Advances in Interior Point Methods and Column Generation

Total Page:16

File Type:pdf, Size:1020Kb

Advances in Interior Point Methods and Column Generation Advances in Interior Point Methods and Column Generation Pablo Gonz´alezBrevis Doctor of Philosophy University of Edinburgh 2013 Declaration I declare that this thesis was composed by myself and that the work contained therein is my own, except where explicitly stated otherwise in the text. (Pablo Gonz´alezBrevis) ii To my endless inspiration and angels on earth: Paulina, Crist´obal and Esteban iii Abstract In this thesis we study how to efficiently combine the column generation technique (CG) and interior point methods (IPMs) for solving the relaxation of a selection of integer programming problems. In order to obtain an efficient method a change in the column generation technique and a new reoptimization strategy for a primal-dual interior point method are proposed. It is well-known that the standard column generation technique suffers from un- stable behaviour due to the use of optimal dual solutions that are extreme points of the restricted master problem (RMP). This unstable behaviour slows down column generation so variations of the standard technique which rely on interior points of the dual feasible set of the RMP have been proposed in the literature. Among these tech- niques, there is the primal-dual column generation method (PDCGM) which relies on sub-optimal and well-centred dual solutions. This technique dynamically adjusts the column generation tolerance as the method approaches optimality. Also, it relies on the notion of the symmetric neighbourhood of the central path so sub-optimal and well-centred solutions are obtained. We provide a thorough theoretical analysis that guarantees the convergence of the primal-dual approach even though sub-optimal solu- tions are used in the course of the algorithm. Additionally, we present a comprehensive computational study of the solution of linear relaxed formulations obtained after apply- ing the Dantzig-Wolfe decomposition principle to the cutting stock problem (CSP), the vehicle routing problem with time windows (VRPTW), and the capacitated lot sizing problem with setup times (CLSPST). We compare the performance of the PDCGM with the standard column generation method (SCGM) and the analytic centre cutting planning method (ACCPM). Overall, the PDCGM achieves the best performance when compared to the SCGM and the ACCPM when solving challenging instances from a column generation perspective. One important characteristic of this column generation strategy is that no specific tuning is necessary and the algorithm poses the same level of difficulty as standard column generation method. The natural stabilization available in the PDCGM due to the use of sub-optimal well-centred interior point solutions is a very attractive feature of this method. Moreover, the larger the instance, the better is the relative performance of the PDCGM in terms of column generation iterations and CPU time. The second part of this thesis is concerned with the development of a new warmstart- ing strategy for the PDCGM. It is well known that taking advantage of the previously solved RMP could lead to important savings in solving the modified RMP. However, this is still an open question for applications arising in an integer optimization context and the PDCGM. Despite the current warmstarting strategy in the PDCGM working well in practice, it does not guarantee full feasibility restorations nor considers the quality of the warmstarted iterate after new columns are added. The main motivation of the design of the new warmstarting strategy presented in this thesis is to close this theoretical gap. Under suitable assumptions, the warmstarting procedure proposed in iv this thesis restores primal and dual feasibilities after the addition of new columns in one step. The direction is determined so that the modification of small components at a particular solution is not large. Additionally, the strategy enables control over the new duality gap by considering an expanded symmetric neighbourhood of the central path. As observed from our computational experiments solving CSP and VRPTW, one can conclude that the warmstarting strategies for the PDCGM are useful when dense columns are added to the RMP (CSP), since they consistently reduce the CPU time and also the number of iterations required to solve the RMPs on average. On the other hand, when sparse columns are added (VRPTW), the coldstart used by the interior point solver HOPDM becomes very efficient so warmstarting does not make the task of solving the RMPs any easier. v Acknowledgements I would like to thank Jacek Gondzio for being such a wonderful supervisor. I have learnt a lot from him and for that I am eternally grateful. I would like to express my gratitude to my examiners, Julian Hall and John Mitchell for their insightful comments and suggestions about this work. I would like to thank Universidad del Desarrollo, particularly the Research Council and the School of Engineering, for their financial support. Also, I am grateful to MIDEPLAN and CONICYT for granting me the Presidente de la Rep´ublica Scholarship. I would like to thank the School of Mathematics at The University of Edinburgh for its financial support during the last six months of my studies. I am also very grateful to everyone who supported me and my family during this \adventure". Specially, I am indebted to Nora Au and Pedro Silva for their constant support from Chile since the beginning. I would also like to thank all my office mates, Bubacarr, Naiyuan, Kimonas, Robert, Tim, Hanyi and Luciana. It was great sharing room 5620 with you guys. Special thanks go to Pedro, Robert and Tim for proofreading a first draft of this thesis. I am also indebted to the staff and administrators at the School of Mathematics at The University of Edinburgh. Particularly, friends and colleges at the Edinburgh Research Group on Optimization (ERGO). I would like to thank all baristas at the Starbucks store at Forrest Road. You always made my mornings (and some afternoons) with a delicious mocha. In a more personal note, I am very grateful to friends I had the chance to meet while in Edinburgh. To Cristian, Loreto, Bryan, Lorena, Pedro, H´ector,Valeria and Milan, you are wonderful people! I would like to thank my parents, Ver´onicaand Enrique; my brothers and sister, Claudio, Sebasti´anand Patricia; and my parents-in-law, Carolina and Julio, for their constant support from far away. You have always believed in me! Last but not least, this thesis could not have been completed without the support of my family. To Crist´obaland Esteban for showing me the beauty on simple things. To Paulina, for her constant encouragement, endless patience and infinite love! A todos, gracias totales! vi Contents Abstract v 1 Introduction 1 1.1 Linear programming problems . .1 1.2 Motivation and contributions . .2 2 Primal-Dual Interior Point Methods 8 2.1 Neighbourhoods and path-following methods . 11 2.2 Convergence and complexity of the Ns(γ) neighbourhood . 14 2.2.1 Algorithm . 14 2.2.2 Convergence . 14 2.2.3 Complexity . 16 3 Column Generation and the Decomposition Principle 17 3.1 Dantzig-Wolfe decomposition . 17 3.2 Lagrangian relaxation equivalence . 20 3.3 A graphical interpretation . 21 3.4 Column generation . 23 3.4.1 Adding columns to the RMP . 26 3.4.2 Limitations of the standard version . 27 3.5 Stabilization strategies . 29 4 A Selection of Problems: Formulation and Decomposition 32 4.1 Cutting stock problem . 32 4.1.1 Dantzig-Wolfe decomposition . 33 4.2 Vehicle routing problem with time windows . 34 4.2.1 Dantzig-Wolfe decomposition . 35 4.3 Capacitated lot-sizing problem with setup times . 36 4.3.1 Dantzig-Wolfe decomposition . 37 5 Primal-Dual Column Generation Method 39 5.1 Theoretical developments . 40 5.2 Computational study . 46 5.2.1 Cutting stock problem . 48 5.2.2 Vehicle routing problem with time windows . 50 5.2.3 Capacitated lot-sizing problem with setup times . 54 5.2.4 Performance profiles for large instances . 56 5.2.5 Additional comments about stabilized column generation . 60 vii 6 A New Reoptimization Technique for the Primal-Dual Column Gen- eration Method 62 6.1 Warmstarting strategies . 63 6.2 Theoretical developments . 65 6.2.1 Technical conditions . 68 6.2.2 Dual feasibility restoration . 70 6.2.3 Primal feasibility restoration . 73 6.2.4 Centrality . 76 6.2.5 Algorithm . 79 6.3 Computational study . 81 6.3.1 Cutting stock problem . 82 6.3.2 Vehicle routing problem with time windows . 86 7 Conclusions and Further Developments 91 7.1 Summary and concluding remarks . 91 7.2 Further studies . 93 A Test problems 96 A.1 Cutting stock problem . 96 A.2 Vehicle routing problem with time windows . 100 A.3 Capacitated lot-sizing problem with setup times . 102 viii List of Tables 5.1 Average results on 262 instances of CSP for the SCGM, the PDCGM and the ACCPM adding one column at a time. 49 5.2 Average results on 262 instances of CSP for the SCGM, the PDCGM and the ACCPM adding up to k columns at a time. 49 5.3 Results on 14 large instances of CSP for the SCGM, the PDCGM and the ACCPM adding up to 100 columns at a time. 50 5.4 Average results on 87 instances of VRPTW for the SCGM, the PDCGM and the ACCPM adding one column at a time. 52 5.5 Average results on 87 instances of VRPTW for the SCGM, the PDCGM and the ACCPM adding up to k columns at a time. 53 5.6 Results on 9 large instances of VRPTW for the SCGM, the PDCGM and the ACCPM adding 300 columns at a time. 54 5.7 Average results on 751 instances of CLSPST for the SCGM, the PDCGM and the ACCPM adding one column per subproblem at a time.
Recommended publications
  • Chapter 8 Constrained Optimization 2: Sequential Quadratic Programming, Interior Point and Generalized Reduced Gradient Methods
    Chapter 8: Constrained Optimization 2 CHAPTER 8 CONSTRAINED OPTIMIZATION 2: SEQUENTIAL QUADRATIC PROGRAMMING, INTERIOR POINT AND GENERALIZED REDUCED GRADIENT METHODS 8.1 Introduction In the previous chapter we examined the necessary and sufficient conditions for a constrained optimum. We did not, however, discuss any algorithms for constrained optimization. That is the purpose of this chapter. The three algorithms we will study are three of the most common. Sequential Quadratic Programming (SQP) is a very popular algorithm because of its fast convergence properties. It is available in MATLAB and is widely used. The Interior Point (IP) algorithm has grown in popularity the past 15 years and recently became the default algorithm in MATLAB. It is particularly useful for solving large-scale problems. The Generalized Reduced Gradient method (GRG) has been shown to be effective on highly nonlinear engineering problems and is the algorithm used in Excel. SQP and IP share a common background. Both of these algorithms apply the Newton- Raphson (NR) technique for solving nonlinear equations to the KKT equations for a modified version of the problem. Thus we will begin with a review of the NR method. 8.2 The Newton-Raphson Method for Solving Nonlinear Equations Before we get to the algorithms, there is some background we need to cover first. This includes reviewing the Newton-Raphson (NR) method for solving sets of nonlinear equations. 8.2.1 One equation with One Unknown The NR method is used to find the solution to sets of nonlinear equations. For example, suppose we wish to find the solution to the equation: xe+=2 x We cannot solve for x directly.
    [Show full text]
  • Cancer Treatment Optimization
    CANCER TREATMENT OPTIMIZATION A Thesis Presented to The Academic Faculty by Kyungduck Cha In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the H. Milton Stewart School of Industrial and Systems Engineering Georgia Institute of Technology April 2008 CANCER TREATMENT OPTIMIZATION Approved by: Professor Eva K. Lee, Advisor Professor Renato D.C. Monteiro H. Milton Stewart School of Industrial H. Milton Stewart School of Industrial and Systems Engineering and Systems Engineering Georgia Institute of Technology Georgia Institute of Technology Professor Earl R. Barnes Professor Nolan E. Hertel H. Milton Stewart School of Industrial G. W. Woodruff School of Mechanical and Systems Engineering Engineering Georgia Institute of Technology Georgia Institute of Technology Professor Ellis L. Johnson Date Approved: March 28, 2008 H. Milton Stewart School of Industrial and Systems Engineering Georgia Institute of Technology To my parents, wife, and son. iii ACKNOWLEDGEMENTS First of all, I would like to express my sincere appreciation to my advisor, Dr. Eva Lee for her invaluable guidance, financial support, and understanding throughout my Ph.D program of study. Her inspiration provided me many ideas in tackling with my thesis problems and her enthusiasm encouraged me to produce better works. I would also like to thank Dr. Earl Barnes, Dr. Ellis Johnson, Dr. Renato D.C. Monteiro, and Dr. Nolan Hertel for their willingness to serve on my dissertation committee and for their valuable feedbacks. I also thank my friends, faculty, and staff, at Georgia Tech, who have contributed to this thesis in various ways. Specially, thank you to the members at the Center for Operations Research in Medicine and HealthCare for their friendship.
    [Show full text]
  • A New Trust Region Method with Simple Model for Large-Scale Optimization ∗
    A New Trust Region Method with Simple Model for Large-Scale Optimization ∗ Qunyan Zhou,y Wenyu Sunz and Hongchao Zhangx Abstract In this paper a new trust region method with simple model for solv- ing large-scale unconstrained nonlinear optimization is proposed. By employing generalized weak quasi-Newton equations, we derive several schemes to construct variants of scalar matrices as the Hessian approx- imation used in the trust region subproblem. Under some reasonable conditions, global convergence of the proposed algorithm is established in the trust region framework. The numerical experiments on solving the test problems with dimensions from 50 to 20000 in the CUTEr li- brary are reported to show efficiency of the algorithm. Key words. unconstrained optimization, Barzilai-Borwein method, weak quasi-Newton equation, trust region method, global convergence AMS(2010) 65K05, 90C30 1. Introduction In this paper, we consider the unconstrained optimization problem min f(x); (1.1) x2Rn where f : Rn ! R is continuously differentiable with dimension n relatively large. Trust region methods are a class of powerful and robust globalization ∗This work was supported by National Natural Science Foundation of China (11171159, 11401308), the Natural Science Fund for Universities of Jiangsu Province (13KJB110007), the Fund of Jiangsu University of Technology (KYY13012). ySchool of Mathematics and Physics, Jiangsu University of Technology, Changzhou 213001, Jiangsu, China. Email: [email protected] zCorresponding author. School of Mathematical Sciences, Jiangsu Key Laboratory for NSLSCS, Nanjing Normal University, Nanjing 210023, China. Email: [email protected] xDepartment of Mathematics, Louisiana State University, USA. Email: [email protected] 1 methods for solving (1.1).
    [Show full text]
  • The Central Curve in Linear Programming
    THE CENTRAL CURVE IN LINEAR PROGRAMMING JESUS´ A. DE LOERA, BERND STURMFELS, AND CYNTHIA VINZANT Abstract. The central curve of a linear program is an algebraic curve specified by linear and quadratic constraints arising from complementary slackness. It is the union of the various central paths for minimizing or maximizing the cost function over any region in the associated hyperplane arrangement. We determine the degree, arithmetic genus and defining prime ideal of the central curve, thereby answering a question of Bayer and Lagarias. These invariants, along with the degree of the Gauss image of the curve, are expressed in terms of the matroid of the input matrix. Extending work of Dedieu, Malajovich and Shub, this yields an instance-specific bound on the total curvature of the central path, a quantity relevant for interior point methods. The global geometry of central curves is studied in detail. 1. Introduction We consider the standard linear programming problem in its primal and dual formulation: (1) Maximize cT x subject to Ax = b and x ≥ 0; (2) Minimize bT y subject to AT y − s = c and s ≥ 0: Here A is a fixed matrix of rank d having n columns. The vectors c 2 Rn and b 2 image(A) may vary. In most of our results we assume that b and c are generic. This implies that both the primal optimal solution and the dual optimal solution are unique. We also assume that the problem (1) is bounded and both problems (1) and (2) are strictly feasible. Before describing our contributions, we review some basics from the theory of linear pro- gramming [26,33].
    [Show full text]
  • IMPROVED PARTICLE SWARM OPTIMIZATION for NON-LINEAR PROGRAMMING PROBLEM with BARRIER METHOD Raju Prajapati1 1University of Engineering & Management, Kolkata, W.B
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Gyandhara International Academic Publication (GIAP): Journals International Journal of Students’ Research in Technology & Management eISSN: 2321-2543, Vol 5, No 4, 2017, pp 72-80 https://doi.org/10.18510/ijsrtm.2017.5410 IMPROVED PARTICLE SWARM OPTIMIZATION FOR NON-LINEAR PROGRAMMING PROBLEM WITH BARRIER METHOD Raju Prajapati1 1University Of Engineering & Management, Kolkata, W.B. India Om Prakash Dubey2, Randhir Kumar3 2,3Bengal College Of Engineering & Technology, Durgapur, W.B. India email: [email protected] Article History: Submitted on 10th September, Revised on 07th November, Published on 30th November 2017 Abstract: The Non-Linear Programming Problems (NLPP) are computationally hard to solve as compared to the Linear Programming Problems (LPP). To solve NLPP, the available methods are Lagrangian Multipliers, Sub gradient method, Karush-Kuhn-Tucker conditions, Penalty and Barrier method etc. In this paper, we are applying Barrier method to convert the NLPP with equality constraint to an NLPP without constraint. We use the improved version of famous Particle Swarm Optimization (PSO) method to obtain the solution of NLPP without constraint. SCILAB programming language is used to evaluate the solution on sample problems. The results of sample problems are compared on Improved PSO and general PSO. Keywords. Non-Linear Programming Problem, Barrier Method, Particle Swarm Optimization, Equality and Inequality Constraints. INTRODUCTION A large number of algorithms are available to solve optimization problems, inspired by evolutionary process in nature. e.g. Genetic Algorithm, Particle Swarm Optimization, Ant Colony Optimization, Bee Colony Optimization, Memetic Algorithm, etc.
    [Show full text]
  • Constrained Multifidelity Optimization Using Model Calibration
    Struct Multidisc Optim (2012) 46:93–109 DOI 10.1007/s00158-011-0749-1 RESEARCH PAPER Constrained multifidelity optimization using model calibration Andrew March · Karen Willcox Received: 4 April 2011 / Revised: 22 November 2011 / Accepted: 28 November 2011 / Published online: 8 January 2012 c Springer-Verlag 2012 Abstract Multifidelity optimization approaches seek to derivative-free and sequential quadratic programming meth- bring higher-fidelity analyses earlier into the design process ods. The method uses approximately the same number of by using performance estimates from lower-fidelity models high-fidelity analyses as a multifidelity trust-region algo- to accelerate convergence towards the optimum of a high- rithm that estimates the high-fidelity gradient using finite fidelity design problem. Current multifidelity optimization differences. methods generally fall into two broad categories: provably convergent methods that use either the high-fidelity gradient Keywords Multifidelity · Derivative-free · Optimization · or a high-fidelity pattern-search, and heuristic model cali- Multidisciplinary · Aerodynamic design bration approaches, such as interpolating high-fidelity data or adding a Kriging error model to a lower-fidelity function. This paper presents a multifidelity optimization method that bridges these two ideas; our method iteratively calibrates Nomenclature lower-fidelity information to the high-fidelity function in order to find an optimum of the high-fidelity design prob- A Active and violated constraint Jacobian lem. The
    [Show full text]
  • Barrier Method
    Barrier Method Ryan Tibshirani Convex Optimization 10-725/36-725 1 Last time: Newton's method Consider the problem min f(x) x n for f convex, twice differentiable, with dom(f) = R . Newton's (0) n method: choose initial x R , repeat 2 (k) (k−1) 2 (k−1) −1 (k−1) x = x tk f(x ) f(x ); k = 1; 2; 3;::: − r r Step sizes tk chosen by backtracking line search If f Lipschitz, f strongly convex, 2f Lipschitz, then Newton's r r method has a local convergence rate O(log log(1/)) Downsides: Requires solving systems in Hessian quasi-Newton • Can only handle equality constraints this lecture • 2 Hierarchy of second-order methods Assuming all problems are convex, you can think of the following hierarchy that we've worked through: Quadratic problems are the easiest: closed-form solution • Equality-constrained quadratic problems are still easy: we use • KKT conditions to derive closed-form solution Equality-constrained smooth problems are next: use Newton's • method to reduce this to a sequence of equality-constrained quadratic problems Inequality- and equality-constrained smooth problems are • what we cover now: use interior-point methods to reduce this to a sequence of equality-constrained smooth problems 3 Log barrier function Consider the convex optimization problem min f(x) x subject to hi(x) 0; i = 1; : : : m ≤ Ax = b We will assume that f, h1; : : : hm are convex, twice differentiable, n each with domain R . The function m φ(x) = log( hi(x)) − − i=1 X is called the log barrier for the above problem.
    [Show full text]
  • Electrical Networks, Hyperplane Arrangements and Matroids By
    Electrical Networks, Hyperplane Arrangements and Matroids by Robert P. Lutz A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Mathematics) in The University of Michigan 2019 Doctoral Committee: Professor Jeffrey Lagarias, Chair Professor Alexander Barvinok Associate Professor Chris Peikert Professor Karen Smith Professor David Speyer Robert P. Lutz a.k.a. Bob Lutz [email protected] orcid.org/0000-0002-5407-7041 c Robert P. Lutz 2019 Dedication This dissertation is dedicated to my parents. ii Acknowledgments I thank Trevor Hyde, Thomas Zaslavsky, and anonymous referees for helpful com- ments on individual chapters of this thesis. I thank Alexander Barvinok for his careful reading of an early version of the thesis, and many useful comments. Finally I thank my advisor, Jeffrey Lagarias, for his extensive comments on the thesis, for his keen advice and moral support, and for many helpful conversations throughout my experience as a graduate student. This work was partially supported by NSF grants DMS-1401224 and DMS-1701576. iii Table of Contents Dedication ii Acknowledgments iii List of Figures vii Abstract ix Chapter 1: Introduction 1 Chapter 2: Background 4 2.1 Electrical networks . 4 2.2 Hyperplane arrangements . 10 2.2.1 Supersolvable arrangements . 13 2.2.2 Graphic arrangements . 14 2.3 Matroids . 15 2.3.1 Graphic matroids . 17 2.3.2 Complete principal truncations . 17 Chapter 3: Electrical networks and hyperplane arrangements 19 3.1 Main definition and examples . 19 3.2 Main results . 24 3.3 Combinatorics of Dirichlet arrangements . 26 3.3.1 Intersection poset and connected partitions .
    [Show full text]
  • Problem Set 7 Convex Optimization (Winter 2018)
    Problem set 7 Convex Optimization (Winter 2018) Due Friday, February 23rd at 5pm • Upload both a pdf writeup of your work and a zip file containing any supplemental files to Canvas by the due date. Submissions without a non-zipped pdf writeup won’t be graded. • Late homeworks will be penalized 25% per day and will not be accepted after the next Monday at 5pm unless you have made arrangements with us well before the due date. We strongly encourage you to typeset your solutions. • You may collaborate with other students to complete this assignment, but all submitted work should be yours. When you go to write down your solutions, please do so on your own. Description In this assignment, you will experiment with the log-barrier method. Partiallly completed Python code is included with the assignment. Areas that you need to fill in are marked with “TODO” comments. You should turn in an archive containing all of your source code, and a separate pdf document containing all plots and answers to underlined questions. 1 Log-Barrier Function Most of the functions in the file “algorithms.py” are the same as in previous programming as- signments (but filled-in this time). The objective log barrier function in “algorithms.py” takes as parameters an objective function f0, a constraint function φ (which has the same calling convention as the objective function), a vector x, and a scaling parameter t, and returns the value, gradient and Hessian of the log-barrier objective: f(x; t) = tf0(x) + φ(x) 1 1.1 Implementation The function quadratic log barrier in “functions.py” is supposed to compute the value, gradient, and Hessian of: 1 X f(x; t) = t x>Qx + v>x − log (a x + b ) 2 i;: i i This is the log-barrier objective function f(x; t) = tf0(x) + φ(x) for a quadratic objective f0, log-barrier function φ, and linear constraints Ax + b ≥ 0.
    [Show full text]
  • Computing a Trust Region Step
    Distribution Category: Mathematics and Computers ANL--81-83 (UC-32) DE82 005656 ANIr81483 ARGONNE NATIONAL LABORATORY 9700 South Cass Avenue Argonne, Illinois 60439 COMPUTING A TRUST REGION STEP Jorge J. Mord and D. C. Sorensen Applied Mathematics Division DISCLAIMER - -. ".,.,... December 1981 Computing a Trust Region Step Jorge J. Mord and D. C. Sorensen Applied Mathematics Division Argonne National Laboratory Argonne Illinois 60439 1. Introduction. In an important class of minimization algorithms called "trust region methods" (see, for example, Sorensen [1981]), the calculation of the step between iterates requires the solution of a problem of the form (1.1) minij(w): 1|w |isAl where A is a positive parameter, I- II is the Euclidean norm in R", and (1.2) #(w) = g w + Mw7Bw, with g E R", and B E R a symmetric matrix. The quadratic function ' generally represents a local model to the objective function defined by interpolatory data at an iterate and thus it is important to be able to solve (1.1) for any symmetric matrix B; in particular, for a matrix B with negative eigenvalues. In trust region methods it is sometimes helpful to include a scaling matrix for the variables. In this case, problem (1.1) is replaced by (1.3) mint%(v):IIDu Is A where D E R""" is a nonsingular matrix. The change of variables Du = w shows that problem (1.3) is equivalent to (1.4) minif(w):1|w| Is Al where f(w) _%f(D-'w), and that the solutions of problems (1.3) and (1.4) are related by Dv = w.
    [Show full text]
  • Price-Based Distributed Optimization in Large-Scale Networked Systems
    Price-Based Distributed Optimization in Large-Scale Networked Systems Dissertation document submitted to the Division of Research and Advanced Studies of the University of Cincinnati in partial fulfillment of the requirements of degree of Doctor of Philosophy in the School of Dynamic Systems College of Engineering and Applied Sciences by Baisravan HomChaudhuri Summer 2013 MS, University of Cincinnati, 2010 BE, Jadavpur University, 2007 Committee Chair: Dr. Manish Kumar c 2013 Baisravan HomChaudhuri, All Rights Reserved Abstract This work is intended towards the development of distributed optimization methods for large-scale complex networked systems. The advancement in tech- nological fields such as networking, communication and computing has facili- tated the development of networks which are massively large-scale in nature. The examples of such systems include power grid, communication network, Internet, large manufacturing plants, and cloud computing clusters. One of the important challenges in these networked systems is the evaluation of the optimal point of operation of the system. Most of the centralized optimiza- tion algorithms suffer from the curse of dimensionality that raises the issue of scalability of algorithms for large-scale systems. The problem is essentially challenging not only due to high-dimensionality of the problem, but also due to distributed nature of resources, lack of global information and uncertain and dynamic nature of operation of most of these systems. The inadequacies of the traditional centralized optimization
    [Show full text]
  • Welcome to the 2013 MOPTA Conference!
    Welcome to the 2013 MOPTA Conference! Mission Statement The Modeling and Optimization: Theory and Applications (MOPTA) conference is an annual event aiming to bring together a diverse group of people from both discrete and continuous optimization, working on both theoretical and applied aspects. The format consists of invited talks from distinguished speakers and selected contributed talks, spread over three days. The goal is to present a diverse set of exciting new developments from different optimization areas while at the same time providing a setting that will allow increased interaction among the participants. We aim to bring together researchers from both the theoretical and applied communities who do not usually have the chance to interact in the framework of a medium- scale event. MOPTA 2013 is hosted by the Department of Industrial and Systems Engineering at Lehigh University. Organization Committee Frank E. Curtis - Chair [email protected] Tamás Terlaky [email protected] Ted Ralphs [email protected] Katya Scheinberg [email protected] Lawrence V. Snyder [email protected] Robert H. Storer [email protected] Aurélie Thiele [email protected] Luis Zuluaga [email protected] Staff Kathy Rambo We thank our sponsors! 1 Program Wednesday, August 14 – Rauch Business Center 7:30-8:10 - Registration and continental breakfast - Perella Auditorium Lobby 8:10-8:20 - Welcome: Tamás Terlaky, Department Chair, Lehigh ISE - Perella Auditorium (RBC 184) 8:20-8:30 - Opening remarks: Patrick Farrell, Provost, Lehigh University
    [Show full text]