Professional Documents
Culture Documents
TECHNICAL NOTE
Communicated by J. P. Crouzeix
1. Introduction
where x ∈ IRn , I = {1, . . . , p}, J = {1, . . . , q}, the functions f, gi , hj are real
and twice continuously differentiable. In particular, Problem (P) may have
no equality or inequality constraints.
1 Thanks are due to A. Trad, F. Bonnans, and F. Khadi for helpful discussions and numer-
ous references.
2 Assistant Professor, Ecole Supérieure des Sciences et Techniques de Tunis, Tunis, Tunisia.
213
0022-3239/04/1000-0213/0 © 2004 Plenum Publishing Corporation
214 JOTA: VOL. 123, NO. 1, OCTOBER 2004
We recall the main notations, definitions, and classical results that will
be used in the sequel.
p+1
The Lagrangian function of (P) is defined on IRn × IR+ × Rq by
i=p =q
j
L(x, λ, µ) = λ0 f (x) + λi gi (x) + µj hj (x).
i=1 j =1
The gradient and the Hessian matrix of L with respect to x are denoted
respectively by ∇L(x, λ, µ) and ∇ 2 L(x, λ, µ). The gradient of f with
respect to x is ∇f (x) and ∇f (x)t is its transpose. The feasible set is
For x ∈ F, the active index set I (x), the critical cone C(x), and the set of
generalized Lagrange multipliers 0 (x), and the set of Lagrange multipli-
ers (x) are defined as follows:
where
It is well known that the following lemma holds (see for instance
Ref. 2, p. 241).
λi ∇gi (x) + µj ∇hj (x) = 0, (1)
i∈I (x) j ∈J
λi ≥ 0, i ∈ I (x). (2)
Condition CN2 has the important property that the Lagrange multi-
plier (λ∗ , µ∗ ) is the same for all critical vectors d ∈ C(x ∗ ). In many appli-
cations, LICQ is very restrictive. If LICQ does not hold, (x ∗ ) fails to be
a singleton and CN2 fails to be satisfied (see Ref. 3). However, CN2 holds
if one of the following conditions holds (see for instance Ref. 4):
(i) all functions gi and hj are affine;
(ii) the functions f and gi are convex, the functions hj are affine,
and x ∗ satisfies the Slater condition;
(iii) there exists a (λ, µ) ∈ IR+ × IRq such that (x ∗ , λ, µ) is a saddle
p
0 (x ∗ ) = ∅, (3)
∗ ∗ 2 ∗
∀d ∈ C(x ), ∃(λ, µ) ∈ 0 (x ) : (d) ∇ L(x , λ, µ)d ≥ 0.
t
(4)
and GN2 is free from the first defect. It is well known that a sufficient
optimality condition for x ∗ ∈ F is that (x ∗ ) = ∅ and that, for every
d ∈ C(x ∗ ), d = 0,
(C2) px ∗ ≤ 2.
JOTA: VOL. 123, NO. 1, OCTOBER 2004 217
Remark 1.1. If SGC2 does not hold in Theorem 1.1, we replace the
objective function f by the function defined by f (x) + ||x − x ∗ ||2 , > 0;
we apply Theorem 1.1 to obtain a pair (λ , µ ) ∈ (x ∗ ) such that (5) holds,
let go to 0, and get the following main result of this paper.
{d | ∇gi (x ∗ )t d = 0, i = 1, 2; ∇hj (x ∗ )t d = 0, j ∈ J }.
where
i=2 =q
j
R(d) = ||∇gi (x ∗ )t d||2 + ||∇hj (x ∗ )t d||2 .
i=1 j =1
(v) (d)t ∇ 2 L(x ∗ , λ, µ)d is linear in (λ, µ), (x ∗ ) is convex and com-
pact, and the max in (10) is attained at (λ1 , µ1 ) or (λ2 , µ2 ). Let
and we use a new version of the Yuan lemma (see Ref. 8), as
stated in Ref. 9 for n ≥ 3, to find positive numbers α1 and α2 ,
with α1 + α2 = 1, such that
If
where
x = (x1 , x2 , x3 ) ∈ IR3 ,
√
g1 (x) = 2 3x1 x2 − 2x22 − x3 ,
g2 (x) = x22 − 3x12 − x3 ,
√
g3 (x) = −2 3x1 x2 − 2x22 − x3 .
Put
√
w1 (x) = 2 3x1 x2 − 2x22 ,
w2 (x) = x22 − 3x12 ,
√
w3 (x) = −2 3x1 x2 − 2x22 .
We have
gi (x) = wi (x) − x3 , i = 1, 2, 3.
i=3
L(x1 , x2 , x3 , λ) = x3 + λi gi (x1 , x2 , x3 ).
i=1
For the critical vectors d 1 = (1, 0, 0)t and d 2 = (0, 1, 0)t , we have
√
∇ 2 L(x ∗ , λ)d 1 = (−6λ2 , 2 3(λ1 − λ3 ), 0)t ,
References
1. Mangasarian, O. L., and Fromovitz, S., The Fritz John Necessary Optimal-
ity Conditions in the Presence of Equality and Inequality Constraints, Journal of
Mathematical Analysis and Applications, Vol. 17, pp. 37–47, 1967.
2. Hestenes, M. R., Optimization Theory: The Finite-Dimensional Case, Robert
E. Krieger Publishing Company, New York, NY, 1981.
3. Anitescu, M., Degenerate Nonlinear Programming with a Quadratic Growth
Condition, SIAM Journal on Optimization, Vol. 10, pp. 1116–1135, 2000.
4. Bazaraa, M. S., Sherali, H. D., and Shetty, C. M., Nonlinear Programming:
Theory and Algorithms, John Wiley and Sons, New York, NY 1993.
5. Bonnans, J. F., and Shapiro, A., Perturbation Analysis of Optimization Prob-
lems, Springer, New York, NY, 2000.
6. Gauvin, J., A Necessary and Sufficient Regularity Condition to Have Bounded
Multipliers in Nonconvex Programming, Mathematical Programming, Vol. 12,
pp. 136–138, 1977.
7. Ben-Tal, A., and Zowe, J., A Unified Theory of First and Second-Order Con-
ditions for Extremum Problems in Topological Vector Spaces, Mathematical
Programming Study, Vol. 19, pp. 39–76, 1982.
8. Yuan, Y., On a Subproblem of Trust-Region Algorithms for Constrained Opti-
mization, Mathematical Programming, Vol. 47, pp.53–63, 1990.
9. Hiriart-Urruty, J. B., and Torki, M., Permanently Going Back and Forth
between the Quadratic World and the Convexity World in Optimization, Applied
Mathematics and Optimization, Vol. 45, pp. 169–184, 2002.