Incorporating Nonmonotone Strategies Into the Trust Region Method for Unconstrained Optimization$

Total Page:16

File Type:pdf, Size:1020Kb

Incorporating Nonmonotone Strategies Into the Trust Region Method for Unconstrained Optimization$ View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Elsevier - Publisher Connector Computers and Mathematics with Applications 55 (2008) 2158–2172 www.elsevier.com/locate/camwa Incorporating nonmonotone strategies into the trust region method for unconstrained optimization$ Neng-zhu Gua, Jiang-tao Mob,∗ a School of Business, University of Shanghai for Science and Technology, Shanghai 200093, China b College of Mathematics and Information Science, Guangxi University, Nanning 530004, China Received 7 July 2005; received in revised form 13 August 2007; accepted 30 August 2007 Abstract This paper concerns a nonmonotone line search technique and its application to the trust region method for unconstrained optimization problems. In our line search technique, the current nonmonotone term is a convex combination of the previous nonmonotone term and the current objective function value, instead of an average of the successive objective function values that was introduced by Zhang and Hager [H. Zhang, W.W. Hager, A nonmonotone line search technique and its application to unconstrained optimization, SIAM J. Optim. 14 (4) (2004) 1043–1056]. We incorporate this nonmonotone scheme into the traditional trust region method such that the new algorithm possesses nonmonotonicity. Unlike the traditional trust region method, our algorithm performs a nonmonotone line search to find a new iteration point if a trial step is not accepted, instead of resolving the subproblem. Under mild conditions, we prove that the algorithm is global and superlinear convergence holds. Primary numerical results are reported. c 2008 Published by Elsevier Ltd Keywords: Unconstrained optimization; Nonmonotone trust region method; Nonmonotone line search; Global convergence; Superlinear convergence 1. Introduction We consider the following unconstrained optimization problem min{ f (x)|x ∈ Rn}, (1.1) where f : Rn → R is twice continuously differentiable. Since it was proposed by Levenberg [1] and Marquardt [2] for nonlinear least-square problems and then developed by Goldfeld [3] for unconstrained optimization, trust region methods have been studied extensively by many researchers. For example, Powell [4] established the convergence result of the trust region method for unconstrained $ This work was supported by the Science Foundation of Guangxi, No: 0542043. ∗ Corresponding author. E-mail addresses: [email protected] (N.-z. Gu), [email protected] (J.-t. Mo). 0898-1221/$ - see front matter c 2008 Published by Elsevier Ltd doi:10.1016/j.camwa.2007.08.038 N.-z. Gu, J.-t. Mo / Computers and Mathematics with Applications 55 (2008) 2158–2172 2159 optimization, Fletcher [5], Yuan [6], Powell and Yuan [7] proposed various trust region algorithms for constrained optimization problems. For a more complete introduction, we refer the reader to [8]. Trust region methods solve an optimization problem iteratively. At each iteration, a trial step dk is generated by solving the subproblem T 1 T min gk d + d Bkd = φk(d) (1.2) d∈R n 2 s.t. kdk ≤ ∆k, n×n where gk = ∇ f (xk), Bk ∈ R is an approximate Hessian matrix of f at xk, ∆k > 0 is a trust region radius. Some criteria are used to decide whether a trial step dk is accepted. If a trial step is not accepted, traditional trust region methods resolve the subproblem (1.2) by reducing the trust region radius until an acceptable step is found. Therefore, the subproblem may be solved several times at an iteration before an acceptable step is found, and these repetitious processes are likely to increase the total cost of computation for large scale problems. To improve the computational efficiency of trust region methods, new type trust region algorithms that combine line search techniques have been developed (e.g., Necedal and Yuan [9] and Gertz [10]). The prominent virtue of these algorithms is to perform a line search to find an successful iterative point when a trial step is not accepted; this mechanism implies that the subproblem is needs to be solved once for each iteration. Most of the proposed methods for optimization problems require objective function values monotonically decreasing at each iteration. However, Grippo, Lampariello and Lucidi [11] shown that this scheme can considerably slow the rate of convergence in the intermediate stages of the minimization process, especially in the presence of the narrow curved valley. To overcome this shortcoming, they introduced a nonmonotone line search technique of the form T f (xk + αdk) ≤ max f (xk− j ) + δα∇ f (xk) dk, (1.3) 0≤ j≤m(k) where δ ∈ (0, 1) is a constant, N is an integer and k, k ≤ N; m(k) = (1.4) min{m(k − 1) + 1, N}, k > N. This technique leads to a breakthrough in nonmonotonic algorithms for nonlinear optimization. For example, based on (1.3), Deng, Xiao and Zhou [12] first proposed a nonmonotone trust region method for unconstrained optimization, Ke and Han [13], Sun [14], Fu and Sun [15] presented various nonmonotone trust region methods. Recently, Zhang and Hager [16] found that there still exist some drawbacks with the nonmonotone technique (1.3). First, a good function value generated in any iteration might be excluded due to the max in (1.3). Second, in many cases, the numerical performance is dependent on the choice of N (see [11,17]). Moreover, for any given bound N on the memory, even an iterative method is generating R-linearly convergence for a strongly convex function, the iterates may not satisfy the condition (1.3) for k sufficiently large (see [18]). To improve these limitations, Zhang and Hager [16] proposed a nonmonotone gradient method for unconstrained optimization. Their method requires an average of the successive function values that is decreasing – that is to say, the steplength α is computed to satisfy the following line search condition T f (xk + αdk) ≤ Ck + δα∇ f (xk) dk, (1.5) where f (xk), k = 1; Ck = (1.6) (ηk−1 Qk−1Ck−1 + f (xk))/Qk, k ≥ 2, 1, k = 1; Qk = (1.7) ηk−1 Qk−1 + 1, k ≥ 2, and ηk−1 ∈ [ηmin, ηmax]. ηmin ∈ (0, ηmax) and ηmax ∈ (0, 1) are two chosen parameters. The numerical results reported in [16] show that the nonmonotone technique (1.5) is particularly efficient for unconstrained problems. 2160 N.-z. Gu, J.-t. Mo / Computers and Mathematics with Applications 55 (2008) 2158–2172 Inspired by this nonmonotone technique, Mo, Liu and Yan [19] introduced it into trust region method and developed a nonmonotone algorithm. The numerical results indicate that the algorithm is robust and encouraging. As we see, the definition of mean values Ck implies that each Ck is a convex combination of the previous Ck−1 and fk, including the complex ηk and Qk. In theory, the best convergence results were obtained by dynamically varying ηk, using values closer to 1 when the iterates were far from the optimum, and using values closer to 0 when the iterates were near the optimum (see [16] for details). In practice, however, it becomes an encumbrance to update ηk and Qk at each iteration. Therefore, in this study, we introduce another nonmonotone line search T f (xk + αdk) ≤ Dk + δα∇ f (xk) dk, (1.8) where Dk is a simple convex combination of the previous Dk−1 and fk, say f (xk), k = 1; Dk = (1.9) ηDk−1 + (1 − η) f (xk) k ≥ 2 for some fixed η ∈ (0, 1), or a variable ηk. In the rest of this paper, our purpose is to develop an algorithm that combines the nonmonotone technique (1.8) and trust region method for unconstrained optimization problems. The algorithm doesn’t restrict the object function values to be monotonically decreasing. Furthermore, if a trial step is not accepted, the algorithm performs the nonmonotone line search (1.8) to find an iterative point instead of resolving the subproblem. The new algorithm can viewed as a generalization of the Nocedal and Yuan algorithm [9] from monotone to non-monotone, or the Mo et al. algorithm [19] from non-linesearch to linesearch. The paper is organized as follows. In Section 2, we describe the algorithm. In Section 3, we establish the global convergence and superlinear convergence for the algorithm. Primary numerical results are presented in Section 4. Finally, our conclusions are given in Section 5. 2. Algorithm In this section, we state our method in the form of an algorithm. Throughout this paper, we use k · k to represent the Euclidean norm and denote f (xk) by fk, ∇ f (xk) by gk, etc. Vectors are column vectors unless a transpose is used. The method we present is also an iterative method. At each iteration, a trial step dk is generated by solving the trust region subproblem (1.2). Similarly to [9], we solve (1.2) inaccurately such that kdkk ≤ ∆k, φk(0) − φk(dk) ≥ τkgkk min{∆k, kgkk/kBkk} (2.1) and T dk gk ≤ −τkgkk min{∆k, kgkk/kBkk}, (2.2) where τ ∈ (0, 1) is a constant. To determine whether a trial step will be accepted, we compute ρk, the ratio between the actual reduction and the predicted reduction. Instead of using fk − f (xk +dk) as the actual reduction, we choose Dk − f (xk +dk) as the actual reduction, such that the algorithm does not require object function values to be monotonically decreasing. ρk is given as Dk − f (xk + dk) ρk = , (2.3) φk(0) − φk(dk) where Dk is defined by (1.9). If ρk ≥ µ, where µ is a constant, we accept dk as a successful step and let xk+1 = xk +dk. Otherwise, we generate a new iterative point by xk+1 = xk + αkdk, where αk is a steplength satisfying the line search condition (1.8). More precisely, we describe the nonmonotone trust region algorithm as follows: Algorithm 1 (Nonmonotone Trust Region Method With line Search).
Recommended publications
  • Advances in Interior Point Methods and Column Generation
    Advances in Interior Point Methods and Column Generation Pablo Gonz´alezBrevis Doctor of Philosophy University of Edinburgh 2013 Declaration I declare that this thesis was composed by myself and that the work contained therein is my own, except where explicitly stated otherwise in the text. (Pablo Gonz´alezBrevis) ii To my endless inspiration and angels on earth: Paulina, Crist´obal and Esteban iii Abstract In this thesis we study how to efficiently combine the column generation technique (CG) and interior point methods (IPMs) for solving the relaxation of a selection of integer programming problems. In order to obtain an efficient method a change in the column generation technique and a new reoptimization strategy for a primal-dual interior point method are proposed. It is well-known that the standard column generation technique suffers from un- stable behaviour due to the use of optimal dual solutions that are extreme points of the restricted master problem (RMP). This unstable behaviour slows down column generation so variations of the standard technique which rely on interior points of the dual feasible set of the RMP have been proposed in the literature. Among these tech- niques, there is the primal-dual column generation method (PDCGM) which relies on sub-optimal and well-centred dual solutions. This technique dynamically adjusts the column generation tolerance as the method approaches optimality. Also, it relies on the notion of the symmetric neighbourhood of the central path so sub-optimal and well-centred solutions are obtained. We provide a thorough theoretical analysis that guarantees the convergence of the primal-dual approach even though sub-optimal solu- tions are used in the course of the algorithm.
    [Show full text]
  • A New Trust Region Method with Simple Model for Large-Scale Optimization ∗
    A New Trust Region Method with Simple Model for Large-Scale Optimization ∗ Qunyan Zhou,y Wenyu Sunz and Hongchao Zhangx Abstract In this paper a new trust region method with simple model for solv- ing large-scale unconstrained nonlinear optimization is proposed. By employing generalized weak quasi-Newton equations, we derive several schemes to construct variants of scalar matrices as the Hessian approx- imation used in the trust region subproblem. Under some reasonable conditions, global convergence of the proposed algorithm is established in the trust region framework. The numerical experiments on solving the test problems with dimensions from 50 to 20000 in the CUTEr li- brary are reported to show efficiency of the algorithm. Key words. unconstrained optimization, Barzilai-Borwein method, weak quasi-Newton equation, trust region method, global convergence AMS(2010) 65K05, 90C30 1. Introduction In this paper, we consider the unconstrained optimization problem min f(x); (1.1) x2Rn where f : Rn ! R is continuously differentiable with dimension n relatively large. Trust region methods are a class of powerful and robust globalization ∗This work was supported by National Natural Science Foundation of China (11171159, 11401308), the Natural Science Fund for Universities of Jiangsu Province (13KJB110007), the Fund of Jiangsu University of Technology (KYY13012). ySchool of Mathematics and Physics, Jiangsu University of Technology, Changzhou 213001, Jiangsu, China. Email: [email protected] zCorresponding author. School of Mathematical Sciences, Jiangsu Key Laboratory for NSLSCS, Nanjing Normal University, Nanjing 210023, China. Email: [email protected] xDepartment of Mathematics, Louisiana State University, USA. Email: [email protected] 1 methods for solving (1.1).
    [Show full text]
  • Constrained Multifidelity Optimization Using Model Calibration
    Struct Multidisc Optim (2012) 46:93–109 DOI 10.1007/s00158-011-0749-1 RESEARCH PAPER Constrained multifidelity optimization using model calibration Andrew March · Karen Willcox Received: 4 April 2011 / Revised: 22 November 2011 / Accepted: 28 November 2011 / Published online: 8 January 2012 c Springer-Verlag 2012 Abstract Multifidelity optimization approaches seek to derivative-free and sequential quadratic programming meth- bring higher-fidelity analyses earlier into the design process ods. The method uses approximately the same number of by using performance estimates from lower-fidelity models high-fidelity analyses as a multifidelity trust-region algo- to accelerate convergence towards the optimum of a high- rithm that estimates the high-fidelity gradient using finite fidelity design problem. Current multifidelity optimization differences. methods generally fall into two broad categories: provably convergent methods that use either the high-fidelity gradient Keywords Multifidelity · Derivative-free · Optimization · or a high-fidelity pattern-search, and heuristic model cali- Multidisciplinary · Aerodynamic design bration approaches, such as interpolating high-fidelity data or adding a Kriging error model to a lower-fidelity function. This paper presents a multifidelity optimization method that bridges these two ideas; our method iteratively calibrates Nomenclature lower-fidelity information to the high-fidelity function in order to find an optimum of the high-fidelity design prob- A Active and violated constraint Jacobian lem. The
    [Show full text]
  • Computing a Trust Region Step
    Distribution Category: Mathematics and Computers ANL--81-83 (UC-32) DE82 005656 ANIr81483 ARGONNE NATIONAL LABORATORY 9700 South Cass Avenue Argonne, Illinois 60439 COMPUTING A TRUST REGION STEP Jorge J. Mord and D. C. Sorensen Applied Mathematics Division DISCLAIMER - -. ".,.,... December 1981 Computing a Trust Region Step Jorge J. Mord and D. C. Sorensen Applied Mathematics Division Argonne National Laboratory Argonne Illinois 60439 1. Introduction. In an important class of minimization algorithms called "trust region methods" (see, for example, Sorensen [1981]), the calculation of the step between iterates requires the solution of a problem of the form (1.1) minij(w): 1|w |isAl where A is a positive parameter, I- II is the Euclidean norm in R", and (1.2) #(w) = g w + Mw7Bw, with g E R", and B E R a symmetric matrix. The quadratic function ' generally represents a local model to the objective function defined by interpolatory data at an iterate and thus it is important to be able to solve (1.1) for any symmetric matrix B; in particular, for a matrix B with negative eigenvalues. In trust region methods it is sometimes helpful to include a scaling matrix for the variables. In this case, problem (1.1) is replaced by (1.3) mint%(v):IIDu Is A where D E R""" is a nonsingular matrix. The change of variables Du = w shows that problem (1.3) is equivalent to (1.4) minif(w):1|w| Is Al where f(w) _%f(D-'w), and that the solutions of problems (1.3) and (1.4) are related by Dv = w.
    [Show full text]
  • Welcome to the 2013 MOPTA Conference!
    Welcome to the 2013 MOPTA Conference! Mission Statement The Modeling and Optimization: Theory and Applications (MOPTA) conference is an annual event aiming to bring together a diverse group of people from both discrete and continuous optimization, working on both theoretical and applied aspects. The format consists of invited talks from distinguished speakers and selected contributed talks, spread over three days. The goal is to present a diverse set of exciting new developments from different optimization areas while at the same time providing a setting that will allow increased interaction among the participants. We aim to bring together researchers from both the theoretical and applied communities who do not usually have the chance to interact in the framework of a medium- scale event. MOPTA 2013 is hosted by the Department of Industrial and Systems Engineering at Lehigh University. Organization Committee Frank E. Curtis - Chair [email protected] Tamás Terlaky [email protected] Ted Ralphs [email protected] Katya Scheinberg [email protected] Lawrence V. Snyder [email protected] Robert H. Storer [email protected] Aurélie Thiele [email protected] Luis Zuluaga [email protected] Staff Kathy Rambo We thank our sponsors! 1 Program Wednesday, August 14 – Rauch Business Center 7:30-8:10 - Registration and continental breakfast - Perella Auditorium Lobby 8:10-8:20 - Welcome: Tamás Terlaky, Department Chair, Lehigh ISE - Perella Auditorium (RBC 184) 8:20-8:30 - Opening remarks: Patrick Farrell, Provost, Lehigh University
    [Show full text]
  • Tutorial: PART 2
    Tutorial: PART 2 Optimization for Machine Learning Elad Hazan Princeton University + help from Sanjeev Arora & Yoram Singer Agenda 1. Learning as mathematical optimization • Stochastic optimization, ERM, online regret minimization • Online gradient descent 2. Regularization • AdaGrad and optimal regularization 3. Gradient Descent++ • Frank-Wolfe, acceleration, variance reduction, second order methods, non-convex optimization Accelerating gradient descent? 1. Adaptive regularization (AdaGrad) works for non-smooth&non-convex 2. Variance reduction uses special ERM structure very effective for smooth&convex 3. Acceleration/momentum smooth convex only, general purpose optimization since 80’s Condition number of convex functions # defined as � = , where (simplified) $ 0 ≺ �� ≼ �+� � ≼ �� � = strong convexity, � = smoothness Non-convex smooth functions: (simplified) −�� ≼ �+� � ≼ �� Why do we care? well-conditioned functions exhibit much faster optimization! (but equivalent via reductions) Examples Smooth gradient descent The descent lemma, �-smooth functions: (algorithm: �012 = �0 − ��4 ) + � �012 − � �0 ≤ −�0 �012 − �0 + � �0 − �012 1 = − � + ��+ � + = − � + 0 4� 0 Thus, for M-bounded functions: ( � �0 ≤ �) 1 −2� ≤ � � − �(� ) = > �(� ) − � � ≤ − > � + ; 2 012 0 4� 0 0 0 Thus, exists a t for which, 8�� � + ≤ 0 � Smooth gradient descent 2 Conclusions: for � = � − �� and T = Ω , finds 012 0 4 C + �0 ≤ � 1. Holds even for non-convex functions ∗ 2. For convex functions implies � �0 − � � ≤ �(�) (faster for smooth!) Non-convex stochastic gradient descent The descent lemma, �-smooth functions: (algorithm: �012 = �0 − ��N0) + � � �012 − � �0 ≤ � −�4 �012 − �0 + � �0 − �012 + + + + = � −�P0 ⋅ ��4 + � �N4 = −��4 + � �� �N4 + + + = −��4 + � �(�4 + ��� �P0 ) Thus, for M-bounded functions: ( � �0 ≤ �) M� T = � ⇒ ∃ . � + ≤ � �+ 0Y; 0 Controlling the variance: Interpolating GD and SGD Model: both full and stochastic gradients. Estimator combines both into lower variance RV: �012 = �0 − � �P� �0 − �P� �[ + ��(�[) Every so oFten, compute Full gradient and restart at new �[.
    [Show full text]
  • An Active–Set Trust-Region Method for Bound-Constrained Nonlinear Optimization Without Derivatives Applied to Noisy Aerodynamic Design Problems Anke Troltzsch
    An active–set trust-region method for bound-constrained nonlinear optimization without derivatives applied to noisy aerodynamic design problems Anke Troltzsch To cite this version: Anke Troltzsch. An active–set trust-region method for bound-constrained nonlinear optimization with- out derivatives applied to noisy aerodynamic design problems. Optimization and Control [math.OC]. Institut National Polytechnique de Toulouse - INPT, 2011. English. tel-00639257 HAL Id: tel-00639257 https://tel.archives-ouvertes.fr/tel-00639257 Submitted on 8 Nov 2011 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. ฀ ฀฀฀฀฀ ฀ %0$503"5%&%0$503"5%&-6/*7&34*5²-6/*7฀&34*5²%&506-064&%&506-064& ฀฀ Institut National Polytechnique฀ de Toulouse (INP Toulouse) ฀฀฀ Mathématiques Informatique฀ Télécommunications ฀ ฀฀฀฀฀฀ Anke TRÖLTZSCH฀ ฀ mardi 7 juin 2011 ฀ ฀ ฀ ฀ An active-set trust-region method for bound-constrained nonlinear optimization without฀ derivatives applied to noisy aerodynamic฀ design problems ฀ ฀฀฀ Mathématiques Informatique฀ Télécommunications (MITT) ฀฀฀฀ CERFACS ฀฀฀
    [Show full text]
  • Optimization: Applications, Algorithms, and Computation
    Optimization: Applications, Algorithms, and Computation 24 Lectures on Nonlinear Optimization and Beyond Sven Leyffer (with help from Pietro Belotti, Christian Kirches, Jeff Linderoth, Jim Luedtke, and Ashutosh Mahajan) August 30, 2016 To my wife Gwen my parents Inge and Werner; and my teacher and mentor Roger. This manuscript has been created by the UChicago Argonne, LLC, Operator of Argonne National Laboratory (“Argonne”) under Contract No. DE-AC02-06CH11357 with the U.S. Department of Energy. The U.S. Government retains for itself, and others acting on its behalf, a paid-up, nonexclusive, irrevocable worldwide license in said article to reproduce, prepare derivative works, distribute copies to the public, and perform publicly and display publicly, by or on behalf of the Government. This work was supported by the Office of Advanced Scientific Computing Research, Office of Science, U.S. Department of Energy, under Contract DE-AC02-06CH11357. ii Contents I Introduction, Applications, and Modeling1 1 Introduction to Optimization3 1.1 Objective Function and Constraints...............................3 1.2 Classification of Optimization Problems............................4 1.2.1 Classification by Constraint Type...........................4 1.2.2 Classification by Variable Type............................5 1.2.3 Classification by Functional Forms..........................6 1.3 A First Optimization Example.................................6 1.4 Course Outline.........................................7 1.5 Exercises............................................7 2 Applications of Optimization9 2.1 Power-System Engineering: Electrical Transmission Planning................9 2.1.1 Transmission Planning Formulation.......................... 10 2.2 Other Power Systems Applications............................... 11 2.2.1 The Power-Flow Equations and Network Expansion................. 11 2.2.2 Blackout Prevention in National Power Grid...................... 12 2.2.3 Optimal Unit Commitment for Power-Grid.....................
    [Show full text]
  • Sequential Quadratic Programming Methods∗
    SEQUENTIAL QUADRATIC PROGRAMMING METHODS∗ Philip E. GILLy Elizabeth WONGy UCSD Department of Mathematics Technical Report NA-10-03 August 2010 Abstract In his 1963 PhD thesis, Wilson proposed the first sequential quadratic programming (SQP) method for the solution of constrained nonlinear optimization problems. In the intervening 48 years, SQP methods have evolved into a powerful and effective class of methods for a wide range of optimization problems. We review some of the most prominent developments in SQP methods since 1963 and discuss the relationship of SQP methods to other popular methods, including augmented Lagrangian methods and interior methods. Given the scope and utility of nonlinear optimization, it is not surprising that SQP methods are still a subject of active research. Recent developments in methods for mixed-integer nonlinear programming (MINLP) and the minimization of functions subject to differential equation constraints has led to a heightened interest in methods that may be \warm started" from a good approximate solution. We discuss the role of SQP methods in these contexts. Key words. Large-scale nonlinear programming, SQP methods, nonconvex pro- gramming, quadratic programming, KKT systems. AMS subject classifications. 49J20, 49J15, 49M37, 49D37, 65F05, 65K05, 90C30 1. Introduction This paper concerns the formulation of methods for solving the smooth nonlinear pro- grams that arise as subproblems within a method for mixed-integer nonlinear programming (MINLP). In general, this subproblem has both linear and nonlinear constraints, and may be written in the form minimize f(x) n x2R 8 9 < x = (1.1) subject to ` ≤ Ax ≤ u; : c(x) ; where f(x) is a linear or nonlinear objective function, c(x) is a vector of m nonlinear constraint functions ci(x), A is a matrix, and l and u are vectors of lower and upper bounds.
    [Show full text]
  • Classical Optimizers for Noisy Intermediate-Scale Quantum Devices
    Lawrence Berkeley National Laboratory Recent Work Title Classical Optimizers for Noisy Intermediate-Scale Quantum Devices Permalink https://escholarship.org/uc/item/9022q1tm Authors Lavrijsen, W Tudor, A Muller, J et al. Publication Date 2020-10-01 DOI 10.1109/QCE49297.2020.00041 Peer reviewed eScholarship.org Powered by the California Digital Library University of California Classical Optimizers for Noisy Intermediate-Scale antum Devices Wim Lavrijsen, Ana Tudor, Juliane Müller, Costin Iancu, Wibe de Jong Lawrence Berkeley National Laboratory {wlavrijsen,julianemueller,cciancu,wadejong}@lbl.gov, [email protected] ABSTRACT of noise on both the classical and quantum parts needs to be taken We present a collection of optimizers tuned for usage on Noisy Inter- into account. In particular, the performance and mathematical guar- mediate-Scale Quantum (NISQ) devices. Optimizers have a range of antees, regarding convergence and optimality in the number of applications in quantum computing, including the Variational Quan- iterations, of commonly used classical optimizers rest on premises tum Eigensolver (VQE) and Quantum Approximate Optimization that are broken by the existence of noise in the objective function. (QAOA) algorithms. They have further uses in calibration, hyperpa- Consequently, they may converge too early, not nding the global rameter tuning, machine learning, etc. We employ the VQE algorithm minimum, get stuck in a noise-induced local minimum, or even fail as a case study. VQE is a hybrid algorithm, with a classical minimizer to converge at all. step driving the next evaluation on the quantum processor. While For chemistry, the necessity of developing robust classical op- most results to date concentrated on tuning the quantum VQE circuit, timizers for VQE in the presence of hardware noise has already our study indicates that in the presence of quantum noise the clas- been recognized [20].
    [Show full text]
  • Artificial Intelligence Combined with Nonlinear Optimization Techniques and Their Application for Yield Curve Optimization
    JOURNAL OF INDUSTRIAL AND doi:10.3934/jimo.2017014 MANAGEMENT OPTIMIZATION Volume 13, Number 4, October 2017 pp. 1701{1721 ARTIFICIAL INTELLIGENCE COMBINED WITH NONLINEAR OPTIMIZATION TECHNIQUES AND THEIR APPLICATION FOR YIELD CURVE OPTIMIZATION Roya Soltani∗ Department of Industrial Engineering, Science and Research Branch Islamic Azad University, Tehran, Iran Seyed Jafar Sadjadi and Mona Rahnama Department of Industrial Engineering Iran University of Science and Technology, Tehran, Iran (Communicated by Duan Li) Abstract. This study makes use of the artificial intelligence approaches com- bined with some nonlinear optimization techniques for optimization of a well- known problem in financial engineering called yield curve. Yield curve estima- tion plays an important role on making strategic investment decisions. In this paper, we use two well-known parsimonious estimation models, Nelson-Siegel and Extended Nelson-Siegel, for the yield curve estimation. The proposed mod- els of this paper are formulated as continuous nonlinear optimization problems. The resulted models are then solved using some nonlinear optimization and meta-heuristic approaches. The optimization techniques include hybrid GPSO parallel trust region-dog leg, Hybrid GPSO parallel trust region-nearly exact, Hybrid GPSO parallel Levenberg-Marquardt and Hybrid genetic electromag- netism like algorithm. The proposed models of this paper are examined using some real-world data from the bank of England and the results are analyzed. 1. Introduction. One of the most important issues on bond market is to esti- mate the yield curve in time horizon which is used for different purposes such as investment strategies, monetary policy, etc. In the bond market, there are differ- ent kinds of bonds with different times of maturities to invest.
    [Show full text]
  • Trust-Region Newton-CG with Strong Second-Order Complexity Guarantees for Nonconvex Optimization
    Industrial and Systems Engineering Trust-Region Newton-CG with Strong Second-Order Complexity Guarantees for Nonconvex Optimization Frank E. Curtis1, Daniel P. Robinson1, Clement´ W. Royer2, and Stephen J. Wright3 1Department of Industrial and Systems Engineering, Lehigh University 2LAMSADE, CNRS, Universit´eParis-Dauphine, Universit´ePSL 3Computer Sciences Department, University of Wisconsin ISE Technical Report 19T-028 Trust-Region Newton-CG with Strong Second-Order Complexity Guarantees for Nonconvex Optimization∗ Frank E. Curtis† Daniel P. Robinson† Cl´ement W. Royer‡ Stephen J. Wright§ December 9, 2019 Abstract Worst-case complexity guarantees for nonconvex optimization algorithms have been a topic of growing interest. Multiple frameworks that achieve the best known complexity bounds among a broad class of first- and second-order strategies have been proposed. These methods have often been designed primarily with complexity guarantees in mind and, as a result, represent a departure from the algorithms that have proved to be the most effective in practice. In this paper, we consider trust-region Newton methods, one of the most popular classes of algorithms for solving nonconvex optimization problems. By introducing slight modifications to the original scheme, we obtain two methods—one based on exact subproblem solves and one exploiting inexact subproblem solves as in the popular “trust-region Newton-Conjugate- Gradient” (Newton-CG) method—with iteration and operation complexity bounds that match the best known bounds for the aforementioned class of first- and second-order methods. The resulting Newton- CG method also retains the attractive practical behavior of classical trust-region Newton-CG, which we demonstrate with numerical comparisons on a standard benchmark test set.
    [Show full text]