首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
一类非精确线性搜索共轭梯度新算法   总被引:4,自引:0,他引:4  
本文通过对迭代参数的适当选取,给出了一类共轭梯度新算法。在算法的迭代过程中,迭代方向保持下降性,在一般的非精确线性搜索条件下,算法的全局收敛性得到了证明。  相似文献   

2.
张明望 《数学杂志》2004,24(5):585-590
对于一类非单调线性互补问题提出了一个新算法:高阶Dikin型仿射尺度算法,算法的每步迭代.基于线性规划Dikin原始-对偶算法思想来求解一个线性方程组得到迭代方向,再适当选取步长,得到了算法的多项式复杂性。  相似文献   

3.
非线性约束条件下的SQP可行方法   总被引:9,自引:0,他引:9  
本文对非线性规划问题给出了一个具有一步超线性收敛速度的可行方法。由于此算法每步迭代均在可行域内进行,并且每步迭代只需计算一个二次子规划和一个逆矩阵,因而算法具有较好的实用价值。本文还在较弱的条件下证明了算法的全局收敛和一步超线性收敛性。  相似文献   

4.
伍江芹  曾金平 《经济数学》2007,24(3):327-330
用MAOR迭代算法求解一类L-矩阵的隐线性互补问题.证明了由此算法产生的迭代序列的聚点是隐线性互补问题的解.并且当问题中的矩阵是M-矩阵时,算法产生的迭代序列单调收敛于隐互补问题的解.  相似文献   

5.
A-线性Bregman 迭代算法   总被引:1,自引:0,他引:1  
张慧  成礼智 《计算数学》2010,32(1):97-104
线性Bregman迭代是Osher和Cai等人最近提出的一种在压缩感知等领域有重要作用的有效算法.本文在矩阵A非满秩情形下,研究了求解下面最优化问题的线性Bregman迭代:min u∈R~M{‖u‖_1:Au+g}给出了一个关于线性Bregman迭代收敛性定理的简化证明,设计了一类A~-线性Bregman迭代算法,并针对A~+情形证明了算法的收敛性.最后,用数值仿真实验验证了本文算法的可行性.  相似文献   

6.
本文给出线性二级决策的一种非迭代算法,并给出一个算例。  相似文献   

7.
本文提出一种交互式非线性多目标优化算法,该算法是GDF多目标优化算法的改进,具有这样的特点:算法采用了既约设计空间策略,具有良好的收敛性;算法生成的迭代点是有效解;算法具有多种一维搜索准则;对于线性多目标问题,算法只需一次交互迭代即可示出多目标问题的最优解。  相似文献   

8.
通过将二阶锥线性互补问题转化为等价的不动点方程,介绍了一种广义模系矩阵分裂迭代算法,并研究了该算法的收敛性.进一步,数值结果表明广义模系矩阵分裂迭代算法能够有效地求解二阶锥线性互补问题.  相似文献   

9.
考虑求解一类非线性反应扩散对流方程的块单调迭代算法,其中包括传统的块Picard,块Jacobi,以及在区域分解算法中常用的并行Schwarz算法.所讨论的算法可从问题的一个上解和下解出发,产生一个上解迭代序列和下解迭代序列并单调收敛于离散问题的解.这类算法的优点在于算法的并行结构好且可直接通过所产生的上解和下解迭代序列,得到迭代解的最大模误差界.在理论上,得到了算法的单调收敛性、线性与超线性收敛性.  相似文献   

10.
基于一个连续可微函数,通过等价变换中心路径,给出求解线性权互补问题的一个新全牛顿步可行内点算法.该算法每步迭代只需求解一个线性方程组,且不需要进行线搜索.通过适当选取参数,分析了迭代点的严格可行性,并证明算法具有线性优化最好的多项式时间迭代复杂度.数值结果验证了算法的有效性.  相似文献   

11.

This paper discusses a two-level hierarchical time minimization transportation problem, which is an important class of transportation problems arising in industries. This problem has been studied by various researchers (Sharma et al. in Eur J Oper Res 246:700–707, 2015; Sonia and Puri in TOP 12(2):301–330, 2004; Xie et al. in Comput Oper Res 86:124–139, 2017) and therefore, a number of polynomial time iterative algorithms are available to find its solution. All the existing algorithms, though efficient, have some shortcomings. The current study proposes an alternate solution algorithm for the problem that is more efficient in terms of computational time than the existing algorithms. The results justifying the underlying theory of the proposed algorithm are given. Further, a detailed comparison of the computational behaviour of all the algorithms for randomly generated instances of this problem, of different sizes validates the efficiency of the proposed algorithm.

  相似文献   

12.
This paper concerns developing two hybrid proximal point methods (PPMs) for finding a common solution of some optimization-related problems. First we construct an algorithm to solve simultaneously an equilibrium problem and a variational inequality problem, combing the extragradient method for variational inequalities with an approximate PPM for equilibrium problems. Next we develop another algorithm based on an alternate approximate PPM for finding a common solution of two different equilibrium problems. We prove the global convergence of both algorithms under pseudomonotonicity assumptions.  相似文献   

13.
吴宇虹  马昌凤 《计算数学》2022,44(3):422-432
本文针对广义绝对值方程,提出了基于牛顿法的矩阵多分裂方法.并在该方法的基础上进一步改进,得到了基于牛顿法的交替矩阵多分裂方法.给出两种算法在一定条件下的全局收敛性,并分析当分裂为H分裂时,基于牛顿法的矩阵多分裂方法的收敛条件.通过数值实验验证了所提出的算法的可行性和有效性.  相似文献   

14.
A comparison of sequential Delaunay triangulation algorithms   总被引:5,自引:0,他引:5  
This paper presents an experimental comparison of a number of different algorithms for computing the Delaunay triangulation. The algorithms examined are: Dwyer's divide and conquer algorithm, Fortune's sweepline algorithm, several versions of the incremental algorithm (including one by Ohya, Iri and Murota, a new bucketing-based algorithm described in this paper, and Devillers's version of a Delaunay-tree based algorithm that appears in LEDA), an algorithm that incrementally adds a correct Delaunay triangle adjacent to a current triangle in a manner similar to gift wrapping algorithms for convex hulls, and Barber's convex hull based algorithm.

Most of the algorithms examined are designed for good performance on uniformly distributed sites. However, we also test implementations of these algorithms on a number of non-uniform distributions. The experiments go beyond measuring total running time, which tends to be machine-dependent. We also analyze the major high-level primitives that algorithms use and do an experimental analysis of how often implementations of these algorithms perform each operation.  相似文献   


15.
In a recent paper published in this journal, R. Chang and R. Lee purport to devise anO(N logN) time minimal spanning tree algorithm forN points in the plane that is based on a divide-and-conquer strategy using Voronoi diagrams. In this brief note, we present families of problem instances to show that the Chang-Lee worst-case timing analysis is incorrect, resulting in a time bound ofO(N 2 logN). Since it is known that alternate, trulyO(N logN) time algorithms are available anyway, the general utility of the Chang-Lee algorithm is questionable.This author's research is supported in part by the Washington State Technology Center and by the National Science Foundation under grants ECS-8403859 and MIP-8603879.  相似文献   

16.
The problem of minimizing a function fnof(x) subject to the nonlinear constraint ?(x) = 0 is considered, where fnof is a scalar, x is an n-vector, and ? is a q-vector, with q < n. The sequential gradient-restoration algorithm (SGRA: Miele, [1, 2]) and the gradient-projection algorithm (GPA: Rosen, [3, 4]) are considered. These algorithms have one common characteristic: they are all composed of the alternate succession of gradient phases and restoration phases. However, they are different in several aspects, namely, (a) problem formulation, (b) structure of the gradient phase, and (c) structure of the restoration phase. First, a critical summary of SGRA and GPA is presented. Then, a comparison is undertaken by considering the speed of convergence and, above all, robustness (that is, the capacity of an algorithm to converge to a solution). The comparison is done through 16 numerical examples. In order to understand the separate effects of characteristics (a), (b), (c), six new experimental algorithms are generated by combining parts of Miele's algorithm with parts of Rosen's algorithm. Thus, the total number of algorithms investigated is eight. The numerical results show that Miele's method is on the average faster than Rosen's method. More importantly, regarding robustness, Miele's method compares favorably with Rosen's method. Through the examples, it is shown that Miele's advantage in robustness is more prominent as the curvature of the constraint increases. While this advantage is due to the combined effect of characteristics (a), (b), (c), it is characteristic (c) that plays the dominant role. Indeed, Miele's restoration provides a better search direction as well as better step-size control than Rosen's restoration.  相似文献   

17.
An 0(n log n) algorithm is presented for computing the maximum euclidean distance between two finite planar sets of n points. When the n points form the vertices of simple polygons this complexity can be reduced to 0(n). The algorithm is empirically compared to the brute-force method as well as an alternate 0(n2) algorithm. Both the 0(n log n) and 0(n2) algorithms run in 0(n) expected time for many underlying distributions of the points. An ?-approximate algorithm can be obtained that runs in 0(n + 1?) worst-case time.  相似文献   

18.
Multiple UAVs path planning algorithms: a comparative study   总被引:1,自引:0,他引:1  
Unmanned aerial vehicles (UAVs) are used in team for detecting targets and keeping them in its sensor range. There are various algorithms available for searching and monitoring targets. The complexity of the search algorithm increases if the number of nodes is increased. This paper focuses on multi UAVs path planning and Path Finding algorithms. Number of Path Finding and Search algorithms was applied to various environments, and their performance compared. The number of searches and also the computation time increases as the number of nodes increases. The various algorithms studied are Dijkstra’s algorithm, Bellman Ford’s algorithm, Floyd-Warshall’s algorithm and the AStar algorithm. These search algorithms were compared. The results show that the AStar algorithm performed better than the other search algorithms. These path finding algorithms were compared so that a path for communication can be established and monitored.  相似文献   

19.
** Email: angela.mihai{at}strath.ac.uk*** Email: alan.craig{at}durham.ac.uk The alternate strip-based substructuring algorithms are efficientpreconditioning techniques for the discrete systems which arisefrom the finite-element approximation of symmetric ellipticboundary-value problems in 2D Euclidean spaces. The new approachis based on alternate decomposition of the given domain intoa finite number of strips. Each strip is a union of non-overlappingsubdomains and the global interface between subdomains is partitionedas a union of edges between strips and edges between subdomainsthat belong to the same strip. Both scalability and efficiencyare achieved by alternating the direction of the strips. Thisapproach generates algorithms in two stages and allows the useof a two-grid V cycle. Numerical estimates illustrate the behaviourof the new domain decomposition techniques.  相似文献   

20.
This paper presents a unified analysis of decomposition algorithms for continuously differentiable optimization problems defined on Cartesian products of convex feasible sets. The decomposition algorithms are analyzed using the framework of cost approx imation algorithms. A convergence analysis is made for three decomposition algorithms: a sequential algorithm which extends the classical Gauss-Seidel scheme, a synchronized parallel algorithm which extends the Jacobi method, and a partially asynchronous parallel algorithm. The analysis validates inexact computations in both the subproblem and line search phases, and includes convergence rate results. The range of feasible step lengths within each algorithm is shown to have a direct correspondence to the increasing degree of parallelism and asynchronism, and the resulting usage of more outdated information in the algorithms.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号