Cyber-Security Analysis of State Estimators in Power Systems

Size: px
Start display at page:

Download "Cyber-Security Analysis of State Estimators in Power Systems"

Transcription

1 Cyber-Security Analysis of State Estimators in Electric Power Systems André Teixeira 1, Saurabh Amin 2, Henrik Sandberg 1, Karl H. Johansson 1, and Shankar Sastry 2 ACCESS Linnaeus Centre, KTH-Royal Institute of Technology 1 TRUST Center, UC Berkeley 2 Conference on Decision and Control December 17th, 2010

2 Outline 1 Introduction Motivation Problem Formulation 2 Background 3 Stealthy Deception Attacks 4 Simulation Example 5 Final Remarks

3 Outline 1 Introduction Motivation Problem Formulation 2 Background 3 Stealthy Deception Attacks 4 Simulation Example 5 Final Remarks

4 Power Systems Failure Consequences Normal failures have huge impact - US-Canada 2003 Blackout What about intentional failures?

5 Problem Formulation Deception Attacks on the SE Attacker a Control Center z = h(x) + State Estimator ˆx r = z ẑ Bad Data Detection Alarm! ˆx Power Grid Contingency Analysis Optimal Power Flow u Operator u Most of the theory developed from the 70 s to the 90 s assumes the data corruption comes from nature noise A framework to analyze this system under malicious data corruption is lacking!

6 Problem Formulation Relevant Questions/Objectives Questions Can malicious attackers generate stealthy deception attacks, with perfect model knowledge? [Liu et al. 2009] Can malicious attackers generate stealthy deception attacks, without perfect model knowledge? [This paper] How to reasonably model the attacker? [This paper] How hard is it to perform stealthy deception attacks? [Sandberg et al. 2010, Dán et al. 2010] How to deploy protective resources? [Bobba et al. 2010, Dán et al. 2010] Objectives Provide a (comprehensive) framework to analyze control systems under malicious data corruption.

7 Outline 1 Introduction Motivation Problem Formulation 2 Background 3 Stealthy Deception Attacks 4 Simulation Example 5 Final Remarks

8 Background State Estimation Steady-State Model: z = h(x) + ɛ Ex.: P 14 = V 1 V 4 b 14 sin(θ 1 θ 4 ) measurements: z R m state: x R n nonlinear model: h(x) Gaussian noise: ɛ N (0, R) Nonlinear Weighted Least-Squares: ˆx = arg min x R n 2 r(x) R 1 r(x), where r(x) = z h(x) is the measurement residual Local Linear Approximation around origin (z = Hx + ɛ): ˆx = [ H R 1 H ] 1 H R 1 z H = h x (ˆx 0 ) - the Jacobian matrix (tall and sparse)

9 Background Normalization Normalization: z = R 1/2 z ɛ = R 1/2 ɛ H = R 1/2 H ˆx = H z ẑ = H H z = K z r = (I K) z = S( Hx + ɛ) = S ɛ ɛ N (0, I ) Main useful concepts: K is the orthogonal projector onto Im( H), since K K = K = K S = (I K) is the orthogonal projector onto Ker( H ) Im( H) Ker( H ) Sa = 0 a Im( H) [Clements et al. 81, Liu et al. 09]

10 Background Bad Data Detection Hypothesis test: H 0 : No bad data is present (null hypothesis) H 1 : Bad data is present (alternative hypothesis) Performance index test: J(ˆx) = ɛ S ɛ χ 2 m n: accept H 0 if r 2 τ χ (α) Largest normalized residual test: r(ˆx) N (0, S), D = diag( S): accept H 0 if D 1/2 r τ N (α) α [0, 1] is the false alarm rate, i.e. P(H 1 H 0 ). General expression: Wr(ˆx) p < τ, for suitable W, p and τ.

11 Outline 1 Introduction Motivation Problem Formulation 2 Background 3 Stealthy Deception Attacks 4 Simulation Example 5 Final Remarks

12 Stealthy Deception Attacks Attacker Model Corrupted measurements: z a = z + a Attacker Goals Convergence of the estimator (trivial for the linear case); Stealthiness: Wr(ˆx a ) p < τ; Induce a desired bias on a subset of measurements Minimum Effort Attack Synthesis min a p a s.t. a G, a U G - set of goals U - class of stealthy attacks Different metrics for effort p = 0: cardinality of a (# of measurements to be corrupted) - not convex p = 1: may be used as a convex approximation of p = 0 p = 2: is related to measurement redundancy in the system All quantify how hard it is to attack the estimator, for a given set of goals [Sandberg et al. 10]

13 Stealthy Deception Attacks Class of Stealthy Attacks Stealthy attacks with Perfect Model Knowledge a Im( H) a U [Clements et al. 81, Liu et al. 09] a Im( H) c : a = Hc Guaranteed that r( z a ) = S( z + a) = S z = r( z) P(H 1 H 1 ) = P(H 1 H 0 )

14 Stealthy Deception Attacks Class of Stealthy Attacks Stealthy attacks with Perturbed Model Knowledge Known model is H = H + H Let the same policy be used: a = Hc, for some c. r( z a ) = S ɛ + Sa Sa 0 P(H 1 H 1 ) P(H 1 H 0 ): No perfect stealthiness Relaxation - Allow for a maximum detection risk tolerated by the attacker, δ : P(H 1 H 1 ) P(H 1 H 0 ) + δ. Depends on the detection scheme! What is the class of attacks satisfying such condition? Solution steps: Given a detection scheme, α, and δ, obtain λ : Sa p λ P(H 1 H 1 ) P(H 1 H 0 ) + δ Given λ, obtain β : a p β Sa p λ Then a p β a U

15 Stealthy Deception Attacks Perturbed Model Knowledge - Performance Index Test Performance index test Under attack, J a (ˆx) χ 2 m n(λ) where λ = Sa 2 2 (noncentrality parameter). r a = Sa corresponds to the residual bias due to the attack (recall r( z a ) = S ɛ + Sa) An attack is δ-stealthy if P(H 1 H 1 ) = P(J a > τ χ (α)) P(H 1 H 0 ) + δ: τ χ(α) g λ (u)du α + δ. (1)

16 Stealthy Deception Attacks Perturbed Model Knowledge - Performance Index Test Assumption P(H 1 H 1 ) increases monotonically with λ. Proposition Given α and δ, an attack is δ-stealthy regarding the performance index test if the following holds r a 2 2 = Sa 2 2 λ(α, δ) where λ(α, δ) is the maximum value of λ for which (1) is satisfied.

17 Stealthy Deception Attacks Perturbed Model Knowledge - Residual Bounds Known results [Galántai 06]: Definition Let M 1 and M 2 be subspaces of C m. The smallest principal angle γ 1 [0, π/2] between M 1 and M 2 is defined by cos(γ 1 ) = max u M 1 max v M 2 u H v subject to u = v = 1 Lemma Let P 1, P 2 R m m be orthogonal projectors of M 1 and M 2, respectively. Then the following holds P 1 P 2 2 = cos(γ 1 )

18 Stealthy Deception Attacks Perturbed Model Knowledge - Residual Bounds Applying the previous results we have: Proposition Let γ 1 be the smallest principal angle between Ker( H ) and Im( H). The residual increment due to a deception attack, r a, following the policy a = Hc satisfies r a 2 cos γ 1 a 2. Proof. Recall r( z a ) = S z a = S z + Sa = r + r a. a = Hc a Im( H) a = Ka. r a = S Ka r a 2 S K 2 a 2.

19 Stealthy Deception Attacks Performance Index Test - Class of Stealthy Attacks Theorem Given the perturbed model H, the false-alarm probability α and the maximum admissible risk δ, an attack following the policy a = Hc is stealthy regarding the performance index test if a 2 β(α, δ), where β(α, δ) = λ(α, δ) cos γ 1.

20 Outline 1 Introduction Motivation Problem Formulation 2 Background 3 Stealthy Deception Attacks 4 Simulation Example 5 Final Remarks

21 Simulation Example Worst-Case Uncertainty Consider the 6 bus system with the following branch parameters: The attacker s model H has the correct topology and a ±20% error in the parameters. The parameter errors were numerically computed so that S K 2 = cos γ 1 is maximized. Objective: induce a unit bias in z b1, i.e. have a b1 = 1, without being detected.

22 Simulation Example Worst-Case Uncertainty 9 χ 2 8 LNR a* β(0.05,δ) δ (Risk Increase) Upper bound on the attack vector as a function of the detection risk. The solid line represents the 2-norm of the optimal attack vector a constrained by a b1 = 1 The curves denoted as χ 2 and LNR represent the value of β(0.05, δ) for the performance index test and largest normalized residual test.

23 Outline 1 Introduction Motivation Problem Formulation 2 Background 3 Stealthy Deception Attacks 4 Simulation Example 5 Final Remarks

24 Final Remarks The proposed framework can also be applied to other structured uncertain models such as models with missing rows/measurements; with missing columns; obtained from data analysis. The optimization framework for attack synthesis enables the embedding of constraints such as encrypted measurements; pseudo-measurements; finite resources; The proposed framework has been applied to a real SCADA/EMS software - submitted to the IFAC World Congress 2011

Deception Attacks on the State Estimator

Deception Attacks on the State Estimator : Deception Attacks on the State Estimator, György Dán, Henrik Sandberg, Karl H. Johansson ACCESS Linnaeus Centre, KTH Royal Institute of Technology IFAC World Congress 2011 September 1st, 2011 The story

More information

Cyber Security Analysis of State Estimators in Electric Power Systems

Cyber Security Analysis of State Estimators in Electric Power Systems !"#$%&'''%()*+,-,*.,%)*%/,.010)*%2*3%()*#-)4 /,.,56,-%7897:;%04#)*%?#42*#2%>)#,4;%?#42*#2;%@?;%AB? Cyber Security Analysis of State Estimators in Electric Power Systems André Teixeira, Saurabh Amin,

More information

A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator

A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator Proceedings of the 18th World Congress The International Federation of Automatic Control A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator André

More information

Background: State Estimation

Background: State Estimation State Estimation Cyber Security of the Smart Grid Dr. Deepa Kundur Background: State Estimation University of Toronto Dr. Deepa Kundur (University of Toronto) Cyber Security of the Smart Grid 1 / 81 Dr.

More information

α α λ α = = λ λ α ψ = = α α α λ λ ψ α = + β = > θ θ β > β β θ θ θ β θ β γ θ β = γ θ > β > γ θ β γ = θ β = θ β = θ β = β θ = β β θ = = = β β θ = + α α α α α = = λ λ λ λ λ λ λ = λ λ α α α α λ ψ + α =

More information

Least-Squares Intersection of Lines

Least-Squares Intersection of Lines Least-Squares Intersection of Lines Johannes Traa - UIUC 2013 This write-up derives the least-squares solution for the intersection of lines. In the general case, a set of lines will not intersect at a

More information

Dot product and vector projections (Sect. 12.3) There are two main ways to introduce the dot product

Dot product and vector projections (Sect. 12.3) There are two main ways to introduce the dot product Dot product and vector projections (Sect. 12.3) Two definitions for the dot product. Geometric definition of dot product. Orthogonal vectors. Dot product and orthogonal projections. Properties of the dot

More information

Numerical methods for American options

Numerical methods for American options Lecture 9 Numerical methods for American options Lecture Notes by Andrzej Palczewski Computational Finance p. 1 American options The holder of an American option has the right to exercise it at any moment

More information

Imprecise probabilities, bets and functional analytic methods in Łukasiewicz logic.

Imprecise probabilities, bets and functional analytic methods in Łukasiewicz logic. Imprecise probabilities, bets and functional analytic methods in Łukasiewicz logic. Martina Fedel joint work with K.Keimel,F.Montagna,W.Roth Martina Fedel (UNISI) 1 / 32 Goal The goal of this talk is to

More information

1.3. DOT PRODUCT 19. 6. If θ is the angle (between 0 and π) between two non-zero vectors u and v,

1.3. DOT PRODUCT 19. 6. If θ is the angle (between 0 and π) between two non-zero vectors u and v, 1.3. DOT PRODUCT 19 1.3 Dot Product 1.3.1 Definitions and Properties The dot product is the first way to multiply two vectors. The definition we will give below may appear arbitrary. But it is not. It

More information

Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh

Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Peter Richtárik Week 3 Randomized Coordinate Descent With Arbitrary Sampling January 27, 2016 1 / 30 The Problem

More information

Inner Product Spaces

Inner Product Spaces Math 571 Inner Product Spaces 1. Preliminaries An inner product space is a vector space V along with a function, called an inner product which associates each pair of vectors u, v with a scalar u, v, and

More information

Numerisches Rechnen. (für Informatiker) M. Grepl J. Berger & J.T. Frings. Institut für Geometrie und Praktische Mathematik RWTH Aachen

Numerisches Rechnen. (für Informatiker) M. Grepl J. Berger & J.T. Frings. Institut für Geometrie und Praktische Mathematik RWTH Aachen (für Informatiker) M. Grepl J. Berger & J.T. Frings Institut für Geometrie und Praktische Mathematik RWTH Aachen Wintersemester 2010/11 Problem Statement Unconstrained Optimality Conditions Constrained

More information

2.3 Convex Constrained Optimization Problems

2.3 Convex Constrained Optimization Problems 42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions

More information

No: 10 04. Bilkent University. Monotonic Extension. Farhad Husseinov. Discussion Papers. Department of Economics

No: 10 04. Bilkent University. Monotonic Extension. Farhad Husseinov. Discussion Papers. Department of Economics No: 10 04 Bilkent University Monotonic Extension Farhad Husseinov Discussion Papers Department of Economics The Discussion Papers of the Department of Economics are intended to make the initial results

More information

Inner product. Definition of inner product

Inner product. Definition of inner product Math 20F Linear Algebra Lecture 25 1 Inner product Review: Definition of inner product. Slide 1 Norm and distance. Orthogonal vectors. Orthogonal complement. Orthogonal basis. Definition of inner product

More information

Proximal mapping via network optimization

Proximal mapping via network optimization L. Vandenberghe EE236C (Spring 23-4) Proximal mapping via network optimization minimum cut and maximum flow problems parametric minimum cut problem application to proximal mapping Introduction this lecture:

More information

Statistical Machine Learning

Statistical Machine Learning Statistical Machine Learning UoC Stats 37700, Winter quarter Lecture 4: classical linear and quadratic discriminants. 1 / 25 Linear separation For two classes in R d : simple idea: separate the classes

More information

Randomization Approaches for Network Revenue Management with Customer Choice Behavior

Randomization Approaches for Network Revenue Management with Customer Choice Behavior Randomization Approaches for Network Revenue Management with Customer Choice Behavior Sumit Kunnumkal Indian School of Business, Gachibowli, Hyderabad, 500032, India sumit kunnumkal@isb.edu March 9, 2011

More information

MATH 304 Linear Algebra Lecture 20: Inner product spaces. Orthogonal sets.

MATH 304 Linear Algebra Lecture 20: Inner product spaces. Orthogonal sets. MATH 304 Linear Algebra Lecture 20: Inner product spaces. Orthogonal sets. Norm The notion of norm generalizes the notion of length of a vector in R n. Definition. Let V be a vector space. A function α

More information

Orthogonal Diagonalization of Symmetric Matrices

Orthogonal Diagonalization of Symmetric Matrices MATH10212 Linear Algebra Brief lecture notes 57 Gram Schmidt Process enables us to find an orthogonal basis of a subspace. Let u 1,..., u k be a basis of a subspace V of R n. We begin the process of finding

More information

6.2 Permutations continued

6.2 Permutations continued 6.2 Permutations continued Theorem A permutation on a finite set A is either a cycle or can be expressed as a product (composition of disjoint cycles. Proof is by (strong induction on the number, r, of

More information

Applied Algorithm Design Lecture 5

Applied Algorithm Design Lecture 5 Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design

More information

Lecture 3: Linear methods for classification

Lecture 3: Linear methods for classification Lecture 3: Linear methods for classification Rafael A. Irizarry and Hector Corrada Bravo February, 2010 Today we describe four specific algorithms useful for classification problems: linear regression,

More information

International Doctoral School Algorithmic Decision Theory: MCDA and MOO

International Doctoral School Algorithmic Decision Theory: MCDA and MOO International Doctoral School Algorithmic Decision Theory: MCDA and MOO Lecture 2: Multiobjective Linear Programming Department of Engineering Science, The University of Auckland, New Zealand Laboratoire

More information

Decentralization and Private Information with Mutual Organizations

Decentralization and Private Information with Mutual Organizations Decentralization and Private Information with Mutual Organizations Edward C. Prescott and Adam Blandin Arizona State University 09 April 2014 1 Motivation Invisible hand works in standard environments

More information

Adaptive Online Gradient Descent

Adaptive Online Gradient Descent Adaptive Online Gradient Descent Peter L Bartlett Division of Computer Science Department of Statistics UC Berkeley Berkeley, CA 94709 bartlett@csberkeleyedu Elad Hazan IBM Almaden Research Center 650

More information

Discrete Optimization

Discrete Optimization Discrete Optimization [Chen, Batson, Dang: Applied integer Programming] Chapter 3 and 4.1-4.3 by Johan Högdahl and Victoria Svedberg Seminar 2, 2015-03-31 Todays presentation Chapter 3 Transforms using

More information

Two-Stage Stochastic Linear Programs

Two-Stage Stochastic Linear Programs Two-Stage Stochastic Linear Programs Operations Research Anthony Papavasiliou 1 / 27 Two-Stage Stochastic Linear Programs 1 Short Reviews Probability Spaces and Random Variables Convex Analysis 2 Deterministic

More information

The Steepest Descent Algorithm for Unconstrained Optimization and a Bisection Line-search Method

The Steepest Descent Algorithm for Unconstrained Optimization and a Bisection Line-search Method The Steepest Descent Algorithm for Unconstrained Optimization and a Bisection Line-search Method Robert M. Freund February, 004 004 Massachusetts Institute of Technology. 1 1 The Algorithm The problem

More information

160 CHAPTER 4. VECTOR SPACES

160 CHAPTER 4. VECTOR SPACES 160 CHAPTER 4. VECTOR SPACES 4. Rank and Nullity In this section, we look at relationships between the row space, column space, null space of a matrix and its transpose. We will derive fundamental results

More information

A Log-Robust Optimization Approach to Portfolio Management

A Log-Robust Optimization Approach to Portfolio Management A Log-Robust Optimization Approach to Portfolio Management Dr. Aurélie Thiele Lehigh University Joint work with Ban Kawas Research partially supported by the National Science Foundation Grant CMMI-0757983

More information

Stochastic control of HVAC systems: a learning-based approach. Damiano Varagnolo

Stochastic control of HVAC systems: a learning-based approach. Damiano Varagnolo Stochastic control of HVAC systems: a learning-based approach Damiano Varagnolo Something about me 2 Something about me Post-Doc at KTH Post-Doc at U. Padova Visiting Scholar at UC Berkeley Ph.D. Student

More information

Introduction to General and Generalized Linear Models

Introduction to General and Generalized Linear Models Introduction to General and Generalized Linear Models General Linear Models - part I Henrik Madsen Poul Thyregod Informatics and Mathematical Modelling Technical University of Denmark DK-2800 Kgs. Lyngby

More information

MA106 Linear Algebra lecture notes

MA106 Linear Algebra lecture notes MA106 Linear Algebra lecture notes Lecturers: Martin Bright and Daan Krammer Warwick, January 2011 Contents 1 Number systems and fields 3 1.1 Axioms for number systems......................... 3 2 Vector

More information

Some stability results of parameter identification in a jump diffusion model

Some stability results of parameter identification in a jump diffusion model Some stability results of parameter identification in a jump diffusion model D. Düvelmeyer Technische Universität Chemnitz, Fakultät für Mathematik, 09107 Chemnitz, Germany Abstract In this paper we discuss

More information

Fixed Point Theorems

Fixed Point Theorems Fixed Point Theorems Definition: Let X be a set and let T : X X be a function that maps X into itself. (Such a function is often called an operator, a transformation, or a transform on X, and the notation

More information

Some representability and duality results for convex mixed-integer programs.

Some representability and duality results for convex mixed-integer programs. Some representability and duality results for convex mixed-integer programs. Santanu S. Dey Joint work with Diego Morán and Juan Pablo Vielma December 17, 2012. Introduction About Motivation Mixed integer

More information

Distributed Estimation via Iterative Projections with Application to Power Network Monitoring

Distributed Estimation via Iterative Projections with Application to Power Network Monitoring Distributed Estimation via Iterative Projections with Application to Power Network Monitoring Fabio Pasqualetti a, Ruggero Carli b, Francesco Bullo a a Center for Control, Dynamical Systems and Computation,

More information

NOTES ON LINEAR TRANSFORMATIONS

NOTES ON LINEAR TRANSFORMATIONS NOTES ON LINEAR TRANSFORMATIONS Definition 1. Let V and W be vector spaces. A function T : V W is a linear transformation from V to W if the following two properties hold. i T v + v = T v + T v for all

More information

The Equivalence of Linear Programs and Zero-Sum Games

The Equivalence of Linear Programs and Zero-Sum Games The Equivalence of Linear Programs and Zero-Sum Games Ilan Adler, IEOR Dep, UC Berkeley adler@ieor.berkeley.edu Abstract In 1951, Dantzig showed the equivalence of linear programming problems and two-person

More information

Lectures notes on orthogonal matrices (with exercises) 92.222 - Linear Algebra II - Spring 2004 by D. Klain

Lectures notes on orthogonal matrices (with exercises) 92.222 - Linear Algebra II - Spring 2004 by D. Klain Lectures notes on orthogonal matrices (with exercises) 92.222 - Linear Algebra II - Spring 2004 by D. Klain 1. Orthogonal matrices and orthonormal sets An n n real-valued matrix A is said to be an orthogonal

More information

Sales forecasting # 2

Sales forecasting # 2 Sales forecasting # 2 Arthur Charpentier arthur.charpentier@univ-rennes1.fr 1 Agenda Qualitative and quantitative methods, a very general introduction Series decomposition Short versus long term forecasting

More information

Lecture 5 Least-squares

Lecture 5 Least-squares EE263 Autumn 2007-08 Stephen Boyd Lecture 5 Least-squares least-squares (approximate) solution of overdetermined equations projection and orthogonality principle least-squares estimation BLUE property

More information

Orthogonal Projections and Orthonormal Bases

Orthogonal Projections and Orthonormal Bases CS 3, HANDOUT -A, 3 November 04 (adjusted on 7 November 04) Orthogonal Projections and Orthonormal Bases (continuation of Handout 07 of 6 September 04) Definition (Orthogonality, length, unit vectors).

More information

IMPROVED NETWORK PARAMETER ERROR IDENTIFICATION USING MULTIPLE MEASUREMENT SCANS

IMPROVED NETWORK PARAMETER ERROR IDENTIFICATION USING MULTIPLE MEASUREMENT SCANS IMPROVED NETWORK PARAMETER ERROR IDENTIFICATION USING MULTIPLE MEASUREMENT SCANS Liuxi Zhang and Ali Abur Department of Electrical and Computer Engineering Northeastern University Boston, MA, USA lzhang@ece.neu.edu

More information

5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1

5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 General Integer Linear Program: (ILP) min c T x Ax b x 0 integer Assumption: A, b integer The integrality condition

More information

On duality of modular G-Riesz bases and G-Riesz bases in Hilbert C*-modules

On duality of modular G-Riesz bases and G-Riesz bases in Hilbert C*-modules Journal of Linear and Topological Algebra Vol. 04, No. 02, 2015, 53-63 On duality of modular G-Riesz bases and G-Riesz bases in Hilbert C*-modules M. Rashidi-Kouchi Young Researchers and Elite Club Kahnooj

More information

Introduction to Support Vector Machines. Colin Campbell, Bristol University

Introduction to Support Vector Machines. Colin Campbell, Bristol University Introduction to Support Vector Machines Colin Campbell, Bristol University 1 Outline of talk. Part 1. An Introduction to SVMs 1.1. SVMs for binary classification. 1.2. Soft margins and multi-class classification.

More information

α = u v. In other words, Orthogonal Projection

α = u v. In other words, Orthogonal Projection Orthogonal Projection Given any nonzero vector v, it is possible to decompose an arbitrary vector u into a component that points in the direction of v and one that points in a direction orthogonal to v

More information

Optimal shift scheduling with a global service level constraint

Optimal shift scheduling with a global service level constraint Optimal shift scheduling with a global service level constraint Ger Koole & Erik van der Sluis Vrije Universiteit Division of Mathematics and Computer Science De Boelelaan 1081a, 1081 HV Amsterdam The

More information

GenOpt (R) Generic Optimization Program User Manual Version 3.0.0β1

GenOpt (R) Generic Optimization Program User Manual Version 3.0.0β1 (R) User Manual Environmental Energy Technologies Division Berkeley, CA 94720 http://simulationresearch.lbl.gov Michael Wetter MWetter@lbl.gov February 20, 2009 Notice: This work was supported by the U.S.

More information

NORMAL FORMS, STABILITY AND SPLITTING OF INVARIANT MANIFOLDS II. FINITELY DIFFERENTIABLE HAMILTONIANS ABED BOUNEMOURA

NORMAL FORMS, STABILITY AND SPLITTING OF INVARIANT MANIFOLDS II. FINITELY DIFFERENTIABLE HAMILTONIANS ABED BOUNEMOURA NORMAL FORMS, STABILITY AND SPLITTING OF INVARIANT MANIFOLDS II. FINITELY DIFFERENTIABLE HAMILTONIANS ABED BOUNEMOURA Abstract. This paper is a sequel to Normal forms, stability and splitting of invariant

More information

GLOBAL OPTIMIZATION METHOD FOR SOLVING MATHEMATICAL PROGRAMS WITH LINEAR COMPLEMENTARITY CONSTRAINTS. 1. Introduction

GLOBAL OPTIMIZATION METHOD FOR SOLVING MATHEMATICAL PROGRAMS WITH LINEAR COMPLEMENTARITY CONSTRAINTS. 1. Introduction GLOBAL OPTIMIZATION METHOD FOR SOLVING MATHEMATICAL PROGRAMS WITH LINEAR COMPLEMENTARITY CONSTRAINTS N.V. THOAI, Y. YAMAMOTO, AND A. YOSHISE Abstract. We propose a method for finding a global optimal solution

More information

THE NUMBER OF GRAPHS AND A RANDOM GRAPH WITH A GIVEN DEGREE SEQUENCE. Alexander Barvinok

THE NUMBER OF GRAPHS AND A RANDOM GRAPH WITH A GIVEN DEGREE SEQUENCE. Alexander Barvinok THE NUMBER OF GRAPHS AND A RANDOM GRAPH WITH A GIVEN DEGREE SEQUENCE Alexer Barvinok Papers are available at http://www.math.lsa.umich.edu/ barvinok/papers.html This is a joint work with J.A. Hartigan

More information

9 Multiplication of Vectors: The Scalar or Dot Product

9 Multiplication of Vectors: The Scalar or Dot Product Arkansas Tech University MATH 934: Calculus III Dr. Marcel B Finan 9 Multiplication of Vectors: The Scalar or Dot Product Up to this point we have defined what vectors are and discussed basic notation

More information

3. Prime and maximal ideals. 3.1. Definitions and Examples.

3. Prime and maximal ideals. 3.1. Definitions and Examples. COMMUTATIVE ALGEBRA 5 3.1. Definitions and Examples. 3. Prime and maximal ideals Definition. An ideal P in a ring A is called prime if P A and if for every pair x, y of elements in A\P we have xy P. Equivalently,

More information

When Promotions Meet Operations: Cross-Selling and Its Effect on Call-Center Performance

When Promotions Meet Operations: Cross-Selling and Its Effect on Call-Center Performance When Promotions Meet Operations: Cross-Selling and Its Effect on Call-Center Performance Mor Armony 1 Itay Gurvich 2 Submitted July 28, 2006; Revised August 31, 2007 Abstract We study cross-selling operations

More information

Optimal File Sharing in Distributed Networks

Optimal File Sharing in Distributed Networks Optimal File Sharing in Distributed Networks Moni Naor Ron M. Roth Abstract The following file distribution problem is considered: Given a network of processors represented by an undirected graph G = (V,

More information

Advanced Microeconomics

Advanced Microeconomics Advanced Microeconomics Ordinal preference theory Harald Wiese University of Leipzig Harald Wiese (University of Leipzig) Advanced Microeconomics 1 / 68 Part A. Basic decision and preference theory 1 Decisions

More information

Similarity and Diagonalization. Similar Matrices

Similarity and Diagonalization. Similar Matrices MATH022 Linear Algebra Brief lecture notes 48 Similarity and Diagonalization Similar Matrices Let A and B be n n matrices. We say that A is similar to B if there is an invertible n n matrix P such that

More information

Stochastic Models for Inventory Management at Service Facilities

Stochastic Models for Inventory Management at Service Facilities Stochastic Models for Inventory Management at Service Facilities O. Berman, E. Kim Presented by F. Zoghalchi University of Toronto Rotman School of Management Dec, 2012 Agenda 1 Problem description Deterministic

More information

Optimization in R n Introduction

Optimization in R n Introduction Optimization in R n Introduction Rudi Pendavingh Eindhoven Technical University Optimization in R n, lecture Rudi Pendavingh (TUE) Optimization in R n Introduction ORN / 4 Some optimization problems designing

More information

v w is orthogonal to both v and w. the three vectors v, w and v w form a right-handed set of vectors.

v w is orthogonal to both v and w. the three vectors v, w and v w form a right-handed set of vectors. 3. Cross product Definition 3.1. Let v and w be two vectors in R 3. The cross product of v and w, denoted v w, is the vector defined as follows: the length of v w is the area of the parallelogram with

More information

SOLUTIONS TO EXERCISES FOR. MATHEMATICS 205A Part 3. Spaces with special properties

SOLUTIONS TO EXERCISES FOR. MATHEMATICS 205A Part 3. Spaces with special properties SOLUTIONS TO EXERCISES FOR MATHEMATICS 205A Part 3 Fall 2008 III. Spaces with special properties III.1 : Compact spaces I Problems from Munkres, 26, pp. 170 172 3. Show that a finite union of compact subspaces

More information

Trading regret rate for computational efficiency in online learning with limited feedback

Trading regret rate for computational efficiency in online learning with limited feedback Trading regret rate for computational efficiency in online learning with limited feedback Shai Shalev-Shwartz TTI-C Hebrew University On-line Learning with Limited Feedback Workshop, 2009 June 2009 Shai

More information

Recall the basic property of the transpose (for any A): v A t Aw = v w, v, w R n.

Recall the basic property of the transpose (for any A): v A t Aw = v w, v, w R n. ORTHOGONAL MATRICES Informally, an orthogonal n n matrix is the n-dimensional analogue of the rotation matrices R θ in R 2. When does a linear transformation of R 3 (or R n ) deserve to be called a rotation?

More information

Date: April 12, 2001. Contents

Date: April 12, 2001. Contents 2 Lagrange Multipliers Date: April 12, 2001 Contents 2.1. Introduction to Lagrange Multipliers......... p. 2 2.2. Enhanced Fritz John Optimality Conditions...... p. 12 2.3. Informative Lagrange Multipliers...........

More information

RANDOM INTERVAL HOMEOMORPHISMS. MICHA L MISIUREWICZ Indiana University Purdue University Indianapolis

RANDOM INTERVAL HOMEOMORPHISMS. MICHA L MISIUREWICZ Indiana University Purdue University Indianapolis RANDOM INTERVAL HOMEOMORPHISMS MICHA L MISIUREWICZ Indiana University Purdue University Indianapolis This is a joint work with Lluís Alsedà Motivation: A talk by Yulij Ilyashenko. Two interval maps, applied

More information

A Log-Robust Optimization Approach to Portfolio Management

A Log-Robust Optimization Approach to Portfolio Management A Log-Robust Optimization Approach to Portfolio Management Ban Kawas Aurélie Thiele December 2007, revised August 2008, December 2008 Abstract We present a robust optimization approach to portfolio management

More information

Separation Properties for Locally Convex Cones

Separation Properties for Locally Convex Cones Journal of Convex Analysis Volume 9 (2002), No. 1, 301 307 Separation Properties for Locally Convex Cones Walter Roth Department of Mathematics, Universiti Brunei Darussalam, Gadong BE1410, Brunei Darussalam

More information

Impacts of Malicious Data on Real-time Price of Electricity Market Operations

Impacts of Malicious Data on Real-time Price of Electricity Market Operations Impacts of Malicious Data on Real-time Price of Electricity Market Operations Liyan Jia, Robert J. Thomas, and Lang Tong School of Electrical and Computer Engineering Cornell University Ithaca, NY 485,

More information

Weighted-Least-Square(WLS) State Estimation

Weighted-Least-Square(WLS) State Estimation Weighted-Least-Square(WLS) State Estimation Yousu Chen PNNL December 18, 2015 This document is a description of how to formulate the weighted-least squares (WLS) state estimation problem. Most of the formulation

More information

6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games

6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games 6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games Asu Ozdaglar MIT February 4, 2009 1 Introduction Outline Decisions, utility maximization Strategic form games Best responses

More information

Reject Inference in Credit Scoring. Jie-Men Mok

Reject Inference in Credit Scoring. Jie-Men Mok Reject Inference in Credit Scoring Jie-Men Mok BMI paper January 2009 ii Preface In the Master programme of Business Mathematics and Informatics (BMI), it is required to perform research on a business

More information

How to assess the risk of a large portfolio? How to estimate a large covariance matrix?

How to assess the risk of a large portfolio? How to estimate a large covariance matrix? Chapter 3 Sparse Portfolio Allocation This chapter touches some practical aspects of portfolio allocation and risk assessment from a large pool of financial assets (e.g. stocks) How to assess the risk

More information

FUNCTIONAL ANALYSIS LECTURE NOTES: QUOTIENT SPACES

FUNCTIONAL ANALYSIS LECTURE NOTES: QUOTIENT SPACES FUNCTIONAL ANALYSIS LECTURE NOTES: QUOTIENT SPACES CHRISTOPHER HEIL 1. Cosets and the Quotient Space Any vector space is an abelian group under the operation of vector addition. So, if you are have studied

More information

BANACH AND HILBERT SPACE REVIEW

BANACH AND HILBERT SPACE REVIEW BANACH AND HILBET SPACE EVIEW CHISTOPHE HEIL These notes will briefly review some basic concepts related to the theory of Banach and Hilbert spaces. We are not trying to give a complete development, but

More information

Fuzzy Differential Systems and the New Concept of Stability

Fuzzy Differential Systems and the New Concept of Stability Nonlinear Dynamics and Systems Theory, 1(2) (2001) 111 119 Fuzzy Differential Systems and the New Concept of Stability V. Lakshmikantham 1 and S. Leela 2 1 Department of Mathematical Sciences, Florida

More information

Notes on Symmetric Matrices

Notes on Symmetric Matrices CPSC 536N: Randomized Algorithms 2011-12 Term 2 Notes on Symmetric Matrices Prof. Nick Harvey University of British Columbia 1 Symmetric Matrices We review some basic results concerning symmetric matrices.

More information

Vector and Matrix Norms

Vector and Matrix Norms Chapter 1 Vector and Matrix Norms 11 Vector Spaces Let F be a field (such as the real numbers, R, or complex numbers, C) with elements called scalars A Vector Space, V, over the field F is a non-empty

More information

MAT 242 Test 3 SOLUTIONS, FORM A

MAT 242 Test 3 SOLUTIONS, FORM A MAT Test SOLUTIONS, FORM A. Let v =, v =, and v =. Note that B = { v, v, v } is an orthogonal set. Also, let W be the subspace spanned by { v, v, v }. A = 8 a. [5 points] Find the orthogonal projection

More information

Recall that two vectors in are perpendicular or orthogonal provided that their dot

Recall that two vectors in are perpendicular or orthogonal provided that their dot Orthogonal Complements and Projections Recall that two vectors in are perpendicular or orthogonal provided that their dot product vanishes That is, if and only if Example 1 The vectors in are orthogonal

More information

When Promotions Meet Operations: Cross-Selling and Its Effect on Call-Center Performance

When Promotions Meet Operations: Cross-Selling and Its Effect on Call-Center Performance When Promotions Meet Operations: Cross-Selling and Its Effect on Call-Center Performance Mor Armony 1 Itay Gurvich 2 July 27, 2006 Abstract We study cross-selling operations in call centers. The following

More information

Solving polynomial least squares problems via semidefinite programming relaxations

Solving polynomial least squares problems via semidefinite programming relaxations Solving polynomial least squares problems via semidefinite programming relaxations Sunyoung Kim and Masakazu Kojima August 2007, revised in November, 2007 Abstract. A polynomial optimization problem whose

More information

THe vast expansion of highly capable smart wireless

THe vast expansion of highly capable smart wireless Proactive Data Download and User Demand Shaping for Data etworks John adrous, Atilla ryilmaz, and Hesham l Gamal Abstract In this work, we propose and study optimal proactive resource allocation and demand

More information

Numerical Methods I Eigenvalue Problems

Numerical Methods I Eigenvalue Problems Numerical Methods I Eigenvalue Problems Aleksandar Donev Courant Institute, NYU 1 donev@courant.nyu.edu 1 Course G63.2010.001 / G22.2420-001, Fall 2010 September 30th, 2010 A. Donev (Courant Institute)

More information

Cyclotomic Extensions

Cyclotomic Extensions Chapter 7 Cyclotomic Extensions A cyclotomic extension Q(ζ n ) of the rationals is formed by adjoining a primitive n th root of unity ζ n. In this chapter, we will find an integral basis and calculate

More information

Optimal Taxation in a Limited Commitment Economy

Optimal Taxation in a Limited Commitment Economy Optimal Taxation in a Limited Commitment Economy forthcoming in the Review of Economic Studies Yena Park University of Pennsylvania JOB MARKET PAPER Abstract This paper studies optimal Ramsey taxation

More information

A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre

A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL 4, NO 2, JUNE 2009 165 A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre

More information

HETEROGENEOUS AGENTS AND AGGREGATE UNCERTAINTY. Daniel Harenberg daniel.harenberg@gmx.de. University of Mannheim. Econ 714, 28.11.

HETEROGENEOUS AGENTS AND AGGREGATE UNCERTAINTY. Daniel Harenberg daniel.harenberg@gmx.de. University of Mannheim. Econ 714, 28.11. COMPUTING EQUILIBRIUM WITH HETEROGENEOUS AGENTS AND AGGREGATE UNCERTAINTY (BASED ON KRUEGER AND KUBLER, 2004) Daniel Harenberg daniel.harenberg@gmx.de University of Mannheim Econ 714, 28.11.06 Daniel Harenberg

More information

Metric Spaces. Chapter 7. 7.1. Metrics

Metric Spaces. Chapter 7. 7.1. Metrics Chapter 7 Metric Spaces A metric space is a set X that has a notion of the distance d(x, y) between every pair of points x, y X. The purpose of this chapter is to introduce metric spaces and give some

More information

Lecture 11: 0-1 Quadratic Program and Lower Bounds

Lecture 11: 0-1 Quadratic Program and Lower Bounds Lecture : - Quadratic Program and Lower Bounds (3 units) Outline Problem formulations Reformulation: Linearization & continuous relaxation Branch & Bound Method framework Simple bounds, LP bound and semidefinite

More information

0.1 Phase Estimation Technique

0.1 Phase Estimation Technique Phase Estimation In this lecture we will describe Kitaev s phase estimation algorithm, and use it to obtain an alternate derivation of a quantum factoring algorithm We will also use this technique to design

More information

Spatial Statistics Chapter 3 Basics of areal data and areal data modeling

Spatial Statistics Chapter 3 Basics of areal data and areal data modeling Spatial Statistics Chapter 3 Basics of areal data and areal data modeling Recall areal data also known as lattice data are data Y (s), s D where D is a discrete index set. This usually corresponds to data

More information

Nonlinear Regression:

Nonlinear Regression: Zurich University of Applied Sciences School of Engineering IDP Institute of Data Analysis and Process Design Nonlinear Regression: A Powerful Tool With Considerable Complexity Half-Day : Improved Inference

More information

The Goldberg Rao Algorithm for the Maximum Flow Problem

The Goldberg Rao Algorithm for the Maximum Flow Problem The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }

More information

ON SEQUENTIAL CONTINUITY OF COMPOSITION MAPPING. 0. Introduction

ON SEQUENTIAL CONTINUITY OF COMPOSITION MAPPING. 0. Introduction ON SEQUENTIAL CONTINUITY OF COMPOSITION MAPPING Abstract. In [1] there was proved a theorem concerning the continuity of the composition mapping, and there was announced a theorem on sequential continuity

More information

Several Views of Support Vector Machines

Several Views of Support Vector Machines Several Views of Support Vector Machines Ryan M. Rifkin Honda Research Institute USA, Inc. Human Intention Understanding Group 2007 Tikhonov Regularization We are considering algorithms of the form min

More information

9 More on differentiation

9 More on differentiation Tel Aviv University, 2013 Measure and category 75 9 More on differentiation 9a Finite Taylor expansion............... 75 9b Continuous and nowhere differentiable..... 78 9c Differentiable and nowhere monotone......

More information