5th World Congress on Industrial Process Tomography, Bergen, Norway Intel® MKL Trust-Region Solvers in Mathematical Problems of Geophysics Nikolay I. Gorbenko, Nikita A. Shustrov, Alexander V. Avdeev Intel Corporation R&D Lab, Novosibirsk, Russia, e-mail: [email protected] ABSTRACT Trust-Region (TR) algorithms are relatively new iterative algorithms for solving nonlinear optimization problems. High efficiency of TR methods was demonstrated in a number of recent papers and books. They have global convergence and local super convergence, which differ them from line search methods, used quite often for solving Inverse Problems. TR techniques is implemented in a number of well-known SW libraries such as IMSL, TAO, GALAHAD, LANCELOT, etc. Let us explain the main difference of TR method from classical Newton one. Assume we have a current guess of the solution for the optimization problem. An approximate model can be constructed near the current point. Solution of the approximate model can be taken as the next iterate point. The classical line search algorithms also solve approximate models to obtain search directions. However, in TR algorithms, the approximation model is only “trusted” in the region near current iterate. This seems reasonable, because for general nonlinear functions local approximate models (such as linear and quadratic approximations) can only fit the original function locally. The region that the approximate model is trusted is called “trust region”. The trust region is adjusted from iteration to iteration, i.e. if computations indicate the approximation model fit the original problem quite well, the trust region can be enlarged. Otherwise when the approximation works not good enough the trust region will be reduced. TR solvers developed and implemented by the authors are based on Intel MKL (Math Kernel Library). There are versions of TR for Intel IA32, EM64T, IA64 platforms (Windows and Linux operating systems). In addition to Fortran-interface, TR solvers include C-language interface for all functions and routines. TR solvers are implemented with OpenMP support and can be used in multiprocessing mode. Keywords Nonlinear optimization, Trust-Region solvers, Intel MKL, Oil & Gas Problems 1 Trust-Region algorithm Trust-Region algorithms allow to solve (Conn et al. 2000): – nonlinear least squares problem (without and with bound constraints); – system of nonlinear equations (without and with bound constraints); – minimization of functional (without constraints). Let us explain some details of TR approach through the example of a nonlinear least squares problem: 2 minn F ( x) minn y f ( x) 2 , y R m , x R n , f : R n R m , m n xR xR (1) where is continuously differentiable function. The step for TR method is the solution of the subproblem 2 2 2 2 minn F ( xk ) J ( xk )T d , where d d R that is the approximation of the goal function Jacobian of <k in a neighborhood of current point х, and (2) - . *Trademark Information Intel, Itanium, Dual-Core Xeon and Xeon are trademarks of Intel Corporation in the U.S. and other countries. Intel's trademarks may be used publicly with permission only from Intel. Fair use of Intel's trademarks in advertising and promotion of Intel products requires proper acknowledgement. *Other names and brands may be claimed as the property of others. 1 3rd World Congress on Industrial Process Tomography, Banff, Canada TR pseudo code for solving a nonlinear least squares problem: Step 1: Choose initial guess x1 R n , 1 0 Step 2: Solution of (2) gives value of dk If || F ( xk ) || 2 || F ( xk ) J ( xk ) d k || 2 then stop; T Computes rk || F ( xk ) || 2 || F ( xk d k ) || 2 || F ( xk ) || 2 || F ( xk ) J ( xk )T d k || 2 Step 3: Choose xk d k xk 1 xk if rk 0 else Define 1 || d k || 2 if rk 1 k 1 2 k if 1 rk 2 max[ || d ||, ] if rk 2 2 k k Step 4: k = k +1, go to Step 2. The main problem of TR method is to solve the subproblem (2). The following lemma is well known (Conn et al. 2000): Lemma: A vector d R is the solution of the problem n minn ( g T d d R where 1 T d Bd ), d 2 2 g R n , B R nn is a symmetric matrix, and 0 , if and only if there exits 0 such that ( B I )d g and B I is semi-definite, d 2 and ( d 2 ) 0. The case where B I has zero eigenvalues is called “hard” case and d can be written by d ( B I ) g v , where v is a vector in the null space of B I . Unless in the hard case is the unique solution of the following equation: 1 (B I ) g 1 1 0. 2 For solving this equation we use Newton’s method to calculate . Consider the TR usage for solving the nonlinear least square problem with simple bound constraints. Let min f ( x) min l x u l x u 1 2 F ( x) . The first-order necessary conditions of vector-minimizer of (1) are 2 stated as T D( x) 2 f ( x) D( x) 2 F ' ( x) F ( x) 0. where D is the diagonal scaling matrix (Coleman, 1996): 2 (3) 5th World Congress on Industrial Process Tomography, Bergen, Norway 1 D( x) diag ( v1 2 1 1 ( x) , v2 2 ( x) , , vn 2 ( x) ), (4) with xi u i x l i i min( xi u i , u i xi ) vi x 1 1 1 if (f ( x) i 0 and ui if (f ( x) i 0 and li if (f ( x) i 0 and u i or l i if (f ( x) i 0 and ui if (f ( x) i 0 and l i if (f ( x) i 0 and u i l i for i 1, , n. Let {x R : l x u} R , and we write int( ) for the strict nonempty interior of . To update the current iterate we need the solution of an elliptical trust-region subproblem and computation of a search step at each iteration. Let xi int( ) and trust-region size k 0 be given. We consider the elliptical trust-region n n subproblem: min {mk ( p) : Dk p k }, (5) p mk ( p) is quadratic model for f (x) at xki , i.e. 2 1 1 1 2 mk ( p) Fk Fk' p Fk FkT Fk' p p T FkT Fk' p. (6) 2 2 2 We let ptr ( k ) and pc ( k ) to the solution and Cauchy point of the trust-region subproblem (5), where respectively. Namely, pc ( k ) is the minimizer of mk along the scaling steepest descent direction d k subject to the satisfaction of the trust-region bound, i.e. pc ( k ) k d k k Dk2 FkT Fk' , (7) where k arg min {mk ( d k ) : Dk d k k }. 0 The function mk ( d k ) f kT d k / Fk' d k 2 . , and the unconstrained minimizer has the form is quadratic in k is given by T k min{ Dk1 Fk' Fk 2 k ' k 'T k 2 F D F Fk The search step 2 , k T Dk1 Fk' Fk }. (8) p( k ) used in TR algorithm is defined by a linear combination of two vectors ptr ( k ) and pc ( k ) : _ _ p( k ) t p c ( k ) (1 t ) p tr ( k ) (9) 3 3rd World Congress on Industrial Process Tomography, Banff, Canada _ where t [0,1) is suitable scalar. The vector p tr ( k ) in (9) is equal to q, where q q1 q 2 is given component-wise by (l xk )i , (q1 )i ptr ( k )i , (u x ) , k i if ( xk ptr ( k )) i li if li ( xk ptr ( k )) i ui ( xk ptr ( k )) i ui if (l xk ) i , (q ) i 0, (u x ) , k i ( xk ptr ( k )) i li (10) if li ( xk ptr ( k )) i u i if ( xk ptr ( k )) i u i 1 2 At the k-th iteration we consider the second degree polynomial r ( ) mk (q q ) . On the basis if 2 of the current information, r ( ) models the restriction of f to the points q1 q 2 for varying from 0 to 1. Therefore, we compute the value that minimizes this model and choose fixed lower and upper bounds, 0 1 2 1 . This means that we set arg min r ( ) according T Fk Fk' q 2 (q1 ) T Fk' Fk' q 2 T T (q 2 ) T Fk' Fk' q 2 max{1 , min{ , 2 }} . _ Now we consider the choose of the vector p c ( k ) . If the point _ let ( xk pc ( k )) int( ) we simply _ p c ( k ) pc ( k ) . Otherwise, p c ( k ) is a simple scaling of pc ( k ) obtained by a step-back along it. In other words, we let min , k c l x u k i where kc to be the stepsize along pc ( k ) to the boundary: (l x k ) i (u x k ) i , max p c ( k ) i pc ( k ) i k i if ( p c ( k )) i 0 if ( p c ( k )) i 0 _ The step p c ( k ) is given by for some fixed 0,1. _ pc ( k ) p c ( k ) k c p c ( k ) if kc 1 othewise (11) t in (9) is chosen in order to satisfy the following conditions m (0) mk ( p( k )) (12) c ( p( k )) k 1 , _ mk (0) mk ( p k ( k )) for the given constant 1 0,1 and mk ( p( k )) mk ( ptr ( k )) (13) To force conditions (12), (13), we compute the scalar t in (9) according to the following strategy. If The scalar _ c ( ptr ( k )) 1 , we simply set t 0 , i.e. we choose p( k ) ptr ( k ) 4 as the candidate step. 5th World Congress on Industrial Process Tomography, Bergen, Norway _ p( k ) so that x k p c ( k ) is the point which lies on the segment from Otherwise, we fix _ _ x k p tr ( k ) to xk p c ( k ) and satisfies c ( p( k )) 1 . In fact, p( k ) is given by (9) setting t equal to the following scalar t zT u w u (14) 2 where _ _ _ u Fk' ( p c ( k ) p tr ( k )), z ( Fk Fk' p tr ( k )), _ 1 ' _ Fk ( p tr ( k ) 1 Fk' ( p c ( k ) )) 2 2 2 A good agreement between the model function m k and objective function f is ensured for the _ 2 _ 2 w (( z T u ) 2 2 u ( Fk Fk' ( p tr ( k ) 1 p c ( k )) 2 T 1 following standard condition f ( p( k )) with the given constant size f ( xk ) f ( xk p( k )) 2 mk (0) mk ( pk ( k )) (15) 2 (0,1) . If this condition is not met, we reject p( k ) and the trust-region k is adjusted be successive reduction so that p( k ) satisfies the accuracy requirement (15). Algorithm of k-th iteration: Let xk int( ), k 0, 1 , 2 , 1 , (0,1), min 0, (0,1), _ be given _ D k by (3). Set k min{ k , min } , set k k . Compute the matrix Repeat Set k k . ptr ( k ) for problem (5). Compute the Cauchy step pc ( k ) by (7). Find the solution _ _ Compute p tr ( k ) and p c ( k ) by (9), (10), (11) respectively. t such that satisfies (12), (13). Set k 1 k . Find 2 Intel Trust-Region solvers performance Intel MKL TR solvers are tested carefully on standard test sets for the unconstrained and constrained optimization from CUTEr collection (CUTEr is testing environment for optimization and linear algebra solvers. The package contains a collection of test problems, along with Fortran 77, Fortran 90/95 and Matlab tools). TR solvers are implemented with OpenMP support and can be used in multiprocessing mode (fig.1): 5 3rd World Congress on Industrial Process Tomography, Banff, Canada Fig.1. Intel TR solvers scaling TR solvers show excellent performance vs. VNI IMSL Fortran library v5.0 and TAO v1.8.1. On benchmark tests TR give up to 10 times speed-up vs. IMSL (Fig.2) and up to 5 times speed-up vs. TAO. 1000 IMSL IMSL (with MKL) MKL TR Solvers Computation Time (sec) Lower is better 100 10 1 100 200 400 600 800 1000 1200 1400 1600 0.1 0.01 Size Fig.2. Intel TR solvers vs. IMSL 3 Intel Trust-Region solvers usage in mathematical problems of Geophysics TR solvers were applied for solving the inverse problem of pore pressure evaluation (Madatov et al. 1995), namely – it was required to reconstruct some lythological values of strata (initial porosity, constants of compaction, “source” term and specific surface) using real porosity and pore pressure data. The numerical solutions of this inverse problem (Lavrentiev, et al, 2003) were obtained with the required precision and rapid convergence (see Fig.3, 4). 6 5th World Congress on Industrial Process Tomography, Bergen, Norway Fig. 3. Inverse problem of pore pressure evaluation: Porosity curve reconstruction Fig. 4. Inverse problem of pore pressure evaluation: Pore pressure curve reconstruction 4 REFERENCES CONN A. R., GOULD N. I.M., TOINT P. L., (2000), Trust-Region Methods. SIAM Society for Industrial & Applied Mathematics, Englewood Cliffs, New Jersey. LAVRENTIEV M.M., AVDEEV A.V., LAVRENTIEV Jr. M.M., PRIIMENKO V.I., (2003) Inverse Problems of Mathematical Physics. VSP Publ., The Netherlands, 272 p. COLEMAN T.F., LI Y., (1996) An interior trust-region approach for minimization subject to bounds, SIAM J. Optim. 6 (3) 418–445. CUTEr, testing environment for optimization and linear algebra solvers, http://hsl.rl.ac.uk/cuter-www/ MADATOV A.G., HELLE H.B., and SEREDA V.I. (1995) , A modelling and inversion technique applied to pore pressure evaluation, 57th EAEG Conference, Glasgow, May 29-June 2 INTEL MATH KERNEL LIBRARY 10.0, http://www.intel.com/cd/software/products/asmona/eng/perflib/mkl/index.htm 7
© Copyright 2026 Paperzz