scispace - formally typeset
Search or ask a question

Showing papers in "arXiv: Optimization and Control in 2001"


Posted Content
TL;DR: In this article, the authors compare algorithms for global optimization of polynomial functions in many variables and show that existing algebraic methods are dramatically outperformed by a relaxation technique, due to N.Z. Shor and the first author, which involves sums of squares and semidefinite programming.
Abstract: We compare algorithms for global optimization of polynomial functions in many variables. It is demonstrated that existing algebraic methods (Gr\"obner bases, resultants, homotopy methods) are dramatically outperformed by a relaxation technique, due to N.Z. Shor and the first author, which involves sums of squares and semidefinite programming. This opens up the possibility of using semidefinite programming relaxations arising from the Positivstellensatz for a wide range of computational problems in real algebraic geometry. This paper was presented at the Workshop on Algorithmic and Quantitative Aspects of Real Algebraic Geometry in Mathematics and Computer Science, held at DIMACS, Rutgers University, March 12-16, 2001.

77 citations


Posted Content
TL;DR: A general result is proved on the asymptotic stabilization of a system near a constant state on the boundary controllability of entropy weak solutions to hyperbolic systems of conservation laws.
Abstract: The paper is concerned with the boundary controllability of entropy weak solutions to hyperbolic systems of conservation laws. We prove a general result on the asymptotic stabilization of a system near a constant state. On the other hand, we give an example showing that exact controllability in finite time cannot be achieved, in general.

45 citations


Posted Content
TL;DR: The effects of finite-precision arithmetic in forming and solving the linear system that arises at each iteration of primal-dual interior-point algorithms for nonlinear programming are benign, provided that the iterates satisfy centrality and feasibility conditions of the type usually associated with path-following methods.
Abstract: We show that the effects of finite-precision arithmetic in forming and solving the linear system that arises at each iteration of primal-dual interior-point algorithms for nonlinear programming are benign, provided that the iterates satisfy centrality and feasibility conditions of the type usually associated with path-following methods. When we replace the standard assumption that the active constraint gradients are independent by the weaker Mangasarian-Fromovitz constraint qualification, rapid convergence usually is attainable, even when cancellation and roundoff errors occur during the calculations. In deriving our main results, we prove a key technical result about the size of the exact primal-dual step. This result can be used to modify existing analysis of primal-dual interior-point methods for convex programming, making it possible to extend the superlinear local convergence results to the nonconvex case.

35 citations


Posted Content
TL;DR: The existence of Gomory families is related to the Hilbert covering problems that arose from the conjectures of Sebö and their connections to commutative algebra are outlined at the end.
Abstract: The set of all group relaxations of an integer program contains certain special members called Gomory relaxations. A family of integer programs with a fixed coefficient matrix and cost vector but varying right hand sides is a Gomory family if every program in the family can be solved by one of its Gomory relaxations. In this paper, we characterize Gomory families. Every TDI system gives a Gomory family, and we construct Gomory families from matrices whose columns form a Hilbert basis for the cone they generate. The existence of Gomory families is related to the Hilbert covering problems that arose from the conjectures of Sebo. Connections to commutative algebra are outlined at the end.

26 citations


Posted Content
TL;DR: In this article, it was shown that any pointed, convex cone decomposes into a direct sum of irreducible components in a unique way, a result which can also be used to classify self-scaled barrier functions.
Abstract: Self-scaled barrier functions on self-scaled cones were introduced through a set of axioms in 1994 by Y.E. Nesterov and M.J. Todd as a tool for the construction of long-step interior point algorithms. This paper provides firm foundation for these objects by exhibiting their symmetry properties, their intimate ties with the symmetry groups of their domains of definition, and subsequently their decomposition into irreducible parts and algebraic classification theory. In a first part we recall the characterisation of the family of self-scaled cones as the set of symmetric cones and develop a primal-dual symmetric viewpoint on self-scaled barriers, results that were first discovered by the second author. We then show in a short, simple proof that any pointed, convex cone decomposes into a direct sum of irreducible components in a unique way, a result which can also be of independent interest. We then show that any self-scaled barrier function decomposes in an essentially unique way into a direct sum of self-scaled barriers defined on the irreducible components of the underlying symmetric cone. Finally, we present a complete algebraic classification of self-scaled barrier functions using the correspondence between symmetric cones and Euclidean Jordan algebras.

25 citations


Posted Content
TL;DR: In this paper, conditions under which a function F (t,x,u,ˆ0;ˆ) satisfices the relation dF dt = @F t + @H @t + @F @x ¢ @H 0, i @F 0, √ i √ √ 0 along the Pontryagin extremals of an optimal control problem, where H is the corresponding Hamiltonian.
Abstract: We give conditions under which a function F (t;x;u;ˆ0;ˆ) satisfles the relation dF dt = @F @t + @F @x ¢ @H @ˆ i @F @ˆ ¢ @H @x along the Pontryagin extremals (x(¢);u(¢);ˆ0;ˆ(¢)) of an optimal control problem, where H is the corresponding Hamiltonian The relation generalizes the well known fact that the equality dH dt = @H @t holds along the extremals of the problem, and that in the autonomous case H · constant As applications of the new relation, methods for obtaining conserved quantities along the Pontryagin extremals and for characterizing problems possessing given constants of the motion are obtained

14 citations


Posted Content
TL;DR: In this paper, it was shown that self-scaled barriers over irreducible symmetric cones are homothetic transformations of the universal barrier function, and a decomposition theorem for selfscaled barrier functions was proved for the special case of semidefinite programming.
Abstract: Self-scaled barrier functions are fundamental objects in the theory of interior-point methods for linear optimization over symmetric cones, of which linear and semidefinite programming are special cases. We are classifying all self-scaled barriers over irreducible symmetric cones and show that these functions are merely homothetic transformations of the universal barrier function. Together with a decomposition theorem for self-scaled barriers this concludes the algebraic classification theory of these functions. After introducing the reader to the concepts relevant to the problem and tracing the history of the subject, we start by deriving our result from first principles in the important special case of semidefinite programming. We then generalise these arguments to irreducible symmetric cones by invoking results from the theory of Euclidean Jordan algebras.

14 citations


Posted Content
TL;DR: This paper linearize the equations of motion of the spacecraft and show that they can be reduced effectively, in the case of a linear drag, to one second order linear differential equation for inverse square laws.
Abstract: In this paper we consider the fuel-optimal rendezvous between a satellite and a spacecraft in a central force field with a drag force that is linear in the velocity. In this general setting we linearize the equations of motion of the spacecraft and show that they can be reduced effectively, in the case of a linear drag, to one second order linear differential equation. We then specialize to the case of inverse square laws. Under certain simplifying assumptions a state-transition matrix can be found in terms of integrals. The work can then be placed in the context of various control models that have been developed in previouswork. PAPER WAS WITHDRAWN BY AUTHORS. IT will apprear in AIAA J. Guidance and Control.

8 citations


Posted Content
TL;DR: In this paper, a general small-gain theorem for ISS operators is presented, and the classical statement for ISS systems in state-space form is also recovered for incrementally stable systems.
Abstract: A general ISS-type small-gain result is presented. It specializes to a small-gain theorem for ISS operators, and it also recovers the classical statement for ISS systems in state-space form. In addition, we highlight applications to incrementally stable systems, detectable systems, and to interconnections of stable systems.

8 citations


Posted Content
TL;DR: In this article, the authors describe algorithms for two-stage stochastic linear programming with recourse and their implementation on a grid computing platform, in particular serial and asynchronous versions of the L-shaped method and a trust-region method.
Abstract: We describe algorithms for two-stage stochastic linear programming with recourse and their implementation on a grid computing platform. In particular, we examine serial and asynchronous versions of the L-shaped method and a trust-region method. The parallel platform of choice is the dynamic, heterogeneous, opportunistic platform provided by the Condor system. The algorithms are of master-worker type (with the workers being used to solve second-stage problems, and the MW runtime support library (which supports master-worker computations) is key to the implementation. Computational results are presented on large sample average approximations of problems from the literature.

7 citations


Posted Content
TL;DR: In this paper, the authors study an optimal control problem in Bolza form and consider the value function associated with this problem, and prove two verification theorems which ensure that, if a function $W$ satisfies some suitable weak continuity assumptions and a Hamilton-Jacobi-Bellman inequality outside a countably H^n$-rectifiable set, then it is lower or equal to value function.
Abstract: We study an optimal control problem in Bolza form and we consider the value function associated to this problem. We prove two verification theorems which ensure that, if a function $W$ satisfies some suitable weak continuity assumptions and a Hamilton-Jacobi-Bellman inequality outside a countably $\mathcal H^n$-rectifiable set, then it is lower or equal to the value function. These results can be used for optimal synthesis approach.

Posted Content
TL;DR: In this article, a variant of the IOSS property, using an integral norm to measure signals, as opposed to the standard supremum norm that appears in ISS theory, is discussed.
Abstract: A notion of detectability for nonlinear systems is discussed. Within the framework of ``input to state stability'' (ISS), a dual notion of ``output to state stability'' (OSS), and a more complete detectability notion, ``input-output to state stability'' (IOSS) have appeared in the literature. This note addresses a variant of the IOSS property, using an integral norm to measure signals, as opposed to the standard supremum norm that appears in ISS theory.

Posted Content
TL;DR: An improved upper bound for the VC-dimension of neural networks with polynomial activation functions is derived based on a result of Rojas on the number of connected components of a semi-algebraic set.
Abstract: In this note, we derive an improved upper bound for the VC-dimension of neural networks with polynomial activation functions This improved bound is based on a result of Rojas on the number of connected components of a semi-algebraic set

Posted Content
TL;DR: It is described in a rudimentary fashion how SVM plays the role of classifier in a mathematical setting and its application in the study of multiple SNP(single nucleotide polymorphism) variations is discussed.
Abstract: We describe in a rudimentary fashion how SVM(support vector machine) plays the role of classifier in a mathematical setting. We then discuss its application in the study of multiple SNP(single nucleotide polymorphism) variations. Also presented is a set of preliminary test results with clinical data.

Posted Content
Timothy Y. Chow, Philip J. Lin1
TL;DR: This work proves that a certain simple algorithm for uniform traffic is, in fact, a constant‐factor approximation algorithm, and demonstrates that known lower bounds for the general problem—in particular, the linear programming relaxation—are not within a constant factor of the optimum.
Abstract: The problem of minimizing the number of bidirectional SONET rings required to support a given traffic demand has been studied by several researchers. Here we study the related ``ring grooming problem'' of minimizing the number of add/drop locations instead of the number of rings; in a number of situations this is a better approximation to the true equipment cost. Our main result is a new lower bound for the case of uniform traffic. This allows us to prove that a certain simple algorithm for uniform traffic is in fact a constant-factor approximation algorithm, and it also demonstrates that known lower bounds for the general problem--in particular, the linear programming relaxation--are not within a constant factor of the optimum. We also show that our results for uniform traffic extend readily to the more practically important case of quasi-uniform traffic. Finally, we show that if the number of nodes on the ring is fixed, then ring grooming is solvable in polynomial time; however, whether ring grooming is fixed-parameter tractable is still an open question.

Posted Content
TL;DR: Iterated Local Search (ILS) as discussed by the authors is a general purpose metaheuristic for finding good solutions of combinatorial optimization problems, which is based on building a sequence of (locally optimal) solutions by perturbing the current solution and applying local search to that modified solution.
Abstract: This is a survey of "Iterated Local Search", a general purpose metaheuristic for finding good solutions of combinatorial optimization problems. It is based on building a sequence of (locally optimal) solutions by: (1) perturbing the current solution; (2) applying local search to that modified solution. At a high level, the method is simple, yet it allows for a detailed use of problem-specific properties. After giving a general framework, we cover the uses of Iterated Local Search on a number of well studied problems.

Posted Content
TL;DR: The notions of asymptotic amplitude for signals, and Cauchy gain for input/output systems, and an associated small-gain principle, are introduced and an application in biology (MAPK signaling) is worked out in detail.
Abstract: The notions of asymptotic amplitude for signals, and Cauchy gain for input/output systems, and an associated small-gain principle, are introduced. These concepts allow the consideration of systems with multiple, and possibly feedback-dependent, steady states. A Lyapunov-like characterization allows the computation of gains for state-space systems, and the formulation of sufficient conditions insuring the lack of oscillations and chaotic behaviors in a wide variety of cascades and feedback loops. An application in biology (MAPK signaling) is worked out in detail.

Posted Content
TL;DR: The new multiresolution network flow minimum cut algorithm is presented, which is especially efficient in identification of the maximum a posteriori (MAP) estimates of corrupted images.
Abstract: The network flow optimization approach is offered for restoration of grayscale and color images corrupted by noise. The Ising models are used as a statistical background of the proposed method. The new multiresolution network flow minimum cut algorithm, which is especially efficient in identification of the maximum a posteriori estimates of corrupted images, is presented. The algorithm is able to compute the MAP estimates of large size images and can be used in a concurrent mode. We also describe the efficient solutions of the problem of integer minimization of two energy functions for the Ising models of gray-scale and color images.

Posted Content
TL;DR: In this article, an expository article on recent developments in the theory of group relaxations in integer programming from an algebraic perspective is presented. But this article is restricted to integer programming.
Abstract: This is an expository article on recent developments in the theory of group relaxations in integer programming from an algebraic perspective.

Posted Content
TL;DR: A new first order system of partial differential equations is derived that encodes all compatibility conditions for the $\,\lambda$-equations and introduces a rank condition indicating when this is likely to be the case.
Abstract: We discuss matching control laws for underactuated systems. We previously showed that this class of matching control laws is completely charactarized by a linear system of first order partial differential equations for one set of variables followed by a linear system of first order PDEs for a second set of variables. Here we derive a new first order system of partial differential equations that encodes all compatibility conditions for the lambda-equations. We give four examples illustrating different features of matching control laws. The last example is a system with two unactuated degrees of freedom that admits only basic solutions to the matching equations. There are systems with many matching control laws where only basic solutions are potentially useful. We introduce a rank condition indicating when this is likely to be the case.