Algorithms for Binary Integer Programming

Total Page:16

File Type:pdf, Size:1020Kb

Algorithms for Binary Integer Programming Algorithms for Binary Integer Programming T K Sarkar Institute of Statistics and Operations Research Victoria University of Wellington New Zealand [email protected] Abstract This paper describes the implicit enumeration method of Balas for solving linear binary integer programming problems. Surrogate constraints and constraint reduction techniques are also described. The dual problem is used to derive the surrogate constraint and to accelerate the implicit enumeration method. 1. Introduction We will consider a linear problem minZ = V n c. x. j J subject to a., x. < b., i e M = [1 ,2 ,..., m] j = i U 1 x. = Oor 1, j e N = [1 ,2 .......n]. We assume that each c. > 0. The RHS bj can have any sign. Any pure 0-1 linear problem can be put into this format. There are broadly two classes of methods of solution for the above. The first, simplex method with branch and bound, is the popular one. Excellent surveys are given in [10] and [11]. The second method is called implicit enumeration method and was proposed by Balas [1] in 1965. Branch and bound can be incorporated in implicit enumeration. Simplex method to solve a dual problem can also be added to make the algorithm more efficient 190 The idea of incorporating a surrogate constraint with implicit enumeration was first proposed by Glover [6 ]. A surrogate constraint is a non-negative linear combination of the constraints of the problem. Any trial solution which is infeasible for the surrogate constraint is also infeasible for the whole problem and can be discarded from consideration. In addition, sometimes the surrogate constraint can be used to fix some of the variables to 0 or 1 , thereby reducing the dimension of the problem. Frequently the constraints of the problem can be reduced to make them "tighter". Such tighter constraints reduce the number of iterations in the algorithm for both simplex method with branch and bound and implicit enumeration method. In the following sections we will describe the implicit enumeration method along with surrogate constraints and constraint reduction. 2. Constraint Reduction This method is usually called preprocessing and has been used successfully by Crowder et al [3] and Johnson et al [9] along with simplex method and branch and bound. A constraint of the form ^ a^ x. < b (each x^ = 0 or 1) is called a type II je N constraint. Sometimes it can be reduced to a constraint Y al x. < b1 such that both J j jeN have the same feasible solution set and the second constraint reaches equality more often than the first one. Let S., i s= 1 ,..I be a partition of N. We can consider a type II constraint along with special ordered set constraints ^ x. £ 1 , i = 1 , I. jeS i J Considerable reduction in the type II constraint can be achieved if special ordered set constraints are present. Methods of reduction will be shown at the time of presentation. Reduction accelerates simplex method with branch and bound. 3. Implicit Enumeration Method It was first proposed by Balas [1] in 1965 and subsequently modified by Glover [6 ], Geoffrion [4,5] and Balas [2]. It does not require any simplex tableau. The only operations performed are addition, subtraction, multiplication and comparison. Division is used only at one step. A partial solution is denoted for example by a set J = [5, - 2, 3]. It means that three variables have been fixed at x5 = x3 = 1 and x2 = 0 (in the order given by J) and the remaining variables are free to take any values 0 or 1. A completion of J means assigning specific values to the free variables. A partial solution J is fathomed if none of its completions can lead to a better solution. After a partial solution is fathomed we backtrack. In the above example it means that we take the rightmost element and reduce it to 0. Then J becomes the new partial solution [5, -2, -31. We try to fathom this new J. If we succeed then the next partial solution is [-5] i.e. x5 = 0 and x2, x3 becomes free. If we cannot fathom J then we go forward. This means that we select a free variable x. and set it to 1. Then new J = [-5, j]. We try to fathom this new J. 191 Suppose we have reached a partial solution J = [-k, -1]. If we can fathom this J then we have to backtrack. Since we cannot backtrack (no fixed variable has value 1) we stop. The partial feasible solution with the smallest value of Z that we have found so far is optimal. If no feasible solution has been found then the problem is infeasible. It can be shown that the iterations will stop in a finite number of steps. For the efficiency of the algorithm the fathoming tests are crucial. At the t-th iteration let J{ be the current partial solution and let S‘ =b i-|, a„-M; z‘= £ c .. Xj>0 Xj>0 Here S \ is the value of the slack variable for the i-th constraint and Zl is the value of the objective function. If S j < 0 then Jt is not feasible for constraint i. Let Zm be the smallest feasible value of Z found so far. We will now describe the fathoming tests of Balas. TEST 1: Find A = [x. free : a.. > 0 for all i such that S \ < 0]. If x. e At then it is no t j ij 1 j t longer free. TEST 2: If there are no more free variables left then backtrack. Otherwise find Bt = [x. free : Zl + a ^ Zm]. If x. e Bt then it is no longer free. TEST 3: If there are no free variables left then backtrack. Otherwise find C( = [ie M : S | < 0, Y a..>Sj]. Xjfree *ij<° If i g Ct then no completion of the partial solution will make constraint i feasible and we must backtrack. If Ct is empty, then there is a danger that a completion will give a Z £ Zm. Glover and Zionts [8] suggested that we find D( = [ Xj free : Cj/1 a;j I > (Z m -Z ‘ )/IS|l, S | < 0, a;j < 0]. If all free variables are in Dt then all completions of Jt lead to Z > Zm and we must backtrack. TEST 4: For each free variable x. let j v .= £ min [0, S j - a..] and vk = max [v.]. J ieM U j The quantity v. gives a measure of infeasibility by setting x. = 1. In case of a tie for vk we select according to the smallest ck. Now k is added to Jt on the right to get J j, If vk = 0 then we have a feasible solution. We put Zm = Zt+1 and then backtrack. If vk < 0 then we go back to test 1 with Jt+r Suppose Jt = [1, -2, 3, 4, -5, -6] and we must backtrack. Tuan [13] has suggested that we take the last set of consecutive non-negative indices and calculate w = £ min[0, s|+a..], j = 3,4 ieM 192 and select wk = max [w.]. In case of a tie we choose according to largest ck. If k = 3 then Jt + 1 = [ l,- 2 , 4, -3]. As an example we consider the following 10 variable, 7 constraint problem, [12]. c = [ 1 0 , 7, 1, 1 2 , 2 , 8 , 3, 1,5 , 3] " 3 - 1 2 - 8 1 0 0 0 0 -7 2 1 0 1 - 1 0 0 -5 1 7 1 0 0 (aij) = 5 -3 - 1 0 0 0 0 - 2 0 1 -5 3 1 0 0 0 0 2 0 - 1 0 0 -4 - 2 0 -5 1 -9 - 2 0 0 9 0 •1 2 -7 6 0 2 -15 3 - 8 5 2 -7 - 1 0 -5 0 - 1 0 0 b = [- 2 , - 1 ,- -1 , 1 ,- -3, -7 ,-- 1 ] Using implicit enumeration method we found JQ = <|>, J., ..., Jg. This problem has 2 10 = 1024 possible solutions to enumerate. We explicitly enumerated only 9 and found that J2 = [9, 3] was optimal. Solving by branch and bound using simplex method with upper bounding needed 17 simplex iterations. 4. Dual Problems and Surrogate Constraint The concept of surrogate constraints was proposed by Glover [6 ] and was further developed by Glover [7], Balas [2] and Geoffrion [5]. Any non-negative linear combination of the m constraints gives a single surrogate constraint such that any feasible solution to the m constraints is also feasible for the surrogate constraint and any solution which does not satisfy the surrogate constraint will not be feasible for the m constraints. A surrogate constraint can be incorporated into the implicit enumeration method to accelerate the algorithm. So far duality has been used to develop this constraint. Suppose at any stage we have a finite value of Zm and a partial solution Jt, which we want to fathom. We introduce dual variables ^ ^ 0 for the constraint i, i = 1 ,..., m and y. > 0, corresponding to the bounds x. < 1. Then the dual corresponding to the free variables can be written as minw‘= £ S‘ni+ £ ^ + A ieM jfree subject to - £ a.. \i. - y. < c. i€M 1J J J 1 \i. >0,y.^ 0 , 1€ M, j free. Here A = Zm - Zl - p, p = 1cm [cr c2, ..., c j if each c. is a non-negative integer. Otherwise p = 0. If min wl < 0, then no completion of Jt can give a value of Z better than Zm and we must backtrack. If min wl > 0, then Jt is not fathomed but the optimal p/s can be used to find a surrogate constraint which may fix some of the free x's.
Recommended publications
  • IBM Research Report Branch and Bound, Integer and Non-Integer
    RC22890 (W0309-010) September 3, 2003 Mathematics IBM Research Report Branch and Bound, Integer and Non-Integer Programming J. J. H. Forrest IBM Research Division Thomas J. Watson Research Center P.O. Box 218 Yorktown Heights, NY 10598 J. A. Tomlin IBM Research Division Almaden Research Center 650 Harry Road San Jose, CA 95120-6099 Research Division Almaden - Austin - Beijing - Delhi - Haifa - India - T. J. Watson - Tokyo - Zurich LIMITED DISTRIBUTION NOTICE: This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should be filled only by reprints or legally obtained copies of the article (e.g. , payment of royalties). Copies may be requested from IBM T. J. Watson Research Center , P. O. Box 218, Yorktown Heights, NY 10598 USA (email: [email protected]). Some reports are available on the internet at http://domino.watson.ibm.com/library/CyberDig.nsf/home . Branch and Bound, Integer, and Non-Integer Programming J.J.H. Forrest IBM Watson Research Center, Yorktown Heights, NY 10598 J. A. Tomlin IBM Almaden Research Center, San Jose, CA 95120 {[email protected],[email protected]} Abstract In this note we review the development of the first commercial branch and bound codes at CEIR/Scicon, with particular emphasis on those features not commonly emphasized today—that is the use of branch and bound to handle discrete constructs, which, while often formally representable in terms of zero-one integer variables, can be handled more elegantly and effectively by applying branch and bound to the actual dichotomies in the model.
    [Show full text]
  • ILOG AMPL CPLEX System Version 9.0 User's Guide
    ILOG AMPL CPLEX System Version 9.0 User’s Guide Standard (Command-line) Version Including CPLEX Directives September 2003 Copyright © 1987-2003, by ILOG S.A. All rights reserved. ILOG, the ILOG design, CPLEX, and all other logos and product and service names of ILOG are registered trademarks or trademarks of ILOG in France, the U.S. and/or other countries. JavaTM and all Java-based marks are either trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries. Microsoft, Windows, and Windows NT are either trademarks or registered trademarks of Microsoft Corporation in the U.S. and other countries. All other brand, product and company names are trademarks or registered trademarks of their respective holders. AMPL is a registered trademark of AMPL Optimization LLC and is distributed under license by ILOG.. CPLEX is a registered trademark of ILOG.. Printed in France. CO N T E N T S Table of Contents Chapter 1 Introduction . 1 Welcome to AMPL . .1 Using this Guide. .1 Installing AMPL . .2 Requirements. .2 Unix Installation . .3 Windows Installation . .3 AMPL and Parallel CPLEX. 4 Licensing . .4 Usage Notes . .4 Installed Files . .5 Chapter 2 Using AMPL. 7 Running AMPL . .7 Using a Text Editor . .7 Running AMPL in Batch Mode . .8 Chapter 3 AMPL-Solver Interaction . 11 Choosing a Solver . .11 Specifying Solver Options . .12 Initial Variable Values and Solvers. .13 ILOG AMPL CPLEX SYSTEM 9.0 — USER’ S GUIDE v Problem and Solution Files. .13 Saving temporary files . .14 Creating Auxiliary Files . .15 Running Solvers Outside AMPL. .16 Using MPS File Format .
    [Show full text]
  • Applying Piecewise Linear Characteristic Curves in District Energy Optimisation Bryn Pickeringa#, Ruchi Choudharya^
    PROCEEDINGS OF ECOS 2017 - THE 30TH INTERNATIONAL CONFERENCE ON EFFICIENCY, COST, OPTIMIZATION, SIMULATION AND ENVIRONMENTAL IMPACT OF ENERGY SYSTEMS JULY 2-JULY 6, 2017, SAN DIEGO, CALIFORNIA, USA Applying Piecewise Linear Characteristic Curves in District Energy Optimisation Bryn Pickeringa#, Ruchi Choudharya^ a Department of Engineering, University of Cambridge Trumpington Street, Cambridge, CB2 1PZ, United Kingdom, # [email protected], ^ [email protected] Abstract: Representing nonlinear curves as piecewise elements allows complex systems to be optimised by linear programs. Piecewise linearisation has been recently introduced in the context of distributed energy system optimisation. It is an efficient technique for representing non-linear technology behaviours in linear optimisation models, which are favourable in district energy optimisation models, owing to their speed and ability to handle large numbers of design variables. This paper describes a method of automating the creation of piecewise elements of technology performance curves for minimum fit error. The results show an objective function value improvement at a relatively large penalty in solution time: from 1.6 times to 58 times longer than describing technologies as having a single value for efficiency (SVE). We show that within the context of common technology performance curves, three breakpoints yield sufficiently accurate results and any returns are diminishing beyond that. Even at three breakpoints, it is evident that the placement of breakpoints along a curve significantly influences solution time, in a way for which it is not possible to account in automation. But, large savings can be made by automation by including a constraint to ensure piecewise curves have a strictly increasing/decreasing gradient.
    [Show full text]
  • Piecewise-Linear Approximation for Feature Subset Selection in A
    PIECEWISE-LINEAR APPROXIMATION FOR FEATURE SUBSET SELECTION IN A SEQUENTIAL LOGIT MODEL Toshiki Sato Yuichi Takano Ryuhei Miyashiro University of Tsukuba Senshu University Tokyo University of Agriculture and Technology (October 7, 2015) Abstract This paper concerns a method of selecting a subset of features for a sequential logit model. Tanaka and Nakagawa (2014) proposed a mixed integer quadratic optimization formulation for solving the problem based on a quadratic approximation of the logistic loss function. However, since there is a significant gap between the logistic loss function and its quadratic approximation, their formulation may fail to find a good subset of features. To overcome this drawback, we apply a piecewise-linear approximation to the logistic loss function. Accordingly, we frame the feature subset selection problem of minimizing an information criterion as a mixed integer linear optimization problem. The computational results demonstrate that our piecewise-linear approximation approach found a better subset of features than the quadratic approximation approach. Keywords: Optimization, statistics, feature subset selection, sequential logit model, piecewise- linear approximation, information criterion 1. Introduction The analysis of ordinal categorical data [3, 23] is required in various areas including finance, econometrics, and bioinformatics. For instance, credit ratings of financial instruments are typical ordinal categorical data, and thus, many previous studies have analyzed such data by means of ordinal classification models (see, e.g., [1, 12, 28]). A sequential logit model [5, 17, 33], also known as the continuation ratio model [2, 14], is a commonly used ordinal classification model. It predicts an ordinal class label for each sample by successively applying separate logistic regression models.
    [Show full text]
  • Integer Optimization Methods for Machine Learning by Allison an Chang Sc.B
    Integer Optimization Methods for Machine Learning by Allison An Chang Sc.B. Applied Mathematics, Brown University (2007) Submitted to the Sloan School of Management in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Operations Research at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY June 2012 c Massachusetts Institute of Technology 2012. All rights reserved. Author............................................. ................. Sloan School of Management May 18, 2012 Certified by......................................... ................. Dimitris Bertsimas Boeing Leaders for Global Operations Professor Co-Director, Operations Research Center Thesis Supervisor Certified by......................................... ................. Cynthia Rudin Assistant Professor of Statistics Thesis Supervisor Accepted by......................................... ................ Patrick Jaillet Dugald C. Jackson Professor Department of Electrical Engineering and Computer Science Co-Director, Operations Research Center 2 Integer Optimization Methods for Machine Learning by Allison An Chang Submitted to the Sloan School of Management on May 18, 2012, in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Operations Research Abstract In this thesis, we propose new mixed integer optimization (MIO) methods to ad- dress problems in machine learning. The first part develops methods for supervised bipartite ranking, which arises in prioritization tasks in diverse domains such as infor- mation retrieval, recommender systems, natural language processing, bioinformatics, and preventative maintenance. The primary advantage of using MIO for ranking is that it allows for direct optimization of ranking quality measures, as opposed to current state-of-the-art algorithms that use heuristic loss functions. We demonstrate using a number of datasets that our approach can outperform other ranking methods. The second part of the thesis focuses on reverse-engineering ranking models.
    [Show full text]
  • Polylithic Modeling and Solution Approaches Using Algebraic Modeling Systems
    Polylithic Modeling and Solution Approaches Using Algebraic Modeling Systems Josef Kallrath Department of Astronomy University of Florida Gainesville, FL 32611, USA [email protected] Abstract. Based on the Greek term monolithos (stone consisting of one single block) Kallrath (2009) introduced the term polylithic for modeling and solution approaches in which mixed integer or non-convex nonlinear optimization problems are solved by tailor-made methods involving sev- eral models and/or algorithmic components, in which the solution of one model is input to another one. This can be exploited to initialize certain variables, or to provide bounds on them (problem-specific preprocess- ing). Mathematical examples of polylithic approaches are decomposition techniques, or hybrid methods in which constructive heuristics and local search improvement methods are coupled with exact MIP algorithms Tailor-made polylithic solution approaches with thousands or mil- lions of solve statements are challenges on algebraic modeling languages. Local objects and procedural structures are almost necessary. Warm- start and hot-start techniques can be essential. The effort of developing complex tailor-made polylithic solutions is awarded by enabling us to solve real-world problems far beyond the limits of monolithic approaches and general purpose solvers. Keywords: algebraic modeling languages, branch&price, column gen- eration, decomposition, hybrid methods, monolithic, primal methods, polylithic, problem-specific preprocessing 1 Introduction Instead of solving
    [Show full text]
  • Performance Comparisons of IP Problem Formulation
    IT 12 059 Examensarbete 15 hp November 2012 Performance Comparisons of IP Problem Formulation Joakim Lindqvist Institutionen för informationsteknologi Department of Information Technology Abstract Performance Comparisons of IP Problem Formulation Joakim Lindqvist Teknisk- naturvetenskaplig fakultet UTH-enheten When solving optimization problems, the importance of speed can not be emphasized enough for many organizations. One company encountered Besöksadress: a major performance difference when solving a problem with the same Ångströmlaboratoriet Lägerhyddsvägen 1 integer programming solver, in two different locations. The difference was Hus 4, Plan 0 shown not to be caused by the environment of the solver, but rather a reformulation of the problem. However, the reformulation did not improve Postadress: the performance of an expanded version of the problem. By analyzing and Box 536 751 21 Uppsala comparing the two versions one might be able to find the properties of a problem which enables the reformulation to reduce the solving time. Telefon: This in turn can be used to identify for which problems the reformulation 018 – 471 30 03 should be applied to increase the speed at which they are solved. Telefax: 018 – 471 30 00 Hemsida: http://www.teknat.uu.se/student Handledare: Arne Andersson Ämnesgranskare: Pierre Flener Examinator: Olle Gällmo IT 12 059 Tryckt av: Reprocentralen ITC Contents 1 Introduction 1 2 Background 2 2.1 Linear Programming . 2 2.1.1 History . 2 2.1.2 The LP Problem . 3 2.1.3 An LP Example . 4 2.2 Integer Programming . 4 2.3 Solving IP Problems . 6 2.4 Special Ordered Sets . 7 2.4.1 SOS Type 1 .
    [Show full text]
  • A Comparative Study of SQP-Type Algorithms for Nonlinear and Nonconvex Mixed-Integer Optimization
    Math. Prog. Comp. (2012) 4:383–412 DOI 10.1007/s12532-012-0045-0 FULL LENGTH PAPER A comparative study of SQP-type algorithms for nonlinear and nonconvex mixed-integer optimization Oliver Exler · Thomas Lehmann · Klaus Schittkowski Received: 24 March 2012 / Accepted: 11 July 2012 / Published online: 5 August 2012 © Springer and Mathematical Optimization Society 2012 Abstract We present numerical results of a comparative study of codes for nonlin- ear and nonconvex mixed-integer optimization. The underlying algorithms are based on sequential quadratic programming (SQP) with stabilization by trust-regions, linear outer approximations, and branch-and-bound techniques. The mixed-integer quadratic programming subproblems are solved by a branch-and-cut algorithm. Second order information is updated by a quasi-Newton update formula (BFGS) applied to the Lagrange function for continuous, but also for integer variables. We do not require that the model functions can be evaluated at fractional values of the integer variables. Thus, partial derivatives with respect to integer variables are replaced by descent directions obtained from function values at neighboring grid points, and the number of simulations or function evaluations, respectively, is our main performance criterion to measure the efficiency of a code. Numerical results are presented for a set of 100 academic mixed-integer test problems. Since not all of our test examples are convex, we reach the best-known solutions in about 90 % of the test runs, but at least feasible solutions in the other cases. The average number of function evaluations of the new mixed-integer SQP code is between 240 and 500 including those needed for one- or two-sided approximations of partial derivatives or descent directions, respectively.
    [Show full text]
  • Mathematical Programming Society Newsletter Cussion Ofafewalgorithmsandproofswhichwillhopefullygivesomeflavor Ofourwork
    58 O N O P T I M A Mathematical Programming Society Newsletter JUNE 1998 David Karger was awarded the 1997 Tucker Prize by the Randomization in Society for his thesis Random Graph Optimization Sampling in Graph Optimiza- tion Problems. The jury found Problems: A Survey his contribution, on the inter- face between computer sci- David Karger* ence and optimization, deep and elegant. To make David’s Abstract work even better known among the membership, I Randomization has become a pervasive technique in combinatorial invited him to write a feature optimization. We survey our thesis and subsequent work, which article on some of his very uses four common randomization techniques to attack numerous interesting techniques and optimization problems on undirected graphs. results. David Karger obtained an A.B. degree from Harvard 1 Introduction University, a Math Certificate Randomization has become a pervasive technique in combinatorial optimization. Randomization has been used from Cambridge University, to develop algorithms that are faster, simpler, and/or better-performing than previous deterministic algorithms. and a Ph.D. degree from This article surveys our thesis [Kar94], which presents randomized algorithms for numerous problems on Stanford University. Apart undirected graphs. Our work uses four important randomization techniques: Random Selection, which lets us from the Tucker Prize, David easily choose a “typical” element of a set, avoiding rare “bad” elements; Random Sampling, which provides a has been awarded numerous quick way to build a small, representative subproblem of a larger problem for quick analysis; Randomized other fellowships and prizes, such as the ACM Doctoral Rounding, which lets us transform fractional problem solutions into integral ones; and Monte Carlo Simula- Dissertation award, an Alfred tion, which lets us estimate the probabilities of interesting events.
    [Show full text]
  • Mathoptinterface: a Data Structure for Mathematical Optimization Problems 2
    MathOptInterface: a data structure for mathematical optimization problems Benoˆıt Legat ICTEAM, UCLouvain, Louvain-la-Neuve, Belgium, [email protected] Oscar Dowson Department of Industrial Engineering and Management Sciences at Northwestern University, Evanston, IL, [email protected] Joaquim Dias Garcia PSR & PUC-Rio, Rio de Janeiro, Brazil, [email protected] Miles Lubin Google Research, New York, NY, [email protected] We introduce MathOptInterface, an abstract data structure for representing mathematical optimization problems based on combining pre-defined functions and sets. MathOptInterface is significantly more general than existing data structures in the literature, encompassing, for example, a spectrum of problems classes from integer programming with indicator constraints to bilinear semidefinite programming. We also outline an automated rewriting system between equivalent formulations of a constraint. MathOptInterface has been implemented in practice, forming the foundation of a recent rewrite of JuMP, an open-source algebraic mod- eling language in the Julia language. The regularity of the MathOptInterface representation leads naturally to a general file format for mathematical optimization we call MathOptFormat. In addition, the automated rewriting system provides modeling power to users while making it easy to connect new solvers to JuMP. Key words : algebraic modeling language; Julia; JuMP; problem formats 1. Introduction arXiv:2002.03447v2 [math.OC] 16 Sep 2020 JuMP (Lubin and Dunning 2015, Dunning et al. 2017) is an algebraic modeling lan- guage for mathematical optimization written in the Julia language (Bezanson et al. 2017). JuMP, like other algebraic modeling languages (e.g., AMPL (Fourer et al. 1990), Convex.jl (Udell et al. 2014), CVX (Grant and Boyd 2014), CVXPY (Diamond and Boyd 2016), GAMS (Brook et al.
    [Show full text]
  • Optimization: Applications, Algorithms, and Computation
    Optimization: Applications, Algorithms, and Computation 24 Lectures on Nonlinear Optimization and Beyond Sven Leyffer (with help from Pietro Belotti, Christian Kirches, Jeff Linderoth, Jim Luedtke, and Ashutosh Mahajan) August 30, 2016 To my wife Gwen my parents Inge and Werner; and my teacher and mentor Roger. This manuscript has been created by the UChicago Argonne, LLC, Operator of Argonne National Laboratory (“Argonne”) under Contract No. DE-AC02-06CH11357 with the U.S. Department of Energy. The U.S. Government retains for itself, and others acting on its behalf, a paid-up, nonexclusive, irrevocable worldwide license in said article to reproduce, prepare derivative works, distribute copies to the public, and perform publicly and display publicly, by or on behalf of the Government. This work was supported by the Office of Advanced Scientific Computing Research, Office of Science, U.S. Department of Energy, under Contract DE-AC02-06CH11357. ii Contents I Introduction, Applications, and Modeling1 1 Introduction to Optimization3 1.1 Objective Function and Constraints...............................3 1.2 Classification of Optimization Problems............................4 1.2.1 Classification by Constraint Type...........................4 1.2.2 Classification by Variable Type............................5 1.2.3 Classification by Functional Forms..........................6 1.3 A First Optimization Example.................................6 1.4 Course Outline.........................................7 1.5 Exercises............................................7 2 Applications of Optimization9 2.1 Power-System Engineering: Electrical Transmission Planning................9 2.1.1 Transmission Planning Formulation.......................... 10 2.2 Other Power Systems Applications............................... 11 2.2.1 The Power-Flow Equations and Network Expansion................. 11 2.2.2 Blackout Prevention in National Power Grid...................... 12 2.2.3 Optimal Unit Commitment for Power-Grid.....................
    [Show full text]
  • Tutorials on Advanced Optimization Methods
    Wei Wei, Tsinghua University Tutorials on Advanced Optimization Methods July 19, 2020 Springer Tutorials on Advanced Optimization Methods Wei Wei, Tsinghua University This material is the appendix part of my book collaborated with Professor Jianhui Wang at Southern Methodist University: Wei Wei, Jianhui Wang. Modeling and Optimization of Interdependent Energy Infrastructures. Springer Nature Switzerland, 2020. https://link.springer.com/book/10.1007%2F978-3-030-25958-7 This material provides thorough tutorials on some optimization techniques frequently used in various engineering disciplines, including Convex optimization | Linearization technique and mixed-integer linear programming | Robust optimization | Equilibrium/game problems | It discusses how to reformulate a difficult (non-convex, multi-agent, min- max) problem to a solver-compatible form (semidefinite program, mixed- integer linear program) via convexification, linearization, and decomposition, so the original problem can be reliably solved by commercial/open-source software. Fundamental algorithms (simplex algorithm, interior-point algo- rithm) are not the main focus. This material is a good reference for self-learners who have basic knowledge in linear algebra and linear programming. It is one of the main references for an optimization course taught at Tsinghua University. If you need teaching slides, please contact [email protected] or find the up-to-date contact information at https://sites.google.com/view/weiweipes/ 1 Contents A Basics of Linear and Conic Programs ..................... 7 A.1 Basic Notations . 8 A.1.1 Convex Sets . 8 A.1.2 Generalized Inequalities . 13 A.1.3 Dual Cones and Dual Generalized Inequalities . 14 A.1.4 Convex Function and Epigraph. 16 A.2 From Linear to Conic Program .
    [Show full text]