a logarithmic barrier approach and its...

135
A logarithmic barrier approach and its regularization applied to convex semi-infinite programming problems Dissertation zur Erlangung des akademischen Grades eines Doktors der Naturwissenschaften dem Fachbereich IV der Universit¨ at Trier vorgelegt von Lars Abbe 1 Trier 2001 1 gef¨ ordert durch die Deutsche Forschungsgemeinschaft im Rahmen des Graduiertenkollegs “Mathemati- sche Optimierung” an der Universit¨ at Trier

Upload: others

Post on 29-May-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

A logarithmic barrier approach and its regularization

applied to

convex semi-infinite programming problems

Dissertation

zur Erlangung des akademischen Gradeseines Doktors der Naturwissenschaften

dem Fachbereich IV der Universitat Triervorgelegt von

Lars Abbe1

Trier 2001

1gefordert durch die Deutsche Forschungsgemeinschaft im Rahmen des Graduiertenkollegs “Mathemati-sche Optimierung” an der Universitat Trier

Page 2: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

1.Gutachter: Prof. Dr. Rainer Tichatschke, Universitat Trier

2.Gutachter: Prof. Dr. Florian Jarre, Universitat Dusseldorf

Tag der mundlichen Prufung: 23.03.2001

Page 3: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

Danksagung

An dieser Stelle bedanke ich mich bei allen, die zum Gelingen dieser Arbeit beigetragen haben.

Insbesondere bedanke ich mich bei meinem Doktorvater Prof. Dr. Rainer Tichatschke fur die Be-

treuung dieser Arbeit und seine wertvollen Hinweise und Diskussionen wahrend ihrer Entstehung.

Herrn Prof. Dr. Florian Jarre danke ich fur die Ubernahme des Korreferats und das der Arbeit ent-

gegengebrachte Interesse.

Außerdem bedanke ich mich bei der Deutschen Forschungsgemeinschaft und den Tragern des Gra-

duiertenkollegs “Mathematische Optimierung”, die mir die Gelegenheit zur Promotion gegeben

haben.

Zudem danke ich meinen Kollegen M. Fahl, C. Schwarz und T. Voetmann fur viele hilfreiche Diskus-

sionen, das sorgfaltige Korrekturlesen des Manuskripts und so manch heitere Stunde abseits der

taglichen Arbeit.

Schließlich danke ich meiner Familie und insbesondere meinen Eltern fur die moralische und fi-

nanzielle Unterstutzung wahrend meines gesamten Studiums.

Page 4: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite
Page 5: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

Contents

1 Introduction 3

1.1 Review of literature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

1.2 Outline of the thesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

2 The logarithmic barrier approach for convex optimization problems 9

2.1 Finite problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

2.2 Transfer to semi-infinite problems . . . . . . . . . . . . . . . . . . . . . . . . . .15

2.3 A conceptual algorithm for semi-infinite problems . . . . . . . . . . . . . . . . . .17

3 A bundle method usingε-subgradients 19

4 A logarithmic barrier method for convex semi-infinite optimization problems 25

4.1 An implementable algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25

4.2 Convergence analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30

4.3 Extension to general convex problems . . . . . . . . . . . . . . . . . . . . . . . .36

5 Regularization of the logarithmic barrier approach 39

5.1 A regularized logarithmic barrier method for convex semi-infinite problems . . . .39

5.2 Convergence analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43

5.3 Rate of convergence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .53

5.4 Linear convergence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59

5.5 Extension to general convex problems . . . . . . . . . . . . . . . . . . . . . . . .63

6 Numerical analysis 65

6.1 Numerical aspects of the inner loops . . . . . . . . . . . . . . . . . . . . . . . . .65

6.2 Feasible starting points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69

7 Application to model examples 71

7.1 The unregularized case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71

7.2 The regularized case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78

8 An application to the financial market 87

8.1 The mathematical model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .87

1

Page 6: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

2 Contents

8.2 Numerical results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88

9 Perfect reconstruction filter bank design 939.1 The mathematical model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .93

9.2 Numerical results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .99

A Numerical results 105

Bibliography 125

Page 7: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

Chapter 1

Introduction

In this thesis we consider semi-infinite programming problems of the following general form:

minimize f(x)

s.t. x ∈ Rn, Ax = b, A ∈ Rm×n, b ∈ Rm,

gi(x, t) ≤ 0 for all t ∈ T i (i = 1, . . . , l),

(1.1)

wheref is convex, eachgi is convex inx as well as continuous int and eachT i is a nonempty

compact set. Thus we deal with finitely many variables and infinitely many constraints. Such

problems occur in various fields, for instance we point at the following applications:

• Least-cost strategies for air pollution abatementstudied, e.g. by Gorr et al. [13] and Kortanek,

Gorr [29];

• Robot trajectory planningstudied, e.g. by Hettich, Still [18] and Haaren-Retagne [15];

• Engineering design problems likeSeismic resistant design of structures, electronic circuit

designand thedesign of SISO/MIMO control systemsstudied by Polak [37];

• Digital filter designstudied, e.g. by Potchinkov [40, 41] and Kortanek, Moulin [30];

• Applications in finance studied, e.g. by Tichatschke et al. [56].

Besides many problems (including some of that given above) arise in the field of Chebyshev-

approximations or optimal control problems. While Chebyshev-approximation problems are often

linear semi-infinite programming problems (cf., e.g., Hettich, Zencke [19]), the discretized optimal

control problems are mostly of a more difficult structure due to the involved differential equations

(cf., e.g., Sachs [49]). For details and more applications we refer also to the collection papers [8]

and [44] as well as to the extensive survey by Hettich, Kortanek [17].

1.1 Review of literature

As consequence of the variety of applications particular methods for solving semi-infinite problems

were developed. A survey is given by Hettich, Kortanek [17] again. Thereby it turns out that the

3

Page 8: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

4 1 Introduction

numerical methods typically generate sequences of finite optimization problems and, following Het-

tich, Kortanek [17], we can classify them into three types:exchange methods, discretization methods

andmethods based on local reduction. Nevertheless, particularly caused by the infinite number of

constraints each of these methods has critical points for a practical realization. So, the exchange

methods require the solution of a global optimization problem in each step, the discretization meth-

ods typically lead to finite problems with a very large amount of constraints and the local reduction

methods are based on the necessary optimality conditions and use a further knowledge of the local

behaviour of the constraints. Each of these methods may cause a (very) high computational effort

so that no standard method for solving semi-infinite problems is currently available.

Regardless the work in the field of semi-infinite programming theinterior-point approachfor

solving finite (convex) problems was developed during the last decades. This research was first

initiated by proposing thelogarithmic barrier methodby Frisch [11] in 1955. The fundamental

results of the intensive study during the following years were summarized by the monograph of

Fiacco, McCormick [9], published in 1968. A qualitatively new stage in the development of interior

point methods has been started with the paper of Gill et al. [12], where the relationship between

Karmarkar’s method and the logarithmic barrier methods for linear programs was shown. This fact

brought to the light the polynomial complexity of logarithmic barrier methods for some classes of

problems so that competitive interior-point methods for solving finite convex, especially linear and

quadratic, problems could be developed. A survey of such methods for (mostly) linear problems is

given by Andersen et al. [1].

Motivated by these powerful methods for finite problems including large-scale problems it was

natural to try to transfer ideas from interior point methods to the field of semi-infinite programming

problems. So the first algorithm in this context was an extension of an affine-scaling algorithm to

linear semi-infinite problems suggested by Ferris, Philpott [6, 7]. But it is not easily possible to

extend each interior-point approach to semi-infinite problems. For instance Powell [42] showed that

the application of Karmarkar’s algorithm to linear semi-infinite problems does not have to work.

Additionally, a survey of interior-point approaches which can naturally be extended to semi-infinite

problems is given by Todd [57] and Tuncel, Todd [58]. A further approach originates from the

method of analytic centerswhich was introduced by Sonnevend [53] and extensively studied by

Jarre [22] for finite convex problems. In order to tackle the semi-infinite problem of the form (1.1)

directly, Sonnevend [54, 55] and Schattler [50, 51] extended this approach to convex semi-infinite

problems by introducing an integral form of the logarithmic barrier. But, unfortunately the barrier

property may be lost due to the smoothing effect of the integral (cf., e.g, Tuncel, Todd [58] and Jarre

[23]).

Usually boundedness (or in fact compactness) of the feasible set or at least of the solution set of

the given problems is assumed in all interior point approaches for semi-infinite problems mentioned

above. Dropping this restrictive assumption Kaplan, Tichatschke [26] suggested a combination of

the logarithmic barrier method with a discretization procedure for the constraint set and theproximal

point methodwhich was introduced by Martinet [32, 33]. Furthermore, due to the regularization, the

approach of Kaplan, Tichatschke allows to treat ill-posed semi-infinite problems with ill-posedness

in the sense of Hadamard. Especially the case where the finite auxiliary problems are not solvable is

Page 9: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

1.2 Outline of the thesis 5

of interest in that field. A further advantage of the method proposed by Kaplan, Tichatschke is given

by the fact that convergence of the iterates can be established. This is not clear in each case if one

applies the pure interior-point methods for convex problems excepting linear and quadratic ones.

All methods stated above are based on the smooth problem formulation (1.1) and make use of

differentiability properties of the involved functions. In contrast to this, Polak [37] suggested a

nondifferentiable reformulation of semi-infinite problems by means of using themax-function in the

description of the constraints. This leads in fact to optimization problems with finitely many but

nondifferentiable constraints which cause some difficulties. Nevertheless this reformulation will be

the basis of the thesis which is outlined in the sequel.

1.2 Outline of the thesis

In Chapter 2 we start with a review of the classical logarithmic barrier method for convex problems

since we intend to apply this method to convex semi-infinite programming problems. In particular

the method is briefly stated and two basic convergence results are given.

Then several approaches transferring the logarithmic barrier method to semi-infinite program-

ming problems, given in the smooth formulation (1.1), are discussed in detail. Thereby it turns out

that certain difficulties from the theoretical and/or numerical point of view occur in each of these

approaches.

In order to avoid these difficulties we apply the logarithmic barrier method directly to the nondif-

ferentiable reformulation of the semi-infinite problems. Consequently, we consider barrier problems

with nondifferentiable objective functions so that a method for minimizing nondifferentiable convex

functions under convex constraints is required. Such methods often use subgradient information,

more exact they often assume the existence of bounded subgradients or even subdifferentials on the

feasible set. Due to the logarithmic part in the objective function of the barrier problems such a

property does not hold in our case so that we enforce it by doing the following: The logarithmic bar-

rier function is minimized on successively determined nonempty compact sets which are located in

the relative interior of the feasible set. Introducing this procedure a conceptual algorithm for solving

convex semi-infinite problems is finally presented.

In Chapter 3 the minimization of a convex nondifferentiable function on a nonempty convex

compact set is in the focus of interest. Based on the assumption that the input data like objective

function and subgradient information are exactly available, several known published methods can

be used, one of which is the proximal level bundle method of Kiwiel [28]. Problematic in our case

is that the objective function at hand contains a term whose evaluation requires the exact solution

of a global maximization problem. In order to avoid this we extend Kiwiel’s bundle method to the

situation of inexact given input data. In doing so an inexact determination of the global maximum is

permitted.

In Chapter 4 our conceptual algorithm is first described in detail for one semi-infinite constraint.

This also includes the required specification of the assumptions. One essential assumption is the

compactness of the solution set of the given problem. As stated above such an assumption (or the

stronger condition that the feasible set is compact) is quite usual in the field of interior point methods.

Page 10: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

6 1 Introduction

Thus, after showing that the extended bundle method can be in fact applied, a convergence

analysis based on the results of Fiacco, McCormick [9] is presented. Since these results only ensure

the convergence of the iterates to the solution set in general, it is not surprising that we cannot prove

convergence to one certain point of this set if the given problem is not uniquely solvable. But in

each case convergence to the solution set can be established.

Finally, the straight-forward extension of the implementable algorithm to convex problems with

finitely many semi-infinite constraints is presented. Thus, without specifying detailed assumptions

at this point, we are able to solve convex problems of the form (1.1) if they possess a nonempty

compact set of optimal solutions.

In Chapter 5 we drop this restrictive condition on the solution set. Then, following the ideas

of Kaplan, Tichatschke [24–27], our method developed in Chapter 4 is coupled with the proximal

point regularization technique. This procedure leads to auxiliary problems with strongly convex ob-

jective functions so that these problems are uniquely solvable and the method suggested in Chapter

4 is applicable to them. Based on this fact a combined algorithm is stated in detail. Therein we

additionally make use of the multi-step technique introduced by Kaplan, Tichatschke [24] which

allows to do more steps of the algorithm with large barrier parameters. Since the conditioning of the

barrier problems is getting worse when the barrier parameter tends to zero, the multi-step approach

stabilizes the combined method.

A convergence analysis based on that of Chapter 4 and that of Kaplan, Tichatschke [27] is es-

tablished. Thereby it turns out that, in contrast to the method presented in Chapter 4, the regularized

algorithm generates a sequence which converges to an optimal solution of the given problem under

certain conditions.

Furthermore, a result with respect to the rate of convergence of the values of the objective func-

tion holds under more restrictive conditions than before. But, considering only the class of problems

with quadratic growth we can even show linear convergence of the values of the objective function

as well as the iterates. This reflects a well-known result in the theory of the proximal point method

(cf., e.g., Rockafellar [47]).

In Chapter 6 we perform the numerical analysis of the discussed algorithms. In particular, we

first determine the nonempty compact sets on which the minimization of the (regularized) logarith-

mic barrier function has to be done. Furthermore, based on the previously determined compact sets,

we investigate how to compute the required constants. Then we have a closer look at the inexact

maximization procedure which is required for each inexact evaluation of the logarithmic barrier

function. The inexact maximization of a function on a nonempty compact set is usually carried out

by maximizing this function on a finite grid which discretizes the given compact set. Since these

grids can be very large, a deletion rule for excluding certain grid points from the maximization

process is developed. This deletion rule should accelerate the evaluation of the logarithmic barrier

function and consequently the whole iteration process.

The previously developed logarithmic barrier algorithms require strictly feasible starting points.

Finding such points is in general a difficult task and we discuss their determination in detail.

In Chapter 7 we apply our algorithms to model examples in order to show the typical behaviour

of the considered methods. Most of the examples are previously investigated by Voetmann [61] in

Page 11: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

1.2 Outline of the thesis 7

the context of the proximal interior point method of Kaplan, Tichatschke [26].

In Chapter 8 an application arising in the field of finance (cf. Tichatschke et al. [56]) is presented.

In particular we approximate the run of the curve of the German stock index DAX over a given time

interval. The approximation is based on a differential equation under uncertainty. So, by means of

some simplifications we obtain a linear Chebyshev approximation problem.

In Chapter 9 we discuss the design of digital filters. We first give an introduction into the

mathematical model of the design of perfect reconstruction filter banks. This leads to a semi-infinite

program with a single constraint which was previously investigated by Kortanek, Moulin [30].

Page 12: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

8 1 Introduction

Page 13: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

Chapter 2

The logarithmic barrier approach forconvex optimization problems

In this chapter we first summarize basic results of the classical logarithmic barrier method for finite

convex optimization problems. Further several trials for an extension of this method to semi-infinite

problems are reported and a conceptual algorithm for solving convex semi-infinite problems is de-

veloped.

2.1 Finite problems

In this section the classical logarithmic barrier approach for solving finite convex programming

problems is reviewed. In order to do this we consider the problem

minimize f(x) s.t. x ∈ Rn, Ax = b, gj(x) ≤ 0 (j = 1, . . . , l) (2.1)

with A ∈ Rm×n, b ∈ Rm as well as convex functionsf : Rn → R and gj : Rn → R for

j = 1, . . . , l. Then the classical logarithmic barrier approach can be described as follows (see, e.g.,

Wright [62], Section 3.2):

Algorithm 2.1

• Givenµ1 > 0.

• For i = 1, 2, . . .:

– Compute a minimizerxi of the barrier problem

minimize fi(x) := f(x)− µil∑

j=1

ln(−gj(x))

s.t. x ∈ Rn, Ax = b, gj(x) < 0 (j = 1, . . . , l).

(2.2)

– Chooseµi+1 ∈ (0, µi).

9

Page 14: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

10 2 The logarithmic barrier approach for convex optimization problems

The algorithm is practicable if problem (2.2) is solvable in each step. This ensures the following

lemma which corresponds to Lemma 12 in Fiacco, McCormick [9] and Theorem 4 in Wright [62],

although we are able to use a weaker assumption. Fiacco, McCormick [9], Wright [62] as well as

other authors assume that the feasible region of (2.1) is bounded. Instead of this restrictive condition

we only assume that the set of optimal solutions of (2.1) is bounded (which is in fact equivalent to

the compactness since we deal with continuous functions in a finite dimensional space).

Lemma 2.2 Let f : Rn → R and gj : Rn → R for j = 1, . . . , l be convex functions and

A ∈ Rm×n, b ∈ Rm be given. Assume that the solution set of(2.1) is nonempty and compact.

Moreover, assume that the Slater Constraint Qualification is fulfilled, i.e., there existsx ∈ Rn with

Ax = b andgj(x) < 0 for all j = 1, . . . , l. Then the level set

Li(τ) := {x ∈ Rn : fi(x) ≤ τ, Ax = b, gj(x) < 0 (j = 1, . . . , l)} (2.3)

is compact for allτ ∈ R and fixedi ∈ N. Especially problem(2.2) is solvable with a compact set

of optimal solutions.

Proof: Let τ ∈ R be arbitrarily given. To show the compactness ofLi(τ) we prove that it is

bounded and closed.

We first show that it is bounded. Suppose thatLi(τ) were unbounded, then there exists a se-

quence{zk} with zk ∈ Li(τ) and‖zk‖ > k. ‖ · ‖ is an arbitrary but fixed norm onRn. Setting

yk := zk/‖zk‖ we have‖yk‖ = 1 for all k ∈ N and the sequence{yk} has at least one accumula-

tion pointy with ‖y‖ = 1. Without loss of generality we assume that{yk} converges toy. Let x∗

be an optimal solution of (2.1). Then we want to show that each pointx∗ + sy with s > 0 is also

an optimal solution of (2.1) which contradicts our assumption of the compactness of the solution set

sincey 6= 0.

In order to show the feasibility of such pointsx∗ + sy for (2.1) lets > 0 be fixed. Then, taking

the convexity ofgj into account, we have for allk > s andj = 1, . . . , l :

gj

((1− s

‖zk‖

)x∗ + s

zk

‖zk‖

)≤(

1− s

‖zk‖

)gj(x∗) +

s

‖zk‖gj(zk) < 0.

Thusk →∞ leads togj(x∗ + sy) ≤ 0 for all j = 1, . . . , l. Additionally, it holds

Ay = limk→∞

Ayk = limk→∞

Azk

‖zk‖= lim

k→∞

b

‖zk‖= 0

such thatx∗ + sy is a feasible solution of (2.1). Further,gj(x∗) ≤ 0 and the convexity ofgj allow

to conclude

0 > gj(zk) ≥(‖zk‖ − 1

)gj(x∗) + gj(zk) ≥ ‖zk‖ gj

((1− 1‖zk‖

)x∗ +

zk

‖zk‖

)

for all k > 1 andj = 1, . . . , l. Therefore, regarding the convergence ofgj

((1− 1

‖zk‖

)x∗ + zk

‖zk‖

)to gj(x∗ + y) for all j, there exists a constantC0 > 0 independent ofj (because only finitely many

Page 15: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

2.1 Finite problems 11

constraints occur) andk with gj(zk) ≥ −C0‖zk‖. Using this as well as the monotonicity of the

logarithm we obtain

τ ≥ fi(zk) = f(zk)− µil∑

j=1

ln(−gj(zk)) ≥ f(zk)− µil ln(C0‖zk‖).

Hence, regarding the convexity off , one infers

f

((1− s

‖zk‖

)x∗ + s

zk

‖zk‖

)≤(

1− s

‖zk‖

)f(x∗) + s

f(zk)‖zk‖

≤(

1− s

‖zk‖

)f(x∗) + s

τ

‖zk‖+ sµil

ln(C0‖zk‖)‖zk‖

for all k > s. Thenk → ∞ gives usf(x∗ + sy) ≤ f(x∗). Consequentlyx∗ + sy is an optimal

solution of (2.1) for eachs ≥ 0. As stated above this contradicts the assumption of the compactness

of the solution set of (2.1) such thatLi(τ) cannot be unbounded.

To show thatLi(τ) is closed, we prove that it contains all its accumulation points. Let{zk} be

a convergent sequence withzk ∈ Li(τ) for all k andz ∈ Rn as its limit point. First, fromAzk = b

for all k ∈ N follows easily thatAz = b. Further, since the convex functionsf andg1, . . . , gl are

continuous onRn (see, e.g., Rockafellar [45], Corollary 10.1.1), we havelimk→∞ f(zk) = f(z)and limk→∞ gj(zk) = gj(z) for all j = 1, . . . , l. Thus one infersgj(z) ≤ 0, gj(zk) ≥ C1 and

f(xk) ≥ C1 with a constant0 > C1 > −∞ independent ofj andk. Therefore, takingfi(xk) ≤ τ

for all k ∈ N and the monotonicity of the logarithm into account, we can conclude

−µi ln(−gν(zk)

)≤ τ − f(zk) + µi

l∑j=1j 6=ν

ln(−gj(zk)

)

≤ τ − C1 + µi(l − 1) ln(−C1) =: µiC2

for all ν = 1, . . . , l with a constantC2 <∞. Then it follows

gν(zk) ≤ −e−C2 < 0

and gν(z) < 0 for all ν = 1, . . . , l. Additionally, fi is obviously continuous on its domain

dom (fi) = {x ∈ Rn : gj(x) < 0 (j = 1, . . . , l)} so thatfi(z) ≤ τ follows from the inclu-

sion{zk} ⊂ {x ∈ Rn : gj(x) ≤ −e−C2} ⊂ dom (fi). Hence, it yieldsz ∈ Li(τ) such that the

level set is closed.

Finally, we have to show that (2.2) is solvable with a compact solution set. Due to the existing

Slater pointx the level setLi(τ) with τ = fi(x) is nonempty. Moreover, each optimal solution of

(2.2) must be an element ofLi(fi(x)). Consequently the optimization problem

minimize fi(x) s.t. x ∈ Li(fi(x)) (2.4)

has the same solution set as problem (2.2). We already know that the level setLi(fi(x)) is compact

and contained in the domain offi. In problem (2.4) we have to minimize the continuous function

Page 16: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

12 2 The logarithmic barrier approach for convex optimization problems

fi on a nonempty compact feasible set. Thus there exists at least one optimal solution of (2.4),

resp. (2.2). Furthermore the set of optimal solutions coincides with the level setLi(f∗i ) wheref∗i is

the optimal value offi. Thus, the compactness of this set follows from the statements above.2

The following result shows that we can compute an optimal solution of (2.1) with Algorithm

2.1. This theorem corresponds to Theorem 25 in Fiacco, McCormick [9] and Theorem 5 in Wright

[62]. Let f∗ denote the optimal value of (2.1).

Theorem 2.3 Let f : Rn → R andgj : Rn → R for j = 1, . . . , l be convex functions. Further-

more, letA ∈ Rm×n, b ∈ Rm be given. Assume that the set of optimal solutions of (2.1) is nonempty

and compact. Moreover, assume that the Slater Constraint Qualification is fulfilled. Let{µi} be a

positive sequence withlimi→∞ µi = 0 and let{xi} denote a sequence of arbitrary optimal solutions

of (2.2). Then the following is true

(a) The functionsfi are convex on their domain.

(b) The sequence{xi} is bounded.

(c) It holds

0 ≤ f(xi)− f∗ ≤ µil (2.5)

for all i ∈ N andlimi→∞ f(xi) = f∗.

(d) Each accumulation point of{xi} is an optimal solution of(2.1).

(e) If {µi} is a monotonically decreasing sequence and if{xi} converges, then

limi→∞

f∗i = f∗.

Proof: Let us first remark that the existence ofxi is ensured by Lemma 2.2 for alli ∈ N. Now the

separate propositions are successively proven.

(a) Let i ∈ N be fixed. Sincef is convex onRn andµi is positive it remains to prove that the

logarithmic part

−l∑

j=1

ln (−gj(x)) (2.6)

is convex ondom (fi) = {x ∈ Rn : gj(x) < 0 (j = 1, . . . , l)}. This will be done by showing that

each addend of this sum is convex.

The logarithm is a concave increasing function. Consequently,− ln(−t) is a convex increasing

function. Taking the convexity ofgj into account each summand in (2.6) is the post-composition

of a convex function with an increasing convex function. Such a composition is also convex after

Proposition IV.2.1.8 in Hiriart-Urruty, Lemarechal [20].

(b) Let µ0 ∈ R be given such thatµi < µ0 for i ∈ N holds. Moreover, letx0 be an optimal

solution of (2.2) withi = 0. Then we have

f(xi)− µil∑

j=1

ln(−gj(xi)

)≤ f(x0)− µi

l∑j=1

ln(−gj(x0)

)

Page 17: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

2.1 Finite problems 13

and

f(x0)− µ0

l∑j=1

ln(−gj(x0)

)≤ f(xi)− µ0

l∑j=1

ln(−gj(xi)

)for all i ∈ N. Multiplying the first inequality withµ0/µi and combining the resulting estimate with

the second inequality one obtains

f(x0)− f(xi) ≤ µ0

l∑j=1

(ln(−gj(x0)

)− ln

(−gj(xi)

))≤ µ0

µi

(f(x0)− f(xi)

)for all i ∈ N. Due toµ0 > µi for all i ∈ N this can only be true iff(xi) ≤ f(x0) holds for

eachi ∈ N. Thus, regarding alsoAxi = b for all i ∈ N, eachxi is an element of the level set

{x ∈ Rn : f(x) ≤ f(x0), Ax = b, gj(x) ≤ 0 (j = 1, . . . , l)}. Due to the compactness of the

solution set of (2.1) these sets are compact which can be proven similarly to Corollary 20 in Fiacco,

McCormick [9]. Therefore the sequence{xi} is bounded.

(c) The left inequality in (2.5) is simply true since eachxi is feasible for (2.1). Thus it remains

to showf(xi) − f∗ ≤ µil. In order to prove this let an optimal solutionx∗ of (2.1) be arbitrarily

given. The pointxi is a minimizer offi onM0 := {x ∈ Rn : Ax = b, gj(x) < 0 (j = 1, . . . , l)}.Thus, regarding the convexity ofM := {x ∈ Rn : Ax = b, gj(x) ≤ 0 (j = 1, . . . , l)} as well as

M0 = ri (M), Theorem 6.1 in Rockafellar [45] allows to concludexi + t(x∗ − xi) ∈ M0 for all

t ∈ [0, 1). Therefore we have

0 ≤ fi(xi + t(x∗ − xi))− fi(xi)t

for all t ∈ (0, 1). Using the existence of the directional derivativef ′i(xi;x∗ − xi) (cf., e.g., Rock-

afellar [45], Theorem 23.1) this combined with Theorem 23.4 in Rockafellar [45] leads immediately

to

0 ≤ f ′i(xi;x∗ − xi) = maxz∈∂fi(xi)

zT (x∗ − xi),

if we take into account thatxi ∈ int (dom (fi)) which enforces the compactness of∂fi(xi). So

now we have to determine a closed form for the subdifferential offi in xi. From the proof of (a) we

know that the functions− ln(−gj(x)) are convex ondom (fi) for all j = 1, . . . , l. Thus, regarding

Theorem 23.4 in Rockafellar [45],∂(− ln(−gj(xi))) is nonempty for alli andj. Since− ln(−t) is

an increasing convex function andgj is convex for allj = 1, . . . , l we can apply Theorem XI.3.6.1

in Hiriart-Urruty, Lemarechal [21] so that we infer in combination with Proposition XI.1.3.1 in

Hiriart-Urruty, Lemarechal [21]

∂(− ln

(−gj(xi)

))=

1−gj(xi)

∂gj(xi).

Consequently, using Theorem 23.8 in Rockafellar [45] and Proposition XI.1.3.1 in Hiriart-Urruty,

Lemarechal [21] and regarding that the intersection

ri (dom (f)) ∩l⋂

j=1

ri (dom (−µi ln (−gj)))

Page 18: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

14 2 The logarithmic barrier approach for convex optimization problems

is nonempty (since eachxi is an element of it), we have

∂fi(xi) = ∂f(xi) + µi

l∑j=1

∂(− ln(−gj(xi))) = ∂f(xi) + µi

l∑j=1

1−gj(xi)

∂gj(xi). (2.7)

Hence, there existu ∈ ∂f(xi) andvj ∈ ∂gj(xi) with

f ′i(xi;x∗ − xi) =

u+ µi

l∑j=1

1−gj(xi)

vj

T

(x∗ − xi).

Then, regarding the definition of the subdifferential andgj(x∗) ≤ 0 for j = 1, . . . , l, we infer

0 ≤ uT (x∗ − xi) + µi

l∑j=1

1−gj(xi)

vTj (x∗ − xi)

≤ f(x∗)− f(xi) + µi

l∑j=1

gj(x∗)− gj(xi)−gj(xi)

≤ f∗ − f(xi) + µil.

(d) From (b) we know that{xi} is bounded so that it has an accumulation pointx. Then it

follows f(x) = f∗ from (2.5). Furthermore,x is obviously feasible for (2.1). Hence,x is an

optimal solution of (2.1).

(e) Letx∗ be the limit point of{xi}. If we havegj(x∗) < 0 for all j = 1, . . . , l then one can

conclude

limi→∞

µi

l∑j=1

ln(−gj(xi)

)= 0

such that we infer with (c)

limi→∞

f∗i = limi→∞

f(xi)− µil∑

j=1

ln(−gj(xi)

)= f∗.

Thus in the sequel we assume that there exists at least one indexj ∈ {1, . . . , l} with gj(x∗) = 0which implies

l∑j=1

ln(−gj(xi)

)< 0

for all i sufficiently large. Then, regarding that we have a nonincreasing sequence{µi}, one can

Page 19: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

2.2 Transfer to semi-infinite problems 15

conclude

f∗ ≤ f(xi+1)

< f(xi+1)− µi+1

l∑j=1

ln(−gj(xi+1)

)= f∗i+1

≤ f(xi)− µi+1

l∑j=1

ln(−gj(xi)

)≤ f(xi)− µi

l∑j=1

ln(−gj(xi)

)= f∗i

for all i sufficiently large. Especially the sequence{f∗i } decreases monotonically (at least for large

i) and is bounded below which implies the convergence of it. Setα := limi→∞ f∗i . Then we have

α ≥ f∗ from above. We want to show thatα = f∗ holds. For this purpose we assumeα > f∗

and setδ := (α − f∗)/2 > 0. Furthermore we choosex ∈ Rn with Ax = b andgj(x) < 0 for

all j = 1, . . . , l andf(x) ≤ α − δ. Such a point has to exist due to (c). Since{µi} is a positive

sequence with limit point0 it yields

α ≤ fi(xi) ≤ fi(x) = f(x)− µil∑

j=1

ln (−gj(x)) ≤ α− δ +δ

2= α− δ

2

for all i sufficiently large, which contradicts our assumption. 2

2.2 Transfer to semi-infinite problems

In the sequel we want to transfer the classical logarithmic barrier method analyzed in the previous

section to convex semi-infinite problems of the form (1.1). For the sake of simplicity of the presenta-

tion we consider (1.1) withj = 1 (the index will be dropped) and without linear equality constraints,

i.e.

minimize f(x) s.t. x ∈ Rn, g(x, t) ≤ 0 (t ∈ T ). (2.8)

But, in the further course we describe the possibility of the extension to problems of the general

form (1.1).

Without specifying any assumptions at this point it turns out that the most difficult question for

the transfer of the logarithmic barrier method to semi-infinite problems is how can we choose a

suitable barrier function. This is caused by the (possibly) infinitely many constraints.

Considering (2.1) without linear equality constraints we can embed problems of this type into

the class of problems described by (2.8) by settingT := {1, . . . , l} andg(x, t) := gt(x). Thus a

natural generalization of the barrier term is given by

−∑t∈T

ln(−g(x, t)).

Page 20: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

16 2 The logarithmic barrier approach for convex optimization problems

But obviously this leads to serious problems. IfT is an uncountable set the definition of this sum

is not clear and ifT is an infinite countable set, serious numerical problems occur when evaluating

the sum. Furthermore, ifT is a finite but large set the barrier parameterµ has to be very small to

guarantee a certain accuracy by estimate (2.5). But in practice this avoids the machine precision so

that a direct transfer of the classical logarithmic barrier in the sense above is inadvisable and we

reject this approach.

A first alternative is the method of outer approximation described for instance by Powell [43]

in the case of linear problems. Thereby we replace step by step the setT by discretizations which

become successively finer. Consequently we have to solve finite problems of type (2.1) without

linear equality constraints in each step. These problems can be solved theoretically with the classical

logarithmic barrier approach from above, but again several difficulties occur. At first if the relaxed

problems are solvable the discretized set and consequently the number of the considered constraints

grows such that again the barrier parameter has to be very small to guarantee a good approximate

solution. Furthermore, in general the optimal solutions of the relaxed problems are not feasible

for the original problem. Consequently if we approximately compute optimal solutions by this

method they are typically not feasible for the original problem. Another serious difficulty is that the

properties of the original problem do not have to be inherited to the relaxed problems. Especially it

is possible that the relaxed problems are not solvable (for examples see, e.g. Kaplan, Tichatschke

[24]). Due to these difficulties we look for alternatives.

Sonnevend [54] and Schattler [50, 51] suggest to use the following “Integral Barrier Function”

−∫T

ln(−g(x, t))dt. (2.9)

Of course,meas (T ) > 0 is assumed in this case so that especially finite setsT are excluded.

Nevertheless, let us have a closer look at some important details of the arising method.

Due to the smoothing effect of the integral, (2.9) does not have to possess the barrier property

at all. That means it is possible that (2.9) is bounded above if one approaches the boundary of the

feasible region. This fact is illustrated by the following example of Jarre [23].

Example 2.4 We consider the linearly bounded feasible set

S :=

{x ∈ R2 : g(x, t) := −

(t− 1

2

)2

x1 − x2 ≤ 0 (t ∈ [0, 1])

}.

Now, choosingx = (1, 0)T , we haveg(x, t) = −(t − 12)2 ≤ 0 for all t ∈ [0, 1]. Thusx ∈ S but

g(x, t) = 0 for t = 12 impliesx 6∈ int (S). Furthermore, usingT = [0, 1], we conclude

−∫T

ln(−g(x, t))dt = −1∫

0

ln

((t− 1

2

)2)dt = −4

1∫1/2

ln(t− 1

2

)dt = 2 ln 2 <∞.

2

Finally, let us have a look at (2.9) from the numerical point of view. Here we have the task to

evaluate integrals of the form (2.9) at different pointsx. If x is not located near the boundary of

Page 21: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

2.3 A conceptual algorithm for semi-infinite problems 17

the feasible region this could be done with standard formulas for numerical integration. But if we

evaluate this integral for a point near the boundary of the feasible region the logarithm will have large

absolute values for certaint. Consequently standard formulas for numerical integration do not work

very well in this area. But, we have to be able to evaluate the barrier function (and therefore also the

integrals) near the boundary of the feasible region, because optimal solutions are typically located

on this boundary. Due to these problems Schattler [50, 51] refers to specialized integration rules like

Radau’s or Lobatto’s rule (see, e.g. Davis, Rabinowitz [4]) for evaluating the integrals. In contrast

to this Lin et al. [31] use Simpson’s method to compute similar integrals arising by transferring the

exponential barrier to semi-infinite problems. In order to achieve a suitable accuracy they have to

partition the interval[0, 1] into 400000 small parts in one example case. Thus, independent of the

formulae, evaluating such integrals requires a high computational effort.

2.3 A conceptual algorithm for semi-infinite problems

Taking all considerations from the previous section into account we decided to look for a more

practical variant. In order to do that we consider the following reformulation of the semi-infinite

problem (2.8)

minimize f(x) s.t. x ∈ Rn, maxt∈T

g(x, t) ≤ 0. (2.10)

The theoretical properties as well as practical applications of this approach are extensively studied

by Polak [37, 38]. The main advantage of the reformulation (2.10) is that we can write it in the form

(2.1) with a single constraint by using

g1(x) := maxt∈T

g(x, t).

Thus we can use the results of our first section for problems of type (2.10). Consequently we deal

with the barrier function

f(x)− µ ln(−max

t∈Tg(x, t)

). (2.11)

Therefore in contradiction to the approaches mentioned above we have no additional difficulties

from the theoretical point of view. But there are two remarkable numerical problems. We now deal

with a nondifferentiable barrier function due to the involvedmax-term and we have to solve the

global optimization problem

maximize g(x, t) s.t. t ∈ T (2.12)

in order to evaluate the barrier function at a given pointx, which is in general a very hard task.

Thus except for special cases we cannot suppose that (2.12) is exactly solvable for any givenx with

acceptable computational effort. Accordingly there is only an approximate maximizer of (2.12)

available such that the barrier function is only approximately evaluable. Consequently we have to

use a method for minimizing (2.11) which requires only an approximately computable objective

function. Such a method, derived from a bundle method from Kiwiel [28], is presented in the next

Page 22: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

18 2 The logarithmic barrier approach for convex optimization problems

chapter. This method requires the feasible sets to be compact. In contradiction to this the barrier

function (2.11) has to be minimized on open sets of the form

{x ∈ Rn : g(x, t) < 0 (t ∈ T )} .

Nevertheless, in order to use the method proposed we will minimize the (convex) barrier function

successively on compact sets like closed boxes or balls. However, we still cannot suppose that we

are able to compute an exact minimizer of (2.11) using only approximate values of the objective

function. But as it is known from finite problems this do not have to be required (cf., e.g., den

Hertog [5]). However, the classical logarithmic barrier method from Algorithm 2.1 has to adapted in

the sense thatxk is from now on only an approximate minimizer of the barrier function. Altogether

we obtain the following conceptual algorithm for solving (2.10) resp. (2.8).

Algorithm 2.5

• Givenµ1 > 0.

• For i = 1, 2, . . .:

– Fork = 1, 2, . . .:

∗ Determine a nonempty compact setSi,k ⊂ {x ∈ Rn : maxt∈T g(x, t) < 0}.∗ Compute an approximate minimizerxi,k of (2.11) onSi,k.

∗ If xi,k is an approximate unconstrained minimizer of a certain accuracy of (2.11)

setxi := xi,k and leave the inner loop.

– Chooseµi+1 ∈ (0, µi).

In the following chapter we present a numerical method for minimizing the nondifferentiable

barrier function (2.11) onSi,k such that in Chapter 4 we can give all necessary details to put this

conceptual algorithm into implementable form.

Page 23: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

Chapter 3

A bundle method usingε-subgradients

In this chapter we discuss a method for solving the nondifferentiable auxiliary problems which

appear in the conceptual algorithm at the end of the previous chapter. In general these problems

look like

minimize f(x) s.t. x ∈ S (3.1)

with a convex functionf and a nonempty compact convex setS ⊂ Rn. Moreover, let (3.1) be

solvable and the following assumptions be fulfilled.

Assumption 3.1 Letε ≥ 0 be given. Then it is assumed that the following holds

(a) for anyx ∈ S at least anε-approximationf(x) of f(x) with

f(x)− ε ≤ f(x) ≤ f(x) (3.2)

can be computed;

(b) for anyx ∈ S anε-subgradientgf (x) of f can be computed;1

(c) f is Lipschitz continuous onS with Lipschitz constantLf such that‖gf (x)‖2 ≤ Lf for all

x ∈ S.

These assumptions on (3.1) are generalizations of those of Kiwiel [28] (there we haveε = 0).

Therefore we suggest a modification of Kiwiel’s proximal level bundle method for solving problem

(3.1). In Kiwiel’s Algorithm 1 we replace all computations off by f and all computations of a

subgradient by anε-subgradient. Linearizingf in xk ∈ S by

fk(x) := f(xk) + gf (xk)T (x− xk)

leads to the following algorithm.

1If ∂f(x) := {z ∈ Rn : f(y) ≥ f(x) + zT (y − x) for all y ∈ Rn} 6= ∅ then (3.2) ensures∂f(x) ⊂ ∂εf(x). Thus

anε-subgradient off in x can be given by an element of∂f(x). Such a situation will always be given in our applications

of the proposed bundle method.

19

Page 24: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

20 3 A bundle method usingε-subgradients

Algorithm 3.2

(S0) Givenx1 ∈ S, the final toleranceεopt ≥ 0, a level parameter0 < κ < 1 andε ≥ 0. Set

x1c := x1, f0

up := ∞, f1low := minx∈S f1(x), J1 := {1}, k := 1, l := 0, k(0) := 1 (k(l)

denotes the iteration number of thel-th increase offklow).

(S1) Setfkup := min{f(xk), fk−1up },∆k := fkup − fklow. If fkup = f(xk) setxkrec := xk (xkrec

denotes the “best” known iterate up to thek-th step, i.e.fkup = f(xkrec)).

(S2) If ∆k ≤ εopt or gf (xk) = 0 terminate; otherwise continue.

(S3) If the feasible set of

minimize12

∥∥∥x− xkc∥∥∥2

2

s.t. x ∈ S, f j(x) ≤ κfklow + (1− κ)fkup (j ∈ Jk)(3.3)

is nonempty, go to (S5); otherwise continue.

(S4) Setfklow := minx∈S

maxj∈Jk

f j(x). Choosexkc ∈ {xj : j ∈ Jk} arbitrarily. Setk(l + 1) := k,

increasel by 1 and go to (S1).

(S5) Find the solutionxk+1 of (3.3) and its multipliersλkj such thatJk := {j ∈ Jk : λkj > 0}satisfies|Jk| ≤ n.

(S6) Calculatef(xk+1) andgf (xk+1) ∈ ∂εf(xk+1).

(S7) SelectJks ⊂ Jk such thatJk ⊂ Jks . SetJk+1 := Jks ∪ {k + 1}, xk+1c := xkc , f

k+1low := fklow.

Increasek by 1 and go to (S1).

Let us briefly describe this bundle method. While (S0) and (S1) are initializing steps, (S2) con-

tains the stopping criterion. Then in (S3) a feasibility check of a projection problem with constraints

given by the current bundle is done with the consequence of resetting the lower bound of the opti-

mal value of (3.1) in the case of infeasibility in (S4). In the feasible case the projection is in fact

done leading to the next iterate in (S5) and new values of the objective function as well as theε-

subgradient in (S6). Finally, in (S7) the bundle update based on the Lagrange multipliers of problem

(3.3) is made so that the next iteration step can be done.

The practicability of this method can be easily shown by investigating each step separately.

Thereby we regard in (S5) that many QP-methods automatically generate|Jk| ≤ n since there are

n variables involved. In addition let us remark that between two successive updates of the lower

bound in (S4) the step (S5) has to reached at least once because the minimum ofmaxj∈Jk f j(x) on

S is attained at a certain point which is feasible for the following projection (3.3).

Now let us continue with a convergence analysis for the stated method started with a few tech-

nical results.

Page 25: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

21

Lemma 3.3 (cf. Lemma 3.1 in [28])

For any givenk ∈ N we have:

If k(l) < k < k(l + 1) for somel ∈ N0 then

‖xk+1 − xk‖2 ≥κ∆k

Lf

otherwisek = k(l) for somel ∈ N0 and

‖xk+1 − xkc‖2 ≥κ∆k

Lf.

Proof: Taking into account thatxk+1 is feasible for (3.3) we obtain for anyj ∈ Jk

f j(xk+1) = f(xj) + gf (xj)T (xk+1 − xj) ≤ κfklow + (1− κ)fkup = fkup − κ∆k.

Regardingf(xj) ≥ fkup, the Cauchy-Schwarz inequality and the boundedness of theε-subgradients

this leads to

κ∆k ≤ f(xj)− fkup + κ∆k

≤ f(xj)− f j(xk+1)

= −gf (xj)T (xk+1 − xj)≤ ‖gf (xj)‖2‖xk+1 − xj‖2≤ Lf‖xk+1 − xj‖2.

(3.4)

If k(l + 1) > k > k(l) it follows k ∈ Jk from step (S7) so that the choicej = k in (3.4) is possible

and the proposition holds in this case. Otherwise ifk = k(l) we can find aj ∈ Jk with xj = xkcdue to (S4) so that the proposition follows again from (3.4). 2

Lemma 3.4 (cf. Lemma 3.2 in [28])

If k(l + 1) > k > k(l) for somel ≥ 0 thenxkc = xk−1c and

‖xk+1 − xkc‖22 ≥ ‖xk − xkc‖22 + ‖xk+1 − xk‖22. (3.5)

Proof: Checking (S7) the equationxkc = xk−1c is obvious.

In order to prove the second proposition consider problem (3.3) in stepk − 1, the orthogonal

projection ofxk−1c onto the set described by

x ∈ S, f j(x) ≤ κfk−1low + (1− κ)fk−1

up (j ∈ Jk−1).

Due to (S5) and (S7)xk is also the projection ofxk−1c onto the enlarged set withJk−1

s instead of

Jk−1. The projection theorem (cf., e.g., Hiriart-Urruty, Lemarechal [20]), Theorem III.3.1.1) in

combination withxkc = xk−1c gives us

(xkc − xk)T (y − xk) ≤ 0 for all y ∈{x ∈ S : f j(x) ≤ κfk−1

low + (1− κ)fk−1up (j ∈ Jk−1

s )}

Page 26: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

22 3 A bundle method usingε-subgradients

so that particularly

(xkc − xk)T (xk+1 − xk) ≤ 0

holds if we additionally regard that (S7) ensures the feasibility ofxk+1 for the projection onto the

enlarged set. Therefore we obtain

‖xk+1 − xkc‖22 = ‖xk − xkc‖22 + ‖xk+1 − xk‖22 + 2(xk − xkc )T (xk+1 − xk)≥ ‖xk − xkc‖22 + ‖xk+1 − xk‖22

which completes the proof. 2

At this point an upper bound for the number of steps with fixedl can be presented.

Lemma 3.5 (cf. Lemma 3.3 in [28])

If k(l) ≤ k < k(l + 1) for somel ∈ N0 and∆k > 0 then

k − k(l) + 1 ≤(

diam (S)Lfκ∆k

)2

with diam (S) := maxx,y∈S

‖x− y‖2.

Proof: If k = k(l) the proposition follows from Lemma 3.3.

But if k > k(l) we havexk(l)c = x

k(l)+1c = . . . = xkc due to Lemma 3.4. Taking this and the

successive application of (3.5) into account one obtains

(diam (S))2 ≥ ‖xk+1 − xkc‖22≥ ‖xk − xk−1

c ‖22 + ‖xk+1 − xk‖22...

≥ ‖xk(l)+1 − xk(l)c ‖22 +

k∑j=k(l)+1

‖xj+1 − xj‖22.

Note thatf jup ≥ fkup for all j ≤ k due to (S1), moreover, thatf jlow = fklow for all k(l) ≤ j ≤ k due

to (S7). Thus∆j ≥ ∆k for all k(l) ≤ j ≤ k. Therefore, using Lemma 3.3, we can conclude

(diam (S))2 ≥k∑

j=k(l)

(κ∆j

Lf

)2

≥(κ∆k

Lf

)2

(k − k(l) + 1)

which leads to our proposition. 2

Lemma 3.6 (cf. Lemma 3.4 in [28])

If ∆k ≥ εopt for somek then

k ≤(

diam (S)Lfεopt

)2 1κ2(1− κ2)

.

Page 27: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

23

Proof: SetK l := {k(l), . . . , k(l + 1) − 1} for l ∈ N0. The proof of Lemma 3.5 shows that

f jup ≥ f iup, fjlow = fklow and consequently∆j ≥ ∆i hold for all pairsi, j ∈ K l with j ≤ i. Now,

an estimate for combining these separate results is established. Due to (S1)fk(l+1)up ≤ f jup for all

j ∈ K l. Additionally, since (3.3) is not solvable in thek(l + 1)-th iteration step of the method we

have

fk(l+1)low ≥ κfk(l)

low + (1− κ)fk(l+1)up

so that altogether

∆k(l+1) ≤ κ(fk(l+1)up − f jlow) ≤ κ(f jup − f

jlow) = κ∆j (3.6)

follows for all j ∈ K l.

Let m ∈ N0 be given such thatk ∈ Km holds. Furthermore setK = {1, . . . , k}. Then

∆k ≥ εopt, ∆j+1 ≤ ∆j for all j ∈ K(l) ∩ K, j < k(l + 1)− 1 and (3.6) allow to conclude

∆i ≥ εoptκm−l

for all i ∈ K l ∩ K, l = 0, . . . ,m.

Using this and Lemma 3.5 we obtain

|K l ∩ K| ≤(

diam (S)Lfκεopt

)2

κ2(m−l)

for l = 0, . . . ,m. Hence,

k =m∑l=0

|K l ∩ K| ≤m∑l=0

(diam (S)Lf

κεopt

)2

κ2(m−l) ≤(

diam (S)Lfκεopt

)2 11− κ2

and the proof is complete. 2

Now we are able to prove the main result of this chapter.

Theorem 3.7 (cf. Corollary 3.6 in [28])

If εopt > 0 then Algorithm 3.2 will terminate ink = 1 + kopt iterations where

kopt ≤(

diam (S)Lfεopt

)2 1κ2(1− κ2)

.

Moreover, the inequalities

f(xkrec)−minx∈S

f(x) ≤ εopt + ε (3.7)

and

f(xkrec)−minx∈S

f(x) ≤ εopt + 2ε (3.8)

are true.

Proof: The first proposition is a consequence of Lemma 3.6, while, using (3.2), inequality (3.8)

follows directly from (3.7). Thus it remains to prove (3.7).

If the break in (S2) is caused bygf (xk) = 0 for anyk ∈ N, Theorem XI.1.1.5 in Hiriart-Urruty,

Lemarechal [21]) givesf(xk) ≤ minx∈S f(x) + ε. Using this, the definition ofxkrec and (3.2) we

can conclude

f(xkrec) ≤ f(xk) ≤ f(xk) ≤ minx∈S

f(x) + ε.

Page 28: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

24 3 A bundle method usingε-subgradients

Thus (3.7) holds in this case.

In the sequel we assume that the break is caused by∆k ≤ εopt. Then it holds

f(xkrec) = fkup = fklow + ∆k ≤ fklow + εopt.

Moreover, due to (3.2) andgf (xj) ∈ ∂εf(xj), we have

f j(x) = f(xj) + gf (xj)T (x− xj)≤ f(xj) + f(x)− f(xj) + ε

= f(x) + ε

for all j ∈ N. Thus we inferfklow ≤ minx∈S f(x) + ε and altogether we obtain (3.7). 2

Remark 3.8 If a two-sided approximationf of f is given, i.e.

f(x)− ε ≤ f(x) ≤ f(x) + ε

for all x ∈ S instead of the one-sided approximation, the results stated above remain true if we add

an additionalε to the right-hand sides of (3.7) and (3.8). 2

Page 29: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

Chapter 4

A logarithmic barrier method for convexsemi-infinite optimization problems

In this chapter we specify the necessary details to put Algorithm 2.5 into implementable form. For

that purpose we first consider problems of type (2.10)

minimize f(x) s.t. x ∈ Rn, maxt∈T

g(x, t) ≤ 0,

whereby we will denote the feasible set byM and the optimal value byf∗. Later on, in Section

4.3, the developed algorithm as well as the convergence analysis are transferred to problems of the

general form (1.1).

4.1 An implementable algorithm

Assumption 4.1 Assume the following:

(1) f : Rn → R is a convex function;

(2) T ⊂ Rp is a compact set;

(3) g(·, t) is convex onRn for anyt ∈ T ;

(4) g(x, ·) is continuous onT for anyx ∈ Rn;

(5) the setM0 := {x ∈M : maxt∈T g(x, t) < 0} is nonempty;

(6) the set of optimal solutions

Mopt := {x ∈M : f(x) = f∗}

of (2.10)is nonempty and compact;

(7) in caseh > 0 the setTh is a finiteh-grid onT (i.e. for eacht ∈ T there existsth ∈ Th with

‖t− th‖2 ≤ h) and in caseh = 0 the setsTh, T coincides;

25

Page 30: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

26 4 A logarithmic barrier method for convex semi-infinite optimization problems

(8) for each compact setS ⊂ Rn there exists a constantLtS with

|g(x, t1)− g(x, t2)| ≤ LtS‖t1 − t2‖2 (4.1)

for all x ∈ S and all t1, t2 ∈ T ;

(9) for each compact setS ⊂M0 a constantCS <∞ with

CS ≥ maxx∈S

∣∣∣∣ 1maxt∈T g(x, t)

∣∣∣∣ (4.2)

can be computed such thatS′ ⊂ S ⊂M0 impliesCS′ ≤ CS ;

(10) for eachx ∈ Rn and eacht ∈ T an element of the subdifferential off in x and an element of

the subdifferential ofg(·, t) in x can be computed.

Regarding (1) and (3) it is ensured that we deal with convex problems of type (2.10). Furthermore,

due to (2) and (4) the maximization problems (2.12) are solvable and consequently the barrier func-

tions (2.11) are evaluable at least from the theoretical point of view. Moreover, (5) and (6) are

motivated by the theoretical results of the Chapter 2. Then Lemma 2.2 ensures the existence of a

minimizer of the barrier function (2.11) for any givenµ > 0. Furthermore, the classical logarithmic

barrier method with exact minimizersxk leads to an optimal solution of the semi-infinite problem

(2.10) in the sense of Theorem 2.3. But as stated in Section 2.3 we cannot suppose that the max-

imization problems (2.12) are exactly solvable. Therefore we admitted the next assumptions. (7)

allows to compute inexact maximizer while their accuracy can be controlled with (8). The necessity

of assumption (9) will become clear in the further course, while by (10) we want to point out that

indeed the computation of the subgradients are necessary in the implementation of the method. We

now state our method in detail.

Algorithm 4.2

• Givenµ1 > 0 andx0 ∈M0.

• For i := 1, 2, . . . :

– Setxi,0 := xi−1, selectεi,1 > 0 and definefi :M0 → R by

fi(x) := f(x)− µi ln(−max

t∈Tg(x, t)

).

– Fork := 1, 2, . . . :

(a) Selectri,k > 0 such that

Si,k := {x ∈ Rn : ‖x− xi,k−1‖∞ ≤ ri,k} ⊂ M0.

(b) Selecthi,k ≥ 0 and definefi,k :M0 → R by

fi,k(x) := f(x)− µi ln

(− maxt∈Thi,k

g(x, t)

)whereThi,k is a set fulfilling Assumption 4.1(7).

Page 31: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

4.1 An implementable algorithm 27

(c) Selectβi,k ≥ 0 and compute an approximate solutionxi,k of

minimize fi(x) s.t. x ∈ Si,k (4.3)

such that

fi,k(xi,k)− minx∈Si,k

fi(x) ≤εi,k2

+ βi,k (4.4)

andfi,k(xi,k) ≤ fi,k(xi,k−1) are true.

(d) ∗ If fi,k(xi,k−1) − fi,k(xi,k) ≤ εi,k/2 and1 f(xi,k−1) ≤ f(x0) + 2µi then set

xi := xi,k−1, Si := Si,k, ri := ri,k, εi := εi,k, hi := hi,k, stop inner loop;

∗ if fi,k(xi,k−1) − fi,k(xi,k) ≤ εi,k/2 andf(xi,k−1) > f(x0) + 2µi then set

εi,k+1 := εi,k/2, continue inner loop;

∗ if fi,k(xi,k−1)− fi,k(xi,k) > εi,k/2 setεi,k+1 := εi,k, continue inner loop.

– Select0 < µi+1 < µi.

The structure of Algorithm 4.2 resembles that of the conceptual Algorithm 2.5, but let us give ex-

planations for each particular step. In (a) we specify the compact setSi,k as a linearly bounded set.

This decision is caused by the fact that linearly bounded sets are normally the simplest bounded

structures on that minimization can be done. Consequently minimizing the barrier function on the

chosen compact set is normally easier than minimizing it on more complex structures like quadrat-

ically bounded sets such as balls or ellipsoids. Additionally, having the bundle method from the

previous chapter in mind, we point out that the decision to choose linearly bounded sets is important

because in consequence of this the auxiliary problems of the bundle method are linear and quadratic

problems. Thus each of them should be efficiently solvable by standard approaches. Furthermore,

sinceM0 is an open set, step (a) is realizable.

In (b) we define the approximation of the barrier function while in (c) the approximate min-

imization of the barrier function is done with a certain solution accuracy. The condition (4.4) is

stimulated by inequality (3.7) in Theorem 3.7, when solving (4.3) with the bundle method proposed

in the previous chapter. Finally, in (d) the stopping criterion of the inner loop is given. It is di-

vided into three parts but mainly only two inequalities occur. The first one checks whether there is

achieved a sufficient improvement of the approximate solution on the current box with the selected

accuracy. The second part of the criterion is motivated by (2.5) so that it checks whether the accu-

racy parameter and the barrier parameter are in an appropriate order. If this is not the case then the

accuracy parameter is readjusted.

The critical point for a realization of the presented method is the question whether there exist

approximate solutions of (4.3) which fulfill the demanded criterions. As stated above (4.4) is initi-

ated by the bundle method presented in the previous chapter. Therefore we want to show that we

can use this bundle method for solving (4.3). We first notice that the setsSi,k ⊂ M0 are convex

and compact by construction (for any givenri,k > 0). Additionally, they are also nonempty, be-

causexi,k−1 ∈ M0 holds by construction and due to the open structure ofM0 there exists a radius1Alternatively we can usef(xi,k−1) ≤ minj=0,...,i−1 f(xj) + 2µi instead off(xi,k−1) ≤ f(x0) + 2µi but the latter

one suffices to guarantee the boundedness of the computed sequence{xi}.

Page 32: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

28 4 A logarithmic barrier method for convex semi-infinite optimization problems

ri,k > 0 such thatSi,k ⊂M0 is fulfilled. Moreover, we have already remarked that the functionsfi

are continuous ondom (fi) = M0 = int (dom (fi)) (this can be proven for instance by using the

convexity property offi ondom (fi) in combination with Theorem 2.35 in Rockafellar, Wets [48]).

Consequently in (4.3) we have to minimize a continuous function on a compact set, which is obvi-

ously solvable. The further requirements contained in Assumption 3.1 are ensured by the following

lemma. To formulate this we define for allx ∈ Rn and allh ≥ 0 the set of active constraints

T (x) :={s ∈ T : g(x, s) = max

t∈Tg(x, t)

}and its approximation

Th(x) :={s ∈ Th : g(x, s) = max

t∈Thg(x, t)

}.

Note thatT (x) 6= ∅ due to Assumption 4.1(2), (4) andTh(x) 6= ∅ due to Assumption 4.1(7).

Lemma 4.3 Let Assumption 4.1 be fulfilled. Leti, k be fixed andβi,k ≥ µiLtSi,k

CSi,khi,k be valid.

Then Assumption 3.1 is fulfilled for problem(4.3)with fi,k as an approximation forfi andε = βi,k.

Proof: In order to show Assumption 3.1(a),(b) letx ∈ Si,k be arbitrarily given. Furthermore, let

t∗ ∈ T (x) be fixed. Then, due to Assumption 4.1(7) there exists ath ∈ Thi,k with ‖t∗− th‖2 ≤ hi,k.Thus it holds

0 ≤ maxt∈T

g(x, t)− maxt∈Thi,k

g(x, t)

≤ g(x, t∗)− g(x, t∗h)

≤ g(x, t∗)− g(x, th)

≤ LtSi,k‖t∗ − th‖2

≤ LtSi,khi,k.

(4.5)

The concavity of the logarithm givesln(b)− ln(a) ≤ (b− a)/a for all positivea, b ∈ R. Therefore,

regarding (4.5), we can conclude

fi(x)− fi,k(x) = µi

(ln

(− maxt∈Thi,k

g(x, t)

)− ln

(−max

t∈Tg(x, t)

))

≤ µi1

−maxt∈T g(x, t)

(maxt∈T

g(x, t)− maxt∈Thi,k

g(x, t)

)≤ µiCSi,kLtSi,khi,k ≤ βi,k.

(4.6)

Moreover, takingmaxt∈T g(x, t) ≥ maxt∈Thi,k g(x, t) and the monotonicity of the logarithm into

account, one infers

fi,k(x) ≤ fi(x)

such that Assumption 3.1(a) is proven.

Page 33: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

4.1 An implementable algorithm 29

To show Assumption 3.1(b) lett∗h ∈ Thi,k(x) be arbitrarily given. Then, due to Assumption

4.1(10), we can computeu(x) ∈ ∂f(x) andv(x) ∈ ∂g(x, t∗h). Thus the inequality

maxt∈T

g(z, t) ≥ g(z, t∗h) ≥ g(x, t∗h) + v(x)T (z − x)

is true for allz ∈ Rn. If z ∈M0 one can conclude

ln(−max

t∈Tg(z, t)

)≤ ln

(−g(x, t∗h)− v(x)T (z − x)

). (4.7)

Regarding (4.6), (4.7), the subgradient property ofu as well as the convexity of− ln we obtain for

all z ∈M0 that

fi(z)− fi(x) ≥ fi(z)− fi,k(x)− βi,k

≥ f(z)− µi ln(−max

t∈Tg(z, t)

)− f(x) + µi ln

(− maxt∈Thi,k

g(x, t)

)− βi,k

≥ u(x)T (z − x)− µi ln(−g(x, t∗h)− v(x)T (z − x)

)+ µi ln (−g(x, t∗h))− βi,k

≥ u(x)T (z − x)− µig(x, t∗h)

v(x)T (z − x)− βi,k

=

(u(x)− µi

maxt∈Thi,k g(x, t)v(x)

)T(z − x)− βi,k.

Usingfi ≡ ∞ onRn \M0 this inequality is also true for allz /∈M0 so that

u(x)− µimaxt∈Thi,k g(x, t)

v(x) ∈ ∂βi,kfi(x) (4.8)

follows.

Finally, we show that Assumption 3.1(c) is fulfilled. The Lipschitz continuity offi on the

compact setSi,k ⊂M0 = int (dom (fi)) follows from Rockafellar [45], Theorem 24.7. Moreover,

due to the same theorem the subdifferentials of the convex functionsf andmaxt∈Thi,k g(·, t) are

bounded above onSi,k w.r.t. the Euclidean norm by positive constantscf and cg. Furthermore,

the definition ofv(x) combined with Lemma VI.4.4.1 in Hiriart-Urruty, Lemarechal [20] gives the

inclusionv(x) ∈ ∂(maxt∈Thi,k g(x, t)) for all x ∈ Si,k. Thus, regarding Assumption 4.1(9), the

Euclidean norm of theβi,k-subgradients described in (4.8) can be estimated as follows∥∥∥∥∥u(x)− µimaxt∈Thi,k g(x, t)

v(x)

∥∥∥∥∥2

≤ ‖u(x)‖2 + µi

∣∣∣∣∣ 1maxt∈Thi,k g(x, t)

∣∣∣∣∣ ‖v(x)‖2

≤ cf + µiCSi,kcg <∞

for all x ∈ Si,k. Therefore, using the approximate subgradients defined in (4.8) the third part of

Assumption 3.1 is also true. 2

Summing up we have shown that we can use the bundle method stated in the previous chapter to

determine approximate solutions of the problems (4.3) withβi,k ≥ µiLtSi,k

CSi,khi,k. Furthermore,

Page 34: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

30 4 A logarithmic barrier method for convex semi-infinite optimization problems

if we use this bundle method we do not have to selectβi,k explicitly, becauseβi,k = µiLtSi,k

CSi,khi,k

can be used afterhi,k is known.

Remark 4.4 If it is possible to determinemaxt∈T g(x, t) exactly for each feasible solutionx we

can sethi,k = 0 for all pairs i, k. Consequentlyβi,k = 0 is allowed (independent of the values

LtSi,k

, CSi,k ) such thatfi,k andfµi are identical. This leads to some simplifications in the algorithm

above as well as in the following convergence analysis. Furthermore, in this case we can drop the

Assumptions 4.1(7) and (8). 2

At the end of this section we can summarize that the presented Algorithm 4.2 is practicable. A

convergence analysis follows in the next section.

4.2 Convergence analysis

In this section we present conditions on the parameters of Algorithm 4.2 which guarantee that we

obtain an optimal solution of (2.10). We start with a characterization of the first part of the stopping

criterion in part (d) of the inner loop of Algorithm 4.2.

Lemma 4.5 Let Assumption 4.1 be fulfilled. Moreover, leti be fixed andx be an arbitrary optimal

solution of

minimize fi(x) s.t. x ∈M0. (4.9)

f∗i denotes the minimal value of problem(4.9). Letxi,k−1, xi,k be generated by Algorithm 4.2 and

βi,k ≥ µiLtSi,kCSi,khi,k be valid. If the inequality

fi,k(xi,k−1)− fi,k(xi,k) ≤εi,k2

(4.10)

is true, then

0 ≤ fi(xi,k−1)− f∗i ≤ max{

1,‖xi,k−1 − x‖∞

ri,k

}(εi,k + 2βi,k) (4.11)

holds.

Proof: We first remark that Lemma 2.2 ensures the existence ofx as optimal solution of (4.9).

The inequality0 ≤ fi(xi,k−1) − f∗i obviously holds, sincexi,k−1 is feasible for (4.9) by con-

struction as well as

fi,k(xi,k)− minx∈Si,k

fi(x) ≤εi,k2

+ βi,k

by construction. Together with (4.10) this yields

fi,k(xi,k−1)− minx∈Si,k

fi(x) ≤ εi,k + βi,k.

Using (4.6) we get

fi(xi,k−1)− minx∈Si,k

fi(x) ≤ εi,k + 2βi,k. (4.12)

At this point we distinguish two cases with regard to the location ofx. We first consider the case

x ∈ Si,k. Thenx is also an optimal solution of (4.9) so that

fi(xi,k−1)− f∗i = fi(xi,k−1)− fi(x) ≤ εi,k + 2βi,k

Page 35: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

4.2 Convergence analysis 31

follows from (4.12). Therefore the proposition (4.11) is true in this case.

Now, let us consider the casex /∈ Si,k and define the line throughxi,k−1 andx by

γ(s) := xi,k−1 +s

‖xi,k−1 − x‖∞(x− xi,k−1).

Due tox /∈ Si,k we have‖xi,k−1− x‖∞ > ri,k > 0. Thereforeγ(ri,k) lies betweenxi,k−1 andx on

that line. Sincefi is convex onM0 with minimizerx, one getsfi(γ(ri,k)) ≤ fi(xi,k−1). Moreover,

the equation‖xi,k−1− γ(ri,k)‖∞ = ri,k is true so thatγ(ri,k) ∈ Si,k. Thus, using (4.12), we obtain

fi(xi,k−1)− fi(γ(ri,k)) ≤ εi,k + 2βi,k. (4.13)

Besides we have

fi(γ(ri,k)) ≤rik

‖xi,k−1 − x‖∞fi(x) +

(1−

ri,k‖xi,k−1 − x‖∞

)fi(xi,k−1),

sincefi is convex onM0 and0 < rik/‖xi,k−1 − x‖∞ < 1. This leads to

fi(xi,k−1)− fi(x) ≤ ‖xi,k−1 − x‖∞ri,k

(fi(xi,k−1)− fi(γ(ri,k))

)such that with (4.13) the estimate

fi(xi,k−1)− f∗i ≤‖xi,k−1 − x‖∞

ri,k(εi,k + 2βi,k)

follows. Thus the proposition is also true in the second casex /∈ Si,k and the proof is complete.2

Now a sufficient termination condition for the inner loop of Algorithm 4.2 can be presented.

Proposition 4.6 Let Assumption 4.1 be fulfilled. Moreover, leti be fixed,qi ∈ (0, 1), δi > 0 be

given andri,k ≥ ri > 0 be valid for allk. If

µiLtSi,kCSi,khi,k ≤ βi,k ≤ q

ki δi (4.14)

is true for allk, then the inner loop of Algorithm 4.2 terminates after a finite number of steps.

Proof: The inner loop terminates after a finite number of steps if the inequalities (4.10) and

f(xi,k−1) ≤ f(x0) + 2µi (4.15)

are both true.

In the main part of the proof we assume that both inequalities never hold together. In order to

bring this to a contradiction we first exclude that (4.10) never holds.

a) Suppose that the inequality (4.10) never holds.

Page 36: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

32 4 A logarithmic barrier method for convex semi-infinite optimization problems

Then the algorithm generates an infinite sequence{xi,k}k andεi,k = εi,1 for all k ∈ N. Addi-

tionally, the estimatefi,k(xi,k) ≤ fi,k(xi,k−1) holds by construction so that we infer with (4.6)

0 ≤ fi,k(xi,k−1)− fi(xi,k) + βi,k

≤ fi,k(xi,k−1)− fi,k+1(xi,k) + qki δi

=

fi,k(xi,k−1)−k−1∑j=0

qji δi

−fi,k+1(xi,k)−

k∑j=0

qji δi

for all k ∈ N and hence fi,k(xi,k−1)−

k−1∑j=0

qji δi

k

(4.16)

is a monotonically nonincreasing sequence. Furthermore, this sequence is bounded below because

we have

fi,k(xi,k−1)−k−1∑j=0

qji δi ≥ fi(xi,k−1)− βi,k −

∞∑j=0

qji δi ≥ f∗i − δi −

11− qi

δi

for all k with f∗i given as in Lemma 4.5. Thus the sequence given in (4.16) converges. Combining

this andqki δi → 0 for k →∞ we can find an indexk0 such that

fi,k0(xi,k0−1)− fi,k0+1(xi,k0) ≤ fi,k0(xi,k0−1)− fi,k0+1(xi,k0) + qk0i δi ≤

εi,14

and

βi,k0 ≤ qk0i δi ≤

εi,14.

Then another use of (4.6) leads to

fi,k0(xi,k0−1)− fi,k0(xi,k0) ≤ fi,k0(xi,k0−1)− fi(xi,k0) + βi,k0

≤ fi,k0(xi,k0−1)− fi,k0+1(xi,k0) + βi,k0

≤ εi,14

+εi,14

=εi,12.

This contradicts our assumption and we have an indexk such that (4.10) is fulfilled.

b) Suppose that the inequalities (4.10) and (4.15) never hold together.

As in a) one can show that (4.16) defines a monotonically nonincreasing sequence. Therefore,

taking (4.6), (4.14) andqi ∈ (0, 1) into account, we infer

fi(xi,k−1)−k−1∑j=0

qji δi ≤ fi,k(xi,k−1) + βi,k −

k−1∑j=0

qji δi

≤ fi,1(xi,0) + qki δi − δi≤ fi(xi,0)

for all k ∈ N. Thus

fi(xi,k−1) ≤ fi(xi,0) +1

1− qiδi

Page 37: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

4.2 Convergence analysis 33

for all k ∈ N implies

xi,k ∈ Ni :={x ∈M0 : fi(x) ≤ fi(xi,0) +

11− qi

δi

}for all k ∈ N0. The setNi is compact since it is a nonempty level set offi (cf. Lemma 2.2). Hence,

the sequence{‖xi,k−x‖∞}k is bounded above by a constantC ≥ ri, wherex is an arbitrary optimal

solution of (4.9).

From the first part of the proof we know that there exists an indexk1 such that (4.10) holds

for k = k1 for the first time. Using the same arguments for all indices greater thank1 we find an

indexk2 > k1 such that (4.10) holds fork = k2 again. Repeating this procedure we get a strictly

monotonically increasing sequence{kj} such that (4.10) holds for allk = kj . Then, we deduce

from Lemma 4.5

0 ≤ fi(xi,kj−1)− f∗i

≤ max{

1,‖xi,kj−1 − x‖∞

ri,kj

}(εi,kj + 2βi,kj )

≤ max{

1,‖xi,kj−1 − x‖∞

ri,kj

}(εi,kj + 2qkji δi

)for j ∈ N. It is simple to verify thatkj ≥ j andεi,kj = (1/2)j−1εi,1 are true. Thus, regarding

‖xi,kj−1 − x‖∞ ≤ C as well asri,k ≥ ri > 0 for all k, we have

0 ≤ fi(xi,kj−1)− f∗i ≤C

ri

((12

)j−1

εi,0 + 2δiqji

)

for all j ∈ N. Hence,

limj→∞

fi

(xi,kj−1

)= f∗i .

Since{xi,kj}j belongs to the compact setNi there exists an accumulation pointx∗ ∈ Ni. From the

last equation we obtain thatx∗ solves (4.9). Due to the continuity off there exists an indexj ∈ Nwith f(xi,kj−1) ≤ f(x∗) + µi. Combiningf∗ ≤ f(x0) and (2.5) leads to

f(xi,kj−1)− f(x0) ≤ f(x∗) + µi − f∗ ≤ 2µi.

This contradicts our assumption, both inequalities (4.10) and (4.15) are true fork = kj and the proof

is complete. 2

Remark 4.7 The assumptionri,k ≥ ri > 0 is not used to prove that all iterates belong to the

nonempty compact setNi. Therefore there exists anr∗i > 0 such that the inclusion{z ∈ Rn : min

x∈Ni‖z − x‖∞ ≤ r∗i

}⊂M0

is valid sinceM0 is an open set. Thus, theoreticallyri,k ≥ ri > 0 is no restriction for the algorithm.

It still restricts the practical computation of the radiiri,k of course. 2

Page 38: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

34 4 A logarithmic barrier method for convex semi-infinite optimization problems

Remark 4.8 In (4.14) the right-hand sideqki δi can be replaced by an arbitrary summable sequence

δi,k to remain true Proposition 4.6. 2

With Proposition 4.6 we are able to control Algorithm 4.2 in order to make sure that each inner

loop terminates and a well-defined sequence{xi} is generated. Before we proceed with the main

convergence result let us recall the notation ofεi as final accuracy value at thei-th iteration and of

ri as radius of the finally considered compact boxSi at this iteration.

Theorem 4.9 Let Assumption 4.1 be fulfilled. Moreover, let{ri}, {δi} be positive sequences. Ad-

ditionally, letR > 0, {qi} ⊂ (0, 1) be given and assume that(4.14)holds for all i ∈ N and all k

appearing in the outer stepi. Furthermore, assume that

(i) limi→∞

µi = 0;

(ii) ri ≤ ri,k ≤ R for all i, k;

(iii) limi→∞

εi/ri = 0;

(iv) limi→∞

δi/ri = 0.

Then Algorithm 4.2 generates a sequence{xi}, which has at least one accumulation point and each

accumulation point is an optimal solution of(2.10).

Proof: It is easy to see that the assumptions of Proposition 4.6 are satisfied for eachi ∈ N.

Therefore each inner loop terminates after a finite number of steps and the algorithm generates a

sequence{xi} which belongs to the level set{x ∈ Rn : f(x) ≤ f(x0)+2µ1} by construction. Due

to Assumption 4.1(6) and Corollary 20 in Fiacco, McCormick [9] this level set is compact. Thus the

sequence{xi} has an accumulation point and we have to show that each accumulation point of{xi}is an optimal solution of (2.10).

Letx∗ be such an accumulation point of{xi} and let{xij} be a convergent subsequence of{xi}with limj→∞ x

ij = x∗. By x∗j we denote an optimal solution of problem (4.9) withi = ij . Using

Lemma 4.5, (4.14) as well asqij ∈ (0, 1) we obtain

0 ≤ fij (xij )− f∗ij

≤ max

{1,‖xij − x∗j‖∞

rij

}(εij + 2βij )

≤ max

{1,‖xij − x∗j‖∞

rij

}(εij + 2δij ).

(4.17)

Furthermore, applying Theorem 2.3, we know that the sequence{x∗j} has an accumulation point.

Without loss of generality we assume that{x∗j} is already convergent to the limit pointx∗∗. Applying

Theorem 2.3 again we conclude thatx∗∗ is an optimal solution of (2.10) and

limj→∞

f∗ij = f∗ (4.18)

Page 39: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

4.2 Convergence analysis 35

is true.

Obviously it is‖xij −x∗j‖∞ ≤ ‖xij −x∗∗‖∞+‖x∗j−x∗∗‖∞. Since allxi belong to the compact

level set{x ∈ Rn : f(x) ≤ f(x0) + 2µ1} the first term of the right-hand side is bounded above.

The second term is also bounded above due to the convergence of the sequences involved. For this

reason there exists a constantC with ‖xij − x∗j‖∞ ≤ C for all j. Together with (4.17) we have

0 ≤ fij (xij )− f∗ij ≤ max{

1,C

rij

}(εij + 2δij ).

In view of Assumptions (ii), (iii) and (iv) we obtain

0 ≤ limj→∞

fij (xij )− f∗ij ≤ 0

and from (4.18) it follows

limj→∞

fij (xij ) = f∗. (4.19)

In the sequel we show that{xij} is not only a minimizing sequence but converges to a solution

of problem (2.10).

The continuity off giveslimj→∞ f(xij ) = f(x∗). This combined with (4.19) allows to con-

clude that the limit point ofµij ln(−maxt∈T g(xij , t)) exists and

limj→∞

µij ln(−max

t∈Tg(xij , t)

)= lim

j→∞f(xij )− lim

j→∞fij (x

ij ) = f(x∗)− f∗. (4.20)

Now we distinguish the two casesmaxt∈T g(x∗, t) < 0 andmaxt∈T g(x∗, t) = 0. One of them

must be valid sinceM is the closure ofM0 andx∗ is an accumulation point of the sequence{xi}with xi ∈M0 holds for alli.

In the first case we assumemaxt∈T g(x∗, t) < 0. Then the sequence{ln(−maxt∈T g(xij , t))}is bounded and

limj→∞

µij ln(−max

t∈Tg(xij , t)

)= 0.

Together with (4.20) we obtainf(x∗) = f∗. As x∗ is feasible for (2.10) it is an optimal solution as

well.

Now, in the second case, we assumemaxt∈T g(x∗, t) = 0. Therefore there exists a constantj0

so thatmaxt∈T g(xij ) > −1 is true for allj ≥ j0. Thus the inequalitiesln(−maxt∈T g(xij )) < 0andµij ln(−maxt∈T g(xij )) < 0 hold for all j ≥ j0. Hence,

limj→∞

µij ln(−max

t∈Tg(xij , t)

)≤ 0

is true and (4.20) yieldsf(x∗)− f∗ ≤ 0, proving thatx∗ solves (2.10) in this case, too. 2

Remark 4.10The Assumptions (iii), (iv) in Theorem 4.9 are a posteriori criteria since we do not

know εi andri before the inner loop in stepi terminates. Relation (iii) can be satisfied, e.g., if we

change it into

(iii) ′ limi→∞

εi,1/ri = 0.

Page 40: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

36 4 A logarithmic barrier method for convex semi-infinite optimization problems

But, of course this requires an a priori computation ofri.

If this is not possible we have to run stepi of the algorithm with an arbitraryεi,0. When the

inner loop terminates, we check whetherεi/ri andδi/ri satisfy decrease conditions, e.g. geometric

decrease. If at least one of them does not do so, we repeat the step with smaller values forεi,0 and/or

δi until the decrease conditions are satisfied. This procedure is finite for fixedi if we control the

computation of the radii because the values ofri,k can be bounded below (see Remark 4.7). 2

4.3 Extension to general convex problems

Up to now we only considered convex semi-infinite problems with a single constraint. As already

mentioned before in this section our algorithm as well as the analysis will be transferred to general

convex problems of the form (1.1)

minimize f(x)

s.t. x ∈ Rn, Ax = b, A ∈ Rm×n, b ∈ Rm,

gi(x, t) ≤ 0 for all t ∈ T i (i = 1, . . . , l).

We again denote the set of feasible solutions by

M :={x ∈ Rn : Ax = b, max

t∈T igi(x, t) ≤ 0 (i = 1, . . . , l)

}.

The required assumptions are:

Assumption 4.11

(1) f : Rn → R is a convex function;

(2) T i ⊂ Rpi is a compact set for eachi ∈ {1, . . . , l};

(3) gi(·, t) is convex onRn for anyt ∈ T i and eachi ∈ {1, . . . , l};

(4) gi(x, ·) is continuous onTi for anyx ∈ Rn and eachi ∈ {1, . . . , l};

(5) the setM0 := {x ∈ Rn : Ax = b, maxt∈T i gi(x, t) < 0 (i = 1, . . . , l)} is nonempty;

(6) the set of optimal solutionsMopt of (1.1) is nonempty and compact;

(7) in caseh > 0, i ∈ {1, . . . , l} the setT ih is a finiteh-grid on T i (i.e. for eacht ∈ T i there

existsth ∈ T ih with ‖t−th‖2 ≤ h) and in caseh = 0, i ∈ {1, . . . , l} the setsT ih, T i coincides;

(8) for eachi ∈ {1, . . . , l} and each compact setS ⊂ Rn there exists a constantLti,S with

|gi(x, t1)− gi(x, t2)| ≤ Lti,S‖t1 − t2‖2

for all x ∈ S and all t1, t2 ∈ T i;

Page 41: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

4.3 Extension to general convex problems 37

(9) for eachi ∈ {1, . . . , l} and each compact set

S ⊂ M0 :={x ∈ Rn : max

t∈T igi(x, t) < 0 (i = 1, . . . , l)

}a constantCi,S <∞ with

Ci,S ≥ maxx∈S

∣∣∣∣∣∣ 1maxt∈T i

gi(x, t)

∣∣∣∣∣∣can be computed such thatS′ ⊂ S ⊂ M0 impliesCi,S′ ≤ Ci,S ;

(10) for eachi ∈ {1, . . . , l}, eachx ∈ Rn and eacht ∈ T i an element of∂f(x) and an element of

the subdifferential ofgi(·, t) in x can be computed.

These are direct generalizations of those in Assumption 4.1. The modified algorithm now reads:

Algorithm 4.12

• Givenµ1 > 0 andx0 ∈M0.

• For i := 1, 2, . . . :

- Setxi,0 := xi−1, selectεi,1 > 0 and definefi : M0 → R by

fi(x) := f(x)− µil∑

ν=1

ln(−maxt∈T ν

gν(x, t)).

- Fork := 1, 2, . . . :

(a) Selectri,k > 0 such that

Si,k := {x ∈ Rn : ‖x− xi,k−1‖∞ ≤ ri,k} ⊂ M0.

(b) Selecthνi,k ≥ 0 for ν = 1, . . . , l and definefi,k : M0 → R by

fi,k(x) := f(x)− µil∑

ν=1

ln

− maxt∈T ν

hνi,k

gν(x, t)

whereT νhνi,k

fulfilling Assumption 4.11(7).

(c) Selectβi,k ≥ 0 and computexi,k as approximate solution of

minimize fi(x) s.t. x ∈ Si,k, Ax = b

such that

fi,k(xi,k)− minx∈Si,k

fi(x) ≤εi,k2

+ lβi,k

andfi,k(xi,k) ≤ fi,k(xi,k−1) are true.

Page 42: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

38 4 A logarithmic barrier method for convex semi-infinite optimization problems

(d) ∗ If fi,k(xi,k−1) − fi,k(xi,k) ≤ εi,k/2 andf(xi,k−1) ≤ f(x0) + 2µi then set

xi := xi,k−1, Si := Si,k, ri := ri,k, εi := εi,k, hνi := hνi,k (ν = 1, . . . , l), stop

inner loop;

∗ if fi,k(xi,k−1) − fi,k(xi,k) ≤ εi,k/2 andf(xi,k−1) > f(x0) + 2µi then set

εi,k+1 := εi,k/2, continue inner loop;

∗ if fi,k(xi,k−1)− fi,k(xi,k) > εi,k/2 setεi,k+1 := εi,k, continue inner loop.

- Select0 < µi+1 < µi.

The practicability of this method can be shown analogously to the corresponding part in Section

4.1. There are only some changes based on the different structure ofM0, i.e. we cannot assume

anymore thatM0 is open. But it is still a relatively open set and that suffices to prove the most used

results while in that cases where an open set is required we can replaceM0 byM0. Further changes

are caused by the fact that we now deal with more than one inequality constraint, for instance we

assume nowβi,k ≥ µiLtν,Si,k

Cν,Si,khνi,k for eachν = 1, . . . , l. Then a convergence analysis can be

done analogously to Section 4.2 and we obtain the following main result (cf. Theorem 4.9).

Theorem 4.13 Let Assumption 4.11 be fulfilled. Moreover, let{ri}, {δi} be positive sequences.

Additionally, letR > 0, {qi} ⊂ (0, 1) be given and assume that

µiLtν,Si,kCν,Si,kh

νi,k ≤ βi,k ≤ qki δi

holds for alli ∈ N, all k appearing in the outer stepi andν = 1, . . . , l. Furthermore, assume that

(i) limi→∞

µi = 0;

(ii) ri ≤ ri,k ≤ R for all i, k;

(iii) limi→∞

εi/ri = 0;

(iv) limi→∞

δi/ri = 0.

Then Algorithm 4.12 generates a sequence{xi}, which has at least one accumulation point and

each accumulation point is an optimal solution of(1.1).

Page 43: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

Chapter 5

Regularization of the logarithmicbarrier approach

In the previous chapter we mainly considered semi-infinite problems of type (2.10)

minimize f(x) s.t. x ∈M ={z ∈ Rn : max

t∈Tg(z, t) ≤ 0

}under Assumption 4.1. Particularly we assumed in Assumption 4.1(6) that the solution set of the

given problem is compact. But this assumption excludes a lot of problems from being solved with

the presented method. Thus the goal of this chapter is to discuss a numerical method even for

such problems. This can be combined with an improvement of the convergence quality (e.g. rate of

convergence) for problems fulfilling Assumption 4.1.

Let us remark that we consider again problems of type (2.10) for describing and analyzing the

method in detail. But, of course, as stated in the final section, it is possible to transfer the approach

to general problems of type (1.1).

In the first section the method is introduced, while the following sections contain several con-

vergence results including results on the rate of convergence for the values of the objective function

as well as the computed iterates.

5.1 A regularized logarithmic barrier method for convex semi-infiniteproblems

As stated above we want to drop the assumption of the compactness of the solution set of (2.10). But

this compactness (in particular the boundedness) is directly used in the proofs of the basic results

Lemma 2.2 and Theorem 2.3 as well as Theorem 4.9. Obviously this assumption is essential for the

results of the previous chapter and it turns out that in fact we cannot use the presented Algorithm 4.2

for solving problems of the form (2.10) without the assumption of the compactness. For instance,

considering the trivial problem

minimize f(x) ≡ 0 s.t. x ∈ R, xt ≤ 0 (t ∈ [0, 1])

39

Page 44: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

40 5 Regularization of the logarithmic barrier approach

we will obtain a fast decreasing sequence{xi} by Algorithm 4.2 where convergence of any sub-

sequence is not detectable. Therefore we have to look for another method to treat semi-infinite

problems under the following weaker assumptions.

Assumption 5.1 The Assumptions 4.1(1)-(5) and (7)-(10) are assumed to be valid.1 Moreover, it is

assumed that

(6)′ the set of optimal solutionsMopt of (2.10)is nonempty.

One approach to attack problems with an unbounded set of optimal solutions is to use regularization

techniques on the original problem. That means the given problem is transformed into a sequence

of problems with a bounded set of optimal solutions (or ideally with unique optimal solutions).

Several approaches exist for this transformation and are discussed in detail in a couple of papers

and monographs mainly in the context of ill-posed problems (see, e.g. Bakushinsky, Goncharsky

[3] and Kaplan, Tichatschke [24]). Some promising approaches like the Tichonov-regularization

and the Proximal Point method are based on the well-known fact that a strongly convex, continuous

function has a unique minimizer on a closed set. Thus the idea is to transform the convex objective

functionf into a strongly convex function.

As it is already stated, one approach in this context is the Tichonov-regularization, where we

consider auxiliary problems of the form

minimize f(x) +α

2‖x‖22 s.t. x ∈M

with positive parameterα. To obtain an optimal solution of the original problem we have to solve

a sequence of such auxiliary problems whereby the parameterα has to converge to zero (see, e.g.

Theorem 6.4 in Poljak [39]). Thus the regularization effect by means of the added quadratic term is

getting smaller and smaller. In fact it vanishes from the numerical point of view ifα falls below a

certain value depending on the machine precision.

Therefore, in the sequel we consider the proximal point technique which was introduced by

Martinet [32, 33] and extensively studied by Rockafellar [46, 47]. In this approach the attempt is

made to keep the positive properties (like unique solvability) and remove the described negative

properties of the Tichonov-regularization. Both is achieved by applying a different quadratic term

in the auxiliary problems such that we now consider the problems

minimize f(x) +s

2‖x− a‖22 s.t. x ∈M (5.1)

with prox-parameters and so-called proximal pointa. In order to obtain an optimal solution of the

original problem one has to solve a sequence of auxiliary problems of this kind with the proximal

point in each step given by the solution of the previous step. Furthermore, it turns out that the

regularization parameters is not required to converge to zero (see, e.g., Rockafellar [46, 47]).

In the case of convex semi-infinite problems Kaplan, Tichatschke [26] suggest to combine the

proximal point technique with the method of outer approximation which is a discretization strategy1In the sequel we assume the assumptions to be enumerated as in Assumption 4.1.

Page 45: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

5.1 A regularized logarithmic barrier method for convex semi-infinite problems 41

of the compact setT . But we want to avoid such an outer approximation and the key for it is the

observation that each auxiliary problem of type (5.1) is also a convex semi-infinite problem. These

auxiliary problems fulfill slightly differing assumptions as the given problem, namely they fulfill

Assumption 4.1 if Assumption 5.1 is valid for the original problem. The Assumptions 4.1(1)-(5)

and (7)-(10) can be simply derived from the corresponding parts in Assumption 5.1 keeping in mind

that an element of the subdifferential of the objective function in (5.1) in a fixedx ∈ Rn is given by

the vectors(x − a) added to an arbitrary element of the subdifferential off in x. Moreover, (6) is

enforced by the additional quadratic term in the objective function of (5.1).

Consequently we could solve each auxiliary problem of type (5.1) with Algorithm 4.2 if As-

sumption 5.1 holds for the given semi-infinite problem. But as Algorithm 4.2 typically terminates

with only an approximate solution anyway there is little sense in solving each auxiliary problem of

the sequence with an accuracy as high as possible. In particular we suggest to realize only the inner

loop of Algorithm 4.2 for each problem of type (5.1) to compute an approximate solution of it with

fixed barrier parameter, which is then used as the new proximal point.

A practical realization of such a step requires the predetermination of the barrier and the prox

parameter. From the classical logarithmic barrier approach it is known that the barrier parameter has

to converge to zero, e.g. by reducing it from step to step. But, due to the fact that the conditioning of

the barrier problems is getting worse with decreasing the barrier parameter, it makes sense to keep

this parameter fixed for a couple of steps. In order to permit a dynamical control the choice of the

barrier parameter is made dependent on the progress of the iterates in the last step. To avoid side

effects which can influence this choice we keep the prox-parameters constant as long as the barrier

parameter is not changed. Merely the proximal point is updated more frequently. Altogether we

obtain a so-called multi-step-regularization approach (cf., e.g., Kaplan, Tichatschke [24–27]).

Algorithm 5.2

• Givenµ1 > 0, x0 ∈M0, σ1 > 0 ands1 with 0 < s ≤ s1 ≤ s.

• For i := 1, 2, . . . :

– Setxi,0 := xi−1.

– For j := 1, 2, . . . :

∗ Setxi,j,0 := xi,j−1, selectεi,j > 0 and defineFi,j :M0 → R by

Fi,j(x) := f(x)− µi ln(−max

t∈Tg(x, t)

)+si2‖x− xi,j−1‖22. (5.2)

∗ Fork := 1, 2, . . . :

(a) Selectri,j,k > 0 such that

Si,j,k := {x ∈ Rn : ‖x− xi,j,k−1‖∞ ≤ ri,j,k} ⊂ M0.

(b) Selecthi,j,k ≥ 0 and defineFi,j,k :M0 → R by

Fi,j,k(x) := f(x)− µi ln

(− maxt∈Thi,j,k

g(x, t)

)+si2‖x− xi,j−1‖22

Page 46: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

42 5 Regularization of the logarithmic barrier approach

whereThi,j,k fulfills Assumption 5.1(7).

(c) Selectβi,j,k ≥ 0 and compute an approximate solutionxi,j,k of

minimize Fi,j(x) s.t. x ∈ Si,j,k (5.3)

such that

Fi,j,k(xi,j,k)− minx∈Si,j,k

Fi,j(x) ≤ εi,j2

+ βi,j,k (5.4)

andFi,j,k(xi,j,k) ≤ Fi,j,k(xi,j,k−1) are true.

(d) If

Fi,j,k(xi,j,k−1)− Fi,j,k(xi,j,k) ≤εi,j2

(5.5)

then setxi,j := xi,j,k−1, Si,j := Si,j,k, ri,j := ri,j,k and stop the loop ink,

otherwise continue with the loop ink.

∗ If ‖xi,j − xi,j−1‖2 ≤ σi then setxi := xi,j , ri := ri,j , j(i) := j and stop the loop

in j, otherwise continue with the loop inj.

– Select0 < µi+1 < µi, 0 < s ≤ si+1 ≤ s andσi+1 > 0.

Except for the stopping criterionf(xi,k−1) ≤ f(x0) + 2µi the inner loops ink of Algorithms

4.2 and 5.2 compare to each other. The additional rule is needed in Algorithm 4.2 as it does not

generate a bounded sequence per se. We will prove later that this behaviour is avoided automatically

in Algorithm 5.2 above. To ensure the practicability we have to transfer Lemma 4.3 explicitly to the

new situation.

Lemma 5.3 Let Assumption 5.1 be fulfilled. Leti, j, k be fixed andβi,j,k ≥ µiLtSi,j,kCSi,j,khi,j,k be

valid. Then Assumption 3.1 is fulfilled for problem(5.3)with Fi,j,k as an approximation ofFi,j and

ε = βi,j,k.

Proof: Due to the fact that Assumption 4.1(6) is not used in the proof of Lemma 4.3 we can apply

these results. For that purpose we replaceSi,k by Si,j,k andhi,k by hi,j,k. Then we obtain

0 ≤ maxt∈T

g(x, t)− maxt∈Thi,j,k

g(x, t) ≤ LtSi,j,khi,j,k (5.6)

0 ≤ Fi,j(x)− Fi,j,k(x) ≤ µiCSi,j,kLtSi,j,khi,j,k ≤ βi,j,k (5.7)

and

u(x)− µimaxt∈Thi,j,k g(x, t)

v(x) ∈ ∂βi,j,kfi(x)

analogously to (4.5), (4.6) and (4.8) if we useu(x) ∈ ∂f(x), v(x) ∈ ∂(

maxt∈Thi,j,k g(x, t))

and

the notationfi as in Section 4.1. Consequently Assumption 3.1(a) is already shown.

In order to show part (b) we regard

Fi,j(x) = fi(x) +si2‖x− xi,j−1‖22

Page 47: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

5.2 Convergence analysis 43

so that for allx ∈M0

∂βi,j,kFi,j(x) ⊃ ∂βi,j,kfi(x) + ∂(si

2‖x− xi,j−1‖22

)(5.8)

follows from Theorem XI.3.1.1 in Hiriart-Urruty, Lemarechal[21]. Furthermore,

∂(s

2‖x− xi,j−1‖22

)={si(x− xi,j−1)

}(5.9)

since this quadratic function is differentiable inx. Therefore we obtain

u(x)− µimaxt∈Thi,j,k g(x, t)

v(x) + si(x− xi,j−1) ∈ ∂βi,j,kFi,j(x) (5.10)

for all x ∈M0, particularly for allx ∈ Si,j,k ⊂M0, and Assumption 3.1(b) is fulfilled too.

Finally, Assumption 3.1(c) remains to show. The Lipschitz continuity ofFi,j on Si,j,k can be

established in the same manner as it is done in the proof of Lemma 4.3. From there we also know

that the first term of the subgradient (5.10), coming fromfi, is bounded above onSi,j,k. Additionally

the second termsi(x − xi,j−1) is simply bounded above by the definition ofSi,j,k. Therefore all

subgradients given by (5.10) are bounded above onSi,j,k which completes the proof. 2

In consequence of this lemma we know that the bundle method presented in Chapter 3 can also

be used to solve the auxiliary problems arising in Algorithm 5.2. As in the previous chapter we

can useβi,j,k = µiCSi,j,kLtSi,j,k

hi,j,k with predefinedhi,j,k as error level when applying the bundle

method.

Remark 5.4 If maxt∈T g(x, t) can be determined exactly for eachx we can sethi,j,k = 0. Then, as

stated in Remark 4.4 for the unregularized algorithm, some simplifications in Algorithm 5.2 as well

as in the analysis of it are possible. Particularly, the Assumptions 5.1(7) and (8) are not necessary in

that case. 2

5.2 Convergence analysis

In this section we want to show that Algorithm 5.2 leads to an optimal solution of problem (2.10)

under appropriate assumptions. We start with a closer look at the loop ink. Analogous to the result

for the finiteness of the loop ink of Algorithm 4.2 the following result holds.

Lemma 5.5 Let Assumption 5.1 be fulfilled. Furthermore, leti, j be fixed,δi,j > 0 andqi,j ∈ (0, 1)be given. If

µiLtSi,j,kCSi,j,khi,j,k ≤ βi,j,k ≤ q

ki,jδi,j (5.11)

is true for allk, then the loop ink of Algorithm 5.2 terminates after a finite number of steps.

Proof: The proof is analogous to part a) of the proof of Proposition 4.6. 2

At this point we want to analyze the consequences of the stopping criterion of the loop ink.

Page 48: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

44 5 Regularization of the logarithmic barrier approach

Lemma 5.6 Let Assumption 5.1 be fulfilled. Furthermore, leti, j be fixed andx be the unique

optimal solution of

minimize Fi,j(x) s.t. x ∈M0. (5.12)

Moreover, letxi,j,k−1, xi,j,k be generated by Algorithm 5.2 andβi,j,k ≥ µiLtSi,j,k

CSi,j,khi,j,k be

valid. If inequality(5.5) is true, then

0 ≤ Fi,j(xi,j,k−1)− Fi,j(x) ≤ max{

1,‖xi,j,k−1 − x‖∞

ri,j,k

}(εi,j + 2βi,j,k) (5.13)

and∥∥∥xi,j,k−1 − x∥∥∥∞≤∥∥∥xi,j,k−1 − x

∥∥∥2≤ max

2(εi,j + 2βi,j,k)si

,2(εi,j + 2βi,j,k)

siri,j,k

(5.14)

hold.

Proof: First, let us remark that Lemma 2.2 ensures the solvability of (5.12). This theorem can be

applied because (5.12) is a barrier problem for a minimization problem of type (5.1). Additionally

(5.12) is uniquely solvable sinceFi,j is strongly convex onM0.

Inequality (5.13) can be shown analogously as (4.11) in the proof of Lemma 4.5 so only the

second inequality needs to be proven.

Due to the strong convexity ofFi,j with modulussi/2 (in the sense of Definition A1.20 in

Kaplan, Tichatschke [24]) we have

Fi,j(λx+ (1− λ)y) ≤ λFi,j(x) + (1− λ)Fi,j(y)− si2λ(1− λ)‖x− y‖22

for all λ ∈ [0, 1] and allx, y ∈M0. Taking into account that

Fi,j(x) = infz∈M0

Fi,j(z) ≤ Fi,j(λx+ (1− λ)y)

for all λ ∈ [0, 1] and allx, y ∈M0 it follows that

Fi,j(x) ≤ λFi,j(x) + (1− λ)Fi,j(xi,j,k−1)− si2λ(1− λ)‖x− xi,j,k−1‖22

and

(1− λ)Fi,j(x) ≤ (1− λ)Fi,j(xi,j,k−1)− si2λ(1− λ)‖x− xi,j,k−1‖22

are true for allλ ∈ [0, 1]. Hence,

Fi,j(x) ≤ Fi,j(xi,j,k−1)− si2λ‖x− xi,j,k−1‖22

for all λ ∈ [0, 1) so that

si2‖x− xi,j,k−1‖22 ≤ Fi,j(xi,j,k−1)− Fi,j(x) (5.15)

follows with λ↗ 1. Using (5.13) one obtains

si2‖x− xi,j,k−1‖22 ≤ max

{1,‖xi,j,k−1 − x‖∞

ri,j,k

}(εi,j + 2βi,j,k).

Page 49: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

5.2 Convergence analysis 45

At this point we distinguish two cases. We first suppose that1 ≥ ‖xi,j,k−1 − x‖∞/ri,j,k. Then it

holdssi2‖x− xi,j,k−1‖22 ≤ (εi,j + 2βi,j,k)

and ∥∥∥xi,j,k−1 − x∥∥∥∞≤ ‖x− xi,j,k−1‖2 ≤

√2(εi,j + 2βi,j,k)

si. (5.16)

In the second case the inequality1 < ‖xi,j,k−1 − x‖∞/ri,j,k is supposed to be true. Then

si2‖x− xi,j,k−1‖22 ≤

‖xi,j,k−1 − x‖∞ri,j,k

(εi,j + 2βi,j,k) ≤‖xi,j,k−1 − x‖2

ri,j,k(εi,j + 2βi,j,k)

is valid. We conclude that

‖x− xi,j,k−1‖∞ ≤ ‖x− xi,j,k−1‖2 ≤2(εi,j + 2βi,j,k)

siri,j,k. (5.17)

Combining (5.16) and (5.17) completes the proof. 2

In the following we denote the Euclidean ball with radiusτ > 0 aroundxc ∈ Rn by Kτ (xc),i.e.

Kτ (xc) := {x ∈ Rn : ‖x− xc‖2 ≤ τ}.

Theorem 5.7 Let Assumption 5.1 be fulfilled. Furthermore, letτ ≥ 1 andxc ∈ Rn be chosen such

thatMopt∩Kτ/8(xc) 6= ∅. Letx∗ ∈Mopt∩Kτ/8(xc), x ∈M0∩Kτ (xc) andx0 ∈M0∩Kτ/4(xc)be fixed andδi,j > 0, qi,j ∈ (0, 1), αi > 0, t ∈ T (x), v ∈ ∂g(x, t) as well as

c ≥ ‖x− x∗‖2 and c3 := f(x)− f− + c0 + c1

with

f− ≤ minx∈M

f(x), c0 :=∣∣∣∣ln(−max

t∈Tg(x, t)

)∣∣∣∣ , c1 := ln(−max

t∈Tg(x, t) + 2‖v‖2

)be given. Moreover, assume that(5.11) is true for all i ∈ N, 1 ≤ j ≤ j(i) and all k occurring

in the outer loop(i, j) and that the controlling parameters of Algorithm 5.2 satisfy the following

conditions:

max

2(εi,j + 2δi,j)si

,2(εi,j + 2δi,j)

ri,jsi

≤ αi, (5.18)

0 < µi+1 ≤ µi < 1 for all i ∈ N, µ1 ≤ e−c3 , (5.19)

∞∑i=1

[(2µisi

(2| lnµi|+ ln τ)) 1

2

+ 2cµi + αi

]<τ

2(5.20)

and

σi >

(2µisi

(2| lnµi|+ ln τ) + 4ταi

) 12

+ αi. (5.21)

Then it holds

Page 50: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

46 5 Regularization of the logarithmic barrier approach

(1) the loop ink is finite for each(i, j);

(2) the loop inj is finite for eachi, i.e. j(i) <∞;

(3) ‖xi,j − xc‖2 < τ for all pairs (i, j) with 0 ≤ j ≤ j(i);

(4) the sequence{xi,j} = {x1,0, . . . , x1,j(1), x2,0, . . . , x2,j(2), x3,0, . . .} converges to an element

x∗∗ ∈Mopt ∩Kτ (xc).

Proof: Our first proposition follows immediately from Lemma 5.5. The other propositions will be

proven similarly to the proof of Theorem 1 in Kaplan, Tichatschke [27].

We first definezi = µix + (1 − µi)x∗. Due to0 < µi < 1, x ∈ M0 = int (M), x∗ ∈ Mand the fact thatM is convex one can inferzi ∈M0 with Theorem 6.1 in Rockafellar [45]. Then it

follows

−µi ln(−max

t∈Tg(zi, t)

)= −µi ln

(−max

t∈Tg(µix+ (1− µi)x∗, t)

)≤ −µi ln

(−µi max

t∈Tg(x, t)− (1− µi) max

t∈Tg(x∗, t)

)≤ −µi ln

(−µi max

t∈Tg(x, t)

)= −µi

(lnµi + ln

(−max

t∈Tg(x, t)

))≤ µi (| lnµi|+ c0) ,

(5.22)

because themax−function is convex and the logarithm increases monotonically. Furthermore, the

estimates

‖zi − x∗‖2 = µi‖x− x∗‖2 ≤ cµi (5.23)

and

f(zi) ≤ µif(x) + (1− µi)f(x∗) ≤ f(x∗) + µi(f(x)− f−) (5.24)

are obviously true. Additionally, this yields

maxt∈T

g(x, t) ≥ g(x, t) ≥ g(x, t) + vT (x− x) = maxt∈T

g(x, t) + vT (x− x)

for all x ∈ Rn sincev ∈ ∂g(x, t), t ∈ T (x). Consequently, using the Cauchy-Schwarz inequality

andx ∈ Kτ (xc), we obtain

0 < −maxt∈T

g(x, t) ≤ −maxt∈T

g(x, t) + 2τ‖v‖2

for all x ∈ Kτ (xc) ∩M0. Regarding the monotonicity of the logarithm andτ ≥ 1, this leads to

inf{−µi ln

(−max

t∈Tg(x, t)

): x ∈ Kτ (xc) ∩M0

}≥ −µi ln

(−max

t∈Tg(x, t) + 2‖v‖2τ

)≥ −µi(c1 + ln τ). (5.25)

Page 51: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

5.2 Convergence analysis 47

As in the previous chapter we introduce

fi(x) = f(x)− µi ln(−max

t∈Tg(x, t)

)for all x ∈M0. The inequalities (5.22), (5.24), (5.25) and the optimality ofx∗ show that

fi(zi) ≤ f(x)− µi ln(−max

t∈Tg(x, t)

)+ µi(c1 + ln τ) + µi(f(x)− f−) + µi (| lnµi|+ c0)

= fi(x) + µi(c3 + ln τ + | lnµi|) (5.26)

for all x ∈M0 ∩Kτ (xc). Combining this with (5.19) leads to

fi(zi) ≤ fi(x) + µi (2| lnµi|+ ln τ) (5.27)

for all x ∈M0 ∩Kτ (xc).Using the results above we can prove the second and third proposition of our theorem by induc-

tion. For that we assume:

(i) i0, j0 are kept fixed with0 ≤ j0 < j(i0),

(ii) j(i) <∞ if i < i0,

(iii) if we denote

xi,j := arg minx∈M0

Fi,j(x) and xi,j := arg min

x∈M

{f(x) +

si2‖x− xi,j−1‖22

},

the relations

xi,j = arg min

x∈M∩Kτ (xc)

{f(x) +

si2‖x− xi,j−1‖22

}, (5.28)

‖xi,j − xc‖2 < τ , ‖xi,j − xc‖2 < τ and‖xi,j − xc‖2 < τ hold for all pairs of indices

(i, j) ∈ Q0 :={

(i′, j′) : {i′ < i0, 0 < j′ ≤ j(i′)} ∨ {i′ = i0, 0 < j′ ≤ j0}}.

Let us remark thatxi,j ∈M0 as minimizing point ofFi,j exists due to Lemma 2.2. The existence of

xi,j ∈M as minimizer off(x) + si

2 ‖x−xi,j−1‖22 is ensured by the strong convexity and continuity

of this function on the nonempty and closed setM.

At this point we have to check (i)-(iii) for the starting valuesi0 = 1, j0 = 0, but this is easy: By

constructionj(1) > 0 so thati0 = 1, j0 = 0 fulfill the first assumption. The other two assumptions

are obvious by construction.

Using the stopping criterion of the loop ink of Algorithm 5.2, (5.11), (5.14), (5.18) as well as

the definition ofxi,j we deduce ∥∥xi,j − xi,j∥∥2≤ αi. (5.29)

Furthermore, taking the definitions ofxi,j andxi,j , (2.5) into account we can conclude

f(xi,j)

+si2

∥∥xi,j − xi,j−1∥∥2

2− f

(xi,j)− si

2

∥∥∥xi,j − xi,j−1∥∥∥2

2≤ µi. (5.30)

Page 52: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

48 5 Regularization of the logarithmic barrier approach

Additionally one can establish

si2

∥∥∥xi,j − xi,j∥∥∥2

2≤ f

(xi,j)

+si2

∥∥xi,j − xi,j−1∥∥2

2− f

(xi,j)− si

2

∥∥∥xi,j − xi,j−1∥∥∥2

2(5.31)

in the same manner as (5.15). Combining (5.30) and (5.31) we see

si2

∥∥∥xi,j − xi,j∥∥∥2

2≤ µi,

so that ∥∥∥xi,j − xi,j∥∥∥2≤√

2µisi. (5.32)

Using this and (5.29) we obtain ∥∥∥xi,j − xi,j∥∥∥2≤ αi +

√2µisi. (5.33)

Due toxi,j ∈M0 ∩Kτ (xc) estimate (5.27) implies

fi(zi) ≤ fi(xi,j) + µi (2| lnµi|+ ln τ) (5.34)

for all (i, j) ∈ Q0. In the sequel we distinguish the following cases

a) i < i0, 0 ≤ j < j(i)− 1 or i = i0, 0 ≤ j < j0,

b) i < i0, j = j(i)− 1 and

c) i = i0, j = j0 + 1.

ad a) In this case we obtain∥∥xi,j+1 − zi∥∥2

2−∥∥xi,j − zi∥∥2

2≤ −

∥∥xi,j+1 − xi,j∥∥2

2+

2si

(fi(zi)− fi(xi,j+1)

)≤ −

∥∥xi,j+1 − xi,j∥∥2

2+

2µisi

(2| lnµi|+ ln τ)(5.35)

by using Proposition 8.3 in Kaplan, Tichatschke [24] and (5.34). Taking (5.21), (5.29) and the

stopping criterion of the loop inj of Algorithm 5.2 into account we conclude∥∥xi,j+1 − xi,j∥∥

2≥∥∥xi,j+1 − xi,j

∥∥2−∥∥xi,j+1 − xi,j+1

∥∥2> σi − αi > 0. (5.36)

and we have ∥∥xi,j+1 − zi∥∥2

2−∥∥xi,j − zi∥∥2

2≤ −ε2

i + γi < 0 (5.37)

with εi = σi − αi andγi = 2µi(2| lnµi|+ ln τ)/si.Moreover, regarding‖xi,j − xc‖2 < τ and‖zi − xc‖ < τ , the estimate∥∥xi,j+1 − zi

∥∥2−∥∥xi,j − zi∥∥

2<(2∥∥xi,j − zi∥∥

2

)−1 (−ε2i + γi

)≤ 1

4τ(−ε2

i + γi)

(5.38)

holds. Together with (5.21) and (5.29) we obtain∥∥xi,j+1 − zi∥∥

2−∥∥xi,j − zi∥∥

2<

14τ(−ε2

i + γi)

+ αi < 0. (5.39)

Page 53: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

5.2 Convergence analysis 49

ad b) Now we assumei < i0, j = j(i)− 1.

In this case we can combine (5.27), (5.29) and the implications of Proposition 8.3 in Kaplan,

Tichatschke [24] to see that∥∥∥xi,j(i) − zi∥∥∥2−∥∥∥xi,j(i)−1 − zi

∥∥∥2≤∥∥∥xi,j(i) − xi,j(i)−1

∥∥∥2−∥∥∥xi,j(i)−1 − zi

∥∥∥2

+ αi

≤(

2si

(fi(zi)− fi(xi,j(i))

)) 12

+ αi

≤(

2µisi

(2| lnµi|+ ln τ)) 1

2

+ αi

=√γi + αi

(5.40)

holds. Summing the inequalities (5.39) w.r.t.j = 0, 1, . . . , j(i) − 2 for a fixedi < i0 and adding

(5.40) leads to ∥∥∥xi,j(i) − zi∥∥∥2−∥∥xi,0 − zi∥∥

2≤ √γi + αi, (5.41)

and together with (5.23) one has∥∥∥xi,j(i) − x∗∥∥∥2−∥∥xi,0 − x∗∥∥

2≤ √γi + αi + 2cµi. (5.42)

ad c) Now we assumei = i0, j = j0 + 1.

In this case we consider

xi0,j0+1 := arg minx∈M∩Kτ (xc)

{f(x) +

si02

∥∥x− xi0,j0∥∥2

2

}.

The non-expansivity of the prox-mapping (see, e.g. Rockafellar [45]) yields∥∥xi0,j0+1 − x∗∥∥

2≤∥∥xi0,j0 − x∗∥∥

2. (5.43)

Using this, (5.23) and (5.39) fori = i0, 0 ≤ j < j0 we obtain∥∥xi0,j0+1 − x∗∥∥

2≤∥∥xi0,j0 − zi0∥∥

2+ cµi0

≤∥∥xi0,0 − zi0∥∥

2+ cµi0

≤∥∥xi0,0 − x∗∥∥

2+ 2cµi0 .

If i0 > 1 this leads to ∥∥xi0,j0+1 − x∗∥∥

2≤∥∥∥xi0−1,j(i0−1) − x∗

∥∥∥2

+ 2cµi0 .

Now the successive application of (5.42) gives

∥∥xi0,j0+1 − x∗∥∥

2≤∥∥x1,0 − x∗

∥∥2

+i0−1∑k=1

(√γk + αk + 2cµk) + 2cµi0 . (5.44)

As we assumed that‖x∗−xc‖2 ≤ τ/8 and‖x1,0−xc‖2 < τ/4 we can now assemble (5.19), (5.20)

and (5.44) to get ∥∥xi0,j0+1 − xc∥∥

2< τ − αi0 −

√γi0 < τ − αi0 −

√2µi0si0

. (5.45)

Page 54: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

50 5 Regularization of the logarithmic barrier approach

We see that∥∥xi0,j0+1 − xc

∥∥2< τ and due to the strong convexity off + si0

2

∥∥· − xi0,j0∥∥2

2we can

deduce thatxi0,j0+1 must actually be identical toxi0,j0+1. But then the estimates (5.32) and (5.33)

imply∥∥xi0,j0+1 − xc

∥∥2< τ as well.

So far we have proven that Assumption (iii) is also true fori = i0, j = j0 + 1. It still remains

to prove thatj(i0) < ∞ holds. In order to do so we sum up the inequalities (5.39) to an arbitrary

j ≤ j(i0)− 1 and obtain∥∥∥xi0,j − zi0∥∥∥2<∥∥xi0,0 − zi0∥∥

2+ j

(14τ(−ε2

i0 + γi0)

+ αi0

).

Dividing by 14τ

(−ε2

i0+ γi0

)+ αi0 we get an upper bound forj:

j < −∥∥xi0,0 − zi0∥∥

2

(14τ(−ε2

i0 + γi0)

+ αi0

)−1

<∞. (5.46)

Thus we have shown the induction statements to hold fori0, j0 + 1 if j0 < j(i0). But the case

j0 = j(i0) is equivalent to the case(i0 + 1, 0) and so the induction holds for all possible indices

(i0, j0). As a consequence of this the second and third proposition of the theorem are proven.

It remains to prove the convergence of the generated sequence{xi,j} to an optimal solution of

the given semi-infinite problem (2.10). Let an arbitrary element ofMopt ∩Kτ (xc) be given byx.

Defining

zi = x+ (1− µi)(x− x),

we can show‖zi − x‖2 ≤ 2τµi similar to (5.23) and analogous results to (5.41) and (5.42) withzi

instead ofzi andx instead ofx∗. Additionally, we obtain from (5.20)

∞∑i=1

√γi <∞,

∞∑i=1

µi <∞ and∞∑i=1

αi <∞

and the convergence of{∥∥xi,0 − x∥∥

2

}is ensured by Lemma 2.2.2 in Poljak [39]. Moreover, the

results (5.26), (5.35), (5.39) and (5.40) remain true if we usezi instead ofzi and∥∥xi,j − zi∥∥2<∥∥xi,0 − zi∥∥

2,

∥∥xi+1,0 − zi∥∥

2≤ √γi + αi +

∥∥xi,j − zi∥∥2

for all i and0 < j < j(i). Sincezi, x ∈ Kτ (xc) this leads to∥∥xi+1,0 − x∥∥

2−√γi − αi − 4τµi ≤

∥∥xi,j − x∥∥2<∥∥xi,0 − x∥∥

2+ 4τµi,

hence the sequence{∥∥xi,j − x∥∥

2

}converges. Furthermore, regarding (5.29) andlimi→∞ αi = 0

which is enforced by (5.20), it is clear that{∥∥xi,j − x∥∥

2

}converges to the same limit point.

Due tox, x ∈ Kτ (xc) and0 < µi < 1 for all i ∈ N we havezi ∈ Kτ (xc) for all i ∈ N as well

as ∥∥xi,j−1 − zi∥∥

2≤∥∥xi,j−1 − x

∥∥2

+ 2τµi

for all pairs(i, j) with 1 ≤ j ≤ j(i) and∥∥xi,j − zi∥∥2≥∥∥xi,j − x∥∥

2− 2τµi

Page 55: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

5.2 Convergence analysis 51

for all pairs(i, j) with 0 ≤ j ≤ j(i). Consequently we obtain∥∥xi,j−1 − zi∥∥2

2≤∥∥xi,j−1 − x

∥∥2

2+ 8τ2µi + 4τ2µ2

i

for all pairs(i, j) with 1 ≤ j ≤ j(i) and∥∥xi,j − zi∥∥2≥∥∥xi,j − x∥∥2

2− 8τ2µi − 4τ2µ2

i

for all pairs(i, j) with 0 ≤ j ≤ j(i). Additionally the modified estimates (5.26)

fi(zi) ≤ fi(x) + µi(c3 + ln τ + | lnµi|)

for all x ∈M0 ∩Kτ (xc) and (5.35)∥∥xi,j − zi∥∥2

2−∥∥xi,j−1 − zi

∥∥2

2≤ 2si

(fi(zi)− fi(xi,j)

)allow to infer∥∥xi,j−1 − x

∥∥2

2−∥∥xi,j − x∥∥2

2≥ 2si

(fi(xi,j)− fi(x)− µi(c3 + ln τ + | lnµi|)

)− 16τ2µi − 8τ2µ2

i

for all x ∈M0 ∩Kτ (xc). Then, regardingxi,j ∈M0 ∩Kτ (xc) and estimate (5.25), we obtain∥∥xi,j−1 − x∥∥2

2−∥∥xi,j − x∥∥2

2≥ 2si

(f(xi,j)− fi(x)− µi(c1 + ln τ)

)− 2µi

si(c3 + ln τ + | lnµi|)− 8τ2µi(2 + µi).

(5.47)

Furthermore, we havelimi→∞ fi(x) = f(x) for each fixedx ∈M0 soµi → 0 andsi ≤ s give

lim supi→∞

(max

1≤j≤j(i)

(f(xi,j)− f(x)

))≤ 0 (5.48)

for each fixedx ∈M0 ∩Kτ (xc).Now letx∗∗ be an accumulation point of the sequence{xi,j}. Such an accumulation point exists

sincexi,j ∈ Kτ (xc) ∩M for all pairs(i, j). Regarding (5.29) andlimi→∞ αi = 0 it follows that

x∗∗ is also an accumulation point of the sequence{xi,j}. Further we obtainx∗∗ ∈ M ∩ Kτ (xc)since the setsM andKτ (xc) are closed. For eachx ∈ M0 ∩ Kτ (xc) estimate (5.48) establishes

f(x) as an upper bound forf(x∗∗) so that we deduce

f(x∗∗) ≤ inf {f(x) : x ∈M0 ∩Kτ (xc)} . (5.49)

ObviouslyM∩Kτ (xc) is the closure ofM0∩Kτ (xc). Furtherx∗ ∈Mopt∩Kτ (xc) such that (5.49)

impliesf(x∗∗) ≤ f(x∗) resp.x∗∗ ∈ Mopt ∩Kτ (xc). Consequently, regarding that{∥∥xi,j − x∥∥

2

}converges for eachx ∈Mopt ∩Kτ (xc), the sequence

{∥∥xi,j − x∗∗∥∥2

}converges to zero. Thus the

sequence{xi,j} converges tox∗∗ ∈Mopt. 2

Remark 5.8 If maxt∈T g(·, t) is bounded below on the feasible setM of (2.10), i.e. there exists a

(nonpositive) constantd > −∞ with d ≤ maxt∈T g(x, t) for all x ∈M, one obtains

inf{−µi ln

(−max

t∈Tg(x, t)

): x ∈ Kτ (xc)

}≥ −µi ln(−d).

Page 56: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

52 5 Regularization of the logarithmic barrier approach

Consequently, using this estimate instead of (5.25) in the proof above, the conditions on the pa-

rameter of Algorithm 5.2 in Theorem 5.7 can be simplified in the considered case. In particular,c3

can be changed intoc3 = f(x) − f− + c0 − ln(−d) and in (5.20) and (5.21) the termln τ can be

dropped. Thus the left-hand side of the modified estimate (5.20) does not depend on (the unknown)

τ . Therefore one could choose the value ofτ after determining{µi}, {αi} and{si}. Finally, the

value ofσi can be fixed such that (5.21) holds. Altogether the described procedure is much easier

than the simultaneous determination of all parameters in the general case. 2

Remark 5.9 The conditions on the parameters of the method require their separate adjustment to

each example, which can be a very fragile task when applying the multi-step procedure. In case

of using the one-step procedure parameters according to Theorem 5.7 are easily chosen. The one-

step procedure is given ifj(i) = 1 for eachi, which can be ensured by choosingσi sufficiently

large2. Then (5.21) is automatically satisfied for each fixedτ ≥ 1. Furthermore, (5.20) holds for all

sufficiently large values ofτ if one guarantees that

∞∑i=1

(µi| lnµi|

si

) 12

<∞ and∞∑i=1

αi <∞.

Consequently, (5.20) and (5.21) can be replaced by the given conditions above andτ , σi need not to

be specified explicitly. 2

At the end of this section an estimate of the difference between the current value of the objective

function f at the end of an outer step and its minimal valuef∗ onM is established (cf. Kaplan,

Tichatschke [25, 27]).

Lemma 5.10 Let the assumptions of Theorem 5.7 be satisfied and letf be Lipschitz continuous with

modulusL onKτ (xc).3 Then

f(xi)− f∗ ≤

(98τsi + L

)(√2µisi

+ αi

)+

98τsiσi

holds for alli ∈ N.

Proof: Let i be fixed and0 ≤ j < j(i) be arbitrarily given. In the proof of Theorem 5.7 we defined

xi,j+1 = arg min

x∈M

{f(x) +

si2

∥∥x− xi,j∥∥2

2

}.

The affiliationxi,j+1 ∈ Kτ (xc) has already been shown. SinceM∩Kτ (xc) is obviously convex

(1− λ)xi,j+1 + λx∗ ∈M∩Kτ (xc) for all λ ∈ [0, 1]. The optimality ofxi,j+1 gives

f(

(1− λ)xi,j+1+ λx∗)

+si2

∥∥∥(1− λ)xi,j+1+ λx∗ − xi,j∥∥∥2

2≥ f

(xi,j+1

)+si2

∥∥∥xi,j+1 − xi,j∥∥∥2

2

so that, regarding the convexity off , for all λ ∈ (0, 1]

0 ≤ λf(x∗)− λf(xi,j+1

)+si2λ2∥∥∥x∗ − xi,j+1

∥∥∥2

2+ λsi

(x∗ − xi,j+1

)T (xi,j+1 − xi,j

)2Of course, when one actually applies the multi-step approach large values ofσi must be avoided.3Due tof(x) ∈ R for eachx ∈ Kτ (xc), the existence of a Lipschitz constantL is ensured by Theorem 24.7 in

Rockafellar [45].

Page 57: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

5.3 Rate of convergence 53

and

f(xi,j+1

)− f(x∗) ≤ si

(x∗ − xi,j+1

)T (xi,j+1 − xi,j

)+si2λ∥∥∥x∗ − xi,j+1

∥∥∥2

2.

Taking the limitλ↘ 0 combined with the Cauchy-Schwarz inequality leads to

f(xi,j+1

)− f(x∗) ≤ si

(x∗ − xi,j+1

)T (xi,j+1 − xi,j

)≤ si

∥∥∥x∗ − xi,j+1∥∥∥

2

(∥∥∥xi,j+1 − xi,j+1∥∥∥

2+∥∥xi,j+1 − xi,j

∥∥2

).

and using the Lipschitz continuity off

f(xi,j+1

)− f(x∗) ≤

∥∥∥xi,j+1 − xi,j+1∥∥∥

2

(L+ si

∥∥∥x∗ − xi,j+1∥∥∥

2

)+ si

∥∥∥x∗ − xi,j+1∥∥∥

2

∥∥xi,j+1 − xi,j∥∥

2.

In view of (5.33) and∥∥∥x∗ − xi,j+1∥∥∥

2≤ ‖x∗ − xc‖2 +

∥∥∥xi,j+1 − xc∥∥∥

2≤ τ

8+ τ =

98τ

we obtain

f(xi,j+1

)− f(x∗) ≤

(98τsi + L

)(αi +

√2µisi

)+

98τsi∥∥xi,j+1 − xi,j

∥∥2,

so that our proposition follows w.r.t.∥∥xi,j(i) − xi,j(i)−1

∥∥2≤ σi, xi = xi,j(i) andf(x∗) = f∗. 2

5.3 Rate of convergence

In the following sections we analyze further convergence properties of Algorithm 5.2 with regard to

the rate of convergence based on results of Kaplan, Tichatschke [25, 27]. For that we consider the

sequence{xi,j} instead of the generated sequence{xi,j} whereby

xi,j = arg minx∈M0

Fi,j(x)

is defined as in the proof of Theorem 5.7. That means we consider the sequence of the exact minima

of Fi,j instead of the computed approximate minima. However, based on results for the exact minima

we can also achieve results for the approximate minima, e.g. by using (5.29).

First the value ofmaxt∈T g(xi,j , t) is estimated.

Lemma 5.11 Let the assumptions of Theorem 5.7 be satisfied. Then for eachi and1 ≤ j ≤ j(i)

−maxt∈T

g(xi,j) ≥ c4µi

holds with

c4 := −(µ1 + f(x)− f∗ + 2τ2s

)−1 maxt∈T

g(x, t)

andx defined in Theorem 5.7.

Page 58: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

54 5 Regularization of the logarithmic barrier approach

Proof: Let i, j be arbitrarily given with1 ≤ j ≤ j(i). Due toxi,j ∈ M0 = dom (Fi,j) Theorem

23.1 in Rockafellar [45] ensures the existence of the directional derivativeF ′i,j(xi,j ; d) for each

d ∈ Rn. SinceFi,j attains its minimal value atxi,j and sinceM0 is open we obtainF ′i,j(xi,j ; d) ≥ 0

for eachd ∈ Rn so that0 ∈ ∂Fi,j(xi,j)

follows from Theorem 23.2 in Rockafellar [45]. From (5.8)

and (5.9) we already know

∂Fi,j(xi,j)⊃ ∂fi

(xi,j)

+{si(xi,j − xi,j−1

)}.

Regarding

xi,j ∈M0 = ri (dom (fi)) ∩ ri(

dom(si

2

∥∥· − xi,j−1∥∥2

2

)),

Theorem 23.8 in Rockafellar [45] even leads to

∂Fi,j(xi,j)

= ∂fi(xi,j)

+{si(xi,j − xi,j−1

)}.

Moreover, analogous to (2.7) in the proof of Theorem 2.3, one obtains

∂fi(xi,j)

= ∂f(xi,j)

+ µi1

−maxt∈T g(xi,j , t)∂

(maxt∈T

g(xi,j , t)),

hence

∂Fi,j(xi,j)

= ∂f(xi,j)

+µi

−maxt∈T g(xi,j , t)∂

(maxt∈T

g(xi,j , t))

+{si(xi,j − xi,j−1

)},

i.e. there existuf ∈ ∂f(xi,j) andug ∈ ∂(maxt∈T g(xi,j , t)

)with

uf −µi

maxt∈T g(xi,j , t)ug + si

(xi,j − xi,j−1

)= 0

and multiplication with(xi,j − x) leads to

uTf (xi,j − x) +µi

−maxt∈T g(xi,j , t)uTg (xi,j − x) + si(xi,j − xi,j−1)T (xi,j − x) = 0.

Using the properties of the subgradientsuf andug as well as the convexity of the norm we obtain

0 ≥ f(xi,j)− f (x) +

µi−maxt∈T g(xi,j , t)

(maxt∈T

g(xi,j , t)−maxt∈T

g(x, t))

+si2

(∥∥xi,j − xi,j−1∥∥2

2−∥∥x− xi,j−1

∥∥2

2

),

so that we can conclude

µi−maxt∈T g(xi,j , t)

(maxt∈T

g(xi,j , t)−maxt∈T

g(x, t))≤ f(x)− f∗ +

si2

∥∥x− xi,j−1∥∥2

2

and usingx, xi,j−1 ∈ Kτ (xc) gives

µi−maxt∈T g(xi,j , t)

(maxt∈T

g(xi,j , t)−maxt∈T

g(x, t))≤ f(x)− f∗ + 2τ2s.

Page 59: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

5.3 Rate of convergence 55

Now, regardingµi ≤ µ1, it is obvious that

−maxt∈T

g(xi,j , t) ≥ µi(−maxt∈T

g(x, t))(µ1 + f(x)− f∗ + 2τ2s

)−1

holds and the proof is complete. 2

We introduce

∆i,j := f(xi,j)− f∗

for eachi and1 ≤ j ≤ j(i). In order to complete this definition forj = 0 we setxi+1,0 := xi,j(i)

for eachi ∈ N as well asx1,0 := x1,0 = x0 such that∆i,0 can be defined as∆i,j above.

Theorem 5.12 Let the assumptions of Theorem 5.7 be satisfied. Moreover, assume that

µ1 ≤ −1c4

maxt∈T

g(x0) (5.50)

with c4 given as in Lemma 5.11. Additionally let a positive constantα with

α ≤(16sτ2

)−1, α sup

i,j∆i,j ≤

732

(5.51)

be given and assume that for eachi the constant

κi := µi(c1 + ln τ)− µi ln(

18c4µi

)+si2α2i +

74siαiτ (5.52)

satisfies

κi ≤ α

(∆1,0

1 + α∑i−1

k=1 j1(k)∆1,0

)2

, (5.53)

2κi ≤si2

(σi − αi)2 (5.54)

with j1(k) := max{1, 2j(k)− 2}.Then the estimate

∆i,j ≤ ∆1,0

(1 + α

(2j +

i−1∑k=1

j1(k)

)∆1,0

)−1

(5.55)

is true for all i ∈ N, 0 ≤ j < j(i) if ∆1,0 > 0 or x0 6∈ Mopt.

Proof: Let us denote

zi,j := arg minz∈Mopt∩Kτ (xc)

∥∥xi,j − z∥∥2

for eachi and0 ≤ j ≤ j(i). Thenzi,j(λ) := λzi,j + (1− λ)xi,j ∈M0 ∩Kτ (xc) for all λ ∈ [0, 1)andi, 0 ≤ j ≤ j(i) and we haveFi,j+1(xi,j+1) ≤ Fi,j+1(zi,j(λ)) for λ ∈ [0, 1) if j < j(i). Taking

Page 60: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

56 5 Regularization of the logarithmic barrier approach

the convexity off as well as (5.29) into account we obtain

Fi,j+1

(xi,j+1

)= f

(xi,j+1

)− µi ln

(−max

t∈Tg(xi,j+1, t)

)+si2

∥∥xi,j+1 − xi,j∥∥2

2

≤ Fi,j+1(zi,j(λ))

≤ λf(zi,j)

+ (1− λ)f(xi,j)− µi ln

(−max

t∈Tg(zi,j(λ), t)

)+si2(λ‖zi,j − xi,j)‖2 + αi

)2.

(5.56)

Using the convexity ofmaxt∈T g(·, t) and the inclusionzi,j ∈M, we have

maxt∈T

g(zi,j(λ), t) ≤ (1− λ) maxt∈T

g(xi,j , t)

such that we infer

−µi ln(−max

t∈Tg(zi,j(λ), t)

)≤ −µi ln

(−(1− λ) max

t∈Tg(xi,j , t)

).

for all pairs(i, j) with 1 ≤ j ≤ j(i) andλ ∈ [0, 1). Applying Lemma 5.11 the inequality

−µi ln(−max

t∈Tg(zi,j(λ), t)

)≤ −µi ln ((1− λ)c4µi) (5.57)

follows for all pairs(i, j) with 1 ≤ j ≤ j(i). Butxi,0 = xi−1,j(i−1) andj(i− 1) > 0 for eachi > 1so that

−µi ln(−max

t∈Tg(zi,0(λ), t)

)≤ −µi ln ((1− λ)c4µi−1)

follows w.r.t. Lemma 5.11. The monotonic decrease of{µi} leads to (5.57) again and regarding

(5.50) the estimate now holds for alli and0 ≤ j ≤ j(i).From the proof of Theorem 5.7 we know thatxi,j+1 ∈M0 ∩Kτ (xc) for all i and0 ≤ j < j(i).

Using (5.25) we therefore conclude

−µi ln(−max

t∈Tg(xi,j+1, t)

)≥ −µi(c1 + ln τ).

This together with (5.56), (5.57) andzi,j ∈Mopt yields

∆i,j+1 = f(xi,j+1)− f∗

≤ λ(f(zi,j)− f∗) + (1− λ)(f(xi,j)− f∗)

− µi ln(−max

t∈Tg(zi,j(λ), t)

)+ µi ln

(−max

t∈Tg(xi,j+1, t)

)+si2(λ‖zi,j − xi,j)‖2 + αi

)2 − si2

∥∥xi,j+1 − xi,j∥∥2

2

≤ (1− λ)∆i,j − µi ln ((1− λ)c4µi) + µi(c1 + ln τ)

+si2λ2‖zi,j − xi,j‖22 + siαiλ‖zi,j − xi,j‖+

si2α2i −

si2

∥∥xi,j+1 − xi,j∥∥2

2

(5.58)

Page 61: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

5.3 Rate of convergence 57

for all i and0 ≤ j < j(i). In view of zi,j , xi,j ∈ Kτ (xc) as well as the definition ofκi we obtain

0 ≤ ∆i,j+1 ≤ (1− λ)∆i,j + κi +si2λ2‖zi,j − xi,j‖22 −

si2

∥∥xi,j+1 − xi,j∥∥2

2, (5.59)

if λ ∈ [0, 7/8] which can be enforced by setting

λ = λi,j = min{

∆i,j

si‖zi,j − xi,j‖22,78

}. (5.60)

If λi,j equals7/8 (5.60) immediately leads to

si∥∥zi,j − xi,j∥∥2

2≤ 8

7∆i,j

and we can infer

∆i,j+1 ≤∆i,j

8+ κi +

716

∆i,j −si2

∥∥xi,j+1 − xi,j∥∥2

2

=916

∆i,j + κi −si2

∥∥xi,j+1 − xi,j∥∥2

2

(5.61)

from (5.59). Due to the second part of (5.51) this allows to conclude

∆i,j+1 ≤ ∆i,j − 2α∆2i,j + κi −

si2

∥∥xi,j+1 − xi,j∥∥2

2. (5.62)

But if λi,j < 7/8 holds we obtain

∆i,j+1 ≤ ∆i,j −∆2i,j

2si‖zi,j − xi,j‖22+ κi −

si2

∥∥xi,j+1 − xi,j∥∥2

2(5.63)

and now using the first part of (5.51) inequality (5.62) follows again. Consequently this estimate

holds for all pairs(i, j) with 0 ≤ j < j(i) making it the basis of the following induction proof.

Let us assume that (5.55) holds for a fixed pairi, j with j < j(i). This is obvious for the starting

indicesi = 1, j = 0. Now we distinguish three cases.

a) We first consider0 ≤ j < j(i)− 1. Thenj + 1 < j(i) and due to (5.21) as well as (5.36) we

havesi2

∥∥xi,j+1 − xi,j∥∥2

2>si2

(σi − αi)2 (5.64)

such that (5.54) leads to

κi −si2

∥∥xi,j+1 − xi,j∥∥2

2< 0.

Consequently, with (5.62) we obtain

∆i,j+1 ≤ ∆i,j − 2α∆2i,j .

Moreover, the trivial inequality

y − ϑy2 ≤ y

1 + ϑy(5.65)

Page 62: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

58 5 Regularization of the logarithmic barrier approach

is true for ally ≥ 0 with fixedϑ > 0 and the function y1+ϑy increases monotonically for nonnegative

y such that one can setϑ = 2α, y = ∆i,j . Then, with regard to the induction assumption, we infer

∆i,j+1 <∆i,j

1 + 2α∆i,j

≤ ∆1,0(1 + α

(2j +

∑i−1k=1 j

1(k))

∆1,0

)(1 + 2α ∆1,0

1+α(2j+∑i−1k=1 j

1(k))∆1,0

)=

∆1,0

1 + α(

2j + 2 +∑i−1

k=1 j1(k)

)∆1,0

and the induction statement holds.

b) In casej = 0, j(i) = 1 we havej1(i) = 1 and (5.62) leads to

∆i+1,0 = ∆i,1 ≤ ∆i,0 − 2α∆2i,0 + κi.

Furthermore, regarding the second part of (5.51), it holds

∆1,0

1 + α∑i−1

k=1 j1(k)∆1,0

≤ ∆1,0 ≤7

32α<

14α.

Since the functiony−2αy2 increases monotonically ify < 1/(4α), the induction assumption allows

to conclude

∆i+1,0 ≤∆1,0

1 + α∑i−1

k=1 j1(k)∆1,0

− 2α

(∆1,0

1 + α∑i−1

k=1 j1(k)∆1,0

)2

+ κi

such that

∆i+1,0 ≤∆1,0

1 + α∑i−1

k=1 j1(k)∆1,0

− α

(∆1,0

1 + α∑i−1

k=1 j1(k)∆1,0

)2

(5.66)

follows from (5.53). Using (5.65) again - this time withϑ = α, y = ∆1,0

1+α∑i−1k=1 j

1(k)∆1,0- the

combination with (5.66) andj1(i) = 1 leads to

∆i+1,0 ≤∆1,0(

1 + α∑i−1

k=1 j1(k)∆1,0

)(1 + α

∆1,0

1+α∑i−1k=1 j

1(k)∆1,0

)=

∆1,0

1 + α∑i−1

k=1 j1(k)∆1,0 + α∆1,0

=∆1,0

1 + α∑i

k=1 j1(k)∆1,0

such that the induction statement holds.

c) Finally let us consider the casej = j(i)− 1 with j(i) > 1. Then we have the inequalities

∆i,j(i)−1 ≤ ∆i,j(i)−2 − 2α∆2i,j(i)−2 + κi −

si2

∥∥∥xi,j(i)−1 − xi,j(i)−2∥∥∥2

2,

∆i+1,0 = ∆i,j(i) ≤ ∆i,j(i)−1 − 2α∆2i,j(i)−1 + κi

Page 63: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

5.4 Linear convergence 59

from (5.62). Coupling these we infer

∆i+1,0 ≤ ∆i,j(i)−2 − 2α∆2i,j(i)−2 − 2α∆2

i,j(i)−1 + 2κi −si2

∥∥∥xi,j(i)−1 − xi,j(i)−2∥∥∥2

2,

so that together with (5.54), (5.64) andα∆2i,j(i)−1 ≥ 0 the estimate

∆i,j(i) < ∆i,j(i)−2 − 2α∆2i,j(i)−2

holds. Thus we can conclude in analogy to case a) that

∆i+1,0 <∆1,0

1 + α(

2j(i)− 2 +∑i−1

k=1 j1(k)

)∆1,0

=∆1,0

1 + α∑i

k=1 j1(k)∆1,0

since2j(i)− 2 > 1 and the induction is complete. 2

5.4 Linear convergence

Theorem 5.12 establishes the important estimate (5.55) which holds for any problem keeping on to

Assumption 5.1. If we consider problems adhering to tighter assumptions it is possible to prove

linear convergence for the iterates as well as the values of the objective function. The condition to

use in our case is the following growth condition

infx∈M

f(x)− f∗

ρ2(x,Mopt)≥ d > 0 (5.67)

with

M := (M0 ∩Kτ (xc)) \Mopt, ρ(x,Mopt) := minz∈Mopt∩Kτ (xc)

‖x− z‖2.

This growth condition generalizes that of Rockafellar [47] which occurs in the context of proving

linear convergence of the iterates of an inexact proximal point method.

If dsi< 7

8 is true, (5.60) admitsλi,j = 7/8 as well asλi,j < 7/8 for all j with 0 ≤ j < j(i).If λi,j = 7/8 the inequality (5.61) is true, while in the caseλi,j < 7/8 the estimate (5.63) follows.

Then we have

λi,j =∆i,j

si‖zi,j − xi,j‖22and one can conclude

∆i,j+1 ≤(

1− d

2s

)∆i,j + κi −

si2

∥∥xi,j+1 − xi,j∥∥2

2

with regard to (5.67) andsi ≤ s.But if d

si≥ 7

8 is true (5.60) only admitsλi,j = 7/8 for all j with 0 ≤ j < j(i) which immediately

leads to (5.61).

Thus∆i,j , ∆i,j+1 always fulfill

0 ≤ ∆i,j+1 ≤ (1− d1) ∆i,j + κi −si2

∥∥xi,j+1 − xi,j∥∥2

2, (5.68)

Page 64: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

60 5 Regularization of the logarithmic barrier approach

if j < j(i) whered1 = min{

716 ,

d2s

}.

Using these preliminary remarks the linear convergence of the sequence{∆i,j} can be estab-

lished under the given growth condition.

Theorem 5.13 Let the assumptions of Theorem 5.7 be satisfied. Moreover, let(5.50) as well as

(5.67)be satisfied. Additionally assume that

κi ≤si(1− d1)2(2− d1)

(σi − αi)2, κi <d1

2∆1,0q

pi (5.69)

with pi =i−1∑k=1

j(k), q ∈[1− d1

2 , 1)

. Then

∆i,j ≤ ∆1,0qpi+j (5.70)

holds.

Proof: The proof is by induction again. The proposition is obviously true fori = 1, j = 0.

Thus we suppose that a fixedi andj < j(i) are given such that

∆k,j′ ≤ ∆1,0qpk+j′ (5.71)

holds for allk < i, 0 ≤ j′ ≤ j(k) andk = i, 0 ≤ j′ ≤ j. The conditionj < j(i) is not a restriction

because in casej = j(i) we consider the equivalent pairi+ 1, j = 0 < j(i+ 1).We distinguish three cases.

a) Supposej + 1 < j(i).

Combining∥∥xi,j+1 − xi,j

∥∥2> σi − αi, the first inequality in (5.69) and (5.68) we obtain

∆i,j+1 < (1− d1)∆i,j

and along (5.71) this implies

∆i,j+1 < ∆1,0qpi+j+1.

b) Supposej > 0, j + 1 = j(i).

Then the inequalities

∆i,j+1 ≤ ∆i,j(1− d1) + κi −si2

∥∥xi,j+1 − xi,j∥∥2

2,

∆i,j ≤ ∆i,j−1(1− d1) + κi −si2

∥∥xi,j − xi,j−1∥∥2

2

and∥∥xi,j − xi,j−1

∥∥2> σi − αi hold. Substituting the second in the first gives

∆i,j+1 < ∆i,j−1(1− d1)2 + κi(2− d1)− (1− d1)si2

(σi − αi)2,

leading to

∆i,j+1 < (1− d1)2∆i,j−1

if we consider the first inequality in (5.69). Hence,

∆i,j+1 < ∆1,0qpi+j+1

and the induction statement holds.

Page 65: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

5.4 Linear convergence 61

c) Supposej = 0, j(i) = 1.

Taking (5.71) and the second inequality in (5.69) into account we obtain

∆i,1 ≤ ∆1,0qpi(1− d1) +

d1

2∆1,0q

pi < ∆1,0qpi+1

from (5.68) and the proof is complete. 2

If the considered problem fulfills the growth condition (5.67) we can additionally prove the

linear convergence of the sequence{xi,j} to an element ofMopt.

For this purpose we definej(i) = 16τ2(σi − αi)−2 + 1 and

ζi =∞∑k=i

(√γk + αk + 4τµk) , (5.72)

for all i whereγk is given byγk = 2µksk

(2| lnµk|+ ln τ) as in the proof of Theorem 5.7.

Theorem 5.14 Let the assumptions of Theorem 5.13 be satisfied. Moreover, assume that

14τγi + αi <

18τ

(σi − αi)2, (5.73)

ζi ≤(

∆1,0

d

) 12

q12

(pi+j(i)) (5.74)

hold for eachi. Then the inequality

∥∥xi,j − x∗∗∥∥2≤ 3

(∆1,0

d

) 12

q12

(pi+j) (5.75)

is true for eachi and0 ≤ j < j(i), wherex∗∗ := limi→∞ xi,0 is an optimal solution of(2.10).

Proof: Let zi,j = arg minz∈Mopt∩Kτ (xc)

∥∥xi,j − z∥∥2

be given as in the proof of Theorem 5.12.

The inequality ∥∥xi,j − zi,j∥∥2≤(

∆i,j

d

) 12

(5.76)

is obviously true ifxi,j ∈Mopt, otherwise (5.76) holds due to (5.67).

In the sequel leti0, j0 be fixed with0 ≤ j0 < j(i0). From the proof of Theorem 5.7 inequality

(5.37) is known, i.e. ∥∥xi,j+1 − zi∥∥2

2−∥∥xi,j − zi∥∥2

2≤ −(σi − αi)2 + γi

holds for alli, 0 ≤ j < j(i)−1 with zi = x+(1−µi)(x∗−x). If we usezi = x+(1−µi)(zi0,j0−x)instead ofzi we can conclude∥∥xi,j+1 − zi

∥∥2

2−∥∥xi,j − zi∥∥2

2≤ −(σi − αi)2 + γi

analogously for alli and0 ≤ j < j(i)− 1. Furthermore it yields (cf. (5.39))∥∥xi,j+1 − zi∥∥

2−∥∥xi,j − zi∥∥

2<

14τ(−(σi − αi)2 + γi

)+ αi < 0 (5.77)

Page 66: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

62 5 Regularization of the logarithmic barrier approach

and (cf. (5.40)) ∥∥∥xi,j(i) − zi∥∥∥2−∥∥∥xi,j(i)−1 − zi

∥∥∥2≤ √γi + αi (5.78)

for all i and0 ≤ j < j(i)− 1. Summing up these inequalities we obtain∥∥∥xi,j(i) − zi∥∥∥2−∥∥xi,0 − zi∥∥

2≤ √γi + αi,

and together with∥∥zi − zi0,j0∥∥

2≤ 2µiτ andxi+1,0 = xi,j(i) the estimate∥∥xi+1,0 − zi0,j0∥∥

2−∥∥xi,0 − zi0,j0∥∥

2≤ √γi + αi + 4µiτ

follows. Summing these inequalities fori = i0 + 1, . . . , i′ − 1 with i′ > i0 + 1 we get∥∥∥xi′,0 − zi0,j0∥∥∥2≤∥∥xi0+1,0 − zi0,j0

∥∥2

+i′−1∑i=i0+1

(√γi + αi + 4µiτ) .

In combination with (5.77) and (5.78) this leads to∥∥∥xi′,0 − zi0,j0∥∥∥2≤∥∥xi0,j0 − zi0,j0∥∥

2+i′−1∑i=i0

(√γi + αi + 4µiτ) .

Moreover, limi→∞ xi,0 = limi→∞ x

i,0 follows from (5.29) andlimi→∞ αi = 0 is enforced by

(5.20). Thus, taking the limiti′ →∞ allows to conclude

∥∥x∗∗ − zi0,j0∥∥2≤∥∥xi0,j0 − zi0,j0∥∥

2+∞∑i=i0

(√γi + αi + 4µiτ) =

∥∥xi0,j0 − zi0,j0∥∥2

+ ζi0 .

Yielding∥∥xi0,j0 − x∗∗∥∥2≤∥∥xi0,s0 − vi0,j0∥∥

2+∥∥zi0,j0 − x∗∗∥∥

2≤ 2

∥∥xi0,s0 − zi0,j0∥∥2

+ ζi0

and we obtain ∥∥xi0,j0 − x∗∗∥∥2≤ 2

(∆i0,j0

d

) 12

+ ζi0 (5.79)

in combination with (5.76). We remember that estimate (5.46) gives

j(i0) < 2τ(

14τ

((σi0 − αi0)2 − γi0)− αi0)−1

+ 1

so thatj(i0) < j(i0) follows in view of (5.73). Then relation (5.74) gives

ζi0 ≤(

∆1,0

d

) 12

q12

(pi+j(i0))

and along with (5.70) and (5.79) we can deduce

∥∥xi0,j0 − x∗∗∥∥2≤ 3

(∆1,0

d

) 12

q12

(pi+j0).

Becausei0 andj0 were chosen arbitrarily the proposition is proven. 2

Page 67: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

5.5 Extension to general convex problems 63

Corollary 5.15 Let the assumptions of Theorem 5.14 be satisfied. Then

∥∥xi,j − x∗∗∥∥2≤ 4

(∆1,0

d

) 12

q12

(pi+j)

holds for alli and1 ≤ j < j(i), wherex∗∗ = limi→∞ xi,0 is an optimal solution of(2.10).

Proof: Regarding (5.29) and (5.75) we see that

∥∥xi,j − x∗∗∥∥2≤ 3

(∆1,0

d

) 12

q12

(pi+j) + αi

holds for alli and1 ≤ j < j(i). Moreover, using the definition ofζi, (5.74) and0 < q < 1, we

infer

αi ≤(

∆1,0

d

) 12

q12

(pi+j)

for all i and0 ≤ j ≤ j(i). Combining both estimates our proposition follows. 2

5.5 Extension to general convex problems

The regularized method presented can be easily extended to problems of the more general form (1.1)

under Assumption 4.11 - but again without the compactness postulate on the solution set. The same

generalizations used in Algorithm 4.12 can be integrated into Algorithm 5.2 and the results of the

Sections 5.1 and 5.2 remain true with analogous changes to those of Section 4.3.

In order to extend the results of the Sections 5.3 and 5.4 the basic result of Lemma 5.11 must

be transferred. And in the first part of that proof a modification is required which cannot be de-

scribed by the facts stated in Section 4.3. In particular, we cannot conclude0 ∈ ∂Fi,j(xi,j)if linear equality constraints occur but we deduce0 ∈ ∂xLi,j(xi,j , yi,j) with Lagrange function

Li,j(x, y) := Fi,j(x) + yT (Ax− b) and a certainyi,j ∈ Rm. Thus we have

0 ∈ ∂xLi,j(xi,j , yi,j) = ∂Fi,j(xi,j) +AT y.

Using this we can analogously proceed as in the proof of Lemma 5.11 in order to obtain a result like

in Lemma 5.11. Now, the further results of the Sections 5.3 and 5.4 can be moved to the general

situation of problems of type (1.1) with regard to the remarks in Section 4.3.

Page 68: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

64 5 Regularization of the logarithmic barrier approach

Page 69: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

Chapter 6

Numerical analysis

In this chapter we discuss several numerical difficulties which occur by the practical application of

the Algorithms 4.2 and 5.2 or their extensions. We start with the analysis of the inner loops of the

algorithms in the first section while in the second section the determination of a starting point is the

point of interest. We choose this order because the inner loop has often to be done while for some

problems it can be simple to present a feasible starting point.

Let us remark that we mainly consider the problem (2.10) in detail and therefore we suppose

that Assumption 5.1 is fulfilled. Nevertheless the extensions to general problems of type (1.1) are

always stated.

6.1 Numerical aspects of the inner loops

The first question which raises in the loops ink of the Algorithms 4.2 and 5.2 is how can we

determine the positive radiusri,k resp.ri,j,k such that the boxSi,k or Si,j,k is completely contained

inM0. The simplest way to find such a radius is a trial-and-error strategy, whereby only the edges

of the considered box have to be checked for their feasibility. In particular this fact requires that we

can decide whether a given pointx fulfills g(x, t) < 0 for all t ∈ T . Such a decision procedure can

be very costly, especially if the exact evaluation of the constraint values is not possible. Therefore

we offer another method in the following lemma. In order to formulate this letLxS denote a constant

for a given nonempty setS ⊂ Rn with

supz∈S

supt∈T

supv∈∂g(z,t)

‖v‖1 ≤ LxS (6.1)

and the additional property thatS′ ⊂ S impliesLxS′ ≤ LxS . Furthermore, let us define

Br(V ) :={z ∈ Rn : min

v∈V‖z − v‖∞ ≤ r

}for r > 0 and nonempty compact setsV ⊂ Rn.

Lemma 6.1 Let x ∈M0 and r > 0 be given. Moreover, leth ≥ 0 be given such that

−maxt∈Th

g(x, t)− Lt{x}h > 0

65

Page 70: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

66 6 Numerical analysis

holds withLt{x} fulfilling (4.1), i.e. |g(x, t1) − g(x, t2)| ≤ Lt{x}‖t1 − t2‖2 for all t1, t2 ∈ T . Then

the inclusionBr({x}) ⊂M0 is valid if

0 < r < min

{r,−maxt∈Th g(x, t)− Lt{x}h

LxBr({x})

}. (6.2)

Proof: Let z /∈ M0 be given. Then one has to show‖z − x‖∞ > r. If ‖z − x‖∞ ≥ r this follows

immediately. Thus in the sequel we assume that‖z − x‖∞ < r holds. Lett∗ ∈ T (z) be given, i.e.

g(z, t∗) = maxt∈T g(z, t) ≥ 0. Then we conclude

0 > maxt∈Th

g(x, t) + Lt{x}h ≥ maxt∈T

g(x, t) ≥ g(x, t∗)− g(z, t∗) ≥ vT (x− z)

with v ∈ ∂g(z, t∗). Due to‖z − x‖∞ < r the estimate

−maxt∈Th

g(x, t)− Lt{x}h ≤ |vT (x− z)| ≤ LxBr({x})‖x− z‖∞

follows. Hence, we obtain‖z − x‖∞ > r and the proof is complete. 2

Remark 6.2In case of more than one inequality constraint (i.e.l > 1 in (1.1)) or in case of occurring

linear equality constraints one has to replaceM0 by {x ∈ Rn : gν(x, t) < 0 (t ∈ T ν)} for each

inequality constraint in the proposition of the lemma. In this way a feasible radius for each inequality

constraint can be separately determined by Lemma 6.1. Then the smallest value of these radii can

be used for fixing the box. 2

Lemma 6.1 determines the required boxes in our algorithms if the constantsLtS andLxS are

computable. Of course we cannot present a general way for computing these values but they are

stated explicitly for each numerical example in the following chapters.

A corollary of Lemma 6.1 establishes admissible values forr∗i in Remark 4.7 which could be

used as lower bounds for all radiiri,k in stepi.

Corollary 6.3 Let τ ∈ R, µ > 0 and r > 0 be given. Moreover, define

N∗ :={x ∈M0 : f(x)− µ ln

(−max

t∈Tg(x, t)

)≤ τ

}and letflow be a lower bound off onN∗. Then the inclusionBr(N∗) ⊂M0 is true for all r with

r < min

{r,e

(flow−τ)

LxBr(N∗)

}(6.3)

if N∗ 6= ∅.

Proof: Let x ∈ N∗ be given. Then a short calculation shows that

−maxt∈T

g(x, t) ≥ e1µ

(f(x)−τ) ≥ e1µ

(flow−τ).

Using this our proposition follows with Lemma 6.1 (settingh = 0). 2

Page 71: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

6.1 Numerical aspects of the inner loops 67

After the determination the boxes we have to select values forhi,k resp.hi,j,k. Normally they

influence directly the costs of the maximization processes such that we want to choose them as large

as possible. Upper bounds forhi,k resp.hi,j,k are given by (4.14) resp. (5.11). But in order to use

these upper bounds the constantCS fulfilling part (9) of the Assumptions 4.1 or 5.1 is needed.

Lemma 6.4 Let the assumptions of Lemma 6.1 be fulfilled. Furthermore, letr > 0 be given such

that (6.2) is valid. Then

CS :=1

−maxt∈Th g(x, t)− Lt{x}h− LxSr

(6.4)

fulfills (4.2)with S := Br({x}).

Proof: From Lemma 6.1 it follows thatS ⊂ M0. Let x ∈ S, t∗ ∈ T (x) andv(x, t∗) ∈ ∂g(x, t∗)be arbitrarily given. Then we infer with (4.5)

−maxt∈T

g(x, t) = −g(x, t∗)

≥ −g(x, t∗) + v(x, t∗)T (x− x)

≥ −maxt∈T

g(x, t)− LxSr

≥ −maxt∈Th

g(x, t)− Lt{x}h− LxSr.

Moreover, using (6.2), we deduce

−maxt∈Th

g(x, t)− Lt{x}h− LxSr > 0

so that we have ∣∣∣∣ 1maxt∈T g(x, t)

∣∣∣∣ =1

−maxt∈T g(x, t)

≤ 1−maxt∈Th g(x, t)− Lt{x}h− L

xSr

= CS .

Consequently (4.2) holds sincex ∈ S was chosen arbitrarily. 2

Remark 6.5 The monotonicity property ofCS is automatically given ifLxS possess such a property

(as demanded above) and one computesCS by (6.4). 2

Remark 6.6 In case of more than one constraint one can separately compute the constantsCν,S for

each constraint analogous to Lemma 6.4. 2

With constantCS the valueshi,k or hi,j,k can be determined as large as possible by (4.14)

resp. (5.11). Consequently, regarding the statements after the algorithms, the valuesβi,k andβi,j,kare already fixed and the minimization problems (4.3) resp. (5.3) can be solved with the bundle

method stated in Chapter 3.

Finally, let us have a closer look at the inexact maximization ofg. Such a maximization proce-

dure can be very costly depending on the grid width and has to be done for each evaluation offi,k

andFi,j,k. Thus we want to look for an acceleration of this procedure. For that purpose a typical

situation is considered in the following lemma.

Page 72: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

68 6 Numerical analysis

Lemma 6.7 Let x ∈ M0, r > 0, h > 0, Th ⊂ T andS := {z ∈ Rn : ‖z − x‖∞ ≤ r} ⊂ M0 be

given. Moreover, assume thatmaxt∈Th g(x, t) is known for a certainh ≥ 0. Then

⋃x∈S

Th(x) ⊂ TSh :={t ∈ Th : g(x, t) ≥ max

t∈Thg(x, t)− (Lx{x} + LxS)r − LtSh

}(6.5)

holds.

Proof: Let t ∈ Th(x) andv ∈ ∂g(x, t) be given. Then we have for allz ∈ S

maxt∈T

g(z, t) ≥ g(z, t) ≥ g(x, t) + vT (z − x) ≥ maxt∈Th

g(x, t)− Lx{x}r.

This combined with (4.5) leads to

maxt∈Th

g(z, t) ≥ maxt∈T

g(z, t)− LtSh ≥ maxt∈Th

g(x, t)− Lx{x}r − LtSh (6.6)

for all z ∈ S.

Additionally, g(x, t) ≥ g(z, t) + v(z, t)T (x − z) for all z ∈ S, t ∈ T with v(z, t) ∈ ∂g(z, t).Thus one infers

g(z, t) ≤ g(x, t) + LxSr (6.7)

for all z ∈ S, t ∈ T . Combining (6.6) and (6.7), for allt ∈ Th(z), z ∈ S the inequality

g(x, t) ≥ maxt∈Th

g(x, t)− (Lx{x} + LxS)r − LtSh

follows and the proof is complete. 2

Remark 6.8 In the same way one can determine a (mostly infinite) subsetTS ⊂ T with⋃z∈S

T (z) ⊂ TS . (6.8)

Then, by investigating the use ofLtS in the analysis of the chapters before, we observe that it is only

used to estimate the error of the inexact maximization. Therefore the assumptions on this constant

can be weaken. Namely, since allt ∈ T \ TS cannot be maxima points ofg on S, it suffices to

demand that (4.1) holds for allt1, t2 ∈ TS and allx ∈ S. Thus in fact one considers the constraint

maxt∈TS g(x, t) ≤ 0 onS. In many cases this will lead to a smaller value ofLtS .

Furthermore, the results of this section remain true with

LxS ≥ supz∈S

supt∈TS

supv∈∂g(z,t)

‖v‖1

which especially makes larger radii values possible.

However, the described changes are only applicable after the determination ofTS ⊂ T . And

this requires previously computed constantsLxS , LtS fulfilling the whole conditions. Nevertheless,

if the determination of a subsetTS ⊂ T is successful one could use the new (possibly smaller)

Page 73: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

6.2 Feasible starting points 69

constants to repeat the deletion process with the constants. Particularly one can useTS as basis for

determiningTSh . 2

Remark 6.9 In the case of considering general problems of type (1.1) we can use a deletion rule as

given in the previous lemma for each inequality constraint. But then we have to replaceM0 by the

set{z ∈ Rn : maxt∈T ν gν(z) < 0} in order to determine a subset ofT ν . 2

6.2 Feasible starting points

In this section we discuss the determination of a feasible starting point for the Algorithms 4.2 and

5.2 or their extensions. For some examples such a point can be easily given. If this is not the case

we first consider semi-infinite problems of type (2.10)

minimize f(x) s.t. x ∈ Rn, maxt∈T

g(x, t) ≤ 0

under Assumption 5.1. Then the simplest way to find a feasible starting point is to consider the

problem

minimize maxt∈T

g(x, t) s.t. x ∈ Rn

which can be formulated as convex semi-infinite problem as follows

minimize c s.t. (x, c) ∈ Rn ×R, g(x, t)− c ≤ 0 (t ∈ T ). (6.9)

Consequently we can solve it with Algorithm 5.2 if Assumption 5.1 holds for this problem. But it

turns out that the solvability does not have to hold in each case. Caused by this fact we change the

objective function into(c− c0)2 and consider

minimize (c− c0)2 s.t. (x, c) ∈ Rn ×R, g(x, t)− c ≤ 0 (t ∈ T ) (6.10)

with any fixedc0 ∈ R. Then the solvability is enforced by the quadratic objective function and the

continuity of g. The further assumptions demanded by Assumption 5.1 can be simply transferred

from the properties of the given problem (2.10). Thus Algorithm 5.2 is possible to use for solving

this problem, whereby we remark that a feasible starting point for problem (6.10) can be given

by fixing anyx0 ∈ Rn and choosingc > maxt∈T g(x0, t). Furthermore, in case ofc0 < 0 and

M0 6= ∅, a solution of (6.10) must be a point ofM0 because the optimal value ofc has to be as

close as possible toc0. Of course, ifM0 is nonempty we do not have to solve (6.10) exactly because

we can stop the used method when the current iterate is located inM0.

Now let us consider the general case where we have given problems of type (1.1)

minimize f(x)

s.t. x ∈ Rn, Ax = b, A ∈ Rm×n, b ∈ Rm,

gi(x, t) ≤ 0 for all t ∈ T i (i = 1, . . . , l).

Page 74: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

70 6 Numerical analysis

We assume that the generalization of Assumption 5.1 holds. Then we obtain analogously to (6.10)

the optimization problem

minimize (c− c0)2

s.t. (x, c) ∈ Rn ×R, Ax = b,

gi(x, t)− c ≤ 0 for all t ∈ T i (i = 1, . . . , l)

(6.11)

which fulfills the generalization of Assumption 5.1 for each fixedc0 ∈ Rn. Consequently the

extension of Algorithm 5.2 can be used to solve this problem. Thereby we can state again that in

the casec0 < 0 andM0 6= ∅ each exact solution of (6.11) is located inM0 so that it is a feasible

starting point for computing a solution of (1.1) by Algorithm 4.12 or the extension of Algorithm 5.2.

Page 75: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

Chapter 7

Application to model examples

In the following chapters we present numerical results computed by the proposed methods. For that

purpose the algorithms were implemented in the programming language C by using version 2.7.2.3

of the gcc-compiler on a Pentium III/800-computer with the operating system Suse Linux 6.2. The

included linear programs are solved by the Simplex-method while the quadratic problems are solved

by a finite algorithm of Fletcher [10].

Before we have a closer look at the examples some general settings are given. The setsTh ⊂ T

are always determined as equidistant discretizations ofT with step size2h. Furthermore, the radii

of the considered boxes are always computed as9/10 of the maximal value allowed by Lemma

6.1. But the values ofr in the formula for this maximal value have to be adapted to each example.

Particularly they are adapted to each step of the chosen algorithm. Finally, the values ofCS are

always computed as suggested in (6.4).

Let us finish our general statements with a remark on the application of the several convergence

results stated before. Each of them says that the algorithms generate sequences which converge to

an optimal solution (in case of Algorithm 5.2 or its generalization) or which have at least an accu-

mulation point as optimal solution (in case of Algorithm 4.2 or 4.12). Moreover, in each presented

convergence theorem it is required that some positive sequences converge to zero. But, caused by

the fact that we cannot generate complete sequences, in practice it is impossible to check these as-

sumptions. Nevertheless, they are the basis of the practical parameter setting in the following sense:

We choose the occurring finite values of each sequence which has to converge in such a way that

they fulfill a geometric decrease condition.

7.1 The unregularized case

We start with considering two examples which can be solved with Algorithm 4.2.

Example 7.1For fixedn ∈ N we consider the problem (cf. Example 3 in Voetmann [61])

minimize f(x) := xn

s.t. g(x, t) :=

∣∣∣∣∣φ(t)−n−1∑m=0

xmtm

∣∣∣∣∣− xn ≤ 0 for all t ∈ T := [−1, 2](7.1)

71

Page 76: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

72 7 Application to model examples

with

φ(t) :=

{tn if t ∈ [−1, 1]max{1, tn − Pn(t)} if t ∈ (1, 2]

and the normalized Chebyshev polynomial (cf., e.g., Hackbusch [16])

Pn(t) :=

{21−n cos(n arccos(t)) if t ∈ [−1, 1]21−n cosh(n arcosh(t)) if |t| > 1

of degreen. That means we want to approximateφ on the compact interval[−1, 2] by a polynomial

based on the functions1, t, . . . , tn−1. Voetmann [61] shows that this problem is uniquely solvable

with optimal solutionx∗ characterized by

n−1∑m=0

x∗mtm = tn − Pn(t) for all t ∈ R and x∗n = 21−n.

Consequently Assumption 4.1(6) is fulfilled. Furthermore, since part (3) of this assumption holds

due to Theorem 5.7 in Rockafellar [45] the validity of the parts (1)-(4) for the considered problem is

obvious. Then, settingx0 = . . . = xn−1 = 0 andxn sufficiently large, we find an interior point of

the feasible set so that the fifth part holds as well. Regarding the introductory remarks of the chapter

part (7) is simply fulfilled with equidistant gridsTh with grid widths2h. Furthermore, the constants

CS should be computed by (6.4) which requires computable values forLxS for nonempty compact

setsS ⊂ Rn+1. They can be given by

LxS = maxt∈T

n−1∑m=0

|tm|+ 1 = 2n

which is an upper bound of all possible slopes ofg w.r.t. x. But since2n increases very fast with

parametern this constant is chosen by

LxS = maxt∈TS

n−1∑m=0

|tm|+ 1

if Remark 6.8 is regarded and a subsetTS ⊂ T with (6.8) is known. Further the constantsLtS for

nonempty compact boxesS ⊂ Rn+1 have to be known in order to fulfill (8). But the computation

of these constants is much more difficult than that ofLxS . Therefore we divide the interval[−1, 2]into the parts[−1, 1] and (1, 2] as it is done by the definition ofφ. On [−1, 1] one can use the

differentiability of tn −∑n−1

m=0 xmtm w.r.t. t as well as the linear structure inx to find an upper

bound of

supt∈[−1,1]

supx∈S

∣∣∣∣∣ntn−1 −n−1∑m=1

mxmtm−1

∣∣∣∣∣which is used asLtS on [−1, 1]. Considering the interval(1, 2] instead of[−1, 2] one has to determine

two constants, one for each possible constraint function. In the first casemax{1, tn − Pn(t)} = 1the constraint is obviously polynomial int such that it can be treated as it is done on[−1, 1]. In

Page 77: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

7.1 The unregularized case 73

casemax{1, tn − Pn(t)} > 1 one can use the well-known recurrence scheme of the Chebyshev

polynomials (cf., e.g., Hackbusch [16]) so that in fact we deal with a (more complicated) polynomial

again. Altogether, the larger of the both computed constants is used asLtS on(1, 2] and then the sum

of the constants of both interval parts is used asLtS on [−1, 2]. Pointing to Remark 6.8 again this

constant can also be getting smaller ifTS ⊂ T with (6.8) is known. Then the described procedure

above must be adapted in an easy way.

Finally, part (10) of Assumption 4.1 requires the computation of a subgradient off andg(·, t)in x for eacht. But due to the linear structure off and g in x this can be easily done so that

Assumption 4.1 is completely fulfilled and we can use Algorithm 4.2 for solving (7.1). For that the

standard parameter setting is given in Table 7.1. Additionally it must be remarked that the values

parameter start value decreasing factor lower bound

µi 1 0.2 10−5

εi,0 0.001 0.15 −δi 10 0.15 −qi 0.999 − −

Table 7.1: Example 7.1 - standard parameter

of εi,0 andδi were automatically adapted in the sense of Remark 4.10. That means, in accordance

to our introductory convention, ifεi/ri ≥ 0.99εi−1/ri−1 was detected we halvedεi,0 (andδi) and

restarted thei-th step.

Furthermore, the starting vector was chosen asx0 = . . . = xn−1 = 0, xn = dPn(2) + 1e while,

regarding Lemma 6.1 as well as the introductory remarks of the chapter, the radii were computed by

ri,k = 0.9 min

{r,−maxt∈Th g(xi,k−1, t)− Lt{xi,k−1}h

LxBr({xi,k−1})

}(7.2)

with r = min{1, 2ri,k−1}, h = hi,k−1 if k > 1 and r = 1, h = 0.003 if k = 1. Thereby the

improvement of the constantsLt{xi,k−1} andLxBr({xi,k−1}) in the sense of Remark 6.8 was regarded.

Additionally, all valueshi,k were computed as minimum of0.003 and the maximal value fulfilling

(4.14). With these settings we obtained forn = 1, . . . , 9 the results stated in Appendix A.

Let us pick out the casen = 5 for a detailed discussion. The starting vector was(0, 0, 0, 0, 0, 24)and we obtained the iteration process presented in the Table 7.2. From this table we observe that

our computed solution approximates the exact optimal solutionx∗ = (0,−0.3125, 0, 1.25, 0, 0.625)very well.

Furthermore, Table 7.3 contains information which allow an analysis of the iteration process.

But for reading this table a short explanation of the columns is needed. While the first columns

should be clear the column titled “restarts” gives the number of restarts during the several steps

which are caused by insufficient accuracy valuesεi. The column “hmin” contains the minimal

computed value of allhi,k for fixed i and the next column gives the average of allhi,k for the fixed

i. Both columns show that these values decrease during the iteration process which is not surprising

Page 78: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

74 7 Application to model examples

i µi xi0 xi1 xi2 xi3 xi4 xi5

1 1.00E+00 −0.000054 −0.311187 0.001868 1.247626 −0.003320 1.0614152 2.00E-01 −0.000261 −0.311517 0.002854 1.248081 −0.003753 0.2606893 4.00E-02 −0.000030 −0.312379 0.000362 1.249759 −0.000482 0.1025814 8.00E-03 −0.000035 −0.312358 0.000425 1.249717 −0.000566 0.0704545 1.60E-03 −0.000001 −0.312497 0.000008 1.249995 −0.000011 0.0641056 3.20E-04 −0.000001 −0.312497 0.000009 1.249994 −0.000013 0.0628197 6.40E-05 −0.000000 −0.312500 0.000001 1.250000 −0.000001 0.0625648 1.28E-05 −0.000000 −0.312500 0.000000 1.250000 −0.000000 0.062513

Table 7.2: Example 7.1 - iteration process forn = 5

since the computational accuracy is improved from step to step. Then the column “∅|Th||Th| ” contains

the average ratio of the values|Thi,k |/|Thi,k | which shows that our deletion rule, stated in Lemma

6.7, works very effective. The next column contains the average mightiness of the grids and we

observe that the number of elements of these sets increases in spite of the deletion rule. Finally, the

last four columns contain information about the computational effort of the method. While in the

#LP-column the number of considered linear problems is stated, the #QP-column gives the number

of considered quadratic problems which equals the number of inexact maximizations. The linear

and quadratic problems originates from the used bundle method for solving the successive box-

constrained minimizations, whereby the number of investigated boxes is stated in the #BP-column.

The last column “Time” contains the total time in seconds from starting the algorithm until finishing

stepi. Thus the last value of this column is the total running time in seconds of the algorithm for

generating the presented approximate solution.

As stated above we regarded Remark 6.8 for the computation of the constantsLxS andLtS . To

demonstrate the effect of the improved constants we also computed results forn = 5 with the same

parameter values but without using the (possibly) smaller values forLxS andLtS . First of all we

remark that the computed approximate solution differs only slightly from that given in Table 7.2.

Thus we proceed without showing a table containing these iterates. However, the parameter values

are much more interesting and they are given in Table 7.4. Now, comparing the Tables 7.3 and

7.4 we recognize that for smaller barrier parameter the radii valuesri as well as the averages∅ri,kare larger in the case where Remark 6.8 is regarded. This is especially caused by smaller values for

LxBr({xi,k−1}) which are possible since the deletion process for generatingTS in the sense of Remark

6.8 detects that there cannot exist a maximum ofg(x, ·) neart = 2 for any x ∈ Br({xi,k−1}).ConsequentlyLx

Br({xi,k−1}) is much less than2n. For instance, in the last inner step of the fifth outer

iteration we can previously detect

TS = [−1.000,−0.100] ∪ [0.110, 1.022]

so thatLxBr({xi,k−1}) = 6.224893 instead ofLx

Br({xi,k−1}) = 32 is chosen.

A further consequence of the larger radii is the faster decrease ofεi/ri. Also directly influenced

Page 79: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

7.1 The unregularized case 75

iµi

r i∅r i,k

ε i r ire

star

tsh

min

∅hi,k

∅|Th|

|Th|

∅|Th|

#LP

#QP

#BP

Tim

e

11.

00E

+00

2.8E

-02

2.0E

-01

3.6E

-02

03.

00E

-03

3.00

E-0

31.

0050

117

497

411

30.

792

2.00

E-0

15.

0E-0

31.

3E-0

23.

0E-0

20

3.00

E-0

33.

00E

-03

1.00

501

102

440

611.

163

4.00

E-0

29.

0E-0

41.

9E-0

31.

2E-0

21

1.67

E-0

42.

56E

-03

0.99

583

126

550

831.

664

8.00

E-0

39.

7E-0

41.

2E-0

31.

7E-0

30

9.93

E-0

54.

44E

-04

0.67

2504

6732

829

2.10

51.

60E

-03

2.0E

-04

3.9E

-04

1.3E

-03

02.

75E

-05

7.87

E-0

50.

3668

5445

223

172.

556

3.20

E-0

44.

2E-0

58.

6E-0

59.

0E-0

40

4.29

E-0

61.

14E

-05

0.18

2307

843

218

163.

597

6.40

E-0

58.

7E-0

61.

6E-0

56.

6E-0

40

7.37

E-0

71.

91E

-06

0.10

8193

446

244

175.

608

1.28

E-0

51.

7E-0

63.

3E-0

65.

0E-0

40

1.46

E-0

74.

18E

-07

0.10

3643

4644

220

167.

97

Tabl

e7.

3:E

xam

ple

7.1

-pa

ram

eter

valu

esfo

rn

=5

with

rega

rdto

Rem

ark

6.8

iµi

r i∅r i,k

ε i r ire

star

tsh

min

∅hi,k

∅|Th|

|Th|

∅|Th|

#LP

#QP

#BP

Tim

e

11.

00E

+00

2.8E

-02

2.0E

-01

3.6E

-02

03.

00E

-03

3.00

E-0

31.

0050

117

497

411

30.

782

2.00

E-0

15.

0E-0

31.

3E-0

23.

0E-0

20

3.00

E-0

33.

00E

-03

1.00

501

102

440

611.

173

4.00

E-0

29.

0E-0

41.

9E-0

31.

2E-0

21

7.77

E-0

42.

49E

-03

1.00

602

132

570

891.

664

8.00

E-0

31.

9E-0

44.

6E-0

49.

0E-0

30

1.49

E-0

43.

83E

-04

0.63

2453

116

595

712.

505

1.60

E-0

33.

9E-0

59.

4E-0

56.

5E-0

30

2.35

E-0

56.

05E

-05

0.39

9720

124

589

684.

006

3.20

E-0

48.

0E-0

62.

0E-0

54.

7E-0

30

3.64

E-0

69.

35E

-06

0.19

3101

912

560

565

7.56

76.

40E

-05

1.7E

-06

4.0E

-06

3.5E

-03

06.

29E

-07

1.59

E-0

60.

1312

0482

130

634

6513.1

18

1.28

E-0

53.

3E-0

77.

9E-0

72.

6E-0

30

1.24

E-0

73.

20E

-07

0.13

6194

9613

065

366

21.2

0

Tabl

e7.

4:E

xam

ple

7.1

-pa

ram

eter

valu

esfo

rn

=5

with

outr

egar

dto

Rem

ark

6.8

Page 80: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

76 7 Application to model examples

by the radii values is the number of considered boxes in each step. Here we realize that this number

is much less if the improved constants are used and this leads also to a smaller number of solved

linear and quadratic problems. Moreover, since the constantsLtS also profit from detectingTS we

obtain larger grid constantshi,k (at least in the average) if the deletion process successfully works.

Additionally in these cases we have a better deletion so that, combining both, there occur much

smaller grids.

Altogether the use of improved constantsLxS ,LtS in the sense of Remark 6.8 often leads to much

less effort and thus to a faster algorithm. For the considered example this effect is intensified when

the dimension grows up. 2

Example 7.2We consider forn ≥ 3 the problem (cf. Example 6 in Voetmann [61])

minimize f(x) := −n∑i=1

xi

s.t. g(x, t) := ρ1(t)x1 + ρ2(t)x2 +n∑i=3

i

i+ 1x2i − 1 ≤ 0 for all t ∈ T := [0, 1]

(7.3)

with

ρ1(t) := 1−

∣∣∣∣∣t−√

22

∣∣∣∣∣ , ρ2(t) :=

1−√

22

∣∣∣∣∣t−√

22

∣∣∣∣∣ if t <

√2

2

1−√

2

∣∣∣∣∣t−√

22

∣∣∣∣∣ if t ≥√

22

.

In order to decide whether the unregularized or the regularized algorithm has to be taken into account

the solution set of (7.3) is first stated (which can be found by investigating the possibly restrictive

constraints). We have

• for n = 3, 4, 5

Mopt =

x ∈ Rn :x1 + x2 = 1−

n∑i=3

i+14i , x1 + min

{√2x2,

√2

2 x2

}≥ 0,

xi = i+12i (i ≥ 3)

,

• for 6 ≤ n ≤ 13

Mopt =

x ∈ Rn : x1 = x2 = 0, xi =i+ 1

i√∑n

k=3k+1k

(i ≥ 3)

• and forn ≥ 14

Mopt =

{x ∈ Rn : x1 = −

√2

3cn, x2 =

4 + 2√

23

cn, xi =1

λ+ κ

i+ 12i

(i ≥ 3)

}with

λ =23, κ =

2 +√

23

and cn = 1− 1(λ+ κ)2

n∑i=3

i+ 14i

.

Page 81: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

7.1 The unregularized case 77

Thus the solution set is nonempty and compact in each case but its structure depends on the dimen-

sion. Consequently Assumption 4.1(6) is fulfilled. Furthermore the parts (1)-(4) of this assumption

and, regarding0 ∈ M0, also (5) hold. The Assumptions 4.1(7) and (9) are fulfilled by the standard

procedures of choosing finite grids for the first one and proceeding as suggested in (6.4) for the

second one. The needed subgradients in Assumption 4.1(10) are simply calculable as derivatives

such that it remains to determine the constantsLtS enforced by Assumption 4.1(8) andLxS required

for the computation ofCS and the radii of the boxes. These constants can be given by

LtS := maxx∈S

max

{∣∣∣∣∣x1 +√

22x2

∣∣∣∣∣ , ∣∣∣x1 +√

2x2

∣∣∣}and

LxS := maxt∈T

ρ1(t) + maxt∈T

ρ2(t) + 2 maxx∈S

n∑i=3

i

i+ 1|xi| = 2 + 2 max

x∈S

n∑i=3

i

i+ 1|xi|

by estimating all possible slopes. The formula ofLxS allows the improvement of this constant in the

sense of Remark 6.8, while such a consideration is not possible forLtS . However, Assumption 4.1

is completely fulfilled so that we can use Algorithm 4.2 for solving (7.3).

The standard parameters were chosen as in Example 7.1 (cf. Table 7.1) and the starting vector

x0 = 0 ∈ Rn was used in each case. Moreover, the radii were computed by (7.2) with the setting

r = min{1, 2ri,k−1}, h = hi,k−1 if k > 1 and r = 1, h = 0.0005 if k = 1. Of course, the

improvement ofLxS in the sense of Remark 6.8 was regarded by this computation. The grid constants

hi,k were given as minimum of0.0005 and the maximal value fulfilling (4.14). With these settings

we obtained forn = 3, . . . , 15 the results stated in Appendix A.

Let us now investigate the influence of the starting point in detail. For that we consider the case

n = 5. Due to the structure of the constraint it is simple to choose different feasible starting points

by choosing arbitrary negative values for the first two components ofx0 and settingx0i := 0 for

i = 3, 4, 5. In that case we observed the results contained in Table 7.5 and, looking at the column

start vector effort

x01 x0

2

restarts d2(x8,Mopt) f(x8)#LP #QP #Box

0 0 0 1.80E-04 −1.945821 104 214 40−100 0 0 1.69E-04 −1.945821 837 6130 749−1000 0 0 1.08E-04 −1.945822 6754 58068 6769

0 −100 0 1.50E-04 −1.945821 495 4725 6720 −1000 0 1.17E-04 −1.945821 3716 40156 6192

−100 −100 0 8.01E-05 −1.945821 643 3305 453−1000 −100 2 1.05E-04 −1.945821 6415 54529 6463

Table 7.5: Example 7.2 - The influence of the starting point

titled “f(x8)” (note that there are8 outer steps), it turns out that the obtained approximate solutions

are of the same accuracy w.r.t. the value of the objective function (as predicted by (2.5) for the exact

Page 82: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

78 7 Application to model examples

logarithmic barrier method - the optimal value is−1.945833). Within these bounds differences in

the final distance to the solution set are allowed and occur. However, it is not surprising that there

are big differences in the computational effort caused by the chosen starting points. We can roughly

state that a larger distance ofx0 to the solution set leads to a higher computational effort. In some

examples it may be possible to adjust the computational effort by a larger maximal value for the radii

(here we usedr = 1), but in the considered example such larger values will have no performance

effect since the radii are bounded above by the restrictive bounds for the iterate components3, 4 and

5. 2

7.2 The regularized case

Now let us consider examples where we have unbounded solution sets. We start with a small ex-

ample with two variables. It is presented in order to show that the unregularized algorithm does not

have to work in the case of an unbounded solution set.

Example 7.3We consider the problem

minimize f(x) := (x1 − x2)2

s.t. g(x, t) := x1 cos t+ x2 sin t− 1 ≤ 0 for all t ∈ T := [0, 1]

The feasible (the grayed area) and the solution set (the dotted line) of this problem are illustrated in

−6 −5 −4 −3 −2 −1 0 1 2

−6

−4

−2

0

2

4

6

x1

x 2

Figure 7.1: Example 7.3 - The feasible and the solution set

Figure 7.1 (both sets are shrunk to the presented clipped area). The solution set is easily given by

Mopt ={x ∈ R2 : x1 = x2 ≤

12

√2}.

Thus we deal with an unbounded feasible and an unbounded solution set so that Algorithm 4.2

cannot be used to solve the problem in the sense that we cannot expect convergence as specified in

Theorem 4.9. Therefore we want to show that Assumption 5.1 is fulfilled but excepting for (8) this

Page 83: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

7.2 The regularized case 79

is obvious if we regard our introductory remarks for (7) and (9). Part (8) is fulfilled with constants

LtS defined by

maxx∈S

maxt∈[0,1]

∣∣∣∣∂g∂t (x, t)∣∣∣∣ = max

x∈Smaxt∈[0,1]

| − x1 sin t+ x2 cos t|

≤ maxx∈S‖x‖∞ max

t∈[0,1]| cos t− sin t|

= maxx∈S‖x‖∞ =: LtS .

Furthermore, for computing the valuesCS and the radii, the constantsLxS are needed and can be

given by

LxS := maxt∈[0,1]

∥∥∥∥∥(

cos tsin t

)∥∥∥∥∥1

=√

2.

Thus both constants are given in a form so that they cannot be improved in the sense of Remark 6.8.

But for this small example it is not essential. However, Assumption 5.1 is completely fulfilled and

we can use the regularized method for solving the problem.

Before we do this it is shown that the assumption of the boundedness of the solution set is

essential for a meaningful use of Algorithm 4.2. Since Assumption 4.1 is fulfilled except for the part

concerning the boundedness of the solution set we started Algorithm 4.2 anyhow with the standard

parameters given in Table 7.6. Furthermore,x0 = (−5, 0) while the radii were computed by (7.2)

parameter start value decreasing factor lower bound

εi,0 0.001 0.06 −δi 0.001 0.06 −qi 0.999 − −

Table 7.6: Example 7.3 - standard parameter

with r = min{1, 2ri,k−1}, h = hi,k−1 if k > 1 and r = 1, h = 0.001 if k = 1. The grid

constantshi,k were given as minimum of0.001 and the maximal value fulfilling (4.14) and, finally,

CS was computed by (6.4) as already stated above. With these values the method was started with

µ1 = 1 and we obtained the iterates given in Table 7.7. From there we observe that no convergence

behaviour of the iterates is cognizable which already shows that the assumption of the boundedness

of the solution set is essential for a meaningful use of Algorithm 4.2. However, the values of the

objective function at the iterates converge to the minimal possible value zero.

After this experiment we now use Algorithm 5.2 for solving the given problem. More precisely

we intend to use all features of this method including the multi-step technique. Having in mind

Theorem 5.7 we have to specify a few more constants than in the case of using the unregularized

method. Nevertheless, we can first state that the standard parameters contained in Table 7.6 as

well as the given computations of the radii and the grid constants were used again. Furthermore,

we sets1 := 1, si+1 := max{0.01, 0.2si}, τ := 12, xc := (−3.3,−1.7), x∗ := (−2.5, 2.5),x := (0, 0) andx0 := (−5, 0) in order to fulfill x∗ ∈ Mopt ∩ Kτ/8(xc), x ∈ M0 ∩ Kτ (xc) and

Page 84: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

80 7 Application to model examples

i xi1 xi2 f(xi)

1 −1271.73 −1271.73 1.72E-072 −1817.85 −1817.85 7.98E-093 −2596.74 −2596.74 1.41E-104 −3710.59 −3710.59 1.56E-115 −5299.64 −5299.64 1.85E-126 −7572.42 −7572.42 1.85E-14

Table 7.7: Example 7.3 - Iterates computed by Algorithm 4.2

x0 ∈ M0 ∩Kτ/4(xc). This led toc = ‖x− x∗‖2 =√

12.5, f(x) = 0, f− = 0, c0 = | ln(1)| = 0,

t = 0, v = (1, 0) andc1 = ln(1 + 2) = ln(3) so that we hadc3 = ln(3) andµ1 = 0.1 ≤ e−c3

could be used. Setting the lower bound of the barrier parameter to10−6 andσi as small as possible

by (5.21) all assumptions of Theorem 5.7 are fulfilled and we obtained the iteration process given

in Table 7.8. We must remark that there was not required any restart procedure for adapting the

i, j xi1 xi2 d2(xi,Mopt) #LP #QP #BP Time

1, 1 −3.013535 −2.008399 7.11E-01 15 31 4 0.011, 2 −2.622698 −2.414308 1.47E-01 11 33 2 0.022, 1 −2.531565 −2.519300 8.67E-03 13 36 2 0.033, 1 −2.529324 −2.528754 4.03E-04 12 24 2 0.044, 1 −2.529324 −2.528754 4.03E-04 6 10 2 0.065, 1 −2.525245 −2.524960 2.01E-04 10 33 2 0.126, 1 −2.525539 −2.525535 2.69E-06 14 40 2 0.22

Table 7.8: Example 7.3 - Iterates computed by Algorithm 5.2 with multi-step

accuracy parameter since it turned out that the radius was always equal the maximal possible value

0.9. In contrast to Algorithm 4.2 we observe a convergence-like behaviour of the iterates from Table

7.8. Furthermore, the multi-step technique was in fact used in the first outer step. 2

Example 7.4Now we consider for fixedn ∈ N andk ∈ {1, . . . , n − 2} the following perturbed

version of Example 7.1

minimize f(x) := xn+1

s.t. g(x, t) :=

∣∣∣∣∣φ(t)−n−1∑m=0

xmtm − xn(tk + tk+1)

∣∣∣∣∣− xn+1 ≤ 0 for all t ∈ T := [−1, 2]

with the same functionφ as in Example 7.1. The perturbation reflects a typical situation in the

numerical approximation where we have to approximate a given function by linearly dependent

basis functions. In the given situation we have to approximateφ on [−1, 2] by linearly dependent

polynomials. In consequence of this the solution set is unbounded so that Assumption 4.1 cannot

Page 85: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

7.2 The regularized case 81

hold and Algorithm 4.2 is outside the further considerations. Particularly the complete solution set

is given by

Mopt =

{(x0, . . . , xn+1) :

(y0, . . . , yn) solves (7.1) withym = xm if m 6= k, k + 1, n and

yk = xk − xn, yk+1 = xk+1 − xn, yn = xn+1

}.

Then the weaker Assumption 5.1 is fulfilled if we taking into account that the parts (1)-(5), (7)-(10)

can transferred from the analysis of Example 7.1. But of course the calculation of the constantsLxSandLtS requires some changes caused by the additional summandxn(tk + tk+1). In the case ofLxSthis leads to

LxS = maxt∈TS

n−1∑m=0

|tm|+ maxt∈TS

|tk + tk+1|+ 1

while in the case ofLtS one can summarizexk andxn to one variable as well asxk+1 andxn to

another variable. Then the same procedure as for Example 7.1 is usable with the additional fact that

the combined variables have a range of±2r instead of±r.Altogether Algorithm 5.2 can be used to solve the given problem. The standard parameter

setting is given in Table 7.9 while the choice of a starting point and a barrier parameter fulfilling

parameter start value decreasing factor lower bound

si 0.01 0.8 10−5

εi,0 0.01 0.15 −δi 10 0.15 −qi 0.999 − −

Table 7.9: Example 7.4 - standard parameter

(5.19) is much more complicated than in the unregularized case. In the given situation we can easily

determine feasible starting points by using information of Example 7.1. But then, using the starting

point also asx, the constantc3 defined as in Theorem 5.7 is typically large which implies that the

starting barrier parameter has to be very small. Having in mind the notice on avoiding too small

barrier parameters for Example 7.1 we should find a better vectorx in the sense that the resulting

c3 is less than before. For that purpose Algorithm 5.2 can be also applied since Lemma 5.5 ensures

the finiteness of each inner loop under much weaker conditions. Consequently we started Algorithm

5.2 with fixed barrier parameterµ = 1 while all other parameters were set to the starting values

given above. Then we ran exactly one outer step of Algorithm 5.2 and calculated new values for

c3 resp.µ1 based on the computed iterate. Ifµ1 is too small again we repeated the step with the

previously computed iterate as starting point and a slightly lower accuracy parameter. Of course,

this procedure can be repeated more often and in the example cases it was stopped whenµ1 = 0.05was possible as starting barrier parameter. For that there were at most23 steps needed, but excepting

the first step they considered only a few boxes.

Then we used the final iterate of these pre-steps as starting point andµi+1 = 0.2µi as standard

update as in Example 7.1. Furthermore, the algorithm was stopped when the barrier parameter fell

Page 86: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

82 7 Application to model examples

below10−5. The values ofri,j,k andhi,j,k were computed analogously to the values ofri,k, hi,k in

Example 7.1 and the deletion rule as well as the improvement of the constantsLxS ,LxS in the sense of

Remark 6.8 were regarded again. Moreover a restart procedure similar to that of the unregularized

algorithm was used. But, now the prox parameter was reset in addition to the accuracy values. The

effect of the restart procedure should be that we achieve a geometric decrease of the values ofαi

since these values have to be summable. Nevertheless, in order to avoid too many restarts at the

beginning of the iteration process the restart condition is not directly correlated to the valuesαi,

it only depends again on the ratioεi/ri. If there is a geometric decrease then the definition ofαi

implies also a geometric decrease of these values (at least from a certain index) in combination with

the boundedness ofsi andri.

Then we obtained the results summarized in the appendix forn ≤ 6 andk = 1, 2, 3. At this

point we want to investigate the influence of the choice of the prox parameter. For that we have

a closer look at the casen = 5, k = 3 where we successively set the starting prox parameter

to 10, 1, 0.01 and 0.0001. The other settings are given as above. Furthermore, since the pre-

steps to generate the starting point depends on the prox parameter we excluded this phase from

the investigation and used the standard parameters for it. Thus Algorithm 5.2 was always started

with x0 = (−0.000605,−0.312555, 0.002830, 0.832642,−0.419964, 0.416176, 1.199804). Then

the detailed results contained in Table 7.10 were obtained. Therein the given time values include

0.72 seconds in each case which was needed for the computation of the pre-steps.

First of all we remark that all final approximate solutions have nearly the same distance to the

solution set. But, of course there are some differences in the iteration process. So the results of the

first steps document the several starting prox parameters by the value of the distance to the solution

set: large prox parameter allow a short step and small prox parameter allow a long step. This is

also made clear by the number of considered boxes during each first step, whereby this number

increases if the starting prox parameter decreases. Additionally it can be observed that in each case

an insufficient accuracy value is detected in a certain step. It is remarkable that this detection occurs

earlier if the prox parameter is lower. The reason for this behaviour is that lower prox parameters

allow larger steps inside the given boxes so that we faster go to the solution set on the boundary of

the feasible set. But this leads to smaller radii and consequently to larger ratiosεi/ri so that this

ratio can increase at this point. Thus, if the starting prox parameter is chosen too large the restarts

occur for very small barrier parameters with bad conditioning so that one typically observes a slow

walk along the boundary of the feasible region documented by many considered boxes as in case

s1 = 10 in the example. On the other hand we have to avoid too small (starting) prox parameters in

order to guarantee the regularization effect. But this is supported by our method since the step sizes

are automatically restricted by the radii of the boxes so that the iteration processes approach to each

other if the starting prox parameters are sufficiently small. This can be observed by looking at the

casess1 = 0.01 ands1 = 0.0001. 2

Page 87: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

7.2 The regularized case 83

s 1i

µi

d2(xi ,Mopt)

r iε i r i

rest

arts

hm

in∅hi,j,k

∅|Th|

|Th|

#LP

#QP

#BP

Tim

e

15.

00E

-02

1.07

E+0

01.

4E-0

27.

3E-0

10

3.00

E-0

33.

00E

-03

1.00

66

60.

752

1.00

E-0

28.

83E

-01

1.1E

-02

1.4E

-01

03.

00E

-03

3.00

E-0

31.

0031

3416

0.78

32.

00E

-03

4.88

E-0

15.

4E-0

34.

2E-0

20

3.00

E-0

33.

00E

-03

1.00

8615

451

0.86

104

4.00

E-0

41.

03E

-03

1.2E

-05

1.6E

-02

21.

80E

-05

1.49

E-0

30.

2814

5542

2786

713.5

85

8.00

E-0

58.

02E

-05

6.5E

-07

3.3E

-03

12.

72E

-08

1.10

E-0

50.

0052

415

6324

527.9

66

1.60

E-0

51.

60E

-05

1.5E

-06

2.2E

-04

01.

68E

-07

4.51

E-0

70.

0688

358

2336.2

4

15.

00E

-02

8.30

E-0

11.

0E-0

29.

8E-0

10

3.00

E-0

33.

00E

-03

1.00

3434

340.

762

1.00

E-0

22.

21E

-01

1.6E

-03

9.5E

-01

03.

00E

-03

3.00

E-0

31.

0016

224

915

80.

923

2.00

E-0

32.

17E

-03

2.3E

-05

5.4E

-02

23.

43E

-05

1.39

E-0

30.

3411

3231

9868

37.

831

44.

00E

-04

4.03

E-0

44.

1E-0

64.

7E-0

20

1.37

E-0

53.

84E

-05

0.12

327

869

176

11.7

55

8.00

E-0

58.

04E

-05

8.7E

-07

3.3E

-02

02.

25E

-06

5.99

E-0

60.

0532

790

515

420.6

76

1.60

E-0

51.

61E

-05

1.3E

-06

3.4E

-03

03.

85E

-07

1.32

E-0

60.

0395

336

3725.3

0

15.

00E

-02

6.55

E-0

17.

7E-0

31.

3E+0

00

3.00

E-0

33.

00E

-03

1.00

6262

620.

782

1.00

E-0

21.

02E

-02

9.9E

-05

8.6E

-02

24.

12E

-05

1.94

E-0

30.

3592

121

0561

64.

773

2.00

E-0

32.

08E

-03

1.9E

-05

6.6E

-02

08.

61E

-05

2.30

E-0

40.

2833

183

518

16.

710.

014

4.00

E-0

44.

06E

-04

4.1E

-06

4.6E

-02

01.

39E

-05

3.79

E-0

50.

1233

290

316

910.7

15

8.00

E-0

58.

06E

-05

8.7E

-07

3.3E

-02

02.

26E

-06

6.05

E-0

60.

0532

590

515

319.6

06

1.60

E-0

51.

58E

-05

1.2E

-06

3.4E

-03

03.

80E

-07

1.31

E-0

60.

0310

133

536

24.2

8

15.

00E

-02

6.45

E-0

17.

6E-0

31.

3E+0

00

3.00

E-0

33.

00E

-03

1.00

6464

640.

762

1.00

E-0

21.

01E

-02

9.8E

-05

8.6E

-02

23.

79E

-05

1.94

E-0

30.

3591

220

9161

64.

743

2.00

E-0

32.

01E

-03

1.9E

-05

6.8E

-02

08.

26E

-05

2.24

E-0

40.

2833

484

618

56.

710.

0001

44.

00E

-04

4.04

E-0

44.

1E-0

64.

7E-0

20

1.39

E-0

53.

70E

-05

0.12

336

880

167

10.6

15

8.00

E-0

57.

98E

-05

8.7E

-07

3.3E

-02

02.

24E

-06

6.01

E-0

60.

0534

093

015

419.5

56

1.60

E-0

51.

60E

-05

1.3E

-06

3.3E

-03

03.

72E

-07

1.25

E-0

60.

0310

536

938

24.7

3

Tabl

e7.

10:

Exa

mpl

e7.

4-

The

influ

ence

ofth

epr

oxpa

ram

eter

Page 88: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

84 7 Application to model examples

Example 7.5We consider for fixedn ∈ N and1 ≤ κ < n the problem

minimize f(x) := −n∑

l=κ+1

xl

s.t. gν(x, t) := −

∣∣∣∣∣t−√

2ν + 1

∣∣∣∣∣xν +n∑

l=κ+1

cos2

(πl

(t−

√2

ν + 1

))x2l − 1 ≤ 0

for all t ∈ T ν := [0, 1], ν = 1, . . . , κ.

(7.4)

For an extensive investigation of this problem we refer to Voetmann [61], where the problem above

is considered as Example 2. In comparison to the previously considered problems we are now con-

fronted with an additional difficulty, namely there can occur more than one constraint by choosing

κ > 1. Consequently we have to take Algorithm 4.12 and the analogous extension of Algorithm 5.2

into account.

First of all the solution set of (7.4) is given by

Mopt ={x ∈ Rn : xi ≥ 0 (i = 1, . . . , κ), xi =

1√n− κ

(i = κ+ 1, . . . , n)}.

which is unbounded so that Assumption 4.1 resp. 4.11 cannot be fulfilled. Nevertheless, sinceMopt

is nonempty the parts (1)-(5), (6)′ and (7) of Assumption 5.1 or their generalizations are obviously

fulfilled. Additionally, the subgradients off andgν(·, t) required by part (10) of these assump-

tions are in fact gradients sincef , gν(·, t) are differentiable w.r.t.x. Consequently the needed

(sub)gradients are easily calculable. The constantsLtν,S can be computed by

Ltν,S := maxx∈S|xν |+

n∑l=κ+1

maxt∈T ν

∣∣∣∣∣2πl sin(πl

(t−

√2

ν + 1

))cos

(πl

(t−

√2

ν + 1

))∣∣∣∣∣maxx∈S

x2l

= maxx∈S|xν |+

n∑l=κ+1

πlmaxt∈T ν

∣∣∣∣∣sin(

2πl

(t−

√2

ν + 1

))∣∣∣∣∣maxx∈S

x2l

≤maxx∈S|xν |+

n∑l=κ+1

πlmaxx∈S

x2l

which estimates all possible slopes ofgν w.r.t. t. This description ofLtν,S allows the improvement

of these constants in the sense of Remark 6.8. Finally,Cν,S is separately calculated by (6.4) for each

ν. For that we also require the constantsLxν,S which can be given by

Lxν,S := maxt∈T ν

∣∣∣∣∣t−√

2ν + 1

∣∣∣∣∣+ 2n∑

l=κ+1

maxt∈T ν

∣∣∣∣∣cos2

(πl

(t−

√2

ν + 1

))∣∣∣∣∣maxx∈S|xl|.

Summing up Assumption 5.1 or its generalization for more than one constraint is fulfilled. Thus

Algorithm 5.2 or its extension in the sense of Remark 5.5 can be used to solve (7.4). This was

done with the standard parameters given in Table 7.11. For the determination of the starting barrier

parameter we used again the procedure described in Example 7.4 withµ = κ and the origin as

feasible starting point now. But it was not possible to give a standard starting barrier parameter

Page 89: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

7.2 The regularized case 85

parameter start value decreasing factor lower bound

si 0.01 0.5 10−5

εi,0 0.01 0.15 −δi 1 0.15 −qi 0.999 − −

Table 7.11: Example 7.5 - standard parameter

like 0.05 in the example before. Instead of this we stopped the determination of a starting barrier

parameter after exactly one step. Then the maximal possible barrier parameter, determined by (5.19),

was used as starting value, whereby it turned out that the starting barrier parameter decreased if

the number of variables and constraints increase. Nevertheless, the standard update for the barrier

parameter wasµi+1 = 0.2µi while the algorithm stopped when the barrier parameter fell below

10−5. In addition there was also used a restart procedure as described for Example 7.4 and for each

ν ∈ {1, . . . , l} a radius was computed by applying (7.2) withr = min{1, 2ri,k−1}, h = hνi,k−1 if

k > 1 andr = 1, h = 0.001 if k = 1. Then the minimal of these radii was used as radius of the box

which had to be determined.

Regarding all the stated facts we obtained the results presented in the appendix for several values

of n andk. At this point we want to have a detailed look at the influence of the starting accuracy

value. For that purpose we consider the casen = 12, κ = 1 with results given in Table 7.12. Thereby

ε1,0 restarts ε6 d2(x6,Mopt) f(x6)

10 4 2.40E-08 1.44E-04 −3.31660881 3 3.20E-08 1.47E-04 −3.3166094

0.01 2 4.27E-09 1.46E-04 −3.31660880.001 1 5.69E-09 1.55E-04 −3.31660880.0001 0 7.59E-09 1.41E-04 −3.3166087

Table 7.12: Example 7.5 - The influence of the accuracy parameter

all parameters except forε1,0 were given as described above. In particular we ran the algorithm with

the same starting point and the same starting barrier parameterµ1 = 0.05 in each case. Thus we had

6 outer steps and the final barrier parameter1.6E-05.

From Table 7.12 we observe the remarkable fact that the final distances to the solution set and the

final values of the objective function at the approximate solutions are comparable to each other. This

and the fact that the accuracy parametersεi approach each other are caused by the restart procedure.

Of course each restart causes an additional computational effort so that the starting accuracy value

should not be chosen too large in order to avoid too many restarts.

Furthermore, investigating the values of the objective function at the approximate solutions we

notice that they are all in a range near the optimal value−√

11 ≈ −3.3166248 - as predicted by

Page 90: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

86 7 Application to model examples

(2.5) for the classical logarithmic barrier methods with exact minimizers. This fact is especially

remarkable since the iterates were computed as approximate minimizers of the regularized function

whereas (2.5) holds in the unregularized case. Nevertheless, the values of the objective function at

the approximate solutions of the previous examples are also mostly in the range around the optimal

value predicted by (2.5). This can be especially observed very well by reinvestigating the approx-

imation problems before where the last component of the final iterates equals the final objective

values and approves again the prognose by (2.5).

Additionally we want to have a look at the influence of the number of considered barrier prob-

lems which can be controlled by the barrier parameter update. For that we also observed results with

non-standard updates for the barrier parameter. In order to ensure the same conditions in each case

it was necessary to adapt the updates for the accuracy and the prox parameter. They were chosen

in such way that the predicted final values (without regarding of possible restarts) were nearly the

same. Considering the casen = 12, κ = 1 again we obtained the results summarized in Table 7.13

with chosen starting values as in the standard case. Reading this table we can first state that the final

decreasing factors outer effort

µi εi,0 si stepsrestarts d2(x,Mopt) f(x)

#LP #QP #Box

0.2 0.15 0.5 6 2 1.46E-04 −3.3166088 93 118 370.41 0.34 0.68 10 3 1.15E-04 −3.3166083 120 156 540.605 0.52 0.805 17 4 4.11E-05 −3.3166087 186 260 69

Table 7.13: Example 7.5 - The influence of the barrier update

values of the objective function are nearly the same in all cases. Consequently from that point of

view there is no remarkable influence of the number of outer steps on the final result. Of course

the distance of the final iterate to the solution set differs from case to case and it decreases if the

number of outer steps increases. Additionally, the computational effort increases with the number of

outer steps since we solve more barrier problems. This effect is intensified by the increasing number

of restarts (more planned outer steps lead to more checks of the restart condition). Nevertheless,

the computational effort for each separate outer step decreases if we use larger decreasing factors.

Especially this second observation is typical for our methods and can lead to the possibly surprising

fact that the total computational effort can decrease if more outer steps are done.

Such a behaviour was observed for Example 7.2 withn = 14, 15. If we use the standard

updatesµi+1 = 0.2µi for the barrier parameter andεi+1,0 = 0.15εi for the accuracy parameter

the computational effort is much higher than using the updatesµi+1 = 0.4µi andεi+1,0 = 0.33εi(which leads to a similar final accuracy). For instance the computation of the approximate solution

in the casen = 15 with the standard parameters tooks about135 seconds against about18 seconds

with the changed update. But unfortunately we have no general rule to obtain an “optimal” update

strategy in order to minimize the computational effort. 2

Page 91: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

Chapter 8

An application to the financial market

8.1 The mathematical model

In this chapter we present the application of our algorithms to a problem occurring in the field of

finance. Our goal is to approximate the yield curve of an underlying asset. For that purpose we

follow the considerations by Tichatschke et al. [56] which are based on the model of Vasicek [60].

Let y(t) be a given yield curve fulfilling the stochastic differential equation

dy = (α+ βy)dt+ σdZ

with a Brownian motionZ and parametersα, β, σ. Now this yield curvey should be approximated

on an intervalT = [0, t] by a functionr. Thenr has to fulfill the initial value problem

r = βr + α+ σw(t), r(0) = r0 ∈ [r, r],

w ≤ w(t) ≤ w, t ∈ T(8.1)

which can be derived from the stochastic differential equation stated above. Therein the Brownian

motionZ is modeled by a piecewise continuous functionw with boundsw, w. Additionally the

initial valuer0 is variable so far. The solution of (8.1) is given by

r(t) = −αβ

(1− eβt) + r0eβt + σ

t∫0

eβ(t−τ)w(τ)dτ (8.2)

so that the approximation error can be minimized by solving the problem

minimize maxt∈T|y(t)− r(t)|

s.t. r0 ∈ [r, r],

w ≤ w(t) ≤ w, for all t ∈ T.

(8.3)

Since the feasible set is mainly described by the function space{w : w ≤ w(t) ≤ w, t ∈ T} we

deal with an infinite problem. In order to simplify this the available functions ofw are restricted to

piecewise constant functions, i.e. we set

w(t) := wi for all t ∈ Ti, i = 1, . . . , N

87

Page 92: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

88 8 An application to the financial market

with 0 =: t0 < t1 < . . . < tN−1 < tN := t, T i := [ti−1, ti) for i ∈ {1, . . . , N − 1} and

TN := [tN−1, tN ]. Then the integral term in (8.2) becomes

σ

t∫0

eβ(t−τ)w(τ)dτ = −i−1∑j=1

Bjeβtwj −

σ

β

(1− eβ(t−ti−1)

)wi

for all t ∈ T i with

Bj :=σ

β

(e−βtj − e−βtj−1

)for all j = 1, . . . , N − 1. Consequently, using

fi(r0, w, t) := −αβ

(1− eβt) + r0eβt −

i−1∑j=1

Bjeβtwj −

σ

β

(1− eβ(t−ti−1)

)wi

for all t ∈ T i, (8.3) can be rewritten as

minimize f(r0, w, ϑ) := ϑ

s.t. gi(r0, w, ϑ, t) := |y(t)− fi(r0, w, t)| − ϑ ≤ 0 for all t ∈ T i (i = 1, . . . , N)

gN+1(r0, w, ϑ) := max{

maxi=1,...,N

{wi − w,w − wi}, r0 − r, r − r0

}≤ 0

(8.4)

with an approximationy of y constructed by observable values. Thus we now deal with a linear

semi-infinite problem withN + 1 constraints. The number of constraints in (8.4) is much smaller

than in the formulation by Tichatschke et al. [56] which is caused by the fact that we can treat

nondifferentiable constraint functions. Consequently, motivated by (2.5), we can use larger barrier

parameter in order to expect similar accuracies.

8.2 Numerical results

We want to show that Algorithm 4.12 can be used for solving (8.4) approximately. For that purpose

we have to check Assumption 4.11. We first notice that some parts of this assumptions does not

have to hold for the last constraintgN+1 since it does not depend ont. However, in practicegN+1

is treated as constraint of typeg(x, t) ≤ 0, t ∈ T with single-valuedT . Additionally we have to

know something more abouty if we want to show some parts of Assumption 4.11. Therefore we

only consider the special casey = yi is constant on each intervalT i as it was done by Voetmann

[61].

We observe that the assumptions of the convexity off and all gi are fulfilled sincer0, w, ϑ

occur at most linearly in each constraint and the absolute values of linear functions as well as the

maxima of finitely many linear functions are convex. Part (2) of Assumption 4.11 is not fulfilled

sinceT 1, . . . , TN−1 are not closed. But it is possible to consider the closures of all setsT i and the

continuous extensions of allgi in (8.4) without changing the feasible set. Then the continuity of all

constraints w.r.t.t is obvious. Furthermore, part (5) of Assumption 4.11 is fulfilled ifw < w and

r < r are true. Moreover, we observe that lower level sets of our considered semi-infinite problem

Page 93: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

8.2 Numerical results 89

are bounded sincew, r0 are bounded by the(N + 1)-th constraint andϑ is bounded below by0 and

bounded above by the given level. Consequently, since we only deal with continuous functions, these

level sets are compact. Thus, regarding that the given problem is feasible, the solution setMopt has

to be nonempty and compact. Part (7) is simply fulfilled if we choose equidistant finite grids for each

constraint as it is done in the chapter before. Regarding Lemma 6.4 part (9) of Assumption 4.11 can

be fulfilled while subgradients off andgi(·, t) can be easily given if one regards that, excluding the

absolute value or the maxima, the functions therein are differentiable. Thus it remains to determine

the constantsLti,S enforced by part (8) of our assumption andLxS for determiningCi,S and the radii.

Regarding the differentiability of the function inside the absolute value ingi we can set

Lti,S := max(r0,w,ϑ)∈S

supt∈T i

∣∣∣∣∣∣αeβt + r0βeβt −

i−1∑j=1

Bjβeβtwj + σeβ(t−ti−1)wi

∣∣∣∣∣∣for all i = 1, . . . , N . In addition to this

Lxi,S := maxt∈T i

eβt +i−1∑j=1

|Bj | eβt +∣∣∣∣σβ (1− eβ(t−ti−1)

)∣∣∣∣+ 1

for all i = 1, . . . , N andLxN+1,S := 1 are used. Consequently Assumption 4.11 is completely

fulfilled so that Algorithm 4.12 can be used for solving (8.4).

Demonstrating this we want to approximate the German stock index DAX in two time periods of

each 30 days. The required data, consisting of the daily opening DAX prices, are given in Table 8.1.

The first period represents a quite stable but slowly growing DAX while the second period covers a

big fluctuation in a short time interval. In addition there are needed values forα, β andσ. Voetmann

[61] uses the setting

α = 0.0154, β = −0.1779 and σ = 0.02

which is derived from the observation of US interests for government bonds within the years 1964

to 1989. Since there was not made a similar investigation of the German stock exchange we use

the values stated above too. Moreover, the German stock exchange tends to follow the US stock

exchange so that this choice is not a bad choice.

Due to the fact that we only consider two different scenarios we do not give a standard pa-

rameter setting. Rather we have a separate look at both situations. Nevertheless, there were some

common settings. So in both situations the considered time period was uniformly mapped to the

interval [0, 1] which implies that each trading day was represented by a subinterval of length1/30of [0, 1]. Additionally we setqi = 0.999 in each case and, regarding Remark 6.2, the radii were

computed by Lemma 6.1. In fact we used (7.2) to determine a radius for each constraint with

r = min{1000, 2ri,k−1} if k > 1 andr = 1000 if k = 1 for all constraints andh = hνi,k−1 if k > 1,

h = 0.001 if k = 1 for ν = 1, . . . , 30. In consequence of this it was possible to computeCν,Si,k by

Lemma 6.4 for each constraint.

Now considering only the first example data DAX1 the starting point

r0 := 1600, w1 = . . . = w30 := 0, ϑ := 3000

Page 94: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

90 8 An application to the financial market

Example DAX1 Example DAX2

BoundsTrading Day

t1i

Price

y1i

BoundsTrading Day

t2i

Price

y2i

04.01.1993 1533.06 05.03.1998 4642.7905.01.1993 1547.99 06.03.1998 4686.2406.01.1993 1560.27 09.03.1998 4775.8307.01.1993 1546.33 10.03.1998 4807.9208.01.1993 1540.56 11.03.1998 4855.2211.01.1993 1526.66 12.03.1998 4822.7812.01.1993 1527.33 13.03.1998 4863.4413.01.1993 1529.61 16.03.1998 4891.8514.01.1993 1521.03 17.03.1998 4932.4215.01.1993 1542.91 18.03.1998 4936.17

w = −105 18.01.1993 1559.83 w = −106 19.03.1998 4923.5119.01.1993 1576.13 20.03.1998 4993.53

w = 105 20.01.1993 1586.94 w = 106 23.03.1998 5017.4821.01.1993 1577.62 24.03.1998 5014.62

r = 1000 22.01.1993 1587.95 r = 4000 25.03.1998 5058.5425.01.1993 1582.21 26.03.1998 5093.52

r = 2000 26.01.1993 1566.83 r = 6000 27.03.1998 5041.8427.01.1993 1570.96 30.03.1998 5069.9828.01.1993 1561.02 31.03.1998 5070.8129.01.1993 1571.28 01.04.1998 5093.5201.02.1993 1582.35 02.04.1998 5163.1102.02.1993 1587.20 03.04.1998 5203.5803.02.1993 1595.08 06.04.1998 5256.6904.02.1993 1605.07 07.04.1998 5276.7905.02.1993 1635.67 08.04.1998 5282.9408.02.1993 1643.83 09.04.1998 5270.3509.02.1993 1642.32 14.04.1998 5378.9110.02.1993 1649.79 15.04.1998 5379.9911.02.1993 1651.22 16.04.1998 5362.2612.02.1993 1655.13 17.04.1998 5266.34

Table 8.1: DAX data

Page 95: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

8.2 Numerical results 91

was used and we set

ε1,0 := 0.001, εi+1,0 := 0.7εi, δ1 := 10, δi+1 := 0.7δi, µ1 := 10, µi+1 := 0.8µi.

But as in all examples before the restart procedure proposed by Remark 4.10 was applied to adapt

automatically the accuracy parameter. Then the algorithm was stopped when the barrier parameter

fell below 0.1. Although this stopping criterion seems to be very bad, Figure 8.1 shows that the

tendency of the DAX curve is correctly reconstructed by our final approximate solution which can

be found in the appendix. Furthermore the final approximation error of15.65 is better than16.78achieved by Voetmann [61] and close to the correct minimal value15.30 given by the half of the

maximal gap between two successive observed DAX values.

For the second example data DAX2 we used

r0 := 5000, w1 = . . . = w30 := 30000, ϑ := 5000

as starting point,

ε1,0 := 0.005, εi+1,0 := 0.6εi, δ1 := 50, δi+1 := 0.6δi, µ1 := 100, µi+1 := 0.7µi

and, again, the restart procedure. The stopping criterion was now fulfilled if the barrier parameter

reached0.01. The resulting approximate solution is stated in the appendix too, while our final

approximation error given by54.30 is comparable with the result achieved by Voetmann [61]. The

optimal value is54.28 so that the more accurate stopping criterion leads also to a more accurate

final solution in comparison to the first situation. Figure 8.2 shows again that the complete curve

is correctly reconstructed, but it can be observed as in the first case that there is not detected each

particular fluctuation.

Page 96: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

92 8 An application to the financial market

0 5 10 15 20 25 301520

1540

1560

1580

1600

1620

1640

1660

Days

Dax

Figure 8.1: Example DAX1 - trajectory of the solution

0 5 10 15 20 25 304600

4700

4800

4900

5000

5100

5200

5300

5400

Days

Dax

Figure 8.2: Example DAX2 - trajectory of the solution

Page 97: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

Chapter 9

Perfect reconstruction filter bank design

9.1 The mathematical model

In this chapter we want to analyze the design of so-called perfect reconstruction filter banks. Let us

first give a short introduction into the filter theory from the mathematical point of view (we follow

Kortanek, Moulin [30]). We refer to Antoniou [2], Meyer [34] or generally to the references in

Kortanek, Moulin [30] for much more details than here are presented.

A discrete input signalx is given by an arbitrary infinite sequence{x(n)}n∈Z which is square

summable, i.e.x ∈ l2(Z). Generally afilter is a linear operator that acts on an input signalx

through convolution. Thus, identifying the filter with{h(n)}n∈Z, the output vectory of a linear

time-invariantsystem (LTI) is given by

y(n) =∞∑

i=−∞h(i)x(n− i). (9.1)

Moreover, we assume that the filter coefficientsh(i) are real-valued since data converters work with

real-valued signals only (cf., e.g., Potchinkov [41]).

A very simple filter is described by the decimation operator↓2 which picks out only the terms

of x(n) with even index and corresponds to down-sampling. The adjoint operator↑2 corresponds to

up-sampling and fills in zeros at the odd indices.

For filterh thetransfer functionin the complex domain is

H(z) :=∞∑

n=−∞h(n)z−n.

Then (9.1) is equivalent to multiplying the corresponding transfer functions, i.e.Y (z) = H(z)X(z).Similarly, thefrequency responseis given by

H(ω) :=∞∑

n=−∞h(n)e−jnω

with j as imaginary unit.

93

Page 98: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

94 9 Perfect reconstruction filter bank design

When the filter has only finitely many nonzero components, it is calledfinite impulse response

(FIR-)filter. Such FIR-filters with length2N will be only considered in the sequel.

The combination of at least two filters is calledfilter bank. As stated above we intend to design

perfect reconstruction filter banks. Thus let us describe the simplest case of such a filter bank, a two-

band PR filter bank. Generally, it is divided into two sections, the analysis section and the synthesis

section. The analysis section consists of alowpassand ahighpassfilter which decomposes the input

x(n)

H0(z)

L0(z)

xh(n)

xl(n)

↓ 2

↓ 2

x′h(n)

x′l(n)

x′h(n)

x′l(n)

↑ 2

↑ 2

x′′h(n)

x′′l (n)

H1(z)

L1(z)

yh(n)

yl(n)

my(n)

Analysis section Synthesis section

Figure 9.1: Two-band perfect reconstruction filter bank

signalx(n) into two componentsxl(n) andxh(n). The lowpass filter takes averages to smooth out

variations while the highpass picks out the high frequencies in the signal. After these filters there

is a down-sampling part to shorten the signal. The synthesis section also consists of a lowpass and

a highpass filter. Furthermore, there is an up-sampling part. The task of the synthesis section is to

reconstruct (thus reconstruction filter bank) a signaly from the two signalsx′h andx′l. Our design

goal is to construct the filters in such a way that the output signaly(n) is identical with the input

signalx(n).For the mathematical description let the transfer functions of the lowpass filtersL0, L1 be

given byLm(z) =∑2pm+2N−1

k=2pmhlm(k)z−k with m = 0, 1 andp0, p1 ∈ Z. For simplicity we

set p0 := 0 (otherwise we only have a delayed version of the resulting signal). Furthermore,

Hm(z) =∑2qm+2N−1

k=2qmhhm(k)z−k with q0, q1 ∈ Z are the transfer functions of the highpass fil-

ters. Then one has

x′′l (2n) = x′l(n) =2N−1∑k=0

hl0(k)x(2n− k) and x′′l (2n+ 1) = 0 (9.2)

after a short calculation so that we obtain

X ′′l (z) =12

(L0(z)X(z) + L0(−z)X(−z))

as transfer function of the lowpass band up to the second lowpass filter. Hence,

Yl(z) = L1(z)X ′′l (z) =12

(L0(z)L1(z)X(z) + L0(−z)L1(z)X(−z))

Page 99: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

9.1 The mathematical model 95

is the complete transfer function of the lowpass band. Analogously we get

Yh(z) =12

(H0(z)H1(z)X(z) +H0(−z)H1(z)X(−z))

as transfer function of the highpass band. Adding both we have

Y (z) =12

(L0(z)L1(z) +H0(z)H1(z))X(z) +12

(L0(−z)L1(z) +H0(−z)H1(z))X(−z)

as transfer function for the complete output signal. The first term of this expression is called the

distortion transfer function, while the second term is thealiasing transfer function. The perfect re-

construction condition requires thatY (z) = X(z)z−m with some odd integerm (cf., e.g., Goswami,

Chan [14]), i.e. the output signal can only be a delayed version of the input signal. Consequently the

filters have to be chosen such that the aliasing part is eliminated. This can be achieved by

L1(z) = ±H0(−z) and H1(z) = ∓L0(−z).

Choosing the upper sign and defining product filters for each band we have

Pl(z) := L0(z)L1(z) = L0(z)H0(−z)Ph(z) := H0(z)H1(z) = −L0(−z)H0(z) = −Pl(−z).

Then the perfect reconstruction condition becomes

Pl(z)− Pl(−z) = 2z−m.

At this point there exist two basic approaches for determining the filtersL0,H0 (cf., e.g., Goswami,

Chan [14]). The first one is the quadrature mirror approach, i.e.H0(z) = L0(−z) while the sec-

ond one is the half-band filter approach. In the sequel we assumeH0(z) = −z−mL0(−z−1) in

correspondence to the second approach. Then we have

Pl(z) = −(−z)−mL0(z)L0(−(−z)−1) = z−mL0(z)L0(z−1).

SettingP (z) = zmPl(z) = L0(z)L0(z−1) the perfect reconstruction condition is transformed into

P (z) + P (−z) = 2. (9.3)

Our goal will be the design of this product filterP . Then the underlying lowpass filterL0 comes

from the spectral factorization ofP (cf., e.g., Smith, Barnwell [52]).

To analyze the structure ofP we simply expandL0(z)L0(z−1):

P (z) =2N−1∑i=0

(hl0(i))2 +N−1∑i=0

2N−1−2i∑k=0

hl0(k)hl0(k + 2i)(z2i + z−2i)

+N−1∑i=0

2N−2−2i∑k=0

hl0(k)hl0(k + 2i+ 1)(z2i+1 + z−2i−1).

Page 100: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

96 9 Perfect reconstruction filter bank design

Taking (9.3) into account this leads to the following conditions

2N−1−2k∑i=0

hl0(i)hl0(i+ 2k) = δk0, 0 ≤ k < N. (9.4)

Thus, setting

ai :=2N−2i−2∑k=0

hl0(k)hl0(k + 2i+ 1), 0 ≤ i < N, (9.5)

we have

P (z) = 1 +N−1∑k=0

ak(z−2k−1 + z2k+1).

Moreover, under the change of variable,z = e2πjω, 0 ≤ ω ≤ 0.5, we obtain

P (ω) = 1 + 2N−1∑k=0

ak cos(2(2k + 1)πω)

as well asP (ω) = |L0(ω)|2. ThereforeP (ω) ≥ 0 has to hold such that the feasible product filters

are described by

1 + 2N−1∑k=0

ak cos(2(2k + 1)πω) ≥ 0, 0 ≤ ω ≤ 0.5. (9.6)

Now let us look for a design goal or an objective function. This will come from the application

of subband coding which is illustrated in Figure 9.2.

x(n)

H0(z)

L0(z)

xh(n)

xl(n)

↓ 2

↓ 2

x′h(n)

x′l(n)

Codh

Codl

Dech

Decl

x′h(n)

x′l(n)

↑ 2

↑ 2

x′′h(n)

x′′l (n)

H1(z)

L1(z)

yh(n)

yl(n)

my(n)

Analysis section Synthesis section

Figure 9.2: Two-band coding system

Our digital input signalx has length2P which is split correctly intox′l andx′h (alternatively

we can consider an analog input signal which is split correctly into two analog signals). But now

these signals are transmitted and for this transmission they are shorten (or digitalized) by the coder

to additional length2p. Decoding these coded signals it leads to input signalsx′l, x′h of the synthesis

section which are typically different fromx′l, x′h. Consequently the output signaly of the whole

Page 101: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

9.1 The mathematical model 97

coding system is different from the input signalx. The signaly(n)− x(n) is termed the reconstruc-

tion error and is due to the subband quantization errorsx′l(n) − x′l(n) andx′h(n) − x′h(n). For the

mathematical model these quantization errors are modeled as random processes as follows:

Let a signalv be given in the binary representation, i.e.v =∑l

k=−∞ vk2k. Then the quantization

Q(v) is theb−bit representation ofv (b is called thetransmission rate), i.e.Q(v) can be given by

Q(v) =∑l

k=l−b+1 vk2k. Thus, setting∆ = 2−(b−1)2l, we have

−∆2≤ q = Q(v)− v ≤ ∆

2,

where the division by 2 occurs from the action of round off. Now, assuming that the quantization

errorq has a uniform probability over[−∆/2,∆/2] we obtain

σ2q =

∆/2∫−∆/2

q2 1∆dq =

∆2

12=

2−2b22l

3

Moreover, we assume that the quantization errors are statistically independent and statistically inde-

pendent of the signalv. These assumptions are valid in the limit as∆ tends to zero ifv is itself a

random variable with varianceσ2v . But for a given bit budget∆ and henceσ2

q are related to the input

varianceσ2v in a special way that depends only on the statistical properties of the input signal, i.e.

σ2q = c2−2bσ2

v , (9.7)

wherec is a constant which includes the informations on the statistical properties of the input signal.

Now, let us come back to the two-band case. We assume that the input signalx(n) is a ran-

dom variable for eachn which is Wide Sense Stationary. This means thatmx = Ex(n) and the

autocorrelationsRxx(k) = E[x(n)x(n − k)] are independent ofn. These assumptions are stan-

dard for noise analysis in LTI systems. Then the signalsx′l(n) andx′h(n) are also random variables

which are independent ofn in the sense above. Thus they have variancesσ2l′ , σ

2h′ independent ofn.

Consequently, using (9.7) we obtain the variances

σ2l = c2−2ρlσ2

l′ and σ2h = c2−2ρhσ2

h′

in the lowpass and the highpass band with the same constantc for both bands (because both signals

x′l, x′h coming from the input signalx), but possibly different transmission rates in each band. Due

to the independence assumption the variance of the whole system is

σ2SBC(ρl, ρh) = c2−2ρlσ2

l′ + c2−2ρhσ2h′ .

Now, the design goal is to minimize this variance under the additional constraintρl + ρh = 2ρ. This

leads directly to

ρl = 2ρ+12

log2

σ2l′√

σ2l′σ

2h′

and ρh = 2ρ+12

log2

σ2h′√σ2l′σ

2h′

Page 102: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

98 9 Perfect reconstruction filter bank design

such that the minimal variance of the whole system is

σ2SBC = 2c2−2ρ

√σ2l′σ

2h′ .

Comparing this result with aPulse Code Modulation(equals a one-band coding system) with trans-

mission rateρ we have

σ2PCM = c2−2ρσ2

x

which leads to thecoding gain

GSBC :=σ2PCM

σ2SBC

=σ2x

2√σ2l′σ

2h′

.

Moreover, due to our assumptions of the independence and the perfect reconstruction, we have

σ2x = σ2

l′ + σ2h′ and the coding gain becomes

GSBC =(σ2l′ + σ2

h′)/2√σ2l′σ

2h′

, (9.8)

which has to maximized for the best filter. Due to the fixed sumσ2l′ + σ2

h′ this maximization is

equivalent to the maximization ofσ2l′ if we assumeρl > ρh in accordance with the lowpass/highpass

interpretation.

Now there is only the question how can we calculate the variancesσ2l′ , σ

2h′ . For this we as-

sume without loss of generality that all inputs are zero-mean random processes (cf., e.g., Use-

vitch, Orchard [59]) so that we havemx = E(x(n)) = 0 for all n. Furthermore,σ2l′ is given

by σ2l′ = E((x′l(n))2)− (E(x′l(n)))2. Determining both components we recall the definition

x′l(n) =2N−1∑k=0

hl0(k)x(2n− k)

from (9.2) and, regardingmx = E(x(n)) = 0, we infer

E(x′l(n)) = mx

2N−1∑k=0

hl0(k) = 0

such thatσ2l′ = E((x′l(n))2). Additionally

(x′l(n))2 =2N−1∑k=0

2N−1∑m=0

hl0(k)hl0(m)x(2n− k)x(2n−m)

and consequently

E((x′l(n))2) =2N−1∑k=0

2N−1∑m=0

hl0(k)hl0(m)E(x(2n− k)x(2n−m)).

Page 103: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

9.2 Numerical results 99

Due to the independence ofE(x(n)x(n−m)) of n as well asE(x(k)) = 0 for all k we can set

rm := Rxx(m) = E(x(n)x(n−m)) = Cov(x(n), x(n−m))

so that we obtain

σ2l′ =

2N−1∑k=0

2N−1∑m=0

hl0(k)hl0(m)r|k−m|

=2N−1∑k=0

(hl0(k))2r0 + 22N−1∑k=1

2N−1−k∑m=0

hl0(m)hl0(m+ k)rk.

Using (9.4) and (9.5) we conclude

σ2l′ = r0 + 2

N−1∑k=0

akr2k+1 (9.9)

and, regardingH0(z) = −z−mL0(−z−1),

σ2h′ = r0 − 2

N−1∑k=0

akr2k+1.

Then, summing up the statements above and combining the objective function (9.9) with the feasible

set described by (9.6), our design problem is

maximize r0 + 2N−1∑k=0

akr2k+1

s.t. 1 + 2N−1∑k=0

ak cos(2(2k + 1)πω) ≥ 0, 0 ≤ ω ≤ 0.5

or, written as convex minimization problem,

minimize f(a) := −r0 − 2N−1∑k=0

akr2k+1

s.t. g(a, ω) := −1− 2N−1∑k=0

ak cos(2(2k + 1)πω) ≤ 0, ω ∈ T := [0, 0.5].

(9.10)

9.2 Numerical results

Before we consider several numerical examples let us check Assumption 4.1. The parts (1)-(4) are

obviously fulfilled. Furthermore, the origin ofRN is an interior point of the feasible region since

g(0, ω) = −1 for all ω ∈ T . Thus (5) is fulfilled. In order to show that (6) holds we first prove that

the feasible region is bounded. For that let a feasiblea ∈ RN be fixed and consider the function

Page 104: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

100 9 Perfect reconstruction filter bank design

ga : R → R defined byga(ω) := g(a, ω). Thenga is a periodic even function with period1 and

ga(ω) ≤ 0 for all ω ∈ R which follows from the feasibility ofa for (9.10). Therefore the identity

ga(0.5− ω) = −1 + 2N−1∑k=0

ak cos(2(2k + 1)πω) = −2− ga(ω)

leads immediately toga(ω) ≥ −2 for all ω ∈ R such that|ga(ω)| ≤ 2 holds for allω ∈ R. Now,

considering the(2N − 1)-th partial sum

c0

2+

2N−1∑ν=1

cν cos(2πνω) +2N−1∑ν=1

bν sin(2πνω)

of the Fourier series ofga we have particularly (cf., e.g., Pinkus, Zafrany [36])

cν = 2

1∫0

ga(ω) cos(2πνω)dω

for ν = 0, . . . , 2N − 1. Thus, using the orthogonality property of the Cosinus-function, we obtain

c2k+1 = −4

1∫0

ak cos2(2(2k + 1)πω)dω = −2ak

for all k ∈ {0, . . . , N − 1}. Hence,

|ak| ≤1∫

0

|ga(ω)|dω ≤ 2

for all k ∈ {0, . . . , N − 1} such that‖a‖∞ ≤ 2 follows. Consequently the feasible set of (9.10) is

bounded. Further this set is closed since the involved functions are continuous. Therefore, in (9.10),

we deal with a continuous objective function on a nonempty compact set so that the solution set is

also nonempty and compact, i.e. part (6) holds. Moreover, due to the differentiability ofg(a, ω), we

can set

LtS := 4πmaxa∈S

N∑m=1

(2m+ 1)|am| ≥ supa∈S

supω∈T

∣∣∣∣ ∂g∂ω (a, ω)∣∣∣∣

for each given compact setS ⊂ RN so that (8) holds. Then the constantsCS can be computed by

(6.4) if the constantsLxS are given too. But these constants are simply given by

LxS := 2N ≥ supx∈S

supω∈T

N−1∑m=0

∣∣∣∣ ∂g∂xm(x, ω)

∣∣∣∣ .Let us remark that both constantsLtS andLxS can be improved in the sense of Remark 6.8. For that

we make use of the fact that each summand of the respective gradient can be estimated more exact

on subsets ofT by estimating the appropriate Sinus- or Cosinus-term more exact. Additionally,

Page 105: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

9.2 Numerical results 101

(10) holds since the involved functionsf, g are differentiable and the required subgradients can be

computed by differentiation. Altogether, regarding also the general remarks in the beginning of

the chapter, Assumption 4.1 holds such that Algorithm 4.2 can be used for the design of a perfect

reconstruction two-band filter bank.

Thus let us have a look at numerical examples. We consider the examples given in Kortanek,

Moulin [30] and Moulin et al. [35] so that we deal with the following three cases:

1. AR(1)-process withrn = ρn, ρ = 0.95;

2. AR(2)-processrn = 2ρ cos θrn−1 − ρ2rn−2 with r0 = 1, r1 = 2ρ cos θ1+ρ2 , ρ = 0.975 and

θ = π/3;

3. lowpass process with box spectrum withrn = sin(2πfsn)2πfsn

, fs = 0.225.

For the purpose of comparing the results with those of Kortanek, Moulin [30] and Moulin et al. [35]

we also consider the casesN = 4 andN = 10. Additionally we considerN = 14 and the

standard parameters are contained in Table 9.1. But, the restart procedure forεi,0 andδi described

parameter start value decreasing factor lower bound

µi 1 0.2 10−5

εi,0 0.001 0.15 −δi 100 0.15 −qi 0.999 − −

Table 9.1: filter design - standard parameter

for Example 7.1 was used again if insufficient accuracy values were detected. Furthermore we set

x0 := 0 ∈ RN and the radii were computed by (7.2) withh = hi,k−1 if k > 1 andh = 0.0005 if

k = 1. Additionally all valueshi,k were given as minimum of0.0005 and the maximal value which

fulfills (4.14).

Then we obtained forN = 4 the approximate solutions given in Table 9.2 which also includes

the results of Kortanek, Moulin [30] (in the lower row of each process).

Thus we obtained similar results as presented by Kortanek, Moulin [30]. For the purpose of

evaluating these results the last column of Table 9.2, containing the values of the coding gain, is

of special interest since these values represent the improvement achieved by the application of the

constructed two-band filter banks instead of transferring a single signal. The given values in the table

are different from those calculated by (9.8) since they are now given in a logarithmic scale (decibel)

as usual in the field of filter design, i.e. there is written down10 log10GSBC . Nevertheless, the

values computed by our algorithm are comparable with the results of Kortanek, Moulin [30] and

Moulin et al. [35], whereby we should state that the slight difference is only caused by the fact

that we stopped the algorithm with the barrier parameter1.28E-5. If one computes approximate

solutions for smaller barriers better results are the consequence. For instance, in the AR(2)-case

we also computed a coding gain of6.070 with barrier parameter2.56E-6, but the additional step of

Page 106: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

102 9 Perfect reconstruction filter bank design

Process Algorithm a0 a1 a2 a3Coding gain

(in dB)

4.2 0.612048 −0.149279 0.045733 −0.008533 5.860AR(1)

cf. [30, 35] 0.612104 −0.149404 0.045859 −0.008577 5.862

4.2 0.594990 −0.193611 0.059889 −0.042127 6.069AR(2)

cf. [30, 35] 0.595198 −0.193416 0.060023 −0.042055 6.070

lowpass with 4.2 0.613735 −0.169685 0.072194 −0.026933 4.884box-spectrum cf. [30, 35] 0.613755 −0.169685 0.072184 −0.026923 4.885

Table 9.2: approximate solutions forN = 4

Algorithm 4.2 was disproportional costly due to too large gridsTh and small radii. Thus we did not

compute results for this parameter in general.

In caseN = 10 we obtained the coding gains5.942 (instead of5.945 by Kortanek, Moulin

[30] and Moulin et al. [35]) for the AR(1)-process,6.833 (6.835) for the AR(2)-process and9.869(9.879) for the lowpass process with box spectrum. Thus we can state that the quality of the filter

designed by our algorithm forN = 10 is comparable to those of Kortanek, Moulin [30] and Moulin

et al. [35].

In caseN = 14 we obtained the coding gains5.951 for the AR(1)-process,6.920 for the AR(2)-

process and12.868 for the lowpass process with box spectrum so that the values of the coding gain

increase when the number of variables or equivalently the signal length increases.

More details of all iteration processess are given in the appendix. But, finally, the frequency

response in dB of the computed filters is plotted in the Figures 9.3, 9.4 and 9.5 forN = 4 (left-hand

side) andN = 10 (right-hand side).

Page 107: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

9.2 Numerical results 103

0 0.1 0.2 0.3 0.4 0.5

−100

−80

−60

−40

−20

0

ω

10 lo

g 10 (

P(ω

)/2)

0 0.1 0.2 0.3 0.4 0.5

−100

−80

−60

−40

−20

0

ω

10 lo

g 10 (

P(ω

)/2)

Figure 9.3: AR(1)-process

0 0.1 0.2 0.3 0.4 0.5

−100

−80

−60

−40

−20

0

ω

10 lo

g 10 (

P(ω

)/2)

0 0.1 0.2 0.3 0.4 0.5

−100

−80

−60

−40

−20

0

ω

10 lo

g 10 (

P(ω

)/2)

Figure 9.4: AR(2)-process

0 0.1 0.2 0.3 0.4 0.5

−100

−80

−60

−40

−20

0

ω

10 lo

g 10 (

P(ω

)/2)

0 0.1 0.2 0.3 0.4 0.5

−100

−80

−60

−40

−20

0

ω

10 lo

g 10 (

P(ω

)/2)

Figure 9.5: lowpass with box spectrum

Page 108: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

104 9 Perfect reconstruction filter bank design

Page 109: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

Appendix A

Numerical results

In this appendix we state numerical results of the examples considered in the Chapters 7, 8 and 9

in tabularized form. In order to make the understanding of the tables easier they have of a certain

structure. So the first column contains the dimension of the problem in the sense of its occurrence in

the previous chapters. Then in the second column the used feasible starting vector is given followed

by the exact optimal solution and the optimal value as far as they known. The next column contains

the computed final approximate solution including its value of the objective function and in the case

of a known solution set the distance to this set measured by the Euclidean norm is given in the

“accuracy”-column. Apart from the column containing non-standard parameter values (emanated

from the parameter settings given in the Chapters 7, 8 or 9) there occur two columns titled “effort”

and “final values” which have to be specified in a more detailed way. So the “effort”-column has the

general structure

restarts: #RES

#LP/#QP/#Box

tLP /tQP /tMAX

tTotal

with

#RES : number of restarts of inner loops

#LP : number of solved linear programs

#QP : number of solved quadratic programs

#Box : number of considered boxes

tLP : time in seconds for solving all LP

tQP : time in seconds for solving all QP

tMAX : time in seconds for all maximizations

tTotal : total time in seconds for the complete iteration process

while the “final values”-column contains the final barrier parameterµ, the final radiusr (which is

mostly an indication for the smallest radius), the final prox-parameters (if the regularized method

was used), the averagehav of the grid constants of the final outer step, the minimal grid constant

hmin and the average ratio of the the values|Thi,k |/|Thi,k | or |Thi,j,k |/|Thi,j,k | during the final outer

step as measure for the final effectivity of the deletion rule.

105

Page 110: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

106 A Numerical results

nstartvector

exactsolutionapproxim

atesolution

accuracyeffort

finalvalues

1x

0=

0x

1=

3

x0

=0.000000

x1

=1.000000

f(x)=

1

x0

=−

0.000000x

1=

1.000013f(x)

=1.000013

1.28E-05

restarts:0129/340/44

0.01

s/0.01s/0.18

s0.27

s

µ=

1.28E-05

r=

4.99E

-06hav

=1.67E

-06h

min

=7.36E

-07|Th |/|T

h |=0.88

2x

0=

0x

1=

0x

2=

5

x0

=0.500000

x1

=0.000000

x2

=0.500000

f(x)=

0.5

x0

=0.500000

x1

=−

0.000000x

2=

0.500013f(x)

=0.500013

1.28E-05

restarts:0214/673/76

0.05s/0

.03s/10.30

s12.41

s

µ=

1.28E-05

r=

2.47E

-06hav

=1.76E

-06h

min

=7.28E

-07|Th |/|T

h |=0.81

3

x0

=0

x1

=0

x2

=0

x3

=8

x0

=0.000000

x1

=0.750000

x2

=0.000000

x3

=0.250000

f(x)=

0.25

x0

=0.000000

x1

=0.750000

x2

=−

0.000000x

3=

0.250013f(x)

=0.250013

1.28E-05

restarts:0290/1054/106

0.13

s/0.02s/0.52

s0.85

s

µ=

1.28E-05

r=

2.54E

-06hav

=1.42E

-06h

min

=5.89E

-07|Th |/|T

h |=0.08

4

x0

=0

x1

=0

x2

=0

x3

=0

x4

=14

x0

=−

0.125000x

1=

0.000000

x2

=1.000000

x3

=0.000000

x4

=0.125000

f(x)=

0.125

x0

=−

0.125000x

1=

0.000000x

2=

1.000000x

3=−

0.000000x

4=

0.125013f(x)

=0.125013

1.27E-05

restarts:0445/1834/188

0.58

s/0.14s/0.81

s1.82

s

µ=

1.28E-05

r=

2.04E

-06hav

=1.85E

-06h

min

=6.97E

-07|Th |/|T

h |=0.06

TableA

.1:E

xample

7.1-n

=1,2

,3,4

Page 111: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

107

nst

artv

ecto

rex

acts

olut

ion

appr

oxim

ate

solu

tion

accu

racy

effo

rtfin

alva

lues

5

x0

=0

x1

=0

x2

=0

x3

=0

x4

=0

x5

=24

x0

=0.

0000

00x

1=−

0.31

2500

x2

=0.

0000

00x

3=

1.25

0000

x4

=0.

0000

00x

5=

0.06

2500

f(x

)=

0.06

25

x0

=−

0.00

0000

x1

=−

0.31

2500

x2

=0.

0000

00x

3=

1.25

0000

x4

=−

0.00

0000

x5

=0.

0625

13f

(x)

=0.

0625

13

1.28

E-0

5

rest

arts

:164

7/31

97/35

21.

34s/

0.45

s/5.

46s

7.97

s

µ=

1.28

E-0

5r

=1.

73E

-06

hav

=4.

18E

-07

hm

in=

1.46

E-0

7|Th|/|Th|=

0.10

6

x0

=0

x1

=0

x2

=0

x3

=0

x4

=0

x5

=0

x6

=49

x0

=0.

0312

50x

1=

0.00

0000

x2

=−

0.56

2500

x3

=0.

0000

00x

4=

1.50

0000

x5

=0.

0000

00x

6=

0.03

1250

f(x

)=

0.03

125

x0

=0.

0312

50x

1=−

0.00

0000

x2

=−

0.56

2500

x3

=0.

0000

00x

4=

1.50

0000

x5

=−

0.00

0000

x6

=0.

0312

63f

(x)

=0.

0312

63

1.28

E-0

5

rest

arts

:013

16/8

456/

1180

5.23

s/2.

08s/

13.6

8s

27.1

1s

µ=

1.28

E-0

5r

=1.

44E

-06

hav

=8.

41E

-07

hm

in=

2.95

E-0

7|Th|/|Th|=

0.06

7

x0

=0

x1

=0

x2

=0

x3

=0

x4

=0

x5

=0

x6

=0

x7

=80

x0

=0.

0000

00x

1=

0.10

9375

x2

=0.

0000

00x

3=−

0.87

5000

x4

=0.

0000

00x

5=

1.75

0000

x6

=0.

0000

00x

7=

0.01

5625

f(x

)=

0.01

5625

x0

=0.

0000

00x

1=

0.10

9375

x2

=−

0.00

0000

x3

=−

0.87

5000

x4

=0.

0000

00x

5=

1.75

0000

x6

=−

0.00

0000

x7

=0.

0156

38f

(x)

=0.

0156

38

1.28

E-0

5

rest

arts

:019

13/16

474/

2357

12.1

1s/

4.24

s/63.0

3s

105.

00s

µ=

1.28

E-0

5r

=1.

28E

-06

hav

=2.

83E

-07

hm

in=

9.38

E-0

8|Th|/|Th|=

0.09

Tabl

eA

.2:

Exa

mpl

e7.

1-n

=5,

6,7

Page 112: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

108 A Numerical results

nstartvector

exactsolutionapproxim

atesolution

accuracyeffort

non-standardparam

eterfinalvalues

8

x0

=0

x1

=0

x2

=0

x3

=0

x4

=0

x5

=0

x6

=0

x7

=0

x8

=149

x0

=−

0.007813

x1

=0.000000

x2

=0.250000

x3

=0.000000

x4

=−

1.250000

x5

=0.000000

x6

=2.000000

x7

=0.000000

x8

=0.007813

f(x)=

0.007813

x0

=−

0.007812x

1=

0.000000x

2=

0.250000x

3=−

0.000001x

4=−

1.249999x

5=

0.000002x

6=

1.999999x

7=−

0.000001x

8=

0.007832f(x)

=0.007832

1.97E-05

restarts:13764/31661/5205

27.88s/8.45

s/164.68s

309.69s

µi+

1=

0.3µi

εi+

1,1

=0.27ε

µ=

1.97E-05

r=

1.70E

-06hav

=5.64E

-07h

min

=2.10E

-07|Th |/|T

h |=0.06

9

x0

=0

x1

=0

x2

=0

x3

=0

x4

=0

x5

=0

x6

=0

x7

=0

x8

=0

x9

=276

x0

=0.000000

x1

=−

0.035156x

2=

0.000000x

3=

0.468750x

4=

0.000000x

5=−

1.687500x

6=

0.000000x

7=

2.250000x

8=

0.000000x

9=

0.003906f(x)

=0.003906

x0

=−

0.000000x

1=−

0.035156x

2=

0.000000x

3=

0.468750x

4=−

0.000000x

5=−

1.687500x

6=

0.000000x

7=

2.250000x

8=−

0.000000x

9=

0.003923f(x)

=0.003923

1.67E-05

restarts:13753/44836/11466

39.32s/11.81

s/642.86s

1333.23s

µi+

1=

0.4µi

εi+

1,1

=0.38ε

µ=

1.68E

-05r

=1.30E

-06hav

=2.24E

-07h

min

=8.64E

-08|Th |/|T

h |=0.07

TableA

.3:E

xample

7.1-n

=8,9

Page 113: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

109

nst

art

vect

orex

acts

olut

ion

appr

oxim

ate

solu

tion

accu

racy

effo

rtfin

alva

lues

3x

0=

0x

1+

min{ √ 2x

2+√

2 2x

2

} ≥0

x1

+x

2=

0.66

6667

x3

=0.

6666

67f∗

=−

1.33

3333

x1

=0.

3563

45x

2=

0.30

8748

x1

+x

2=

0.66

5093

x3

=0.

6682

26f

(x)

=−

1.33

3319

1.92

E-0

3

rest

arts

:111

6/26

1/42

0.01

s/0.

00s/

0.02

s0.

08s

µ=

1.28

E−

05r

=3.

60E

-06

hav

=2.

46E

-06

hm

in=

1.12

E-0

6|Th|/|Th|=

0.01

4x

0=

0

x1

+m

in{ √ 2x

2+√

2 2x

2

} ≥0

x1

+x

2=

0.35

4167

x3

=0.

6666

67x

4=

0.62

5000

f∗

=−

1.64

5833

x1

=0.

1854

72x

2=

0.16

7095

x1

+x

2=

0.35

2567

x3

=0.

6674

12x

4=

0.62

5841

f(x

)=−

1.64

5820

1.59

E-0

3

rest

arts

:010

7/22

1/36

0.02

s/0.

01s/

0.02

s0.

07s

µ=

1.28

E-0

5r

=2.

26E

-06

hav

=7.

09E

-06

hm

in=

3.17

E-0

6|Th|/|Th|=

0.02

5x

0=

0

x1

+m

in{ √ 2x

2+√

2 2x

2

} ≥0

x1

+x

2=

0.05

4167

x3

=0.

6666

67x

4=

0.62

5000

x5

=0.

6000

00f∗

=−

1.94

5833

x1

=0.

0284

49x

2=

0.02

5910

x1

+x

2=

0.05

4359

x3

=0.

6665

85x

4=

0.62

4934

x5

=0.

5999

44f

(x)

=−

1.94

5821

1.80

E-0

4

rest

arts

:010

4/21

4/40

0.05

s/0.

01s/

0.02

s0.

10s

µ=

1.28

E-0

5r

=2.

03E

-06

hav

=4.

96E

-05

hm

in=

2.28

E-0

5|Th|/|Th|=

0.10

Tabl

eA

.4:

Exa

mpl

e7.

2-n

=3,

4,5

Page 114: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

110 A Numerical results

nstart

vectorexactsolution

approximate

solutionaccuracy

effortfinalvalues

6x

0=

0

x1

=0.000000

x2

=0.000000

x3

=0.599289

x4

=0.561833

x5

=0.539360

x6

=0.524378

f∗

=−

2.224860

x1

=0.000000

x2

=0.000000

x3

=0.599307

x4

=0.561800

x5

=0.539335

x6

=0.524405

f(x)=−

2.224847

5.30E-05

restarts:0138/419/45

0.13s/0.01

s/0.11

s0.29

s

µ=

1.28E-05

r=

1.86E-06

hav

=1.00E

-03h

min

=1.00E

-03|Th |/|T

h |=1.00

8x

0=

0

x1

=0.000000

x2

=0.000000

x3

=0.496289

x4

=0.465271

x5

=0.446660

x6

=0.434253

x7

=0.425391

x8

=0.418744

f∗

=−

2.686607

x1

=0.000000

x2

=0.000000

x3

=0.496274

x4

=0.465293

x5

=0.446681

x6

=0.434272

x7

=0.425348

x8

=0.418726

f(x)=−

2.686594

6.04E-05

restarts:0130/414/44

0.10s/0.04

s/0.18

s0.38

s

µ=

1.28E-05

r=

1.33E-06

hav

=1.00E

-03h

min

=1.00E

-03|Th |/|T

h |=1.00

10x

0=

0

x1

=0.000000

x2

=0.000000

x3

=0.434217

x4

=0.407078

x5

=0.390795

x6

=0.379940

x7

=0.372186

x8

=0.366370

x9

=0.361847

x10

=0.358229

f∗

=−

3.070663

x1

=0.000000

x2

=0.000000

x3

=0.434155

x4

=0.407066

x5

=0.390782

x6

=0.379961

x7

=0.372187

x8

=0.366369

x9

=0.361875

x10

=0.358255

f(x)=−

3.070650

7.77E-05

restarts:0176/634/72

0.47s/0.05

s/0.19

s0.83

s

µ=

1.28E-05

r=

1.04E-06

hav

=1.00E

-03h

min

=1.00E

-03|Th |/|T

h |=1.00

12x

0=

0

x1

=0.000000

x2

=0.000000

x3

=0.391426

x4

=0.366962

x5

=0.352283

x6

=0.342498

x7

=0.335508

x8

=0.330266

x9

=0.326188

x10

=0.322926

x11

=0.320258

x12

=0.318034

f∗

=−

3.406349

x1

=0.000000

x2

=0.000000

x3

=0.391268

x4

=0.366976

x5

=0.352305

x6

=0.342520

x7

=0.335527

x8

=0.330283

x9

=0.326204

x10

=0.322940

x11

=0.320269

x12

=0.318043

f(x)=−

3.406336

1.65E-04

restarts:0228/989/120

0.88s/0.21

s/0.28

s1.53

s

µ=

1.28E-05

r=

8.64E-07

hav

=1.00E

-03h

min

=1.00E

-03|Th |/|T

h |=1.00

TableA

.5:E

xample

7.2-n

=6,8,10,12

Page 115: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

111n

star

tvec

tor

exac

tsol

utio

nap

prox

imat

eso

lutio

nac

cura

cyef

fort

non-

stan

d.pa

ram

.fin

alva

lues

14

x0

=0

x1

=0.0

26169

x2

=−

0.1

26357

x3

=0.3

69398

x4

=0.3

46311

x5

=0.3

32458

x6

=0.3

23223

x7

=0.3

16627

x8

=0.3

11680

x9

=0.3

07832

x10

=0.3

04753

x11

=0.3

02235

x12

=0.3

00136

x13

=0.2

98360

x14

=0.2

96838

f∗

=−

3.7

09663

x1

=0.0

27115

x2

=−

0.1

30925

x3

=0.3

69748

x4

=0.3

46639

x5

=0.3

32773

x6

=0.3

23529

x7

=0.3

16927

x8

=0.3

11975

x9

=0.3

08123

x10

=0.3

05041

x11

=0.3

02520

x12

=0.3

00419

x13

=0.2

98642

x14

=0.2

97118

f(x

)=−

3.7

09644

4.7

8E

-03

rest

arts

:1

1293/8027/3143

7.4

2s/

0.9

5s/

0.6

5s

12.7

0s

µi+

1=

0.4µi

ε i+

1,0

=0.3

3ε i

δ i+

1=

0.3

3δ i

µ=

1.6

8E

-05

r=

1.0

3E

-06

hav

=2.7

6E

-06

hm

in=

1.1

6E

-06

|Th|/|Th|=

0.0

5

15

x0

=0

x1

=0.0

64765

x2

=−

0.3

12711

x3

=0.3

69398

x4

=0.3

46311

x5

=0.3

32458

x6

=0.3

23223

x7

=0.3

16627

x8

=0.3

11680

x9

=0.3

07832

x10

=0.3

04753

x11

=0.3

02235

x12

=0.3

00136

x13

=0.2

98360

x14

=0.2

96838

x15

=0.2

95518

f∗

=−

3.8

57422

x1

=0.0

65839

x2

=−

0.3

17899

x3

=0.3

69768

x4

=0.3

46657

x5

=0.3

32790

x6

=0.3

23546

x7

=0.3

16943

x8

=0.3

11990

x9

=0.3

08139

x10

=0.3

05057

x11

=0.3

02536

x12

=0.3

00435

x13

=0.2

98657

x14

=0.2

97133

x15

=0.2

95813

f(x

)=−

3.8

57404

5.4

2E

-03

rest

arts

:1

1635/9942/3885

10.1

9s/

1.4

1s/

1.0

4s

17.8

0s

µi+

1=

0.4µi

ε i+

1,0

=0.3

3ε i

δ i+

1=

0.3

3δ i

µ=

1.6

8E

-05

r=

9.7

4E

-07

hav

=9.1

4E

-07

hm

in=

2.5

4E

-07

|Th|/|Th|=

0.0

3

Tabl

eA

.6:

Exa

mpl

e7.

2-n

=14,1

5

Page 116: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

112 A Numerical results

nstartvector

exactsolutionapproxim

atesolution

accuracyeffort

finalvalues

3

x0

=0

x1

=0

x2

=0

x3

=0

x4

=8

x0

=0.000000

x1

+x

3=

0.750000

x2

+x

3=

0.000000

x3∈R

x4

=0.250000

f(x)=

0.25

x0

=0.000000

x1

=0.492192

x1

+x

3=

0.750000

x2

=−

0.257808x

2+x

3=

0.000000

x3

=0.257808

x4

=0.250016

f(x)=

0.250016

1.61E-05

restarts:2435/978/217

0.23s/0

.08s/0.59

s1.17

s

µ=

1.60E-05

r=

1.65E

-06si

=3.13E

-04hav

=1.71E

-06h

min

=6.79E

-07|Th |/|T

h |=0.08

4

x0

=0

x1

=0

x2

=0

x3

=0

x4

=0

x5

=14

x0

=−

0.125000

x1

+x

4=

0.000000

x2

+x

4=

1.000000

x3

=0.000000

x4∈R

x5

=0.125000

f(x)=

0.125

x0

=−

0.125000x

1=−

0.338274x

1+x

4=

0.000001

x2

=0.661725

x2

+x

4=

1.000000

x3

=−

0.000000x

4=

0.338275

x5

=0.125016

f(x)=

0.125016

1.59E-05

restarts:2712/1660

/3840.69

s/0.19

s/1.72s

3.16

s

µ=

1.60E-05

r=

1.43E

-06si

=3.13E

-04hav

=1.61E

-06h

min

=6.47E

-07|Th |/|T

h |=0.07

TableA

.7:E

xample

7.4-n

=3,4,

k=

1

Page 117: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

113

nst

artv

ecto

rex

acts

olut

ion

appr

oxim

ate

solu

tion

accu

racy

effo

rtfin

alva

lues

5

x0

=0

x1

=0

x2

=0

x3

=0

x4

=0

x5

=0

x6

=24

x0

=0.

0000

00

x1

+x

5=−

0.31

2500

x2

+x

5=

0.00

0000

x3

=1.

2500

00x

4=

0.00

0000

x5∈R

x6

=0.

0625

00f

(x)

=0.

0625

x0

=−

0.00

0000

x1

=−

0.21

4367

x1

+x

5=−

0.31

2500

x2

=0.

0981

33x

2+x

5=

0.00

0000

x3

=1.

2500

00x

4=−

0.00

0000

x5

=−

0.09

8133

x6

=0.

0625

16f

(x)

=0.

0625

16

1.60

E-0

5

rest

arts

:214

45/3

488/

946

1.85

s/0.

45s/

4.02

s7.

71s

µ=

1.60

E-0

5r

=1.

27E

-06

s i=

3.13

E-0

4hav

=1.

84E

-06

hm

in=

7.06

E-0

7|Th|/|Th|=

0.04

6

x0

=0

x1

=0

x2

=0

x3

=0

x4

=0

x5

=0

x6

=0

x7

=49

x0

=0.

0312

50

x1

+x

6=

0.00

0000

x2

+x

6=−

0.56

2500

x3

=0.

0000

00x

4=

1.50

0000

x5

=0.

0000

00x

6∈R

x7

=0.

0312

50f

(x)

=0.

0312

5

x0

=0.

0312

50x

1=

0.18

5106

x1

+x

6=

0.00

0000

x2

=−

0.37

7394

x2

+x

6=−

0.56

2500

x3

=0.

0000

00x

4=

1.50

0000

x5

=−

0.00

0000

x6

=−

0.18

5106

x7

=0.

0312

66f

(x)

=0.

0312

66

1.59

E-0

5

rest

arts

:242

02/12

002/

3115

8.67

s/1.

86s/

42.2

1s

88.8

9s

µ=

1.60

E-0

5r

=1.

18E

-06

s i=

3.13

E-0

4hav

=1.

37E

-06

hm

in=

4.16

E-0

7|Th|/|Th|=

0.04

Tabl

eA

.8:

Exa

mpl

e7.

4-n

=5,

6,k

=1

Page 118: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

114 A Numerical results

nstartvector

exactsolutionapproxim

atesolution

accuracyeffort

finalvalues

5

x0

=0

x1

=0

x2

=0

x3

=0

x4

=0

x5

=0

x6

=24

x0

=0.000000

x1

=−

0.312500

x2

+x

5=

0.000000

x3

+x

5=

1.250000

x4

=0.000000

x5∈R

x6

=0.062500

f(x)=

0.0625

x0

=−

0.000000

x1

=−

0.312500x

2=−

0.421595x

2+x

5=

0.000000

x3

=0.828405

x3

+x

5=

1.250000

x4

=−

0.000000x

5=

0.421595

x6

=0.062516

f(x)=

0.062516

1.60E

-05

restarts:21400/3502/919

1.54s/0

.42s/4.83

s8.50

s

µ=

1.60E-05

r=

1.27E-06

si

=3.13E

-04hav

=1.28E

-06h

min

=4.77E

-07|Th |/|T

h |=0.05

6

x0

=0

x1

=0

x2

=0

x3

=0

x4

=0

x5

=0

x6

=0

x7

=49

x0

=0.031250

x1

=0.000000

x2

+x

6=−

0.562500

x3

+x

6=

0.000000

x4

=1.500000

x5

=0.000000

x6∈R

x7

=0.031250

f(x)=

0.03125

x0

=0.031250

x1

=−

0.000000

x2

=−

0.378013x

2+x

6=−

0.562500x

3=

0.184488

x3

+x

6=

0.000001

x4

=1.499999

x5

=−

0.000001x

6=−

0.184487x

7=

0.031266

f(x)=

0.031266

1.61E

-05

restarts:24383/12708/3156

8.80s/1.91

s/40.96s

86.20s

µ=

1.60E-05

r=

1.20E-06

si

=3.13E

-04hav

=1.34E

-06h

min

=3.58E

-07|Th |/|T

h |=0.04

TableA

.9:E

xample

7.4-n

=5,6,

k=

2

Page 119: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

115

nst

artv

ecto

rex

acts

olut

ion

appr

oxim

ate

solu

tion

accu

racy

effo

rtfin

alva

lues

5

x0

=0

x1

=0

x2

=0

x3

=0

x4

=0

x5

=0

x6

=24

x0

=0.

0000

00x

1=−

0.31

2500

x2

=0.

0000

00

x3

+x

5=

1.25

0000

x4

+x

5=

0.00

0000

x5∈R

x6

=0.

0625

00f

(x)

=0.

0625

x0

=−

0.00

0000

x1

=−

0.31

2500

x2

=0.

0000

00x

3=

0.83

2594

x3

+x

5=

1.25

0000

x4

=−

0.41

7406

x4

+x

5=

0.00

0000

x5

=0.

4174

06x

6=

0.06

2516

f(x

)=

0.06

2516

1.58

E-0

5

rest

arts

:224

10/5

891/

1455

3.15

s/0.

78s/

11.9

4s

24.2

8s

µ=

1.60

E-0

5r

=1.

24E

-06

s i=

3.13

E-0

4hav

=1.

31E

-06

hm

in=

3.80

E-0

7|Th|/|Th|=

0.03

6

x0

=0

x1

=0

x2

=0

x3

=0

x4

=0

x5

=0

x6

=0

x7

=49

x0

=0.

0312

50x

1=

0.00

0000

x2

=−

0.56

2500

x3

+x

6=

0.00

0000

x4

+x

6=

1.50

0000

x5

=0.

0000

00x

6∈R

x7

=0.

0312

50f

(x)

=0.

0312

5

x0

=0.

0312

50x

1=

0.00

0000

x2

=−

0.56

2500

x3

=−

0.50

1085

x3

+x

6=

0.00

0001

x4

=0.

9989

14x

4+x

6=

1.50

0000

x5

=−

0.00

0001

x6

=0.

5010

86x

7=

0.03

1266

f(x

)=

0.03

1266

1.63

E-0

5

rest

arts

:245

30/12

498/

3096

8.52

s/2.

13s/

50.4

5s

100.

20s

µ=

1.60

E-0

5r

=1.

16E

-06

s i=

3.13

E-0

4hav

=1.

11E

-06

hm

in=

3.16

E-0

7|Th|/|Th|=

0.04

Tabl

eA

.10:

Exa

mpl

e7.

4-n

=5,

6,k

=3

Page 120: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

116 A Numerical results

nstart

vectorexactsolution

approximate

solutionaccuracy

effortnon-standardparam

etersfinalvalues

5x

0=

0

x1≥

0xi

=0.500000

(i=

2,...,5)

f∗

=−

2

x1

=0.056616

x2

=0.499969

x3

=0.499985

x4

=0.500003

x5

=0.500027

f(x)=−

1.999984

4.38E-05

restarts:382/114/34

0.03s/0

.01s/0.03

s0.20

s

µ1

=0.05

µ=

1.60E-05

r=

3.34E-06

si

=3.13E

-04hav

=1.48E

-05h

min

=6.88E

-06|Th |/|T

h |=0.05

12x

0=

0

x1≥

0xi

=0.301511

(i=

2,...,12)

f∗

=−

3.316625

x1

=0.000516

x2

=0.301456

x3

=0.301461

x4

=0.301468

x5

=0.301477

x6

=0.301488

x7

=0.301500

x8

=0.301515

x9

=0.301531

x10

=0.301550

x11

=0.301570

x12

=0.301593

f(x)=−

3.316609

1.46E-04

restarts:293/118/37

0.19s/0.00

s/0.04s

0.55s

µ1

=0.05

µ=

1.60E-05

r=

1.13E-06

si

=3.13E

-04hav

=5.49E

-06h

min

=2.14E

-06|Th |/|T

h |=0.03

20x

0=

0

x1≥

0xi

=0.229416

(i=

2,...,20)

f∗

=−

4.358899

x1

=0.004671

x2

=0.229202

x3

=0.229209

x4

=0.229220

x5

=0.229233

x6

=0.229248

x7

=0.229267

x8

=0.229289

x9

=0.229314

x10

=0.229341

x11

=0.229371

x12

=0.229405

x13

=0.229441

x14

=0.229480

x15

=0.229522

x16

=0.229567

x17

=0.229615

x18

=0.229666

x19

=0.229719

x20

=0.229776

f(x)=−

4.358885

7.79E-04

restarts:283/107/41

0.46s/0

.00s/0.10

s1.32

s

µ1

=0.04

µ=

1.28E-05

r=

3.05E-07

si

=3.13E

-04hav

=2.37E

-05h

min

=8.88E

-05|Th |/|T

h |=0.00

TableA

.11:E

xample

7.5-n

=5,12

,20,k=

1

Page 121: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

117

nst

art

vect

orex

acts

olut

ion

appr

oxim

ate

solu

tion

accu

racy

effo

rtno

n-st

anda

rdpa

ram

eter

sfin

alva

lues

6x

0=

0

xi≥

0(i

=1,

2)xi

=0.

5000

00(i

=3,...,

6)

f∗

=−

2

x1

=0.

0976

18x

2=

0.06

5079

x3

=0.

4999

74x

4=

0.49

9980

x5

=0.

4999

87x

6=

0.49

9996

f(x

)=−

1.99

9936

3.56

E-0

5

rest

arts

:274/99/35

0.05

s/0.

00s/

0.02

s0.

23s

µ1

=0.

02

µ=

3.20

E-0

5r

=1.

22E

-05

s i=

6.25

E-0

4hav

=2.

37E

-05

hm

in=

1.23

E-0

5|Th|/|Th|=

0.07

12x

0=

0

xi≥

0(i

=1,

2)xi

=0.

3162

28(i

=3,...,

12)

f∗

=−

3.16

2278

x1

=0.

0422

13x

2=

0.02

8142

x3

=0.

3162

11x

4=

0.31

6213

x5

=0.

3162

15x

6=

0.31

6218

x7

=0.

3162

21x

8=

0.31

6225

x9

=0.

3162

29x

10

=0.

3162

34x

11

=0.

3162

39x

12

=0.

3162

45f

(x)

=−

3.16

2252

3.56

E-0

5

rest

arts

:372/1

04/3

70.

16s/

0.00

s/0.

10s

0.81

s

µ1

=0.

008

µ=

1.28

E-0

5r

=5.

95E

-07

s i=

6.25

E-0

4hav

=7.

52E

-06

hm

in=

1.19

E-0

7|Th|/|Th|=

0.01

20x

0=

0

xi≥

0(i

=1,

2)xi

=0.

2357

02(i

=3,...,

20)

f∗

=−

4.24

2641

x1

=0.

0249

27x

2=

0.01

6618

x3

=0.

2356

18x

4=

0.23

5621

x5

=0.

2356

26x

6=

0.23

5632

x7

=0.

2356

39x

8=

0.23

5647

x9

=0.

2356

56x

10

=0.

2356

67x

11

=0.

2356

78x

12

=0.

2356

91x

13

=0.

2357

04x

14

=0.

2357

19x

15

=0.

2357

34x

16

=0.

2357

51x

17

=0.

2357

69x

18

=0.

2357

88x

19

=0.

2358

08x

20

=0.

2358

29f

(x)

=−

4.24

2578

2.80

E-0

4

rest

arts

:182/1

26/5

70.

56s/

0.00

s/0.

15s

1.44

s

µ1

=0.

004

µ=

3.20

E-0

5r

=7.

55E

-07

s i=

1.25

E-0

3hav

=9.

30E

-05

hm

in=

1.54

E-0

5|Th|/|Th|=

0.12

Tabl

eA

.12:

Exa

mpl

e7.

5-n

=6,

12,2

0,k

=2

Page 122: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

118 A Numerical results

nstart

vectorexactsolution

approximate

solutionaccuracy

effortnon-standardparam

etersfinalvalues

7x

0=

0

xi ≥

0(i

=1,2

,3)xi

=0.500000

(i=

4,...,7)

f∗

=−

2

x1

=0.104093

x2

=0.080503

x3

=0.060378

x4

=0.499976

x5

=0.499983

x6

=0.499992

x7

=0.500002f(x)

=−

1.999953

3.02E

-05

restarts:282/115/36

0.05s/0

.00s/0.07

s0.40

s

µ1

=0.01

µ=

1.60E

-05r

=9.71E

-06si

=6.25E

-04hav

=2.12E

-05h

min

=7.12E

-06|Th |/|T

h |=0.06

12x

0=

0

xi ≥

0(i

=1,2

,3)xi

=0.333333

(i=

4,...,12)

f∗

=−

3

x1

=0.049793

x2

=0.043036

x3

=0.032277

x4

=0.333305

x5

=0.333307

x6

=0.333310

x7

=0.333314

x8

=0.333318

x9

=0.333323

x10

=0.333328

x11

=0.333334

x12

=0.333341

f(x)=−

2.999880

5.32E

-05

restarts:275/107/36

0.13s/0

.00s/0.13

s0.88

s

µ1

=0.005

µ=

4.00E

-05r

=9.03E

-06si

=1.25E

-03hav

=3.15E

-05h

min

=1.43E

-05|Th |/|T

h |=0.08

20x

0=

0

xi ≥

0(i

=1,2,3)

xi

=0.242536

(i=

4,...,20)

f∗

=−

4.123106

x1

=0.026088

x2

=0.024121

x3

=0.018091

x4

=0.242529

x5

=0.242529

x6

=0.242529

x7

=0.242530

x8

=0.242530

x9

=0.242530

x10

=0.242531

x11

=0.242531

x12

=0.242532

x13

=0.242533

x14

=0.242534

x15

=0.242534

x16

=0.242535

x17

=0.242536

x18

=0.242537

x19

=0.242538

x20

=0.242539

f(x)=−

4.123058

1.79E

-05

restarts:3102/169/68

0.69s/0

.02s/0.56

s2.76

s

µ1

=0.001

µ=

1.60E

-05r

=1.70E

-06si

=1.25E

-03hav

=3.49E

-06h

min

=7.29E

-07|Th |/|T

h |=0.04

TableA

.13:E

xample

7.5-n

=7,12

,20,k=

3

Page 123: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

119

nst

art

vect

orex

acts

olut

ion

appr

oxim

ate

solu

tion

accu

racy

effo

rtno

n-st

anda

rdpa

ram

eter

sfin

alva

lues

10x

0=

0

xi≥

0(i

=1,...,

5)xi

=0.

4472

14(i

=6,...,

10)

f∗

=−

2.23

6068

x1

=0.

0857

28x

2=

0.08

5539

x3

=0.

0642

62x

4=

0.05

1764

x5

=0.

0428

43x

6=

0.44

7187

x7

=0.

4471

92x

8=

0.44

7197

x9

=0.

4472

03x

10

=0.

4472

09f

(x)

=−

2.23

5988

3.98

E-0

5

rest

arts

:392/1

36/3

50.

07s/

0.01

s/0.

22s

0.96

s

µ1

=0.

01

µ=

1.60

E-0

5r

=9.

40E

-06

s i=

6.25

E-0

4hav

=1.

41E

-05

hm

in=

1.02

E-0

6|Th|/|Th|=

0.01

20x

0=

0

xi≥

0(i

=1,...,

5)xi

=0.

2581

99(i

=6,...,

20)

f∗

=−

3.87

2983

x1

=0.

0295

09x

2=

0.02

9509

x3

=0.

0290

61x

4=

0.02

3408

x5

=0.

0193

74x

6=

0.25

8165

x7

=0.

2581

66x

8=

0.25

8169

x9

=0.

2581

71x

10

=0.

2581

74x

11

=0.

2581

76x

12

=0.

2581

80x

13

=0.

2581

83x

14

=0.

2581

87x

15

=0.

2581

91x

16

=0.

2581

95x

17

=0.

2582

00x

18

=0.

2582

05x

19

=0.

2582

10x

20

=0.

2582

15f

(x)

=−

3.87

2786

7.95

E-0

5

rest

arts

:299/1

77/7

50.

64s/

0.01

s/0.

55s

2.75

s

µ1

=0.

001

µ=

4.00

E-0

5r

=5.

19E

-06

s i=

2.50

E-0

3hav

=4.

81E

-04

hm

in=

6.17

E-0

7|Th|/|Th|=

0.22

Tabl

eA

.14:

Exa

mpl

e7.

5-n

=10,2

0,k

=5

Page 124: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

120 A Numerical results

nstartvector

approximate

solutioneffort

finalvalues

32r0

=1600

w1

=...=

w30

=0

ϑ=

3000

r0

=1525

.52w

1=

36242.75

w2

=32815.99

w3

=13815

.77w

4=

4020.24

w5

=−

6069.15w

6=

4758.85

w7

=14737.18

w8

=14112.17

w9

=18346.01

w10 =

46544.21w

11 =

33868.20w

12 =

40881.96w

13 =

14098.55w

14 =

14098.55w

15 =

15506.86w

16 =−

3195.49w

17 =

7344.09

w18 =

7793.20w

19 =

13793.60w

20 =

30348.69w

21 =

30674.80w

22 =

19024.95w

23 =

26004.27w

24 =

46345.79w

25 =

49706.85w

26 =

14621.09w

27 =

17968.50w

28 =

20163.07w

29 =

19863.05w

30 =

14764.52ϑ

=15.65

restarts:8946/39337/7508

633.58s/137.58

s/395.34s

1429.63s

µ=

1.15E

-01r

=1.59E

-01hav

=3.20E

-05h

min

=2.13E

-05|Th |/|T

h |=0.90

TableA

.15:E

xample

DA

X1

Page 125: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

121

nst

artv

ecto

rap

prox

imat

eso

lutio

nef

fort

final

valu

es

32r 0

=50

00w

1=...=w

30

=10

000

ϑ=

5000

r 0=

4642.7

9w

1=

4129

6.84

w2

=17

4057.8

5w

3=

1220

32.1

4w

4=

1139

92.0

6w

5=

5157

5.18

w6

=51

645.

83w

7=

8653

7.16

w8

=10

3728.9

1w

9=

7985

1.57

w10=

4390

6.46

w11=

7753

0.96

w12=

1328

07.7

4w

13=

4462

9.71

w14=

7336

4.74

w15=

9534

4.36

w16=

4355

3.69

w17=

4508

9.31

w18=

4758

6.70

w19=

4510

4.08

w20=

1316

17.5

9w

21=

1246

02.1

3w

22=

1202

79.3

4w

23=

1153

73.1

9w

24=

5289

2.84

w25=

5042

7.28

w26=

1108

67.2

3w

27=

1306

48.2

7w

28=

4785

4.24

w29=−

5097

3.20

w30=

4686

3.05

ϑ=

54.3

0

rest

arts

:716

43/3

5399/3

366

848.

61s/

153.

91s/

528.

86s

1711.7

7s

µ=

1.34

E-0

2r

=1.

17E

-02

hav

=3.

02E

-05

hm

in=

1.01

E-0

7|Th|/|Th|=

0.78

Tabl

eA

.16:

Exa

mpl

eD

AX

2

Page 126: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

122 A Numerical results

nstartvector

approximate

solutioneffort

non-standardparam

etersfinalvalues

4x

0=

0

a0 =

0.612048

a1 =−

0.149279

a2 =

0.045733a

3 =−

0.008533C

odinggain:5.860

restarts:2614/1816/258

0.34s/0.10

s/12.64s

17.91s

-

µ=

1.28E-05

r=

2.26E-06

hav

=1.12E

-06h

min

=6.53E

-09|Th |/|T

h |=0.06

10x

0=

0

a0 =

0.631895a

1 =−

0.198906a

2 =0.107007

a3 =−

0.065041a

4 =0.040580

a5 =−

0.024743a

6 =0.014092

a7 =−

0.007013a

8 =0.002653

a9 =−

0.000539C

odinggain:5.943

restarts:21897/8420/923

8.13

s/3.80s/286.47

s360.29

s

-

µ=

1.28E-05

r=

9.17E-07

hav

=2.07E

-07h

min

=1.77E

-07|Th |/|T

h |=0.14

14x

0=

0

a0

=0.634045

a1

=−

0.204803a

2=

0.115607a

3=−

0.075458a

4=

0.052038a

5=−

0.036541a

6=

0.025579a

7=−

0.017563a

8=

0.011636a

9=−

0.007286a

10 =

0.004175a

11 =−

0.002063a

12 =

0.000770a

13 =−

0.000154C

odinggain:5.951

restarts:32260/13069/911

35.33s/14.91

s/380.55s

509.43s

µi+

1=

0.4µi

εi+

1,1

=0.38ε

i

µ=

1.68E-05

r=

6.90E-07

hav

=2.88E

-07h

min

=2.63E

-07|Th |/|T

h |=0.20

TableA

.17:D

esignofperfectreconstruction

filterbanks

-A

R(1)-process

Page 127: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

123

nst

artv

ecto

rap

prox

imat

eso

lutio

nef

fort

non-

stan

dard

para

met

ers

final

valu

es

4x

0=

0

a0=

0.59

4990

a1=−

0.19

3611

a2=

0.05

9889

a3=−

0.04

2127

Cod

ing

gain

:6.0

69

rest

arts

:254

0/11

32/3

020.

10s/

0.05

s/0.

70s

2.01

s

-

µ=

1.28

E-0

5r

=2.

30E

-06

hav

=4.

52E

-07

hm

in=

4.05

E-0

7|Th|/|Th|=

0.01

10x

0=

0

a0=

0.63

0535

a1=−

0.20

0938

a2=

0.10

8131

a3=−

0.06

5681

a4=

0.04

1014

a5=−

0.02

5251

a6=

0.01

4921

a7=−

0.00

8523

a8=

0.00

3052

a9=−

0.00

2626

Cod

ing

gain

:6.8

33

rest

arts

:214

65/6

426/

585

5.45

s/2.

89s/

45.4

0s

65.5

7s

-

µ=

1.28

E-0

5r

=8.

96E

-07

hav

=2.

10E

-07

hm

in=

1.65

E-0

7|Th|/|Th|=

0.03

14x

0=

0

a0

=0.

6336

11a

1=−

0.20

5747

a2

=0.

1164

44a

3=−

0.07

6323

a4

=0.

0529

79a

5=−

0.03

7556

a6

=0.

0266

31a

7=−

0.01

8599

a8

=0.

0126

13a

9=−

0.00

8184

a10=

0.00

5015

a11=−

0.00

2939

a12=

0.00

1063

a13=−

0.00

0938

Cod

ing

gain

:6.9

20

rest

arts

:418

06/1

2624/4

8729.4

6s/

13.6

6s/

299.

24s

374.

66s

µi+

1=

0.3µ

i

ε i+

1,1

=0.

27ε i

µ=

1.97

E-0

5r

=1.

05E

-06

hav

=1.

75E

-07

hm

in=

1.14

E-0

7|Th|/|Th|=

0.08

Tabl

eA

.18:

Des

ign

ofpe

rfec

trec

onst

ruct

ion

filte

rba

nks

-A

R(2

)-pr

oces

s

Page 128: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

124 A Numerical results

nstart

vectorapproxim

atesolution

effortnon-standardparam

etersfinalvalues

4x

0=

0

a0 =

0.613735

a1 =−

0.169685a

2 =0.072194

a3 =−

0.026933C

odinggain:4

.884

restarts:1590/1307/223

0.24

s/0.05s/0.68

s1.45

s

-

µ=

1.28E

-05r

=1.85E

-06hav

=1.04E

-06h

min

=7.28E

-07|Th |/|T

h |=0.01

10x

0=

0

a0 =

0.632184a

1 =−

0.201212a

2 =0.110762

a3 =−

0.069688a

4 =0.045660

a5 =−

0.029877a

6 =0.018947

a7 =−

0.011254a

8 =0.005893

a9 =−

0.002283C

odinggain:9

.869

restarts:21581/7906/376

8.59s/3

.27s/54.26

s75.95

s

-

µ=

1.28E

-05r

=8.86E

-07hav

=2.78E

-07h

min

=1.88E

-07|Th |/|T

h |=0.04

14x

0=

0

a0

=0.634205

a1

=−

0.205603

a2

=0.116862

a3

=−

0.077002

a4

=0.053742

a5

=−

0.038311

a6

=0.027350

a7

=−

0.019287

a8

=0.013277

a9

=−

0.008806

a10 =

0.005531a

11 =−

0.003198

a12 =

0.001605a

13 =−

0.000586

Coding

gain:12.868

restarts:32022/16278/473

45.76s/20.03

s/264.72s

360.55s

µi+

1=

0.3µi

εi+

1,1

=0.27ε

i

µ=

1.97E

-05r

=8.74E

-07hav

=3.18E

-07h

min

=1.76E

-07|Th |/|T

h |=0.09

TableA

.19:D

esignofperfectreconstruction

filterbanks

-low

passprocess

with

boxspectrum

Page 129: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

Bibliography

[1] E. D. Andersen, J. Gondzio, C. Meszaros, and X. Xu. Implementation of Interior-Point meth-

ods for large scale linear programs. In T. Terlaky, editor,Interior Point Methods of Mathemat-

ical Programming, pages 189–252. Kluwer Academics, 1996.

[2] A. Antoniou. Digital Filters: Analysis, Design and Applications. McGraw-Hill, Inc., New

York, second edition, 1993.

[3] A. Bakushinsky and A. Goncharsky.Ill-Posed Problems: Theory and Applications, volume

301 of Mathematics and Its Applications. Kluwer Academics, Dordrecht/Boston/London,

1994.

[4] P. J. Davis and P. Rabinowitz.Methods of Nuemerical Integration. Academic Press, New York,

1975.

[5] D. den Hertog.Interior Point Approach to Linear, Quadratic and Convex Programming, vol-

ume 277 ofMathematics and its Applications. Kluwer Academics, Dordrecht/Boston/London,

1994.

[6] M. C. Ferris and A. B. Philpott. An interior point algorithm for semi-infinite linear program-

ming. Mathematical Programming, 43(3):257–276, 1989.

[7] M. C. Ferris and A. B. Philpott. On affine scaling and semi-infinite programming.Mathemat-

ical Programming, 56:361–364, 1992.

[8] A. V. Fiacco and K. O. Kortanek, editors.Semi-Infinite Programming and Applications, volume

215 ofLecture Notes in Economics and Mathematical Systems, Berlin-Heidelberg-New York-

Tokyo, 1983. Springer.

[9] A. V. Fiacco and G. P. McCormick.Nonlinear Programming: Sequential Unconstrained Min-

imization Techniques. J. Wiley, New York, 1968.

[10] R. Fletcher. A general quadratic programming algorithm.Journal of the Institute of Mathe-

matics and its Application, 7:76–91, 1971.

[11] K. R. Frisch. The logarithmic potential method of convex programming. Technical report,

University Institute of Economics, Oslo, May 1955.

125

Page 130: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

126 Bibliography

[12] P. E. Gill, W. Murray, M. A. Saunders, J. A. Tomlin, and M. H. Wright. On projected Newton

barrier methods for linear programming and an equivalence to Karmarkar’s projective method.

Mathematical Programming, 36(2):183–209, 1986.

[13] W. L. Gorr, S.-A. Gustafson, and K. O. Kortanek. Optimal control strategies for air quality

standards and regulatory policy.Environment and Planning, 4:183–192, 1972.

[14] J. C. Goswami and A. K. Chan.Fundamentals of Wavelets: Theory, Algorithms and Applica-

tions. John Wiley & Sons, Inc., New York, 1999.

[15] E. Haaren-Retagne.A semi-infinite programming algorithm for robot trajectory planning. PhD

thesis, Universitat Trier, 1992.

[16] W. Hackbusch. Iterative Losung großer schwachbesetzter Gleichungssysteme. Teubner,

Stuttgart, 2nd edition, 1993.

[17] R. Hettich and K. O. Kortanek. Semi-infinite programming: Theory, Methods, and Applica-

tions. SIAM Review, 35(3):380–429, September 1993.

[18] R. Hettich and G. Still. Semi-infinite programming models in robotics. In J. Guddat et al.,

editors,Parametric Optimization and Related Topics II, Math. Res. 62, pages 112–118, Berlin,

1991. Akademie-Verlag.

[19] R. Hettich and P. Zencke.Numerische Methoden der Approximation und semi-infiniten Opti-

mierung. Teubner, Stuttgart, 1982.

[20] J.-B. Hiriart-Urruty and C. Lemarechal. Convex Analysis and Minimization Algorithms I.

Springer, Berlin-Heidelberg-New York, 1993.

[21] J.-B. Hiriart-Urruty and C. Lemarechal. Convex Analysis and Minimization Algorithms II.

Springer, Berlin-Heidelberg-New York, 1993.

[22] F. Jarre.The Method of Analytic Centers for Smooth Convex Programs. PhD thesis, Universitat

Wurzburg, Grottenthaler Verlag, Bamberg, 1989.

[23] F. Jarre. Comparing two interior-point approaches for semi-infinite programs. Technical Re-

port, 1999.

[24] A. Kaplan and R. Tichatschke.Stable Methods for Ill-posed Variational Problems. Akademie-

Verlag, Berlin, 1994.

[25] A. Kaplan and R. Tichatschke. Proximal Interior Point Approach in Convex Programming.

Forschungsbericht 96-27, Universitat Trier, 1996.

[26] A. Kaplan and R. Tichatschke. Proximal Interior Point Approach for Convex Semi-infinite

Programming Problems. Forschungsbericht 98-09, Universitat Trier, 1998. Submitted to Op-

timization Methods & Software.

Page 131: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

Bibliography 127

[27] A. Kaplan and R. Tichatschke. Proximal Interior Point Approach in Convex Programming.

Optimization, 45:117–148, 1999.

[28] K. C. Kiwiel. Proximal level bundle methods for convex nondifferentiable optimization,

saddle-point problems and variational inequalities.Mathematical Programming, 69(1):89–

109, 1995.

[29] K. O. Kortanek and W. L. Gorr. Numerical aspeccts of pollution abatement problems: optimal

control strategies for air quality standards. In M. Henke, A. Jaeger, R. Wartmann, and J. H.

Zimmermann, editors,Proceedings in Operations Research, pages 34–58, Wurzburg-Wien,

1972. Physica-Verlag.

[30] K. O. Kortanek and P. Moulin.Semi-infinite programming in orthogonal wavelet filter design,

pages 323–360. In Reemtsen and Ruckmann [44], 1998.

[31] C.-J. Lin, S. C. Fang, and S.-Y. Wu. An unconstrained convex programming approach to linear

semi-infinite programming.SIAM Journal of Optimization, 8(2):443–456, 1998.

[32] B. Martinet. Regularisation d’inequations variationelles par approximations successives. RIRO

4, 1970.

[33] B. Martinet. Algorithmes pour la resolution de problemes d’optimisation et de minimax. These

d’Etat, 1972. Univ. Grenoble.

[34] Y. Meyer. Wavelets: Algorithms & Applications. SIAM, Philadelphia, second edition, 1994.

[35] P. Moulin, M. Anitescu, K. O. Kortanek, and F. A. Potra. The Role of Linear Semi-Infinite

Programming in Signal-Adapted QMF Bank Design.IEEE Transactions on Signal Processing,

45(9):2160–2174, September 1997.

[36] A. Pinkus and S. Zafrany.Fourier Series and Integral Transforms. Cambridge University

Press, Cambridge, 1997.

[37] E. Polak. On the mathematical foundations of nondifferentiable optimization in engineering

design.SIAM Review, 29(1):21–89, 1987.

[38] E. Polak. Optimization. Algorithms and Consistent Approximations, volume 124 ofApplied

Mathematical Sciences. Springer-Verlag, New York, 1997.

[39] B. T. Poljak. Introduction to Optimization. Optimization Software, Inc. Publ. Division, New

York, 1987.

[40] A. Potchinkov. Der Entwurf digitaler FIR-Filter mit Methoden der semiinfiniten konvexen

Optimierung. PhD thesis, Technische Universitat Berlin, 1994.

[41] A. W. Potchinkov. The design of nonrecursive digital filters via convex optimization, pages

361–387. In Reemtsen and Ruckmann [44], 1998.

Page 132: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

128 Bibliography

[42] M. J. D. Powell. Karmarkar’s algorithm: a view from nonlinear programming.Bulletin of the

Institute of Mathematics and Applications, 26:165–181, 1990.

[43] M. J. D. Powell. Log barrier methods for semi-infinite programming calculations. In E. A.

Lipitakis, editor,Advances on computer mathematics and its applications, pages 1–21. World

Scientific, Singapore, 1993.

[44] R. Reemtsen and J.-J. Ruckmann, editors.Semi-Infinite Programming. Nonconvex Optimiza-

tion and its Applications. Kluwer Academics, Boston/Dordrecht/London, 1998.

[45] R. T. Rockafellar.Convex Analysis. Princeton University Press, Princeton, New Jersey, second

edition, 1972.

[46] R. T. Rockafellar. Augmented lagrangians and applications of the proximal point algorithm in

convex programming.Mathematics of Operations Research, 1:97–116, 1976.

[47] R. T. Rockafellar. Monotone operators and the proximal point algorithm.SIAM Journal on

Control and Optimization, 14(5):877–898, 1976.

[48] R. T. Rockafellar and R. J.-B. Wets.Variational Analysis, volume 317 ofA series of compre-

hensive studies in mathematics. Springer, Berlin, 1998.

[49] E. W. Sachs. Semi-infinite programming in control, pages 389–411. In Reemtsen and

Ruckmann [44], 1998.

[50] U. Schattler. An interior-point method for semi-infinite programming problems. PhD thesis,

Universitat Wurzburg, 1992.

[51] U. Schattler. An interior-point method for semi-infinite programming problems.Annals of

Operations Research, 62:277–301, 1996.

[52] M. J. T. Smith and T. P. Barnwell III. Exact reconstruction technqiues for tree-structured

subband coders.IEEE Transactions on Acoustics, Speech, and Signal Processing, 34(3):434–

441, June 1986.

[53] G. Sonnevend. An “analytical centre” for polyhedrons and new classes of global algorithms

for linear (smooth, convex) programming. In12th IFIP Conference on System Modelling and

Optimization, volume 84 ofLecture Notes in Control and Information Sciences, pages 866–

876. Springer, 1986.

[54] G. Sonnevend. Applications of analytic centers for the numerical solution of semiinfinite,

convex programs arising in control theory. In H.-J. Sebastian and K. Tammer, editors,Sys-

tem Modelling and Optimization, volume 143 ofLecture Notes in Control and Information

Sciences, pages 413–422. Springer, Berlin-Heidelberg-New York, 1990.

[55] G. Sonnevend. A new class of a high order interior point method for the solution of convex

semiinfinite optimization problems. In R. Bulirsch and D. Kraft, editors,Computational and

Optimal Control, pages 193–211. Birkhauser, Basel, 1994.

Page 133: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

Bibliography 129

[56] R. Tichatschke, A. Kaplan, T. P. Voetmann, and M. Bohm. Numerical Solution of Control

Problems under Uncertainty and Perturbation of Input Data with Applications in Finance.

Forschungsbericht 00-05, Universitat Trier, 2000.

[57] M. J. Todd. Interior-point algorithms for semi-infinite programming.Mathematical Program-

ming, 65(2):217–245, 1995.

[58] L. Tuncel and M. J. Todd. Asymptotic behavior of interior-point methods: A view from semi-

infinite programming.Mathematics of Operations Research, 21(2):354–381, 1996.

[59] B. E. Usevitch and M. T. Orchard. Smooth wavelets, transform coding, and markov-1 pro-

cesses.IEEE Transactions on Signal Processing, 43(11):2561–2569, November 1995.

[60] O. Vasicek. An equilibrium characterization of the term structure.Journal of Financial Eco-

nomics, 5:177–188, 1977.

[61] T. P. Voetmann. Proximal-Punkt-Methoden bei schlecht gestellten semi-infiniten Problemen.

Diplomarbeit, Universitat Trier, 1999.

[62] M. H. Wright. Interior methods for constrained optimization.Acta Numerica, pages 341–407,

1992.

Page 134: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

130 Bibliography

Page 135: A logarithmic barrier approach and its …ub-dok.uni-trier.de/diss/diss55/20010323/20010323.pdf2001/03/23  · problems so that competitive interior-point methods for solving finite

Tabellarische Zusammenfassung des Bildungsweges

Name Lars Abbe

Geburtstag 20.01.1973

Geburtsort Bleicherode

09/1979 – 08/1987 POS Oberdorla

09/1987 – 06/1991 Spezialschule mathematisch-naturwissenschaftlich

technischer Richtung Erfurt

10/1991 – 09/1992

10/1993 – 02/1998

Mathematikstudium an der Georg-August Univer-

sitat Gottingen mit Abschluß Diplom

04/1998 – 03/2001 Stipendiat im Graduiertenkolleg “Mathematische

Optimierung” an der Universitat Trier