Notes on duality in second order and -order cone otimization E. D. Andersen Λ, C. Roos y, and T. Terlaky z Aril 6, 000 Abstract Recently, the so-calle
|
|
- Jessie Norris
- 5 years ago
- Views:
Transcription
1 McMaster University Advanced Otimization Laboratory Title: Notes on duality in second order and -order cone otimization Author: Erling D. Andersen, Cornelis Roos and Tamás Terlaky AdvOl-Reort No. 000/8 May 000, Hamilton, Ontario, Canada
2 Notes on duality in second order and -order cone otimization E. D. Andersen Λ, C. Roos y, and T. Terlaky z Aril 6, 000 Abstract Recently, the so-called second order cone otimization roblem has received much attention, because the roblem has many alications and the roblem can at least in theory be solved efficiently by interior-oint methods. In this note we treat duality for second order cone otimization roblems and in articular whether a nonzero duality ga can be introduced when casting a convex quadratically constrained otimization roblem as a second order cone otimization roblem. Furthermore, we also discuss the -order cone otimization roblem which isanatural generalization of the second order case. Secifically, we suggest a new self-concordant barrier for the -order cone otimization roblem. Introdution The second order cone otimization roblem can be stated as (SOC) minimize f T x jja i x b i jj» c i: x d i ; i =;:::;k; Hx = h: where A i R (mi ) n and H R l n and all the other quantities have conforming dimensions. c i: denotes the ith row of C R k n. k k denotes the Euclidean norm. Clearly, the roblem (SOC) is a convex but non-smooth roblem because the norm is not differentiable at zero. We will not survey the numerous alications for this otimization model here, but rather refer the reader to [4]. However, it can be observed that linear, convex quadratic, and convex quadratically constrained otimization roblems all can be stated as second order cone otimization roblems. For examle if m i = for all i's, then (SOC) reduces to an ordinary linear otimization roblem. The outline of the aer is as follows. We first discuss duality for second-order cone otimization roblems and resent two examles which demonstrate that nonzero duality ga can occur. Next we show that if a convex quadratically constrained otimization roblem is formulated as a second order cone otimization roblem then a ositive duality ga cannot occur. Finally, we discuss the -order generalization of the second order cone case. Λ TU Delft, Mekelweg 4, 68 CD Delft, The Netherlands, e.d.andersen@mosek.com. y TU Delft, Mekelweg 4, 68 CD Delft, The Netherlands, c.roos@its.tudelft.nl. z McMaster University, Deartment of Comuting and Software, Hamilton, Ontario, Canada. L8S 4L7. terlaky@cas.mcmaster.ca. art of this research was done while the author was emloyed at TU Delft.
3 Duality The dual roblem corresonding to (SOC) is (SOCD) maximize b T z + d T w + h T v A T z + C T w + H T v = f; jjz i jj» w i ; i =;:::;k; where z i R m i and w R k and we use the notation that A := 6 4 A. A k The following duality theorem is well-known. and z := Theorem. Let ν SOC denote the otimal objective value of (SOC) where minimize is relaced by inf. Similarly, let ν SOCD denote the otimal objective value of (SOCD) where maximize is relaced by su. Then the following holds:. Weak duality: If both (SOC) and (SOCD) are feasible, then ν SOC ν SOCD.. Strong duality: If either (SOC) or (SOCD) is Slater regular, then ν SOC = ν SOCD. Moreover, If both the rimal and dual roblem are Slater regular, then both roblems have an otimal solution and ν SOC = ν SOCD. (We use the convention ν SOC = if (SOC) is infeasible. Similarly, ν SOCD = if (SOCD) is infeasible.) roof: [] Subsequently, we will resent some examles that demonstrates that strong duality in general requires the Slater regularity condition, because otherwise there might be a ositive duality ga between the rimal and dual roblem.. Infinite duality ga The first examle is 6 4 z. z k : minimize x q x + x x» 0; which has f(x ;x ): x 0; x =0g as the set of feasible solutions. From here it is obvious that the otimal objective value ν SOC is zero and the roblem is not Slater regular. The dual roblem corresonding to () is maximize 0 z + w = 0; q z = ; z + z» w : () () The constraints of () can be reduced to q w +» w which imlies () is infeasible thus ν SOCD =. Hence, in this case the duality ga is infinity.
4 . Finite but nonzero duality ga Next consider the examle minimize x q x +(x )» x ; q ( x + x )» x : (3) The first constraint clearly imlies that x follows from the second constraint that = in any feasible solution. Given that fact it» x : Hence, the feasible set consists of f(x ;x ): x ; x =g and the otimal objective value is. The dual roblem corresonding to (3) is maximize z z + w z 3 + w = 0; q z + z 3 = ; z + z» w ; z3» w : (4) Since, it follows from the two last constraints that then Using the first constraint this imlies Now using the second constraint we have that Therefore, (4) is equivalent to w jz j and w jz 3 j; w + z 0andw z 3 0: w = z and w = z 3 : z = z 3 = w : maximize q w w +( w )» w ; (5) qw» w which has the feasible set f(w ;w ): w 0; w =g and the otimal objective value is zero. Hence, we have constructed an examle where both the rimal roblem () and dual roblem (4) has an otimal solution, but nevertheless the duality ga is nonzero. The reader can verify that if (x ) is relaced by (x ff) in the roblem definition (3), then for any ff>0therewill be a ositive duality ga of size ff. 3
5 .3 Non-attainment The examle minimize x " x x #» x (6) shows that the otimal objectivevalue is not always attained. The reason is that the constraint imlies +x» x x : (7) This shows that the otimal objective value is zero but cannot be attained..4 From quadratically constrained otimization to second order cone otimization According to [4] then one of the advantages of second order cone otimization is that convex quadratically constrained otimization can be cast as a second order cone otimization. However, an issue not addressed in [4] is whether recasting a quadratically constrained otimization roblem as a second order cone otimization roblem can introduce ositive duality ga. As demonstrated in the revious section a ositive dualtity ga might occur. This would be very bad because it has already been demonstrated in [8, 9, 0] that there exist a dual roblem corresonding to any convex quadratically constrained otimization roblem which has zero duality ga. We will therefore address the issue whether a convex quadratically constrained otimization roblem recast as a second order cone otimization roblem has worse duality roerties than the originally roblem. Any convex quadratically constrained otimization roblem can be stated on the form minimize c T x jj(qi ) T xjj a i: x + b i» 0; i =;:::;m; where Q i R n l i and A Rm n. The remaining quantities are assumed to have conforming dimensions. The ordinary Lagrange dual corresonding to (8) is identical to maximize b T y m y ijj(q i ) T xjj c + m y i Q i (Q i ) T x A T y = 0; (9) y 0: (8) Now using the definition we obtain the alternative dual roblem maximize z i := y i (Q i ) T x b T y m jjz i jj y i c + m Q i z i A T y = 0; y 0; (0) which aears in [0]. The reader can easily verify that (9) and (0) are equivalent. Observe that the dual roblem does not contain any rimal variables and has linear constraints only. 4
6 Using the duality theory develoed for ` rogramming resented in [8, 9, 0] we obtain the roosition: roosition. Given that both (8) and (0) has a feasible solution, then the duality ga between those roblems are zero and (8) attains its otimum value. Moreover, the duality ga between (8) and (9) is zero as well. roof: Given (8) and (0) both has a feasible solution then it follows from [0] that the duality gabetween (8) and (0) is zero and (8) attains its otimum value. Hence, we have that (0) has a feasible solution (^y; ^z i )having bounded objective value i.e. Obviously if the system b T ^y mx mx jj^z i jj > : () ^y i ^y i Q i (Q i ) T x = mx Q i^z i () has a solution, then (9) also has a solution. Assume the contrary is the case i.e. () does not have solution. This imlies there exists a u such that u T m X ^y i Q i (Q i ) T =0 (3) and u T m X Q i^z i 6=0: (4) Now multily both sides of (3) from the left by u and is obtained. Therefore, u T m X ^y i Q i (Q i ) T u = (Q ^y i i ) T u mx (Q ^y i i ) T u =0; 8i =0 holds and hence (Q i ) T u =0if ^y i > 0. On the other hand if ^y i =0,then () imlies ^z i =0. The combination of these two facts imlies u T Q i^z i =0; 8i which is a contradiction to (4). Therefore, we conclude if (0) is feasible, then (9) is feasible. Now let ^x be any solution to (), then 0» m = m = m = m k^y i (Q i ) T ^x ^z i k ^y i k^y i (Q i ) T ^xk +k^z i k ^y i (^z i ) T (Q i ) T ^x ψ i k^z k ^y i ψ k^z i k ^y i ^y i (Qi! +^y i ) T ^x (Qi! ^y i ) T ^x m (^y i Q i (Q i ) T ^x) T ^x (5) 5
7 and it follows mx (Q ^y i i ) T ^x» mx k^z i k ^y i : (6) Clearly, (^x; ^y) is a feasible solution to (9) and (6) shows that this solution has the same or a better objective value than the feasible solution (^y; ^z) to the roblem (0). In summary we have roved for any feasible solution to (0) with a bounded objective value, then there exists a feasible solution to (9) having the same or a better objective value. This imlies that the duality ga between (8) and (9) is zero. It has been roved in [3] that roblem (8) and roblem (0) satisfies the self-concordant condition and thus both roblems can be solved efficiently. Alternatively roblem (8) can be recast as a second order cone otimization roblem and solved as such. One way to erform the reformulation of (8) is as follows. First introduce two additional variables t and u to obtain minimize c T x jj(q i ) T xjj» u i t i ; i =;:::;m; u t = Ax b; u + t = e: (7) e is the vector of all ones. Note that this formulation imlicitly contains the constraints u t =(u i + t i )(u i t i ) 0 and u i + t i 0 which imlies that u i 0 in all feasible solutions. roblem (7) is equivalent to minimize c T x (Qi ) T x t i» u i ; i =;:::;m; u = e + (Ax b) ; t = e (Ax b) which after elimination of the variables u and t leads to the second order cone otimization roblem minimize c T x (Q i ) T x (a i:x b i )» + (a i:x b i ) (9) ; i =;:::;m: The dual roblem corresonding to (9) is (8) maximize (b +e)t μz + (b e)t w k (Q i )z i AT w A T μz = c; zi» w i ; ;:::;m: μz i (0) Now our question can be stated as if there is a ositive duality ga between the rimal roblem (9) and the dual roblem (0)? The answer is given in the subsequent roosition. roosition. Given both (8) and (9) have a feasible solution, then both roblem (9) and roblem (0) has a feasible solution. Moreover, the duality ga is zero. 6
8 roof: It should be obvious that any feasible solution to (8) essentially defines a feasible solution to (9) as well having the same objective value for both roblems. Moreover, given the assumtions then (9) has a feasible solution (^x; ^y). Next let z i = ^y i (Q i ) T ^x; i =;:::;m; w = ^y i ψ k(q i ) T ^xk μz = w ^y: 4 +! ; i =;:::;m; which we claim is a feasible solution of (0). Clearly w 0 and if these values are substituted into (0) and the resulting roblem is simlified, then we obtain the roblem minimize b T ^y m ^y i (Q i ) T ^x c + m ^y i (Q i )(Q i ) T x A T ^y = 0; ^y 0: Obviously, (9) and () are identical. Hence, we have demonstrated that any feasible solution to (9) can easily be converted to a feasible solution to (). Moreover, this leaves the objective value of the solution unchanged. In conclusion given the duality ga between (8) and (9) is zero, then the duality ga between the roblems (9) and (0) is zero as well. Hence, nothing is lost (duality wise) by reformulating a quadratically constrained otimization roblem as a second order cone otimization roblem. Finally, observe that the dual roblem (0) is equivalent to the following second order cone otimization roblem maximize b T y m t i c + m Q i z i A T y = 0; jjz i jj» y i t i ; y 0 involving the so-called rotated quadratic cone. One obvious question is which of the many formulations of the convex quadratically constrained otimization can be solved most efficiently. The answer is that an f-otimal solution can be obtained in O( m ) Newton stes for the roblems (8), (9), and (0) using an f interior-oint algorithm. This is roved in [5], [7], and [3] Therefore, from a comlexity oint of view all three formulations of the quadratically constrained otimization roblem is equally difficult to solve. However, only the second order cone otimization formulation has the secial roerty that the roblem is self-dual (see next section) and the cone is homogeneous [7]. This imlies that efficient rimal-dual algorithms exist for this class of roblems and not for the other formulations [7]. Hence, casting a convex quadratically otimization roblem as second order cone otimization roblem and solving it using a rimal-dual algorithm might be the most efficient way. However, this still has to be verified in ractice. () () 7
9 3 -order cone otimization A generalization of the second order otimization model is the -order cone otimization roblem which can be exressed as follows where A R m n. Moreover, let x i R n i In this case we use the definition Given i > and (OC) minimize c T x Ax = b; x i K i ; i =;:::;k; K i := then the dual cone corresonding to K i is K Λ i := and x := 6 4 x x. x k : 8 0 >< X >: xi R n i : n i i + q i = j= 8 0 >< X >: si R n i : n i j= jx i jj i js i jj q i 9 i > = A 9 q i > = A >; : >; : (3) The second order case is when = and in that case the rimal and dual cone is identical i.e. self-dual. The dual roblem corresonding to (OC)is (DOC) maximize b T y A T y + s = c; s i K Λ i ; i =;:::;k; where s i and s is constructed as x i and x. This has been shown in []. Solution of the -order cone roblem has already been studied by Xue and Ye []. Indeed they develo several olynomial time algorithm using different self-concordant barriers for the cone. Subsequently, we resent a new self-concordant barrier for the -order cone which has a better barrier arameter than the one suggested by Xue and Ye []. Moreover, we will demonstrate that both (OC) and (DOC) can be reformulated as ordinary smooth convex rograms. This has the advantage that the roblems can be solved using existing otimization software. Although it might not be as efficient as using secial urose algorithms. By definition the constraint (r;x) K where K has the form (3) is equivalent to kxk» r (4) 8
10 where we assume that x R l and r R. Although this constraint exresses a convex set then it is nonsmooth, because the norm is not differentiable at zero. However, it is easy to verify that constraint (4) can be relaced by the constraints which in turn is equivalent to the constraints 0» r; kxk r» 0; (5) 0» r; kxk r» 0: (6) r Note in articular for the second order case i.e. =,thenthe function kxk is a smooth convex function on its domain f(r;x):r>0g. Moreover, it can be roven that r ln(r r kxk ) ln(r) =ln(r kxk ) is a -self-concordant barrier for the constraint (6). This imlies in the second order case, that the cone constraints can be relaced by ordinary" convex constraints and the resulting rogram can be solved in olynomial time using a standard interior-oint algorithm. On the other hand if is odd and larger than, then the constraint (6) is not a smooth convex constraint. However, the constraints (6) be relaced by which is identical to l t i» r; jx i j r» t i ; i =;:::;l; r;t i 0; i =;:::;l; l t i» r; jx i j» t i r ; i =;:::;l; r;t i 0; i =;:::;l: Using the usual trick by introducing some additional constraints, then we can get rid of the absolute sign as follows l r i» t; x i t i r» 0; i =;:::;l; x i t i r» 0; i =;:::;l; r;t i 0; i =;:::;l: Clearly, l new constraints and variables has been introduced into the roblem. Moreover, we have the following roosition (7) roosition 3. The set 8 >< (x i ;r i ;t): >: x i t i r» 0; x i t i r» 0; t i ;r >= >;
11 is a convex set and the function ln(t i r x i ) ln(t i r + x i ) ln(t) ln(r i ) is a 4-self-concordant barrier for this set. roof: See Lemma 6 in [3]. We are now ready to state the main theorem Theorem 3. The function ln(r lx t i ) lx ( ln(t i r x i ) ln(t i r + x i ) ln(t) ln(r i )) is a (+4l)-self-concordant barrier for the set given by (7). roof: It follows directly from roosition 3. and the barrier calculus outlined in [6,. 9]. The best barrier resented in Xue and Ye [] for the -order cone where is arbirary large has the arameter 00l. Xue and Ye also resents another barrier, but it deends on. Hence, the new barrier function is better. Although indeendent of the barrier then a short-ste interior-oint algorithm will solve the roblem in O( n ln(=f)) Newton stes. 4 Conclusion In this aer we have shown that when a convex quadratically constrained otimization roblem is cast as a second order cone otimization roblem using the method outlined in Section.4 then the resulting rimal and dual second order cone otimization roblem has zero duality ga. Finally,we discuss the -order cone otimization roblem and suggest a new self-concordant barrier function for the roblem which has a better arameter than the one suggested in []. References [] I. Adler and F. Alizadeh. rimal-dual interior oint algorithms for convex quadratically constrained and semidefinite otimization roblems. Technical Reort RRR--95, RUTCOR, Rutgers Center for Oerations Research,.O. Box 506, New Brunswick, New Jersey, 995. [] A. Ben-Tal and A Nemirovski. Convex otimization in engineering: Modeling, analysis, algorithms [3] D. den Hertog, F. Jarre, C. Roos, and T. Terlaky. A sufficient conditions for selfconcordance, with alication to some classes of structured convex rogramming roblems. Math. rogramming, 69():75 88,
12 [4] M.S. Lobo, L. Vandenberghe, S. Boyd, and H. Lebret. Second-order cone rogramming. Technical reort, ISL, Electrical Engineering Deartment, Stanford University, Stanford, CA, 997. Submitted to Linear Algebra and Alications. [5] Y. Nesterov and A. Nemirovskii. Interior-oint olynomial Algorithms in Convex rogramming. SIAM, hiladelhia, A, edition, 994. [6] Yu. Nesterov. Interior-oint methods: An old and new aroach to nonlinear rogramming. Math. rogramming, 79:85 97, 998. [7] Yu. Nesterov and J.-h. Vial. Homogeneous analytic center cutting lane methods for convex roblems and variational inequalities. Technical Reort 997.4, Logilab, HEC Geneva, Section of Management Studies, University of Geneva, jul 997. [8] E. L. eterson and J. G. Ecker. Geometric rogramming: Duality in quadratic rogramming and ` aroximation ii. J. on Al. Math., 3:37 340, 967. [9] E. L. eterson and J. G. Ecker. Geometric rogramming: Duality in quadratic rogramming and ` aroximation iii. J. Math. Anal. Al., 9: , 970. [0] T. Terlaky. On ` rogramming. Euroean J. Oer. Res., :70 00, 985. [] G. Xue and Y. Ye. An Efficient Algorithm for Minimizing a Sum of -Norms. Technical reort, Deartment of Comuter Science and Electrical Engineering, The University of Vermont, Setember 997. [] G. Xue and Y. Ye. An efficient algorithm for minimizing a sum of euclidean norms with allications. SIAM J. on Otim., 7(4):07 036, 997.
Some results of convex programming complexity
2012c12 $ Ê Æ Æ 116ò 14Ï Dec., 2012 Oerations Research Transactions Vol.16 No.4 Some results of convex rogramming comlexity LOU Ye 1,2 GAO Yuetian 1 Abstract Recently a number of aers were written that
More informationOn the Chvatál-Complexity of Knapsack Problems
R u t c o r Research R e o r t On the Chvatál-Comlexity of Knasack Problems Gergely Kovács a Béla Vizvári b RRR 5-08, October 008 RUTCOR Rutgers Center for Oerations Research Rutgers University 640 Bartholomew
More informationThe Algebraic Structure of the p-order Cone
The Algebraic Structure of the -Order Cone Baha Alzalg Abstract We study and analyze the algebraic structure of the -order cones We show that, unlike oularly erceived, the -order cone is self-dual for
More informationConvex Optimization methods for Computing Channel Capacity
Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem
More informationElementary Analysis in Q p
Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some
More informationEfficient algorithms for the smallest enclosing ball problem
Efficient algorithms for the smallest enclosing ball roblem Guanglu Zhou, Kim-Chuan Toh, Jie Sun November 27, 2002; Revised August 4, 2003 Abstract. Consider the roblem of comuting the smallest enclosing
More informationA numerical implementation of a predictor-corrector algorithm for sufcient linear complementarity problem
A numerical imlementation of a redictor-corrector algorithm for sufcient linear comlementarity roblem BENTERKI DJAMEL University Ferhat Abbas of Setif-1 Faculty of science Laboratory of fundamental and
More informationON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS
#A13 INTEGERS 14 (014) ON THE LEAST SIGNIFICANT ADIC DIGITS OF CERTAIN LUCAS NUMBERS Tamás Lengyel Deartment of Mathematics, Occidental College, Los Angeles, California lengyel@oxy.edu Received: 6/13/13,
More informationMATH 2710: NOTES FOR ANALYSIS
MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite
More information#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS
#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS Ramy F. Taki ElDin Physics and Engineering Mathematics Deartment, Faculty of Engineering, Ain Shams University, Cairo, Egyt
More informationApproximating min-max k-clustering
Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost
More informationE-companion to A risk- and ambiguity-averse extension of the max-min newsvendor order formula
e-comanion to Han Du and Zuluaga: Etension of Scarf s ma-min order formula ec E-comanion to A risk- and ambiguity-averse etension of the ma-min newsvendor order formula Qiaoming Han School of Mathematics
More informationGOOD MODELS FOR CUBIC SURFACES. 1. Introduction
GOOD MODELS FOR CUBIC SURFACES ANDREAS-STEPHAN ELSENHANS Abstract. This article describes an algorithm for finding a model of a hyersurface with small coefficients. It is shown that the aroach works in
More information4. Score normalization technical details We now discuss the technical details of the score normalization method.
SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules
More informationLocation of solutions for quasi-linear elliptic equations with general gradient dependence
Electronic Journal of Qualitative Theory of Differential Equations 217, No. 87, 1 1; htts://doi.org/1.14232/ejqtde.217.1.87 www.math.u-szeged.hu/ejqtde/ Location of solutions for quasi-linear ellitic equations
More informationMATH 361: NUMBER THEORY EIGHTH LECTURE
MATH 361: NUMBER THEORY EIGHTH LECTURE 1. Quadratic Recirocity: Introduction Quadratic recirocity is the first result of modern number theory. Lagrange conjectured it in the late 1700 s, but it was first
More informationOn the minimax inequality and its application to existence of three solutions for elliptic equations with Dirichlet boundary condition
ISSN 1 746-7233 England UK World Journal of Modelling and Simulation Vol. 3 (2007) No. 2. 83-89 On the minimax inequality and its alication to existence of three solutions for ellitic equations with Dirichlet
More informationPositive decomposition of transfer functions with multiple poles
Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.
More informationVarious Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems
Int. J. Oen Problems Comt. Math., Vol. 3, No. 2, June 2010 ISSN 1998-6262; Coyright c ICSRS Publication, 2010 www.i-csrs.org Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various
More informationOn a class of Rellich inequalities
On a class of Rellich inequalities G. Barbatis A. Tertikas Dedicated to Professor E.B. Davies on the occasion of his 60th birthday Abstract We rove Rellich and imroved Rellich inequalities that involve
More informationOn the irreducibility of a polynomial associated with the Strong Factorial Conjecture
On the irreducibility of a olynomial associated with the Strong Factorial Conecture Michael Filaseta Mathematics Deartment University of South Carolina Columbia, SC 29208 USA E-mail: filaseta@math.sc.edu
More informationResearch Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces
Abstract and Alied Analysis Volume 2012, Article ID 264103, 11 ages doi:10.1155/2012/264103 Research Article An iterative Algorithm for Hemicontractive Maings in Banach Saces Youli Yu, 1 Zhitao Wu, 2 and
More informationSOME TRACE INEQUALITIES FOR OPERATORS IN HILBERT SPACES
Kragujevac Journal of Mathematics Volume 411) 017), Pages 33 55. SOME TRACE INEQUALITIES FOR OPERATORS IN HILBERT SPACES SILVESTRU SEVER DRAGOMIR 1, Abstract. Some new trace ineualities for oerators in
More information4TE3/6TE3. Algorithms for. Continuous Optimization
4TE3/6TE3 Algorithms for Continuous Optimization (Duality in Nonlinear Optimization ) Tamás TERLAKY Computing and Software McMaster University Hamilton, January 2004 terlaky@mcmaster.ca Tel: 27780 Optimality
More informationTibor Illes, Jiming Peng 2, Kees Roos, Tamas Terlaky Faculty of Information Technology and Systems Subfaculty of Technical Mathematics and Informatics
DELFT UNIVERSITY OF TECHNOLOGY REPORT 98{5 A Strongly Polynomial Rounding Procedure Yielding A Maximally Comlementary Solution for P () Linear Comlementarity Problems T. Illes, J. Peng, C. Roos, T. Terlaky
More informationFigure : An 8 bridge design grid. (a) Run this model using LOQO. What is the otimal comliance? What is the running time?
5.094/SMA53 Systems Otimization: Models and Comutation Assignment 5 (00 o i n ts) Due Aril 7, 004 Some Convex Analysis (0 o i n ts) (a) Given ositive scalars L and E, consider the following set in three-dimensional
More informationON THE SET a x + b g x (mod p) 1 Introduction
PORTUGALIAE MATHEMATICA Vol 59 Fasc 00 Nova Série ON THE SET a x + b g x (mod ) Cristian Cobeli, Marian Vâjâitu and Alexandru Zaharescu Abstract: Given nonzero integers a, b we rove an asymtotic result
More informationAdditive results for the generalized Drazin inverse in a Banach algebra
Additive results for the generalized Drazin inverse in a Banach algebra Dragana S. Cvetković-Ilić Dragan S. Djordjević and Yimin Wei* Abstract In this aer we investigate additive roerties of the generalized
More informationarxiv: v2 [math.na] 6 Apr 2016
Existence and otimality of strong stability reserving linear multiste methods: a duality-based aroach arxiv:504.03930v [math.na] 6 Ar 06 Adrián Németh January 9, 08 Abstract David I. Ketcheson We rove
More information1 Extremum Estimators
FINC 9311-21 Financial Econometrics Handout Jialin Yu 1 Extremum Estimators Let θ 0 be a vector of k 1 unknown arameters. Extremum estimators: estimators obtained by maximizing or minimizing some objective
More informationAdvanced Calculus I. Part A, for both Section 200 and Section 501
Sring 2 Instructions Please write your solutions on your own aer. These roblems should be treated as essay questions. A roblem that says give an examle requires a suorting exlanation. In all roblems, you
More information4TE3/6TE3. Algorithms for. Continuous Optimization
4TE3/6TE3 Algorithms for Continuous Optimization (Algorithms for Constrained Nonlinear Optimization Problems) Tamás TERLAKY Computing and Software McMaster University Hamilton, November 2005 terlaky@mcmaster.ca
More informationPreconditioning techniques for Newton s method for the incompressible Navier Stokes equations
Preconditioning techniques for Newton s method for the incomressible Navier Stokes equations H. C. ELMAN 1, D. LOGHIN 2 and A. J. WATHEN 3 1 Deartment of Comuter Science, University of Maryland, College
More informationConvexification of Generalized Network Flow Problem with Application to Power Systems
1 Convexification of Generalized Network Flow Problem with Alication to Power Systems Somayeh Sojoudi and Javad Lavaei + Deartment of Comuting and Mathematical Sciences, California Institute of Technology
More informationOptimal Design of Truss Structures Using a Neutrosophic Number Optimization Model under an Indeterminate Environment
Neutrosohic Sets and Systems Vol 14 016 93 University of New Mexico Otimal Design of Truss Structures Using a Neutrosohic Number Otimization Model under an Indeterminate Environment Wenzhong Jiang & Jun
More informationA Note on the Positive Nonoscillatory Solutions of the Difference Equation
Int. Journal of Math. Analysis, Vol. 4, 1, no. 36, 1787-1798 A Note on the Positive Nonoscillatory Solutions of the Difference Equation x n+1 = α c ix n i + x n k c ix n i ) Vu Van Khuong 1 and Mai Nam
More informationApproximation of the Euclidean Distance by Chamfer Distances
Acta Cybernetica 0 (0 399 47. Aroximation of the Euclidean Distance by Chamfer Distances András Hajdu, Lajos Hajdu, and Robert Tijdeman Abstract Chamfer distances lay an imortant role in the theory of
More informationLecture 6: Conic Optimization September 8
IE 598: Big Data Optimization Fall 2016 Lecture 6: Conic Optimization September 8 Lecturer: Niao He Scriber: Juan Xu Overview In this lecture, we finish up our previous discussion on optimality conditions
More informationNONLINEAR OPTIMIZATION WITH CONVEX CONSTRAINTS. The Goldstein-Levitin-Polyak algorithm
- (23) NLP - NONLINEAR OPTIMIZATION WITH CONVEX CONSTRAINTS The Goldstein-Levitin-Polya algorithm We consider an algorithm for solving the otimization roblem under convex constraints. Although the convexity
More informationEstimation of the large covariance matrix with two-step monotone missing data
Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo
More informationp-adic Measures and Bernoulli Numbers
-Adic Measures and Bernoulli Numbers Adam Bowers Introduction The constants B k in the Taylor series exansion t e t = t k B k k! k=0 are known as the Bernoulli numbers. The first few are,, 6, 0, 30, 0,
More informationOn the minimax inequality for a special class of functionals
ISSN 1 746-7233, Engl, UK World Journal of Modelling Simulation Vol. 3 (2007) No. 3,. 220-224 On the minimax inequality for a secial class of functionals G. A. Afrouzi, S. Heidarkhani, S. H. Rasouli Deartment
More informationA CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS. 1. Abstract
A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS CASEY BRUCK 1. Abstract The goal of this aer is to rovide a concise way for undergraduate mathematics students to learn about how rime numbers behave
More informationAsymptotically Optimal Simulation Allocation under Dependent Sampling
Asymtotically Otimal Simulation Allocation under Deendent Samling Xiaoing Xiong The Robert H. Smith School of Business, University of Maryland, College Park, MD 20742-1815, USA, xiaoingx@yahoo.com Sandee
More informationJournal of Mathematical Analysis and Applications
J. Math. Anal. Al. 44 (3) 3 38 Contents lists available at SciVerse ScienceDirect Journal of Mathematical Analysis and Alications journal homeage: www.elsevier.com/locate/jmaa Maximal surface area of a
More informationGeneralized Coiflets: A New Family of Orthonormal Wavelets
Generalized Coiflets A New Family of Orthonormal Wavelets Dong Wei, Alan C Bovik, and Brian L Evans Laboratory for Image and Video Engineering Deartment of Electrical and Comuter Engineering The University
More informationImproved Bounds on Bell Numbers and on Moments of Sums of Random Variables
Imroved Bounds on Bell Numbers and on Moments of Sums of Random Variables Daniel Berend Tamir Tassa Abstract We rovide bounds for moments of sums of sequences of indeendent random variables. Concentrating
More informationOn Wald-Type Optimal Stopping for Brownian Motion
J Al Probab Vol 34, No 1, 1997, (66-73) Prerint Ser No 1, 1994, Math Inst Aarhus On Wald-Tye Otimal Stoing for Brownian Motion S RAVRSN and PSKIR The solution is resented to all otimal stoing roblems of
More informationBest approximation by linear combinations of characteristic functions of half-spaces
Best aroximation by linear combinations of characteristic functions of half-saces Paul C. Kainen Deartment of Mathematics Georgetown University Washington, D.C. 20057-1233, USA Věra Kůrková Institute of
More informationSecond Order Symmetric and Maxmin Symmetric Duality with Cone Constraints
International Journal of Oerations Research International Journal of Oerations Research Vol. 4, No. 4, 99 5 7) Second Order Smmetric Mamin Smmetric Dualit with Cone Constraints I. Husain,, Abha Goel, M.
More informationNumerical Linear Algebra
Numerical Linear Algebra Numerous alications in statistics, articularly in the fitting of linear models. Notation and conventions: Elements of a matrix A are denoted by a ij, where i indexes the rows and
More informationSolvability and Number of Roots of Bi-Quadratic Equations over p adic Fields
Malaysian Journal of Mathematical Sciences 10(S February: 15-35 (016 Secial Issue: The 3 rd International Conference on Mathematical Alications in Engineering 014 (ICMAE 14 MALAYSIAN JOURNAL OF MATHEMATICAL
More information1. INTRODUCTION. Fn 2 = F j F j+1 (1.1)
CERTAIN CLASSES OF FINITE SUMS THAT INVOLVE GENERALIZED FIBONACCI AND LUCAS NUMBERS The beautiful identity R.S. Melham Deartment of Mathematical Sciences, University of Technology, Sydney PO Box 23, Broadway,
More informationFactorability in the ring Z[ 5]
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Dissertations, Theses, and Student Research Paers in Mathematics Mathematics, Deartment of 4-2004 Factorability in the ring
More informationInterior Point Methods: Second-Order Cone Programming and Semidefinite Programming
School of Mathematics T H E U N I V E R S I T Y O H F E D I N B U R G Interior Point Methods: Second-Order Cone Programming and Semidefinite Programming Jacek Gondzio Email: J.Gondzio@ed.ac.uk URL: http://www.maths.ed.ac.uk/~gondzio
More informationMODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL
Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management
More informationAn Estimate For Heilbronn s Exponential Sum
An Estimate For Heilbronn s Exonential Sum D.R. Heath-Brown Magdalen College, Oxford For Heini Halberstam, on his retirement Let be a rime, and set e(x) = ex(2πix). Heilbronn s exonential sum is defined
More information1 1 c (a) 1 (b) 1 Figure 1: (a) First ath followed by salesman in the stris method. (b) Alternative ath. 4. D = distance travelled closing the loo. Th
18.415/6.854 Advanced Algorithms ovember 7, 1996 Euclidean TSP (art I) Lecturer: Michel X. Goemans MIT These notes are based on scribe notes by Marios Paaefthymiou and Mike Klugerman. 1 Euclidean TSP Consider
More informationLargest dual ellipsoids inscribed in dual cones
Largest dual ellipsoids inscribed in dual cones M. J. Todd June 23, 2005 Abstract Suppose x and s lie in the interiors of a cone K and its dual K respectively. We seek dual ellipsoidal norms such that
More informationFor q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i
Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:
More informationApplicable Analysis and Discrete Mathematics available online at HENSEL CODES OF SQUARE ROOTS OF P-ADIC NUMBERS
Alicable Analysis and Discrete Mathematics available online at htt://efmath.etf.rs Al. Anal. Discrete Math. 4 (010), 3 44. doi:10.98/aadm1000009m HENSEL CODES OF SQUARE ROOTS OF P-ADIC NUMBERS Zerzaihi
More informationMultiplicative group law on the folium of Descartes
Multilicative grou law on the folium of Descartes Steluţa Pricoie and Constantin Udrişte Abstract. The folium of Descartes is still studied and understood today. Not only did it rovide for the roof of
More informationExistence and nonexistence of positive solutions for quasilinear elliptic systems
ISSN 1746-7233, England, UK World Journal of Modelling and Simulation Vol. 4 (2008) No. 1,. 44-48 Existence and nonexistence of ositive solutions for uasilinear ellitic systems G. A. Afrouzi, H. Ghorbani
More informationSums of independent random variables
3 Sums of indeendent random variables This lecture collects a number of estimates for sums of indeendent random variables with values in a Banach sace E. We concentrate on sums of the form N γ nx n, where
More informationSharp gradient estimate and spectral rigidity for p-laplacian
Shar gradient estimate and sectral rigidity for -Lalacian Chiung-Jue Anna Sung and Jiaing Wang To aear in ath. Research Letters. Abstract We derive a shar gradient estimate for ositive eigenfunctions of
More informationWhy Proofs? Proof Techniques. Theorems. Other True Things. Proper Proof Technique. How To Construct A Proof. By Chuck Cusack
Proof Techniques By Chuck Cusack Why Proofs? Writing roofs is not most student s favorite activity. To make matters worse, most students do not understand why it is imortant to rove things. Here are just
More informationA new primal-dual path-following method for convex quadratic programming
Volume 5, N., pp. 97 0, 006 Copyright 006 SBMAC ISSN 00-805 www.scielo.br/cam A new primal-dual path-following method for convex quadratic programming MOHAMED ACHACHE Département de Mathématiques, Faculté
More informationwhere x i is the ith coordinate of x R N. 1. Show that the following upper bound holds for the growth function of H:
Mehryar Mohri Foundations of Machine Learning Courant Institute of Mathematical Sciences Homework assignment 2 October 25, 2017 Due: November 08, 2017 A. Growth function Growth function of stum functions.
More informationOn a Markov Game with Incomplete Information
On a Markov Game with Incomlete Information Johannes Hörner, Dinah Rosenberg y, Eilon Solan z and Nicolas Vieille x{ January 24, 26 Abstract We consider an examle of a Markov game with lack of information
More informationMonopolist s mark-up and the elasticity of substitution
Croatian Oerational Research Review 377 CRORR 8(7), 377 39 Monoolist s mark-u and the elasticity of substitution Ilko Vrankić, Mira Kran, and Tomislav Herceg Deartment of Economic Theory, Faculty of Economics
More informationANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM
ANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM JOHN BINDER Abstract. In this aer, we rove Dirichlet s theorem that, given any air h, k with h, k) =, there are infinitely many rime numbers congruent to
More informationIMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES
IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES OHAD GILADI AND ASSAF NAOR Abstract. It is shown that if (, ) is a Banach sace with Rademacher tye 1 then for every n N there exists
More informationLEIBNIZ SEMINORMS IN PROBABILITY SPACES
LEIBNIZ SEMINORMS IN PROBABILITY SPACES ÁDÁM BESENYEI AND ZOLTÁN LÉKA Abstract. In this aer we study the (strong) Leibniz roerty of centered moments of bounded random variables. We shall answer a question
More informationMulti-Operation Multi-Machine Scheduling
Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job
More informationNew stopping criteria for detecting infeasibility in conic optimization
Optimization Letters manuscript No. (will be inserted by the editor) New stopping criteria for detecting infeasibility in conic optimization Imre Pólik Tamás Terlaky Received: March 21, 2008/ Accepted:
More informationAn efficient method for generalized linear multiplicative programming problem with multiplicative constraints
DOI 0.86/s40064-06-2984-9 RESEARCH An efficient method for generalized linear multilicative rogramming roblem with multilicative constraints Yingfeng Zhao,2* and Sanyang Liu Oen Access *Corresondence:
More informationLinear diophantine equations for discrete tomography
Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,
More informationAnalysis of some entrance probabilities for killed birth-death processes
Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction
More informationTRACES OF SCHUR AND KRONECKER PRODUCTS FOR BLOCK MATRICES
Khayyam J. Math. DOI:10.22034/kjm.2019.84207 TRACES OF SCHUR AND KRONECKER PRODUCTS FOR BLOCK MATRICES ISMAEL GARCÍA-BAYONA Communicated by A.M. Peralta Abstract. In this aer, we define two new Schur and
More informationBarrier Method. Javier Peña Convex Optimization /36-725
Barrier Method Javier Peña Convex Optimization 10-725/36-725 1 Last time: Newton s method For root-finding F (x) = 0 x + = x F (x) 1 F (x) For optimization x f(x) x + = x 2 f(x) 1 f(x) Assume f strongly
More informationThe Fekete Szegő theorem with splitting conditions: Part I
ACTA ARITHMETICA XCIII.2 (2000) The Fekete Szegő theorem with slitting conditions: Part I by Robert Rumely (Athens, GA) A classical theorem of Fekete and Szegő [4] says that if E is a comact set in the
More informationDepartment of Mathematics
Deartment of Mathematics Ma 3/03 KC Border Introduction to Probability and Statistics Winter 209 Sulement : Series fun, or some sums Comuting the mean and variance of discrete distributions often involves
More informationWe collect some results that might be covered in a first course in algebraic number theory.
1 Aendices We collect some results that might be covered in a first course in algebraic number theory. A. uadratic Recirocity Via Gauss Sums A1. Introduction In this aendix, is an odd rime unless otherwise
More informationExistence Results for Quasilinear Degenerated Equations Via Strong Convergence of Truncations
Existence Results for Quasilinear Degenerated Equations Via Strong Convergence of Truncations Youssef AKDIM, Elhoussine AZROUL, and Abdelmoujib BENKIRANE Déartement de Mathématiques et Informatique, Faculté
More informationIntrinsic Approximation on Cantor-like Sets, a Problem of Mahler
Intrinsic Aroximation on Cantor-like Sets, a Problem of Mahler Ryan Broderick, Lior Fishman, Asaf Reich and Barak Weiss July 200 Abstract In 984, Kurt Mahler osed the following fundamental question: How
More informationSYMPLECTIC STRUCTURES: AT THE INTERFACE OF ANALYSIS, GEOMETRY, AND TOPOLOGY
SYMPLECTIC STRUCTURES: AT THE INTERFACE OF ANALYSIS, GEOMETRY, AND TOPOLOGY FEDERICA PASQUOTTO 1. Descrition of the roosed research 1.1. Introduction. Symlectic structures made their first aearance in
More informationPositive Definite Uncertain Homogeneous Matrix Polynomials: Analysis and Application
BULGARIA ACADEMY OF SCIECES CYBEREICS AD IFORMAIO ECHOLOGIES Volume 9 o 3 Sofia 009 Positive Definite Uncertain Homogeneous Matrix Polynomials: Analysis and Alication Svetoslav Savov Institute of Information
More informationOn the Field of a Stationary Charged Spherical Source
Volume PRORESS IN PHYSICS Aril, 009 On the Field of a Stationary Charged Sherical Source Nikias Stavroulakis Solomou 35, 533 Chalandri, reece E-mail: nikias.stavroulakis@yahoo.fr The equations of gravitation
More information12. Interior-point methods
12. Interior-point methods Convex Optimization Boyd & Vandenberghe inequality constrained minimization logarithmic barrier function and central path barrier method feasibility and phase I methods complexity
More informationMath 104B: Number Theory II (Winter 2012)
Math 104B: Number Theory II (Winter 01) Alina Bucur Contents 1 Review 11 Prime numbers 1 Euclidean algorithm 13 Multilicative functions 14 Linear diohantine equations 3 15 Congruences 3 Primes as sums
More informationk- price auctions and Combination-auctions
k- rice auctions and Combination-auctions Martin Mihelich Yan Shu Walnut Algorithms March 6, 219 arxiv:181.3494v3 [q-fin.mf] 5 Mar 219 Abstract We rovide for the first time an exact analytical solution
More informationThe Knuth-Yao Quadrangle-Inequality Speedup is a Consequence of Total-Monotonicity
The Knuth-Yao Quadrangle-Ineuality Seedu is a Conseuence of Total-Monotonicity Wolfgang W. Bein Mordecai J. Golin Lawrence L. Larmore Yan Zhang Abstract There exist several general techniues in the literature
More informationA Closed-Form Solution to the Minimum V 2
Celestial Mechanics and Dynamical Astronomy manuscrit No. (will be inserted by the editor) Martín Avendaño Daniele Mortari A Closed-Form Solution to the Minimum V tot Lambert s Problem Received: Month
More informationA Note on Guaranteed Sparse Recovery via l 1 -Minimization
A Note on Guaranteed Sarse Recovery via l -Minimization Simon Foucart, Université Pierre et Marie Curie Abstract It is roved that every s-sarse vector x C N can be recovered from the measurement vector
More informationBent Functions of maximal degree
IEEE TRANSACTIONS ON INFORMATION THEORY 1 Bent Functions of maximal degree Ayça Çeşmelioğlu and Wilfried Meidl Abstract In this article a technique for constructing -ary bent functions from lateaued functions
More informationThe inverse Goldbach problem
1 The inverse Goldbach roblem by Christian Elsholtz Submission Setember 7, 2000 (this version includes galley corrections). Aeared in Mathematika 2001. Abstract We imrove the uer and lower bounds of the
More informationAdvances in Convex Optimization: Theory, Algorithms, and Applications
Advances in Convex Optimization: Theory, Algorithms, and Applications Stephen Boyd Electrical Engineering Department Stanford University (joint work with Lieven Vandenberghe, UCLA) ISIT 02 ISIT 02 Lausanne
More informationON UNIFORM BOUNDEDNESS OF DYADIC AVERAGING OPERATORS IN SPACES OF HARDY-SOBOLEV TYPE. 1. Introduction
ON UNIFORM BOUNDEDNESS OF DYADIC AVERAGING OPERATORS IN SPACES OF HARDY-SOBOLEV TYPE GUSTAVO GARRIGÓS ANDREAS SEEGER TINO ULLRICH Abstract We give an alternative roof and a wavelet analog of recent results
More informationSome Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., DECEMBER 4 336 Some Unitary Sace Time Codes From Shere Packing Theory With Otimal Diversity Product of Code Size Haiquan Wang, Genyuan Wang, and Xiang-Gen
More informationSolution sheet ξi ξ < ξ i+1 0 otherwise ξ ξ i N i,p 1 (ξ) + where 0 0
Advanced Finite Elements MA5337 - WS7/8 Solution sheet This exercise sheets deals with B-slines and NURBS, which are the basis of isogeometric analysis as they will later relace the olynomial ansatz-functions
More information