Professional Documents
Culture Documents
Abstract
For century, there has been no change in
the fundamental structure of the electrical power
grid and vehicle networks. Current hierarchical,
centrally controlled grid of the electrical grid is
not best for growing demand. To address the
challenges of the existing power grid, the new
concept of smart grid and smarter planet are
under research. The smart grid can be considered
as a modern electric power grid infrastructure
for enhanced efficiency and reliability through
automated control, high-power converters,
modern communications infrastructure, sensing
and metering technologies, and modern energy
management
techniques
based
on
the
optimization of ondemand, energy and network
availability. While current power systems are
based on a solid information and communication
infrastructure, the new smart grid needs a
different and much more complex one, as its
dimension is much larger and needs utmost
performance. This paper addresses critical issues
on smart grid technologies primarily in terms of
information and communication technology
(ICT) issues and opportunities. The main
objective of this paper is to provide a
contemporary look at the current state of the art
in smart grid communications as well as to
discuss the still-open research issues in this field.
It is expected that this paper will provide a better
understanding of the technologies, potential
advantages and research challenges of the smart
grid and provoke interest among the research
community to further explore this promising
research area.
Keywords- Advanced metering infrastructure
(AMI), communication technologies, quality-ofservice (QoS), smart grid, standards
I. INTRODUCTION
Modern power grid is the most complex
human-made system, which is monitored by widearea monitoring system (WAMS). Providing timesynchronized data of power system operating
states,WAMS will play a crucial role in next
generation smart grid protection and control. WAMS
helps secure efficient energy transmission as well as
reliable and optimal grid management. As the key
enabler of a smart grid, numerous sensors such as
PMU and current sensors transmit real-time dynamic
data, which is usually protected by encryption
algorithm from malicious attacks, over wide-areaIssn 2250-3005(online)
Page 553
Page 554
Voltage collapse,
Frequency collapse,
Loss of synchronism,
Cascade of overloads.
Electrical networks are also more and more
interconnected in order to improve the robustness of
the electrical power system, to increase the exchange
capacity between the electric power transmission
system over a wider area that crosses state borders
and to ensure mutual assistance among system
operators (specially in case of wide area
disturbance).
Two characteristics are essential for any electrical
power system to maintain its stability and integrity:
November| 2012
Page 555
Irvine SG Demonstration
This project is a demonstration of an
integrated, scalable Smart Grid system. The primary
focus of this project is for distribution applications
and interoperability demonstrations. It may not have
direct impact on WAMPAC as WAMPAC has
more demanding performance requirements.
However, it will serve as a technology reference for
WAMPAC integration.
K. Data Traffic Estimation
It is very difficult to estimate how much
data traffic will be generated when all these
applications are sharing the communication
infrastructure. Field experience is not yet available.
However, the following assumptions can be made
based on preliminary estimations of data traffic
specified for WASAS and CRAS implementation.
Assuming WASAS synchrophasor values are
streamed as Ethernet UDP/IP packets with 60
packets per second and 16 synchrophasor
measurements per packets, the uplink streaming
traffic is around 100kb/s. For CRAS data, assuming
four substations trigger for state change and six
substations mitigate, the uplink traffic is around
1.25Mb/s and the downlink traffic is around 4Mb/s.
WASAS streaming rates are modest compared to
CRAS binary burst traffic rates, and it may
eventually share one of the CRAS redundant pair
uplinks. WASAS stream packets may be delayed by
milliseconds during CRAS GOOSE burst. For future
sharing of downlinks, it is not recommended until
future generation with WASAS closed loop control,
and it introduces the risk of opening CRAS critical
dual redundant control VLANs to other connections
and traffic.
III. INTEGRATED WAMPAC ARCHITECTURE
Despite
differences
among
various
WAM/WAC/WAP systems and capabilities, their
similarities will favor an integrated WAMPAC
system architecture design with the expected
benefits:
1. Wide-range of data sharing: having access to all
measurement data and the system/application
generated output data will increase the data
redundancy level for all functions and applications
and reduce the overall system cost to achieve the
same level of redundancy for each system.
November| 2012
Page 556
Page 557
p
d
(
l
)
V
(
t
,
r
)
i
i
dt
J ij (r, r )S[(V j (t ij (r, r ), r ) h | j )]d r
j 1
I iext (r , t ),
t 0,1 i p,
V
(
t
,
r
)
(
t
,
r
)
t
[
T , 0]
i
i
(1)
R d . The
. The
S ( x) [ S ( 1 ( x1 h1 )),..., S ( p h p ))],
and
the
diagonal
matrix
p p
L0 diag (l1 ,..., l p ). Is the intrinsic dynamics of
the population given by the linear response of data
d
d
li ) is replaced by ( li ) 2 to use
dt
dt
d
the alpha function response. We use ( li ) for
dt
transfer. (
ij (r , r )
(2)
i , i 1,..., p,
represent
the
initial
the p
dimensional vector (1 ,..., p ). The p function
conditions, see below. We note
I ext the p
ext
ext
dimensional vector ( I1 ,..., I p ). The p p
other network areas. We note
that
j , see
hi , i 1,..., p,
below.
The
real
values
propagation
delay
between
C 0 ( , Rp p ).
packet data indicate that is not a
function i.e., ij (r, r ) ij (r, r ), thus
is continuous, that is
Moreover
max i , j (r , r )
i , j ( r , r )
(3)
Hence we choose T m
A. Mathematical Framework
A convenient functional setting for the non-delayed
packet field equations is to use the space
V ,U
the
(r , r ) whose element
is
symmetric
1
S ( z)
1 e z
by
described by a matrix
Vi (r )U i (r )dr
i 1
(1)
supt[
C C 0 ([ m , 0], F )
m ,0]
(t ) F ,
with
Page 558
V (t ) F 2
V0 C ,
(2)
Let us show that the open route of F of center 0
and radius R, BR , is stable under the dynamics of
Where
L1 : C F ,
the
linear
L1 J
continuous
L2 ( 2 , R p p )
operator
satisfying
Proposition 1.0
satisfied.
1.
J L2 (2 , R p p ),
2.
ext
C 0 ( R, F ),
C 0 (2 , Rp p ),sup m .
Then for any C , there exists a unique solution
V C 1 ([0, ), F ) C 0 ([ m , , F ) to (3)
3.
Notice that this result gives existence on R , finitetime explosion is impossible for this delayed
differential equation. Nevertheless, a particular
solution could grow indefinitely, we now prove that
this cannot happen.
B. Boundedness of Solutions
A valid model of neural networks should only
feature bounded packet node potentials.
Theorem 1.0 All the trajectories are ultimately
bounded by the same constant
R if
I max tR I ext (t )
Proof
:Let
us
defined
f : R C R as
1d V
f (t ,Vt ) L0Vt (0) L1S (Vt ) I (t ),V (t )
F
2 dt
def
p . J F I def
lR2 def
R, f (t ,Vt )
0
l
2
ext
V0
If
set
V (T ) BR which contradicts
T R and BR is stable.
Because f<0 on BR , V (0) BR implies
that t 0, V (t ) BR . Finally we consider the
the definition of T. Thus
case
V (0) CBR
Suppose
t 0,V (t ) BR ,
d
2
t 0, V F 2 ,
dt
that
then
thus
V (t )
is
our
assumption.
Thus
T 0 | V (T ) BR .
Proposition 1.1 : Let s and
t be measured simple
X
.
functions on
for E M , define
(E) s d
(1)
is a measure on M .
(s t )d s d td
Then
Issn 2250-3005(online)
and
Thus, if
Suppose
T sup{t | s [0, t ],V (s) BR }.
that T R, then V (T ) is defined and belongs to
f (t ,Vt ) l V (t ) F ( p J
I ) V (t )
(2)
November| 2012
Page 559
( E ) i ( Ai E ) i ( Ai Er )
i 1
i 1
r 1
()( z )
i ( Ai Er ) ( Er )
r 1 i 1
And
r 1
Eij Ai B j ,
Eij
the
( s t )d ( i j ) ( Eij )
and
Eij
sd td i ( Eij ) j ( Eij )
( z )
2 ( )
(3)
(4)
1 ()( )
d d
z
X
( i ),
(5)
r , put
Eij
f ( z ) ( z ) ( ),
disjoint
of
the
sets
Eij (1 i n,1 j m), the first half of our
a(r )
union
(1
r2
(0 r ),
)2
(6)
And define
A( z) a( z )
(7)
exists
polynomial
such
that
z1
and
z2
are
to
the
condition
lim ( ) 0
0
A 1,
(8)
A 0,
(9)
Rs
R2
24
f ( z) P( z) 10,000 ( ) ( z K )
(2)
A 15 ,
(10)
R3
0,
a ' ,
Now define
( z ) f ( z ) Ad d A( z ) f ( )d d
R2
claim that
f ( z2 ) f ( z1 ) Where
subject
(11)
R2
( z ) f ( z )
[ f ( z ) f ( z )] A( )d d (12)
R2
And A( ) 0 if
November| 2012
Page 560
Qj ( , z) g j ( z) ( bj ) g 2j ( z)
()( z ) (A)( z ) f ( )d d
R2
f ( z )(A)( )d d
(13)
R2
( z ) f ( z )
( z G);
(14)
Note that f 0 in G , since f is holomorphic
there. Now if z G, then z is in the interior of
2 f ( z ) a(r )rdr f ( z ) A f ( z )
0
R2
[ f ( z ) f ( z )](A)( )d d
(15)
R2
Define
R ( , z ) Q j ( , z )
1
X
( z )
F ( z)
F ( z)
j 1
Q j ( , z )
g 2j . Hence F H (). By
F ( z ) ( z )
1
| d d
z
2 ( )
| R( , z )
X
( z ) (22)
(23)
And
4, 000 2
d 2, 000 .
F ( z) ( z) 6,000( )
(24)
( z )
F H (), K , and S 2 K is
connected, Runges theorem shows that F can be
uniformly approximated on K by polynomials.
(17)
D j , if
Issn 2250-3005(online)
(21)
Since
(16)
1
4, 000 2
2
z
z
()( )Q j ( , z )d d ,
(20)
Since,
(19)
()( ) R( , z ) d d
( X j , z )
And
Q j ( , z )
(18)
November| 2012
Page 561
(25)
1
i
2 x y
(1)
f ( z)
(f )( )
d d
R2 z
ideal corresponding to
( i )
df
(r , ) f ( z rei ), r 0,
i
If z re , the chain rule gives
(f )( )
real
1 i i
e
(r , )
2 r r
A n | n , some S
Thus, a monomial is in a if and only if it is
(2)
Put
write
a X | A . Conversely, if A , then
(3)
for
X X X
some
and
n
from the fact that X | X . Let
A n satisfy . From the geometry of A , it
is clear that there is a finite set of elements
S 1 ,... s
1 2 i
d dr
2 0 r r
(4)
, with period
1
2
X a and
If
such
that
(The
i ' s
This
X k X1,...X n , then
df
a X | A
DEFINITION 1.0.
X i , i S .
(5)
1 2
dr
( , )d
r
2 0
As 0, ( , ) f ( z ) uniformly.
gives (2)
A n | i 2 , some i S
of
generated by
LT ( f ) | f a
LEMMA 1.2
Let a be a nonzero ideal in
X X X
a , and so A satisfies the
k X 1 ,..., X n ; then ( LT (a)) is a monomial
condition () . Conversely,
ideal, and it equals ( LT ( g1 ),..., LT ( g n )) for
( c X )( d X ) c d X
( finite sums),
A
,
some g1 ,..., g n a .
n
PROOF. Since ( LT (a)) can also be described as
and so if A satisfies () , then the subspace
the ideal generated by the leading monomials (rather
THEOREM
k X 1 ,..., X n is
precisely,
n
k X are exactly the ideals ( X ), n 1 , and the
zero ideal (corresponding to the empty set A ). We
LT (a)
Issn 2250-3005(online)
1.2.
Every
finitely
ideal
generated;
in
more
November| 2012
Page 562
PROOF.
algorithm,
Let
find
f a1g1 ... as gs r,
ai , r k X1 ,..., X n
, where either r 0 or no monomial occurring in it
LT ( g i ) . But
is
divisible
by
any
r f ai g i a
and
therefore
LT (r ) LT (a) ( LT ( g1 ),..., LT ( g s ))
LT ( g i ) . Thus r 0 , and
divisible by one in
g ( g1 ,..., g s ) .
DEFINITION
1.1.
finite
subset
a
bases
for
if
(Gr obner )
( LT ( g1 ),..., LT ( g s )) LT (a) . In other words,
S is a standard basis if the leading term of every
element of a is divisible by at least one of the
leading terms of the
ai leading coefficient of gi
Now
f bi gi X
s ri
gi .
THEOREM 1.3
k[ X 1 ,... X n 1 ][ X n ] k[ X 1 ,... X n ]
is
an
A[ X ]
PROOF.
For a polynomial
f ( X ) a0 X r a1 X r 1 ... ar ,
ai A,
a0 0,
'
'
Issn 2250-3005(online)
a
of
degree
can
be
written
d
f d f d 1
mod( g d ,1 ,...g d ,md ) With f d 1
of degree
repeatedly
find
that
: D D D
be the
D D
and
: D D D
Page 563
function
( (d )) d
f1
f2
of an chain is a Kcollection
of
arrows
i 0 . We sometimes write : X as a
reminder of the arrangement of ' s components
Similarly, a colimit : X is a cocone with
all
or
o id D
The latter condition is called extensionality. These
conditions together imply that and are
inverses--- that is, D is isomorphic to the space of
functions from D to D that can be the interpretations
of functional abstractions:
suppose
we
are
D D D .Let us
working
with
the untyped
the equation
is
some
D D ,
such that
fo
Do D1 D2 .....
fR
Such that
f R o f id X
f o f idY
Where f g means that f approximates g in
R
Issn 2250-3005(online)
f1
f2
Do D1 D2 .....
and
cone
op chain is a K-object X
a collection of K-arrows i : Di | i 0 such
:X
that for all
of an
i 0, i fi o i 1 . An op -limit of
k : X' X
such that for all i 0, i o k i . We write k
(or just ) for the distinguish initial object of K,
when it has one, and A for the unique arrow
from to each K-object A. It is also convenient to
there exists a unique mediating arrow
write D1
f1
f2
Do and f 0 . By analogy, is i | i 1 .
For the images of and under F we write
except
F ( fo )
F ( f1 )
F ( f2 )
F ( ) F ( Do ) F ( D1 )F ( D2 ) .....
and
F ( ) F (i ) | i 0
We write
is,
F ( f ) f , F ( f ) F ( f ), F ( f ) F ( F ( f ))
o
November| 2012
Page 564
! F ( )
F (! F ( ))
F ()
F ()
.........
If both : D and F ( ) : F () F ( D)
are colimits, then (D,d) is an intial F-algebra, where
d : F ( D) D is the mediating arrow from
F ( ) to the cocone
NDk X 1 , X 2 ,.... X k 1
F (! F ( ))
Let
Dk X k 1 , X k 2 ,.... X n
follows
dk
We define the
cyclotomic polynomial.
has degree
k : Q x / ( m ( x)) C ,
1 k m, (k , m) 1,
where
k ( x) mk ,
m being
mth root of
m x. One advantage of
if m is odd, then
will show that this is the only way in which one can
th
Q x / (m ( x)) m ( x)
If m divides n , then
LEMMA 1.5
contained in
Q( m ) is
Q ( n )
PROOF. Since
m , we have m Q( n ), so
November| 2012
Page 565
Q( m , n ) Q( nm )
and
Q( m ) Q( n ) Q
Q( m , n ) is the compositum of
Q( m ) and Q( n ) )
(Recall the
Q( m ) Q( p e1 )Q( p e2 )...Q( p ek )
1
and
Q( n ) Q( p f1 )Q( p f2 )...Q( p fk )
1
Thus
Q( m , n ) Q( p e1 )........Q( p ek )Q( p f1 )...Q( p fk )
1
m n is a primitive
Q(
th
Q(
Q(mn ) : Q (mn);
Q( m , n ) Q( nm ) We know that Q( m , n )
has degree (mn) over Q , so we must have
Q(m , n ) : Q(m ) (n)
and
Q( m ) Q( n ) Q
Q(m , n ) Q(m,n )
And
m, n and m, n denote
where the
Write
ei or fi to be zero)
p1
max( ek , f ) )
k
p1
max( e1, f )
max( ek , f )
1 ........ p
k
1
p1
An
entirely
similar
computation
Q( m ) Q( n ) Q( ( m ,n ) )
Mutual
information
transferred when
measures
the
shows
that
information
is defined as
I ( xi , yi ) log 2
P(
xi
)
yi
bits
P( xi )
(1)
y i is uniquely
xi , and so they
constitute an input output pair ( xi , yi ) for which
1
x
P( i ) 1 and I ( xi , y j ) log 2
bits;
yj
P( xi )
connected to the corresponding
Q( m ) Q( n ) Q( ( m,n ) );
here
Q(m ,n );
P(
completely
xi
yj
xi In a
uncorrelated,
and
so
yj
I ( X , Y ) P( xi , y j ) I ( xi , y j ) P( xi , y j ) log 2
i. j
i. j
P( xi )
Issn 2250-3005(online)
November| 2012
Page 566
P( xi , y j ) P(
xi
P( y j ) P(
yj
P( xi ) P(
i
xi
) P( y j ) P(
yj
xi
yj
yj
xi
) P( xi )
) P( xi )
) P( y j )
Then
I ( X , Y ) P ( xi , y j )
I ( X ,Y ) H ( X ) H ( X )
Y
i. j
1
P ( xi , y j ) log 2
i. j
P ( xi )
P ( xi , y j ) log 2
x
i. j
P( i )
yj
1
P ( xi , y j ) log 2
i. j
P ( xi )
1
x
P ( i ) P ( y j ) log 2
y
j
P ( xi )
i
1
i P( xi ) log 2 P( x ) H ( X )
i
I ( X , Y ) P( xi , y j )
P
(
x
)
P
( xi ) P ( y j )
i, j
i, j
i
Then
i, j
H ( X ) i , j P( xi , y j ) log 2
Y
P log
i 1
P(
1
xi
xi
yj
y j provides H ( X ) H ( X ) bits of
Y
yj
) P( y j ) P(
yj
xi
Where
Issn 2250-3005(online)
Qi
)0
Pi
1
P( y j )
Qi ,
Q 1 . It can be concluded
i
that the average mutual information is a nonnegative number. It can also be equal to zero, when
the input and the output are independent of each
other. A related entropy called the joint entropy is
defined as
H ( X , Y ) P ( xi , y j ) log 2
i, j
P ( xi , y j ) log 2
P ( xi , y j ) log 2
i, j
i, j
I ( X , Y ) I (Y , X )
I ( X , Y ) H (Y ) H (Y
) P( xi )
H (Y ) P ( y j ) log 2
factor
P(
P( xi , y j )
P( xi ) P( y j )
I ( X ,Y ) H ( X ) H ( X )
Y
Where
yj, H (X / yj )
1
P ( xi , y j )
P ( xi ) P ( y j )
P ( xi , y j )
1
P ( xi ) P ( y j )
probabilities
November| 2012
Page 567
P( y3 x ) 1 p and P( y2 x ) 0,
2
Let
and P( y3 x ) 0
B j 1 B j . ( If t 0, take B ). Then
and P( y1 x ) p
P ( X , Y ) A
Fn and whose
p( y | x)
A ( x, y) : log
a
(1)
p( y )
ue P( X , Y ) A P X F
a
P ( X , Y ) A ... p( x, y )dxdy,
A
p ( x, y ) p ( x ) p ( y | x )
and
P X F ... p ( x)dx
F
x F such that
P Y Ax1 | X x (1) 1
(1)
p ( x)
x
B1 to be Ax . Having
(1)
x k F such that
k 1
P Y Ax( k ) Bi | X x( k ) 1 ;
i 1
k 1
i 1
tea P( X , Y ) A P X F
proceed as follows.
Issn 2250-3005(online)
p( y | x)dy dx
yB Ax
p( y | x)dy dx p( x)
x
C. Algorithms
Ideals. Let A be a ring. Recall that an ideal a in A
is a subset such that a is subgroup of A regarded as a
group under addition;
a a, r A ra A
We
r s
i i
with
and
be
a b | a a, b b
ideals
in
A.
The
set
is an ideal, denoted by
bi b , and if
b (b1 ,..., bn )
and
where Ax y : ( x, y ) A;
Set Bk Ax( k )
p( x, y )dx dy
y Ax
Where
chosen
p ( x)
Let
Proof: A sequence
( x , y ) A
and P( y3 x ) 1 p
2
then
Page 568
b b | (a, b) c some a a
q, r k X such that
f qg r with either r 0 or deg r < deg g .
unique
polynomials
homomorphism of A -algebra B C is a
homomorphism of rings : B C such that
for all a A . An
A -algebra
A X1 ,..., X n B
X i to
xi is surjective.
A ring
homomorphism A B is finite, and B is finitely
generated as an A-module. Let k be a field, and let
A be a k -algebra. If 1 0 in A , then the map
k A is injective, we can identify k with its
image, i.e., we can regard k as a subring of A . If
1=0 in a ring R, the R is the zero ring, i.e., R 0 .
Polynomial rings. Let k be a field. A monomial
in X 1 ,..., X n is an expression of the form
sending
ai . We sometimes abbreviate it by
polynomial ring
a1 ....an
a1
1
X ...X ,
ca1....an k ,
aj
(b1 ,...bn )
be two elements of
; then
XY 2 Y 3 Z 4 ; X 3Y 2 Z 4 X 3Y 2 Z . Note that
this isnt quite how the dictionary would order them:
it would put XXXYYZZZZ after XXXYYZ .
Graded reverse lexicographic order (grevlex). Here
monomials are ordered by total degree, with ties
broken by reverse lexicographic ordering. Thus,
if ai bi , or ai bi and in
the right most nonzero entry is negative. For
example:
the monomials in
an element f of
k X1 ,... X n in a canonical
f 4 XY 2 Z 4Z 2 5 X 3 7 X 2 Z 2
as
f 5 X 3 7 X 2 Z 2 4 XY 2 Z 4Z 2 (lex)
or
f 4 XY 2 Z 7 X 2 Z 2 5 X 3 4Z 2 ( grevlex)
Let
a X k X ,..., X
1
, in decreasing
order:
f a0 X 0 1 X 1 ...,
0 1 ..., 0 0
Then we define.
The multidegree of f to be multdeg( f )=
November| 2012
Page 569
0 ;
a subset of
f to be LM( f ) =
a0 X 0
f 4 XY Z ..., the
For the polynomial
multidegree is (1,2,1), the leading coefficient is 4,
2
f a1 g1 ... as g s r1
so on, until
With
with
for
f a1 g1 ... as g s LT (r1 ) r3
:
(different
Y 2 X 3 but not
c X a X a
| A
k X1,..., X n
X a
and
X k X1 ,..., X n
(n)
(C ,..., C
(n)
1
The
( n)
n
joint
distribution
of
P[C ( n ) c]
n
n 1 c 1
1
N (n, c) 1 jc j n ( ) j
,
n!
j 1
j 1 j c j !
for c .
n
Lemma1.7
For
nonnegative
integers
m1,..., mn ,
n 1 m j
n
[m ]
E (C (j n ) ) j
j 1
j 1 j
1 jm j n
j 1
(1.4)
Proof.
This can be established directly by
exploiting
cancellation
of
the
form
[mj ]
cj
via
the
correspondence
n
n
[m ]
[m ]
E (C (j n ) ) j P[C ( n ) c] (c j ) j
j 1
j 1
c
n
n (c j ) j
1 jc j n c j
all with c 0 .
[m ]
A, n
()
a is the k -subspace of k X1 ,..., X n
j 1
condition
And
d j c j m j , we have
Y or X .
let
a of k X1 ,..., X n generated by
is a monomial ideal.
X ;
n
n
1
1
1
jd j n m d j
m j
j d j 1
j 1 j (d j )!
n m 0, then
Page 570
(1.1)
Snm
must
have
some
cycle
structure
follow
immediately as
(1.2)
[m ]
E (C (j n ) ) j E Z j j 1 jm j n ,
j 1
j 1
j 1
(1.3)
Proof.
length
with
the
[ n / j ] k
(1)l
l 0
j l
l!
(1.1)
that is,
Sr (n rj )!1(rj n)
1 nk
1
(1)l ,
(1.2)
k ! l 0
l!
(n)
and the moments of C1 follow from (1.2) with
j 1. In particular, for n 2, the mean and
(n)
variance of C1 are both equal to 1. The joint
(n)
(n)
1 b n
1 j n,
j k
k!
P[C1( n ) k ]
k l
Sk l ,
l
(1)
l0
E(C(j n) )[ r ] j r 1 jr n
counts
li
b
b 1 ci 1
1 1
l1 ... lb
(1)
i 1 i li !
i 1 i ci ! l il0 with
i n m
The
joint
(n)
1
moments
(n)
b
C ,..., C
of
the
first
b counts
P[C (j n ) k ]
j k 1/ j
e , k 0,1, 2,...,
k!
mean
. That is, as
n ,
(C , C ,...) d ( Z1 , Z 2 ,...)
(n)
1
(n)
2
(1.1)
n[ rj ] 1
1
1(rj n) r
r
j r ! n!
j r!
Issn 2250-3005(online)
November| 2012
Page 571
(1.3)
Where
Z j , j 1, 2,...,
the
Poisson-distributed
are
random
independent
variables
with
1
E (Z j )
j
Proof. To establish the converges in distribution one
shows that for each fixed b 1, as n ,
P[T0 n ( Z ' ) n]
k 0,1,..., n,
exp [log(1 i 1 d ) i 1 d ]
n
i 1
1 O(n
'1,2,7 (n))
(1.2)
and
P[T0 n ( Z ' ) n]
Error rates
The proof of Theorem says nothing about the rate of
convergence. Elementary analysis can be used to
estimate this rate when b 1 . Using properties of
alternating series with decreasing terms, for
exp [log(1 i 1 d ) i 1 d ]
n
i 1
1 O(n
Where
1,2,7 (n))
'1,2,7 (n)
(1.3)
It
thus
follows
that
Z' .
(n)
(1 d )
P[ An (C )] Kn
for a constant K ,
from
1
1
1
(
) P[C1( n ) k ] P[ Z1 k ]
k ! (n k 1)! (n k 2)!
1
k !(n k 1)!
depending on
and the ri
'
and computable
It follows that
n
2n 1
n
2n 1 1
P[C1( n ) k ] P[ Z1 k ]
(n 1)! n 2 k 0
( n 1)!
e 1
1
1
1
(1
...)
,
(n 1)!
n 2 (n 2)(n 3)
(n 1)!
Since
P[ Z1 n]
(1.11)
(n)
and the
distribution L ( Z1 ) of Z1
approximation is of order
0 b n / 8 and n n0 , with n0
dTV ( L(C[1, b]), L( Z [1, b]))
For
An (C ( n) ) under
An (C ( n ) )
1i n
ri' 1 j ri
and
as
0 ,
( n)
ij
n 1 if g ' 1.
under Conditions
i , for
Relation,
P[T0 m ( Z ' ) n]
P[ An (C )]
P[T0 m ( Z ) n]
'
(n)
1i n
ri' 1 j ri
1 (1 Ei 0 )
iri
(1.1)
r A
P[Tbn ( Z ) n r ]
1
P[T0 n ( Z ) n]
November| 2012
(1.4)
from now on, we thus
Page 572
P[Tbn n r ]
P[T0b r ] 1
P[T0 n n]
r 0
[ n /2]
P[T0b r ]
P[T0b r ]
r n /2
r 0 P[T0 b n ]
n1 . This
makes it possible to replace condition ( A1 ) by the
weaker pair of conditions ( A0 ) and ( D1 ) in the
P[T
r n / 2
0b
r 0
P[Tbn n s] P[Tbn n r ]
s 0
P[T0 n n]
[ n /2]
P[T0b r ]
s 0
r ] P[T0b r ]
P[T0b s]
s [ n /2]1
210.5(1) (n / 2, b)
n
factor
P [0,1]
10.10 (n),
The
order O(n
3n
,
P [0,1]
[ n /2]
[ n /2]
3n
1
4n210.8 (n) P[T0b r ] P[T0b s] r s
P [0,1]
2
r 0
s 0
P[Tbn( m ) s ] P[Tbn( m ) s 1] .
order
[ n / 2]
[ n /2]
i1
1 a
610.8 (n)
7,7 (n, b) 2n ET0b ( Z ) 1
P
P [0,1]
6
(n / 2, b)
(1.5)
P [0,1] 10.5(1)
1
1 a1
) for differences
of the form P[Tbn s ] P[Tbn s 1], finally
leading to a contribution of order
in
bn a1 for any
by
form
( B11 ), if S () . If not,
10.8
replaced by 10.11
can be
l 2
l il O(i a1 ) to
November| 2012
Page 573
12
Where
])
for any
s [ n /2]1
r 0
( s r )(1 )
P[T0b s]
n 1
s 0
r]
0b
s [ n /2]
P[T0b s ]
(s r ) 1
n 1
(1.3)
4 1 n 2 ET02b
(1.4)
n /2 s n
P [0,1]
P[T
7.8 (n, b)
P[T0b n / 2]
3 10.5(2) (n / 2, b)
[ n /2]
r 0
8n 2 ET02b
0b
P[T0b s]
P[T0b r ]
n 1
r [ n /2]
s 0
1
n 1 ( ET0b P[T0b n / 2] E (T0b1T0b n / 2))
P[Tbn n r ]
P[T0b r ] 1
P[T0 n n]
r 0
r 0
P[T
P[T
[ n /2]
(s r )(1 )
r ] P[T0b s]
n 1
s 0
[ n /2]
1 n E (T0b1T0b n / 2) 2 1 n 2 ET02b ,
(1.1)
We have
P[T0b r ]
[ n / 2]
P[T0n n]
24 1 10.8 (n)
2n ET 4 3 1
P [0,1]
r 0
2
0b
[ n / 2]
[ n / 2]
( s r )(1 )
P[T0b s ]
P[T0 n n] )
n 1
s 0
provided
1
P[T0b s ] s r
P[T0b r ]
2
n P[T0 n n] r 0
s 0
nP [0,1]
K 4
0
4 1 n 2 ET02b K 0 410.8 ( n)
3
(
)
nP [0,1]
(1.2)
Issn 2250-3005(online)
10.8
S () ; this supplementary
by 10.11 (n)
( n)
P[T
r 0
0b
1
1 E T0b ET0b
2
November| 2012
Page 574
(1.5)
Example
1.0.
Consider
the
point
respective
coordinates
of
the
vector
n: n=
{points},
= {vectors}
Operations with vectors: multiplication by a
number, addition. Operations with points and
vectors: adding a vector to a point (giving a point),
n
n as an Euclidean space n as an
n
affine space as a manifold.Going to the left
directions:
Remark 1.0.
Euclidean geometry.
In
considered as an affine space we can already do a
good deal of geometry. For example, we can
consider lines and planes, and quadric surfaces like
an ellipsoid. However, we cannot discuss such
things as lengths, angles or areas and
volumes. To be able to do so, we have to introduce
n
a (a ,..., a ) to be
1
a : (a1 )2 ... (a n )2
d ( A, B) : AB
(2)
(3)
cos :
( a, b)
a b
(4)
(a, b)2 a b
2
(5)
Example 1.1.
dxi (the
i
differential of x ) applied to an arbitrary vector h
i
is simply h .From these examples follows that we
can rewrite df as
f
f
df 1 dx1 ... n dx n ,
(1)
x
x
(the i-th coordinate). The linear function
(1)
November| 2012
Page 575
df ( x)(h) hf ( x )
...
f n
h ,
x n
f 1
h
x1
curve
other
hand,
we
have
(t )
such that
(t ) 0 when
df ( x(t )) f 1
f
1 x ... n x n
dt
x
x
(2)
df at a point x0 on a
as the velocity
f ( x(t )) at t t0 .
Theorem 1.8.
(2)
Theorem 1.7.
For functions
U ,
d ( f g ) df dg
d ( fg ) df .g f .dg
f , g :U ,
(1)
(2)
d ( f g )( x0 )( )
at t t0 and
d ( fg )( x0 )( )
d
( f ( x(t )) g ( x(t )))
dt
d
( f ( x(t )) g ( x(t )))
dt
F : U m at a point x
n
will be a linear function taking vectors in to
m
vectors in (instead of ) . For an arbitrary
n
vector h | ,
differential of a map
F ( x h) F ( x) dF ( x)(h)
+ (h)
h
(3)
Where (h) 0 when
h 0 . We have
1
m
dF (dF ,..., dF ) and
F
F
dF 1 dx1 ... n dx n
x
x
1
1
F
F
1 .... n dx1
x
x
November| 2012
Page 576
(2)
Where (t ) 0 when
definition of the differential,
t 0 . By the
F ( x h) F ( x) dF ( x)(h) (h) h
Where
(h) 0
when
(3)
h 0 . we obtain
F 1
F
dx ... n dx n
1
x
x
G 1
G
dG 1 dy ... n dy n ,
y
y
dF
(2)
F ( x) dF ( x)( x(t )t (t )t )
.
(1)
( x(t )t (t )t ). x(t )t (t )t
F ( x) dF ( x)( x(t )t (t )t
(t ) 0
For some
t 0 . This
when
.
Proof.
G1 G1
1 .... m
y
y
p
p
G ... G
y1 y m
F 1 F 1
1 .... n
x
x
... ... ...
m
m
F ... F
n
x1
x
dx1
...
dx n
(4)
z
z
z p
... n
... m
1
1
x x y y
y1 y1
1 .... n
x
x
...
...
...
m
m
y ... y
1
x n
x
(5)
Or
velocity vector
dF of
under
the
vector
x (t ) .
Hence
for an arbitrary
vector
(6)
map
x .
Corollary 1.0.
1
m
z
z y i
x a i 1 y i x a
If we denote coordinates in
m
by
U n.
n , denoted for
as a basis we take
x er r e
F : ( y ..., y ) x x( y ..., y )
1
(1)
x(t ) : r r (t ), (t )
2 specified
(1)
t (r (t ), (t )),(r, ) x(r, ) .
the maps
Then, by the chain rule, we have
dx x dr x d x x
x
r
dt r dt dt r
.
, x
Consider
the
vectors
. Explicitly we have
x
(cos ,sin )
r
x
( r sin , r cos )
(3)
, x
are, respectively,
the velocity vectors for the curves r x(r , )
( 0 fixed )
and
r
x(r , ) (r r0 fixed )
Issn 2250-3005(online)
(5)
ei x
x i
(originally, a
dF ( x0 ) :
dx(t )
dF ( x(t ))
(t0 )
(t0 )
dt
dt
(1)
to vectors attached to
F 1
F
dx ... n dx n
1
x
x
1
F F 1
1 ... n dx1
x
x
(2)
(4)
, e : x
(2)
Here
x e1 x e2 y
xi x( x1 ,..., x n )
er : x
F 1 : U V is also smooth
(3)
. We can conclude
f
f
dx1 ... n dx n ,
(3)
1
x
x
i
Where x are arbitrary coordinates. The form of the
df
2 given in
Page 578
j be
an integer. If
primitive p
are
th
, ,...,
2
p 1
. Therefore
A , we get
A r sin (cos dr r sin d )
r cos (sin dr r cos d )
TrK / ( j ) 2 ... p1 p ( ) 1 1
r 2 (sin 2 cos 2 )d r 2 d
If p does divide
Substituting into
( ) 1 1 ... n n ,
If
ei i , where ei x
i
j
(2)
parametrization of
remains the same.
Proof:
p 1
) p
at
( x )( x 2 )...( x p 1 );
Plugging in x 1 shows that
p (1 )(1 2 )...(1 p 1 )
Since the (1 ) are the conjugates of (1 ),
j
and path
LEMMA 1.9
(1 )OK p
Proof.
( x(t )),
Consider
dx
( x(t (t ' ))), '
dt
TrK / (1
x p 1 x p 2 ... 1 p ( x)
x
dxi (e j ) dxi j
x
x
every point .
TrK / ( j ) p 1 By
(1)
x i
dx
dt '
and
As
dx dt
dx
'
= ( x(t (t ))), ' . ' ,
'
dt
dt dt
(1 )
in
OK ,
so
the
inclusion
(1 )OK p is immediate.
now
Suppose
that
1.1
For
any
OK ,
TrK / ((1 ) ) p.
PROOF.
We have
November| 2012
Page 579
clear
from the
definition
of
an
ideal
that
Since
factorization of a OK in O K . write it as
let K | ( p ) be the p
th
OK [ p ] [ x] / ( p ( x));
1, p ,...,
PROOF.
p 2
p
Let
Thus
OK
With ai .
Then
(1 ) a0 (1 ) a1 ( 2 ) ...
a p 2 (
p 2
p 1
implies
that
and write
a0 a1 ... a p2 p2
this
( a0 ) 1 a1 a2 ... a p2 p3 ; This is
pOK , p OK p,
this
map
OK
is
also
/ OK , p
p ) is the image of 1
in OK / p , which makes sense since is invertible
(with
and
particular, it is now abundantly clear that every nonzero prime ideal of OK , p is maximal.
To
p 1
( p)
( p)
( p)
. The usefulness of
m 1 m 1
November| 2012
Page 580
N K' / ( OK ) N K / ( )
PROOF. We assume a bit more Galois theory than
usual for this proof. Assume first that K / is
be an element of Gal ( K / ). It is
(OK ) / ( ) OK / ;
clear
that
since
(OK ) OK ,
this
shows
that
Galois. Let
Page 581
Page 582
[7]
[8]
[9]
[10]
[11]
[12]
[13]
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
Issn 2250-3005(online)
[14]
[15]
[16]
[17]
November| 2012
Page 583
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[31]
Issn 2250-3005(online)
[32]
[33]
[34]
[35]
[36]
[37]
November| 2012
Page 584