Next Article in Journal
A Conceptual Probabilistic Framework for Annotation Aggregation of Citizen Science Data
Previous Article in Journal
Analytic Hierarchy Process with the Correlation Effect via WordNet
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Adaptive Proximal Bundle Method with Inexact Oracles for a Class of Nonconvex and Nonsmooth Composite Optimization

School of Mathematical Sciences, Dalian University of Technology, Dalian 116024, China
*
Author to whom correspondence should be addressed.
Mathematics 2021, 9(8), 874; https://doi.org/10.3390/math9080874
Submission received: 12 March 2021 / Revised: 7 April 2021 / Accepted: 9 April 2021 / Published: 15 April 2021
(This article belongs to the Section Mathematics and Computer Science)

Abstract

:
In this paper, an adaptive proximal bundle method is proposed for a class of nonconvex and nonsmooth composite problems with inexact information. The composite problems are the sum of a finite convex function with inexact information and a nonconvex function. For the nonconvex function, we design the convexification technique and ensure the linearization errors of its augment function to be nonnegative. Then, the sum of the convex function and the augment function is regarded as an approximate function to the primal problem. For the approximate function, we adopt a disaggregate strategy and regard the sum of cutting plane models of the convex function and the augment function as a cutting plane model for the approximate function. Then, we give the adaptive nonconvex proximal bundle method. Meanwhile, for the convex function with inexact information, we utilize the noise management strategy and update the proximal parameter to reduce the influence of inexact information. The method can obtain an approximate solution. Two polynomial functions and six DC problems are referred to in the numerical experiment. The preliminary numerical results show that our algorithm is effective and reliable.

1. Introduction

Consider the following optimization problem:
min x R N ψ ( x ) : = f ( x ) + h ( x ) ,
where f : R N R is a finite convex function and function h is not necessarily convex. So the primal function (1) may be nonconvex and note that functions f and h are not necessarily smooth. In this paper, we consider the case that function h is easy to evaluate while the function f is much harder to evaluate and is time consuming.
The sum of two functions can be found in many optimization problems such as the Lasso problem in image problems and the optimization problems in machine leaning and so on. Meanwhile, the composite function (1) can be obtained from other problems such as by splitting technique and nonlinear programming and so on. Concretely, in some cases, the function considered is much complicated and difficult to evaluate, to speed up calculations, dividing the primal function into two functions f and h with relatively simple structure is a possible way. Besides that, another way is the penalty strategy which transfers the constraint problem into an unconstrained problem with the sum form.
Note that the splitting type methods (see [1,2]) and the alternating type methods (see [3,4]) are two classes of important methods for composite optimization. When functions f and h have some special structures, the above methods may be effective and own better convergent results. However, if the functions do not own special structures or the functions are much complex and difficult to evaluate, the above methods may not be suitable for Problem (1). Meanwhile, in the alternating direction type methods, at least two subproblems need to be solved at each iteration, if one of the subproblems is difficult or hard to solve, the algorithms’ effectiveness may be slowed down. Then, it is meaningful to seek other suitable methods to deal with Problem (1) without special structures.
In recent years, many scholars have devoted time to seeking effective methods for nonconvex and nonsmooth optimization problems, see [5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20]. Usually, bundle methods are much effective for solving nonsmooth optimization problems [21,22,23,24,25,26]. Bundle methods use “black box” to compute the objective value and one of its subgradients (not special) at each iterations. Then, bundle techniques can be a class of possible effective ways to deal with the composite problem (1). At present, the proximal alternating linearization type methods (see [4,27,28,29]) are one effective kind of bundle methods for some composite problems. They need to solve two subproblems at each iteration and the data referred are usually exact. When inexact oracles are involved, the above methods may not be suitable and even be not convergent.
In this paper, we design a proximal bundle method for the inexact composite problem (1) and update the proximal parameter μ to reduce the effects of the inexact information. In the following, we first present some cases where inexact evaluations are generated.
Inexact evaluations are usually referred to in stochastic programming and Lagrangian relaxation [30,31]. It is at the very least impractical and is usually not even easy to solve those subproblems exactly. In bundle methods, inexact information are obtained from inexact oracles. There are different types of inexact oracles. In our work, we consider the Upper oracle (see (2a)–(2c) below). The Upper oracles may overestimate the corresponding function values and get negative linearization errors even if the primal function is convex.
In this paper, we focus on a class of nonconvex and nonsmooth composite problems with inexact data. The design and convergence analysis of bundle methods for nonconvex problems with inexact function and subgradient evaluations are quite involved and there are only a handful of papers for this topic, see [15,32,33,34,35].
In this paper, we present a proximal bundle method with a convexification technique and noise management strategy to solve composite problem (1). Concretely, we design “convexification” technique for the nonconvex function h to make sure the corresponding linearization error nonnegative and then we adopt the noise management strategy for inexact function f. If the error is “too ” large and the testing condition (22) is not satisfied, we decrease the value of the proximal parameter μ to obtain better iterative point. We summary our work as follows:
  • Firstly, we design the convexification technique for the nonconvex function h to make sure the linearization errors of the augment function ϕ n = h + η n 2 · 2 are nonnegative. Note that the the augment function ϕ n may not be a convex function, the nonnegative linearization errors can be obtained by the choices of the parameter η n . Similar strategy can also be seen in [10,11,15,16].
  • Then, the sum of functions f and ϕ n is regarded as an approximate function for the composite function (1). We construct respectively the cutting plane models for functions f and ϕ n and regard the sum of the two cutting plane models as the cutting plane model for the approximate function which may be a better cutting plane model. It should be noted that since inexact information are referred, the corresponding cutting plane model may not always be below function f.
  • Although we design the cutting plane models for functions f and φ n , respectively, only one quadratic programming (QP) subproblem needs to be solved at each iteration. By the construction of cutting plane models, we have that the QP subproblem is strictly convex and has unique solution which makes our algorithm more effective.
  • In the method, we construct the noise management step to deal with the inexact data for function values and subgradient values where the errors are only bounded and need not to vanish. If the noise error is “too” large and the testing condition (22) is not satisfied, we decrease the value of μ to obtain a better iterative point.
  • Two polynomial functions with twenty different dimensions and six DC (difference of convex) problems are referred to in the numerical experiment. In exact cases, our method is comparable with the method in [16] and has higher precision. In five different types of inexact oracles, we obtain that the exact case has the best performance and the performance of the vanishing error cases are generally better than that in the constant error cases. We also apply our method to six DC problems and the results show that our algorithm is effective and reliable.
The remainder of this paper is organized as follows. In Section 2, we review some variational analysis definitions and some preliminaries for proximal bundle method. Our proximal bundle method is given in Section 3. In Section 4, we present the convergent property of the algorithm. Some preliminary numerical testings are implemented in Section 5. In Section 6, we give some conclusions.

2. Preliminaries

In this section, we firstly review some concepts and definitions and then present some preliminaries for a proximal bundle method.

2.1. Preliminary

In this subsection, we recall concepts and results of variational analysis that will be used in the latter of the paper. The definition of lower- C k is given in Definition 10.29 in [36]. For completeness, we state it as follows:
Definition 1.
A function F : O R , where O is an open subset of R N , is said to be lower- C k on O , if on some neighborhood V of each x ^ O , there is a representation:
F ( x ) = max t T F t ( x ) ,
in which the function F t are of class C k on V and the index set T is a compact space such that F t ( x ) and all its partial derivatives through order k depend continuously not just on x but on ( t , x ) T × V .
If k = 2 , F is a lower- C 2 function. lower- C 2 function has a special relationship with convexity, see Theorem 10.33 in [36]. We state its equivalent statement as follow: A function F is lower- C 2 on an open set O R N if F is finite on O and for any x O , there exists a threshold λ ¯ 0 such that F + λ 2 · 2 is convex on an open neighborhood V of x for all λ λ ¯ . Specifically, if the function F is convex and finite-valued, then F is lower- C 2 with threshold λ ¯ = 0 .
For nonconvex function h, in the following, we consider that h is a lower- C 2 function. Since functions f and h are all not necessarily smooth, then the composite function (1) is also not necessarily smooth. For proper convex function f, the common subdifferential in convex analysis is used, which is denoted by f ( x ) at the point x R N (see in [37]). For proper and regular function h, we utilize the limiting subdifferential and also denote it by h ( x ) at point x (see in [36]). The definition of the limiting subdifferential is as follows:
h ( x ) : = lim sup y x , h ( y ) h ( x ) v | lim inf u y , u y h ( u ) h ( y ) v , u y u y 0 .
In nonsmooth analysis for convex function f, ε subdifferential at point x k is usually used, which is defined:
ε f ( x k ) : = g | f ( x ) f ( x k ) ε + g , x x k ,
where ε 0 . In the following, we present the inexact data for function f and give some preliminaries for proximal bundle method.

2.2. Inexact Information and Bundle Construction

Bundle methods are much effective for nonsmooth problems and always utilize “black box” to compute function value and one subgradient at each iterative point. It should be noted that the obtained subgradient is not special. Along the iterative progress, the generated points are divided into two styles: null points, used essentially to increase the model’s accuracy; serious points, significantly decreasing the objective function (and also improve the approximate model’s accuracy). The corresponding iterations are respectively called null steps and serious steps. In the literature, serious points are sometimes called as prox-center or stability center, denoted by x ^ k ( n ) . Then, the sequence { x ^ k ( n ) } is a subsequence of the sequence { x n } . For notation simplification, we write x ^ k = x ^ k ( n ) .
For function f, the oracle can only provide inexact function value and one subgradient value at each iteration, f ^ l : = f x l , g ^ f l : = g f x l , with unknown but bounded inaccuracy. That is, for x l R N , we have
f ^ l f ( x l ) θ l ,
f ( · ) f ^ l + g ^ f l , · x l ε l ,
Meanwhile
θ l θ ¯ , and ε l ε ¯ .
According to (2a)–(2c), we have the following relationships
g ^ f l θ l + ε l f ( x l ) , f ^ l [ f ( x l ) θ l , f ( x l ) + ε l ] .
Note that we only require the relationship θ l + ε l 0 holds for each index l. The bundle for function f can be noted as
B k f : = x l , f ^ l = f x l , g ^ f l f x l , l I n ,
Now we present the cutting plane model of function f by the inexact information:
φ ˜ n ( x ) = max l I n f ^ l + g ^ f l , x x l = f ^ k ¯ + max l I n e f , l k + g ^ f l , x x ^ k ,
where f ^ k ¯ = f x k ( n ) , x ^ k = x k ( n ) is the current stability center with index k ( n ) corresponding to its candidate point index and e f , l k is linearization errors, which measures the difference between cutting planes and the function value computed in the oracle for the current serious point, that is
e f , l k = f ^ k ¯ f ^ l g ^ f l , x ^ k x l .
Especially, note that the relation φ ˜ n ( x ) f ( x ) does not necessarily hold. So the linearization error e f , l k may be negative. In fact, by (2a), (2b) and (6), e f , l k satisfies that
e f , l k ( θ k ( n ) + ε l ) .
Meanwhile, cutting plane model φ ˜ n may overestimate f at some points. By (2b), the following inequality holds
φ ˜ n ( x ) f ( x ) + max l I n ε l .
For nonconvex function h, linearization errors may be nonnegative. In bundle methods, nonnegative linearization errors are much important for the convergence. For that we present a local “convexification” technique, similar techniques can also be seen in [15,16,38]. For the convexification parameter η n , its choice is as follows
η n η n m i n = max e h , l k 1 2 x l x ^ k 2 , with l I n , and x l x ^ k 2 0 ,
where I n denotes an index set, i.e., I n { 0 , 1 , 2 , } and e h , l k is the linearization error of h, which is defined as follows with h l = h ( x l ) , g h l h ( x l )
e h , l k : = h ( x ^ k ) h l g h l , x ^ k x l .
The bundle for function h can be noted as
B k h : = x l , h l = h ( x l ) , g h l h ( x l ) , l I n ,
Next, we introduce the augment function ϕ n of f, it is defined by
ϕ n ( x ) : = h ( x ) + η n 2 x x ^ k 2 , x R N ,
where η n η n min holds. Note that by the definition of ϕ n , we have h ( x ^ k ) = ϕ n ( x ^ k ) . By the calculation of subgradient, we have there exists g h l h ( x l ) satisfying
g ϕ l = g h l + η n ( x l x ^ k ) ϕ n ( x l ) .
Meanwhile, the linearization error of function ϕ n is
e ϕ , l k = ϕ n ( x ^ k ) ϕ n ( x l ) g ϕ l , x ^ k x l = h ( x ^ k ) h ( x l ) η n 2 x l x ^ k 2 g h l + η n ( x l x ^ k ) , x ^ k x l = e h , l k + η n 2 x l x ^ k 2 .
By the choice of the convexification parameter η n , we have e ϕ , l k 0 holds for all l I n .
In the following, we regard the sum of functions f and ϕ n as an approximate function for composite function (1):
Ψ n ( x ) = f ( x ) + ϕ n ( x ) .
For (13), we utilize the sum of cutting plane models of functions f and ϕ n as the cutting plane model. The cutting plane model of the augment function ϕ n is defined as follows
ϕ ˜ n ( x ) = max l I n ϕ n ( x l ) + g ϕ l , x x l .
Its equivalent form is
ϕ ˜ n ( x ) = ϕ n ( x ^ k ) + max l I n e ϕ , l k + g ϕ l , x x ^ k = h ( x ^ k ) + max l I n e h , l k + η n 2 x l x ^ k 2 + g h l + η n ( x l x ^ k ) , x x ^ k .
Then, the cutting plane model for the approximate function Ψ n is
Φ n ( x ) = φ ˜ n ( x ) + ϕ ˜ n ( x ) .
The new iterative point x n + 1 is given by the following QP (quadratic programming) subproblem
x n + 1 : = arg min x R N φ ˜ n ( x ) + ϕ ˜ n ( x ) + μ n 2 x x ^ k 2 = arg min x R N Φ n ( x ) + μ n 2 x x ^ k 2 ,
where μ n > 0 is the proximal parameter. Note that x n + 1 is the unique solution to (15) by strong convexity. The following lemma shows the relation between the current stationary center and the new generated point. Similar conclusion can also be seen in Lemma 10.8 in [39] which is for convex function. Here we omit the proof.
Lemma 1.
Let x n + 1 be the unique solution to the QP subproblem (15) and proximal parameter μ n > 0 . Then, we have
x n + 1 = x ^ k 1 μ n G n ,
where
G n : = l I n α 1 l g ^ f l + l I n α 2 l g h l + η n ( x l x ^ k ) .
Meanwhile α 1 = ( α 1 1 , , α 1 n ) and α 2 = ( α 2 1 , , α 2 n ) is the solution to
min α 1 , α 2 R + | I n | 1 2 μ n G n 2 + l I n α 1 l e f , l k + l I n α 2 l e ϕ , l k s . t . α 1 , α 2 S n : = z [ 0 , 1 ] | I n | : l I n z l = 1 .
In addition, the following relations hold:
(i) 
G n Φ n ( x n + 1 ) ;
(ii) 
f ^ k ¯ + ϕ n ( x ^ k ) Φ n ( x n + 1 ) = μ n x n + 1 x ^ k 2 + l I n α 1 l e f , l k + l I n α 2 l e ϕ , l k .
In the following, we present the concepts of the predict descent. Concretely, the predict descent for functions f , ϕ n , Ψ n are stated as follows
δ n + 1 f = f ^ k ¯ φ ˜ n ( x n + 1 ) , δ n + 1 ϕ = h ( x ^ k ) + η n 2 x n + 1 x ^ k 2 ϕ ˜ n ( x n + 1 ) , δ n + 1 = δ n + 1 f + δ n + 1 ϕ .
Note that the predict descent is much important for the convergence of bundle methods. By the definitions of functions ϕ n and ϕ ˜ n , we have δ n + 1 ϕ 0 . Since inexact data are referred to in the computation of function f, the nonnegativity of δ n + 1 f can not be guaranteed. Hence the nonnegativity of δ n + 1 can not be guaranteed too.
Next we give the aggregate linearization error which is defined by
e n + 1 : = i I n α 1 l e f , l k + l I n α 2 l e ϕ , l k .
By the term (ii) in Lemma 1 and the definition of δ n + 1 in (18), the following relationship holds
δ n + 1 = G n 2 μ n + η n 2 x n + 1 x ^ k 2 + e n + 1 = R n + μ n 2 x n + 1 x ^ k 2 + e n + 1 ,
where R n = μ n + η n . Next we define the aggregate linearization for approximate model Φ n :
Φ n l i n ( x ) : = Φ n ( x n + 1 ) + G n , x x n + 1 .
Then, the aggregate linearization error can be also expressed as the difference between the value of the oracle at the current serious point and the value of aggregate linearization Φ n l i n at that point, that is,
e n + 1 = f ^ k ¯ + h ( x ^ k ) Φ n l i n ( x ^ k ) .
Indeed, by the definition of Φ n l i n ( x ) , we have
Φ n l i n ( x ) = f ^ k ¯ + h ( x ^ k ) + G n , x x ^ k e n + 1 .
By the convexity of function Φ n , the inequality Φ n ( x ) Φ n l i n ( x ) holds. So for any x R N , we have
f ^ k ¯ + h ( x ^ k ) Φ n ( x ) G n , x x ^ k + e n + 1 .
By (8), the following inequality holds under the condition ϕ ˜ n ( x ) ϕ n ( x ) :
f ^ k ¯ + h ( x ^ k ) ψ ( x ) + η n 2 x x ^ k 2 + max l I n ε l G n , x x ^ k + e n + 1 .
Note that the condition ϕ ˜ n ( x ) ϕ n ( x ) may not be hold if the convexification parameter η n is less that the threshold parameter ρ ¯ (the function ϕ n ( x ) may not be convex), but the choice of η n ensures the nonnegativity of e ϕ , l k for all l I n .
By the nonnegativity of e ϕ , l k and (7), the aggregate linearization error satisfies
e n + 1 θ k ( n ) + l I n α 1 l ε l θ ¯ + ε ¯ .
Using the fact that x n + 1 is the solution of the QP problem (15) and the definition of predict descent in (18), we have that
δ n + 1 μ n 2 x n + 1 x ^ k 2 φ ˜ n ( x ^ k ) + ϕ ˜ n ( x ^ k ) f ^ k ¯ ϕ n ( x ^ k ) η n 2 x n + 1 x ^ k 2 μ n 2 x n + 1 x ^ k 2 + η n 2 x n + 1 x ^ k 2 φ ˜ n ( x ^ k ) f ^ k ¯ = R n 2 x n + 1 x ^ k 2 φ ˜ n ( x ^ k ) f ^ k ¯ ,
where the second inequality follows from the nonnegativity of e ϕ , l k . By (5) and x = x ^ k , we have φ ˜ n ( x ^ k ) f ^ k ¯ = max l B n f e f , l k holds, Note that if only “small” errors have been introduced into the model Φ n , then it holds
δ n + 1 > η n 2 x n + 1 x ^ k 2 + μ n 2 x n + 1 x ^ k 2 = R n 2 x n + 1 x ^ k 2 .
Then, by (20) and (16), (22) has the following equivalent forms:
( 22 ) holds , if and only if G n 2 2 μ n > e n + 1 , ( 22 ) holds , if and only if δ n + 1 > G n 2 2 μ n + η n 2 x n + 1 x ^ k 2 .
Next, we present a optimality measure. Concretely, it is that
V n : = max { G n , e n + 1 } .
By the above discussions, we have
V n max 2 μ n δ n + 1 , δ n + 1 , if ( 22 ) holds , V n 2 μ n e n + 1 2 μ n ( θ ¯ + ε ¯ ) , otherwise .
From the above inequalities, the smaller μ n may lead to higher probability to make inequality (22) hold. Based on that, we will update the parameter μ n to reduce the effects of errors. In the next section, we will give our proximal bundle algorithm for the primal composite problem (1) with inexact information.

3. Algorithm

In this section, we present our adaptive bundle algorithm to composite problem (1) with inexact information. To handle inexact information, similar to [17], we introduce the noise management step. Concretely, when the condition (22) does not hold, μ n is reduced in order to make δ n + 2 > δ n + 1 and increase the probability of condition (22).
Algorithm 1 (Nonconvex Nonsmooth Adaptive Proximal Bundle Method with Inexact Information for a class of composite optimization)
Step 0 (Input and Initialization):
         Choose initial point x 0 R N , constants κ , m 1 0 , 1 , an unacceptable increase parameter M 0 > 0 , μ m a x > 0 , R 0 > 0 , τ > 1 , γ 1 and a stopping tolerance T o l 0 . Set noise management parameter NMP = 0 and x ^ 0 = x 0 . Set ( η 0 , μ 0 ) = ( 0 , R 0 ) . Call the black box to compute f x ^ 0 , g x ^ 0 0 , h ( x ^ 0 ) , g h , 0 0 . Set n = k = 0 .
Step 1 (Model generation and QP subproblem):
         Having the current proximal center x ^ k , the current bundles B n f and B n h with index set I n , and the current proximal parameter μ n and the convexification parameter η n . Having the current approximate models φ ˜ n ( x ) and ϕ ˜ n ( x ) . Compute the QP problem (15) to get the next iterative point x n + 1 and simplex multipliers ( α 1 , α 2 ) . Then, compute G n , δ n + 1 , e n + 1 and V n .
Step 2 (Stopping criterion):
         If V n T o l , then stop. Otherwise, go to Step 3.
Step 3 (Noise Management):
         If relationship (22) does not hold, set N M P = 1 , μ n + 1 = κ μ n , n : = n + 1 , go to Step 1; otherwise, set N M P = 0 and we call the noise is acceptable and go to Step 4.
Step 4 (Descent testing):
        Call the black box to compute ( f ^ n + 1 , g ^ f n + 1 ) and ( h n + 1 , g h n + 1 ) . Check the descent condition
f ^ k ¯ + h ( x ^ k ) f ^ n + 1 h n + 1 η n 2 x n + 1 x ^ k 2 m 1 δ n + 1 ,
if (25) does not hold, then declare a null step, and set k ( n + 1 ) = k ( n ) . If NMP = 0 , choose μ n + 1 [ γ μ n , μ m a x ] ; else if NMP = 1, take μ n + 1 = μ n . Update the bundle information and go to Step 5. Otherwise, declare a serious step. Set x ^ k + 1 = x n + 1 ,   NMP = 0 , f x ^ k + 1 = f x n + 1 , k ( n + 1 ) = k + 1 and choose μ n + 1 = μ n , update the bundle information and go to Step 5.
Step 5 (Update parameter):
        Apply the rule to compute η n + 1
η n + 1 = η n , if η n η n + 1 m i n , η n + 1 = τ η n + 1 m i n , if η n < η n + 1 m i n ,
where η n m i n is given by (9), written with n replaced by n + 1 .
Step 6 (Restart step):
          If ψ ( x n + 1 ) > ψ ( x ^ k ) + M 0 holds, then the objective increase is unacceptable; Restart the algorithm by setting
η 0 : = η n , μ 0 : = τ μ n , R 0 : = η 0 + μ 0 ,
x 0 : = x ^ k , k ( 0 ) : = 0 , i 0 : = 0 , I 0 : = { 0 } , n : = 0 ,
where i k is the index of serious points. Then, loop to Step 1; otherwise, increase k by 1 in the case of the serious step. In all cases, increase n by 1, and loop to Step 1.
Remark 1.
Note that in Algorithm 1, the update of elements in bundles are not stated clearly. For null step and serious step, the updating strategies are different. When a serious step occurs, the new generated point is regarded as a new proximal center and the corresponding linearization errors in the bundles all should be updated. When a null step emerges, the proximal center keeps unchanged and only the new generated information are added into the bundles to improve the model’s accuracy. As the iterations proceed, the elements in the bundles may be too large that reduces the efficiency of the algorithm. Then, the active technology (only the active element α 1 l and α 2 l are kept in the bundles) and the compression strategy can be adopted. For the compression strategy, the number of elements in the bundles can be at least two, the aggregate information and the new generated information. It should be noted that although the compression strategy does not impair the convergence of the algorithm, it may affect the model’s effectiveness if the number of elements in the bundles is too small.
In the following, we will focus on the analysis of Algorithm 1 which indicates the algorithm is well defined. If the algorithm loops forever, three situations may occur (the number of restart steps are finite, which can be see in Lemma 3 ):
  • an very large loop of noise management between Step 1 and Step 3, driving μ n 0 ;
  • a finite number of serious steps, followed by an very large number of null steps;
  • an very large number of serious steps.
Next, we firstly give the case of very large loop of noise management.
Lemma 2.
If an very large loop between Step 1 and Step 3 in Algorithm 1 occurs, then the optimal measure V n 0 .
Proof. 
Suppose an very large loop between Step 1 and Step 3 begins at iterative index l ¯ . According to the algorithm, this means that for all n l ¯ , neither the proximal center x ^ k ( n ) = x ^ k ( l ¯ ) nor the approximate models φ ˜ n , ϕ ˜ n , Φ n change. Hence, when solving sequentially the QP optimization problem (15), only parameter μ n is updated. By the strategy for μ n , we have μ n = κ n l ¯ μ l ¯ , then it holds μ n 0 as n by κ ( 0 , 1 ) . Using (24), we have
0 V n 2 μ n ( θ ¯ + ε ¯ ) 0 , μ n 0 when n .
Then, the proof is completed. □
Note that if very large noise management steps happen, there is finite number of update for the convexification parameter η n . Then, η n eventually is bounded. Before the last two cases, we show that there is only finite number of restart steps in Algorithm 1. For that, we make an assumption, which can also be founded in [16].
Assumption 1.
The following level set T : = { x R N : ψ ( x ) ψ ( x ^ 0 ) + M 0 } is nonempty and compact.
By the definition of lower- C 2 , the compactness of set T and the finite covering theorem, there exists a threshold ρ ¯ such that for all η ρ ¯ , the augmented function h ( x ) + η x x ^ k 2 / 2 is convex for x , x ^ k T .
The compactness of T allows us to find Lipschitz constants for functions f and h, named L f and L h respectively (by lower- C 2 function’s local lipschitz property and the finite covering theorem). The following lemma indicates that the restart step in Algorithm 1 is finite.
Lemma 3.
Suppose only finite number of the noise management steps occur, Assumption 1 holds and consider the sequence of iterative points { x n } generated by Algorithm 1. The index l k I n denotes the current proximal center index, then there can be only a finite number of restart steps in Algorithm 1. Hence, eventually the sequence { x ^ k } is entirely in T .
Proof. 
Firstly, new iterative point x n + 1 is well defined by the strong convexity of QP subproblems (15). As functions f and h are lipschitz continuous on the level set T and their lipschitz constants are respective L f and L h , ψ ( x ) is also lipschitz continuous in the compact set T and one of its lipschitz constants is L : = L f + L h . By the lipschitz continuity of ψ , there exists ϵ > 0 such that for any x ˜ { x : ψ ( x ) ψ ( x ^ 0 ) } , the open set B ϵ ( x ˜ ) is contained in compact set T (indeed, the choice of ϵ = M 0 / L suffices). Note that:
x n + 1 = p μ n ( φ ˜ n + ϕ ˜ n ) ( x ^ k ) = arg min x ( φ ˜ n + ϕ ˜ n ) ( x ) + μ n 2 x x ^ k 2 x : ( φ ˜ n + ϕ ˜ n ) ( x ) + μ n 2 x x ^ k 2 ( φ ˜ n + ϕ ˜ n ) ( x ^ k ) x : ( φ ˜ n + ϕ ˜ n ) ( x ^ k ) + g l k , x x ^ k + μ n 2 x x ^ k 2 ( φ ˜ n + ϕ ˜ n ) ( x ^ k ) x : g l k x x ^ k + μ n 2 x x ^ k 2 0 x : x x ^ k 2 L μ n ,
where l k I n , and g l k ( φ ˜ n + ϕ ˜ n ) ( x ^ k ) . It also holds g l k ψ ( x ^ k ) , then g l k L . In Algorithm 1, μ n increases when the restart steps and the null steps with N M P = 0 happen, eventually proximal parameter μ n becomes large enough that the relationship 2 L μ n < ϵ holds. Noting that ψ ( x ^ k ) ψ ( x ^ 0 ) for any new serious point x ^ k generated in Algorithm 1 completes the proof. □
Next, we focus on the update of convexification parameter η n . The following lemma shows η n eventually keeps unchanged.
Lemma 4.
Suppose there is a finite number of the noise management steps and Assumption 1 holds. Then, there exists an iteration index n ¯ such that for all n n ¯ , the convexification parameter η n stabilizes, i.e., η n = η ¯ . Moreover, if η ¯ ρ ¯ holds, then for all n n ¯ , the augmented function ϕ n ( x ) = h ( x ) + η n 2 x x ^ k 2 is convex on the compact set T .
Proof. 
By the update of the convexification parameter η n in Algorithm 1, we have η n is nondecreasing: either η n + 1 = η n or η n + 1 = τ η n + 1 m i n > τ η n . Suppose the sequence { η n } does not stabilize, there must exist an very large number iterations such that the convexification parameter is increased by a factor of at least τ , but that is difficult and can lead to a contradiction. Since there exists an index n ˜ such that η n ˜ ρ ¯ and h ( x ) + η n ˜ 2 x x k ( n ) 2 is convex on the compact set T . For this iteration, we have e h , l k + η n ˜ x x k ( n ˜ ) 2 / 2 0 for all l I n ˜ (the linearization error for a convex is always nonnegative). Hence, η n ˜ max l I n ˜ e h , l k 1 2 x x k ( n ˜ ) 2 = η n ˜ + 1 m i n holds. Then, from the iteration onward, the convexification parameter will keep unchanged, i.e., η n ˜ + i = η n ˜ for all i 1 . Then, the sequence { η n } stabilizes. Specially, we choose η ¯ = η n ˜ . For n n ¯ , if η n = η ¯ ρ ¯ holds, then the augmented function ϕ n ( x ) in T is convex. □
The optimality measure in Algorithm 1 for inexact information is different with that in exact case. The following lemma justifies the choice of V n as optimality measure and indicates the accumulate point is an approximate solution of primal problem (1).
Lemma 5.
Suppose there is a finite number of the noise management steps and Assumption 1 holds. Suppose that for an very large subset of iterations I { 0 , 1 , } , the sequence { V λ } λ I 0 as I λ . Let { x ^ k ( λ ) } λ I be the corresponding subsequence of serious points and let x ^ a c c be an accumulation point. If η ¯ ρ ¯ holds, then x ^ a c c is an approximate solution to the problem (13) with
Ψ n ( x ^ a c c ) Ψ * + lim sup λ I θ k ( λ ) + lim sup λ I max l I n ε l ,
where Ψ * is the optimal value of function Ψ n .
Proof. 
Taking λ I large enough and by the definition of Ψ n , we have Ψ n ( x ^ k ( λ ) ) = f ( x ^ k ( λ ) ) + h ( x ^ k ( λ ) ) + η ¯ 2 x ^ k ( λ ) x ^ k ( λ ) 2 = f ( x ^ k ( λ ) ) + h ( x ^ k ( λ ) ) . Passing to the limit in inequality (21) and by η ¯ ρ ¯ , we have that
lim λ ( f ^ k ( λ ) + h ( x ^ k ( λ ) ) ) Ψ n ( x ) + lim sup λ max l I n ε l .
Moreover, for any cluster point x ^ a c c of { x ^ k ( λ ) } λ I , passing to the limit to (2a), we obtain that
Ψ n ( x ^ a c c ) lim sup λ θ k ( λ ) lim λ ( f ^ k ( λ ) + h ( x ^ k ( λ ) ) ) .
Rewriting the two inequalities above, the conclusion holds. □
Note that by the definition of function Ψ n and large enough index n, we have Ψ n ( x ) = ψ ( x ) + η ¯ 2 x x ^ a c c 2 and Ψ n ( x ^ a c c ) = ψ ( x ^ a c c ) . By the above discussions, we have ψ ( x ^ a c c ) ψ * + η ¯ 2 x * x ^ a c c 2 + lim sup λ I θ k ( λ ) + lim sup λ I max l I n ε l where x * and ψ * are local optimal solution and optimal value respectively. Then, x ^ a c c is an approximate solution to the primal problem (1). There are some corollaries from Lemma 5, which are much important for convergent analysis. We state it here but omit its proof.
Corollary 1. 
(i) if for some iteration index λ, η λ ρ ¯ holds and the optimality measure satisfies V λ = 0 , then the serious point x ^ k ( λ ) is an approximate solution to problem (13) with
Ψ n ( x ^ k ( λ ) ) Ψ * + θ k ( λ ) + max l I n ε l .
(ii) Suppose that the serious point sequence finally stabilizes, i.e., there exists a constant m such that for all λ m , we have x ^ k ( λ ) = x ^ k ( m ) . If η m ρ ¯ holds, then x ^ k ( m ) is an approximate solution to the problem (13) with
Ψ n ( x ^ k ( m ) ) Ψ * + θ k ( m ) + lim sup λ I max l I n ε l .
Note that if an very large loop of noise management happens after some iteration l ˜ and η l ˜ ρ ¯ , then the proximal center keeps unchanged. According to (29), the last serious point x ^ k ( l ˜ ) is an approximate solution to problem (13). From above lemmas and corollary, we have Algorithm 1 is well defined. In the next section, we will study separately the last two cases.

4. Convergence Theory

In this section, we study separately the last two cases above. The similar proof process can be found in [13,16,17,38,40]. In the following lemma, the second case, i.e., finite serious step with very large null steps, is considered.
Lemma 6.
Assumption 1 holds and suppose that, after some iteration n ¯ , η n ¯ ρ ¯ holds and there is no serious step declared in Algorithm 1. Then, there exists a subsequence { x n } n I n , such that V n 0 as I n n .
Proof. 
After some iteration n ¯ , no serious step is declared. Hence either noise management steps or null steps are done for n n ¯ . The serious point does not change, i.e., for all n n ¯ , x ^ k ( n ) = x ^ k ( n ¯ ) . For notational simplicity, we denote x ^ : = x ^ k ( n ¯ ) .
If the number of noise management steps is very large, we have that μ n 0 as I n n . The previous proof indicates that there exists a subsequence { x n + 1 } n I n such that V n 0 as I n n .
Suppose there is only a finite number of noise management steps. Since the number of the restart steps is finite, there exists some iterative index n ^ , such that (22) holds and only null steps occur for all n n ^ . Consequently, { μ n } is a nondecreasing sequence since μ n + 1 [ γ μ n , μ m a x ] for all n > n ^ . Meanwhile μ n μ ˜ μ m a x as n . In the following, we show δ n 0 . Let P n be the partial linearization of the the QP model (15), that is,
P n ( x ) : = Φ n l i n ( x ) + μ n 2 x x ^ 2 , x T .
By Lemma 10.10 in [39], we know that the rules to apply selection on the bundles guarantee that Φ n l i n ( x ) Φ n + 1 ( x ) holds. By the inequality (8), we have
P n ( x ^ ) = Φ n l i n ( x ^ ) Φ n + 1 ( x ^ ) ψ ( x ^ ) + η n 2 x ^ x ^ 2 + ε ¯ = ψ ( x ^ ) + ε ¯ .
Similarly, evaluating P n at x n + 2 , and using the fact that μ n + 1 γ μ n , we have
P n ( x n + 2 ) Φ n + 1 ( x n + 2 ) + μ n + 1 2 x n + 2 x ^ 2 = Φ n + 1 l i n ( x n + 2 ) G n + 1 , x n + 2 x n + 2 + μ n + 1 2 x n + 2 x ^ 2 = P n + 1 ( x n + 2 ) .
Furthermore, x n + 1 is the unique solution to (15), then P n ( x n + 1 ) = 0 . By Taylor’s expansion, we get
P n ( x ) = P n ( x n + 1 ) + μ n 2 x x n + 1 2 .
Hence the following two equalities hold
P n ( x n + 2 ) = P n ( x n + 1 ) + μ n 2 x n + 2 x n + 1 2 , P n ( x ^ ) = P n ( x n + 1 ) + μ n 2 x ^ x n + 1 2 .
Using the relationship above, the fact μ n μ n ^ and (30), we obtain
P n ( x n + 1 ) + μ n ^ 2 x n + 2 x n + 1 2 P n + 1 ( x n + 2 ) , P n ( x n + 1 ) + μ n 2 x ^ x n + 1 2 = P n ( x ^ ) ψ ( x ^ ) + ε ¯ .
Then, the sequence P n ( x n + 1 ) n n ^ is nondecreasing and bounded. Hence the limit exists:
P n ( x n + 1 ) P * < , and x n + 1 x n 0 , when n .
Then, the sequence of null steps { x n } is bounded. By (16) and { μ n } is bounded, we have { G n + 1 } is bounded (see [39]). Since for n > n ^ , the serious steps test is not satisfied, so by the definition of δ n + 1 , we have
f ^ n + 1 + h ( x n + 1 ) + η n x n + 1 x ^ 2 Φ n ( x n + 1 ) > ( 1 m 1 ) δ n + 1 .
Since f ^ n + 1 + h ( x n + 1 ) + η n 2 x n + 1 x ^ 2 Φ n + 1 ( x n + 2 ) + G n + 1 , x n + 1 x n + 2 holds, then by the definition of partial linearization and Ω : = f ^ n + 1 + h ( x n + 1 ) + η n x n + 1 x ^ 2 Φ n ( x n + 1 ) , we have
Ω Φ n + 1 ( x n + 2 ) Φ n ( x n + 1 ) + G n + 1 x n + 1 x n + 2 + η n 2 x n + 1 x ^ 2 = Φ n + 1 l i n ( x n + 2 ) Φ n l i n ( x n + 1 ) + G n + 1 x n + 1 x n + 2 + η n 2 x n + 1 x ^ 2 = P n + 1 ( x n + 2 ) P n ( x n + 1 ) + G n + 1 x n + 1 x n + 2 μ n + 1 2 x n + 2 x ^ 2 + μ n 2 x n + 1 x ^ 2 + η n 2 x n + 1 x ^ 2 .
By (32), Theorem 1 in [16] and μ n μ ˜ μ m a x , we have the right side of the above inequality vanishes as n . So Ω 0 holds as n . Hence
0 ( 1 m 1 ) δ n + 1 < f ^ n + 1 + h ( x n + 1 ) + η n x n + 1 x ^ 2 Φ n ( x n + 1 ) 0 .
Then, δ n + 1 0 holds as n . By (24), V n 0 holds as l ^ < n . □
Theorem 1.
Suppose Algorithm 1 loops forever and Assumption 1 holds. Assume there are finite number of serious steps and η ¯ ρ ¯ holds. Then, the last serious point x ^ is an approximate solution of problem (13) with
Ψ n ( x ^ ) Ψ n * + θ x ^ + lim sup n max l I n ε l .
Proof. 
(i) If very large noise management steps happens, Algorithm 1 finally stops and the conclusion holds. (ii) If very large null steps happen in Algorithm 1, by Lemma 6 and the second term of Corollary 1, the conclusion holds. □
The case of very large serious points generated in Algorithm 1 is considered in the next lemma. For notational convenience, we denote by K the subset of iterations which are chosen as serious points. Let x ^ k and x ^ k * be two successive serious points.
Lemma 7.
Suppose an very large sequence of serious steps is generated in Algorithm 1, Assumption 1 and η ¯ ρ ¯ hold. Then, the V n 0 as K n .
Proof. 
Since the serious points satisfy the descent condition (25), for two successive serious points x ^ k and x ^ k * , applying the descent condition inequality, we have
f ^ k ¯ + h ( x ^ k ) f ^ k ¯ * h ( x ^ k * ) η n k 2 x ^ k * x ^ k 2 m 1 δ n k * .
Rewriting the above inequality, we have
f ^ k ¯ + h ( x ^ k ) f ^ k ¯ * h ( x ^ k * ) m 1 δ n k * + η n k 2 x ^ k * x ^ k 2 > 0 .
Then, we have the sequence { f ^ k ¯ + h ( x ^ k ) } is strictly decreasing. By summing up this inequality for all serious steps, we deduce that
1 2 k K η k x ^ k * x ^ k 2 + m 1 k K δ k < , with δ k > 0 .
Hence, the above inequality deduces δ k 0 . Since (22) holds, then by (24), we have V k 0 as K k . □
Theorem 2.
Suppose Algorithm 1 loops forever, there are very large number of serious steps and η ¯ ρ ¯ holds. Then, any accumulation point x ^ a c c of serious points sequence { x ^ k } k K is an approximate solution of the problem (13) with
Ψ n ( x ^ a c c ) Ψ n * + lim sup K k θ x ^ k + lim sup K k max l I n ε l .
Proof. 
The conclusion follows from Lemma 5 and Lemma 7. □

5. Numerical Results

In this section, we consider two Ferrier polynomial functions (see [10,15,16]) and some DC (difference of convex) functions (see [41,42,43,44]). The section is divided into three parts. We code Algorithm 1 in MATLAB R2016 and run it on a PC with 2.10 GHZ CPU. Meanwhile, the Quadratic programming solver for Algorithm 1 in this paper is the Quadprog.m, which is available in the Optimization Toolbox in MATLAB. Note that the quadratic programming solver is not special and any solver for quadratic programming is accepted.

5.1. Two Polynomial Functions

In this subsection, we first present two polynomial functions which are in the form of the objective function (1). The two polynomial functions have the following forms:
ψ 1 ( x ) : = i = 1 N ω i ( x ) + x 2 2 , ψ 2 ( x ) : = i = 1 N ω i ( x ) + x 2 ,
where ω i ( x ) : R N R is defined by ω i ( x ) = ( i x i 2 2 x i ) + j = 1 n x j , where ∀ x R N and for each i = 1 , , N . It is clear that the above functions are nonconvex, nonsmooth, lower- C 2 and have 0 as their global minimizer. If we denote h ( x ) = i = 1 N ω i ( x ) and f ( x ) = x 2 / 2 or f ( x ) = x / 2 , the above functions are clear in the form (1). In the following, we adopt initial points x 0 = [ 1 , 1 , , 1 ] and consider the case N { 1 , 2 , , 19 , 20 } . The parameters in this subsection are set as follows: m 1 = 0.01 , κ = 0.9 , R 0 = 10 , M 0 = 10 , τ = 2 , γ = 2 , μ m a x = 10 20 and T o l = 10 6 . We also stop the algorithm when the iterative number is over 1000. First, we present the numerical results in Table 1 and Table 2 for the case θ ¯ = 0 and ε ¯ = 0 , that is the exact case, and compare them with the results in [16]. We call the algorithm in [16] as the RedistProx algorithm. Meanwhile, we adopt I n = { 0 , 1 , 2 , } . Note that in the exact case, we stop the progress when δ k T o l occurs, which is the same in [16]. In exact case, the linearization error e f , i k and e ϕ , i k are nonnegative, so the noise attenuation steps never happen. Then, in the numerical results for exact cases, the NNA is always zero, and we omit the NNA in the Table 1 and Table 2. The columns of Tables have the following meanings: Dim: the the tested problem dimension, NS: the number of serious steps, NNA: the number of noise attenuation steps, NF: the number of oracle function evaluations used, fk: the minimal function value found, δ k : the value of δ k at the final iteration, ψ * : the optimal function found, V k : the value of V n at the final iteration, RN: the number of restart steps, Nu: the number of null steps.
From Table 1 and Table 2, in most cases, our algorithm has a higher accuracy and compares with the RedistProx algorithm in [16]. For N = { 11 , 12 , 13 , 14 } , we adopt a larger initial model prox-parameter μ 0 (a smaller steplength), R 0 = 1000 . Meanwhile, the T o l and other parameters keep unchanged. For N { 15 , 16 , 17 , 18 , 19 , 20 } , We take T o l = 10 5 , R 0 = 1000 and keep other parameters unchanged. The numerical results for ψ 1 ( x ) and ψ 2 ( x ) are reported in Table 3.
From Table 3, Algorithm 1 can solve the two Ferrier polynomial functions in higher dimension successfully and have a reasonable and higher accuracy. The parameters μ and η eventually keep unchanged in exact case, which is illustrated by Figure 1.
Next, inexact data are referred and we consider the cases of random noises for function value and subgradient. We introduce two kinds of random noises in matlab codes. The first case is θ j = 0.01 n o r m r n d ( 0 , 0.1 ) , and ε j = 0.01 n o r m r d ( 0 , 0.1 , 1 , d i m ) . The code n o r m r n d ( 0 , 0.1 , 1 , d i m ) generates random numbers from the normal distribution with mean value 0, standard deviation 0.1 and scalars d i m and 1 are the row and column dimensions. We take m 1 = 0.01 , κ = 0.9 , γ = 2 , τ = 2 , M 0 = 5 and R 0 = 1000 in this random error case. The algorithm stops when V k T o l holds or the number of function evaluated is over 1000. The numerical results for this case are report in Table 4.
From Table 4, we have Algorithm 1 can solve ψ 1 ( x ) and ψ 2 ( x ) successfully for random errors in a reasonable accuracy. We also focus on the parameters η and μ in the implementation of Algorithm 1. Although the convexification parameter η n eventually keeps unchanged, the update strategy of the proximal parameter μ n is complicated. When the noise management step occurs, parameter μ n is decreasing to reduce the ’noise’ errors’ impact. When the unacceptable condition happens, we increase the parameter μ n to get a smaller step length. Figure 2 shows the variation of parameters η and μ along NF for ψ 1 ( x ) with N = 19 in normal random error case.
In the following, we introduce the error case of θ j = 0.01 u n i f r n d ( 0 , 1 ) and ε j = 0.01 u n i f r n d ( 0 , 1 , 1 , d i m ) . The code u n i f r n d ( 0 , 1 , 1 , d i m ) gives a similar case with the ‘normrd’ case. In this case, we adopt two T o l values and two initial proximal parameter values R 0 for different dimension of the variables. Concretely, we take m 1 = 0.01 , κ = 0.9 , τ = 2 , γ = 2 , M 0 = 5 and R 0 = 20 , T o l = 10 6 for N { 1 , 2 , , 8 } . For N { 9 , 10 , , 19 , 20 } , we take R 0 = 200 , T o l = 10 4 and the other parameters keep unchanged. We also take 1000 as the upper limit of function evaluated. The algorithm stops when V k T o l holds or the number of function evaluated is over 1000. The numerical results for this error case are reported in Table 5.
From Table 5, Algorithm 1 can solve ψ 1 ( x ) and ψ 2 ( x ) in a reasonable accuracy for the ‘unifrnd’ random error case. In this inexact case, we also illustrate the vary of η n and μ n in Figure 3 and Figure 4. The parameter η n is eventually stable. Although the vary of the proximal parameter μ n is complicate for inexact case, the hypothesis about the upper limits for μ n in the numerical experiment is reasonable, which are illustrated in the numerical testing.

5.2. Noise’s Impact on Solution Accturacy

The error have different types. To analysis the impact of different noise types, we test five different types of inexact oracles:
  • NNE (no noise error): in this case, θ ¯ = ε ¯ = 0 and θ i = ε i = 0 for all i in iterative process;
  • CNE (constant noise error): in this case, θ ¯ = ε ¯ = θ i = ε i = 0.01 , for all i in iterative process;
  • VNE (vanishing noise error): in this case, θ ¯ = ε ¯ = 0.01 and θ i = ε i = min { 0.01 , x i / 100 } for all i in iterative process;
  • CGNE (constant subgradient noise error): in this case, θ ¯ = θ i = 0 and ε ¯ = ε i = 0.01 for all i in iterative process;
  • VGNE (vanishing subgradient noise error): in this case, we set θ ¯ = θ i = 0 and ε ¯ = 0.01 , ε i = min { 0.01 , x i / 100 } for all i in iterative process;
In the numerical experiment, the parameters involved are the same with that in the ‘unifrnd’ error case. We present the numerical results of no noise error case (exact values case) in Table 6. In the test, for N = 2 , we take T o l = 10 5 . In exact case, the number of N N A is always 0, then we omit the columns of N N A in Table 6.
In the following, we present the numerical results of constant noise error case in Table 7. The parameters are same with that in the NNE case except that for ψ 1 ( x ) with N = 2 , 18 . For the case of ψ 1 ( x ) with N = 2 , we take T o l = 10 1 , R 0 = 200 and the other parameters keep unchanged. For the case of ψ 1 ( x ) with N = 18 , we take T o l = 10 0 , R 0 = 200 and the other parameters keep unchanged.
Next, Table 8 presents the results for the vanishing noise error case. The parameters keep unchanged except that for ψ 1 ( x ) with N = 2 and ψ 2 ( x ) with N = 8 . In the case of ψ 1 ( x ) with N = 2 , we take T O L = 10 1 and the other parameters keep unchanged. For the ψ 2 ( x ) with N = 8 case, we take R 0 = 10 and other parameters keep unchanged. It also should note the results for the case of ψ 2 ( x ) with N = 19 .
In the following, Table 9 presents the results for the constant subgradient noise error case (CGNE). The parameters keep unchanged except the case of ψ 1 ( x ) with N = 18 . In this case, we take T o l = 10 0 and R 0 = 500 . Table 10 presents the results for the vanishing subgradient noise error case (VGNE). The parameters keep unchanged except the cases of ψ 1 ( x ) with N = 2 , 7 , 14 , 18 . In these cases, we take T o l = 10 1 , R 0 = 200 and other parameters keep unchanged.
Next, we compare the numerical performance of different noise type. For comparing the performances, we adopt the formula Precision = | l o g 10 ( | f k | ) | and regard the NNE case as a benchmark for comparison. The cases of constant noise (CNE and CGNE) and exact form (NNE) are referred to in Figure 5. It is clear that the exact case has the best performance and Algorithm 1 can achieve a reasonable accuracy for the constant case. Meanwhile, the performance of CGNE case is better that than of CNE case. Similarly, Figure 6 reports the numerical performance for the vanishing cases (VNE and VGNE) and the exact form (NNE). From Figure 6, the performance of the VGNE case is comparable with that of the exact (NNE) case. Meanwhile, the performance of the vanishing error cases are generally better than that in the constant error cases.

5.3. Application to Some DC Problems

In this subsection, we test some unconstrained DC examples to illustrate the effectiveness of Algorithm 1. These examples come from [42,43,44]. Usually, the DC function has the form: ψ ( x ) = f ( x ) g ( x ) . If we take h ( x ) = g ( x ) , the problems are in the form of (1).
Problem 1.
Dimension: N = 2 ,
Component functions: f ( x ) = | x 1 1 | + 200 max 0 , | x 1 | x 2 ; g ( x ) = 100 | x 1 | x 2 ,
Relevant information: x 0 = ( 2 , 5 ) T , x * = ( 1 , 1 ) T , ψ * = 0 .
Problem 2.
Dimension: N = 4 ,
Component functions: f ( x ) = | x 1 1 | + 200 max 0 , | x 1 | x 2 + 180 max 0 , | x 3 | x 4 + x 3 1 + 10.1 | x 2 1 | + | x 4 1 | + 4.95 x 2 + x 4 2 ; g ( x ) = 100 | x 1 | x 2 + 90 | x 3 | x 4 + 4.95 x 2 x 4 ,
Relevant information: x 0 = ( 1 , 3 , 3 , 1 ) T , x * = ( 1 , 1 , 1 , 1 ) T , ψ * = 0 .
Problem 3.
Dimension: N = 2 , 5 , 10 ,
Component functions: f ( x ) = N max { | x i | : i = 1 , , N } , g ( x ) = 1 N | x i | ,
Relevant information: x 0 = ( i , i = 1 , , N / 2 , i , i = N / 2 + 1 , , N ) T , x * = ( x 1 * , , x N * ) T , x i * = a or x i * = a , a R , i = 1 , , N , ψ * = 0 .
Problem 4.
Dimension: N = 4 ,
Component functions: f ( x ) = x 1 2 + ( x 1 1 ) 2 + 2 ( x 1 2 ) 2 + ( x 1 3 ) 2 + 2 x 2 2 + ( x 2 1 ) 2 + 2 ( x 2 2 ) 2 + x 3 2 + ( x 3 1 ) 2 + 2 ( x 3 2 ) 2 + ( x 3 3 ) 2 + 2 x 4 2 + ( x 4 1 ) 2 + 2 ( x 4 2 ) 2 ;
g ( x ) = max { ( x 1 2 ) 2 + x 2 2 , ( x 3 2 ) 2 + x 4 2 } + max { ( x 1 2 ) 2 + ( x 2 1 ) 2 , ( x 3 2 ) 2 + ( x 4 1 ) 2 } + max { ( x 1 3 ) 2 + x 2 2 , ( x 3 3 ) 2 + x 4 2 } + max { x 1 2 + ( x 2 2 ) 2 , x 3 2 + ( x 4 2 ) 2 } + max { ( x 1 1 ) 2 + ( x 2 2 ) 2 , ( x 3 1 ) 2 + ( x 4 2 ) 2 } ,
Relevant information: x 0 = ( 3 , 1 , 3 , 1 ) T , x * = ( 7 / 3 , 1 / 3 , 0.5 , 2 ) T , ψ * = 11 / 6 ;
Problem 5.
Dimension: N = 2 , 5 ,
Component functions: f ( x ) = 20 max { | i = 1 N ( x i x i * ) t j i 1 | : j = 1 , 2 , , 20 } ,
g ( x ) = j = 1 20 | i = 1 N ( x i x i * ) t j i 1 | , t j = 0.05 j , j = 1 , 2 , , 20 ,
Relevant information: x 0 = ( 1 / N , 0 , , 0 ) T , x * = ( 1 / N , 1 / N , , 1 / N ) T , ψ * = 0 .
Problem 6.
Dimension: N = 2 , 4 ,
Component functions: f ( x ) = j = 1 100 | i = 1 N ( x i x i * ) t j i 1 | , t j = 0.01 j , j = 1 , 2 , , 100 ,
g ( x ) = max { | i = 1 N ( x i x i * ) t j i 1 | : j = 1 , 2 , , 100 }
Relevant information: x 0 = ( 0 , 0 , , 0 ) T , x * = ( 1 / N , 1 / N , , 1 / N ) T , ψ * = 0 .
For the effectiveness of Algorithm 1, we compare it with the TCM algorithm, NCVX algorithm and penalty NCVX algorithm in [42]. The values of parameters in Algorithm 1 are that: m 1 = 0.01 , κ = 0.9 , τ = 2 , γ = 2 , M 0 = 5 , R 0 = 10 and T o l = 10 3 . The results can be seen in Table 11. Meanwhile the ∗ in Table 11 means the obtained value is not optimal. From Table 11, we have that Algorithm 1 can successfully solve these DC problems, however the TCM algorithm cannot solve Problem 4, NCVX algorithm cannot solve Problems 1 and 4 and the penalty NCVX algorithm can not solve Problem 1. Then, Algorithm 1 is reliable. From the obtained function value and the number of function evaluations, Algorithm 1 is also effective.
For the above DC problems, we consider the vanishing noise error (VNE) case and the exact (NNE case. We also take 1000 as the upper limit of function evaluated. The algorithm stops when V k T o l holds or the number of function evaluated is over 1000. For the vanishing noise case, we set θ i = min { 0.01 , x x * / 100 } and ε i = min { 0.01 , x x * / 100 } except Problem 3. In Problem 3, the optimal solutions vary with the dimensions, then we set θ i = min { 0.01 , x 2 / 100 } and ε i = min { 0.01 , x 2 / 100 } . Table 12 presents the results for the vanishing noise error case (VNE) and the exact case (NNE). The column P r in Table 12 denotes the index of problems. We also compute the Precision. However it is not suitable since the optimal value is not 0. To deal with that, we take a k = ( f k f * ) / f * and Precision = | l o g 10 ( | a k | ) | . The numerical results are reported as follows.
From Table 12, Algorithm 1 can successfully solve the above DC problems in a higher precision and is effective to the VNE case in a reasonable accuracy. Then, Algorithm 1 is effective and reliable to the above DC problems. During the numerical experiment, we also focus on the variation of parameters η and μ , which are both bounded and the parameter η eventually keeps unchanged, which can be illustrated in Figure 7 and Figure 8.

6. Conclusions

In this paper, we consider a special class of nonconvex and nonsmooth composite problem. The problem is constituted by the sum of two functions, one is finite convex with inexact information and the other is a nonconvex function (lower- C 2 ). For the nonconvex function, we utilize the convexification technique and adjust the parameter dynamically to make sure the linearization errors of the augment function nonnegative and construct the corresponding cutting plane models. Then, we regard the sum of the convex function and the augment function as an approximate function. For the convex function with inexact information, we construct the cutting plane model by its inexact information and notice that the cutting plane model may not be below the convex function. Then, the sum of the cutting plane models of the convex function with inexact information and the augment function is regarded as a cutting plane model of the approximate function. After that, we design an adaptive proximal bundle method. Meanwhile, for the convex function with inexact information, we utilize the noise management strategy and update adaptively the proximal parameter to reduce the influence of inexact information. Two polynomial functions including five different inexact types and six DC problems with different dimension are referred to in the numerical experiment. The preliminary numerical results show our algorithm is interesting and reliable. Meanwhile, our method can also be applied to some constraint problems and stochastic programming in the future.

Author Contributions

Conceptualization, X.W. and L.P.; methodology, X.W.; software, X.W., Q.W. and M.Z.; validation, X.W., L.P. and M.Z.; formal analysis, X.W. and Q.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data can be found in the manuscript.

Acknowledgments

We are greatly indebted to three anonymous referees for many helpful comments.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Condat, L. A primal-dual splitting method for convex optimization involving Lipschitzian, proximable and linear composite terms. J. Optim. Theory Appl. 2013, 158, 460–479. [Google Scholar] [CrossRef] [Green Version]
  2. Li, G.Y.; Pong, T.K. Global convergence of splitting methods for nonconvex composite optimization. SIAM J. Optim. 2015, 25, 2434–2460. [Google Scholar] [CrossRef] [Green Version]
  3. Hong, M.; Luo, Z.Q. On the linear convergence of the alternating direction method of multipliers. Math. Program. 2017, 162, 165–199. [Google Scholar] [CrossRef] [Green Version]
  4. Li, D.; Pang, L.P.; Chen, S. A proximal alternating linearization method for nonconvex optimization problems. Optim. Method Softw. 2014, 29, 771–785. [Google Scholar] [CrossRef]
  5. Burke, J.V.; Lewis, A.S.; Overton, M.L. A robust gradient sampling algorithm for nonsmooth, nonconvex optimization. SIAM J. Optim. 2005, 15, 751–779. [Google Scholar] [CrossRef] [Green Version]
  6. Kiwiel, K.C. A method of centers with approximate subgradient linearizations for nonsmooth convex optimization. SIAM J. Optim. 2008, 18, 1467–1489. [Google Scholar] [CrossRef]
  7. Yuan, G.L.; Meng, Z.H.; Li, Y. A modified Hestenes and Stiefel conjugate gradient algorithm for large-scale nonsmooth minimizations and nonlinear equations. J. Optim. Theory Appl. 2016, 168, 129–152. [Google Scholar] [CrossRef]
  8. Yuan, G.L.; Sheng, Z. Nonsmooth Optimization Algorithms; Science Press: Beijing, China, 2017. [Google Scholar]
  9. Yuan, G.L.; Wei, Z.X.; Li, G. A modified Polak-Ribière-Polyak conjugate gradient algorithm for nonsmooth convex programs. J. Comput. Appl. Math. 2014, 255, 86–96. [Google Scholar] [CrossRef]
  10. Lv, J.; Pang, L.P.; Meng, F.F. A proximal bundle method for constrained nonsmooth nonconvex optimization with inexact information. J. Glob. Optim. 2018, 70, 517–549. [Google Scholar] [CrossRef]
  11. Yang, Y.; Pang, L.P.; Ma, X.F.; Shen, J. Constrained nonconvex nonsmooth optimization via proximal bundle method. J. Optim. Theory Appl. 2014, 163, 900–925. [Google Scholar] [CrossRef]
  12. Fuduli, A.; Gaudioso, M.; Giallombardo, G. Minimizing nonconvex nonsmooth functions via cutting planes and proximity control. SIAM J. Optim. 2004, 14, 743–756. [Google Scholar] [CrossRef]
  13. Sagastizábal, C. Composite proximal bundle method. Math. Program. 2013, 140, 189–233. [Google Scholar] [CrossRef] [Green Version]
  14. Mäkelä, M.M. Survey of bundle methods for nonsmooth optimization. Optim. Method Softw. 2002, 17, 1–29. [Google Scholar] [CrossRef]
  15. Hare, W.; Sagastizábal, C.; Solodov, M. A proximal bundle method for nonsmooth nonconvex functions with inexact information. Comput. Optim. Appl. 2016, 63, 1–28. [Google Scholar] [CrossRef]
  16. Sagastizábal, C.; Hare, W. A redistributed proximal bundle method for nonconvex optimization. SIAM J. Optim. 2010, 20, 2442–2473. [Google Scholar]
  17. Kiwiel, K.C. A proximal bundle method with approximate subgradient linearizations. SIAM J. Optim. 2006, 16, 1007–1023. [Google Scholar] [CrossRef] [Green Version]
  18. Kiwiel, K.C. A linearization algorithm for nonsmooth minimization. Math. Oper. Res. 1985, 10, 185–194. [Google Scholar] [CrossRef]
  19. Tang, C.M.; Liu, S.; Jian, J.B.; Li, J.L. A feasible SQP-GS algorithm for nonconvex, nonsmooth constrained optimization. Numer. Algorithms 2014, 65, 1–22. [Google Scholar] [CrossRef]
  20. Tang, C.M.; Jian, J.B. Strongly sub-feasible direction method for constrained optimization problems with nonsmooth objective functions. Eur. J. Oper. Res. 2012, 218, 28–37. [Google Scholar] [CrossRef]
  21. Hintermüller, M. A proximal bundle method based on approximate subgradients. Comput. Optim. Appl. 2001, 20, 245–266. [Google Scholar] [CrossRef]
  22. Lukšan, L.; Vlček, J. A bundle-Newton method for nonsmooth unconstrained minimization. Math. Program. 1998, 83, 373–391. [Google Scholar] [CrossRef] [Green Version]
  23. Solodov, M.V. On approximations with finite precision in bundle methods for nonsmooth optimization. J. Optim. Theory Appl. 2003, 119, 151–165. [Google Scholar] [CrossRef] [Green Version]
  24. Kiwiel, K.C. Restricted step and Levenberg-Marquardt techniques in proximal bundle methods for nonconvex nondifferentiable optimization. SIAM J. Optim. 1996, 6, 227–249. [Google Scholar] [CrossRef]
  25. Borghetti, A.; Frangioni, A.; Lacalandra, F.; Nucci, C.A. Lagrangian heuristics based on disaggregated bundle methods for hydrothermal unit commitment. IEEE Trans Power Syst. 2003, 18, 313–323. [Google Scholar] [CrossRef]
  26. Zhang, Y.; Gatsis, N.; Giannakis, G.B. Disaggregated bundle methods for distributed market clearing in power networks. In Proceedings of the 2013 IEEE Global Conference on Signal and Information Processing, Austin, TX, USA, 3–5 December 2013; pp. 835–838. [Google Scholar]
  27. Gao, H.; Lv, J.; Wang, X.L.; Pang, L.P. An alternating linearization bundle method for a class of nonconvex optimization problem with inexact information. J. Ind. Manag. Optim. 2021, 17, 805–825. [Google Scholar] [CrossRef] [Green Version]
  28. Goldfarb, D.; Ma, S.; Scheinberg, K. Fast alternating linearization methods for minimizing the sum of two convex functions. Math. Program. 2013, 141, 349–382. [Google Scholar] [CrossRef] [Green Version]
  29. Bolte, J.; Sabach, S.; Teboulle, M. Proximal alternating linearized minimization for nonconvex and nonsmooth problems. Math. Program. 2014, 146, 459–494. [Google Scholar] [CrossRef]
  30. De Oliveira, W.; Solodov, M. Bundle Methods for Inexact Data; Technical Report; 2018; Available online: http://pages.cs.wisc.edu/~solodov/wlomvs18iBundle.pdf (accessed on 1 April 2021).
  31. Fábián, C.I.; Wolf, C.; Koberstein, A.; Suhl, L. Risk-averse optimization in two-stage stochastic models: Computational aspects and a study. SIAM J. Optim. 2015, 25, 28–52. [Google Scholar] [CrossRef]
  32. Solodov, M.V.; Zavriev, S.K. Error stability properties of generalized gradient-type algorithms. J. Optim. Theory Appl. 1998, 98, 663–680. [Google Scholar] [CrossRef] [Green Version]
  33. De Oliveira, W.; Sagastizábal, C.; Lemaréchal, C. Convex proximal bundle methods in depth: A unified analysis for inexact oracles. Math. Program. 2014, 148, 241–277. [Google Scholar] [CrossRef]
  34. Hertlein, L.; Ulbrich, M. An inexact bundle algorithm for nonconvex nonsmooth minimization in Hilbert space. SIAM J. Optim. 2019, 57, 3137–3165. [Google Scholar] [CrossRef]
  35. Noll, D. Bundle Method for Non-Convex Minimization with Inexact Subgradients and Function Values. In Computational and Analytical Mathematics; Springer Proceedings in Mathematics; 2013; Volume 50, pp. 555–592. Available online: https://link.springer.com/chapter/10.1007/978-1-4614-7621-4_26 (accessed on 10 March 2021).
  36. Rockafellar, R.T.; Wets, R.J.B. Variational Analysis; Springer Science & Business Media: Berlin/Heidelberg, Germany, 1998. [Google Scholar]
  37. Hiriart-Urruty, J.B.; Lemaréchal, C. Convex Analysis and Minimization Algorithms; No. 305–306 in Grund. der math. Wiss; Springer: Berlin, Germany, 1993; Volume 2, Available online: https://core.ac.uk/display/44384992 (accessed on 10 March 2021).
  38. Hare, W.; Sagastizábal, C. Computing proximal points of nonconvex functions. Math. Program. 2009, 116, 221–258. [Google Scholar] [CrossRef]
  39. Bonnans, J.; Gilbert, J.; Lemaréchal, C.; Sagastizábal, C. Numerical Optimization: Theoretical and Practical Aspects, 2nd ed.; Springer: Berlin, Germany, 2006. [Google Scholar]
  40. Emiel, G.; Sagastizábal, C. Incremental-like bundle methods with application to energy planning. Comput. Optim. Appl. 2010, 46, 305–332. [Google Scholar] [CrossRef]
  41. Fuduli, A.; Gaudioso, M.; Giallombardo, G. A DC piecewise affine model and a bundling technique in nonconvex nonsmooth minimization. Optim. Method Softw. 2004, 19, 89–102. [Google Scholar] [CrossRef]
  42. Joki, K.; Bagirov, A.M.; Karmitsa, N.; Mäkelä, M.M. A proximal bundle method for nonsmooth DC optimization utilizing nonconvex cutting planes. J. Glob. Optim. 2017, 68, 501–535. [Google Scholar] [CrossRef]
  43. Bagirov, A. A method for minimization of quasidifferentiable functions. Optim. Method Softw. 2002, 17, 31–60. [Google Scholar] [CrossRef]
  44. Bagirov, A.M.; Ugon, J. Codifferential method for minimizing nonsmooth DC functions. J. Glob. Optim. 2011, 50, 3–22. [Google Scholar] [CrossRef]
Figure 1. Values of η and μ in function ψ 1 ( x ) with N = 17 in exact case.
Figure 1. Values of η and μ in function ψ 1 ( x ) with N = 17 in exact case.
Mathematics 09 00874 g001
Figure 2. The values of η and μ in function ψ 1 ( x ) with N = 19 in inexact case.
Figure 2. The values of η and μ in function ψ 1 ( x ) with N = 19 in inexact case.
Mathematics 09 00874 g002
Figure 3. Values of η and μ in function ψ 1 ( x ) with N = 14 in unifrnd error case.
Figure 3. Values of η and μ in function ψ 1 ( x ) with N = 14 in unifrnd error case.
Mathematics 09 00874 g003
Figure 4. Values of η and μ in function ψ 2 ( x ) with N = 6 in unifrnd error case.
Figure 4. Values of η and μ in function ψ 2 ( x ) with N = 6 in unifrnd error case.
Mathematics 09 00874 g004
Figure 5. Performance of Algorithm 1 for the NNE, CNE and CGNE cases.
Figure 5. Performance of Algorithm 1 for the NNE, CNE and CGNE cases.
Mathematics 09 00874 g005
Figure 6. Performance of Algorithm 1 for the NNE, VNE and VGNE cases.
Figure 6. Performance of Algorithm 1 for the NNE, VNE and VGNE cases.
Mathematics 09 00874 g006
Figure 7. The values of η and μ in Problem 3 with N = 5 in the VNE case.
Figure 7. The values of η and μ in Problem 3 with N = 5 in the VNE case.
Mathematics 09 00874 g007
Figure 8. The values of η and μ in Problem 6 with N = 4 in the VNE case.
Figure 8. The values of η and μ in Problem 6 with N = 4 in the VNE case.
Mathematics 09 00874 g008
Table 1. The numerical results of Algorithm 1 and RedistProx for ψ 1 ( x ) .
Table 1. The numerical results of Algorithm 1 and RedistProx for ψ 1 ( x ) .
Algorithm 1RedistProx
DimNSNF δ k fkNF δ k fk ψ *
128311.2844   ×   10 7 3.0702   ×   10 9 51.0000   ×   10 4 0.50000
246777.4453   ×   10 7 9.2727   ×   10 9 108.0019   ×   10 4 3.6623   ×   10 4 0
312185.3128   ×   10 7 5.1480   ×   10 8 122.5212   ×   10 1 5.2922   ×   10 4 0
411194.1736   ×   10 7 7.0451   ×   10 6 181.23599   ×   10 1 2.5722   ×   10 2 0
515188.9098   ×   10 7 5.4569   ×   10 2 263.04311   ×   10 1 5.1166   ×   10 2 0
6703755.9718   ×   10 7 1.7556   ×   10 7 602.0000   ×   10 5 0.0000000
729738.2491   ×   10 7 1.2567   ×   10 7 342.57493   ×   10 1 2.39281   ×   10 1 0
8401688.2662   ×   10 7 1.0969   ×   10 7 561.54684   ×   10 1 6.9823   ×   10 2 0
931549.0585   ×   10 7 3.7028   ×   10 7 1501.4000   ×   10 5 0.0000000
1041705.9340   ×   10 7 1.4399   ×   10 7 611.71962   ×   10 1 2.17352   ×   10 1 0
Table 2. The numerical results of Algorithm 1 and RedistProx for ψ 2 ( x ) .
Table 2. The numerical results of Algorithm 1 and RedistProx for ψ 2 ( x ) .
Algorithm 1RedistProx
DimNSNF δ k fkNF δ k fk ψ *
1049.8111   ×   10 9 0.5000130.00007.0000   ×   10 6 0
213167.3850   ×   10 7 3.6061   ×   10 9 160.00000.00000
312179.9438   ×   10 7 5.8183   ×   10 7 172.0000   ×   10 6 0.00000
411148.7577   ×   10 7 2.0964   ×   10 2 231.28998   ×   10 1 1.9105   ×   10 2 0
531513.7942   ×   10 7 2.5534   ×   10 7 313.74674   ×   10 1 3.51332   ×   10 1 0
632628.7508   ×   10 7 1.4844   ×   10 7 352.17732   ×   10 1 1.13835   ×   10 1 0
716224.6810   ×   10 7 4.5559   ×   10 2 411.82087   ×   10 1 1.20009   ×   10 1 0
8291586.7910   ×   10 7 2.2678   ×   10 7 418.6662   ×   10 2 1.0846000
941839.0456   ×   10 7 2.7211   ×   10 1 422.3830   ×   10 1 7.8253   ×   10 1 0
10471169.6527   ×   10 7 2.8546   ×   10 7 668.7404   ×   10 2 3.6327   ×   10 2 0
Table 3. The numerical results of Algorithm 1 for ψ 1 ( x ) and ψ 2 ( x ) .
Table 3. The numerical results of Algorithm 1 for ψ 1 ( x ) and ψ 2 ( x ) .
Algorithm 1 for ψ 1 ( x ) Algorithm 1 for ψ 2 ( x )
DimNSNF δ k fkNSNF δ k fk ψ *
111802794.7172   ×   10 7 1.5830   ×   10 7 1731878.4825   ×   10 7 1.2989   ×   10 7 0
121802077.0756   ×   10 7 3.5108   ×   10 7 1742379.9598   ×   10 7 4.0815   ×   10 7 0
131702148.1686   ×   10 7 3.0480   ×   10 7 1783639.7867   ×   10 7 6.7149   ×   10 7 0
141692388.8377   ×   10 7 4.1342   ×   10 7 1652469.1131   ×   10 7 1.8555   ×   10 7 0
151772319.5084   ×   10 6 1.2213   ×   10 6 1671747.7433   ×   10 6 3.8891   ×   10 2 0
161662105.0300   ×   10 6 2.0755   ×   10 6 1672126.5387   ×   10 6 3.1144   ×   10 6 0
171782168.5472   ×   10 6 2.8304   ×   10 6 1701857.4924   ×   10 6 2.9795   ×   10 6 0
181882599.8221   ×   10 6 2.6160   ×   10 6 1501955.0552   ×   10 6 3.6197   ×   10 6 0
191873896.7693   ×   10 6 2.6364   ×   10 6 1731919.0980   ×   10 6 2.0003   ×   10 2 0
201681837.7570   ×   10 6 4.46795   ×   10 2 2365719.8828   ×   10 6 3.0570   ×   10 6 0
Table 4. The numerical results of Algorithm 1 for ψ 1 ( x ) and ψ 2 ( x ) in normal case.
Table 4. The numerical results of Algorithm 1 for ψ 1 ( x ) and ψ 2 ( x ) in normal case.
Algorithm 1 for ψ 1 ( x ) Algorithm 1 for ψ 2 ( x )
DimNuNSNNANF V k fkNuNSNNANF V k fk
15101141309.0344   ×   10 7 7.0717   ×   10 4 1068709.6383   ×   10 7 0.49979
251171262499.2468   ×   10 7 3.8879   ×   10 4 0146822299.7514   ×   10 7 1.5986   ×   10 3
31891021939.1171   ×   10 7 3.4264   ×   10 4 1831332189.8973   ×   10 7 3.1147   ×   10 5
41591141759.5976   ×   10 7 6.5193   ×   10 4 161981619.2704   ×   10 7 3.3729   ×   10 5
5348871399.4254   ×   10 7 7.6518   ×   10 4 2481071589.9754   ×   10 7 7.9746   ×   10 4
61441121589.0774   ×   10 7 4.7392   ×   10 4 1431111569.7216   ×   10 7 7.3592   ×   10 4
7345581075.8879   ×   10 7 1.5267   ×   10 4 3411121579.4994   ×   10 7 5.6870   ×   10 4
8341981439.3921   ×   10 7 6.9636   ×   10 5 6391161629.4767   ×   10 7 1.4089   ×   10 3
94411211679.0501   ×   10 7 9.1557   ×   10 3 3361321729.7158   ×   10 7 1.6736   ×   10 2
105391141599.2367   ×   10 7 5.4923   ×   10 3 3361431839.6403   ×   10 7 9.3759   ×   10 3
115361061489.3682   ×   10 7 1.1568   ×   10 3 3381391818.4584   ×   10 7 3.0633   ×   10 2
1213391271809.2902   ×   10 7 9.2985   ×   10 3 3361561969.4762   ×   10 7 3.8106   ×   10 2
1315411161738.3068   ×   10 7 1.4001   ×   10 3 6451141669.7425   ×   10 7 2.8040   ×   10 3
141401101529.2798   ×   10 7 3.8884   ×   10 2 3381451879.5111   ×   10 7 1.0486   ×   10 2
153391441879.6793   ×   10 7 6.1932   ×   10 2 2351491879.6589   ×   10 7 4.3316   ×   10 2
1615481101748.5188   ×   10 7 1.7622   ×   10 3 21411271909.1613   ×   10 7 2.7225   ×   10 3
177411271768.9836   ×   10 7 6.3638   ×   10 2 6361672109.2330   ×   10 7 3.8989   ×   10 2
1822381482099.3322   ×   10 7 1.7141   ×   10 1 9371391869.8447   ×   10 7 5.9524   ×   10 2
1944642363459.9961   ×   10 7 2.3553   ×   10 3 1594797511649.5532   ×   10 7 2.2285   ×   10 3
2035531112009.7534   ×   10 7 9.3607   ×   10 3 31511302139.0064   ×   10 7 5.1422   ×   10 2
Table 5. The numerical results of Algorithm 1 for ψ 1 ( x ) and ψ 2 ( x ) in unifrnd error case.
Table 5. The numerical results of Algorithm 1 for ψ 1 ( x ) and ψ 2 ( x ) in unifrnd error case.
Algorithm 1 for ψ 1 ( x ) Algorithm 1 for ψ 2 ( x )
DimNuNSNNANF V k fkNuNSNNANF V k fk
14983979.0613   ×   10 7 −6.4794   ×   10 3 2019229.7755   ×   10 7 4.9060   ×   10 1
23171271489.1482   ×   10 7 −1.8758   ×   10 4 11879999.0223   ×   10 7 7.7941   ×   10 4
33111101259.0388   ×   10 7 1.7436   ×   10 7 21183979.5395   ×   10 7 −7.1758   ×   10 4
421179939.4813   ×   10 7 7.1079   ×   10 4 01081929.4233   ×   10 7 2.0590   ×   10 3
5110961089.4407   ×   10 7 −4.5471   ×   10 4 381021149.0188   ×   10 7 6.8412   ×   10 3
64111021189.9976   ×   10 7 7.3570   ×   10 3 31372899.4247   ×   10 7 6.0276   ×   10 3
76101121299.2399   ×   10 7 7.5234   ×   10 2 79851029.2723   ×   10 7 1.2366   ×   10 3
87161081329.7060   ×   10 7 1.4824   ×   10 2 6131021229.1341   ×   10 7 7.7913   ×   10 3
9538811259.3352   ×   10 5 5.2611   ×   10 4 2361081479.0509   ×   10 5 1.4101   ×   10 2
10736941389.3808   ×   10 5 2.7920   ×   10 3 2361071469.9270   ×   10 5 2.3615   ×   10 2
114361251669.3952   ×   10 5 6.2396   ×   10 4 2341421799.7926   ×   10 5 2.2681   ×   10 2
1232392493219.8977   ×   10 5 1.1030   ×   10 3 234961339.9074   ×   10 5 1.3646   ×   10 2
13736931379.0263   ×   10 5 3.8576   ×   10 2 6341031449.7738   ×   10 5 4.7721   ×   10 2
1431412313049.6781   ×   10 5 4.2488   ×   10 3 040831249.6485   ×   10 5 7.3474   ×   10 3
152381101519.5999   ×   10 5 6.1932   ×   10 2 7341041469.4630   ×   10 5 4.2409   ×   10 2
16537921358.6662   ×   10 5 4.9052   ×   10 2 6341061479.4022   ×   10 5 1.1794   ×   10 1
1724462052769.5651   ×   10 5 −8.0278   ×   10 4 4341161559.9456   ×   10 5 5.7203   ×   10 2
1832422172929.4322   ×   10 5 1.4177   ×   10 3 4331071459.0805   ×   10 5 5.2319   ×   10 2
1912381231749.7789   ×   10 5 1.1508   ×   10 1 5351261679.2005   ×   10 5 2.8864   ×   10 1
2024521181959.8336   ×   10 5 7.6241   ×   10 3 2144851519.3581   ×   10 5 9.4419   ×   10 2
Table 6. The numerical results of Algorithm 1 for ψ 1 ( x ) and ψ 2 ( x ) in NNE case.
Table 6. The numerical results of Algorithm 1 for ψ 1 ( x ) and ψ 2 ( x ) in NNE case.
Algorithm 1 for ψ 1 ( x ) Algorithm 1 for ψ 2 ( x )
DimNuNSNF V k fkNuNSNF V k fk
1561679.4215   ×   10 7 4.5882   ×   10 8 3043.4441   ×   10 9 0.5000
2216422599.6560   ×   10 7 3.7064   ×   10 8 722304.1491   ×   10 7 1.3116   ×   10 8
31919395.1917   ×   10 7 7.2127   ×   10 8 915255.2048   ×   10 7 8.5245   ×   10 9
4821309.6471   ×   10 7 6.1925   ×   10 8 515212.8717   ×   10 7 6.8710   ×   10 8
53423588.2690   ×   10 7 1.3192   ×   10 7 1614314.6146   ×   10 7 7.9665   ×   10 8
65226797.6472   ×   10 7 1.4489   ×   10 7 2018399.7512   ×   10 7 2.9449   ×   10 7
74329738.2491   ×   10 7 1.2567   ×   10 7 130321639.8973   ×   10 7 2.6066   ×   10 7
8166281956.2295   ×   10 7 8.9061   ×   10 8 6632996.8694   ×   10 7 7.3557   ×   10 8
964591249.4850   ×   10 5 2.1974   ×   10 5 767756.2759   ×   10 5 1.1151   ×   10 6
101155676.9491   ×   10 5 1.6440   ×   10 6 1456715.7784   ×   10 5 2.3212   ×   10 6
1171521247.3334   ×   10 5 2.9259   ×   10 5 854639.3601   ×   10 5 1.7999   ×   10 6
12180772585.6646   ×   10 5 4.7089   ×   10 6 2857869.4441   ×   10 5 1.4864   ×   10 6
1335761127.8602   ×   10 5 2.9328   ×   10 6 1851708.3528   ×   10 5 1.7982   ×   10 6
142569956.8130   ×   10 5 1.9605   ×   10 6 2869988.9934   ×   10 5 3.2136   ×   10 6
15111882009.1881   ×   10 5 2.6398   ×   10 6 72681416.7125   ×   10 5 6.2161   ×   10 5
1677821407.7113   ×   10 5 2.0920   ×   10 6 1960805.4267   ×   10 5 2.4310   ×   10 6
17140852266.3321   ×   10 5 4.4485   ×   10 6 2567936.5668   ×   10 5 2.6549   ×   10 6
186981398388.1746   ×   10 5 4.1455   ×   10 6 2556827.2642   ×   10 5 2.4928   ×   10 6
19971092078.5362   ×   10 5 2.1782   ×   10 6 2411253679.9203   ×   10 5 5.6158   ×   10 6
202411003425.8432   ×   10 5 6.6563   ×   10 3 851162029.3362   ×   10 5 3.3206   ×   10 6
Table 7. The numerical results of Algorithm 1 for ψ 1 ( x ) and ψ 2 ( x ) in CNE case.
Table 7. The numerical results of Algorithm 1 for ψ 1 ( x ) and ψ 2 ( x ) in CNE case.
Algorithm 1 for ψ 1 ( x ) Algorithm 1 for ψ 2 ( x )
DimNuNSNNANF V k fkNuNSNNANF V k fk
126110745.4925   ×   10 7 −9.9999   ×   10 3 2020239.2963   ×   10 7 0.4900
2 0 * 22002219.8078   ×   10 2 −9.1205   ×   10 3 212334799.6577   ×   10 7 −9.7816   ×   10 3
321362789.9421   ×   10 7 −9.9472   ×   10 3 11443599.6385   ×   10 7 −9.9870   ×   10 3
421242579.0680   ×   10 7 −9.3250   ×   10 3 21645649.0853   ×   10 7 −9.9870   ×   10 3
551510319.2336   ×   10 7 −9.5349   ×   10 3 31238549.9726   ×   10 7 −3.2581   ×   10 3
6162327678.4599   ×   10 7 −9.9969   ×   10 3 314981169.5355   ×   10 7 −5.3995   ×   10 4
716652282478.6648   ×   10 7 −9.9959   ×   10 3 89881069.6388   ×   10 7 −3.8179   ×   10 3
8112735749.6865   ×   10 7 −9.9902   ×   10 3 4131101289.8178   ×   10 7 4.4799   ×   10 3
910560739.7410   ×   10 5 −9.9957   ×   10 3 363521198.6710   ×   10 5 −9.5796   ×   10 3
10768401619.6288   ×   10 5 −9.9981   ×   10 3 859581269.7235   ×   10 5 −9.3007   ×   10 3
11476901178.3545   ×   10 5 −9.9963   ×   10 3 85531959.8103   ×   10 5 −9.9510   ×   10 3
1233810504447.3700   ×   10 5 −9.9979   ×   10 3 74443959.6506   ×   10 5 −9.9432   ×   10 3
13529301466.3101   ×   10 5 −9.9978   ×   10 3 649591159.8502   ×   10 5 −9.1591   ×   10 3
141738202567.8317   ×   10 5 −9.9973   ×   10 3 1250411049.3526   ×   10 5 −9.7982   ×   10 3
152871341349.1862   ×   10 5 −9.8835   ×   10 3 4269581709.4662   ×   10 5 −8.7053   ×   10 3
16347001057.4213   ×   10 5 −9.9973   ×   10 3 956871539.0649   ×   10 5 −5.9286   ×   10 3
171049502006.0123   ×   10 5 −9.9970   ×   10 3 1650691369.0611   ×   10 5 −7.4826   ×   10 3
18 3 * 620669.9386   ×   10 1 5.1193   ×   10 2 852741359.3028   ×   10 5 −1.9240   ×   10 3
199310902039.9699   ×   10 5 −9.9977   ×   10 3 12341041519.3323   ×   10 5 2.8573   ×   10 1
20447001155.8482   ×   10 5 −3.3485   ×   10 3 1976981949.3637   ×   10 5 −3.0299   ×   10 4
Table 8. The numerical results of Algorithm 1 for ψ 1 ( x ) and ψ 2 ( x ) in VNE case.
Table 8. The numerical results of Algorithm 1 for ψ 1 ( x ) and ψ 2 ( x ) in VNE case.
Algorithm 1 for ψ 1 ( x ) Algorithm 1 for ψ 2 ( x )
DimNuNSNNANF V k fkNuNSNNANF V k fk
13630672.2411   ×   10 7 3.7773   ×   10 9 1090929.4261   ×   10 7 0.4900
21 * 270299.8574   ×   10 2 9.6203   ×   10 4 14230384.1976   ×   10 7 2.1736   ×   10 8
34180238.8275   ×   10 7 1.3800   ×   10 8 5150214.5675   ×   10 7 6.2853   ×   10 8
46200275.7581   ×   10 7 3.5958   ×   10 8 16200373.7227   ×   10 7 4.9713   ×   10 8
545320785.6445   ×   10 7 1.0097   ×   10 7 16200379.0282   ×   10 7 1.6974   ×   10 7
611220348.8817   ×   10 7 1.0183   ×   10 7 34250606.8176   ×   10 7 6.3339   ×   10 8
7111745749.7074   ×   10 7 8.0881   ×   10 2 713301059.2437   ×   10 7 9.3392   ×   10 8
88844111445.7791   ×   10 7 2.4473   ×   10 7 3 * 161211419.7224   ×   10 7 3.5503   ×   10 2
9267291084.9732   ×   10 5 2.4391   ×   10 6 20590807.8092   ×   10 5 2.8594   ×   10 6
10728501589.9915   ×   10 5 2.2020   ×   10 6 14540698.7709   ×   10 5 4.8392   ×   10 6
11918001729.4444   ×   10 5 1.7418   ×   10 6 21640865.3167   ×   10 5 1.8802   ×   10 6
122529733536.2931   ×   10 5 3.9407   ×   10 6 967801758.7760   ×   10 5 3.1215   ×   10 6
13397561219.2734   ×   10 5 4.3186   ×   10 6 17510697.3807   ×   10 5 1.7909   ×   10 6
143919854959.6182   ×   10 5 5.7300   ×   10 6 22590829.4783   ×   10 5 3.1236   ×   10 6
157510501819.7263   ×   10 5 2.3624   ×   10 5 2908503763.9385   ×   10 5 4.0266   ×   10 6
1625550819.2934   ×   10 5 2.9491   ×   10 6 20610827.7500   ×   10 5 2.9207   ×   10 6
17628061496.7672   ×   10 5 5.1710   ×   10 6 35570939.9252   ×   10 5 1.7155   ×   10 6
1820313883506.5785   ×   10 5 4.5494   ×   10 6 25520786.6201   ×   10 5 1.8421   ×   10 6
19889621878.7263   ×   10 5 4.5004   ×   10 6 464011205673.6082   ×   10 12 * 1.7001   ×   10 3
201409122346.5071   ×   10 5 5.5017   ×   10 3 2394631819.3351   ×   10 5 7.6290   ×   10 4
Table 9. The numerical results of Algorithm 1 for ψ 1 ( x ) and ψ 2 ( x ) in CGNE case.
Table 9. The numerical results of Algorithm 1 for ψ 1 ( x ) and ψ 2 ( x ) in CGNE case.
Algorithm 1 for ψ 1 ( x ) Algorithm 1 for ψ 2 ( x )
DimNuNSNNANF V k fkNuNSNNANF V k fk
126110745.4925   ×   10 7 1.3472   ×   10 7 2020239.2963   ×   10 7 0.5000
221531903374.3225   ×   10 7 7.1521   ×   10 7 212334799.6577   ×   10 7 2.1843   ×   10 4
321362789.9421   ×   10 7 5.2650   ×   10 5 11443599.6385   ×   10 7 1.2983   ×   10 5
421242579.0680   ×   10 7 6.7504   ×   10 4 21645649.0853   ×   10 7 1.1792   ×   10 5
551510319.2336   ×   10 7 4.6506   ×   10 4 31238549.9726   ×   10 7 6.7418   ×   10 3
6162327678.4599   ×   10 7 3.1286   ×   10 6 314981169.5355   ×   10 7 9.4601   ×   10 3
716253232397.8402   ×   10 7 2.3823   ×   10 6 89881069.6388   ×   10 7 6.1821   ×   10 3
8112735749.6865   ×   10 7 9.8010   ×   10 6 4131101289.8178   ×   10 7 1.4480   ×   10 2
910566739.7410   ×   10 5 4.2731   ×   10 6 363521198.6710   ×   10 5 4.2042   ×   10 4
10768401619.6289   ×   10 5 1.9282   ×   10 6 859581269.7235   ×   10 5 6.9928   ×   10 4
11476901178.3546   ×   10 5 3.7396   ×   10 6 85531959.8103   ×   10 5 4.9014   ×   10 5
1236310404689.4169   ×   10 5 2.6927   ×   10 6 74443959.6506   ×   10 5 5.6826   ×   10 5
13529301466.3104   ×   10 5 2.1522   ×   10 6 649591159.8502   ×   10 5 8.4093   ×   10 4
141738202567.8317   ×   10 5 2.7201   ×   10 6 1250411049.3526   ×   10 5 2.0185   ×   10 5
152871341349.1862   ×   10 5 1.1654   ×   10 4 4269581709.4662   ×   10 5 1.2947   ×   10 3
16347001057.4213   ×   10 5 2.6541   ×   10 6 956871539.0649   ×   10 5 4.0714   ×   10 3
171049502006.0123   ×   10 5 3.0115   ×   10 3 1650691369.0611   ×   10 5 2.5174   ×   10 3
182 * 770808.0272   ×   10 1 3.3133   ×   10 2 852741359.3028   ×   10 5 8.0760   ×   10 3
197410901849.9172   ×   10 5 2.6683   ×   10 6 12341041519.3323   ×   10 5 2.9573   ×   10 1
20447001155.8482   ×   10 5 6.6515   ×   10 3 19761011979.8115   ×   10 5 9.6949   ×   10 3
Table 10. The numerical results of Algorithm 1 for ψ 1 ( x ) and ψ 2 ( x ) in VGNE case.
Table 10. The numerical results of Algorithm 1 for ψ 1 ( x ) and ψ 2 ( x ) in VGNE case.
Algorithm 1 for ψ 1 ( x ) Algorithm 1 for ψ 2 ( x )
DimNuNSNNANF V k fkNuNSNNANF V k fk
13630674.3452   ×   10 7 1.0116   ×   10 8 2020239.2964   ×   10 7 0.5000
227 * 29803263.3338   ×   10 2 1.1757   ×   10 3 182341839.7677   ×   10 7 2.7914   ×   10 6
36170244.6189   ×   10 7 4.8693   ×   10 8 2172227.6315   ×   10 7 1.3123   ×   10 7
42200233.4081   ×   10 7 6.7561   ×   10 8 31538579.4155   ×   10 7 9.1216   ×   10 6
532320659.6611   ×   10 7 1.3557   ×   10 7 51645678.0761   ×   10 7 2.2608   ×   10 5
616240413.8862   ×   10 7 9.8845   ×   10 8 52158859.2491   ×   10 7 2.4062   ×   10 5
76 * 570642.9199   ×   10 2 1.0333   ×   10 5 82068979.4552   ×   10 7 4.4226   ×   10 3
81304101725.8681   ×   10 7 4.3867   ×   10 8 715931169.8671   ×   10 7 1.0319   ×   10 2
9547401298.5412   ×   10 5 2.3582   ×   10 6 85419828.9252   ×   10 5 1.3088   ×   10 5
10917901716.4727   ×   10 5 3.4788   ×   10 6 75115747.2476   ×   10 5 1.2106   ×   10 5
11797501557.3459   ×   10 5 4.7386   ×   10 6 65436974.8921   ×   10 5 7.0049   ×   10 5
121729002634.2617   ×   10 5 3.9532   ×   10 6 970391198.9773   ×   10 5 1.3272   ×   10 4
13467801258.4436   ×   10 5 2.9852   ×   10 6 55040969.4999   ×   10 5 2.1125   ×   10 4
148 * 780876.3657   ×   10 2 7.5245   ×   10 6 144734969.2984   ×   10 5 7.1209   ×   10 5
152038002846.9332   ×   10 5 1.4201   ×   10 6 4980541847.2507   ×   10 5 3.7361   ×   10 4
16556301196.5930   ×   10 5 2.2500   ×   10 6 1052701339.2583   ×   10 5 2.3373   ×   10 3
17797901598.5136   ×   10 5 4.5443   ×   10 6 2456551367.3576   ×   10 5 6.2449   ×   10 4
1847 * 222162854.4363   ×   10 16 * 2.6364   ×   10 2 947841419.0335   ×   10 5 2.4064   ×   10 3
19548901446.6094   ×   10 5 2.5192   ×   10 6 308126685036.8994   ×   10 5 1.0272   ×   10 3
20979801967.8812   ×   10 5 6.6541   ×   10 3 1979721719.1718   ×   10 5 6.4603   ×   10 3
Table 11. The numerical results for Algorithm 1, TCM, NCVX and PNCVX algorithms in Problems 1–5.
Table 11. The numerical results for Algorithm 1, TCM, NCVX and PNCVX algorithms in Problems 1–5.
Algorithm 1TCMNCVXPNCVX
PrnNffkNffkNffkNffk ψ *
122047.4219   ×   10 10 5268.4453   ×   10 9 201.0000 * 481.0000 * 0
24696.4293   ×   10 7 5173.7104   ×   10 9 596.8183   ×   10 6 595.2088   ×   10 7 0
3262.0000   ×   10 11 1254.0552   ×   10 11 191.2800   ×   10 8 41.2500   ×   10 7 0
35303.7100   ×   10 6 3993.6698   ×   10 10 252.5204   ×   10 5 877.1731   ×   10 8 0
310911.4116   ×   10 4 8441.0639   ×   10 9 346.0636   ×   10 8 782.2092   ×   10 8 0
44211.83333079.2000 * 59.2000 * 341.833311/6
52325.7727   ×   10 6 1491.9922   ×   10 10 191.1842   ×   10 8 247.5230   ×   10 9 0
55124.0654   ×   10 7 11747.1262   ×   10 10 139.6573   ×   10 9 121.1546   ×   10 10 0
Table 12. The numerical results of Algorithm 1 for these DC problems in VNE and NNE cases.
Table 12. The numerical results of Algorithm 1 for these DC problems in VNE and NNE cases.
Algorithm 1 for VNE CaseAlgorithm 1 for NNE Case
PrDimNuNSNNANF V k fkPrecisionNuNSRSNF V k fkPrecision
12219902027.3309   ×   10 4 −9.8726   ×   10 3 2.0044320012041.8221   ×   10 6 7.4219   ×   10 10 9.1295
248680777.6724   ×   10 4 1.7527   ×   10 6 5.75635632691.5569   ×   10 5 6.4293   ×   10 7 6.1918
3217096.4421   ×   10 5 −4.9703   ×   10 3 2.301005063.2601   ×   10 8 2.0000   ×   10 11 10.6990
35307932706719.8576   ×   10 4 −8.7570   ×   10 3 2.05551280302.3067   ×   10 5 3.7122   ×   10 6 5.4304
3106267242982.6637   ×   10 4 1.1480   ×   10 1 0.94011890912.9760   ×   10 4 1.4116   ×   10 4 3.8503
442230268.2023   ×   10 4 1.82342.26611190218.8458   ×   10 4 1.83334.7404
5216086.2198   ×   10 4 1.6864   ×   10 4 3.77306250329.2682   ×   10 4 5.7727   ×   10 6 5.2386
555130198.0435   ×   10 4 −6.5385   ×   10 4 3.1845290127.5698   ×   10 4 4.0654   ×   10 7 6.3909
6225081.1607   ×   10 4 1.8586   ×   10 5 4.730824271.0840   ×   10 12 5.3857   ×   10 15 14.2688
6420201131541.3749   ×   10 4 −2.6406   ×   10 3 2.58504112161.3123   ×   10 4 1.9301   ×   10 7 6.7144
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Wang, X.; Pang, L.; Wu, Q.; Zhang, M. An Adaptive Proximal Bundle Method with Inexact Oracles for a Class of Nonconvex and Nonsmooth Composite Optimization. Mathematics 2021, 9, 874. https://doi.org/10.3390/math9080874

AMA Style

Wang X, Pang L, Wu Q, Zhang M. An Adaptive Proximal Bundle Method with Inexact Oracles for a Class of Nonconvex and Nonsmooth Composite Optimization. Mathematics. 2021; 9(8):874. https://doi.org/10.3390/math9080874

Chicago/Turabian Style

Wang, Xiaoliang, Liping Pang, Qi Wu, and Mingkun Zhang. 2021. "An Adaptive Proximal Bundle Method with Inexact Oracles for a Class of Nonconvex and Nonsmooth Composite Optimization" Mathematics 9, no. 8: 874. https://doi.org/10.3390/math9080874

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop