Applied Mathematics, 2011, 2, 424-426
doi:10.4236/am.2011.24052 Published Online April 2011 (http://www.SciRP.org/journal/am)
Copyright © 2011 SciRes. AM
A New Technique for Estimating the Lower Bound of
the Trust-Region Subproblem*
Xinlong Luo
School of Information and Communication Engineering,
Beijing University of Posts and Telecommu nications, Beijing, China
E-mail: luoxinlong@gmail.com, luoxinlong@bupt.edu.cn
Received January 23, 2011; revised February 10, 2011; accept ed Feb ruary 12, 2011
Abstract
Trust-region methods are popular for nonlinear optimization problems. How to determine the predicted re-
duction of the trust-region subproblem is a key issue for trust-region methods. Powell gave an estimation of
the lower bound of the trust-region subproblem by considering the negative gradient direction. In this article,
we give an alternate way to estimate the same lower bound of the trust-region subproblem.
Keywords: Trust-Region Method, Unconstrained Optimization, Trust-Region Subproblem
1. Introduction
There are many methods for solving an unconstrained
optimi zati on problem

,
min
n
x
f
x

(1)
where
f
is a smooth function. Line search methods [1,2]
and trust-region methods [3] are the two popular classes
of methods for the problem (1). In this article, we consi-
der the trust-region method for this problem. The trust-
region method for the problem (1) need to solve the fol-
lowing trust-region subproblem at every step:

1
,
min 2
TT
kk k
n
s
qs gssBs
(2)
subject to ,
k
s (3)
where

=
kk
f
xg is the gradient of the objective fun-
ction

f
at the current approximation solution k
x
,
k
B
is an n by n symmetric matrix which approxi-
mates the Hessian matrix of
f
, and >0
k
is a trust-
region radius.
It is a key issue to estimate the lower bound of the
trust-region subproblem (2) and (3) for analyzing the
global convergence of the trust-region methods for the
problem (1) [1-5]. Powell [5] obtained a lower bound of
the subproblem (2) and (3) by considering the quadratic
model
k
s
qalong the negative gradient direction k
g.
In the next section we give an alternate way to obtain the
same estimation of its lower bound. Throughout the
paper
denotes the Euclidean vector norm or its in-
duced matrix norm.
2. A New Estimation Technique
In this section, we give an alternate way to estimate the
lower bound and upper bound of

0
kkk
qqs, res-
pectively, where k
s
is the solution of the subproblem (2)
and (3). Firstly, we give the well-known properties of the
trust-region problem [6,7]:
Lemma 2.1 Vector k
s is a solution of the problem
(2)-(3) iif kk
s and there exists 0
k
to satisfy
=,
kkk k
BIsg (4)
0,
kk
BI (5)
=0,
kk k
s (6)
where nn
k
B is a symmetric matrix.
This lemma can b e proved by the KKT (Karush-Kuhn-
Tucker) conditions for the constraint optimization pro-
blem [4].
Powell [5] obtained an estimation of the lower bound
of
0
kk
qqs in the trust region k
s as fol-
lows:
Lemma 2.2 (Powell, 1975 [5]) If k
s
is a solution of
*This research was supported in part by Grant 2009CB320401 fro
m
N
ational Basic Research Program of China, and Grant YBWL2010152
from Huawei Technologies Co., Ltd., and Grant BUPT2009RC0118
from the Fundamental Research Funds for the Central Universities.
X. L. LUO
Copyright © 2011 SciRes. AM
425
(2) and (3), then



1
0min, .
2
kkk kkkk
qqs
g
B
g
(7)
The estimation of the predicted reduction (7) is a key
property to analyze the convergence of the trust-region
method. Here, we are interested in the question whether
we can obtain the analogous result of (7) if we directly
consider the solution of (4) and (5). Our motivation is
that we obtain the solution of the trust-region subpro-
blem (2) and (3) by solving (4)-(6), and we need to dire-
ctly consider the search direction k
s of (4) and its res-
tricted step [2] or the parameter k
[8-11] for some tru-
st region methods. Therefore, we give an alternate way to
estimate the lower bound of


0
kkk
qqs by directly
considering the solution (4)-(6) of the trust-region sub-
problem (2) and (3).
Lemma 2.3 If 0
k
such that (5) is satisfied and
k
s is a solution of (4), then



1
0min,.
2
kkk kkkk
qqs gsgB (8)
Proof. From (4) we get
=.
TTT
k kkkkkkk
sBsssgs (9)
Combining the above equality and (4)-(5), we have



2
22
111
0= =
222
11
=22
11
,
2
TT TT
kkkkkkkkkk kk k
T
kkk kkk
kk k
kk

 






qqs sBs
g
sss
g
s
sgBIg
sg
B
(10)
where

kk
BI
is the generalized inverse of kk
B
I
.
Now we consider the properties of the function

22
1.
kk
k
 

sg
B (11)
It is not difficult to know that the function
is
convex when >0
k
B, since


3
2
=2 0
kk

 gB
. Thus, t he function
attains its minimizer

min

when min
satisfies

=0
min

and k
 B, i.e.

2
=2 ,
mink kk k

gsBs (12)
when
=,and>.
mink kkmink

gs BB (13)
We will prove this property by distinguishing two
cases separately, namely min
is nonnegative or negative.
When kk k
gs B, from (13), we have 0
min
.
In this case, combining 0
k
with (10)-( 13), we obt ain





22
2
1
0
=
1
=2
2
1
.
2
kkk kk
k
min
kk kk
kk
s
 

qq sg
B
gs Bs
gs
(14)
The other case is <
kk k
gs B, which gives
<0
min
from (13). Since the function

is mono-
tonically increasing for all 0
k
 when
<
kk k
gs B, from (10) and (11), we obtain




22
2
11
02
111
=0=.
222
kkk kkk
kk
kkk
 

 



qqs sg
B
gB
(15)
Combining (14) with (15), we obtain



1
0min,.
2
kkk kkkk
qqs ggBs (16)
When =0
k
which shows the constraint is inactive,
from (4) and (5), and the definition of

k
qs, we have


2
11
0=
22
T
kkkkkkkk
qqsgBggB (17)
which shows that (8) is also true.
3. Conclusions
In this article, we give an alternate way to estimate the
lower bound of the trust-region method. This new te-
chnique can be applied to analyze the convergence of
trajectory-following methods for unconstrained optimi-
zation problems [9-11]. The interested future works is
that this new technique is applied to estimate the lower
bound of the trust-region subproblem of the constraint
optimization.
4. Acknowledgments
We would like to acknowledge Jiawang Nie and Hong-
chao Zhang for their constructive suggestions.
5. References
[1] J. E. Dennis and R. B. Schnabel, “Numerical Methods for
Unconstrained Optimization and Nonlinear Equations,”
Prentice-Hall, Inc., Englewood Cliffs, 1983.
X. L. LUO
Copyright © 2011 SciRes. AM
426
[2] R. Fletcher, “Practical Methods of Optimization,” 2nd
Edition, John Wiley & Sons, Chichester, 1987
[3] A. R. Conn, N. Gould and P. L. Toint, “Trust-Region
Methods,” SIAM, Philadelphia, 2000.
doi:10.1137/1.9780898719857
[4] J. Nocedal and S. J. Wright, “Numerical Optimization,”
Springer-Verlag, New York, 1999. doi:10.1007/b98874
[5] M. J. D. Powell, “Convergence Properties of a Class of
Minimization Algorithms,” In: O. L. Mangasarian, R. R.
Meyer and S. M. Robinson Eds., Nonlinear Programming
2, Academic Press, New York, 1975, pp. 1-27.
[6] D. M. Gay, “Computing Optimal Locally Constrained
Steps,” SIAM Journal on Scientific and Statistical Com-
puting, Vol. 42, No. 2, 1981, pp. 186-197.
doi:10.1137/0902016
[7] J. J. Moré and D. C. Sorensen, “Computing a Trust Re-
gion Step,” SIAM Journal on Scientific and Statistical
Computing, Vol. 4, No. 3, 1983, pp. 553-572.
doi:10.1137/0904038
[8] D. J. Higham, “Trust Region Algorithms and Time Step
Selection,” SIAM Journal on Numerical Analysis, Vol. 37,
No. 1, 1999, pp. 194-210.
doi:10.1137/S0036142998335972
[9] X.-L. Luo, C. T. Kelley, L.-Z. Liao and H. W. Tam,
“Combining Trust Region Techniques and Rosenbrock
Methods to Compute Stationary Points,” Journal of Op-
timization Theory and Applications, Vol. 140, No. 2,
2009, pp. 265-286. doi:10.1007/s10957-008-9469-0
[10] X.-L. Luo, L.-Z. Liao and H. W. Tam, “Convergence
Analysis of the Levenberg-Marquardt Method,” Optimi-
zation Methods and Software, Vol. 22, No. 4, 2007, pp.
659-678. doi:10.1080/10556780601079233
[11] X.-L. Luo, “A Second-Order Pseudo-Transient Method
for Steady-State Problems,” Appllied Mathematics Com-
putation, Vol. 216, No. 6, 2010, pp. 1752-1762.
doi:10.1016/j.amc.2009.12.029