# Difference between revisions of "Interior-point method for NLP"

Cindyxchen (Talk | contribs) (→Application) |
Cindyxchen (Talk | contribs) (→Application) |
||

Line 37: | Line 37: | ||

Next, calculate slack variables and corresponding multipliers with: <br> | Next, calculate slack variables and corresponding multipliers with: <br> | ||

<math>\Delta s = -g(x) - s - \nabla g(x) \Delta x</math> <br> | <math>\Delta s = -g(x) - s - \nabla g(x) \Delta x</math> <br> | ||

− | <math>\Delta \lambda_g = -\lambda_g + [s^{-1}] * {\mu e - [\lambda_g] \Delta s}</math><br> | + | <math>\Delta \lambda_g = -\lambda_g + [s^{-1}] * {\mu e - [\lambda_g] \Delta s}</math><br><br> |

To calculate the perturbation factor, <math>\mu</math>, use primal-dual distances: <br> | To calculate the perturbation factor, <math>\mu</math>, use primal-dual distances: <br> | ||

Line 43: | Line 43: | ||

where <math>\sigma</math> defines the trajectory of the optimal solution, pdad is the primal-dual average distance, and niq accounts for the inequality constraints. | where <math>\sigma</math> defines the trajectory of the optimal solution, pdad is the primal-dual average distance, and niq accounts for the inequality constraints. | ||

− | <math>\sigma</math> ranges between 0 and 1. For the extreme conditions:<br> | + | <br><math>\sigma</math> ranges between 0 and 1. For the extreme conditions:<br> |

− | <math> | + | <math>\sigma = 0</math> corresponds to ''affine-scaling direction'' where the optimal point is obtained through non-perturbed solution of KKT<br> |

− | <math> | + | <math>\sigma = 1</math> corresponds to ''centralization direction'' where the non-optimal solution is found with a primal-dual distance equal to the initial value of <math>\mu</math><br> |

− | + | <br> In a conventional primal-dual IP method, a constant value is assigned to <math>\sigma</math> (usually close to 0.1) for the iterations. This results in a search direction where 90% is defined towards the optimal point and 10% is allocated to trajectory of centralization. | |

− | + | ||

− | + | ||

− | <br> In a conventional primal-dual IP method, | + | |

=Illustrative Example= | =Illustrative Example= |

## Revision as of 01:30, 7 June 2015

Author names: Cindy Chen

Steward: Dajun Yue and Fengqi You

## Contents |

# Introduction

The interior point (IP) method for nonlinear programming was pioneered by Anthony V. Fiacco and Garth P. McCormick in the early 1960s. The basis of IP method restricts the constraints into the objective function (duality) by creating a barrier function. This limits potential solutions to iterate in only the feasible region, resulting in a much more efficient algorithm with regards to time complexity.

# Algorithm

To ensure the program remains within the feasible region, a perturbation factor, , is added to "penalize" close approaches to the boundaries. This approach is analogous to the use of an invisible fence to keep dogs in an unfenced yard. As the dog moves closer to the boundaries, the more shock he will feel. In the case of the IP method, the amount of shock is determined by . A large value of gives the analytic center of the feasible region. As decreases and approaches 0, the optimal value is calculated by tracing out a central path. With small incremental decreases in during each iteration, a smooth curve is generated for the central path. This method is accurate, but time consuming and computationally intense. Instead, Newton's method is often used to approximate the central path for non-linear programming. Using one Newton step to estimate each decrease in for each iteration, a polynomial ordered time complexity is achieved, resulting in a small zig-zag central path and convergence to the optimal solution.

The logarithmic barrier function is based on the logarithmic interior function:

# Application

The IP method for NLP have been commonly used to solve Optimal Power Flow (OPF) problems, where a set of nonlinear equations are used to find the optimal solution of a power network in terms of speed and reliability. To solve these problems, the perturbation factor is used in addition to the typical Karush-Kuhn-Tucker (KKT) methods.

Starting with a general optimization problem:

Modify the KKT conditions by adding convergence properties with slack variables and the perturbation factor:

Solve the nonlinear equations iteratively by Newton's methods. First determine and with reduced linear equations.

Next, calculate slack variables and corresponding multipliers with:

To calculate the perturbation factor, , use primal-dual distances:

where defines the trajectory of the optimal solution, pdad is the primal-dual average distance, and niq accounts for the inequality constraints.

ranges between 0 and 1. For the extreme conditions:

corresponds to *affine-scaling direction* where the optimal point is obtained through non-perturbed solution of KKT

corresponds to *centralization direction* where the non-optimal solution is found with a primal-dual distance equal to the initial value of

In a conventional primal-dual IP method, a constant value is assigned to (usually close to 0.1) for the iterations. This results in a search direction where 90% is defined towards the optimal point and 10% is allocated to trajectory of centralization.

# Illustrative Example

# Conclusion

The IP method was later adapted for linear programming by Karmarkar in 1984. As a polynomial-time linear programming method, it solved complex linear problems 50 times faster than the simplex method. Multiple solvers utilize the IP method for non-linear programming, such as IPOPT and KNITRO, both of which were developed by IEMS professors at Northwestern University. Although successful, the IP method is no longer as popular since the creation of more competitive methods, such as sequential quadratic programming.

# References

1. Forsgren, Anders; Gill, Philip E.; Wright, Margaret H. "Interior Methods for Nonlinear Optimization." Society for Industrial Applied Mathematics Review. 44.4: 525-597. Link.

2. Shanno, David. "Who Invented the Interior Point Method?" Documenta Mathematica Extra Volume ISMP (2012): 55-64. Link
3. http://www.optimization-online.org/DB_FILE/2001/11/405.pdf
4. https://books.google.com/books?id=3ifNBQAAQBAJ&pg=PR8&lpg=PR8&dq=example+of+nlp+ip+method&source=bl&ots=aq8f36GTc-&sig=QYpK82WLq1dzNMTpKly9HBsSmEk&hl=en&sa=X&ei=xd1zVbeNE8n5yQTb_4HgBg&ved=0CCAQ6AEwAA#v=onepage&q=example%20of%20nlp%20ip%20method&f=false