A simple approximated solution method for solving fractional trust region subproblems of nonlinearly equality constrained optimization

In this paper, a fractional model is used to solve nonlinearly constrained optimization problems. In order to solve the fractional trust region subproblems simply, we propose an approximated solution method by cyclically fixing the fractional coefficient part of the approximate function. The global convergence of the fractional trust region method is proved, and the numerical results show that the new algorithm is effective and stable.

There are many efficient methods to solve problem (1.1)-(1.2), and the trust region method is a very effective method (see [4][5][6][7][8][9][10][11][12][13]). In addition, the book of Conn, Gould, and Toint [14] is an excellent and comprehensive one on trust region methods. However, most of these methods use the quadratic model to approximate f (x). The sequential quadratic programming method for (1.1)-(1.2) computes a search direction by minimizing a quadratic model of the Lagrangian subject to the linearized constraints. That is, at the kth iteration, the following subproblem min s∈R n k (s) = g T k s + 1 2 s T B k s, (1.4) s.t. A T k s + C k = 0 (1.5) is solved to obtain a search direction s k , where x k is the current iterate point, g k = ∇f (x k ), B k is symmetric and an approximation to the Hessian ∇ xx L(x k , λ k ) of the Lagrangian of problem (1.1)-(1.2), A k = [∇c 1 (x k ), . . . , ∇c m (x k )] and C k = C(x k ). The constraint gradients ∇c i (x k ) are assumed to be linearly independent for all x k . However, if the objective function possesses high nonlinear property and the iterative point is far away from the minimum, the quadratic model could not approximate the original problem very well, which may lead to iteration proceeding slowly.
In 1980, Davidon [15] first proposed the collinear scaling of variables and conic model method for unconstrained optimization. The conic model is where a k ∈ R n is a horizontal vector. Then, Sorensen [16] published detailed results on a class of conic model methods and proved that a particular member of this class has the Qsuperlinear convergence. Many other scholars have also studied the trust region algorithm of the conic model (see [17,18]). The trial step of a trust region algorithm is usually obtained by solving a trust region subproblem. In our trust region subproblem, the trust region bound constraint is where k is the trust region radius at the kth iteration. It is easy to see that there is a possibility that the linearized constraints (1.5) may have no solutions in the trust region (1.7). To overcome this difficulty, we use a relaxed version of the linearized constraint, which was proposed by Byrd, Schnabel, and Schultz in [19]. In [20], Sun also used this relaxed version of the linearized constraint and proposed a conic trust region method for nonlinearly constrained optimization. That is, at the kth iteration, the trial step s k is computed by solving the following conic model trust region subproblem: where · refers to the Euclidean norm and θ k is a relaxation parameter. θ k ∈ (0, 1] is chosen such that the feasible set of (1.9) and (1.10) is not empty. Geometrically speaking, the role of θ k is to compress the feasible area of each constraints of (1.5) to the direction of origin (see [8,21]). The above conic model (1.8) has only one parameter a k and less degree of freedom, which affects the effect of the model approaching the objective function. Therefore, we consider selecting a fractional model with more parameters, which can make full use of the function and gradient information in the previous iteration and can approximate the original function well, thus obtaining a new method for solving the optimization problem. In [22], Zhu considered the unconstrained optimization problem and proposed a fractional model , (1.12) and horizontal vectors a k , b k , c k ∈ R n are bounded. The gradient of ψ k (s) is If b k = c k = 0, then ψ k (s) is reduced to the conic model. If a k = b k = c k = 0, then ψ k (s) is the quadratic model k (s). The fractional model is new and it is an extension to conic model φ k (s). It has more choice of parameter vectors and can make use of their function and gradient information. Based the new fractional model ψ k (s), a simplified fractional trust region subproblem 19) and the parameters a k , b k , c k were chosen such that (1.20) Subproblem (1.16)-(1.17) is solved only in quasi-Newton direction in [22]. Based on this, we study in depth the Newton point and the steepest descent point of the fractional trust region subproblem, so as to construct a simple dogleg method to solve the subproblem (see [23]). Numerical experiments show that the fractional model trust region quasi-Newton algorithm seems to be superior to the conic model trust region algorithm in terms of the number of iterations and the running time as the dimension of the optimization problem increases. For the linear equality constrained optimization problem, the null space technique is used to delete the linear equality constraint, and the fractional trust region method for solving the linear equality constrained optimization problem is proposed (see [24]). Now we use the fractional model to solve nonlinearly constrained optimization problems. In order to solve problem (1.1)-(1.2), we consider the following fractional trust region subproblem. That is, if the current iteration point is x k , then the trial step s k is computed by where ε 0 ∈ (0, 1). The purpose of adding constraint (1.23) is to guarantee that the objective function ψ k (s) is bounded in the trust region and this also increases the difficulty of calculation.
We know that the exact solution of the trust region subproblem is often difficult to obtain, so many approximate solution methods have been spawned. For example, the trust region method is often combined with dogleg method, conjugate gradient method, inexact line search method, alternate direction search method, and other methods to obtain approximate solutions of trust region subproblems. In this paper, we also consider an approximate solution method for the subproblem of the trust region. First, the null space technique is used to remove the linear equality constraints of the trust region subproblem; then the fractional model of the subproblem is reduced to a quadratic model by cyclically fixing the coefficient part; finally, the problem can be easily solved by searching in the descending direction to obtain an approximate solution to the subproblem.
In the global algorithm, we propose a quasi-Newton trust region method with a fractional model and prove the global convergence of the new algorithm. The numerical experiment shows that the new algorithm is effective and robust, especially for large-scale test problems.
The organization of this paper is as follows. In Sect. 2, the fractional trust region subproblem and an algorithm for solving the subproblem are presented. In Sect. 3, we propose a quasi-Newton method with a fractional model for nonlinearly equality constrained optimization and prove its convergence under some reasonable conditions. Numerical results are given in Sect. 4.
Throughout this paper, we use · for the 2-norm.

The algorithm of fractional trust region subproblem
In order to solve (1.21)-(1.24), firstly we consider removing constraint (1.23) by the same process of simplification as in [22]. Therefore, when the parameters a k , b k , c k satisfy (1.20) where then subproblem (1.21)-(1.24) can be rewritten as the following reduced subproblem: The null-space technique (see [20,25,26]) is an important technique for solving optimization problems with equality constraints. In the following, we show the method to eliminate constraint (1.22). Assume that A k has full column rank, and there exist an orthogonal matrix Q k and a nonsingular upper triangular matrix R k such that , and R (1) k ∈ R m×m . Then (1.22) can be rewritten as Therefore the feasible point for (1.22) can be presented by for any u ∈ R n-m , wherẽ and Q (2) k u lies in the null space of A k . We denote In order to ensure that s lies in the trust region, we choose θ k such that the norm ofs k is at most ι˜ k , where ι ∈ (0, 1) is a given constant. That is, Then the fractional trust region subproblem (2.2)-(2.4) becomes On the other hand, if s ≤˜ k , then from (2.5) we have Therefore, if u * is the solution of (2.13)-(2.14), then s * =s k + Q (2) k u * is the solution of (2.2)-(2.4), whereas if s * is the solution of (2.2)-(2.4), then u * = (Q (2) k ) T (s * -s k ) is the solution of (2.13)-(2.14).
In order to solve subproblem (2.13)-(2.14) by a simple method, we first fix the fractional part ofψ k (u) by letting u = 0 in h k (s(u)). At the same time, we set u = -τ ∇ψ k (0), where τ > 0, ∇ψ k (0) = 0. By direct computation, we know that ∇ψ k (0) = (Q (2) k ) T ∇ψ k (s k ), where ∇ψ k (s) is defined by (1.13). Then from (2.7) we have that (2.13)-(2.14) reduce to the following simplified subproblem: . (2.23) Combining with (1.17)-(1.20) and (2.11), we can obtain that s k ≤˜ k and where (2.25) From (1.19), it is obvious that 0 < ζ 1 < 1 and ζ 2 > 1. From lines 2 and 3 before (2.15), we know that ( When B k is only symmetric but not positive definite matrix, then the modified BFGS formula can be used to modify the positive semi-definite matrix to a positive definite matrix (see [25]). Hence, it is easy to see that the solution of (2.15)-(2.16) is We know that u (1) = -τ (1) ∇ψ k (0) is an approximate solution of (2.13)-(2.14). In order to better approximate the solution of the subproblem, we are constantly repeating the above process similarly, except for fixing the fractional part. That is, in the ith iteration we Then we can obtain a similar trust-region subproblem to (2.15)-(2.16). That is, By the computation, we have the solution of subproblem (2.30)-(2.31) as follows:  [26]. That is, we calculatẽ k TBs kā T , where Z is an orthonormal rotation matrix and satisfies Zā = āe 1 , and e 1 = (1, 0, . . . , 0) T . Then the solution of (2.13)-(2.14) is , (2.39) where d * is the solution of the quadratic trust region subproblem Now we give an algorithm for solving the fractional trust region subproblems (2.13)-(2.14).
From the above analysis, we know that the steepest descent point u * is an approximate solution of the fractional trust region subproblem (2.13)-(2.14).

Global convergence
In this section, we propose a quasi-Newton method with a fractional model for nonlinearly equality constrained optimization and prove its convergence under some reasonable conditions. In order to solve problem (1.1)-(1.2), we approximate f (x) with a fractional model of the form where f k = f (x k ), g k = ∇f (x k ), B k ∈ R n×n is a positive definite matrix, and a k , b k , c k ∈ R n are parameter vectors. We choose these vectors such that (3.1) satisfies the following conditions: where x k = x k-1 + s k-1 . Obviously, (3.2) holds. Then from (3.3) we have

4)
where v k-1 = (1a T k s k-1 )(1b T k s k-1 ) and We choose where k 1 , k 2 , k 3 are unknown parameters, and details of the choice of parameters k 1 , k 2 , k 3 can be found in [24]. The merit function we applied is the L 1 exact penalty function where σ > 0 is a penalty parameter. We know that, for σ sufficiently large, any strong local minimizer of (1.1)-(1.2) is a local minimizer of P(x) (see [27]). It is found that this function is very convenient to be used as a merit function to force global convergence in line search type algorithms (for example, see [1]). We define the actual reduction in the merit function by where s k is a trial step computed by the algorithm at x k . The above choice of actual reduction is used to prove the global convergence of the algorithm conveniently. Correspondingly, the predicted reduction is defined as where ψ k (s) is defined as (1.11). If we set the penalty parameter (3.13) Then holds for all k.
In the following algorithm, we compute the ratio of the actual reduction and the predicted reduction to choose the next iterate point and update the new trust region. Now we give the new quasi-Newton algorithm based on the fractional model (3.1).
Step 2. Update B k+1 by and y k = g k+1g k .
Step 3. If k ≤ 1, then set a k = b k = c k = 0 and d k = -B -1 k g k , compute α k such that Wolfe-Powell conditions are satisfied, and set x k+1 = x k + s k = x k + α k d k . k = k + 1 and go to Step 1.
and set Step 7. If a k > 1 k , then a k = 1 a k k a k . Update b k and c k in the same way so that (1.20) are satisfied.
Remark 2 In order to ensure the positive definite transfer of the Hessian matrix, we use the modified BFGS formula in Step 2 to iterate to get the positive definite matrix B k+1 (see [25]).
In the following, we establish the convergence results of Algorithm 3.1. The focus of this paper is to transform the fractional model trust region subproblem of the equality constrained optimization model into a simple one-dimensional quadratic model subproblem by cyclically fixing the fractional coefficient part of the model, so as to obtain a new approximate solution method for solving the subproblem. Therefore, the framework of the global convergence proof is similar to the proof process of the conic model trust region algorithm in [20], with a major difference being the lower bound of reduction in each iteration (see Lemma 3.1), which is an important result required in the proof of convergence.
for all k.
Proof Define where θ k and l k are defined in (2.12) and (2.9) respectively. Then we can see that s k (t) is in the feasible region of subproblem From the definition of s k and s k (t), we have for all t ∈ [0, k / (Q (2) k ) T g k ]. From (1.20), (2.24), and s k (t) ≤˜ k it follows where ζ 1 , ζ 2 are defined in (2.25). By Q (2) k = 1, the Cauchy-Schwarz inequality, and for all t ∈ [0, k / (Q (2) k ) T g k ], we have where 0 < ζ 1 < 1, ζ 2 > 1, M 1 = ζ 2 1 /(2ζ 2 2 ), and the second inequality is obtained from the triangular inequality properties. Then from (3.25)-(3.28) we have Besides, since {(A T k A k ) -1 } are uniformly bounded, then from Lemma 3.1 in [20] we know that there exists a positive constant ζ 3 such that θ k l k ≤ min ι˜ k , ζ 3 C k holds where ι ∈ (0, 1) is defined in (2.11). Then we have The boundedness of {x k }, rule (3.22), and inequality (3.30) imply that θ k l k + k and g k are bounded above uniformly. For instance, if θ k l k + k ≤ κ 1 and g k ≤ κ 2 for all sufficiently large k, then we have Then from (3.29)-(3.31) we know that (3.23) holds. Hence the theorem is proved.
The proofs of the following Theorems 3.1-3.2 are similar to those in [20], so we only give the conclusion and omit the proofs.
Proof From the definition of λ k and (2.5), we have From Theorem 3.2 it follows that (3.32) holds.

Numerical experiment
In this section, Algorithm 3.1 (abbreviated as FTR) is tested with some test problems, where eight problems are directly chosen from [28,29] and are listed in Table 1.
Moreover, in order to test Algorithm 3.1 more generally, we designed three problems (Problems 9-11) where Problems 10-11 are chosen from [30,31] and the nonlinear equality constraints are polynomials (see [26]).

Generalized Brown function
11. Penalty-I function Our fractional model is proposed on the basis of the conic model, and it is a generalized form of the conic model. Both of them are suitable for solving the optimization problem that the objective function is non-quadratic and the curvature changes severely. At this time, the quadratic model methods often produce a poor prediction of the minimizer of the function. In order to compare the calculation results of the fractional model and the conic model, we let b k = c k = 0 in Algorithm 3.1. Then we can obtain the conic model algorithm and call this algorithm CTR. Therefore, we solve these test problems by FTR and CTR respectively and compare their results.
All the computations are carried out in Matlab R2013b on a microcomputer in double precision arithmetic. These tests use the same stopping criterion (Q (2) k ) T g k ≤ ε and C k ≤ ε. If the stoping criterion is not satisfied with Iter ≤ 5000, then the test is terminated. We mark these by an * in such tables. The columns in the tables have the following meanings: Pro denotes the number of the test problems; n is the dimension of the test problems, Iter is the number of iterations; nf and ng are the numbers of function and gradient evaluations respectively; Qg is the value of Euclidean norm (Q (2) k ) T g k at the final iteration; CPU(s) denotes the total iteration time of the algorithm in seconds.
The parameters in these algorithms are as follows: B 0 = I, 1 = 0.6, ε = 10 -6 , ε 0 = 10 -3 , 0 = 2, max = 10, ι = √ 0.5, σ 0 = 1, ι 1 = 0.01, ι 2 = 0.7, The numerical comparison for 11 test problems is listed in Table 2. Because of the difference in the initial iteration point, we actually performed 19 experiments. In terms of the number of iterations, our algorithm FTR may be somewhat superior to CTR for 17 tests, and the two algorithms are the same in efficiency for the other 2 tests. Because FTR needs some extra algebra computation for some parameters, FTR takes more time than CTR.
We know that large-scale problems with 10,000 or more dimensions can be tested for unconstrained optimization problems. But when the test problem contains nonlinear equality constraints, the difficulty of solving the problem is greatly increased. Therefore, the dimensions of the nonlinear equality constraint problems are limited. From Table 3, we can see that as the dimensions of each test problem range from 25 to 400, we have computed nine numerical comparisons experiments for three test questions. It can be found that our algorithm can get the minimum value of the function after a finite number of iterations, but the algorithm CTR can not, and some test problem algorithms failed. The number of iterations of FTR is less than that of CTR. That is, with the increase of the dimension of the problem, our algorithm FTR can be superior to CTR both in iteration number and algorithm stability.

Conclusions
The fractional model in Algorithm 3.1 is the extension of a conic model. By using more information of function and gradient from the previous iterations and choosing parameters flexibly, the fractional model can be more approximate to the original problem. When solving the trust region subproblem, we reduce the fractional model of the subproblem to a quadratic model by cycling the fixed coefficient part, and iteratively search in the descending direction to obtain the approximate solution of the subproblem. Solving of the subproblems is creative and the algorithm is simple. The theoretical and numerical results show that the method is effective and robust.