• Keine Ergebnisse gefunden

Numerical Optimization

N/A
N/A
Protected

Academic year: 2022

Aktie "Numerical Optimization"

Copied!
2
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Numerical Optimization

Homework 4 Due 02.07.2014

Give your answers with logical and/or mathematical explanations. Hand-in your homework in the beginning of a lecture on due date. Late submissions will not be accepted.

Assigned points are shown in square brackets, which will be re-scaled so that the total homeworks points will be 40.

1.[5] Show that if f : Rn → R is strictly convex in Rn, then the curvature condition sTkyk >0, with sk =xk+1−xk and yk=∇f(xk+1)− ∇f(xk), holds for any xk+1 and xk inRn.

2.[5] Show that the second strong Wolfe condition (with 0 < c2 < 1) with a descent directionpk,

|∇f(xkkpk)Tpk| ≤c2|∇f(xk)Tpk| implies the curvature conditionsTkyk>0.

3.[5] Show that n nonzero conjugate vectors {p0, p1, . . . , pn−1}, pi ∈ Rn, with respect to a symmetric positive definite matrixA are linearly independent, i.e., if Pn−1

i=0 cipi = 0 for any c= (c0, c1, . . . , cn−1)T, thenc must be a zero vector.

4.[10] Implement the conjugate gradient algorithm (Algorithm 2 in Lecture 13), and use it to find Newton directions instead of using matrix inversion in your R code from homework 3 (minimization using Newton directions and backtracking linesearch). All previous parameters remain the same.

In this homework you use a high dimensional objective function provided ashighdim.R on the cource website instead of the Rosenbrock function. Before sourcing this file, you need to define variables n = 500 (dimension), and mode = 1 (Hessian with distinct eigenvalues) ormode= 2 (grouped eigenvalues).

• Start minimization from the zero vector.

• CG tolerance: 1e−20.

• Print messages from iterations as in hw 3, but adding the number of iterations taken in your CG routine (0 if CG is not used).

• Use the infinity norm (norminf) for checking any covergence (including optimality of solutions, the residual of CG, etc) replacing the two-norm functionnorm2.

• Measure the total elapsed time taken by your minimization code (you can use proc.time() Rfunction).

• Print and submit iteration messages and time measurements for all of the following cases:

1

(2)

– Newton’s method with matrix inversion for mode=1, – Newton’s method with matrix inversion for mode=2, – Newton’s method with CG for mode=1,

– Newton’s method with CG for mode=2.

Also, create and submit two plots:

• ninseq(100,1000, length.out= 5) on x-axis vs. computation time of all four cases on y-axis.

• n in seq(100,1000, length.out = 5) on x-axis vs. average CG iteration count per minimization step on y-axis.

Properly decorate the plots (xlab, ylab, legend, etc.) so that they will be understandable.

Does CG behave as you expect? From your results, can you guess what kind of function is inhighdim.R without seeing the code? Explain.

• Correct implementation: 5pts (print & submit your CG code too).

• Plots: 3pts

• Discussion: 2pts

2

Referenzen

ÄHNLICHE DOKUMENTE

The main goal of RAPO is to fit the energy decay of the simulation model to the measured one by adapting the absorption coefficients of the material parameters.. The

The article “Parallel optimization of the ray-tracing algorithm based on the HPM model”, written by Wang Jun-Feng, Ding Gang-Yi, Wang Yi-Ou, Li Yu-Gang, and Zhang Fu-Quan,

The proposed framework is endeavoring to redesign the execution of the RSA cryptosystem through a system that has to improve the speed on the RSA encryption side by using the

a) In the centralized mutual exclusion approach (see Lecture Section 7.2), the coordinator, upon receipt of a notice from a process that releases its exclusive access to the

“It would be impossible to attempt a description of the relative credit of merchants,” agreed William Prendergast in his 1906 book Credit and Its Uses .” 44 Printed forms,

1.2 Feasibility In Matroids Proof : First we prove that in a matroid the best-in-greedy algorithm finds an optimal solution for all weight functions.. This contradicts the

In other fields of statistical application we face the problem of finding the probability distribution corresponding to some given marginal distributions (Frechet [26]).

According to our proposed approach, during DDoS attack scenarios, most packets are generated by attackers, so the packet score value is higher than the packet score value during