmaton n electrc power grds. ACM Transactons on Informaton and System Securty, 211; 14(1):13. [7] Lu T, Gu Y, Wang D, Gu YH, Guan XH. A novel method to detect bad data njecton attac n smart grd. In: Proc. Proceedngs IEEE INFOCOM, 213: [8] Ja LY, Thomas RJ, Tong L. On the nonlnearty effects on malcous data attac on power system. In: Proc. IEEE Power and Energy Socety General Meetng, 212:1 8. [9] Hug G, Gampapa JA. Vulnerablty assessment of ac state estmaton wth respect to false data njecton cyber-attacs. IEEE Transactons on Smart Grd, 212; 3(3): [1] Rahman M, Mohsenan-Rad H, et al. False data njecton attacs aganst nonlnear state estmaton n smart power grds. In: Proc. Power and Energy Socety General Meetng, 213:1 5. [11] Lang JW, Kosut O, Sanar L. Cyber attacs on ac state estmaton: unobservablty and phys-cal consequences. In: Proc. PES General Meetng Conference & Exposton, 214:1 5. [12] Wang S, Ren W. Stealthy false data njecton attacs aganst state estmaton n power systems: swtchng networ topologes. In: Proc. Amercan Control Conference, 214: [13] Expsto AG, Abur A. Generalzed observablty analyss and measurement classfcaton. In: Proc. 2th Internatonal Conference on Power Industry Computer Applcatons, 1997: [14] Clements KA, Davs PW. Multple bad data detectablty and dentfablty: a geometrc approach. IEEE Transactons on Power Delvery, 1986; 1(3): [15] Mchael RG, Davd SJ. Computers and Intractablty: A Gude to the Theory of NP-Completeness. San Francsco: WH Freeman & Co.; [16] Chrste RD. Power systems test case archve. Electrcal Engneerng dept., Unversty of Washngton; 2.

Linear Approximation with Regularization and Moving Least Squares

Linear Approximation with Regularization and Moving Least Squares Lnear Approxmaton wth Regularzaton and Movng Least Squares Igor Grešovn May 007 Revson 4.6 (Revson : March 004). 5 4 3 0.5 3 3.5 4 Contents: Lnear Fttng...4. Weghted Least Squares n Functon Approxmaton...

More information

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,

More information

Hierarchical State Estimation Using Phasor Measurement Units

Hierarchical State Estimation Using Phasor Measurement Units Herarchcal State Estmaton Usng Phasor Measurement Unts Al Abur Northeastern Unversty Benny Zhao (CA-ISO) and Yeo-Jun Yoon (KPX) IEEE PES GM, Calgary, Canada State Estmaton Workng Group Meetng July 28,

More information

Chapter - 2. Distribution System Power Flow Analysis

Chapter - 2. Distribution System Power Flow Analysis Chapter - 2 Dstrbuton System Power Flow Analyss CHAPTER - 2 Radal Dstrbuton System Load Flow 2.1 Introducton Load flow s an mportant tool [66] for analyzng electrcal power system network performance. Load

More information

Parameter Estimation for Dynamic System using Unscented Kalman filter

Parameter Estimation for Dynamic System using Unscented Kalman filter Parameter Estmaton for Dynamc System usng Unscented Kalman flter Jhoon Seung 1,a, Amr Atya F. 2,b, Alexander G.Parlos 3,c, and Klto Chong 1,4,d* 1 Dvson of Electroncs Engneerng, Chonbuk Natonal Unversty,

More information

Generalized Linear Methods

Generalized Linear Methods Generalzed Lnear Methods 1 Introducton In the Ensemble Methods the general dea s that usng a combnaton of several weak learner one could make a better learner. More formally, assume that we have a set

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U)

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U) Econ 413 Exam 13 H ANSWERS Settet er nndelt 9 deloppgaver, A,B,C, som alle anbefales å telle lkt for å gøre det ltt lettere å stå. Svar er gtt . Unfortunately, there s a prntng error n the hnt of

More information

Simulated Power of the Discrete Cramér-von Mises Goodness-of-Fit Tests

Simulated Power of the Discrete Cramér-von Mises Goodness-of-Fit Tests Smulated of the Cramér-von Mses Goodness-of-Ft Tests Steele, M., Chaselng, J. and 3 Hurst, C. School of Mathematcal and Physcal Scences, James Cook Unversty, Australan School of Envronmental Studes, Grffth

More information

A Robust Method for Calculating the Correlation Coefficient

A Robust Method for Calculating the Correlation Coefficient A Robust Method for Calculatng the Correlaton Coeffcent E.B. Nven and C. V. Deutsch Relatonshps between prmary and secondary data are frequently quantfed usng the correlaton coeffcent; however, the tradtonal

More information

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers Psychology 282 Lecture #24 Outlne Regresson Dagnostcs: Outlers In an earler lecture we studed the statstcal assumptons underlyng the regresson model, ncludng the followng ponts: Formal statement of assumptons.

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

Kernel Methods and SVMs Extension

Kernel Methods and SVMs Extension Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

EEE 241: Linear Systems

EEE 241: Linear Systems EEE : Lnear Systems Summary #: Backpropagaton BACKPROPAGATION The perceptron rule as well as the Wdrow Hoff learnng were desgned to tran sngle layer networks. They suffer from the same dsadvantage: they

More information

State Estimation. Ali Abur Northeastern University, USA. September 28, 2016 Fall 2016 CURENT Course Lecture Notes

State Estimation. Ali Abur Northeastern University, USA. September 28, 2016 Fall 2016 CURENT Course Lecture Notes State Estmaton Al Abur Northeastern Unversty, USA September 8, 06 Fall 06 CURENT Course Lecture Notes Operatng States of a Power System Al Abur NORMAL STATE SECURE or INSECURE RESTORATIVE STATE EMERGENCY

More information

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen

More information

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal

More information

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography CSc 6974 and ECSE 6966 Math. Tech. for Vson, Graphcs and Robotcs Lecture 21, Aprl 17, 2006 Estmatng A Plane Homography Overvew We contnue wth a dscusson of the major ssues, usng estmaton of plane projectve

More information

Experience with Automatic Generation Control (AGC) Dynamic Simulation in PSS E

Experience with Automatic Generation Control (AGC) Dynamic Simulation in PSS E Semens Industry, Inc. Power Technology Issue 113 Experence wth Automatc Generaton Control (AGC) Dynamc Smulaton n PSS E Lu Wang, Ph.D. Staff Software Engneer lu_wang@semens.com Dngguo Chen, Ph.D. Staff

More information

Appendix B: Resampling Algorithms

Appendix B: Resampling Algorithms 407 Appendx B: Resamplng Algorthms A common problem of all partcle flters s the degeneracy of weghts, whch conssts of the unbounded ncrease of the varance of the mportance weghts ω [ ] of the partcles

More information

Report on Image warping

Report on Image warping Report on Image warpng Xuan Ne, Dec. 20, 2004 Ths document summarzed the algorthms of our mage warpng soluton for further study, and there s a detaled descrpton about the mplementaton of these algorthms.

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

Errors for Linear Systems

Errors for Linear Systems Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch

More information

Numerical Heat and Mass Transfer

Numerical Heat and Mass Transfer Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and

More information

The Study of Teaching-learning-based Optimization Algorithm

The Study of Teaching-learning-based Optimization Algorithm Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute

More information

4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA

4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA 4 Analyss of Varance (ANOVA) 5 ANOVA 51 Introducton ANOVA ANOVA s a way to estmate and test the means of multple populatons We wll start wth one-way ANOVA If the populatons ncluded n the study are selected

More information

x = , so that calculated

x = , so that calculated Stat 4, secton Sngle Factor ANOVA notes by Tm Plachowsk n chapter 8 we conducted hypothess tests n whch we compared a sngle sample s mean or proporton to some hypotheszed value Chapter 9 expanded ths to

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4) I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes

More information

A Hybrid Variational Iteration Method for Blasius Equation

A Hybrid Variational Iteration Method for Blasius Equation Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method

More information

MMA and GCMMA two methods for nonlinear optimization

MMA and GCMMA two methods for nonlinear optimization MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons

More information

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity LINEAR REGRESSION ANALYSIS MODULE IX Lecture - 30 Multcollnearty Dr. Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur 2 Remedes for multcollnearty Varous technques have

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013 ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run

More information

LOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin

LOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin Proceedngs of the 007 Wnter Smulaton Conference S G Henderson, B Bller, M-H Hseh, J Shortle, J D Tew, and R R Barton, eds LOW BIAS INTEGRATED PATH ESTIMATORS James M Calvn Department of Computer Scence

More information

Chapter 9: Statistical Inference and the Relationship between Two Variables

Chapter 9: Statistical Inference and the Relationship between Two Variables Chapter 9: Statstcal Inference and the Relatonshp between Two Varables Key Words The Regresson Model The Sample Regresson Equaton The Pearson Correlaton Coeffcent Learnng Outcomes After studyng ths chapter,

More information

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method Appled Mathematcal Scences, Vol. 7, 0, no. 47, 07-0 HIARI Ltd, www.m-hkar.com Comparson of the Populaton Varance Estmators of -Parameter Exponental Dstrbuton Based on Multple Crtera Decson Makng Method

More information

Comparative Studies of Law of Conservation of Energy. and Law Clusters of Conservation of Generalized Energy

Comparative Studies of Law of Conservation of Energy. and Law Clusters of Conservation of Generalized Energy Comparatve Studes of Law of Conservaton of Energy and Law Clusters of Conservaton of Generalzed Energy No.3 of Comparatve Physcs Seres Papers Fu Yuhua (CNOOC Research Insttute, E-mal:fuyh1945@sna.com)

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

Chapter 13: Multiple Regression

Chapter 13: Multiple Regression Chapter 13: Multple Regresson 13.1 Developng the multple-regresson Model The general model can be descrbed as: It smplfes for two ndependent varables: The sample ft parameter b 0, b 1, and b are used to

More information

Statistics for Economics & Business

Statistics for Economics & Business Statstcs for Economcs & Busness Smple Lnear Regresson Learnng Objectves In ths chapter, you learn: How to use regresson analyss to predct the value of a dependent varable based on an ndependent varable

More information

Chapter 2 - The Simple Linear Regression Model S =0. e i is a random error. S β2 β. This is a minimization problem. Solution is a calculus exercise.

Chapter 2 - The Simple Linear Regression Model S =0. e i is a random error. S β2 β. This is a minimization problem. Solution is a calculus exercise. Chapter - The Smple Lnear Regresson Model The lnear regresson equaton s: where y + = β + β e for =,..., y and are observable varables e s a random error How can an estmaton rule be constructed for the

More information

Uncertainty and auto-correlation in. Measurement

Uncertainty and auto-correlation in. Measurement Uncertanty and auto-correlaton n arxv:1707.03276v2 [physcs.data-an] 30 Dec 2017 Measurement Markus Schebl Federal Offce of Metrology and Surveyng (BEV), 1160 Venna, Austra E-mal: markus.schebl@bev.gv.at

More information

Hongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k)

Hongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k) ISSN 1749-3889 (prnt), 1749-3897 (onlne) Internatonal Journal of Nonlnear Scence Vol.17(2014) No.2,pp.188-192 Modfed Block Jacob-Davdson Method for Solvng Large Sparse Egenproblems Hongy Mao, College of

More information

Global Sensitivity. Tuesday 20 th February, 2018

Global Sensitivity. Tuesday 20 th February, 2018 Global Senstvty Tuesday 2 th February, 28 ) Local Senstvty Most senstvty analyses [] are based on local estmates of senstvty, typcally by expandng the response n a Taylor seres about some specfc values

More information

Linear Feature Engineering 11

Linear Feature Engineering 11 Lnear Feature Engneerng 11 2 Least-Squares 2.1 Smple least-squares Consder the followng dataset. We have a bunch of nputs x and correspondng outputs y. The partcular values n ths dataset are x y 0.23 0.19

More information

Power law and dimension of the maximum value for belief distribution with the max Deng entropy

Power law and dimension of the maximum value for belief distribution with the max Deng entropy Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng

More information

Parametric fractional imputation for missing data analysis. Jae Kwang Kim Survey Working Group Seminar March 29, 2010

Parametric fractional imputation for missing data analysis. Jae Kwang Kim Survey Working Group Seminar March 29, 2010 Parametrc fractonal mputaton for mssng data analyss Jae Kwang Km Survey Workng Group Semnar March 29, 2010 1 Outlne Introducton Proposed method Fractonal mputaton Approxmaton Varance estmaton Multple mputaton

More information

A new construction of 3-separable matrices via an improved decoding of Macula s construction

A new construction of 3-separable matrices via an improved decoding of Macula s construction Dscrete Optmzaton 5 008 700 704 Contents lsts avalable at ScenceDrect Dscrete Optmzaton journal homepage: wwwelsevercom/locate/dsopt A new constructon of 3-separable matrces va an mproved decodng of Macula

More information

Proceedings of the 10th WSEAS International Confenrence on APPLIED MATHEMATICS, Dallas, Texas, USA, November 1-3,

Proceedings of the 10th WSEAS International Confenrence on APPLIED MATHEMATICS, Dallas, Texas, USA, November 1-3, roceedngs of the 0th WSEAS Internatonal Confenrence on ALIED MATHEMATICS, Dallas, Texas, USA, November -3, 2006 365 Impact of Statc Load Modelng on Industral Load Nodal rces G. REZA YOUSEFI M. MOHSEN EDRAM

More information

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,

More information

Some modelling aspects for the Matlab implementation of MMA

Some modelling aspects for the Matlab implementation of MMA Some modellng aspects for the Matlab mplementaton of MMA Krster Svanberg krlle@math.kth.se Optmzaton and Systems Theory Department of Mathematcs KTH, SE 10044 Stockholm September 2004 1. Consdered optmzaton

More information

Fuzzy Boundaries of Sample Selection Model

Fuzzy Boundaries of Sample Selection Model Proceedngs of the 9th WSES Internatonal Conference on ppled Mathematcs, Istanbul, Turkey, May 7-9, 006 (pp309-34) Fuzzy Boundares of Sample Selecton Model L. MUHMD SFIIH, NTON BDULBSH KMIL, M. T. BU OSMN

More information

Solving Nonlinear Differential Equations by a Neural Network Method

Solving Nonlinear Differential Equations by a Neural Network Method Solvng Nonlnear Dfferental Equatons by a Neural Network Method Luce P. Aarts and Peter Van der Veer Delft Unversty of Technology, Faculty of Cvlengneerng and Geoscences, Secton of Cvlengneerng Informatcs,

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

NUMERICAL DIFFERENTIATION

NUMERICAL DIFFERENTIATION NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the

More information

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling Real-Tme Systems Multprocessor schedulng Specfcaton Implementaton Verfcaton Multprocessor schedulng -- -- Global schedulng How are tasks assgned to processors? Statc assgnment The processor(s) used for

More information

On an Extension of Stochastic Approximation EM Algorithm for Incomplete Data Problems. Vahid Tadayon 1

On an Extension of Stochastic Approximation EM Algorithm for Incomplete Data Problems. Vahid Tadayon 1 On an Extenson of Stochastc Approxmaton EM Algorthm for Incomplete Data Problems Vahd Tadayon Abstract: The Stochastc Approxmaton EM (SAEM algorthm, a varant stochastc approxmaton of EM, s a versatle tool

More information

Chapter 12 Analysis of Covariance

Chapter 12 Analysis of Covariance Chapter Analyss of Covarance Any scentfc experment s performed to know somethng that s unknown about a group of treatments and to test certan hypothess about the correspondng treatment effect When varablty

More information

Lecture 4: Universal Hash Functions/Streaming Cont d

Lecture 4: Universal Hash Functions/Streaming Cont d CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected

More information

Module 2. Random Processes. Version 2 ECE IIT, Kharagpur

Module 2. Random Processes. Version 2 ECE IIT, Kharagpur Module Random Processes Lesson 6 Functons of Random Varables After readng ths lesson, ou wll learn about cdf of functon of a random varable. Formula for determnng the pdf of a random varable. Let, X be

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Dr. Shalabh Department of Mathematics and Statistics Indian Institute of Technology Kanpur

Dr. Shalabh Department of Mathematics and Statistics Indian Institute of Technology Kanpur Analyss of Varance and Desgn of Experment-I MODULE VII LECTURE - 3 ANALYSIS OF COVARIANCE Dr Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur Any scentfc experment s performed

More information

Min Cut, Fast Cut, Polynomial Identities

Min Cut, Fast Cut, Polynomial Identities Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.

More information

Resource Allocation and Decision Analysis (ECON 8010) Spring 2014 Foundations of Regression Analysis

Resource Allocation and Decision Analysis (ECON 8010) Spring 2014 Foundations of Regression Analysis Resource Allocaton and Decson Analss (ECON 800) Sprng 04 Foundatons of Regresson Analss Readng: Regresson Analss (ECON 800 Coursepak, Page 3) Defntons and Concepts: Regresson Analss statstcal technques

More information

Tracking with Kalman Filter

Tracking with Kalman Filter Trackng wth Kalman Flter Scott T. Acton Vrgna Image and Vdeo Analyss (VIVA), Charles L. Brown Department of Electrcal and Computer Engneerng Department of Bomedcal Engneerng Unversty of Vrgna, Charlottesvlle,

More information

Statistical Energy Analysis for High Frequency Acoustic Analysis with LS-DYNA

Statistical Energy Analysis for High Frequency Acoustic Analysis with LS-DYNA 14 th Internatonal Users Conference Sesson: ALE-FSI Statstcal Energy Analyss for Hgh Frequency Acoustc Analyss wth Zhe Cu 1, Yun Huang 1, Mhamed Soul 2, Tayeb Zeguar 3 1 Lvermore Software Technology Corporaton

More information

Note 10. Modeling and Simulation of Dynamic Systems

Note 10. Modeling and Simulation of Dynamic Systems Lecture Notes of ME 475: Introducton to Mechatroncs Note 0 Modelng and Smulaton of Dynamc Systems Department of Mechancal Engneerng, Unversty Of Saskatchewan, 57 Campus Drve, Saskatoon, SK S7N 5A9, Canada

More information

ANOMALIES OF THE MAGNITUDE OF THE BIAS OF THE MAXIMUM LIKELIHOOD ESTIMATOR OF THE REGRESSION SLOPE

ANOMALIES OF THE MAGNITUDE OF THE BIAS OF THE MAXIMUM LIKELIHOOD ESTIMATOR OF THE REGRESSION SLOPE P a g e ANOMALIES OF THE MAGNITUDE OF THE BIAS OF THE MAXIMUM LIKELIHOOD ESTIMATOR OF THE REGRESSION SLOPE Darmud O Drscoll ¹, Donald E. Ramrez ² ¹ Head of Department of Mathematcs and Computer Studes

More information

A Particle Filter Algorithm based on Mixing of Prior probability density and UKF as Generate Importance Function

A Particle Filter Algorithm based on Mixing of Prior probability density and UKF as Generate Importance Function Advanced Scence and Technology Letters, pp.83-87 http://dx.do.org/10.14257/astl.2014.53.20 A Partcle Flter Algorthm based on Mxng of Pror probablty densty and UKF as Generate Importance Functon Lu Lu 1,1,

More information

Canonical transformations

Canonical transformations Canoncal transformatons November 23, 2014 Recall that we have defned a symplectc transformaton to be any lnear transformaton M A B leavng the symplectc form nvarant, Ω AB M A CM B DΩ CD Coordnate transformatons,

More information

The lower and upper bounds on Perron root of nonnegative irreducible matrices

The lower and upper bounds on Perron root of nonnegative irreducible matrices Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College

More information

Department of Quantitative Methods & Information Systems. Time Series and Their Components QMIS 320. Chapter 6

Department of Quantitative Methods & Information Systems. Time Series and Their Components QMIS 320. Chapter 6 Department of Quanttatve Methods & Informaton Systems Tme Seres and Ther Components QMIS 30 Chapter 6 Fall 00 Dr. Mohammad Zanal These sldes were modfed from ther orgnal source for educatonal purpose only.

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

e i is a random error

e i is a random error Chapter - The Smple Lnear Regresson Model The lnear regresson equaton s: where + β + β e for,..., and are observable varables e s a random error How can an estmaton rule be constructed for the unknown

More information

Laboratory 1c: Method of Least Squares

Laboratory 1c: Method of Least Squares Lab 1c, Least Squares Laboratory 1c: Method of Least Squares Introducton Consder the graph of expermental data n Fgure 1. In ths experment x s the ndependent varable and y the dependent varable. Clearly

More information

The Expectation-Maximization Algorithm

The Expectation-Maximization Algorithm The Expectaton-Maxmaton Algorthm Charles Elan elan@cs.ucsd.edu November 16, 2007 Ths chapter explans the EM algorthm at multple levels of generalty. Secton 1 gves the standard hgh-level verson of the algorthm.

More information

Lecture 10: May 6, 2013

Lecture 10: May 6, 2013 TTIC/CMSC 31150 Mathematcal Toolkt Sprng 013 Madhur Tulsan Lecture 10: May 6, 013 Scrbe: Wenje Luo In today s lecture, we manly talked about random walk on graphs and ntroduce the concept of graph expander,

More information

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing Advanced Scence and Technology Letters, pp.164-168 http://dx.do.org/10.14257/astl.2013 Pop-Clc Nose Detecton Usng Inter-Frame Correlaton for Improved Portable Audtory Sensng Dong Yun Lee, Kwang Myung Jeon,

More information

Singular Value Decomposition: Theory and Applications

Singular Value Decomposition: Theory and Applications Sngular Value Decomposton: Theory and Applcatons Danel Khashab Sprng 2015 Last Update: March 2, 2015 1 Introducton A = UDV where columns of U and V are orthonormal and matrx D s dagonal wth postve real

More information

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane A New Scramblng Evaluaton Scheme based on Spatal Dstrbuton Entropy and Centrod Dfference of Bt-plane Lang Zhao *, Avshek Adhkar Kouch Sakura * * Graduate School of Informaton Scence and Electrcal Engneerng,

More information

Convexity preserving interpolation by splines of arbitrary degree

Convexity preserving interpolation by splines of arbitrary degree Computer Scence Journal of Moldova, vol.18, no.1(52), 2010 Convexty preservng nterpolaton by splnes of arbtrary degree Igor Verlan Abstract In the present paper an algorthm of C 2 nterpolaton of dscrete

More information

Lecture 3. Ax x i a i. i i

Lecture 3. Ax x i a i. i i 18.409 The Behavor of Algorthms n Practce 2/14/2 Lecturer: Dan Spelman Lecture 3 Scrbe: Arvnd Sankar 1 Largest sngular value In order to bound the condton number, we need an upper bound on the largest

More information

Outline. Communication. Bellman Ford Algorithm. Bellman Ford Example. Bellman Ford Shortest Path [1]

Outline. Communication. Bellman Ford Algorithm. Bellman Ford Example. Bellman Ford Shortest Path [1] DYNAMIC SHORTEST PATH SEARCH AND SYNCHRONIZED TASK SWITCHING Jay Wagenpfel, Adran Trachte 2 Outlne Shortest Communcaton Path Searchng Bellmann Ford algorthm Algorthm for dynamc case Modfcatons to our algorthm

More information

18.1 Introduction and Recap

18.1 Introduction and Recap CS787: Advanced Algorthms Scrbe: Pryananda Shenoy and Shjn Kong Lecturer: Shuch Chawla Topc: Streamng Algorthmscontnued) Date: 0/26/2007 We contnue talng about streamng algorthms n ths lecture, ncludng

More information

Durban Watson for Testing the Lack-of-Fit of Polynomial Regression Models without Replications

Durban Watson for Testing the Lack-of-Fit of Polynomial Regression Models without Replications Durban Watson for Testng the Lack-of-Ft of Polynomal Regresson Models wthout Replcatons Ruba A. Alyaf, Maha A. Omar, Abdullah A. Al-Shha ralyaf@ksu.edu.sa, maomar@ksu.edu.sa, aalshha@ksu.edu.sa Department

More information

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

Chapter 8 Indicator Variables

Chapter 8 Indicator Variables Chapter 8 Indcator Varables In general, e explanatory varables n any regresson analyss are assumed to be quanttatve n nature. For example, e varables lke temperature, dstance, age etc. are quanttatve n

More information

NON-CENTRAL 7-POINT FORMULA IN THE METHOD OF LINES FOR PARABOLIC AND BURGERS' EQUATIONS

NON-CENTRAL 7-POINT FORMULA IN THE METHOD OF LINES FOR PARABOLIC AND BURGERS' EQUATIONS IJRRAS 8 (3 September 011 www.arpapress.com/volumes/vol8issue3/ijrras_8_3_08.pdf NON-CENTRAL 7-POINT FORMULA IN THE METHOD OF LINES FOR PARABOLIC AND BURGERS' EQUATIONS H.O. Bakodah Dept. of Mathematc

More information

Lecture 2: Prelude to the big shrink

Lecture 2: Prelude to the big shrink Lecture 2: Prelude to the bg shrnk Last tme A slght detour wth vsualzaton tools (hey, t was the frst day... why not start out wth somethng pretty to look at?) Then, we consdered a smple 120a-style regresson

More information

DUE: WEDS FEB 21ST 2018

DUE: WEDS FEB 21ST 2018 HOMEWORK # 1: FINITE DIFFERENCES IN ONE DIMENSION DUE: WEDS FEB 21ST 2018 1. Theory Beam bendng s a classcal engneerng analyss. The tradtonal soluton technque makes smplfyng assumptons such as a constant

More information

Chapter 15 - Multiple Regression

Chapter 15 - Multiple Regression Chapter - Multple Regresson Chapter - Multple Regresson Multple Regresson Model The equaton that descrbes how the dependent varable y s related to the ndependent varables x, x,... x p and an error term

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

LINEAR REGRESSION ANALYSIS. MODULE VIII Lecture Indicator Variables

LINEAR REGRESSION ANALYSIS. MODULE VIII Lecture Indicator Variables LINEAR REGRESSION ANALYSIS MODULE VIII Lecture - 7 Indcator Varables Dr. Shalabh Department of Maematcs and Statstcs Indan Insttute of Technology Kanpur Indcator varables versus quanttatve explanatory

More information

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity LINEAR REGRESSION ANALYSIS MODULE IX Lecture - 31 Multcollnearty Dr. Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur 6. Rdge regresson The OLSE s the best lnear unbased

More information

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards Comments on a secure dynamc ID-based remote user authentcaton scheme for multserver envronment usng smart cards Debao He chool of Mathematcs tatstcs Wuhan nversty Wuhan People s Republc of Chna Emal: hedebao@63com

More information

Expectation Maximization Mixture Models HMMs

Expectation Maximization Mixture Models HMMs -755 Machne Learnng for Sgnal Processng Mture Models HMMs Class 9. 2 Sep 200 Learnng Dstrbutons for Data Problem: Gven a collecton of eamples from some data, estmate ts dstrbuton Basc deas of Mamum Lelhood

More information

The internal structure of natural numbers and one method for the definition of large prime numbers

The internal structure of natural numbers and one method for the definition of large prime numbers The nternal structure of natural numbers and one method for the defnton of large prme numbers Emmanul Manousos APM Insttute for the Advancement of Physcs and Mathematcs 3 Poulou str. 53 Athens Greece Abstract

More information