• Aucun résultat trouvé

prédicteur-correcteur

N/A
N/A
Protected

Academic year: 2022

Partager "prédicteur-correcteur"

Copied!
5
0
0

Texte intégral

(1)

Programmation mathématique ROP 771

Notes on predictor-corrector algorithms

Jean-Pierre Dussault April 11, 2017

Abstract

My personnal vision of predictor-corrector interior point methods.

My background in non-linear optimization (NLO) biases my view on predictor-corrector algorithms in linear optimization (LO). Such algorithms (in LO) are frequently derived from log-barrier algorithms in NLO. Consider the NLO problem

minf0pxq

subject to fďpxq ď 0, fpxq “ 0.

1 Linear optimization

Consider the (standard) linear optimization instance mincx

subject to x ě0 Ax´b “0,

(1)

where cis a line vector.

1.1 Strong duality and optimality conditions

A consequence of the strong duality theorem in linear optimization is that for any optimal solutionx˚, there exist y˚ and s˚ ě0such that

Ax˚´b “ 0 y˚A`s˚´c “ 0 s˚ix˚i “ 0 s˚, x˚ ě 0.

(2)

The last componentwize equation is best rewritten as S˚X˚1 “ S˚x˚ “ 0 where S˚ “ diagps˚q and X˚ “ diagpx˚q. Thus any (primal-dual) solution px, y, sq of the linear opti- mization problem satises the following (bi-linear) equations for x, sě0:

Φpx, y, sq “

$

’&

’%

Ax´b yA`s´c Sx

, /. /-

“0. (2)

The ellipsoïd method decides in polynomial time whether the system possesses a solution or not using the ane version of the duality gap Sx “ cx´yb in the last equation together with the bounds x ě 0 and s ě 0. As such, the ellipsoïd method accept a polyhedral set described by linear equations and inequalities.

Interior point methods use the bilinear version of the duality gap and assume thatx, s ą0 is available, i.e. xand s are interior points of their respective non-negative orthant domain.

1.2 From strong duality to Newton iterations

Since equation (2) is a non-linear, actually a bi-linear equation, coupled with the bounds on xand s, its solution is not expressed as an analytical formula. As a non-linear equation, one could consider an iterative solution using Newton's method.

∇Φpx, y, sq “

» –

A 0 0

0 At I

S 0 X

fi

fl, (3)

so that given somew“ px, y, sq, an improved solution would be given by

px`, y`, s`q “ px, y, sq ´∇Φpx, y, sq´1Φpx, y, sq. (4) The very nature of the bi-linear equations Sx “ 0 makes this Newton iteration process doubtful, but it is very ecient when it happens to converge.

1.3 From the logarithmic barrier to primal-dual equations

Returning to the particular instance (1), we may treat the non-negativity constraints with a log barrier to get

minxą0 cx´ρÿ

logpxiq subject to

Ax´b“0,

(5)

for which the Lagrange optimality conditions are Ax´b+

“0 (6)

(3)

and substituting s“ρX´11, compare to (2), (still usingΦ but with a fourth parameterρ)

Φpx, y, s, ρq “

$

’&

’%

Ax´b yA`s´c SX1´ρ1

, /. /-

“0. (7)

The bi-linear equation is no longer rooted to 0 until ρ Œ0 reaches 0, so that an homotopy like strategy appears promising.

Thus, we have equations (7) that dene wpρq “ pxpρq, ypρq, xpρqq a point on the so- called central trajectory. The approach is to track approximate such points toward ρ “ 0. Therefore, let us assume we have a w“ px, y, sqsuch that xą0, są0 and

¨

˚

˝

Ax´b yA`s´c SXe´ρ1

˛

‚“

¨

˝ rP rD rC´ρ1

˛

‚, (8)

where rP is the primal, rD the dual and rC the complementarity residuals. Algorithms will be designed to

1. drive the residuals r to zero 2. drive the parameter ρ to zero.

For xed ρ, Newton method's may be applied to drive the residual vector r to zero. Once this residual is small enough, a pseudo Newton method may be used to recover acceptable residual for a reduced value of ρ. Let us now describe the details of those steps.

1.4 General predictor-corrector

First, let us rewrite the system (7) in an abstract way as

Φpw, ρq “Φpwq `ρv (9)

For a current iterate w, r“Φpwq. We then may interpret the current iterate as a function wpρ, rq. Newton's method to solve Φpw, ρq “ 0for some xed ρ is written

wpρ,0q «wpρ, rq ´ p∇Φpwqq´1Φpw, ρq “ w´ p∇Φpwqq´1pr`ρvq “ wpρ, rq ` p0´rqw9r. (10) The solutionwpρ,0q to equation Φpw, ρq “ 0for xed ρ is a point on the central trajectory.

The implicit function theorem yields that ∇Φpwqw9 `v “ 0 so that an estimate of wp0, rq for xed r is given by

wp0, rq «wpρ, rq ` p0´ρqw9ρ “wpρ, rq ´ p∇Φpwqq´1p´ρvq. (11)

(4)

We see that a Newton's iteration and the extrapolation both use ∇Φpwq, which have us interpret the Newton iteration as an extrapolation fromr to 0 ofwpρ, rq, the current iterate.

Combining the extrapolation with the Newton step yields

wp0,0q « wpρ, rq ` p0´ρqw9ρ` p0´rqw9r “wpρ, rq ´ p∇Φpwqq´1r. (12) A recommended implementation of the predictor-corrector strategy is the following, given w“wpρ, rq:

1. estimate wp0,0qusing the combined formula (12);

2. estimate a target value ρ`;

3. estimate wpρ`,0q using equation (10) and update w.

1.5 Specialized predictor-corrector for linear optimization

Now, let us provide some specic details taking into account the particular system (7).

Then, w is a triplet px, y, sq. The predictor step in (12), ∆pw “ ´p∇Φpwqq´1r is best split into p∆px,∆py,∆psqt “ ∆pw. Similarly, the corrector step in equation (10), ∆cw “

´ p∇Φpwqq´1pr`ρvqis split into p∆cx,∆cy,∆csqt“∆cw.

1. The boundsxě0ands ě0are implicit in all this context. Therefore, the computation of the estimate ofwp0,0qmay be improved by enforcing the bounds:

αx “ maxtα:x`α∆pxě0u (13) αs “ maxtα:s`α∆psě0u (14) Therefore, the predicted values are xp “x`αxpx and sp “s`αsps.

2. A recommended value for ρ` isσsntx with σ“

´xt psp

xts

¯3

.

3. Again the bounds x ě 0 and s ě 0 will be enforced (still denoted by αx and αs); a further safeguard is to take αˆs “ minp0.99αs,1q and αˆx “ minp0.99αx,1q to ensure interior points. The next iterate is

ps`, y`q “ ps, yq `αˆsp∆cs,∆cyq (15)

x` “ x`αˆxcx (16)

1.5.1 Variants

Whenever the unit stepsizes are used for the predictor step, at the predicted point, the primal and dual residuals will vanish. Indeed, Newton's method solves the linearized problem, and

(5)

the two equations associated with those residuals are already linear. Therefore, the right hand side for the correction step would be

¨

˚

˝

Axp´b ypA`sp´c SpXpe´ρ`1

˛

‚“

¨

˝

0 0 SpXpe´ρ`1

˛

‚. (17)

When the unit stepsizes are not used, one may keep the above right hand side or put in the (presumably very small) predicted primal and dual residuals.

1.5.2 Linear algebra issues

The tremendous success of predictor-corrector approaches is closely related to very clever treatment of the matrices underlying the linear systems. Observe that once a factorization

of the matrix »

A 0 0

0 At I

S 0 X

fi fl

is completed, it will be reused twice, once to compute the prediction and once more to compute the correction.

Références

Documents relatifs

Previously, one- time digital signatures based on hash functions involved hundreds of hash function computations for each signature; we show that given online ac- cess to a

The second routine checks the bus-out and bUs-in lines (all bits), and the tags-in lines (request-in, operational-in, status-in, service-in, select-in, and address-in). The

The short term implementation mechanism will use an ISO 8473 normal data PDU as the echo-request and echo-reply PDU.. A special NSAP selector value will be used to identify

represent the situation accurately. Where statistical operational reports are a primary purpose of the trouble ticket system, several fixed fields may be appropriate. If

picture, which will be transmitted later and should be rendered at the same time with this audio segment.) Even though the video segments are reordered, the audio offset for

This document describes an RTP [1] payload format for transporting the coordinates of a dynamic pointer that may be used during a presentation.. Although a mouse can be used

The test report MUST note the connection attempt rate, aging time, minimum TCP connection establishment time, maximum TCP connection establishment time, average

UMAC uses a keyed function, called UHASH (also specified in this document), as the keyed hash function H and uses a pseudorandom function F whose default implementation uses