Mathematical Programming II Lecture 5 ORIE 6310 Spring 2014 February 7, 2014 Scribe: Weixuan Lin

Similar documents
Advanced Mathematical Programming IE417. Lecture 24. Dr. Ted Ralphs

ON THE PARAMETRIC LCP: A HISTORICAL PERSPECTIVE

CO350 Linear Programming Chapter 8: Degeneracy and Finite Termination

Algorithm for QP thro LCP

Simplex method(s) for solving LPs in standard form

Example Bases and Basic Feasible Solutions 63 Let q = >: ; > and M = >: ;2 > and consider the LCP (q M). The class of ; ;2 complementary cones

Introduction to Mathematical Programming IE406. Lecture 10. Dr. Ted Ralphs

1 Review of last lecture and introduction

Lecture 11: Post-Optimal Analysis. September 23, 2009

LP. Lecture 3. Chapter 3: degeneracy. degeneracy example cycling the lexicographic method other pivot rules the fundamental theorem of LP

F 1 F 2 Daily Requirement Cost N N N

Dual Basic Solutions. Observation 5.7. Consider LP in standard form with A 2 R m n,rank(a) =m, and dual LP:

Simplex Algorithm Using Canonical Tableaus

1 Review Session. 1.1 Lecture 2

Part 1. The Review of Linear Programming

Nimrod Megiddo y. Bernhard von Stengel z. Revised version, submitted to Games and Economic Behavior

Lecture 1. 1 Conic programming. MA 796S: Convex Optimization and Interior Point Methods October 8, Consider the conic program. min.

Example. 1 Rows 1,..., m of the simplex tableau remain lexicographically positive

Special cases of linear programming

A Parametric Simplex Algorithm for Linear Vector Optimization Problems

Optimisation and Operations Research

Optimization (168) Lecture 7-8-9

A Review of Linear Programming

LINEAR PROGRAMMING I. a refreshing example standard form fundamental questions geometry linear algebra simplex algorithm

Duality of LPs and Applications

Chapter 3, Operations Research (OR)

Lecture 4: Algebra, Geometry, and Complexity of the Simplex Method. Reading: Sections 2.6.4, 3.5,

CO 250 Final Exam Guide

Lecture slides by Kevin Wayne

Introduction to Mathematical Programming

(P ) Minimize 4x 1 + 6x 2 + 5x 3 s.t. 2x 1 3x 3 3 3x 2 2x 3 6

16 Chapter 3. Separation Properties, Principal Pivot Transforms, Classes... for all j 2 J is said to be a subcomplementary vector of variables for (3.

Conic Linear Optimization and its Dual. yyye

BOOK REVIEWS 169. minimize (c, x) subject to Ax > b, x > 0.

The Primal-Dual Algorithm P&S Chapter 5 Last Revised October 30, 2006

Problem set 1, Real Analysis I, Spring, 2015.

Copositive Plus Matrices

An upper bound for the number of different solutions generated by the primal simplex method with any selection rule of entering variables

A Strongly Polynomial Simplex Method for Totally Unimodular LP

Improved Full-Newton-Step Infeasible Interior- Point Method for Linear Complementarity Problems

IE 5531: Engineering Optimization I

CS 6820 Fall 2014 Lectures, October 3-20, 2014

Optimality, Duality, Complementarity for Constrained Optimization

Sensitivity Analysis and Duality in LP

The use of shadow price is an example of sensitivity analysis. Duality theory can be applied to do other kind of sensitivity analysis:

A Bound for the Number of Different Basic Solutions Generated by the Simplex Method

Duality Theory, Optimality Conditions

Week 3 Linear programming duality

Benders Decomposition

Linear Programming. Linear Programming I. Lecture 1. Linear Programming. Linear Programming

Appendix PRELIMINARIES 1. THEOREMS OF ALTERNATIVES FOR SYSTEMS OF LINEAR CONSTRAINTS

"SYMMETRIC" PRIMAL-DUAL PAIR

Limiting behavior of the central path in semidefinite optimization

6-1 The Positivstellensatz P. Parrilo and S. Lall, ECC

Linear Programming Duality

Technische Universität Ilmenau Institut für Mathematik

21. Solve the LP given in Exercise 19 using the big-m method discussed in Exercise 20.

The s-monotone Index Selection Rule for Criss-Cross Algorithms of Linear Complementarity Problems

Research Division. Computer and Automation Institute, Hungarian Academy of Sciences. H-1518 Budapest, P.O.Box 63. Ujvári, M. WP August, 2007

Lecture 9 Monotone VIs/CPs Properties of cones and some existence results. October 6, 2008

Lecture 5. x 1,x 2,x 3 0 (1)

On the projection onto a finitely generated cone

Approximate Farkas Lemmas in Convex Optimization

The Simplex Algorithm

min 4x 1 5x 2 + 3x 3 s.t. x 1 + 2x 2 + x 3 = 10 x 1 x 2 6 x 1 + 3x 2 + x 3 14

Discrete Optimization

1. Consider the following polyhedron of an LP problem: 2x 1 x 2 + 5x 3 = 1 (1) 3x 2 + x 4 5 (2) 7x 1 4x 3 + x 4 4 (3) x 1, x 2, x 4 0

ORF 307: Lecture 2. Linear Programming: Chapter 2 Simplex Methods

Lecture Simplex Issues: Number of Pivots. ORIE 6300 Mathematical Programming I October 9, 2014

Review Solutions, Exam 2, Operations Research

Consequences of Continuity and Differentiability

Spring 2017 CO 250 Course Notes TABLE OF CONTENTS. richardwu.ca. CO 250 Course Notes. Introduction to Optimization

Math 273a: Optimization The Simplex method

Criss-cross Method for Solving the Fuzzy Linear Complementarity Problem

MAT016: Optimization

4. Duality and Sensitivity

CO350 Linear Programming Chapter 6: The Simplex Method

Generating p-extremal graphs

Dual bounds: can t get any better than...

Lecture: Algorithms for LP, SOCP and SDP

Advanced Linear Programming: The Exercises

Using Sparsity to Design Primal Heuristics for MILPs: Two Stories

MATH 373 Section A1. Final Exam. Dr. J. Bowman 17 December :00 17:00

CS Introduction to Complexity Theory. Lecture #11: Dec 8th, 2015

COMPUTATIONAL COMPLEXITY OF PARAMETRIC LINEAR PROGRAMMING +

Example Problem. Linear Program (standard form) CSCI5654 (Linear Programming, Fall 2013) Lecture-7. Duality

12. Interior-point methods

AM 121: Intro to Optimization

4. Duality Duality 4.1 Duality of LPs and the duality theorem. min c T x x R n, c R n. s.t. ai Tx = b i i M a i R n

Sensitivity Analysis and Duality

I.3. LMI DUALITY. Didier HENRION EECI Graduate School on Control Supélec - Spring 2010

::::: OFTECHY. .0D 0 ::: ::_ I;. :.!:: t;0i f::t l. :- - :.. :?:: : ;. :--- :-.-i. .. r : : a o er -,:I :,--:-':: : :.:

Topics in Approximation Algorithms Solution for Homework 3

4.7 Sensitivity analysis in Linear Programming

A simplex method for uncapacitated pure-supply and pure-demand infinite network flow problems

The Avis-Kalunzy Algorithm is designed to find a basic feasible solution (BFS) of a given set of constraints. Its input: A R m n and b R m such that

Chapter 1: Linear Programming

Global Optimization of Polynomials

Branch-and-cut Approaches for Chance-constrained Formulations of Reliable Network Design Problems

Prelude to the Simplex Algorithm. The Algebraic Approach The search for extreme point solutions.

Transcription:

Mathematical Programming II Lecture 5 ORIE 630 Spring 204 February 7, 204 Scribe: Weixuan Lin Consider the last general scheme: perturb the linear system. This is applicable for any LCP. w = dz 0 + Mz + q, () w 0, z 0 0, z 0, (2) w i z i = 0, i =, 2,, n. (3) We take d > 0, so that ()-(2) is feasible (we can choose z 0 sufficiently large). Assumption ()-(2) is nondegenerate, i.e., q cannot be written as a linear combination of fewer than n columns of [I, d, M]. Remark Two comments:. We can use lexicographic rules to guarantee this, i.e., replace q by q + (ɛ; ɛ 2 ; ; ɛ n ) for sufficiently small ɛ > 0. 2. In fact, we only need nondegeneracy for solutions with z 0 > 0. Equivalently, this is to say that d cannot be expressed as a linear combination of q and fewer than n columns of [I, M]. We can view z 0 as a variable, just like the w i s and z i s, as the following algorithm does. Alternatively, we may also view z 0 as a parameter, so we are solving a sequence of LCPs with q replaced by q + dz 0. In particular, for (QP), where q = (c; b), q is replaced by (c + d c z 0 ; (b d b z 0 )). That is, we perturb the right-hand side of the constraints and the coefficients of the linear part of the objective so that, for sufficiently large z 0, the origin is both feasible and optimal. Definition The primary ray for () to (3) is the set { { { (w = dz 0 + q; z 0 ; 0) : z 0 ẑ 0 := max 0, max q }}} i i d i = {(ŵ; ẑ 0 ; 0) + λ(d; ; 0) : λ 0, ŵ = dẑ 0 + q}. Definition 2 The set {(w; z 0 ; z) + λ( w; z 0 ; z)} is a secondary ray if it consists of solutions to () - (3) (almost complementary (a.c.) solutions) with ( w; z 0 ; z) 0, where we require w = dz 0 + Mz + q, w 0, z 0 0, z 0, w = d z 0 + M z, w 0, z 0 0, z 0, w i z i = 0, w i z i = 0, w i z i = 0, w i z i = 0, i, z 0 > 0, z 0. Note: if z = 0, then w = d z 0, so we must have z 0 > 0 and w > 0. This means that z = 0, and this is exactly the primary ray.

Now we can state Complementary Pivot Algorithm 2 (Lemke 965). Step 0: If q 0, stop; a complementary solution is (q; 0). Otherwise, set z 0 := q j d j := max i { q i d i }, z := 0, w := dz 0 + q as the initial a.c. solution. Note that j is unique due to the nondegeneracy assumption. Set z j as the nonbasic variable to increase. Step : Increase the current nonbasic variable. If its increase is unblocked, go to Step 2. Otherwise, pivot to the new a.c. basic feasible solution. If z 0 has hit zero, go to Step 3. If w i (or z i ) has hit zero, (i {,, n}), then choose its complement z i (or w i ) as the new nonbasic variable to increase, and go to Step. Step 2: (Failure) STOP. We have found a secondary ray. Step 3: (Success) STOP. The current basic feasible solution gives a complementary solution to the original LCP. Remark 2 By our nondegeneracy assumption, this algorithm is well-defined. To analyze this algorithm, consider the graph G, whose nodes are all a.c. basic feasible solutions, with two adjacent if their midpoint is also a.c. Theorem All nodes of G have degree 0, or 2, so G is a disjoint union of isolated nodes, paths and cycles. Here degree 0, and 2 nodes are characterized as follows.. A node of degree 0 is either a complementary solution (z 0 = 0), where the increase of z 0 is unblocked; or an a.c. but not complementary solution, where the increases of both of w i and z i (w i = z i = 0) are unblocked. 2. A node of degree is either a complementary solution where the increase of z 0 is blocked, or an a.c. but not complementary solution where the increase of exactly one of w i, z i is blocked. 3. A node of degree 2 is an a.c. but not complementary solution, where the increases of both w i and z i are blocked. Proof: If a node is a complementary solution, z 0 = 0, and by nondegeneracy, there are n positive variables, exactly one in each pair of w i and z i. Hence the only way to possibly find an adjacent node is to increase z 0, whose increase is either unblocked (degree 0) or blocked (degree ). If a node is a.c. but not complementary, then z 0 is positive and there are n other variables positive by nondegeneracy. So exactly one pair of variables, (w i, z i ) are both zero. So our only choice is to increase either w i or z i, each of which can be either unblocked or blocked, leading to the statement of the theorem. 2

Corollary Lemke s algorithm terminates in a finite number of steps with either a complementary solution or a secondary ray. Proof: The algorithm traces a path in G from the endpoint of the primary ray. If this endpoint has degree zero, then the increase of z j is unblocked, so we have found a secondary ray with z j > 0. Otherwise, we trace the path to another node of degree. If this is a complementary solution, we are done. If not, it s an a.c. but not complementary solution, where the increase of exactly one of w i and z i is unblocked. This must correspond to a ray of a.c. solutions from the current a.c. solution. This cannot be a ray with z = 0, because this implies w > 0, which implies z = 0, and we have the initial solution, a contradiction. So in either case, we have a secondary ray. This finishes the proof of the corollary. Example Consider the following LCP, with ( ) ( ) 4 0 q =, M =, d = 6 2 Note: M is monotone and a P-matrix. ( ). Figure : Example In this example, our pivots go from P to P 4. When we reach P 4 we have our desired complementary solution, (w = (0; 2), z = (4; 0)).. At the beginning, choose ẑ 0 = 6, and we get the point P. The corresponding basic variable to increase is z 2. 3

2. Increase z 2 to 2, and we reach P 2. By this increase, w hits zero, and z 0 = 4. We then choose z as the new nonbasic variable to increase. 3. Increase z to 2, and we reach P 3. Then z 2 hits zero, and z 0 = 2. We choose w 2 as the new nonbasic variable to increase. 4. Increase w 2 to 2, and meanwhile z goes to 4. Then z 0 = 0, and we obtain the complementary solution. In total, we make 2 2 = 3 pivots to reach the complementary solution. Example 2 Consider the following LCP, with ( ) ( ) 3 2 q =, M =, d = ( ). Figure 2: Example 2 We take ẑ 0 = 3, and then choose z as the nonbasic variable to increase. However, the increase in z is unblocked, and we have found a secondary ray, given by w 0 0 w 2 z 0 z = 2 3 0 + 0 λ : λ 0. z 2 0 0 This results in a failure (even though there is a complementary solution). 4

Theorem 2 If M is monotone, failure in a secondary ray implies that the original LCP was infeasible. Proof: We have (w; z 0 ; z) and ( w; z 0 ; z) in the secondary ray, with a) z 0. b) z 0 = 0 and z T M z = 0. This is because w =d z 0 + M z, so 0 = z T w =( z T d) z 0 + z T M z. Since d > 0, z 0, z 0, z 0 0 and M is monotone, we have z T d > 0, ( z T d) z 0 = 0 and z T M z = 0, so we must have z 0 = 0 and z T M z = 0. c) M T z = w 0. From (b), we know that M z = w 0. Also, z T M z = 0 implies z T (M + M T ) z = 0, so (M + M T ) z = 0. This indicates that M T z = w 0. d) z T q < 0. To see this we know that 0 = z T w = ( z T d)z 0 + z T Mz + z T q. Here d > 0, z 0 and z 0, so z T d > 0. By the assumption of a secondary ray, z 0 > 0, hence ( z T d)z 0 > 0. Also, z T Mz = (M T z) T z = w T z = 0. Altogether this indicates that z T q < 0. So if ( w, z) were feasible for the original LCP, we would have w = M z + q, as well as the inequality 0 z T w = z T M z + z T q (4) Since z T M z = (M T z) T z, M T z 0 and z 0, we have z T M z 0. However, z T q < 0, resulting in a contradiction in (4). Hence we cannot have a feasible solution to the original LCP. Corollary 2 If the LCP(M, q) arises from (QP) and (QD), with H positive semidefinite, then termination in a secondary ray gives a certificate for either primal or dual infeasibility. Proof: We split z as above into ( x; ȳ). From (b) we have x T H x = z T M z = 0. Hence H x = 0. Then from (c) we have A T ȳ = H x + A T ȳ 0 and A x 0. Finally, from (d) we have c T x b T ȳ < 0, so either c T x < 0 or b T ȳ > 0 (or both). In the first case, c T x < 0, H x = 0, and A x 0 give a certificate that (QD) is infeasible. In the second, b T ȳ > 0 and A T ȳ 0 give a certificate that (QP) is infeasible. 5