Cyber-Security Analysis of State Estimators in Power Systems
|
|
- Marshall Blair
- 8 years ago
- Views:
Transcription
1 Cyber-Security Analysis of State Estimators in Electric Power Systems André Teixeira 1, Saurabh Amin 2, Henrik Sandberg 1, Karl H. Johansson 1, and Shankar Sastry 2 ACCESS Linnaeus Centre, KTH-Royal Institute of Technology 1 TRUST Center, UC Berkeley 2 Conference on Decision and Control December 17th, 2010
2 Outline 1 Introduction Motivation Problem Formulation 2 Background 3 Stealthy Deception Attacks 4 Simulation Example 5 Final Remarks
3 Outline 1 Introduction Motivation Problem Formulation 2 Background 3 Stealthy Deception Attacks 4 Simulation Example 5 Final Remarks
4 Power Systems Failure Consequences Normal failures have huge impact - US-Canada 2003 Blackout What about intentional failures?
5 Problem Formulation Deception Attacks on the SE Attacker a Control Center z = h(x) + State Estimator ˆx r = z ẑ Bad Data Detection Alarm! ˆx Power Grid Contingency Analysis Optimal Power Flow u Operator u Most of the theory developed from the 70 s to the 90 s assumes the data corruption comes from nature noise A framework to analyze this system under malicious data corruption is lacking!
6 Problem Formulation Relevant Questions/Objectives Questions Can malicious attackers generate stealthy deception attacks, with perfect model knowledge? [Liu et al. 2009] Can malicious attackers generate stealthy deception attacks, without perfect model knowledge? [This paper] How to reasonably model the attacker? [This paper] How hard is it to perform stealthy deception attacks? [Sandberg et al. 2010, Dán et al. 2010] How to deploy protective resources? [Bobba et al. 2010, Dán et al. 2010] Objectives Provide a (comprehensive) framework to analyze control systems under malicious data corruption.
7 Outline 1 Introduction Motivation Problem Formulation 2 Background 3 Stealthy Deception Attacks 4 Simulation Example 5 Final Remarks
8 Background State Estimation Steady-State Model: z = h(x) + ɛ Ex.: P 14 = V 1 V 4 b 14 sin(θ 1 θ 4 ) measurements: z R m state: x R n nonlinear model: h(x) Gaussian noise: ɛ N (0, R) Nonlinear Weighted Least-Squares: ˆx = arg min x R n 2 r(x) R 1 r(x), where r(x) = z h(x) is the measurement residual Local Linear Approximation around origin (z = Hx + ɛ): ˆx = [ H R 1 H ] 1 H R 1 z H = h x (ˆx 0 ) - the Jacobian matrix (tall and sparse)
9 Background Normalization Normalization: z = R 1/2 z ɛ = R 1/2 ɛ H = R 1/2 H ˆx = H z ẑ = H H z = K z r = (I K) z = S( Hx + ɛ) = S ɛ ɛ N (0, I ) Main useful concepts: K is the orthogonal projector onto Im( H), since K K = K = K S = (I K) is the orthogonal projector onto Ker( H ) Im( H) Ker( H ) Sa = 0 a Im( H) [Clements et al. 81, Liu et al. 09]
10 Background Bad Data Detection Hypothesis test: H 0 : No bad data is present (null hypothesis) H 1 : Bad data is present (alternative hypothesis) Performance index test: J(ˆx) = ɛ S ɛ χ 2 m n: accept H 0 if r 2 τ χ (α) Largest normalized residual test: r(ˆx) N (0, S), D = diag( S): accept H 0 if D 1/2 r τ N (α) α [0, 1] is the false alarm rate, i.e. P(H 1 H 0 ). General expression: Wr(ˆx) p < τ, for suitable W, p and τ.
11 Outline 1 Introduction Motivation Problem Formulation 2 Background 3 Stealthy Deception Attacks 4 Simulation Example 5 Final Remarks
12 Stealthy Deception Attacks Attacker Model Corrupted measurements: z a = z + a Attacker Goals Convergence of the estimator (trivial for the linear case); Stealthiness: Wr(ˆx a ) p < τ; Induce a desired bias on a subset of measurements Minimum Effort Attack Synthesis min a p a s.t. a G, a U G - set of goals U - class of stealthy attacks Different metrics for effort p = 0: cardinality of a (# of measurements to be corrupted) - not convex p = 1: may be used as a convex approximation of p = 0 p = 2: is related to measurement redundancy in the system All quantify how hard it is to attack the estimator, for a given set of goals [Sandberg et al. 10]
13 Stealthy Deception Attacks Class of Stealthy Attacks Stealthy attacks with Perfect Model Knowledge a Im( H) a U [Clements et al. 81, Liu et al. 09] a Im( H) c : a = Hc Guaranteed that r( z a ) = S( z + a) = S z = r( z) P(H 1 H 1 ) = P(H 1 H 0 )
14 Stealthy Deception Attacks Class of Stealthy Attacks Stealthy attacks with Perturbed Model Knowledge Known model is H = H + H Let the same policy be used: a = Hc, for some c. r( z a ) = S ɛ + Sa Sa 0 P(H 1 H 1 ) P(H 1 H 0 ): No perfect stealthiness Relaxation - Allow for a maximum detection risk tolerated by the attacker, δ : P(H 1 H 1 ) P(H 1 H 0 ) + δ. Depends on the detection scheme! What is the class of attacks satisfying such condition? Solution steps: Given a detection scheme, α, and δ, obtain λ : Sa p λ P(H 1 H 1 ) P(H 1 H 0 ) + δ Given λ, obtain β : a p β Sa p λ Then a p β a U
15 Stealthy Deception Attacks Perturbed Model Knowledge - Performance Index Test Performance index test Under attack, J a (ˆx) χ 2 m n(λ) where λ = Sa 2 2 (noncentrality parameter). r a = Sa corresponds to the residual bias due to the attack (recall r( z a ) = S ɛ + Sa) An attack is δ-stealthy if P(H 1 H 1 ) = P(J a > τ χ (α)) P(H 1 H 0 ) + δ: τ χ(α) g λ (u)du α + δ. (1)
16 Stealthy Deception Attacks Perturbed Model Knowledge - Performance Index Test Assumption P(H 1 H 1 ) increases monotonically with λ. Proposition Given α and δ, an attack is δ-stealthy regarding the performance index test if the following holds r a 2 2 = Sa 2 2 λ(α, δ) where λ(α, δ) is the maximum value of λ for which (1) is satisfied.
17 Stealthy Deception Attacks Perturbed Model Knowledge - Residual Bounds Known results [Galántai 06]: Definition Let M 1 and M 2 be subspaces of C m. The smallest principal angle γ 1 [0, π/2] between M 1 and M 2 is defined by cos(γ 1 ) = max u M 1 max v M 2 u H v subject to u = v = 1 Lemma Let P 1, P 2 R m m be orthogonal projectors of M 1 and M 2, respectively. Then the following holds P 1 P 2 2 = cos(γ 1 )
18 Stealthy Deception Attacks Perturbed Model Knowledge - Residual Bounds Applying the previous results we have: Proposition Let γ 1 be the smallest principal angle between Ker( H ) and Im( H). The residual increment due to a deception attack, r a, following the policy a = Hc satisfies r a 2 cos γ 1 a 2. Proof. Recall r( z a ) = S z a = S z + Sa = r + r a. a = Hc a Im( H) a = Ka. r a = S Ka r a 2 S K 2 a 2.
19 Stealthy Deception Attacks Performance Index Test - Class of Stealthy Attacks Theorem Given the perturbed model H, the false-alarm probability α and the maximum admissible risk δ, an attack following the policy a = Hc is stealthy regarding the performance index test if a 2 β(α, δ), where β(α, δ) = λ(α, δ) cos γ 1.
20 Outline 1 Introduction Motivation Problem Formulation 2 Background 3 Stealthy Deception Attacks 4 Simulation Example 5 Final Remarks
21 Simulation Example Worst-Case Uncertainty Consider the 6 bus system with the following branch parameters: The attacker s model H has the correct topology and a ±20% error in the parameters. The parameter errors were numerically computed so that S K 2 = cos γ 1 is maximized. Objective: induce a unit bias in z b1, i.e. have a b1 = 1, without being detected.
22 Simulation Example Worst-Case Uncertainty 9 χ 2 8 LNR a* β(0.05,δ) δ (Risk Increase) Upper bound on the attack vector as a function of the detection risk. The solid line represents the 2-norm of the optimal attack vector a constrained by a b1 = 1 The curves denoted as χ 2 and LNR represent the value of β(0.05, δ) for the performance index test and largest normalized residual test.
23 Outline 1 Introduction Motivation Problem Formulation 2 Background 3 Stealthy Deception Attacks 4 Simulation Example 5 Final Remarks
24 Final Remarks The proposed framework can also be applied to other structured uncertain models such as models with missing rows/measurements; with missing columns; obtained from data analysis. The optimization framework for attack synthesis enables the embedding of constraints such as encrypted measurements; pseudo-measurements; finite resources; The proposed framework has been applied to a real SCADA/EMS software - submitted to the IFAC World Congress 2011
Deception Attacks on the State Estimator
: Deception Attacks on the State Estimator, György Dán, Henrik Sandberg, Karl H. Johansson ACCESS Linnaeus Centre, KTH Royal Institute of Technology IFAC World Congress 2011 September 1st, 2011 The story
More informationCyber Security Analysis of State Estimators in Electric Power Systems
!"#$%&'''%()*+,-,*.,%)*%/,.010)*%2*3%()*#-)4 /,.,56,-%7897:;%04#)*%?#42*#2%>)#,4;%?#42*#2;%@?;%AB? Cyber Security Analysis of State Estimators in Electric Power Systems André Teixeira, Saurabh Amin,
More informationA Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator
Proceedings of the 18th World Congress The International Federation of Automatic Control A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator André
More informationBackground: State Estimation
State Estimation Cyber Security of the Smart Grid Dr. Deepa Kundur Background: State Estimation University of Toronto Dr. Deepa Kundur (University of Toronto) Cyber Security of the Smart Grid 1 / 81 Dr.
More informationα α λ α = = λ λ α ψ = = α α α λ λ ψ α = + β = > θ θ β > β β θ θ θ β θ β γ θ β = γ θ > β > γ θ β γ = θ β = θ β = θ β = β θ = β β θ = = = β β θ = + α α α α α = = λ λ λ λ λ λ λ = λ λ α α α α λ ψ + α =
More informationLeast-Squares Intersection of Lines
Least-Squares Intersection of Lines Johannes Traa - UIUC 2013 This write-up derives the least-squares solution for the intersection of lines. In the general case, a set of lines will not intersect at a
More informationDot product and vector projections (Sect. 12.3) There are two main ways to introduce the dot product
Dot product and vector projections (Sect. 12.3) Two definitions for the dot product. Geometric definition of dot product. Orthogonal vectors. Dot product and orthogonal projections. Properties of the dot
More informationNumerical methods for American options
Lecture 9 Numerical methods for American options Lecture Notes by Andrzej Palczewski Computational Finance p. 1 American options The holder of an American option has the right to exercise it at any moment
More informationImprecise probabilities, bets and functional analytic methods in Łukasiewicz logic.
Imprecise probabilities, bets and functional analytic methods in Łukasiewicz logic. Martina Fedel joint work with K.Keimel,F.Montagna,W.Roth Martina Fedel (UNISI) 1 / 32 Goal The goal of this talk is to
More information1.3. DOT PRODUCT 19. 6. If θ is the angle (between 0 and π) between two non-zero vectors u and v,
1.3. DOT PRODUCT 19 1.3 Dot Product 1.3.1 Definitions and Properties The dot product is the first way to multiply two vectors. The definition we will give below may appear arbitrary. But it is not. It
More informationModern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh
Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Peter Richtárik Week 3 Randomized Coordinate Descent With Arbitrary Sampling January 27, 2016 1 / 30 The Problem
More informationInner Product Spaces
Math 571 Inner Product Spaces 1. Preliminaries An inner product space is a vector space V along with a function, called an inner product which associates each pair of vectors u, v with a scalar u, v, and
More informationNumerisches Rechnen. (für Informatiker) M. Grepl J. Berger & J.T. Frings. Institut für Geometrie und Praktische Mathematik RWTH Aachen
(für Informatiker) M. Grepl J. Berger & J.T. Frings Institut für Geometrie und Praktische Mathematik RWTH Aachen Wintersemester 2010/11 Problem Statement Unconstrained Optimality Conditions Constrained
More information2.3 Convex Constrained Optimization Problems
42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions
More informationNo: 10 04. Bilkent University. Monotonic Extension. Farhad Husseinov. Discussion Papers. Department of Economics
No: 10 04 Bilkent University Monotonic Extension Farhad Husseinov Discussion Papers Department of Economics The Discussion Papers of the Department of Economics are intended to make the initial results
More informationInner product. Definition of inner product
Math 20F Linear Algebra Lecture 25 1 Inner product Review: Definition of inner product. Slide 1 Norm and distance. Orthogonal vectors. Orthogonal complement. Orthogonal basis. Definition of inner product
More informationProximal mapping via network optimization
L. Vandenberghe EE236C (Spring 23-4) Proximal mapping via network optimization minimum cut and maximum flow problems parametric minimum cut problem application to proximal mapping Introduction this lecture:
More informationStatistical Machine Learning
Statistical Machine Learning UoC Stats 37700, Winter quarter Lecture 4: classical linear and quadratic discriminants. 1 / 25 Linear separation For two classes in R d : simple idea: separate the classes
More informationRandomization Approaches for Network Revenue Management with Customer Choice Behavior
Randomization Approaches for Network Revenue Management with Customer Choice Behavior Sumit Kunnumkal Indian School of Business, Gachibowli, Hyderabad, 500032, India sumit kunnumkal@isb.edu March 9, 2011
More informationMATH 304 Linear Algebra Lecture 20: Inner product spaces. Orthogonal sets.
MATH 304 Linear Algebra Lecture 20: Inner product spaces. Orthogonal sets. Norm The notion of norm generalizes the notion of length of a vector in R n. Definition. Let V be a vector space. A function α
More informationOrthogonal Diagonalization of Symmetric Matrices
MATH10212 Linear Algebra Brief lecture notes 57 Gram Schmidt Process enables us to find an orthogonal basis of a subspace. Let u 1,..., u k be a basis of a subspace V of R n. We begin the process of finding
More information6.2 Permutations continued
6.2 Permutations continued Theorem A permutation on a finite set A is either a cycle or can be expressed as a product (composition of disjoint cycles. Proof is by (strong induction on the number, r, of
More informationApplied Algorithm Design Lecture 5
Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design
More informationLecture 3: Linear methods for classification
Lecture 3: Linear methods for classification Rafael A. Irizarry and Hector Corrada Bravo February, 2010 Today we describe four specific algorithms useful for classification problems: linear regression,
More informationInternational Doctoral School Algorithmic Decision Theory: MCDA and MOO
International Doctoral School Algorithmic Decision Theory: MCDA and MOO Lecture 2: Multiobjective Linear Programming Department of Engineering Science, The University of Auckland, New Zealand Laboratoire
More informationDecentralization and Private Information with Mutual Organizations
Decentralization and Private Information with Mutual Organizations Edward C. Prescott and Adam Blandin Arizona State University 09 April 2014 1 Motivation Invisible hand works in standard environments
More informationAdaptive Online Gradient Descent
Adaptive Online Gradient Descent Peter L Bartlett Division of Computer Science Department of Statistics UC Berkeley Berkeley, CA 94709 bartlett@csberkeleyedu Elad Hazan IBM Almaden Research Center 650
More informationDiscrete Optimization
Discrete Optimization [Chen, Batson, Dang: Applied integer Programming] Chapter 3 and 4.1-4.3 by Johan Högdahl and Victoria Svedberg Seminar 2, 2015-03-31 Todays presentation Chapter 3 Transforms using
More informationTwo-Stage Stochastic Linear Programs
Two-Stage Stochastic Linear Programs Operations Research Anthony Papavasiliou 1 / 27 Two-Stage Stochastic Linear Programs 1 Short Reviews Probability Spaces and Random Variables Convex Analysis 2 Deterministic
More informationThe Steepest Descent Algorithm for Unconstrained Optimization and a Bisection Line-search Method
The Steepest Descent Algorithm for Unconstrained Optimization and a Bisection Line-search Method Robert M. Freund February, 004 004 Massachusetts Institute of Technology. 1 1 The Algorithm The problem
More information160 CHAPTER 4. VECTOR SPACES
160 CHAPTER 4. VECTOR SPACES 4. Rank and Nullity In this section, we look at relationships between the row space, column space, null space of a matrix and its transpose. We will derive fundamental results
More informationA Log-Robust Optimization Approach to Portfolio Management
A Log-Robust Optimization Approach to Portfolio Management Dr. Aurélie Thiele Lehigh University Joint work with Ban Kawas Research partially supported by the National Science Foundation Grant CMMI-0757983
More informationStochastic control of HVAC systems: a learning-based approach. Damiano Varagnolo
Stochastic control of HVAC systems: a learning-based approach Damiano Varagnolo Something about me 2 Something about me Post-Doc at KTH Post-Doc at U. Padova Visiting Scholar at UC Berkeley Ph.D. Student
More informationIntroduction to General and Generalized Linear Models
Introduction to General and Generalized Linear Models General Linear Models - part I Henrik Madsen Poul Thyregod Informatics and Mathematical Modelling Technical University of Denmark DK-2800 Kgs. Lyngby
More informationMA106 Linear Algebra lecture notes
MA106 Linear Algebra lecture notes Lecturers: Martin Bright and Daan Krammer Warwick, January 2011 Contents 1 Number systems and fields 3 1.1 Axioms for number systems......................... 3 2 Vector
More informationSome stability results of parameter identification in a jump diffusion model
Some stability results of parameter identification in a jump diffusion model D. Düvelmeyer Technische Universität Chemnitz, Fakultät für Mathematik, 09107 Chemnitz, Germany Abstract In this paper we discuss
More informationFixed Point Theorems
Fixed Point Theorems Definition: Let X be a set and let T : X X be a function that maps X into itself. (Such a function is often called an operator, a transformation, or a transform on X, and the notation
More informationSome representability and duality results for convex mixed-integer programs.
Some representability and duality results for convex mixed-integer programs. Santanu S. Dey Joint work with Diego Morán and Juan Pablo Vielma December 17, 2012. Introduction About Motivation Mixed integer
More informationDistributed Estimation via Iterative Projections with Application to Power Network Monitoring
Distributed Estimation via Iterative Projections with Application to Power Network Monitoring Fabio Pasqualetti a, Ruggero Carli b, Francesco Bullo a a Center for Control, Dynamical Systems and Computation,
More informationNOTES ON LINEAR TRANSFORMATIONS
NOTES ON LINEAR TRANSFORMATIONS Definition 1. Let V and W be vector spaces. A function T : V W is a linear transformation from V to W if the following two properties hold. i T v + v = T v + T v for all
More informationThe Equivalence of Linear Programs and Zero-Sum Games
The Equivalence of Linear Programs and Zero-Sum Games Ilan Adler, IEOR Dep, UC Berkeley adler@ieor.berkeley.edu Abstract In 1951, Dantzig showed the equivalence of linear programming problems and two-person
More informationLectures notes on orthogonal matrices (with exercises) 92.222 - Linear Algebra II - Spring 2004 by D. Klain
Lectures notes on orthogonal matrices (with exercises) 92.222 - Linear Algebra II - Spring 2004 by D. Klain 1. Orthogonal matrices and orthonormal sets An n n real-valued matrix A is said to be an orthogonal
More informationSales forecasting # 2
Sales forecasting # 2 Arthur Charpentier arthur.charpentier@univ-rennes1.fr 1 Agenda Qualitative and quantitative methods, a very general introduction Series decomposition Short versus long term forecasting
More informationLecture 5 Least-squares
EE263 Autumn 2007-08 Stephen Boyd Lecture 5 Least-squares least-squares (approximate) solution of overdetermined equations projection and orthogonality principle least-squares estimation BLUE property
More informationOrthogonal Projections and Orthonormal Bases
CS 3, HANDOUT -A, 3 November 04 (adjusted on 7 November 04) Orthogonal Projections and Orthonormal Bases (continuation of Handout 07 of 6 September 04) Definition (Orthogonality, length, unit vectors).
More informationIMPROVED NETWORK PARAMETER ERROR IDENTIFICATION USING MULTIPLE MEASUREMENT SCANS
IMPROVED NETWORK PARAMETER ERROR IDENTIFICATION USING MULTIPLE MEASUREMENT SCANS Liuxi Zhang and Ali Abur Department of Electrical and Computer Engineering Northeastern University Boston, MA, USA lzhang@ece.neu.edu
More information5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1
5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 General Integer Linear Program: (ILP) min c T x Ax b x 0 integer Assumption: A, b integer The integrality condition
More informationOn duality of modular G-Riesz bases and G-Riesz bases in Hilbert C*-modules
Journal of Linear and Topological Algebra Vol. 04, No. 02, 2015, 53-63 On duality of modular G-Riesz bases and G-Riesz bases in Hilbert C*-modules M. Rashidi-Kouchi Young Researchers and Elite Club Kahnooj
More informationIntroduction to Support Vector Machines. Colin Campbell, Bristol University
Introduction to Support Vector Machines Colin Campbell, Bristol University 1 Outline of talk. Part 1. An Introduction to SVMs 1.1. SVMs for binary classification. 1.2. Soft margins and multi-class classification.
More informationα = u v. In other words, Orthogonal Projection
Orthogonal Projection Given any nonzero vector v, it is possible to decompose an arbitrary vector u into a component that points in the direction of v and one that points in a direction orthogonal to v
More informationOptimal shift scheduling with a global service level constraint
Optimal shift scheduling with a global service level constraint Ger Koole & Erik van der Sluis Vrije Universiteit Division of Mathematics and Computer Science De Boelelaan 1081a, 1081 HV Amsterdam The
More informationGenOpt (R) Generic Optimization Program User Manual Version 3.0.0β1
(R) User Manual Environmental Energy Technologies Division Berkeley, CA 94720 http://simulationresearch.lbl.gov Michael Wetter MWetter@lbl.gov February 20, 2009 Notice: This work was supported by the U.S.
More informationNORMAL FORMS, STABILITY AND SPLITTING OF INVARIANT MANIFOLDS II. FINITELY DIFFERENTIABLE HAMILTONIANS ABED BOUNEMOURA
NORMAL FORMS, STABILITY AND SPLITTING OF INVARIANT MANIFOLDS II. FINITELY DIFFERENTIABLE HAMILTONIANS ABED BOUNEMOURA Abstract. This paper is a sequel to Normal forms, stability and splitting of invariant
More informationGLOBAL OPTIMIZATION METHOD FOR SOLVING MATHEMATICAL PROGRAMS WITH LINEAR COMPLEMENTARITY CONSTRAINTS. 1. Introduction
GLOBAL OPTIMIZATION METHOD FOR SOLVING MATHEMATICAL PROGRAMS WITH LINEAR COMPLEMENTARITY CONSTRAINTS N.V. THOAI, Y. YAMAMOTO, AND A. YOSHISE Abstract. We propose a method for finding a global optimal solution
More informationTHE NUMBER OF GRAPHS AND A RANDOM GRAPH WITH A GIVEN DEGREE SEQUENCE. Alexander Barvinok
THE NUMBER OF GRAPHS AND A RANDOM GRAPH WITH A GIVEN DEGREE SEQUENCE Alexer Barvinok Papers are available at http://www.math.lsa.umich.edu/ barvinok/papers.html This is a joint work with J.A. Hartigan
More information9 Multiplication of Vectors: The Scalar or Dot Product
Arkansas Tech University MATH 934: Calculus III Dr. Marcel B Finan 9 Multiplication of Vectors: The Scalar or Dot Product Up to this point we have defined what vectors are and discussed basic notation
More information3. Prime and maximal ideals. 3.1. Definitions and Examples.
COMMUTATIVE ALGEBRA 5 3.1. Definitions and Examples. 3. Prime and maximal ideals Definition. An ideal P in a ring A is called prime if P A and if for every pair x, y of elements in A\P we have xy P. Equivalently,
More informationWhen Promotions Meet Operations: Cross-Selling and Its Effect on Call-Center Performance
When Promotions Meet Operations: Cross-Selling and Its Effect on Call-Center Performance Mor Armony 1 Itay Gurvich 2 Submitted July 28, 2006; Revised August 31, 2007 Abstract We study cross-selling operations
More informationOptimal File Sharing in Distributed Networks
Optimal File Sharing in Distributed Networks Moni Naor Ron M. Roth Abstract The following file distribution problem is considered: Given a network of processors represented by an undirected graph G = (V,
More informationAdvanced Microeconomics
Advanced Microeconomics Ordinal preference theory Harald Wiese University of Leipzig Harald Wiese (University of Leipzig) Advanced Microeconomics 1 / 68 Part A. Basic decision and preference theory 1 Decisions
More informationSimilarity and Diagonalization. Similar Matrices
MATH022 Linear Algebra Brief lecture notes 48 Similarity and Diagonalization Similar Matrices Let A and B be n n matrices. We say that A is similar to B if there is an invertible n n matrix P such that
More informationStochastic Models for Inventory Management at Service Facilities
Stochastic Models for Inventory Management at Service Facilities O. Berman, E. Kim Presented by F. Zoghalchi University of Toronto Rotman School of Management Dec, 2012 Agenda 1 Problem description Deterministic
More informationOptimization in R n Introduction
Optimization in R n Introduction Rudi Pendavingh Eindhoven Technical University Optimization in R n, lecture Rudi Pendavingh (TUE) Optimization in R n Introduction ORN / 4 Some optimization problems designing
More informationv w is orthogonal to both v and w. the three vectors v, w and v w form a right-handed set of vectors.
3. Cross product Definition 3.1. Let v and w be two vectors in R 3. The cross product of v and w, denoted v w, is the vector defined as follows: the length of v w is the area of the parallelogram with
More informationSOLUTIONS TO EXERCISES FOR. MATHEMATICS 205A Part 3. Spaces with special properties
SOLUTIONS TO EXERCISES FOR MATHEMATICS 205A Part 3 Fall 2008 III. Spaces with special properties III.1 : Compact spaces I Problems from Munkres, 26, pp. 170 172 3. Show that a finite union of compact subspaces
More informationTrading regret rate for computational efficiency in online learning with limited feedback
Trading regret rate for computational efficiency in online learning with limited feedback Shai Shalev-Shwartz TTI-C Hebrew University On-line Learning with Limited Feedback Workshop, 2009 June 2009 Shai
More informationRecall the basic property of the transpose (for any A): v A t Aw = v w, v, w R n.
ORTHOGONAL MATRICES Informally, an orthogonal n n matrix is the n-dimensional analogue of the rotation matrices R θ in R 2. When does a linear transformation of R 3 (or R n ) deserve to be called a rotation?
More informationDate: April 12, 2001. Contents
2 Lagrange Multipliers Date: April 12, 2001 Contents 2.1. Introduction to Lagrange Multipliers......... p. 2 2.2. Enhanced Fritz John Optimality Conditions...... p. 12 2.3. Informative Lagrange Multipliers...........
More informationRANDOM INTERVAL HOMEOMORPHISMS. MICHA L MISIUREWICZ Indiana University Purdue University Indianapolis
RANDOM INTERVAL HOMEOMORPHISMS MICHA L MISIUREWICZ Indiana University Purdue University Indianapolis This is a joint work with Lluís Alsedà Motivation: A talk by Yulij Ilyashenko. Two interval maps, applied
More informationA Log-Robust Optimization Approach to Portfolio Management
A Log-Robust Optimization Approach to Portfolio Management Ban Kawas Aurélie Thiele December 2007, revised August 2008, December 2008 Abstract We present a robust optimization approach to portfolio management
More informationSeparation Properties for Locally Convex Cones
Journal of Convex Analysis Volume 9 (2002), No. 1, 301 307 Separation Properties for Locally Convex Cones Walter Roth Department of Mathematics, Universiti Brunei Darussalam, Gadong BE1410, Brunei Darussalam
More informationImpacts of Malicious Data on Real-time Price of Electricity Market Operations
Impacts of Malicious Data on Real-time Price of Electricity Market Operations Liyan Jia, Robert J. Thomas, and Lang Tong School of Electrical and Computer Engineering Cornell University Ithaca, NY 485,
More informationWeighted-Least-Square(WLS) State Estimation
Weighted-Least-Square(WLS) State Estimation Yousu Chen PNNL December 18, 2015 This document is a description of how to formulate the weighted-least squares (WLS) state estimation problem. Most of the formulation
More information6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games
6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games Asu Ozdaglar MIT February 4, 2009 1 Introduction Outline Decisions, utility maximization Strategic form games Best responses
More informationReject Inference in Credit Scoring. Jie-Men Mok
Reject Inference in Credit Scoring Jie-Men Mok BMI paper January 2009 ii Preface In the Master programme of Business Mathematics and Informatics (BMI), it is required to perform research on a business
More informationHow to assess the risk of a large portfolio? How to estimate a large covariance matrix?
Chapter 3 Sparse Portfolio Allocation This chapter touches some practical aspects of portfolio allocation and risk assessment from a large pool of financial assets (e.g. stocks) How to assess the risk
More informationFUNCTIONAL ANALYSIS LECTURE NOTES: QUOTIENT SPACES
FUNCTIONAL ANALYSIS LECTURE NOTES: QUOTIENT SPACES CHRISTOPHER HEIL 1. Cosets and the Quotient Space Any vector space is an abelian group under the operation of vector addition. So, if you are have studied
More informationBANACH AND HILBERT SPACE REVIEW
BANACH AND HILBET SPACE EVIEW CHISTOPHE HEIL These notes will briefly review some basic concepts related to the theory of Banach and Hilbert spaces. We are not trying to give a complete development, but
More informationFuzzy Differential Systems and the New Concept of Stability
Nonlinear Dynamics and Systems Theory, 1(2) (2001) 111 119 Fuzzy Differential Systems and the New Concept of Stability V. Lakshmikantham 1 and S. Leela 2 1 Department of Mathematical Sciences, Florida
More informationNotes on Symmetric Matrices
CPSC 536N: Randomized Algorithms 2011-12 Term 2 Notes on Symmetric Matrices Prof. Nick Harvey University of British Columbia 1 Symmetric Matrices We review some basic results concerning symmetric matrices.
More informationVector and Matrix Norms
Chapter 1 Vector and Matrix Norms 11 Vector Spaces Let F be a field (such as the real numbers, R, or complex numbers, C) with elements called scalars A Vector Space, V, over the field F is a non-empty
More informationMAT 242 Test 3 SOLUTIONS, FORM A
MAT Test SOLUTIONS, FORM A. Let v =, v =, and v =. Note that B = { v, v, v } is an orthogonal set. Also, let W be the subspace spanned by { v, v, v }. A = 8 a. [5 points] Find the orthogonal projection
More informationRecall that two vectors in are perpendicular or orthogonal provided that their dot
Orthogonal Complements and Projections Recall that two vectors in are perpendicular or orthogonal provided that their dot product vanishes That is, if and only if Example 1 The vectors in are orthogonal
More informationWhen Promotions Meet Operations: Cross-Selling and Its Effect on Call-Center Performance
When Promotions Meet Operations: Cross-Selling and Its Effect on Call-Center Performance Mor Armony 1 Itay Gurvich 2 July 27, 2006 Abstract We study cross-selling operations in call centers. The following
More informationSolving polynomial least squares problems via semidefinite programming relaxations
Solving polynomial least squares problems via semidefinite programming relaxations Sunyoung Kim and Masakazu Kojima August 2007, revised in November, 2007 Abstract. A polynomial optimization problem whose
More informationTHe vast expansion of highly capable smart wireless
Proactive Data Download and User Demand Shaping for Data etworks John adrous, Atilla ryilmaz, and Hesham l Gamal Abstract In this work, we propose and study optimal proactive resource allocation and demand
More informationNumerical Methods I Eigenvalue Problems
Numerical Methods I Eigenvalue Problems Aleksandar Donev Courant Institute, NYU 1 donev@courant.nyu.edu 1 Course G63.2010.001 / G22.2420-001, Fall 2010 September 30th, 2010 A. Donev (Courant Institute)
More informationCyclotomic Extensions
Chapter 7 Cyclotomic Extensions A cyclotomic extension Q(ζ n ) of the rationals is formed by adjoining a primitive n th root of unity ζ n. In this chapter, we will find an integral basis and calculate
More informationOptimal Taxation in a Limited Commitment Economy
Optimal Taxation in a Limited Commitment Economy forthcoming in the Review of Economic Studies Yena Park University of Pennsylvania JOB MARKET PAPER Abstract This paper studies optimal Ramsey taxation
More informationA Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL 4, NO 2, JUNE 2009 165 A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre
More informationHETEROGENEOUS AGENTS AND AGGREGATE UNCERTAINTY. Daniel Harenberg daniel.harenberg@gmx.de. University of Mannheim. Econ 714, 28.11.
COMPUTING EQUILIBRIUM WITH HETEROGENEOUS AGENTS AND AGGREGATE UNCERTAINTY (BASED ON KRUEGER AND KUBLER, 2004) Daniel Harenberg daniel.harenberg@gmx.de University of Mannheim Econ 714, 28.11.06 Daniel Harenberg
More informationMetric Spaces. Chapter 7. 7.1. Metrics
Chapter 7 Metric Spaces A metric space is a set X that has a notion of the distance d(x, y) between every pair of points x, y X. The purpose of this chapter is to introduce metric spaces and give some
More informationLecture 11: 0-1 Quadratic Program and Lower Bounds
Lecture : - Quadratic Program and Lower Bounds (3 units) Outline Problem formulations Reformulation: Linearization & continuous relaxation Branch & Bound Method framework Simple bounds, LP bound and semidefinite
More information0.1 Phase Estimation Technique
Phase Estimation In this lecture we will describe Kitaev s phase estimation algorithm, and use it to obtain an alternate derivation of a quantum factoring algorithm We will also use this technique to design
More informationSpatial Statistics Chapter 3 Basics of areal data and areal data modeling
Spatial Statistics Chapter 3 Basics of areal data and areal data modeling Recall areal data also known as lattice data are data Y (s), s D where D is a discrete index set. This usually corresponds to data
More informationNonlinear Regression:
Zurich University of Applied Sciences School of Engineering IDP Institute of Data Analysis and Process Design Nonlinear Regression: A Powerful Tool With Considerable Complexity Half-Day : Improved Inference
More informationThe Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
More informationON SEQUENTIAL CONTINUITY OF COMPOSITION MAPPING. 0. Introduction
ON SEQUENTIAL CONTINUITY OF COMPOSITION MAPPING Abstract. In [1] there was proved a theorem concerning the continuity of the composition mapping, and there was announced a theorem on sequential continuity
More informationSeveral Views of Support Vector Machines
Several Views of Support Vector Machines Ryan M. Rifkin Honda Research Institute USA, Inc. Human Intention Understanding Group 2007 Tikhonov Regularization We are considering algorithms of the form min
More information9 More on differentiation
Tel Aviv University, 2013 Measure and category 75 9 More on differentiation 9a Finite Taylor expansion............... 75 9b Continuous and nowhere differentiable..... 78 9c Differentiable and nowhere monotone......
More information