第五章Chapter5-信赖域方法

合集下载
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Lingfeng NIU, FEDS
Chapter V
7/63
Outline of the Trust-Region Approach
To obtain each step, we seek a solution of the subproblem 1 T minn mk (p) = fk + gk p + p T Bk p, p∈ 2 where ∆k > 0 is the trust-region radius. s.t. p ≤ ∆k , (3)
2
f (xk + tp)p,
(1)
where fk = f (xk ), gk = f (xk ) and t ∈ (0, 1).
Lingfeng NIU, FEDS
Chapter V
6/63
Outline of the Trust-Region Approach
In this chapter, we will assume that the model function mk that is used at each iteration xk is quadratic. Moreover mk is based on the Taylor-series expansion of f around xk , which is 1 T f (xk + p) = fk + gK p + p T 2
2
f (xk + tp)p,
(1)
where fk = f (xk ), gk = f (xk ) and t ∈ (0, 1). By using an approximation Bk to the Hessian in the second-order term, mk is defined as follows: 1 T mk (p) = fk + gk p + p T Bk p, 2 (2)
Lingfeng NIU, FEDS
Chapter V
9/63
Outline of the Trust-Region Approach
The size of the trust region is critical to the effectiveness of each step. If the region is too small, the algorithm misses an opportunity to take a substantial step that will move it much closer to the minimizer of the objective function. If too large, the minimizer of the model may be far from the minimizer of the objective function in the region, so we may have to reduce the size of the region and try again.
Lingfeng NIU, FEDS
Chapter V
3/63
Outline of the Trust-Region Approach
Line search methods and trust-region methods both generate steps with the help of a quadratic model of the objective function, but they use this model in different ways. Line search methods use it to generate a search direction, and then focus their efforts on fining a suitable step length α along this direction. Trust-region define a region around the current iterate within which they trust the model to be an adequate representation of the objective function, and then choose the step to be the approximate minimizer of the model in this region. In effect, they choose the direction and length of the step simultaneously. If a step is not acceptable, they reduce the size of the region and find a new minimizer. In general, the direction of the step changes whenever the size of the trust region is altered.
Lingfeng NIU, FEDS
Chapter V
1/63
Outline
Outline of the Trust-Region Approach Algorithms Based on the Cauchy Point Global Convergence Iterative Solution of the Subproblem Local Convergence of Trust-Region Newton Methods Other Enhancements Notes and References
Lingfeng NIU, FEDS
Chapter V
11/63
Outline of the Trust-Region Approach
Define the ratio ρk =
Lingfeng NIU, FEDS
Chapter V
10/63
Outline of the Trust-Region Approach
In practical algorithms, we choose the size of the region according to the performance of the algorithm during previous iterations. If the model is consistently reliable, producing good steps and accurately predicting the behavior of the objective function along these steps, the size of the trust region may be increased to allow longer, more ambitious, steps to be taken. A failed step is an indication that our model is an inadequate representation of the objective function over the current trust region. After such a step, we reduce the size of the region and try again.
Chapter V: Trust-Region Methods
Lingfeng NIU
Research Center on Fictitious Economy & Data Science, Graduate University of Chinese Academy of Sciences niulf@lsec.cc.ac.cn
where Bk is some symmetric matrix. The difference between mk (p) and f (xk + p) is O( p 2 ), which is small when p is small.
Lingfeng NIU, FEDS
CBiblioteka Baiduapter V
Lingfeng NIU, FEDS
Chapter V
2/63
Outline
Outline of the Trust-Region Approach Algorithms Based on the Cauchy Point Global Convergence Iterative Solution of the Subproblem Local Convergence of Trust-Region Newton Methods Other Enhancements Notes and References
Lingfeng NIU, FEDS
Chapter V
4/63
Trust-region and line search steps
Lingfeng NIU, FEDS
Chapter V
5/63
Outline of the Trust-Region Approach
In this chapter, we will assume that the model function mk that is used at each iteration xk is quadratic. Moreover mk is based on the Taylor-series expansion of f around xk , which is 1 T f (xk + p) = fk + gK p + p T 2
6/63
Outline of the Trust-Region Approach
When Bk = 2 f (xk ), the approximation error in the model function mk is O( p 2 ), so this model is especially accurate when p is small. This choice Bk = 2 f (xk ) leads to the trust-region Newton method. In the other part, we emphasis the generality of the trust-region approach by assuming little about Bk except symmetry and uniform boundedness.
Lingfeng NIU, FEDS
Chapter V
8/63
Outline of the Trust-Region Approach
The classification of trust-region methods are decided by the choice of Bk and norm for trust region in the model (3). For example, If Bk = 0 in (3) and define the trust region using the Euclidean norm, the trust-region method identifies with the steepest descent line search approach; If Bk is chosen to be the exact Hessian 2 fk , the resulting approach is called the trust-region Newton method; If Bk is defined by means of a quasi-Newton approximation, we obtain a trust-region quasi-Newton method.
相关文档
最新文档