In classical trust-region optimization algorithms, the radius of the trust region is reduced, kept constant, or enlarged after, respectively, unsuccessful, successful, and very successful iterations. We propose here to refine the empirical rules used for this update by the definition of a new set of iterations that we call "too successful iterations." At such iterations, a large reduction of the objective function is obtained despite a crude local approximation of the objective function; the trust region is thus kept nearly constant instead of being enlarged.
The new update rules preserve the strong convergence property of traditional trust-region methods. They can also be generalized to define a self-adaptive trust-region algorithm along the lines introduced by Hei [J. Comput. Math., 21 (2003), pp. 229-236].
Numerical experiments carried out on 70 unconstrained problems from the CUTEr collection demonstrate the positive impact of the modified update strategy on the efficiency and robustness of quasi-Newton variants of a trust-region solver, when BFGS or SR1 updates of the approximation of the Hessian matrix are carried at all iterations.
[1]
Richard H. Byrd,et al.
Analysis of a Symmetric Rank-One Trust Region Method
,
1996,
SIAM J. Optim..
[2]
J. Dennis,et al.
Two new unconstrained optimization algorithms which use function and gradient values
,
1979
.
[3]
Roger Fletcher,et al.
Practical methods of optimization; (2nd ed.)
,
1987
.
[4]
Jorge J. Moré,et al.
Computing a Trust Region Step
,
1983
.
[5]
Jorge J. Moré,et al.
Digital Object Identifier (DOI) 10.1007/s101070100263
,
2001
.
[6]
Nicholas I. M. Gould,et al.
Solving the Trust-Region Subproblem using the Lanczos Method
,
1999,
SIAM J. Optim..
[7]
LongHei.
A SELF—ADAPTIVE TRUST REGION ALGORITHM
,
2003
.
[8]
Nicholas I. M. Gould,et al.
CUTE: constrained and unconstrained testing environment
,
1995,
TOMS.
[9]
Nicholas I. M. Gould,et al.
CUTEr and SifDec: A constrained and unconstrained testing environment, revisited
,
2003,
TOMS.
[10]
Nicholas I. M. Gould,et al.
Sensitivity of trust-region algorithms to their parameters
,
2005,
4OR.