b

DiscoverSearch
About
My stuff
DEFT-FUNNEL: an open-source global optimization solver for constrained grey-box and black-box problems
2019·arXiv
ABSTRACT
ABSTRACT

The fast-growing need for grey-box and black-box optimization methods for constrained global optimization problems in fields such as medicine, chemistry, engineering and artificial intelligence, has contributed for the design of new efficient algorithms for finding the best possible solution. In this work, we present DEFT-FUNNEL, an open-source global optimization algorithm for general constrained grey-box and black-box problems that belongs to the class of trust-region sequential quadratic optimization algorithms. It extends the previous works by Sampaio and Toint (2015, 2016) to a global optimization solver that is able to exploit information from closed-form functions. Polynomial interpolation models are used as surrogates for the black-box functions and a clustering-based multistart strategy is applied for searching for the global minima. Numerical experiments show that DEFT-FUNNEL compares favorably with other state-of-the-art methods on two sets of benchmark problems: one set containing problems where every function is a black box and another set with problems where some of the functions and their derivatives are known to the solver. The code as well as the test sets used for experiments are available at the Github repository http://github.com/phrsampaio/deft-funnel.

Keywords Global optimization  ·constrained nonlinear optimization  ·black-box optimization  ·grey-box optimization  ·derivative-free optimization  ·simulation-based optimization  ·trust-region method  ·subspace minimization  ·sequential quadratic optimization

image

where  f : Rn → ℜmight be or not a black box,  c : Rn → Rqare black-box constraint functions and  h : Rn → Rlare white-box constraint functions. i.e. their analytical expressions as well as their derivatives are available. The vectors lc, lh, ucand  uhare lower and upper bounds on the constraints values c(x) and h(x), while  lxand  uxare bounds on the x variables, with  lc ∈ (R ∪ −∞)q, lh ∈ (R ∪ −∞)l, uc ∈ (R ∪ ∞)q, uh ∈ (R ∪ ∞)l, lx ∈ (R ∪ −∞)nand ux ∈ (R ∪ ∞)n. We also address the case where there are no white-box constraint functions h. Finally, we assume that the bound constraints are unrelaxable, i.e. feasibility must be maintained throughout the iterations, while the other general constraints are relaxable.

When at least one of the functions in (1) has a closed form, i.e. either the objective function is a white box or there is at least one white-box constraint function in the problem, the latter is said to be a grey-box problem. If no information about the functions is given at all, which means that the objective function is a black box and that there are no white-box constraints, the problem is known as a black-box problem. Both grey-box and black-box optimization belong to the field of derivative-free optimization (DFO) [12, 4], where the derivatives of the functions are not available. DFO problems are encountered in real-life applications in various fields such as engineering, medicine, science and artificial intelligence. The black boxes are often the result of an expensive simulation or a proprietary code, in which case automatic differentiation [21, 22] is not applicable.

Many optimizations methods have been developed for finding stationary points or local minima of (1) when both the objective and the constraints functions are black boxes (e.g., [36, 29, 10, 5, 42, 43, 14, 1]). However, a local minimum is not enough sometimes and so one need to search for the global minimum [16, 15]. A reduced number of methods have been proposed to find the global minima of constrained black-box problems (see, for instance, [25, 39, 40, 37, 38, 9]) and thus there is still much research to be done on this area. Moreover, many global optimization methods for constrained black-box problems proposed in the literature or used in industry are unavailable to the public and are not open source. We refer the reader to the survey papers [41, 28] and to the textbooks [12, 4] for a comprehensive review on DFO algorithms for different types of problems.

In the case of constrained grey-box problems, especially those found in industry, it is a good idea to exploit the available information about the white boxes since such problems are usually hard to be solved, i.e. highly nonlinear, multimodal and with very expensive functions. Therefore, one would expect the solver to use any information given as input in order to attain the global minimum as fast as possible. Unfortunately, even less global optimization solvers exist for such problems today. A common solution found by optimization researchers, engineers and practioners is to consider all the functions as black boxes and to use a black-box optimization algorithm to solve the problem. Two of the few methods that exploit the available information are ARGONAUT [9] and a trust-region two-phase algorithm proposed in [6]. In ARGONAUT, the black-box functions are replaced by surrogate models and a global optimization algorithm is used to solve the problem to global optimality, having the surrogate models updated only after its resolution. After updating the models, the problem is solved again with the updated models and this process is repeated until convergence is declared. In the two-phase algorithm described in [6], radial basis functions (RBF) are used as surrogate models for the black-box functions. Moreover, as in DEFT-FUNNEL, the self-correcting geometry approach proposed by [44] is applied to the management of the interpolation set. Their algorithm is composed of a feasibility phase, where the goal is to find a feasible point, and an optimization phase, where the feasible point found in the first phase is used as a starting point to find a global minimum.

The algorithm in [6] is the one sharing more elements in common with DEFT-FUNNEL. However, these two methods are still very different in nature since DEFT-FUNNEL combines a multistart strategy with a sequential quadratic optimization (SQO) algorithm in order to find global minima while the other applies a global optimization solver in its both phases for this purpose. Besides, DEFT-FUNNEL employs local polynomial interpolation models rather than RBF models as the former have good performance in the context of local optimization, which suits well for the SQO algorithm used in its local search. Despite the good performance of the algorithms proposed in [9] and [6], neither is freely available or open source.

Contributions. This paper proposes a new global optimization solver for general constrained grey-box and black-box problems written in Matlab [32] that exploits any available information given as input and that employs surrogate models built from polynomial interpolation in a trust-region-based SQO algorithm. Differently from the ARGONAUT approach, the surrogate models are updated during the optimization process as soon as new information from the evaluation of the functions at the iterates become available. Furthermore, the proposed solver, named DEFT-FUNNEL, is open source and freely available at the Github repository http://github.com/phrsampaio/deft-funnel. It is based on the previous works in [42, 43] and it extends the original DFO algorithm to grey-box problems and to the search for global minima. As its previous versions, it does not require feasible starting points. To our knowledge, DEFTFUNNEL is the first open-source global optimization solver for general constrained grey-box and black-box problems that exploits the derivative information available from the white-box functions. It is also the first one of the class of trust-funnel algorithms [19] to be used in the search for global minima in both derivative-based and derivative-free optimization.

This paper serves also as the first release of the DEFT-FUNNEL code to the open-source community and to the public in general. For this reason and also due to the new extensions mentioned above, we give a complete description of the algorithm so that the reader can understand the method more easily while examining the code on Github. We also notice that some modifications and additions have been made to the local-search SQO algorithm with respect to the one presented in [43]. In particular, some changes were done in the condition for the normal step calculation, in the criticality step and in the maintenance of the interpolation set, all of them being described in due course. Furthermore, we have also added a second-order correction step.

The extension to global optimization is based on the multi-level single linkage (MLSL) method [26, 27], a well-known stochastic multistart strategy that combines random sampling, a clustering-based approach for the selection of the starting points and local searches in order to identify all local minima. In DEFT-FUNNEL, it is used for selecting the starting points of the local searches done with the trust-funnel SQO algorithm.

Organization. The outline of this paper is as follows. Section 2 introduces the MLSL method while in Section 3 the DEFT-FUNNEL solver is presented in detail. In Section 4, numerical results on a set of benchmark problems for global optimization are shown and the performance of DEFT-FUNNEL is compared with those of other state-of-the-art algorithms in a black-box setting. Moreover, numerical results on a set of grey-box problems are also analyzed. Finally, some conclusions about the proposed solver are drawn in Section 5.

Notation. Unless otherwise specified, the norm  ∥ · ∥is the standard Euclidean norm. Given any vector  x ∈ Rn, we denote its i-th component by  [x]i. We define  [x]+ = max(0, x)where the max operation is done componentwise. We let  B(z; ∆)denote the closed Euclidian ball centered at z, with radius  ∆ > 0. Given any set A, |A| denotes the cardinality of A. By  Pdn, we mean the space of all polynomials of degree at most d in  ℜn. Finally, given any subspace S, we denote its dimension by dim(S).

The MLSL method [26, 27] is a stochastic multistart strategy originally designed for bound-constrained global optimization problems as below

image

where  Ω ⊆ Rnis a convex, compact set containing the global minimum as an interior point that is defined by lower and upper bounds. It was later extended to problems with general constraints in [45]. As most of the stochastic multistart methods, it consists of a global phase, where random points are sampled from a probabilistic distribution, and a local phase, where selected points from the global phase are used as starting points for local searches done by some local optimization algorithm. MLSL aims at avoiding unnecessary and costly local searches that culminate in the same local minima. To achieve this goal, sample points are drawn from an uniform distribution in the global phase and then a local search procedure is applied to each of them except if there is another sample point or a previously detected local minimum within a critical distance with smaller objective function value. The method is fully described in Algorithm 2.1.

image

The critical distance  rkis defined as

image

where  Γis the gamma function and m(S) is the Lebesgue measure of the set S. The method is centred on the idea of exploring the region of attraction of all local minima, which is formally defined below.

Definition 2.1. Given a local search procedure P, we define a region of attraction  R(x∗)in  Ωto be the set of all points in  Ωstarting from which P will arrive at  x∗.

The ideal multistart method is the one that runs a local search only once at the region of attraction of every local minimum. However, two types of errors might occur in practice [30]:

Error 1. The same local minimum  x∗has been found after applying local search to two or more points belonging to the same region of attraction of  x∗.

Error 2. The region of attraction of a local minimum  x∗contains at least one sampled point, but local search has never been applied to points in this region.

In [26, 27], the authors demonstrate the following theoretical properties of MLSL that are directly linked to the errors above:

Property 1. (Theorem 8 in [26] and Theorem 1 in [27]) If  σ > 4in (3), then, even if the sampling continues forever, the total number of local searches ever started by MLSL is finite with probability 1.

Property 2. (Theorem 12 in [26] and Theorem 2 in [27]) If  rktends to 0 with increasing k, then any localminimum  x∗will be found within a finite number of iterations with probability 1.

Property 1 states that the number of possible occurrences of Error 1 is finite while Property 2 says that Error 2 never happens. Due to its strong theoretical results and good practical performance, MLSL became one of the most reliable and popular multistart methods of late.

Finally, we note that MLSL has already been applied into the global constrained black-box optimization setting in [2]. The proposed method, MLSL-MADS, integrates MLSL with a mesh adaptive direct search (MADS) method [3] to find multiple local minima of an inverse transport problem involving black-box functions.

image

the original problem (1). Then, by defining  f(x, s)def= f(x)and  z(x, s)def= z(x) − s, the problem (1) is rewritten as

image

where  s ∈ Rq+lare slack variables and  ls ∈ (R ∪ −∞)q+land  us ∈ (R ∪ ∞)q+lare the lower and upper bounds of the modified problem with  ls =�lc lh�Tand  us =�uc uh�T. We highlight that the rewriting of the original problem (1) as (4) is done within the solver and that the user does not need to interfere.

DEFT-FUNNEL is composed of a global search and a local search that are combined to solve the problem (4). In the next two sections, we elaborate on each of these search steps.

3.1 Global search

As mentioned previously, the global search in DEFT-FUNNEL relies on the MLSL multistart strategy. A merit function  Φ(x)is used to decide which starting points are selected for the local search. We introduce the global search in detail in what follows.

Algorithm 3.1: GlobalSearch

4: Rank the sample points by increasing value of  Φ.

5: for i = 1 to kN do

image

8: end if

9: end for

image

The Algorithm 3.1 is implemented in the function deft_funnel_multistart, which is called by typing the following line in the Matlab command window:

[best_sol, best_fval, best_indicators, total_eval, nb_local_searches, fL] = deft_funnel_multistart(

image

The inputs and outputs of deft_funnel_multistart are detailed in Table 1. The options for the input ‘whichmodel’ are described in Section 3.2.

Table 1: Inputs and outputs of the function deft_funnel_multistart.

image

The merit function  Φ(x)employed in DEFT-FUNNEL is the well-known  ℓ1penalty functon which is defined as follows:

image

where m = q + l is the total number of constraints and  πis the penalty parameter. One of the advantages of this penalty function over others is that it is exact, that is, for sufficiently large values of  π, the local minimum of  Φ(x)subject only to the bound constraints on the x variables is also the local minimum of the original constrained problem (1). We note that, although  Φ(x)is nondifferentiable, it is only used in the global search for selecting the starting points for the local searches.

The LocalSearch algorithm at line 7 is started by calling the function deft_funnel whose inputs and outputs are given in the next section.

3.2 Local search

The algorithm used in the local search is based on the one described in the paper [43]. It is a trust-region SQO method that makes use of a funnel bound on the infeasibility of the iterates in order to ensure convergence. At each iteration k, we have an iterate  (xk, sk)such that  xk ∈ Yk, where  Ykdefines the interpolation set at iteration k. Every iterate satisfies the following bound constraints:

image

Depending on the optimality and feasibility of  (xk, sk), a new step  dkdef= (dxk, dsk)Tis computed. Each full step of the trust-funnel algorithm is decomposed as

image

where the normal step component  nkaims to improve feasibility and the tangent step component  tkreduces the objective function model without worsening the constraint violation up to first order. This is done by requiring the tangent step to lie in the null space of the Jacobian of the constraints and by requiring the predicted improvement in the objective function obtained in the tangent step to not be negligible compared to the predicted change in f resulting from the normal step. The full composite step  dkis illustrated in Figure 1. As it is explained in the next subsections, the computation of the composite step in our algorithm does not involve the function z(x.s) itself but rather its surrogate model.

After having computed a trial point  xk +dk, the algorithm proceeds by checking whether the iteration was successful in a sense yet to be defined. The iterate is then updated correspondingly, while the sample set and the trust regions are updated according to a self-correcting geometry scheme to be described later on. If  Ykhas been modified, the surrogate models are updated to satisfy the interpolation conditions for the new set  Yk+1, implying that new function evaluations are carried out for the additional point obtained at iteration k.

image

Figure 1: Illustration of the composite step  dk = nk + tk. The normal step  nkattempts to improve feasibility by reducing the linearized constraint violation at  (xk, sk), whereas the tangent step aims at minimizing the objective function without deteriorating the gains in feasibility obtained through the normal step. Here,  A(xk, sk)denotes the Jacobian of z(x, s) at  (xk, sk).

The local search is started inside the multistart strategy loop in Algorithm 3.1, but it can also be called directly by the user in order to use DEFT-FUNNEL without multistart. This is done by typing the following line at the Matlab command window:

image

The inputs and outputs of the function deft_funnel are detailed below in Table 2. Many other additional parameters can be set directly in the function deft_funnel_set_parameters. Those are related to the trust-region mechanism, to the interpolation set maintenance and to criticality step thresholds.

Table 2: Inputs and outputs of the function deft_funnel

image

Once the initial interpolation set has been built using one of the methods described in the next subsection, the algorithm calls the function deft_funnel_main. In fact, deft_funnel serves only as a wrapper for the main function of the local search, deft_funnel_main, doing all the data preprocessing and paramaters setting needed in the initialization process. All the main steps such as the subspace minimization step, the criticality step and the computation of the new directions are part of the scope of deft_funnel_main.

3.2.1 Building the surrogate models

The local-search algorithm starts by building an initial interpolation set either from a simplex or by drawing samples from an uniform distribution. The construction of the interpolation set is done in the function deft_funnel_build_initial_sample_set, which is called only once during a local search within deft_funnel. The choice between random sampling and simplex is done in deft_funnel when calling the function deft_funnel_set_parameters, which defines the majority of parameters of the local search. If random sampling is chosen, it checks if the resulting interpolation set is well poised and, if not, it is updated using the Algorithm 6.3 described in Chapter 6 in [12], which is implemented in deft_funnel_repair_Y.

For the sake of simplicity, we assume henceforth that the objective function is also a black box. Given a poised set of sample points  Y0 = {y0, y1, . . . , yp}with an initial point  x0 ∈ Y0, the next step of our algorithm is to replace the objective function f(x) and the black-box constraint functions  c(x) = (c1(x), c2(x), . . . , cq(x))by surrogate models mf(x)and  mc(x) = (mc1(x), mc2(x), . . . , mcq(x))built from the solution of the interpolation system

image

where

image

where  φis the basis of monomials and  Υ(x)is replaced by the objective function f(x) or some black-box constraint function  cj(x).

We consider underdetermined quadratic interpolation models that are fully linear and that are enhanced with curvature information along the optimization process. Since the linear system (9) is potentially underdetermined, the resulting interpolating polynomials will be no longer unique and so we provide to the user four approaches to construct the models  mf(x)and  mcj(x)that can be chosen by passing a number from 1 to 4 to the input ‘whichmodel’: 1 - subbasis selection approach; 2 - minimum  ℓ2-norm models (by defatul); 3 - minimum Frobenius norm models; and 4 - regression mnodels (recommended for noisy functions). Further details about each one can be found in [12].

If  p0 = |Y0| = n + 1, a linear model rather than an underdetermined quadratic model is built for each function. The reason is that, despite both having error bounds that are linear in  ∆for the first derivatives, the error bound for the latter includes also the norm of the model Hessian, as stated in Lemma 2.2 in [46], which makes it worse than the former.

Whenever  n + 1 < pk ≤ (n + 1)(n + 2)/2 = pmax, the algorithm builds underdetermined quadratic models basedon the choice of the user between the approaches described above. If regression models are considered instead, we set  pmax = (n + 1)(n + 2), which means that the sample set is allowed to have twice the number of sample points required for fully quadratic interpolation models. Notice that having a number of sample points much larger than the required for quadratic interpolation can also worsen the quality of the interpolation models as the sample set could contain points that are too far from the iterate, which is not ideal for models built for local approximation.

It is also possible to choose the initial degree of the models between fully linear, quadratic with a diagonal Hessian or fully quadratic. This is done within deft_funnel by setting the input argument cur_degree in the call to deft_funnel_set_parameters to one of the following options: model_size.plin, model_size.pdiag or model_size.pquad.

The interpolation system (9) is solved using a QR factorization of the matrix  M(φ, Y)within the function deft_funnel_computeP, which is called by deft_funnel_build_models.

In order to evaluate the error of the interpolation models and their derivatives with respect to the original functions f and c, we make use of the measure of well poisedness of Y given below.

Definition 3.1. Let  Y = {y0, y1, . . . , yp}be a poised interpolation set and  Pdnbe a space of polynomials of degree less than or equal to d on  Rn. Let  Λ > 0and  {ℓ0(x), ℓ1(x), . . . , ℓp(x)}be the basis of Lagrange polynomials associated with Y. Then, the set Y is said to be  Λ-poised in B for  Pdn(in the interpolation sense) if and only if

image

As it is shown in [12], the error bounds for at most fully quadratic models depend linearly on the constant  Λ; the smaller it is, the better the interpolation models approximate the original functions. We also note that the error bounds for undetermined quadratic interpolation models are linear in the diameter of the smallest ball containing Y for the first derivatives and quadratic for the function values.

Finally, since the constraint functions c(x) are replaced by surrogate models  mc(x)in the algorithm, we define the models  mz(x)def= (mc(x), h(x))and  mz(x, s)def= mz(x) − s, which are those used for computing new directions.

3.2.2 Subspace minimization

In this subsection, we explain how the subspace minimization is employed in our algorithm. We define the subspace Skat iteration k as

image

where  Lkdef= {i | [xk]i − [lx]i ≤ ϵb}and  Ukdef= {i | [ux]i − [xk]i ≤ ϵb}define the index sets of (nearly) active variables at their bounds, for some small constant  ϵb > 0. If  Lk ̸= ∅or  Uk ̸= ∅, a new well-poised interpolation set Zkis built and a recursive call is made in order to solve the problem in the new subspace  Sk.

If the algorithm converges in a subspace  Skwith an optimal solution  (˜x, ˜s), it checks if the latter is also optimal for the full-space problem, in which case the algorithm stops. If not, the algorithm continues by attempting to compute a new direction in the full space. This procedure is illustrated in Figure 2.

image

Figure 2: Subspace minimization procedure. The algorithm calls itself recursively in the order to solve the problem in a new subspace. If convergence is attained, it goes back to check if the solution found is also optimal in the full space.

The dimensionality reduction of the problem mitigates the chances of degeneration of the interpolation set when the sample points become too close to each other and thus affinely dependent. Figure 3 gives an example of this scenario as the optimal solution is approached.

image

Figure 3: Illustration of a scenario where the interpolation set becomes degenerated as the optimal solution is approached. In this example, we consider a two-dimensional problem with the bound constraint  [x]2 ≥ 0, which is active at the solution  x∗and at the iterates close to it.

In order to check the criticality in the full-space problem, a full-space interpolation set of degree n + 1 is built in an  ϵ-neighborhood around the point  x∗S, which is obtained by assembling the subspace solution  ˜xand the  |Lk ∪ Uk|fixed components  [xk]i. The models  mfkand  mckare then updated and the criticality step is entered.

The complete subspace minimization step is described in Algorithm 3.2 and it is implemented in the function deft_funnel_subspace_min, which is called inside deft_funnel_main.

image

3.2.3 The normal step

The normal step aims at reducing the constraint violation at given point (x, s) defined by

image

To ensure that the step  nkis normal to the linearized constraint  mz(xk, sk) + J(xk, sk)n = 0, where  J(x, s)def=(J(x) − I)is the Jacobian of  mz(x, s)with respect to (x, s) and J(x) is the Jacobian of  mz(x)with respect to x, we require that

image

for some  κn ≥ 1.

image

where

image

for some trust-region radius  ∆zk > 0. Finally, a funnel bound  vmaxkis imposed on the constraint violation  vk def=v(xk, sk)for the acceptance of new iterates to ensure the convergence towards feasibility.

We notice that, although a linear approximation of the constraints is used for calculating the normal step, the second-order information of the quadratic interpolation model  mz(x, s)is still used in the SQO model employed in the tangent step problem as it is shown next.

The subproblem (12) is solved within the function deft_funnel_normal_step, which makes use of an original active-set algorithm where the unconstrained problem is solved at each iteration in the subspace defined by the currently active bounds, themselves being determined by a projected Cauchy step. Each subspace solution is then computed using a SVD decomposition of the reduced matrix. This algorithm is implemented in the function deft_funnel_blls and is intended for small-scale bound-constrained linear least-squares problems.

3.2.4 The tangent step

The tangent step is a direction that improves optimality and it is computed by using a SQO model for the problem (4) after the normal step calculation. The quadratic model for the function objective function is defined as

image

where  mf(xk, sk) def= mf(xk), gk def= ∇(x,s)mf(xk, sk), and  Bkis the approximate Hessian of the Lagrangian function

image

with respect to (x, s), given by

image

where  ξsand  τ sare the Lagrange multipliers associated to the lower and upper bounds, respectively, on the slack variables s, and  ξxand  τ x, the Lagrange multipliers associated to the lower and upper bounds on the x variables. In (15),  Hk = ∇2xxmf(xk, sk), Zik = ∇2xxmzik(xk, sk)and the vector  ˆµkmay be viewed as a local approximation of the Lagrange multipliers with respect to the equality constraints  mz(x, s) = 0.

By applying (8) into (14), we obtain

image

where

image

Since (16) is a local approximation for the function  mf((xk, sk) + nk + t), a trust region with radius  ∆fkis used for the complete step  d = nk + t:

image

Moreover, given that the normal step was also calculated using local models, it makes sense to remain in the intersection of both trust regions, which implies that

image

In order to make sure that there is still enough space left for the tangent step within  Rk, we first check if the following constraint on the normal step is satisfied:

image

for some  κR ∈ (0, 1). If (20) holds, the tangent step is calculated by solving the following subproblem

image

where we require that the new iterate  xk + dkbelongs to subspace  Skand that it satisfies the bound constraints (6) and (7). In the Matlab code, the tangent step is calculated by the function deft_funnel_tangent_step, which in turn calls either the Matlab solver linprog or our implementation of the nonmonotone spectral projected gradient method [8] in deft_funnel_spg to solve the subproblem (21). The choice between both solvers is based on whether ∥Bk∥ ≤ ϵ, for a small  ϵ > 0, in which case we assume that the problem is linear and therefore linprog is used.

We define our f-criticality measure as

image

By definition,  πfkmeasures how much decrease could be obtained locally along the projection of the negative of the approximate gradient  gNkonto the nullspace of  J(xk, sk)intersected with the region delimited by the bounds. This measure is computed in deft_funnel_compute_optimality, which uses lingprog to solve the subproblem (23).

image

lem:

image

where

image

the matrix I is the  m × midentity matrix, the matrices  Isξand  Isτare obtained from I by removing the columns whose indices are not associated to any active (lower and upper, respectively) bound at  sk + nsk, the matrices  Ixξand  Ixτare obtained from the  n×nidentity matrix by removing the columns whose indices are not associated to any active (lower and upper, respectively) bound at  xk + nxk, and the Lagrange multipliers  (ˆξs, ˆτ s, ˆξx, ˆτ x)are those in  (ξs, τ s, ξx, τ x)associated to active bounds at  sk + nskand  xk + nxk. All the other Lagrange multipliers are set to zero.

The subproblem (24) is also solved using the active-set algorithm implemented in the function deft_funnel_blls.

3.2.5 Which steps to compute and retain

The algorithm computes normal and tangent steps depending on the measures of feasibility and optimality at each iteration. Differently from [42, 43], where the computation of the normal steps depends on the measure of optimality, here the normal step is computed whenever the following condition holds

image

for some small  ϵ > 0, i.e. preference is always given to feasibility. This choice is based on the fact that, in many real-life problems with expensive functions and a small budget, one seeks to find a feasible solution as fast as possible and that a solution having a smaller objective function value than the current strategy is already enough. If (25) fails, we set  nk = 0.

We define a v-criticality measure that indicates how much decrease could be obtained locally along the projection of the negative gradient of the Gauss-Newton model of v at  (xk, sk)onto the region delimited by the bounds as

image

We say that  (xk, sk)is an infeasible stationary point if  z(xk, sk) ̸= 0and  πvk = 0, in which case the algorithm terminates.

The procedure for the calculation of the normal step is given in the algorithm below. In the code, it is implemented in the function deft_funnel_normal_step, which calls the algorithm in deft_funnel_blls in order to solve the normal step subproblem (12).

image

If the solution of (23) is  rk = 0, then by (22) we have  πfk = 0, in which case we set  tk = 0. If the current iterate is farther from feasibility than from optimality, i.e., for a given a monotonic bounding function  ωt, the condition

image

fails, then we skip the tangent step computation by setting  tk = 0.

After the computation of the tangent step, the usefulness of the latter is evaluated by checking if the following conditions

image

and

image

where

image

and

image

are satisfied for some  κZS > 1and for  κδ ∈ (0, 1). The inequality (29) indicates that the predicted improvement in the objective function obtained in the tangent step is substantial compared to the predicted change in f resulting from the normal step. If (28) holds but (29) fails, the tangent step is not useful in the sense just discussed, and we choose to ignore it by resetting  tk = 0.

The tangent step procedure is stated in Algorithm 3.4 and it is implemented in the function deft_funnel_tangent_step.

image

3.2.6 Iteration types

Depending on the contributions of the current iteration in terms of optimality and feasibility, we classify it into three types:  µ-iteration, f-iteration and z-iteration. This is done by checking if some conditions hold for the trial point defined as

image

3.2.6.1 µ-iteration

If  dk = 0, which means that the Lagrange multiplier estimates are the only new values that have been computed, iteration k is said to be a  µ-iteration with reference to the Lagrange multipliers  µassociated to the constraints mz(x, s) = 0. Notice, however, that not only new  µkvalues have been computed, but all the other Lagrange multipliers  (ξsk, τ sk, ξxk, τ xk )as well.

In this case, we set  (xk+1, sk+1) = (xk, sk), ∆fk+1 = ∆fk, ∆zk+1 = ∆zk, vmaxk+1 = vmaxkand we use the new multipliers to build a new SQO model in (14).

Since null steps  dk = 0might be due to the poor quality of the interpolation models, we check the  Λ-poisedness in  µ-iterations and attempt to improve it whenever the following condition holds

image

and  ϵµ > 0. The inequality (33) gives an estimate of the error bound for the interpolation models. If (33) holds, we try to reduce the value at the left side by modifying the sample set  Yk. Firstly, we choose a constant  ξ ∈ (0, 1)and replace all points  yk,j ∈ Yksuch that

image

by new points  yk,j∗that (approximately) maximizes  |ℓjk(x)|in  B(xk; ξ∆(Yk)). Then we use the Algorithm 6.3 described in Chapter 6 in [12] with the smaller region B to improve  Λ-poisedness of the new sample set. This procedure is implemented in the Matlab code by the function deft_funnel_repair_sample_set.

3.2.6.2 f-iteration

If iteration k has mainly contributed to optimality, we say that iteration k is an f-iteration. Formally, this happens when  tk ̸= 0, (29) holds, and

image

Convergence of the algorithm towards feasibility is ensured by condition (34), which limits the constraint violation with the funnel bound.

In this case, we set  (xk+1, sk+1) = (x+k , s+k )) if

image

and  (xk+1, sk+1) = (xk, sk)) otherwise. Note that  δfk > 0(because of (30) and (29)) unless  (xk, sk)is first-order critical, and hence that condition (35) is well-defined. As for the value of the funnel bound, we set  vmaxk+1 = vmaxk.

Since our method can suffer from the Maratos effect [31], we also apply a second-order correction (see Chapter 15, Section 15.6, in [35] for more details) to the normal step whenever the complete direction  dkis unsuccessful at improving optimality, i.e., whenever the condition (35) fails. As the latter might be due to the local approximation of the constraint functions, this effect may be overcome with a second-order step  ˆnthat is calculated in deft_funnel_sec_order_correction by solving the following subproblem

image

where

image

3.2.6.3 z-iteration

If iteration k is neither a  µ-iteration nor a f-iteration, then it is said to be a z-iteration. This means that the major contribution of iteration k is to improve feasibility, which happens when either  tk = 0or when (29) fails.

We accept the trial point if the improvement in feasibility is comparable to its predicted value

image

and the latter is itself comparable to its predicted decrease along the normal step, that is

image

for some  κzn ∈ (0, 1 − κtg]and where

image

If (38) fails, the trial point is rejected.

Finally, the funnel bound is updated as follows

image

for some  κtx1 ∈ (0, 1)and  κtx2 ∈ (0, 1).

3.2.7 Criticality step

Two different criticality steps are employed: one for the subspaces  Skwith  dim(Sk) < nand one for the full space (dim(Sk) = n). In the latter, convergence is declared whenever at least one of the following conditions is satisfied: (1) the trust-region radius  ∆kis too small, (2) the computed direction  dkis too small or (3) both feasibility and optimality have been achieved and the error between the real functions and the models is expected to be sufficiently small. As it was mentioned before, this error is directly linked to the  Λ-poisedness measure given in Definition 3.1. In the subspace, we are less demanding and only ask that either  ∆kbe very small or both feasibility and optimality have been achieved without checking the models error though.

The complete criticality step in DEFT-FUNNEL is described in the next algorithm.

image

3.3 Maintenance of the interpolation set and trust-region updating strategy

The management of the geometry of the interpolation set is based on the self-correcting geometry scheme proposed in [44], where unsuccessful trial points are used to improve the geometry of the interpolation set. It depends on the criterion used to define successful iterations, which is passed to the algorithm through the parameter criterion. This parameter depends on the iteration type (µ, for z, as explained previously). In general, unsuccessful trial points replace other sample points in the interpolation set which maximize a combined criteria of distance and poisedness involving the trial point. Finally, we also notice that we do not make use of “dummy” interpolation points resulting from projections onto the subspaces as in [43] anymore. The whole procedure is described in Algorithm 3.6. The definition of the maximum cardinality of the interpolation set,  pmax, is given in Section 3.2.1.

Algorithm 3.6: UpdateInterpolationSet(Yk, xk, x+k,  ∆k, ϵi, criterion)

image

3: Replace a far interpolation point. If  |Yk| = pmax, criterion fails, either  xk ̸= ϑior  ∆k ≤ ϵi, and the set

image

4: Replace a close interpolation point. If  |Yk| = pmax, criterion fails, either  xk ̸= ϑior  ∆k ≤ ϵi, the set  Fkisempty, and the set

image

5: No replacements. If  |Yk| = pmax, criterion fails and either [xk = ϑiand  ∆k > ϵi] or  Fk ∪ Ck = ∅, then define Yk+1 = Yk.

The trust-region update strategy associated to f- and z-iterations are now described. Following the idea proposed in [20], the trust-region radii are allowed to decrease even when the interpolation set has been changed after the replacement of a far point or a close point at unsuccessful iterations. However, the number of times it can be shrunk in this case is limited to  νmaxfand  νmaxzas a means to prevent the trust regions from becoming too small. If the interpolation set has not been updated, the algorithm understands that the lack of success is not due to the surrogate models but rather to the trust region size and thus it reduces the latter.

image

The operations related to z-iterations follow below.

Algorithm 3.8: z-iteration(xk, sk, x+k,  s+k,  ∆fk, ∆zk)

1: Successful iteration. If (38) holds, set  (xk+1, sk+1) = (x+k , s+k ), ∆fk+1 = ∆fkand  νz = 0. The radius of  Nkis updated by

image

2: Unsuccessful iteration. If (38) fails, set  (xk+1, sk+1) = (xk, sk)and  ∆fk+1 = ∆fk. The radius of  Nkis updated by

image

3.3.1 The local-search algorithm

We now provide the full description of the local search which assembles all the previous subroutines.

image

3.4 Parameters tuning and user goals

Like any other algorithm, DEFT-FUNNEL performance can be affected by how its parameters are tuned. In this section, we discuss about which parameters might have a major impact in its performance and how they should be tuned depending on the user goals. We consider four main aspects concerning the resolution of black-box problems: the budget, the priority level given to feasibility, the type of the objective function and the priority level given to global optimality. We can then describe the possible scenarios in decreasing order of difficulty as below:

Budget: very low, limited or unlimited.

Priority to feasibility: high or low.

Objective function: highly multimodal, multimodal or unimodal.

Priority given to global optimality: high or low.

Clearly, if the objective function is highly multimodal and the budget is limited, one should give priority to a multistart strategy with a high number of samples per iteration in case where global optimality is important. This can be done via two ways: the first one is by reducing the budget for each local search through the optional input maxeval_ls, which equals maxeval*0.7 by default; for instance, one could try setting maxeval_ls = maxeval*0.4, so that each local search uses up to 40% of the total budget only. The other possibility is to increase the number N of random points generated at Step 3 in the global search (see Algorithm 3.1). In case where attaining the global minimum is not a condition, a better approach would be to give more budget to each local search so that the chances to reach a local minimum are higher. If the objective function is not highly multimodal, one should search for a good compromise between spending the budget on each local search and on the sampling of the multistart strategy.

We also notice that when the budget is too small and it is very hard to find a feasible solution, it may be a good idea to compute a tangent step only when feasibility has been achieved. This is due to the fact that tangent steps may still deteriorate the gains in feasibility obtained through normal steps. When this happens, more normal steps must be computed which requires more function evaluations. Therefore, instead of spending the budget with both tangent and normal steps without guarantee of feasibility in the end, it is a better strategy to compute only normal steps in the beginning so that the chances of obtaining a feasible solution are higher in the end. For this purpose, the user should set the constant value  κR = 0in (20). By doing so, the tangent step will be computed only if the normal step equals zero, which by (25) it happens when the iterate is feasible. In the code, this can be done by setting kappa_r to zero in the function deft_funnel_set_parameters.

We divide the numerical experiments into two sections: the first one is focused on the evaluation of the performance of DEFT-FUNNEL on black-box optimization problems, while the second one aims at analyzing the benefits of the exploitation of white-box functions on grey-box problems. In all experiments with DEFT-FUNNEL, minimum  ℓ2-norm models were employed. The criticality step threshold was set to  ϵ = 10−4and the trust-region constants were defined as  η1 = 10−4, η2 = 0.9, η3 = 0.6, γ1 = 0.5, γ2 = 2.0, νmaxf = 20 × nand  νmaxz = 20 × n, where n is the number of variables.

We compare DEFT-FUNNEL with two popular algorithms for constrained black-box optimization: the Genetic Algorithm (GA) and the Pattern Search (PS) algorithm from the Matlab Global Optimization Toolbox [32]. In particular, GA has been set with the Adaptive Feasible (’mutationadaptfeasible’) default mutation function and the Penalty (’penalty’) nonlinear constraint algorithm. As for PS, since it is a local optimization algorithm, it has been coupled with the Latin Hypercube Sampling (LHS) [33] method in order to achieve global optimality, a common strategy found among practitioners. Our experiments cover therefore three of the most popular approaches for solving black-box problems: surrogate-based methods, genetic algorithms and pattern-search methods. Other DFO algorithms have already been compared against DEFT-FUNNEL in previous papers (see [42, 43]) on a much larger set of test problems mainly designed for local optimization.

4.1 Black-box optimization problems

The three methods are compared on a set of 14 well-known benchmark problems for constrained global optimization, including four industrial design problems — Welded Beam Design (WB4) [13], Gas Transmission Compressor Design (GTCD4) [7], Pressure Vessel Design (PVD4) [11] and Speed Reducer Design (SR7) [17] — and the Harley pooling problem (problem 5.2.2 from [16]), which is originally a maximization problem and that has been converted into a minimization one. Besides the test problems originated from industrial applications, we have collected problems with different characteristics (multimodal, nonlinear, separable and non-separable, with connected and disconnected feasible regions) to have a broader view of the performance of the algorithms in various kinds of scenarios. For instance, the Hesse problem [23] is the result of the combination of 3 separable problems with 18 local minima and 1 global minimum, while the Gómez #3 problem, listed as the third problem in [18], consists of many disconnected feasible regions, thus having many local minima. The test problems G3-G11 are taken from the widely known benchmark list in [34]. In Table 3, we give the number of decision variables, the number of constraints and the best known feasible objective function value of each test problem.

Table 3: Problem name, number of decision variables, number of constraints (simple bounds not included) and the best known feasible objective function value of each test problem.

image

Two types of black-box experiments were conducted in order to compare the algorithms. In the first type, a small budget of 100 black-box calls is given to each algorithm in order to evaluate how they perform on difficult problems with highly expensive functions. In such scenarios, many algorithms have difficulties to obtain even local minima depending on the test problem. In the second type of experiments, we analyze their ability and speed to achieve global minima rather than local minima by allowing larger budgets that range from  100 × nto  500 × n, where n is the number of variables. We consider every function as black box in both types of experiments. Finally, we have run each algorithm 50 times on each test problem.

Only approximate feasible solutions of the problem (1) are considered when comparing the best objective function values obtained by the algorithms, i.e. we require that each optimal solution  x∗satisfy  cv(x∗) ≤ 10−4, where

image

In the next two subsections, we show the results for the two types of experiments in the black-box setting.

4.1.1 Budget-driven experiments

The results of the first type of experiments are shown in Table 4. In the second column,  fOPTdenotes the objective function value of the global minimum of the problem when it is known or the best known objective function value otherwise. For each solver, we show the best, the average and the worst objective function values obtained in 50 runs on every test problem.

As it can be seen in Table 4, DEFT-FUNNEL found the global minimum in 10 out of 14 problems, while GA and PS did it in only 5 problems. Besides, when considering the best value found by each solver, DEFT-FUNNEL was superior to the others or equal to the best solver in 12 problems. In the average and worse cases, it also presented a very good performance; in particular, its worse performance was inferior to all others’ in only 4 problems. Although GA did not reach the global minimum often, it presented the best average-case performance among all methods, while PS presented the worst. Finally, PS was the only one unable to reach a feasible solution in the Harley pooling problem.

4.1.2 Experiments driven by global minima

We now evaluate the ability of each solver to find global minima rather than local minima. The results of the second type of experiments for each test problem are presented individually, which allows a better analysis of the evolution of each solver performance over the number of function evaluations allowed. Each figure is thus associated to one single test problem and shows the average progress curve of each solver after 50 trials as a function of the budget.

In Figure 4, we show the results on test problems Harley, WB4, GTCD4 and PVD4. DEFT-FUNNEL and GA presented the best performance among the three methods, each one being superior to the other in 2 out of 4 problems. PS not only was inferior to the other two methods, but it also seemed not to be affected by the number of black-box

Table 4: Results for the first type of experiments on a budget of 100 black-box calls. For each solver, we show the best, the average and the worst objective function values obtained in 50 runs.

image

calls allowed, as it can be seen in Figures 4a, 4b and 4c. In particular, it did not find a feasible solution for the Harley problem at all. Moreover, the solutions found by PS had often much larger objective function values than those obtained by DEFT-FUNNEL and GA.

Figure 5 shows the results on test problems SR7, Hesse, Gómez #3 and G3. DEFT-FUNNEL and GA had similar performances on SR7, Hesse and G3 problems, while PS had the poorest performance. GA was the best method on Gómez #3, being very close to the global minimum in the end. Finally, PS performance on SR7 shows that allowing more black-box calls was not helpful and that the objective function value even increased.

Figure 6 shows the results on test problems G4, G6, G7, G8, G9 and G11. DEFT-FUNNEL was superior to all other methods, attaining global optimality on 4 problems independently of the number of evaluations allowed. GA

image

Figure 4: Mean best feasible objective function value obtained by each solver on 50 trials with budgets of  100 × n, 200 × n, 300 × nand  400 × nblack-box function evaluations.

was the second best, followed by PS. Besides that PS did not find a feasible solution on Harley pooling problem, there is a significant increase on its objective function value as the number of evaluations grows on test problems SR7 and G7. These 3 problems are the ones with the largest number of constraints, which could be a reason for its poor performance.

4.2 Grey-box optimization problems

In this section, DEFT-FUNNEL is compared with GA and PS on a set of artificial grey-box problems built by selecting a test problem and defining some of its functions as black boxes and the remaining as white boxes. Among the 5 grey-box problems considered in the experiments, 3 were used in the black-box experiments described in the previous subsection, where all functions were considered as black boxes, namely: Hesse, SR7 and GTCD4. The reuse of these test problems allows for evaluating the performance improvement of DEFT-FUNNEL in cases where some information is available and for comparing its performance with that obtained in the black-box setting. The remaining grey-box problems are the problems 21 and 23 from the well-known Hock-Schittkowski collection [24], denoted here as HS21 and HS23, respectively. Both HS21 and HS23 have nonlinear objective functions; however, in HS21 the objective function is defined as white box, while in HS23 it is defined is black box. The only constraint present in HS21 is defined as black box, while in HS23 there is a balance between both categories among the constraints. We have therefore attempted to cover different possibilities related to the type of functions in a grey-box setting. The derivatives of all functions defined as white boxes were given as input to DEFT-FUNNEL. The reader can find more details about the tested grey-box problems in Table 5.

image

Figure 5: Mean best feasible objective function value obtained by each solver on 50 trials with budgets of  100 × n, 200 × n, 300 × nand  400 × nblack-box function evaluations.

Table 5: Problem name, number of decision variables, number of black-box constraints, number of white-box con- straints, type of objective function – black box (BB) or white box (WB) – and the best known feasible objective function value of each test problem.

image

In Table 6, the results obtained with a budget of 100 black-box calls are presented. It can be seen that DEFTFUNNEL was the only one to reach the global minimum in every problem, while GA had the best average-case and worst-case performances in general. We also notice that the three solvers had similar performances on HS21, attaining all the global minimum without much difficulty.

When comparing the black-box and grey-box results obtained by DEFT-FUNNEL on problems GTCD4 and SR7, it is evident that the available information from the white-box functions contributed to improve its performance. Not only the best objective function values on these problems were improved, allowing for reaching the global minimum

image

Figure 6: Mean best feasible objective function value obtained by each solver on 50 trials with budgets of  100 × n, 200 × n, 300 × nand  400 × nblack-box function evaluations.

on SR7, but also the average and worst ones. Since DEFT-FUNNEL had already attained the global minimum on Hesse in the black-box setting, the only expected improvement would be in the average and worst cases, which did not happen in our experiments. This is probably due to the fact that this a multimodal problem with 18 local minima, being a combination of 3 separable problems and having 1 global minimum. Therefore, even if information about the function is partially available, the problem remains very difficult to solve due to its nature.

Table 6: Experiments with grey-box problems with a budget of 100 black-box calls. For each solver, we show the best, the average and the worst objective function values obtained in 50 runs.

image

We have introduced a new global optimization solver for general constrained grey-box and black-box optimization problems named DEFT-FUNNEL. It combines a stochastic multistart strategy with a trust-funnel sequential quadratic optimization algorithm where the black-box functions are replaced by surrogate models built from polynomial interpolation. The proposed solver is able to exploit available information from white-box functions rather than considering them as black boxes. Its code is open source and freely available at the Github repository http://github.com/phrsampaio/deft-funnel. Unlike many black-box optimization algorithms, it can handle both inequality and equality constraints and it does not require feasible starting points. Moreover, the constraints are treated individually rather than grouped into a penalty function.

We have shown that DEFT-FUNNEL compares favourably with other state-of-the-art algorithms available for the optimization community on a collection of well-known benchmark problems. The reported numerical results indicate that the proposed approach is very promising for grey-box and black-box optimization. Future research works include extensions for multiobjective optimization and mixed-integer nonlinear optimization as well as as parallel version of the solver.

[1] N. Amaioua, C. Audet, A. R. Conn, and S. L. Digabel. Efficient solution of quadratically constrained quadratic subproblems within the mesh adaptive direct search algorithm. European Journal of Operational Research, 268(1):13–24, 2018. ISSN 0377-2217. doi: https://doi.org/10.1016/j.ejor.2017.10.058. URL http://www. sciencedirect.com/science/article/pii/S0377221717309876.

[2] J. C. Armstrong and J. A. Favorite. Using a derivative-free optimization method for multiple solutions of inverse transport problems. Optimization and Engineering, 17(1):105–125, Mar 2016. ISSN 1573-2924. doi: 10.1007/ s11081-015-9306-x. URL https://doi.org/10.1007/s11081-015-9306-x.

[3] C. Audet and J. Dennis. Mesh adaptive direct search algorithms for constrained optimization. SIAM Journal on Optimization, 17(1):188–217, 2006. doi: 10.1137/040603371. URL https://doi.org/10.1137/040603371.

[4] C. Audet and W. Hare. Derivative-Free and Blackbox Optimization. Springer, Cham, 2017. ISBN 978-3-319-68912-8. doi: https://doi.org/10.1007/978-3-319-68913-5.

[5] C. Audet, S. L. Digabel, and M. Peyrega. Linear equalities in blackbox optimization. Computational Optimization and Applications, 61(1):1–23, May 2015. ISSN 1573-2894. doi: 10.1007/s10589-014-9708-2. URL https://doi.org/10.1007/s10589-014-9708-2.

[6] I. Bajaj, S. S. Iyer, and M. M. F. Hasan. A trust region-based two phase algorithm for constrained black-box and grey-box optimization with infeasible initial point. Computers & Chemical Engineering, 116:306– 321, 2018. ISSN 0098-1354. doi: https://doi.org/10.1016/j.compchemeng.2017.12.011. URL http://www. sciencedirect.com/science/article/pii/S0098135417304404.

[7] C. S. Beightler and D. T. Phillips. Applied Geometric Programming. John Wiley & Sons Inc, New York, 1976.

[8] E. G. Birgin, J. M. Martínez, and M. Raydan. Nonmonotone spectral projected gradient methods on convex sets. SIAM Journal on Optimization, 10(4):1196–1211, 2000.

[9] F. Boukouvala, M. M. F. Hasan, and C. A. Floudas. Global optimization of general constrained grey-box models: new method and its application to constrained pdes for pressure swing adsorption. Journal of Global Optimization, 67(1):3–42, Jan 2017. ISSN 1573-2916. doi: 10.1007/s10898-015-0376-2. URL https://doi.org/10.1007/s10898-015-0376-2.

[10] L. Bueno, A. Friedlander, J. Martínez, and F. Sobral. Inexact restoration method for derivative-free optimization with smooth constraints. SIAM Journal on Optimization, 23(2):1189–1213, 2013. doi: 10.1137/110856253. URL https://doi.org/10.1137/110856253.

[11] C. A. C. Coello and E. M. Montes. Constraint-handling in genetic algorithms through the use of dominance- based tournament selection. Advanced Engineering Informatics, 16(3):193–203, 2002. ISSN 1474–0346. doi: https://doi.org/10.1016/S1474-0346(02)00011-3. URL http://www.sciencedirect.com/science/ article/pii/S1474034602000113.

[12] A. R. Conn, K. Scheinberg, and L. N. Vicente. Introduction to derivative-free optimization. MPS-SIAM Book Series on Optimization, Philadelphia, 2009.

[13] K. Deb. An efficient constraint handling method for genetic algorithms. Computer Methods in Applied Mechanics and Engineering, 186(2):311 – 338, 2000. ISSN 0045-7825. doi: https://doi.org/10.1016/S0045-7825(99) 00389-8. URL http://www.sciencedirect.com/science/article/pii/S0045782599003898.

[14] N. Echebest, M. L. Schuverdt, and R. P. Vignau. An inexact restoration derivative-free filter method for nonlinear programming. Computational and Applied Mathematics, 36(1):693–718, Mar 2017. ISSN 1807-0302. doi: 10.1007/s40314-015-0253-0. URL https://doi.org/10.1007/s40314-015-0253-0.

[15] C. Floudas. Deterministic Global Optimization: Theory, Methods and Applications. Springer, Boston, MA, 2000. ISBN 978-1-4419-4820-5. doi: https://doi.org/10.1007/978-1-4757-4949-6.

[16] C. Floudas, P. Pardalos, C. Adjiman, W. R. Esposito, Z. H. Gümüs, S. T. Harding, J. L. Klepeis, C. A. Meyer, and C. A. Schweiger. Handbook of Test Problems in Local and Global Optimization. Springer US, 1999. ISBN 978-0-7923-5801-5. doi: 10.1007/978-1-4757-3040-1.

[17] C. A. Floudas and P. M. Pardalos. A Collection of Test Problems for Constrained Global Optimization Algorithms. Springer-Verlag, Berlin, Heidelberg, 1990. ISBN 0-387-53032-0.

[18] S. Gómez and A. V. Levy. The tunnelling method for solving the constrained global optimization problem with several non-connected feasible regions. In J. P. Hennart, editor, Numerical Analysis, pages 34–47, Berlin, Heidelberg, 1982. Springer Berlin Heidelberg. ISBN 978-3-540-38986-6.

[19] N. I. M. Gould and P. L. Toint. Nonlinear programming without a penalty function or a filter. Mathematical Programming, 122(1):155–196, Mar 2010. ISSN 1436-4646. doi: 10.1007/s10107-008-0244-7. URL https: //doi.org/10.1007/s10107-008-0244-7.

[20] S. Gratton, P. L. Toint, and A. Tröltzsch. An active-set trust-region method for bound-constrained nonlinear optimization without derivatives. Optimization Methods and Software, 26(4-5):875–896, 2011.

[21] A. Griewank. A mathematical view of automatic differentiation. Acta Numerica, 12:321––398, 2003. doi: 10.1017/S0962492902000132.

[22] A. Griewank and A. Walther. Evaluating Derivatives. Society for Industrial and Applied Mathematics, second edition, 2008. doi: 10.1137/1.9780898717761. URL https://epubs.siam.org/doi/abs/10.1137/1. 9780898717761.

[23] R. Hesse. A heuristic search procedure for estimating a global solution of nonconvex programming problems. Operations Research, 21(6):1267–1280, 1973. doi: 10.1287/opre.21.6.1267. URL https://doi.org/10. 1287/opre.21.6.1267.

[24] W. Hock and K. Schittkowski. Test examples for nonlinear programming codes. Journal of Optimization Theory and Applications, 30(1):127–129, 1980. doi: 10.1007/BF00934594. URL https://doi.org/10.1007/ BF00934594.

[25] D. R. Jones, M. Schonlau, and W. J. Welch. Efficient global optimization of expensive black-box functions. Journal of Global Optimization, 13(4):455–492, Dec 1998. ISSN 1573-2916. doi: 10.1023/A:1008306431147. URL https://doi.org/10.1023/A:1008306431147.

[26] A. H. G. R. Kan and G. T. Timmer. Stochastic global optimization methods part i: Clustering methods. Mathematical Programming, 39(1):27–56, Sep 1987. ISSN 1436-4646. doi: 10.1007/BF02592070. URL https://doi.org/10.1007/BF02592070.

[27] A. H. G. R. Kan and G. T. Timmer. Stochastic global optimization methods part ii: Multi level methods. Mathematical Programming, 39(1):57–78, Sep 1987. ISSN 1436-4646. doi: 10.1007/BF02592071. URL https://doi.org/10.1007/BF02592071.

[28] J. Larson, M. Menickelly, and S. M. Wild. Derivative-free optimization methods. Acta Numerica, 28:287–404, 2019. doi: 10.1017/S0962492919000060.

[29] R. Lewis and V. Torczon. A globally convergent augmented lagrangian pattern search algorithm for optimization with general constraints and simple bounds. SIAM Journal on Optimization, 12(4):1075–1089, 2002. doi: 10.1137/S1052623498339727. URL https://doi.org/10.1137/S1052623498339727.

[30] M. Locatelli. Relaxing the assumptions of the multilevel single linkage algorithm. Journal of Global Optimization, 13(1):25–42, Jan 1998. ISSN 1573-2916. doi: 10.1023/A:1008246031222. URL https://doi.org/10. 1023/A:1008246031222.

[31] N. Maratos. Exact penalty function algorithms for finite dimensional and control optimization problems. Department of Control Theory, Imperial College London, 1978. URL https://books.google.fr/books?id= Ar2AtgAACAAJ.

[32] MATLAB. 2015b. The MathWorks Inc., Natick, Massachusetts, 2015.

[33] M. D. McKay, R. J. Beckman, and W. J. Conover. A comparison of three methods for selecting values of input variables in the analysis of output from a computer code. Technometrics, 21(2):239–245, 1979. ISSN 00401706. URL http://www.jstor.org/stable/1268522.

[34] Z. Michalewicz and M. Schoenauer. Evolutionary algorithms for constrained parameter optimization problems. Evolutionary Computation, 4(1):1–32, March 1996. doi: 10.1162/evco.1996.4.1.1.

[35] J. Nocedal and S. J. Wright. Numerical optimization. Springer Series in Operations Research and Financial Engineering. Springer, New York, NY, 2. ed. edition, 2006. ISBN 978-0-387-30303-1.

[36] M. J. D. Powell. A direct search optimization method that models the objective and constraint functions by linear interpolation. In S. Gomez and J.-P. Hennart, editors, Advances in Optimization and Numerical Analysis, pages 51–67. Springer Netherlands, Dordrecht, 1994. ISBN 978-94-015-8330-5. doi: 10.1007/978-94-015-8330-5_4. URL https://doi.org/10.1007/978-94-015-8330-5_4.

[37] R. G. Regis. Stochastic radial basis function algorithms for large-scale optimization involving expensive black- box objective and constraint functions. Computers & Operations Research, 38(5):837–853, 2011. ISSN 0305-0548. doi: https://doi.org/10.1016/j.cor.2010.09.013. URL http://www.sciencedirect.com/science/ article/pii/S030505481000208X.

[38] R. G. Regis. Constrained optimization by radial basis function interpolation for high-dimensional expensive black-box problems with infeasible initial points. Engineering Optimization, 46(2):218–243, 2014. doi: 10. 1080/0305215X.2013.765000. URL https://doi.org/10.1080/0305215X.2013.765000.

[39] R. G. Regis and C. A. Shoemaker. Constrained global optimization of expensive black box functions using radial basis functions. Journal of Global Optimization, 31(1):153–171, Jan 2005. ISSN 1573-2916. doi: 10.1007/ s10898-004-0570-0. URL https://doi.org/10.1007/s10898-004-0570-0.

[40] R. G. Regis and C. A. Shoemaker. A stochastic radial basis function method for the global optimization of expensive functions. INFORMS Journal on Computing, 19(4):497–509, 2007. doi: 10.1287/ijoc.1060.0182. URL https://doi.org/10.1287/ijoc.1060.0182.

[41] L. M. Rios and N. V. Sahinidis. Derivative-free optimization: a review of algorithms and comparison of software implementations. Journal of Global Optimization, 56(3):1247–1293, Jul 2013. ISSN 1573-2916. doi: 10.1007/ s10898-012-9951-y. URL https://doi.org/10.1007/s10898-012-9951-y.

[42] P. R. Sampaio and P. L. Toint. A derivative-free trust-funnel method for equality-constrained nonlinear op- timization. Computational Optimization and Applications, 61(1):25–49, May 2015. ISSN 1573-2894. doi: 10.1007/s10589-014-9715-3. URL https://doi.org/10.1007/s10589-014-9715-3.

[43] P. R. Sampaio and P. L. Toint. Numerical experience with a derivative-free trust-funnel method for nonlinear optimization problems with general nonlinear constraints. Optimization Methods and Software, 31(3):511–534, 2016. doi: 10.1080/10556788.2015.1135919. URL https://doi.org/10.1080/10556788.2015.1135919.

[44] K. Scheinberg and P. L. Toint. Self-correcting geometry in model-based algorithms for derivative-free uncon- strained optimization. SIAM Journal on Optimization, 20(6):3512–3532, 2010.

[45] J.-O. H. Sendín, J. R. Banga, and T. Csendes. Extensions of a multistart clustering algorithm for constrained global optimization problems. Industrial & Engineering Chemistry Research, 48(6):3014–3023, 2009. doi: 10.1021/ie800319m. URL https://doi.org/10.1021/ie800319m.

[46] H. Zhang, A. Conn, and K. Scheinberg. A derivative-free algorithm for least-squares minimization. SIAM Journal on Optimization, 20(6):3555–3576, 2010. doi: 10.1137/09075531X. URL https://doi.org/10. 1137/09075531X.


Designed for Accessibility and to further Open Science