Processing math: 19%
Research article

The worst-case scenario: robust portfolio optimization with discrete distributions and transaction costs

  • Received: 14 March 2024 Revised: 27 May 2024 Accepted: 30 May 2024 Published: 28 June 2024
  • MSC : 91B05, 91G10

  • This research introduces min-max portfolio optimization models that incorporating transaction costs and focus on robust Entropic value-at-risk. This study offers a unified approach to handl the distribution of random parameters that affect the reward and risk aspects. Utilizing the duality theorem, the study transforms the optimization models into manageable forms, thereby accommodating the underlying random variables' discrete box and ellipsoidal distributions. The impact of transaction costs on optimal portfolio selection is examined through numerical examples under a robust return-risk framework. The results underscore the importance of the proposed model in safeguarding capital and reducing exposure to extreme risks, thus outperforming other strategies documented in the literature. This demonstrates the model's effectiveness in balancing maximizing returns and minimizing potential losses, making it a valuable tool for investors that seek to navigate uncertain financial markets.

    Citation: Ebenezer Fiifi Emire Atta Mills. The worst-case scenario: robust portfolio optimization with discrete distributions and transaction costs[J]. AIMS Mathematics, 2024, 9(8): 20919-20938. doi: 10.3934/math.20241018

    Related Papers:

    [1] Xiaowei Fang . A derivative-free RMIL conjugate gradient method for constrained nonlinear systems of monotone equations. AIMS Mathematics, 2025, 10(5): 11656-11675. doi: 10.3934/math.2025528
    [2] Xuejie Ma, Songhua Wang . A hybrid approach to conjugate gradient algorithms for nonlinear systems of equations with applications in signal restoration. AIMS Mathematics, 2024, 9(12): 36167-36190. doi: 10.3934/math.20241717
    [3] Habibu Abdullahi, A. K. Awasthi, Mohammed Yusuf Waziri, Issam A. R. Moghrabi, Abubakar Sani Halilu, Kabiru Ahmed, Sulaiman M. Ibrahim, Yau Balarabe Musa, Elissa M. Nadia . An improved convex constrained conjugate gradient descent method for nonlinear monotone equations with signal recovery applications. AIMS Mathematics, 2025, 10(4): 7941-7969. doi: 10.3934/math.2025365
    [4] Xiyuan Zhang, Yueting Yang . A new hybrid conjugate gradient method close to the memoryless BFGS quasi-Newton method and its application in image restoration and machine learning. AIMS Mathematics, 2024, 9(10): 27535-27556. doi: 10.3934/math.20241337
    [5] Yixin Li, Chunguang Li, Wei Yang, Wensheng Zhang . A new conjugate gradient method with a restart direction and its application in image restoration. AIMS Mathematics, 2023, 8(12): 28791-28807. doi: 10.3934/math.20231475
    [6] Abdulkarim Hassan Ibrahim, Poom Kumam, Auwal Bala Abubakar, Umar Batsari Yusuf, Seifu Endris Yimer, Kazeem Olalekan Aremu . An efficient gradient-free projection algorithm for constrained nonlinear equations and image restoration. AIMS Mathematics, 2021, 6(1): 235-260. doi: 10.3934/math.2021016
    [7] Rabiu Bashir Yunus, Ahmed R. El-Saeed, Nooraini Zainuddin, Hanita Daud . A structured RMIL conjugate gradient-based strategy for nonlinear least squares with applications in image restoration problems. AIMS Mathematics, 2025, 10(6): 14893-14916. doi: 10.3934/math.2025668
    [8] Sani Aji, Poom Kumam, Aliyu Muhammed Awwal, Mahmoud Muhammad Yahaya, Kanokwan Sitthithakerngkiet . An efficient DY-type spectral conjugate gradient method for system of nonlinear monotone equations with application in signal recovery. AIMS Mathematics, 2021, 6(8): 8078-8106. doi: 10.3934/math.2021469
    [9] Jamilu Sabi'u, Ibrahim Mohammed Sulaiman, P. Kaelo, Maulana Malik, Saadi Ahmad Kamaruddin . An optimal choice Dai-Liao conjugate gradient algorithm for unconstrained optimization and portfolio selection. AIMS Mathematics, 2024, 9(1): 642-664. doi: 10.3934/math.2024034
    [10] Maulana Malik, Ibrahim Mohammed Sulaiman, Auwal Bala Abubakar, Gianinna Ardaneswari, Sukono . A new family of hybrid three-term conjugate gradient method for unconstrained optimization with application to image restoration and portfolio selection. AIMS Mathematics, 2023, 8(1): 1-28. doi: 10.3934/math.2023001
  • This research introduces min-max portfolio optimization models that incorporating transaction costs and focus on robust Entropic value-at-risk. This study offers a unified approach to handl the distribution of random parameters that affect the reward and risk aspects. Utilizing the duality theorem, the study transforms the optimization models into manageable forms, thereby accommodating the underlying random variables' discrete box and ellipsoidal distributions. The impact of transaction costs on optimal portfolio selection is examined through numerical examples under a robust return-risk framework. The results underscore the importance of the proposed model in safeguarding capital and reducing exposure to extreme risks, thus outperforming other strategies documented in the literature. This demonstrates the model's effectiveness in balancing maximizing returns and minimizing potential losses, making it a valuable tool for investors that seek to navigate uncertain financial markets.


    Systems of nonlinear equations are fundamental to a diverse range of applications, including power flow analysis [1], economic equilibrium modeling [2], the development of generalized Bregman distance proximal point methods [3], and traffic assignment [4]. Meanwhile, these systems also involve monotone variational inequalities [5,6] and compression sensing problems [7,8]. Given the ubiquity and significance of such problems across these varied domains, the study and development of numerical methods to efficiently solve systems of nonlinear equations are of considerable practical importance. In this paper, we focus on a specific class of systems of nonlinear equations subject to convex constraints, which can be formulated as follows:

    θ(a)=0,aΘ, (1.1)

    where ΘRn is a non-empty, and closed convex set. The function θ:RnRn is assumed to possess monotonicity and continuous differentiability, satisfying the following condition:

    θ(a)θ(b),ab0,a,bRn.

    Generally, the gradient-type method generates a sequence {ak}, defined as follows:

    ak+1=ak+tkdk,k0,

    where tk is the step length, and dk denotes the search direction. The choice of the search direction dk gives rise to various gradient-type methods, such as the steepest descent methods, Newton's methods, and quasi-Newton methods [9,10]. Newton's and quasi-Newton methods, along with their numerous variants, have been extensively studied due to their strong local linear convergence properties. For instance, Mahdavi et al. [11] proposed and analyzed a nonmonotone quasi-Newton algorithm for strongly convex multiobjective optimization, demonstrating its global convergence and local superlinear convergence rate under certain conditions. Sihwail et al. [12] proposed a novel hybrid method, Newton-Harris hawks optimization, which combines Newton's methods and Harris hawks optimization to effectively solve systems of nonlinear equations. Moreover, Krutikov et al. [13] demonstrated that quasi-Newton methods, when applied to strongly convex functions with a Lipschitz gradient, achieve geometric convergence without relying on local quadratic approximations. However, despite these advantages, Newton's and quasi-Newton methods involve the computation of the Hessian matrix or its approximation value at each iteration, which significantly increases computational complexity. This requirement can be a limiting factor, particularly for large-scale problems where the Hessian matrix is difficult to compute and store efficiently.

    The conjugate gradient method [14,15] is one of the most effective approaches in the field of the gradient-type methods. It is highly recognized for its efficiency, simplicity, lower storage requirements, and reliable convergence properties. These characteristics make it particularly well-suited for solving large-scale systems of nonlinear equations [16,17]. The method's search direction is typically defined as follows:

    dk={θk,k=0,θk+βkdk1,k1,

    where θkθ(ak) and βk is known as the conjugate parameter. The choice of βk differentiates various conjugate gradient methods. Several advancements have been made in the development of conjugate gradient methods with different conjugate parameters [18]. For instance, Ma et al. [19] proposed a modified inertial three-term conjugate gradient method for solving nonlinear monotone equations with convex constraints. This method is notable for its global and Q-linear convergence properties, and has demonstrated superior numerical performance in applications such as sparse signal recovery and image restoration in compressed sensing. Furthermore, Liu et al. [20] introduced a spectral conjugate gradient method with an inertial factor for solving nonlinear pseudo-monotone equations over a convex set. Additionally, Sabiu et al. [21] developed an optimal scaled Perry conjugate gradient method for solving large-scale systems of monotone nonlinear equations. This method ensures global convergence under the conditions of monotonicity and Lipschitz continuity.

    Inspired by the classical Liu-Story (LS) [22] and Rivai-Mohamad-Ismail-Leong (RMIL) [23] conjugate parameters, as well as incorporating the hybrid technique (e.g, [24,25]) and the projection approach, we develop a modified LS-RMIL-type conjugate gradient projection algorithm. The proposed algorithm is specifically designed for solving systems of nonlinear equations with convex constraints. In this paper, and , represent the Euclidean norm and the inner product of vectors, respectively.

    In this section, we refine and enhance the search direction employed in the optimization processes of the LS and RMIL methods. Specifically, Liu et al. [22] and Rivai et al. [23] introduced conjugate parameters, defined respectively as:

    βLSk=θk,yk1θk1,dk1,βRMILk=θk,yk1dk12.

    Based on the insights derived from these parameters, we adopt the hybrid technique (e.g., [24,25]) that combines their key features. This leads to the formulation of a new conjugate parameter, which is subsequently incorporated into the framework of a three-term search direction. Our primary objective is to construct a novel search direction that ensures both the sufficient descent and trust-region properties, which are critical for the robustness and efficiency of the optimization process. To accomplish this, we carefully design a novel search direction tailored to meet these requirements. The designed search direction dk is defined as follows:

    dk={θk,k=0,θk+βkdk1+ϖkyk1,k1, (2.1)

    where the conjugate parameter βk and the scalar parameter ϖk are given by

    βk=θk,yk1ckyk12θk,dk1c2kandϖk=νkθk,dk1ck, (2.2)

    with yk1=θkθk1. One scalar parameter ck is crucial for maintaining stability in the iterative process, and is defined by

    ck=max{μdk1yk1,θk1,dk1,dk12},

    where μ is a positive constant. Another scalar parameter νk is introduced to fine-tune the adjustment of the search direction. It is defined as νk=min{˜ν,max{ˉνk,0}} with 0<˜ν<1, and ˉνk=θk,yk1sk1θk2, where sk1=akak1 represents the difference between the iterative points ak and ak1 of the optimization variable.

    Before delving into the sufficient descent and trust-region properties of the designed search direction (2.1), we can deduce some important bounds from the definition of βk and ϖk. We consider the bound for βk:

    |βk|θkyk1ck+yk12θkdk1c2k,

    which can be further bounded by

    |βk|θkyk1μdk1yk1+yk12θkdk1μ2dk12yk12.

    Simplifying this, we obtain

    |βk|(1μ+1μ2)θkdk1. (2.3)

    Next, we consider the bound for ϖk:

    |ϖk|νkθkdk1ck˜νkθkdk1μdk1yk1=˜νμθkyk1. (2.4)

    Lemma 1. The search direction dk generated by (2.1) satisfies the sufficient descent property:

    θk,dkMθk2,

    where M=114(1+˜ν)2.

    Proof. For k=0, the conclusion is straightforward, which implies θ0,d0=θ02Mθ02. For k1, together with the search direction generated by (2.1), we have:

    θk,dk=θk,θk+βkdk1+ϖkyk1=θk2+θk,yk1θk,dk1ckyk12θk,dk12c2k+νkθk,yk1θk,dk1ck=θk2+(1+νk)θk,yk1θk,dk1ckyk12θk,dk12c2k. (2.5)

    By applying the inequality ek,gk12(ek2+gk2), where ek=(1+νk)θk/2 and gk=2θk,dk1yk1/ck, we obtain the following result:

    (1+νk)θk,yk1θk,dk1ck14(1+νk)2θk2+θk,dk12yk12c2k. (2.6)

    Substituting (2.6) into (2.5), we obtain

    θk,dkθk2+14(1+˜νk)2θk2(114(1+˜ν)2)θk2.

    Thus, the result holds.

    Lemma 2. The search direction dk generated by (2.1) satisfies the trust-region property:

    MθkdkNθk,

    where N=1+1μ+1μ2+˜νμ.

    Proof. From Lemma 1, we have θkdkθk,dkMθk2, which implies:

    dkMθk.

    Additionally, together with (2.1), we obtain:

    dk=θk+βkdk1+ϖkyk1θk+|βk|dk1+|ϖk|yk1.

    Substituting the inequalities |βk| and |ϖk| defined in (2.3) and (2.4), respectively, into the above equality, we have

    dk(1+1μ+1μ2+˜νμ)θk.

    Thus, the result holds.

    Before delving into the specifics of our proposed algorithm, it is essential to first clarify the line search approach, the projection operator, and the iterative update rule employed in the proposed algorithm. These foundational components play a crucial role in the overall efficacy of the proposed algorithm.

    First, in the proposed algorithm, the line search approach is used to determine an appropriate step length tk=ηρik. Specifically, this step length is computed based on the following procedure, where ik={i:i=0,1,} is the smallest non-negative integer i that satisfies the following inequality:

    θ(ak+ηρidk),dkσηρiθ(ak+ηρidk)dk2, (2.7)

    where η>0, ρ(0,1), and σ>0 are algorithmic parameters.

    Furthermore, the projection operator PΘ[] is a critical component that ensures the iterative points remain within the feasible region Θ. Specifically, the projection of a point aRn onto the set Θ is defined as

    PΘ[a]=argmin{ab:bΘ},aRn.

    This operator identifies the point in Θ closest to a in the Euclidean norm. Moreover, the projection operator is non-expansive, meaning it satisfies the property:

    PΘ[a]PΘ[b]ab. (2.8)

    Finally, the iterative update rule forms the core of the proposed algorithm, indicating how the next iterative point ak+1 is computed from the current iterative point ak. Specifically, the update is performed by using the following formula:

    ak+1=PΘ[akγwkθ(zk)],wk=θ(zk),akzk||θ(zk)||2, (2.9)

    where zk=ak+tkdk and γ(0,2). This projection-based update ensures that the new iterative point remains feasible and moves towards reducing the objective function.

    With the foundational components described above, we now present the detailed steps of an improved LS-RMIL-type conjugate gradient projection algorithm (Abbr. ILR algorithm), which is described as Algorithm 1.

    Algorithm 1 An improved LS-RMIL-type conjugate gradient projection algorithm
      1: Initialization: a0Rn, μ>0, ˜ν(0,1), η,σ>0, ρ(0,1), τ>0, and set k:=0.
      2: while θk>τ do
      3:        Evaluate two parameters βk and ϖk from (2.2) and search direction dk from (2.1).
      4:        Evaluate the step length tk from (2.7) and set the trial point zk=ak+tkdk.
      5:        if zkΘ and θ(zk)<τ then
      6:                break.
      7:        else
      8:                Evaluate the next iterative point ak+1 from (2.9).
      9:        end if
    10:        Set k:=k+1.
    11: end while

    In this section, we provide a comprehensive analysis of the global convergence properties of the ILR algorithm. To facilitate this analysis, we introduce the following key assumptions.

    Assumption B:

    (B1) The solution set Θ of problem (1.1) is non-empty.

    (B2) The function θ(a) exhibits a monotonicity property, i.e.,

    θ(a)θ(b),ab0,a,bRn.

    These assumptions are fundamental in establishing the convergence behavior of the ILR algorithm as they ensure that the iterative process converges to a solution within the feasible region of problem (1.1).

    The following lemma demonstrates that the line search approach defined in (2.7) of the ILR algorithm is indeed well-defined and can be successfully applied in the iterative process.

    Lemma 3. Consider the sequence {tk} generated by the ILR algorithm. Then, there exists a step length tk at each iteration that satisfies the line search approach defined in (2.7).

    Proof. We proceed by contradiction and assume that inequality (2.7) does not hold. Specifically, suppose there exists a positive index k0 such that, for all i{0}N, the following inequality is satisfied:

    θ(ak0+ηρidk0),dk0<σηρiθ(ak0+ηρidk0)dk02.

    By utilizing the continuity of θ and taking the limit as i, the above inequality yields:

    θ(ak0),dk00. (3.1)

    On the other hand, invoking Lemma 1 and again taking the limit as i, we obtain:

    θ(ak0),dk0Mθ(ak0)2>0,

    which clearly contradicts inequality (3.1). This contradiction implies that the initial assumption must be false, and therefore inequality (2.7) must hold.

    The following lemma establishes that the sequence {ak} generated by the ILR algorithm exhibits monotonic behavior with respect to the solutions set Θ of problem (1.1).

    Lemma 4. Consider the sequences {ak} and {zk} generated by the ILR algorithm. Then, the following properties hold:

    (i) The sequence {ak} is bounded, meaning that there exists a constant D>0 such that akD for all k0.

    (ii) The sequence {zk} converges to the sequence {ak}, i.e., limkzkak=0.

    Proof. From the definition of the projection operator PΘ[] and the non-expensive property defined in (2.8), we can derive the following inequality:

    ak+1a2=PΘ[akγwkθ(zk)]PΘ[a]2akγwkθ(zk)a2=aka22γwkθ(zk),aka+γ2w2kθ(zk)2, (3.2)

    where a denotes a solution of problem (1.1). Next, starting from Assumption B2, the definition of zk, and the line search approach (2.7), we can further establish the following inequality:

    θ(zk),aka=θ(zk),akzk+θ(zk),zkaθ(a),zkaθ(zk),akzkσt2kθ(zk)dk2. (3.3)

    Combining with (3.2), (3.3), and the definition of wk, we can derive

    ak+1a2aka22γwkθ(zk),akzk+γ2w2kθ(zk)2,=aka22γw2kθ(zk)2+γ2w2kθ(zk)2,=aka2(2γγ2)w2kθ(zk)2, (3.4)

    Given the definition of wk and (3.3), we have

    θ(zk)2wk=θ(zk),akzkσt2kθ(zk)dk2,

    which implies that θ(zk)wkσt2kdk2. Substituting this into (3.4), we obtain

    ak+1a2aka2(2γγ2)(σt2kdk2)2,=aka2(2γγ2)σ2t4kdk4,=aka2(2γγ2)σ2akzk4. (3.5)

    This result indicates that the sequence {aka} is monotonically decreasing, meaning that it consistently reduces as k increases. Hence, the sequence {ak} is bounded.

    By reorganizing the formula defined in (3.5), we obtain

    (2γγ2)σ2k=0akzk4k=0(aka2ak+1a2)a0a. (3.6)

    This implies that limkzkak=0.

    Theorem 1. Consider the sequence {θk} generated by the ILR algorithm. Then, the following conclusion is satisfied:

    limkθk=0. (3.7)

    Proof. To demonstrate the desired result, we begin by assuming the contrary. Suppose that there exists a constant A1>0 such that θk>A1 for all k0. This assumption, combined with Lemma 2, gives us the following relation dkMθk>M A1 for all k0. Given the continuity of the function θ(a) and the boundedness of the sequence {ak}, it follows that the sequence {θk} is also bounded. In other words, there exists a non-negative constant A2 such that θkA2 for all \(k \geq 0\). By incorporating this bound with Lemma 2, we obtain dkNθkNA2 for all k0. The two inequalities derived above imply that the sequence {dk} is bounded. Together with Lemma 4(ii) and the definition of zk, we have limkzkak=limkak+tkdkak=limktkdk=0, which leads to the conclusion that limktk=0 with the boundedness of the sequence {dk}.

    Since the sequences {ak} and {dk} are both bounded, we can extract two convergent subsequences, {aki} and {dki}, such that limi,iKaki=ˉa and limi,iKdki=ˉd, where K denotes an infinite index set. Utilizing Lemma 1, we have θki,dkiMθki2. Taking the limit as i in the above inequality and invoking the continuity of θ(a), we obtain

    θ(ˉa),ˉdMθ(ˉa)2MA21>0.

    Furthermore, we adopt the line search approach defined in (2.7), which implies the following inequality holds: θ(aki+(ηρ)1tkidki),dki<ση(ηρ)1tkiθ(aki+(ηρ)1tkidki)dki2. Taking the limit as i in the above inequality, and using the continuity of θ(a), we conclude

    θ(ˉa),ˉd0.

    These two results directly contradict each other. Therefore, the assumption that θk>A1 for all \(k \geq 0\) must be false, and the desired result follows.

    In this section, we evaluate the effectiveness of the proposed ILR algorithm through a comprehensive set of numerical experiments. These experiments are designed to solve large-scale systems of nonlinear equations with convex constraints, thereby assessing the algorithm's computational efficiency. For benchmarking purposes, we compare the ILR algorithm with two established methods (e.g., VRMILP and DFPRPMHS) across various test problems, initial points, and dimensional settings.

    In this section, we utilize the ILR algorithm to address large-scale systems of nonlinear equations with convex constraints. We then compare it with two existing algorithms: the VRMILP algorithm [26] and the DFPRPMHS algorithm [27]. All experimental codes are executed on a 64-bit Ubuntu 20.04.2 LTS operating system with an Intel(R) Xeon(R) Gold 5115 2.40GHz CPU. The parameters for the ILR algorithm are set as follows:

    μ=0.02,˜ν=0.105,η=1,σ=104,ρ=0.74,τ=105.

    For the VRMILP and DFPRPMHS algorithms, we adhere to the parameter settings provided in their respective original works. Seven test problems are selected for evaluation, with problem dimensions set at {5,000 10,000 50,000 100,000 150,000}. Each test problem is initialized by the following points: a1=(12,122,,12n), a2=(0,1n,2n,,n1n), a3=(1,12,,1n), a4=(1n,2n,,nn), a5=(13,132,,13n), a6=(2,2,,2) a7=(11n,12n,,1nn), a8[0,1]n. The stopping criteria for all algorithms is set to either θkτ or a maximum of 3000 iterations. Here, θ(a)=(θ1(a),θ2(a),,θn(a))T with a=(a1,a2,,an)T. The seven test problems are described as follows:

    Problem 1 [7]:

    θi(a)=eai1,fori=1,2,,n,

    with the constraint set Θ=Rn+. The unique solution is a=(0,0,,0)T.

    Problem 2 [7]:

    θi(a)=ineai1,fori=1,2,,n,

    with the constraint set Θ=Rn+.

    Problem 3 [5]:

    θi(a)=log(ai+1)ain,fori=1,2,,n,

    with the constraint set Θ=[1,+).

    Problem 4 [5]:

    θi(a)=(eai)2+3sin(ai)cos(ai)1,fori=1,2,,n,

    with the constraint set Θ=Rn+.

    Problem 5 [5]:

    θ1(a)=2a1+sin(a1)1,θi(a)=2ai1+2ai+sin(ai)1,fori=2,3,,n1,θn(a)=2an+sin(an)1,

    with the constraint set Θ=Rn+.

    Problem 6 [7]:

    θi(a)=1neai1,fori=1,2,,n,

    with the constraint set Θ=Rn+.

    Problem 7 [5]:

    θi(a)=ai2sin(|ai1|),fori=1,2,,n,

    with the constraint set Θ=Rn+.

    The performance of the ILR, VRMILP, and DFPRPMHS algorithms are systematically evaluated through a series of test problems, with the numerical results presented in Tables 17. In these tables, "Init" refers to the initial point used in each test problem, "n" refers to the problem dimension multiplied by 1000, "CPUT" refers to the CPU time in seconds, "Nfunc" refers to the number of function evaluations, and "Niter" refers to the number of iterations. A notable observation from the numerical results is that all three algorithms successfully solve the test problem across various initial points and problem dimensions. To be specific, the ILR algorithm demonstrates superior performance in most cases compared to the other two algorithms.

    Table 1.  Numerical results for Problem 1.
    Inti(n) ILR VRMILP DFPRPMHS
    CPUT/Nfunc/Niter CPUT/Nfunc/Niter CPUT/Nfunc/Niter
    a1(5) 1.93×103/4/1 4.45×104/4/1 1.57×102/332/7
    a2(5) 1.84×103/23/7 3.47×103/60/15 2.15×102/487/24
    a3(5) 2.11×103/29/9 2.16×103/37/8 1.75×102/447/10
    a4(5) 1.55×103/23/7 2.13×103/39/9 1.86×102/405/31
    a5(5) 1.57×103/23/7 3.33×103/60/15 2.04×102/487/24
    a6(5) 5.08×104/7/1 4.16×104/7/1 2.00×103/9/1
    a7(5) 1.92×103/23/7 3.46×103/60/15 2.07×102/487/24
    a8(5) 2.21×103/30/9 2.16×103/39/9 2.30×102/563/14
    a1(10) 6.36×104/4/1 4.22×104/4/1 2.50×102/332/7
    a2(10) 3.69×103/23/7 6.19×103/57/14 4.11×102/487/24
    a3(10) 4.66×103/29/9 3.96×103/37/8 3.44×102/447/10
    a4(10) 3.48×103/23/7 4.12×103/39/9 3.59×102/408/32
    a5(10) 3.45×103/23/7 6.12×103/57/14 3.98×102/487/24
    a6(10) 8.35×104/7/1 7.34×104/7/1 1.99×103/9/1
    a7(10) 3.56×103/23/7 6.10×103/57/14 3.88×102/487/24
    a8(10) 6.37×103/41/13 5.28×103/48/12 4.40×102/563/14
    a1(50) 3.75×103/4/1 1.64×103/4/1 9.06×102/332/7
    a2(50) 1.35×102/23/7 2.48×102/60/15 1.51×101/596/26
    a3(50) 1.27×102/29/9 1.72×102/37/8 1.02×101/447/10
    a4(50) 9.17×103/23/7 1.11×102/39/9 1.39×101/602/28
    a5(50) 1.39×102/23/7 2.47×102/60/15 1.49×101/596/26
    a6(50) 2.67×103/7/1 4.30×103/7/1 5.98×103/9/1
    a7(50) 1.13×102/23/7 1.95×102/60/15 1.32×101/596/26
    a8(50) 1.06×102/23/7 1.86×102/56/14 1.30×101/576/16
    a1(100) 7.76×103/4/1 2.44×103/4/1 1.21×101/332/7
    a2(100) 1.49×102/23/7 3.51×102/66/17 1.44×101/487/24
    a3(100) 1.69×102/29/9 1.64×102/37/8 1.24×101/447/10
    a4(100) 1.49×102/23/7 1.56×102/39/9 1.84×101/602/28
    a5(100) 1.24×102/23/7 2.76×102/66/17 1.38×101/487/24
    a6(100) 2.91×103/7/1 2.55×103/7/1 5.45×103/9/1
    a7(100) 1.22×102/23/7 2.67×102/66/17 1.50×101/487/24
    a8(100) 1.32×102/23/7 3.29×102/60/15 1.92×101/677/18
    a1(150) 3.49×103/4/1 2.63×103/4/1 1.13×101/332/7
    a2(150) 1.88×102/23/7 3.88×102/75/19 2.84×101/602/28
    a3(150) 1.95×102/29/9 1.88×102/37/8 1.71×101/447/10
    a4(150) 1.65×102/23/7 2.08×102/39/9 2.36×101/602/28
    a5(150) 1.65×102/23/7 3.80×102/75/19 2.40×101/602/28
    a6(150) 5.11×103/7/1 4.06×103/7/1 1.05×102/9/1
    a7(150) 1.75×102/23/7 4.80×102/75/19 2.46×101/602/28
    a8(150) 1.95×102/23/7 2.97×102/45/11 2.34×101/575/18

     | Show Table
    DownLoad: CSV
    Table 2.  Numerical results for Problem 2.
    Inti(n) ILR VRMILP DFPRPMHS
    CPUT/Nfunc/Niter CPUT/Nfunc/Niter CPUT/Nfunc/Niter
    a1(5) 8.86×103/29/11 8.84×103/96/25 3.91×102/576/23
    a2(5) 2.64×102/400/52 1.73×102/281/31 5.06×102/893/43
    a3(5) 2.85×103/30/11 6.36×103/88/23 2.04×102/300/34
    a4(5) 2.69×102/414/53 1.86×102/310/30 4.14×102/692/44
    a5(5) 4.95×103/54/20 7.76×103/107/28 2.56×102/406/35
    a6(5) 1.57×102/232/31 7.92×103/114/25 5.95×102/1056/34
    a7(5) 5.33×103/54/20 7.78×103/107/28 2.59×102/406/35
    a8(5) 4.65×102/727/76 1.90×102/305/36 4.12×102/688/41
    a1(10) 1.22×102/56/20 1.26×102/84/22 5.03×102/411/37
    a2(10) 5.78×102/435/47 4.50×102/398/34 7.79×102/703/22
    a3(10) 6.49×103/29/11 1.56×102/82/22 5.64×102/353/55
    a4(10) 8.59×102/582/57 4.34×102/387/36 8.26×102/721/25
    a5(10) 1.05×102/50/18 1.92×102/128/32 4.28×102/300/37
    a6(10) 3.89×102/276/35 1.51×102/108/24 9.90×102/851/40
    a7(10) 1.07×102/50/18 1.87×102/128/32 4.04×102/300/37
    a8(10) 8.75×102/673/60 6.39×102/541/52 1.09×101/966/39
    a1(50) 5.65×102/57/20 5.36×102/90/24 1.69×101/320/41
    a2(50) 4.89×101/997/80 4.34×101/951/57 3.28×101/731/24
    a3(50) 2.44×102/35/13 5.55×102/99/26 1.42×101/327/35
    a4(50) 4.42×101/926/83 3.80×101/957/55 3.09×101/731/24
    a5(50) 4.08×102/55/19 6.92×102/124/31 1.93×101/409/36
    a6(50) 2.48×101/510/51 5.96×102/114/25 4.73×101/1119/36
    a7(50) 3.77×102/55/19 6.56×102/124/31 1.99×101/409/36
    a8(50) 4.88×101/1011/86 3.19×101/699/50 3.04×101/686/20
    a1(100) 7.76×102/75/27 7.69×102/92/24 4.11×101/613/31
    a2(100) 8.14×101/1187/92 8.34×101/1259/65 4.43×101/727/24
    a3(100) 9.47×102/96/33 7.82×102/94/25 2.83×101/413/39
    a4(100) 7.69×101/1073/90 8.34×101/1193/66 5.16×101/728/24
    a5(100) 9.05×102/76/26 1.01×101/119/31 3.28×101/493/29
    a6(100) 3.62×101/505/46 9.80×102/122/27 6.84×101/1006/46
    a7(100) 8.67×102/76/26 9.83×102/119/31 3.27×101/493/29
    a8(100) 1.18×100/1610/106 5.32×101/800/52 4.04×101/608/25
    a1(150) 8.00×102/54/20 1.15×101/99/26 3.48×101/330/40
    a2(150) 1.15×100/1130/87 1.34×100/1408/76 7.09×101/726/24
    a3(150) 8.44×102/57/18 1.25×101/102/26 4.08×101/400/35
    a4(150) 1.17×100/1165/95 1.26×100/1365/69 6.80×101/726/24
    a5(150) 9.90×102/69/25 1.44×101/124/32 4.11×101/407/38
    a6(150) 7.33×101/714/63 1.32×101/117/26 8.80×100/8853/275
    a7(150) 1.24×101/69/25 1.73×101/124/32 4.47×101/407/38
    a8(150) 1.33×100/1224/91 1.27×100/1255/71 7.01×101/657/29

     | Show Table
    DownLoad: CSV
    Table 3.  Numerical results for Problem 3.
    Inti(n) ILR VRMILP DFPRPMHS
    CPUT/Nfunc/Niter CPUT/Nfunc/Niter CPUT/Nfunc/Niter
    a1(5) 8.33×103/23/8 2.50×103/21/9 3.90×102/544/11
    a2(5) 8.23×103/61/21 8.17×103/82/22 6.76×102/977/19
    a3(5) 5.10×103/45/16 5.06×103/60/16 3.11×102/492/30
    a4(5) 7.16×103/66/23 6.87×103/82/22 5.68×102/977/19
    a5(5) 6.90×103/61/21 7.31×103/82/22 5.94×102/977/19
    a6(5) 2.28×103/19/7 3.53×103/33/14 6.56×102/1084/21
    a7(5) 7.05×103/61/21 6.94×103/82/22 5.87×102/977/19
    a8(5) 4.85×103/44/15 8.76×103/105/28 5.83×102/977/19
    a1(10) 6.23×103/23/8 3.88×103/21/9 5.47×102/544/11
    a2(10) 9.75×103/49/17 1.26×102/85/23 1.05×101/986/21
    a3(10) 1.12×102/54/19 8.97×103/60/16 5.92×102/499/31
    a4(10) 1.67×102/78/28 1.27×102/85/23 1.07×101/986/21
    a5(10) 1.04×102/49/17 1.24×102/85/23 1.09×101/986/21
    a6(10) 4.08×103/19/7 5.89×103/33/14 1.06×101/977/19
    a7(10) 1.10×102/49/17 1.44×102/85/23 1.11×101/986/21
    a8(10) 8.57×103/44/15 1.47×102/98/27 9.76×102/890/24
    a1(50) 2.84×102/23/8 1.39×102/21/9 1.18×101/437/9
    a2(50) 4.56×102/74/26 3.72×102/94/25 3.08×101/978/19
    a3(50) 2.33×102/44/15 2.67×102/60/16 1.04×101/279/31
    a4(50) 4.24×102/61/21 4.43×102/93/25 2.94×101/978/19
    a5(50) 5.26×102/74/26 4.02×102/94/25 2.85×101/978/19
    a6(50) 1.01×102/19/7 1.48×102/35/15 2.93×101/977/19
    a7(50) 4.55×102/74/26 4.41×102/94/25 2.97×101/978/19
    a8(50) 4.27×102/63/22 5.60×102/102/27 2.92×101/978/19
    a1(100) 1.51×102/20/7 1.14×102/18/7 1.52×101/437/9
    a2(100) 5.81×102/72/25 6.66×102/104/28 3.86×101/978/19
    a3(100) 4.40×102/58/20 3.25×102/60/16 1.36×101/364/19
    a4(100) 4.69×102/61/21 5.44×102/104/28 4.02×101/978/19
    a5(100) 5.39×102/72/25 5.64×102/104/28 3.98×101/978/19
    a6(100) 1.69×102/19/7 2.70×102/35/15 4.70×101/1085/21
    a7(100) 5.06×102/72/25 5.60×102/104/28 4.14×101/978/19
    a8(100) 6.54×102/76/26 5.91×102/109/29 3.98×101/978/19
    a1(150) 1.99×102/20/7 1.50×102/18/7 2.04×101/437/9
    a2(150) 7.71×102/71/25 8.53×102/99/27 5.09×101/978/19
    a3(150) 5.08×102/51/17 4.93×102/60/16 1.65×101/274/19
    a4(150) 8.24×102/74/25 8.47×102/99/27 5.37×101/978/19
    a5(150) 7.76×102/71/25 6.93×102/99/27 5.39×101/978/19
    a6(150) 2.37×102/22/8 3.91×102/35/15 5.64×101/978/19
    a7(150) 8.44×102/71/25 8.50×102/99/27 5.38×101/978/19
    a8(150) 6.24×102/62/22 7.60×102/105/28 5.27×101/978/19

     | Show Table
    DownLoad: CSV
    Table 4.  Numerical results for Problem 4.
    Inti(n) ILR VRMILP DFPRPMHS
    CPUT/Nfunc/Niter CPUT/Nfunc/Niter CPUT/Nfunc/Niter
    a1(5) 1.58×101/3/1 4.47×103/3/1 2.10×102/3/1
    a2(5) 1.70×102/44/5 1.91×102/149/16 4.55×102/651/16
    a3(5) 9.99×103/63/8 1.86×102/247/26 2.06×102/259/7
    a4(5) 3.70×103/44/5 1.33×102/225/24 2.86×102/509/12
    a5(5) 5.19×103/44/5 1.36×102/149/16 3.72×102/651/16
    a6(5) 8.76×104/4/1 5.51×104/4/1 2.28×103/4/1
    a7(5) 3.48×103/44/5 9.75×103/149/16 3.18×102/651/16
    a8(5) 3.25×103/44/5 1.24×102/200/21 3.11×102/626/14
    a1(10) 1.03×103/3/1 5.12×104/3/1 3.02×103/3/1
    a2(10) 5.99×103/44/5 2.83×102/243/26 6.79×102/660/16
    a3(10) 8.56×103/63/8 2.97×102/246/26 2.56×102/259/7
    a4(10) 5.47×103/44/5 1.59×102/141/15 5.05×102/509/12
    a5(10) 5.66×103/44/5 2.84×102/243/26 6.01×102/660/16
    a6(10) 1.04×103/4/1 6.07×104/4/1 1.69×103/4/1
    a7(10) 5.08×103/44/5 2.48×102/243/26 5.86×102/660/16
    a8(10) 5.28×103/44/5 2.45×102/229/24 3.55×102/364/17
    a1(50) 8.54×103/3/1 1.09×103/3/1 3.14×103/3/1
    a2(50) 2.88×102/44/5 6.72×102/159/17 1.44×101/509/12
    a3(50) 2.57×102/63/8 7.24×102/237/25 6.79\times10^{-2} /259/ \textbf{7}
    a_4 (50) \mathbf{1.77\times10^{-2}} / \textbf{44} / \textbf{5} 9.94\times10^{-2} /245/26 1.31\times10^{-1} /509/12
    a_5 (50) \mathbf{1.74\times10^{-2}} / \textbf{44} / \textbf{5} 6.06\times10^{-2} /159/17 1.66\times10^{-1} /509/12
    a_6 (50) \mathbf{2.83\times10^{-3}} / \textbf{4} / \textbf{1} 3.46\times10^{-3} /4/1 4.31\times10^{-3} /4/1
    a_7 (50) \mathbf{1.88\times10^{-2}} / \textbf{44} / \textbf{5} 5.47\times10^{-2} /159/17 1.40\times10^{-1} /509/12
    a_8 (50) \mathbf{1.87\times10^{-2}} / \textbf{44} / \textbf{5} 8.57\times10^{-2} /244/26 1.81\times10^{-1} /725/17
    a_1 (100) 3.06\times10^{-3} / \textbf{3} / \textbf{1} \mathbf{2.70\times10^{-3}} /3/1 4.55\times10^{-3} /3/1
    a_2 (100) \mathbf{2.59\times10^{-2}} / \textbf{44} / \textbf{5} 1.15\times10^{-1} /250/27 1.79\times10^{-1} /509/12
    a_3 (100) \mathbf{3.02\times10^{-2}} / \textbf{63} /8 8.74\times10^{-2} /197/21 8.90\times10^{-2} /259/ \textbf{7}
    a_4 (100) \mathbf{2.46\times10^{-2}} / \textbf{44} / \textbf{5} 8.31\times10^{-2} /176/19 1.76\times10^{-1} /509/12
    a_5 (100) \mathbf{2.40\times10^{-2}} / \textbf{44} / \textbf{5} 1.17\times10^{-1} /250/27 1.83\times10^{-1} /509/12
    a_6 (100) 1.20\times10^{-2} /11/ \textbf{1} 1.08\times10^{-2} /11/1 \mathbf{5.98\times10^{-3}} / \textbf{4} /1
    a_7 (100) \mathbf{2.57\times10^{-2}} / \textbf{44} / \textbf{5} 1.21\times10^{-1} /250/27 1.97\times10^{-1} /509/12
    a_8 (100) \mathbf{2.37\times10^{-2}} / \textbf{44} / \textbf{5} 9.33\times10^{-2} /187/20 1.82\times10^{-1} /509/12
    a_1 (150) 3.87\times10^{-3} / \textbf{3} / \textbf{1} \mathbf{1.92\times10^{-3}} /3/1 6.30\times10^{-3} /3/1
    a_2 (150) \mathbf{3.76\times10^{-2}} / \textbf{44} / \textbf{5} 1.33\times10^{-1} /201/22 2.57\times10^{-1} /509/12
    a_3 (150) \mathbf{4.78\times10^{-2}} / \textbf{63} /8 1.15\times10^{-1} /179/19 1.22\times10^{-1} /259/ \textbf{7}
    a_4 (150) \mathbf{3.00\times10^{-2}} / \textbf{44} / \textbf{5} 8.73\times10^{-2} /132/14 2.34\times10^{-1} /509/12
    a_5 (150) \mathbf{3.16\times10^{-2}} / \textbf{44} / \textbf{5} 1.34\times10^{-1} /201/22 2.51\times10^{-1} /509/12
    a_6 (150) 1.60\times10^{-2} /11/ \textbf{1} 1.42\times10^{-2} /11/1 \mathbf{1.33\times10^{-2}} / \textbf{8} /1
    a_7 (150) \mathbf{3.09\times10^{-2}} / \textbf{44} / \textbf{5} 1.32\times10^{-1} /201/22 2.46\times10^{-1} /509/12
    a_8 (150) \mathbf{3.17\times10^{-2}} / \textbf{44} / \textbf{5} 2.09\times10^{-1} /301/32 3.02\times10^{-1} /642/24

     | Show Table
    DownLoad: CSV
    Table 5.  Numerical results for Problem 5.
    Inti( n ) ILR VRMILP DFPRPMHS
    CPUT/Nfunc/Niter CPUT/Nfunc/Niter CPUT/Nfunc/Niter
    a_1 (5) 5.45\times10^{-2} / \textbf{283} /36 \mathbf{3.93\times10^{-2}} /309/ \textbf{34} 6.74\times10^{-2} /694/43
    a_2 (5) \mathbf{2.50\times10^{-2}} / \textbf{235} / \textbf{30} 3.07\times10^{-2} /330/36 9.82\times10^{-2} /1113/46
    a_3 (5) \mathbf{2.09\times10^{-2}} / \textbf{191} / \textbf{24} 2.60\times10^{-2} /294/32 5.82\times10^{-2} /663/50
    a_4 (5) \mathbf{2.41\times10^{-2}} / \textbf{235} / \textbf{30} 3.07\times10^{-2} /330/36 8.84\times10^{-2} /1125/46
    a_5 (5) \mathbf{2.04\times10^{-2}} / \textbf{212} / \textbf{27} 3.62\times10^{-2} /289/31 1.26\times10^{-1} /1142/56
    a_6 (5) 2.66\times10^{-2} / \textbf{253} / \textbf{32} \mathbf{2.25\times10^{-2}} /286/32 1.41\times10^{-1} /1265/113
    a_7 (5) \mathbf{2.84\times10^{-2}} / \textbf{212} / \textbf{27} 3.94\times10^{-2} /289/31 1.22\times10^{-1} /1142/56
    a_8 (5) \mathbf{3.33\times10^{-2}} / \textbf{247} / \textbf{32} 3.92\times10^{-2} /331/35 2.61\times10^{-1} /2555/55
    a_1 (10) \mathbf{6.23\times10^{-2}} / \textbf{254} / \textbf{32} 9.28\times10^{-2} /356/39 1.72\times10^{-1} /757/57
    a_2 (10) \mathbf{5.84\times10^{-2}} / \textbf{239} / \textbf{31} 6.88\times10^{-2} /308/33 1.68\times10^{-1} /800/48
    a_3 (10) \mathbf{5.94\times10^{-2}} / \textbf{258} / \textbf{33} 6.19\times10^{-2} /296/33 1.20\times10^{-1} /565/46
    a_4 (10) \mathbf{5.24\times10^{-2}} / \textbf{232} / \textbf{30} 6.53\times10^{-2} /308/33 1.60\times10^{-1} /800/48
    a_5 (10) \mathbf{5.56\times10^{-2}} / \textbf{239} / \textbf{31} 6.79\times10^{-2} /325/35 1.65\times10^{-1} /789/62
    a_6 (10) \mathbf{4.87\times10^{-2}} / \textbf{205} / \textbf{26} 6.13\times10^{-2} /282/32 1.81\times10^{-1} /887/53
    a_7 (10) \mathbf{5.46\times10^{-2}} / \textbf{239} / \textbf{31} 6.68\times10^{-2} /325/35 1.63\times10^{-1} /789/62
    a_8 (10) \mathbf{6.69\times10^{-2}} / \textbf{275} / \textbf{36} 7.43\times10^{-2} /350/37 2.56\times10^{-1} /1297/54
    a_1 (50) \mathbf{2.56\times10^{-1}} / \textbf{211} / \textbf{27} 3.13\times10^{-1} /308/33 5.78\times10^{-1} /657/46
    a_2 (50) \mathbf{2.42\times10^{-1}} / \textbf{229} / \textbf{29} 2.56\times10^{-1} /279/31 1.24\times 10^0 /1319/111
    a_3 (50) \mathbf{2.35\times10^{-1}} / \textbf{250} / \textbf{32} 2.68\times10^{-1} /308/33 6.76\times10^{-1} /682/59
    a_4 (50) \mathbf{2.38\times10^{-1}} / \textbf{229} / \textbf{29} 2.83\times10^{-1} /279/31 1.17\times 10^0 /1276/105
    a_5 (50) \mathbf{2.33\times10^{-1}} / \textbf{228} / \textbf{29} 3.54\times10^{-1} /340/38 9.50\times10^{-1} /983/83
    a_6 (50) \mathbf{2.17\times10^{-1}} / \textbf{219} / \textbf{28} 2.92\times10^{-1} /324/35 8.49\times10^{-1} /937/52
    a_7 (50) \mathbf{2.46\times10^{-1}} / \textbf{228} / \textbf{29} 3.07\times10^{-1} /340/38 9.22\times10^{-1} /983/83
    a_8 (50) \mathbf{2.32\times10^{-1}} / \textbf{241} / \textbf{31} 3.16\times10^{-1} /364/39 1.09\times 10^0 /1238/56
    a_1 (100) \mathbf{3.79\times10^{-1}} / \textbf{220} / \textbf{28} 4.93\times10^{-1} /325/35 1.12\times 10^0 /753/44
    a_2 (100) \mathbf{4.04\times10^{-1}} / \textbf{236} / \textbf{30} 4.62\times10^{-1} /283/32 1.24\times 10^0 /768/61
    a_3 (100) \mathbf{4.28\times10^{-1}} / \textbf{250} / \textbf{32} 4.92\times10^{-1} /317/34 1.87\times 10^0 /1229/56
    a_4 (100) \mathbf{3.82\times10^{-1}} / \textbf{236} / \textbf{30} 4.27\times10^{-1} /273/31 1.24\times 10^0 /768/61
    a_5 (100) \mathbf{4.77\times10^{-1}} / \textbf{262} / \textbf{33} 5.63\times10^{-1} /331/36 1.40\times 10^0 /892/65
    a_6 (100) \mathbf{4.27\times10^{-1}} / \textbf{254} / \textbf{33} 5.55\times10^{-1} /314/34 1.66\times 10^0 /1020/50
    a_7 (100) \mathbf{4.73\times10^{-1}} / \textbf{262} / \textbf{33} 5.60\times10^{-1} /331/36 1.30\times 10^0 /892/65
    a_8 (100) \mathbf{4.79\times10^{-1}} / \textbf{291} / \textbf{38} 5.78\times10^{-1} /380/41 1.96\times 10^0 /1246/58
    a_1 (150) \mathbf{5.67\times10^{-1}} / \textbf{221} / \textbf{28} 6.78\times10^{-1} /287/31 2.40\times 10^0 /1010/50
    a_2 (150) \mathbf{5.10\times10^{-1}} / \textbf{206} / \textbf{26} 8.62\times10^{-1} /375/41 2.98\times 10^0 /1327/123
    a_3 (150) \mathbf{5.57\times10^{-1}} / \textbf{228} / \textbf{29} 6.93\times10^{-1} /325/35 1.95\times 10^0 /832/52
    a_4 (150) \mathbf{5.48\times10^{-1}} / \textbf{206} / \textbf{26} 8.80\times10^{-1} /375/41 3.41\times 10^0 /1363/126
    a_5 (150) \mathbf{5.66\times10^{-1}} / \textbf{214} / \textbf{27} 8.50\times10^{-1} /358/40 2.31\times 10^0 /1031/78
    a_6 (150) \mathbf{4.97\times10^{-1}} / \textbf{240} / \textbf{31} 7.32\times10^{-1} /313/34 1.83\times 10^0 /875/46
    a_7 (150) \mathbf{5.95\times10^{-1}} / \textbf{214} / \textbf{27} 9.02\times10^{-1} /358/40 2.42\times 10^0 /1031/78
    a_8 (150) \mathbf{6.91\times10^{-1}} / \textbf{291} / \textbf{38} 1.13\times 10^0 /456/49 2.85\times 10^0 /1242/58

     | Show Table
    DownLoad: CSV
    Table 6.  Numerical results for Problem 6.
    Inti( n ) ILR VRMILP DFPRPMHS
    CPUT/Nfunc/Niter CPUT/Nfunc/Niter CPUT/Nfunc/Niter
    a_1 (5) 7.08\times10^{-3} / \textbf{34} / \textbf{14} \mathbf{6.92\times10^{-3}} /84/22 4.32\times10^{-2} /672/21
    a_2 (5) 7.84\times10^{-3} / \textbf{69} /27 \mathbf{5.48\times10^{-3}} /71/ \textbf{22} 2.96\times10^{-2} /513/40
    a_3 (5) \mathbf{4.14\times10^{-3}} / \textbf{34} / \textbf{14} 7.29\times10^{-3} /111/27 2.58\times10^{-2} /504/34
    a_4 (5) 7.08\times10^{-3} /74/28 \mathbf{4.61\times10^{-3}} / \textbf{71} / \textbf{22} 2.23\times10^{-2} /414/41
    a_5 (5) 5.92\times10^{-3} / \textbf{69} /27 \mathbf{4.87\times10^{-3}} /71/ \textbf{22} 2.85\times10^{-2} /513/40
    a_6 (5) 3.27\times10^{-3} /32/13 \mathbf{2.77\times10^{-3}} / \textbf{28} / \textbf{11} 3.18\times10^{-2} /670/20
    a_7 (5) 6.28\times10^{-3} / \textbf{69} /27 \mathbf{4.86\times10^{-3}} /71/ \textbf{22} 2.74\times10^{-2} /513/40
    a_8 (5) 6.68\times10^{-3} / \textbf{79} /30 \mathbf{5.76\times10^{-3}} /84/ \textbf{25} 2.66\times10^{-2} /446/40
    a_1 (10) \mathbf{6.94\times10^{-3}} / \textbf{31} / \textbf{13} 8.81\times10^{-3} /67/20 4.26\times10^{-2} /424/29
    a_2 (10) \mathbf{6.88\times10^{-3}} / \textbf{34} / \textbf{14} 1.25\times10^{-2} /95/27 6.07\times10^{-2} /672/21
    a_3 (10) \mathbf{6.52\times10^{-3}} / \textbf{31} / \textbf{13} 1.68\times10^{-2} /142/31 3.96\times10^{-2} /384/30
    a_4 (10) \mathbf{6.86\times10^{-3}} / \textbf{34} / \textbf{14} 1.36\times10^{-2} /90/26 6.88\times10^{-2} /672/21
    a_5 (10) \mathbf{7.18\times10^{-3}} / \textbf{34} / \textbf{14} 1.23\times10^{-2} /95/27 6.25\times10^{-2} /672/21
    a_6 (10) 7.48\times10^{-3} /35/14 \mathbf{4.64\times10^{-3}} / \textbf{33} / \textbf{13} 5.18\times10^{-2} /561/18
    a_7 (10) \mathbf{6.86\times10^{-3}} / \textbf{34} / \textbf{14} 1.20\times10^{-2} /95/27 6.47\times10^{-2} /672/21
    a_8 (10) \mathbf{6.92\times10^{-3}} / \textbf{34} / \textbf{14} 1.10\times10^{-2} /86/25 6.35\times10^{-2} /672/21
    a_1 (50) \mathbf{3.20\times10^{-2}} / \textbf{41} / \textbf{17} 3.59\times10^{-1} /1099/94 2.04\times10^{-1} /698/31
    a_2 (50) \mathbf{2.57\times10^{-2}} / \textbf{36} / \textbf{15} 4.34\times10^{-2} /105/29 1.82\times10^{-1} /572/23
    a_3 (50) \mathbf{2.34\times10^{-2}} / \textbf{38} / \textbf{16} 2.38\times10^{-1} /769/56 1.70\times10^{-1} /511/38
    a_4 (50) \mathbf{2.23\times10^{-2}} / \textbf{36} / \textbf{15} 3.88\times10^{-2} /101/28 1.87\times10^{-1} /572/23
    a_5 (50) \mathbf{2.68\times10^{-2}} / \textbf{36} / \textbf{15} 4.40\times10^{-2} /105/29 1.84\times10^{-1} /572/23
    a_6 (50) 2.29\times10^{-2} /37/15 \mathbf{1.08\times10^{-2}} / \textbf{25} / \textbf{10} 2.13\times10^{-1} /672/21
    a_7 (50) \mathbf{2.70\times10^{-2}} / \textbf{36} / \textbf{15} 5.36\times10^{-2} /105/29 1.88\times10^{-1} /572/23
    a_8 (50) \mathbf{2.61\times10^{-2}} / \textbf{36} / \textbf{15} 4.65\times10^{-2} /102/28 1.88\times10^{-1} /572/23
    a_1 (100) \mathbf{3.96\times10^{-2}} / \textbf{41} / \textbf{17} 5.61\times10^{-2} /84/25 2.28\times10^{-1} /569/22
    a_2 (100) \mathbf{5.49\times10^{-2}} / \textbf{57} /24 6.17\times10^{-2} /100/28 2.95\times10^{-1} /676/ \textbf{23}
    a_3 (100) \mathbf{3.64\times10^{-2}} / \textbf{41} / \textbf{17} 4.73\times10^{-2} /84/23 2.08\times10^{-1} /411/43
    a_4 (100) \mathbf{4.85\times10^{-2}} / \textbf{57} /24 6.49\times10^{-2} /100/28 2.92\times10^{-1} /676/ \textbf{23}
    a_5 (100) \mathbf{4.61\times10^{-2}} / \textbf{57} /24 5.92\times10^{-2} /100/28 2.79\times10^{-1} /676/ \textbf{23}
    a_6 (100) 3.35\times10^{-2} /39/16 \mathbf{2.28\times10^{-2}} / \textbf{33} / \textbf{13} 2.64\times10^{-1} /673/22
    a_7 (100) \mathbf{4.73\times10^{-2}} / \textbf{57} /24 6.31\times10^{-2} /100/28 2.89\times10^{-1} /676/ \textbf{23}
    a_8 (100) 7.09\times10^{-2} / \textbf{83} /33 \mathbf{5.68\times10^{-2}} /100/28 3.00\times10^{-1} /676/ \textbf{23}
    a_1 (150) \mathbf{4.56\times10^{-2}} / \textbf{38} / \textbf{16} 6.69\times10^{-2} /83/24 4.36\times10^{-1} /678/24
    a_2 (150) \mathbf{5.06\times10^{-2}} / \textbf{41} / \textbf{17} 1.01\times10^{-1} /125/35 3.39\times10^{-1} /512/39
    a_3 (150) \mathbf{4.98\times10^{-2}} / \textbf{38} / \textbf{16} 1.21\times10^{-1} /154/34 4.10\times10^{-1} /661/52
    a_4 (150) \mathbf{4.84\times10^{-2}} / \textbf{41} / \textbf{17} 1.21\times10^{-1} /125/35 3.36\times10^{-1} /517/41
    a_5 (150) \mathbf{4.28\times10^{-2}} / \textbf{41} / \textbf{17} 1.23\times10^{-1} /125/35 3.83\times10^{-1} /512/39
    a_6 (150) 6.04\times10^{-2} /39/16 \mathbf{3.64\times10^{-2}} / \textbf{35} / \textbf{14} 3.85\times10^{-1} /674/22
    a_7 (150) \mathbf{4.13\times10^{-2}} / \textbf{41} / \textbf{17} 9.58\times10^{-2} /125/35 3.00\times10^{-1} /512/39
    a_8 (150) \mathbf{4.37\times10^{-2}} / \textbf{41} / \textbf{17} 1.17\times10^{-1} /129/36 3.59\times10^{-1} /597/33

     | Show Table
    DownLoad: CSV
    Table 7.  Numerical results for Problem 7.
    Inti( n ) ILR VRMILP DFPRPMHS
    CPUT/Nfunc/Niter CPUT/Nfunc/Niter CPUT/Nfunc/Niter
    a_1 (5) 1.75\times10^{-2} /111/18 \mathbf{6.37\times10^{-3}} / \textbf{73} / \textbf{12} 4.54\times10^{-2} /752/32
    a_2 (5) \mathbf{9.71\times10^{-3}} / \textbf{118} / \textbf{19} 1.35\times10^{-2} /207/29 3.64\times10^{-2} /811/55
    a_3 (5) 5.77\times10^{-3} /104/17 \mathbf{3.63\times10^{-3}} / \textbf{73} / \textbf{12} 3.20\times10^{-2} /829/17
    a_4 (5) 6.72\times10^{-3} /126/20 \mathbf{5.25\times10^{-3}} / \textbf{112} / \textbf{17} 3.93\times10^{-2} /934/46
    a_5 (5) \mathbf{6.59\times10^{-3}} / \textbf{118} / \textbf{19} 9.84\times10^{-3} /207/29 3.90\times10^{-2} /891/51
    a_6 (5) 5.47\times10^{-3} /96/17 \mathbf{3.57\times10^{-3}} / \textbf{72} / \textbf{13} 4.04\times10^{-2} /1024/21
    a_7 (5) \mathbf{6.59\times10^{-3}} / \textbf{118} / \textbf{19} 1.00\times10^{-2} /207/29 3.93\times10^{-2} /892/51
    a_8 (5) \mathbf{6.74\times10^{-3}} / \textbf{128} / \textbf{20} 9.35\times10^{-3} /207/29 4.15\times10^{-2} /927/45
    a_1 (10) 1.70\times10^{-2} /113/18 \mathbf{8.21\times10^{-3}} / \textbf{73} / \textbf{12} 6.53\times10^{-2} /735/43
    a_2 (10) 1.72\times10^{-2} /148/22 \mathbf{1.30\times10^{-2}} / \textbf{137} / \textbf{20} 8.32\times10^{-2} /1047/35
    a_3 (10) 1.36\times10^{-2} /133/20 \mathbf{6.79\times10^{-3}} / \textbf{73} / \textbf{12} 6.49\times10^{-2} /830/17
    a_4 (10) 1.71\times10^{-2} /138/22 \mathbf{1.12\times10^{-2}} / \textbf{112} / \textbf{17} 7.33\times10^{-2} /913/30
    a_5 (10) 1.73\times10^{-2} /148/22 \mathbf{1.28\times10^{-2}} / \textbf{137} / \textbf{20} 1.07\times10^{-1} /1047/35
    a_6 (10) 1.19\times10^{-2} /96/17 \mathbf{8.66\times10^{-3}} / \textbf{72} / \textbf{13} 8.01\times10^{-2} /1024/21
    a_7 (10) 1.66\times10^{-2} /148/22 \mathbf{1.44\times10^{-2}} / \textbf{137} / \textbf{20} 8.95\times10^{-2} /1047/35
    a_8 (10) \mathbf{1.54\times10^{-2}} / \textbf{131} / \textbf{21} 2.27\times10^{-2} /241/33 7.95\times10^{-2} /914/43
    a_1 (50) 4.83\times10^{-2} /118/19 \mathbf{2.48\times10^{-2}} / \textbf{79} / \textbf{13} 2.08\times10^{-1} /836/16
    a_2 (50) \mathbf{4.34\times10^{-2}} / \textbf{133} / \textbf{21} 4.56\times10^{-2} /185/26 2.22\times10^{-1} /988/27
    a_3 (50) 3.22\times10^{-2} /105/17 \mathbf{2.33\times10^{-2}} / \textbf{79} / \textbf{13} 1.81\times10^{-1} /772/37
    a_4 (50) 3.98\times10^{-2} /133/21 \mathbf{2.78\times10^{-2}} / \textbf{112} / \textbf{17} 2.34\times10^{-1} /999/52
    a_5 (50) \mathbf{4.44\times10^{-2}} / \textbf{133} / \textbf{21} 4.96\times10^{-2} /185/26 2.44\times10^{-1} /988/27
    a_6 (50) 3.19\times10^{-2} /102/18 \mathbf{2.16\times10^{-2}} / \textbf{78} / \textbf{14} 2.29\times10^{-1} /1024/21
    a_7 (50) \mathbf{4.29\times10^{-2}} / \textbf{133} / \textbf{21} 4.79\times10^{-2} /185/26 2.28\times10^{-1} /988/27
    a_8 (50) \mathbf{4.32\times10^{-2}} / \textbf{133} / \textbf{21} 5.52\times10^{-2} /209/29 2.13\times10^{-1} /931/27
    a_1 (100) 6.02\times10^{-2} /118/19 \mathbf{3.75\times10^{-2}} / \textbf{79} / \textbf{13} 2.51\times10^{-1} /838/16
    a_2 (100) \mathbf{5.16\times10^{-2}} / \textbf{133} / \textbf{21} 6.32\times10^{-2} /205/29 2.91\times10^{-1} /1018/31
    a_3 (100) 4.38\times10^{-2} /117/19 \mathbf{2.48\times10^{-2}} / \textbf{79} / \textbf{13} 2.37\times10^{-1} /849/18
    a_4 (100) 5.98\times10^{-2} /133/21 \mathbf{4.46\times10^{-2}} / \textbf{112} / \textbf{17} 2.75\times10^{-1} /1018/31
    a_5 (100) \mathbf{5.15\times10^{-2}} / \textbf{133} / \textbf{21} 6.67\times10^{-2} /205/29 2.78\times10^{-1} /1018/31
    a_6 (100) 4.26\times10^{-2} /102/18 \mathbf{2.68\times10^{-2}} / \textbf{78} / \textbf{14} 2.74\times10^{-1} /1024/21
    a_7 (100) \mathbf{5.38\times10^{-2}} / \textbf{133} / \textbf{21} 8.67\times10^{-2} /205/29 3.08\times10^{-1} /1018/31
    a_8 (100) \mathbf{5.41\times10^{-2}} / \textbf{130} / \textbf{21} 9.41\times10^{-2} /241/33 3.10\times10^{-1} /1058/36
    a_1 (150) 5.88\times10^{-2} /111/18 \mathbf{4.44\times10^{-2}} / \textbf{79} / \textbf{13} 3.23\times10^{-1} /838/16
    a_2 (150) \mathbf{6.85\times10^{-2}} / \textbf{139} / \textbf{22} 7.94\times10^{-2} /168/24 4.13\times10^{-1} /1048/35
    a_3 (150) 7.80\times10^{-2} /142/22 \mathbf{3.71\times10^{-2}} / \textbf{79} / \textbf{13} 3.38\times10^{-1} /787/49
    a_4 (150) 6.78\times10^{-2} /132/21 \mathbf{5.61\times10^{-2}} / \textbf{127} / \textbf{19} 3.81\times10^{-1} /1018/31
    a_5 (150) \mathbf{7.81\times10^{-2}} / \textbf{139} / \textbf{22} 8.21\times10^{-2} /168/24 4.24\times10^{-1} /1048/35
    a_6 (150) 5.85\times10^{-2} /108/19 \mathbf{4.74\times10^{-2}} / \textbf{78} / \textbf{14} 4.21\times10^{-1} /1024/21
    a_7 (150) \mathbf{7.66\times10^{-2}} / \textbf{139} / \textbf{22} 8.18\times10^{-2} /168/24 3.88\times10^{-1} /1048/35
    a_8 (150) 8.15\times10^{-2} /149/24 \mathbf{5.84\times10^{-2}} / \textbf{118} / \textbf{18} 4.22\times10^{-1} /1056/36

     | Show Table
    DownLoad: CSV

    To provide a clearer characterization of the performance differences among the three algorithms, we adopt the performance profiles proposed by Dolan and Moré [28]. These profiles evaluate algorithmic behavior based on several key performance indicators, specifically the CPU time in seconds, the number of function evaluations, and the number of iterations. By plotting these indicators, the profiles offer a visual and comparative summary of algorithm efficiency. In these plots, a higher performance curve corresponds to better overall performance, making interpretation both intuitive and informative. By drawing these performance profiles for these three algorithms, we can visually assess and compare their efficiency, as shown in Figures 13. According to Figure 1, the ILR algorithm demonstrates significant efficiency, solving approximately 56% of the test problems with the lowest CPUT compared to the VRMILP and DFPRPMHS algorithms, which solve around 44% and 4% of the test problems, respectively. Similarly, Figure 2 shows that the ILR algorithm maintains its superior performance, solving approximately 75% of the test problems with the fewest Nfunc. In contrast, the VRMILP and DFPRPMHS algorithms solve about 26% and 7% of the test problems, respectively, with the least number of function evaluations. Lastly, Figure 3 further confirms the ILR algorithm's efficiency, solving approximately 53% of the test problems with the fewest Niter, while the VRMILP and DFPRRMHS algorithms solve around 37% and 20% of the test problems, respectively, with the fewest iterations.

    Figure 1.  Performance profiles on CPUT.
    Figure 2.  Performance profiles on Nfunc.
    Figure 3.  Performance profiles on Niter.

    Overall, these performance profiles highlight the ILR algorithm's effectiveness in solving large-scale nonlinear systems of equations with convex constraints, outperforming the VRMILP and DFPRPMHS algorithms across multiple performance metrics.

    In this section, we extend the evaluation of the proposed ILR algorithm to impulse noise image restoration problems. To validate the effectiveness of the ILR algorithm, we apply it to benchmark grayscale images subjected to varying levels of impulse noise.

    Impulse noise image restoration is a critical topic in the field of image processing, particularly due to its importance in improving the quality of images corrupted by noise. Noise in images can be introduced through various sources, such as malfunctioning pixels in camera sensors, faulty memory locations in hardware, or transmission errors in communication channels. Common types of noise include Gaussian noise and impulse noise, with the latter often manifesting as salt-and-pepper noise. To address the challenge of removing impulse noise, Chan et al. [29] proposed a two-phase denoising scheme. This scheme combines the adaptive median filter (AMF) method with a variational method to effectively detect and restore noisy pixels.

    Let m \times n denote the pixel size of an original image. The pixel locations are indexed by the set \mathcal{M} = \{1, 2, \ldots, m \} \times \{1, 2, \ldots, n\} . We denote the noise candidate set by \mathcal{N} \subset \mathcal{M} , and |\mathcal{N}| represents the number of elements in \mathcal{N} . In the first phase, noise detection is performed using an AMF. For a pixel located at (i, j) \in \mathcal{M} , the observed pixel value is denoted by y_{ij} , and the neighborhood of pixel (i, j) is defined as \mathcal{V}_{ij} = \{(i, j - 1), (i, j + 1), (i - 1, j), (i + 1, j)\} . The AMF detects noise by considering these neighborhood values. Once the noisy pixels are detected, the second phase involves the restoration of these pixels. This is achieved by minimizing the following regularization function:

    \min\limits_{\mathbf{x}} \sum\limits_{(i,j) \in \mathcal{N}} \left[ |x_{i,j} - y_{i,j}| + \frac{\beta}{2} \left( 2\Phi_{i,j}^1 + \Phi_{i,j}^2 \right) \right],

    where

    \Phi_{i,j}^1 = \sum\limits_{(m,n) \in \mathcal{V}_{ij} \setminus \mathcal{N}} \varphi_{\alpha}(x_{i,j} - y_{m,n}), \quad \Phi_{i,j}^2 = \sum\limits_{(m,n) \in \mathcal{V}_{ij} \setminus \mathcal{N}} \varphi_{\alpha}(x_{i,j} - u_{m,n}).

    Here, \beta is a regularization parameter, and \varphi_{\alpha}(\cdot) is an even edge-preserving potential function with parameter \alpha > 0 . The vector \mathbf{x} = [x_{i, j}]_{(i, j) \in \mathcal{N}} is optimized lexicographically to achieve denoising. The regularization problem posed in the second phase is nonsmooth due to the data-fitting term |x_{i, j} - y_{i, j}| . To address this, Cai et al. [30] proposed removing the nonsmooth term and instead solving the following smooth unconstrained optimization problem:

    \min\limits_{\mathbf{x}} f_{\alpha}(\mathbf{x}) : = \sum\limits_{(i,j) \in \mathcal{N}} \left( 2\Phi_{i,j}^1 + \Phi_{i,j}^2 \right).

    The potential function \varphi_{\alpha}(\cdot) plays a crucial role in preserving edges while smoothing the image. A commonly used potential function is the Huber function, defined as:

    \varphi_{\alpha}(t) = \begin{cases} \frac{t^2}{2\alpha}, & \text{for } |t| \leq \alpha, \\ |t| - \frac{\alpha}{2}, & \text{for } |t| > \alpha. \end{cases}

    This function is convex and first-order Lipschitz continuous, making it suitable for the minimization problems described above. Let \nabla f_{\alpha}(\mathbf{x}) denote the gradient of the function f_{\alpha}(\mathbf{x}) . In alignment with Proposition 6 in [30], if \varphi_\alpha is convex, then \nabla f_{\alpha}(\mathbf{x}) is monotone.

    In this section, all parameters for these three algorithms are set as described in Section 4. The stopping criteria for these three algorithms are defined as follows:

    \begin{equation*} \frac{\|\mathbf{x}_k - \mathbf{x}_{k-1}\|}{\|\mathbf{x}_k\|} \leq \tau \quad \text{or} \quad \frac{|f_{\alpha}(\mathbf{x}_k)-f_{\alpha}(\mathbf{x}_{k-1})|}{|f_{\alpha}(\mathbf{x}_k)|} \leq \tau. \end{equation*}

    For this experiment, we utilize the well-known grayscale test images Man ( 1024 \times 1024 ) and Tank2 ( 512 \times 512 ), which are sourced from the website https://www.hlevkin.com. We examine the performance of these three algorithms by applying them to images corrupted with 30% and 70% impulse noise. The noisy images, as well as the images recovered by these three algorithms, are shown in Figures 4 and 5. The corresponding numerical results are provided in Table 8. Based on these figures and the table, we can draw the following conclusions: (1) Figures 4 and 5 demonstrate that all three algorithms successfully recover the images affected by 30% and 70% impulse noise; (2) Recovering an image with 30% impulse noise requires less CPU time and fewer iterations compared to recovering an image with 70% impulse noise; (3) Among these three algorithms, the ILR algorithm generally requires less CPU time and fewer iterations than the VRMILP and DFPRPMHS algorithms for a given level of impulse noise.

    Figure 4.  From left to right: A noisy image with 30% impulse noise and recovered images obtained by the ILR, VRMILP, and DFPRPMHS algorithms.
    Figure 5.  From left to right: A noisy image with 70% impulse noise and recovered images obtained by the ILR, VRMILP, and DFPRPMHS algorithms.
    Table 8.  The numerical results of the ILR, VRMILP, and DFPRPMHS algorithms.
    Algorithm Man Tank
    Noise: 30% Noise: 70% Noise: 30% Noise: 70%
    Niter/CPUT Niter/CPUT Niter/CPUT Niter/CPUT
    ILR 14/13.38 29/29.04 8/1.46 16/3.66
    VRMILP 22/28.26 39/55.89 18/5.47 20/6.52
    DFPRPMHS 27/38.08 42/46.95 17/2.59 18/3.92

     | Show Table
    DownLoad: CSV

    In this paper, we presented an improved LS-RMIL-type conjugate gradient projection algorithm aimed at efficiently solving systems of nonlinear equations with convex constraints. The proposed algorithm demonstrates several key advantages, including the ability to generate search directions that satisfy sufficient descent and trust-region properties independently of the line search approach. Additionally, the proposed algorithm only requires continuous and monotone assumptions for systems of nonlinear equations, which makes it applicable under less restrictive conditions compared to existing methods. We established the global convergence of the proposed algorithm without relying on the Lipschitz continuity assumption, further relaxing the conditions that need to be satisfied for successful implementation. Extensive numerical simulations, including large-scale systems of nonlinear equations and impulse noise image restoration problems, have shown that the proposed algorithm exhibits superior efficiency and stability compared to existing algorithms. These results indicate that the proposed algorithm is a promising and competitive approach, with significant potential for practical applications, such as image restoration.

    Yan Xia: Conceptualization, Investigation, Writing–original draft, Writing–review and editing, Funding acquisition; Xuejie Ma: Writing–review and editing, Funding acquisition; Dandan Li: Conceptualization, Funding acquisition, Writing–review and editing. All authors have read and approved the final version of the manuscript for publication.

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.

    This work is supported by the Guangzhou Huashang College Daoshi Project (2024HSDS28).

    The authors declare that there are no conflicts of interest regarding the publication of this paper.



    [1] A. Ahmadi-Javid, Entropic value-at-risk: A new coherent risk measure, J. Optim. Theory Appl., 155 (2012), 1105–1123. https://dx.doi.org/10.1007/s10957-011-9968-2 doi: 10.1007/s10957-011-9968-2
    [2] Y. Amihud, H. Mendelson, Liquidity and stock returns, Financ. Anal. J., 42 (1986), 43–48. http://dx.doi.org/10.2469/faj.v42.n3.43 doi: 10.2469/faj.v42.n3.43
    [3] P. Artzner, F. Delbaen, J.-M. Eber, D. Heath, Thinking coherently, Risk, 10 (1997), 68–71.
    [4] P. Artzner, F. Delbaen, J.-M. Eber, D. Heath, Coherent measures of risk, Math. Financ., 9 (1999), 203–228. http://dx.doi.org/10.1111/1467-9965.00068
    [5] A. Axelrod, L. Carlone, G. Chowdhary, S. Karaman, Data-driven prediction of EVAR with confidence in time-varying datasets, 2016 IEEE 55th Conference on Decision and Control (CDC), Las Vegas, NV, USA, 2016, 5833–5838. http://dx.doi.org/10.1109/CDC.2016.7799166
    [6] D. P. Baron, On the utility theoretic foundations of mean-variance analysis, J. Financ., 32 (1977), 1683–1697. http://dx.doi.org/10.1111/j.1540-6261.1977.tb03363.x doi: 10.1111/j.1540-6261.1977.tb03363.x
    [7] A. Ben-Tal, D. Bertsimas, D. B. Brown, A soft robust model for optimization under ambiguity, Oper. Res., 58 (2010), 1220–1234. http://dx.doi.org/10.1287/opre.1100.0821 doi: 10.1287/opre.1100.0821
    [8] D. Bertsimas, D. B. Brown, Constructing uncertainty sets for robust linear optimization, Oper. Res., 57 (2009), 1483–1495. http://dx.doi.org/10.1287/opre.1080.0646 doi: 10.1287/opre.1080.0646
    [9] M. Borkovec, I. Domowitz, B. Kiernan, V. Serbin, Portfolio optimization and the cost of trading, J. Invest., 19 (2010), 63–76. http://dx.doi.org/10.3905/joi.2010.19.2.063 doi: 10.3905/joi.2010.19.2.063
    [10] J. P. Bouchaud, J. Bonart, J. Donier, M. Gould, Trades, quotes and prices: financial markets under the microscope, Cambridge: Cambridge University Press, 2018. http://dx.doi.org/https://doi.org/10.1017/9781316659335
    [11] S. P. Boyd, L. Vandenberghe, Convex optimization, Cambridge: Cambridge University Press, 2004.
    [12] S. Caçador, J. M. Dias, P. Godinho, Portfolio selection under uncertainty: a new methodology for computing relative-robust solutions, Int. T. Oper. Res., 28 (2021), 1296–1329. http://dx.doi.org/10.1111/itor.12674 doi: 10.1111/itor.12674
    [13] D. Cajas, Entropic portfolio optimization: a disciplined convex programming framework, SSRN Electronic Journal, 2021 (2021), 3792520.
    [14] A. H. Chen, F. J. Fabozzi, D. S. Huang, Portfolio revision under mean-variance and mean-cvar with transaction costs, Rev. Quant. Finan. Acc., 39 (2012), 509–526. http://dx.doi.org/10.1007/s11156-012-0292-1 doi: 10.1007/s11156-012-0292-1
    [15] S. Chennaf, J. B. Amor, Entropic value at risk to find the optimal uncertain random portfolio, Soft Comput., 27 (2023), 15185–15197. http://dx.doi.org/10.1007/s00500-023-08547-5 doi: 10.1007/s00500-023-08547-5
    [16] J. Dufitinema, S. Pynnönen, T. Sottinen, Maximum likelihood estimators from discrete data modeled by mixed fractional brownian motion with application to the nordic stock markets, Commun. Stat. Simul. C., 51 (2022), 5264–5287. http://dx.doi.org/10.1080/03610918.2020.1764581 doi: 10.1080/03610918.2020.1764581
    [17] P. Embrechts, S. I. Resnick, G. Samorodnitsky, Extreme value theory as a risk management tool, N. Am. Actuar. J., 3 (1999), 30–41. http://dx.doi.org/10.1080/10920277.1999.10595797 doi: 10.1080/10920277.1999.10595797
    [18] D. Goldfarb, G. Iyengar, Robust portfolio selection problems, Math. Oper. Res., 28 (2003), 1–38. http://dx.doi.org/10.1287/moor.28.1.1.14260 doi: 10.1287/moor.28.1.1.14260
    [19] F. Hooshmand, Z. Anoushirvani, S. A. MirHassani, Model and efficient algorithm for the portfolio selection problem with real-world constraints under value-at-risk measure, Int. T. Oper. Res., 30 (2023), 2665–2690. http://dx.doi.org/10.1111/itor.13239 doi: 10.1111/itor.13239
    [20] R. P. Huang, Z. S. Xu, S. J. Qu, X. G. Yang, M. Goh, Robust portfolio selection with distributional uncertainty and integer constraints, J. Oper. Res. Soc. China, 11 (2023), 1–27. http://dx.doi.org/10.1007/s40305-023-00466-4 doi: 10.1007/s40305-023-00466-4
    [21] G. Kara, A. Özmen, G.-W. Weber, Stability advances in robust portfolio optimization under parallelepiped uncertainty, Cent. Eur. J. Oper. Res., 27 (2019), 241–261. http://dx.doi.org/10.1007/s10100-017-0508-5 doi: 10.1007/s10100-017-0508-5
    [22] J. Kriens, J. T. van Lieshout, Notes on the Markowitz portfolio selection method, Stat. Neerl., 42 (1988), 181–191. http://dx.doi.org/10.1111/j.1467-9574.1988.tb01232.x doi: 10.1111/j.1467-9574.1988.tb01232.x
    [23] W. Liu, L. Yang, B. Yu, Distributionally robust optimization based on Kernel density estimation and mean-entropic value-at-risk, INFORMS Journal on Optimization, 5 (2022), 68–91. http://dx.doi.org/10.1287/ijoo.2022.0076 doi: 10.1287/ijoo.2022.0076
    [24] G. M. Luo, Mixed complementarity problems for robust optimization equilibrium in bimatrix game, Appl. Math., 57 (2012), 503–520. http://dx.doi.org/10.1007/s10492-012-0029-4 doi: 10.1007/s10492-012-0029-4
    [25] H. Markowitz, Portfolio selection, J. Financ., 7 (1952), 77–91. http://dx.doi.org/10.1111/j.1540-6261.1952.tb01525.x
    [26] E. J. Menvouta, S. Serneels, T. Verdonck, Portfolio optimization using cellwise robust association measures and clustering methods with application to highly volatile markets, Journal of Finance and Data Science, 9 (2023), 100097. http://dx.doi.org/10.1016/j.jfds.2023.100097 doi: 10.1016/j.jfds.2023.100097
    [27] J. E. Mitchell, S. Braun, Rebalancing an investment portfolio in the presence of convex transaction costs, submitted for publication.
    [28] J. E. Mitchell, S. Braun, Rebalancing an investment portfolio in the presence of convex transaction costs, including market impact costs, Optim. Method. Softw., 28 (2013), 523–542. http://dx.doi.org/10.1080/10556788.2012.717940 doi: 10.1080/10556788.2012.717940
    [29] K. Muthuraman, S. Kumar, Multidimensional portfolio optimization with proportional transaction costs, Math. Financ., 16 (2006), 301–335. http://dx.doi.org/10.1111/j.1467-9965.2006.00273.x doi: 10.1111/j.1467-9965.2006.00273.x
    [30] G. C. Pflug, Some remarks on the value-at-risk and the conditional value-at-risk, In: Probabilistic constrained optimization, Boston: Springer, 2000,272–281. http://dx.doi.org/10.1007/978-1-4757-3150-7_15
    [31] R. T. Rockafellar, S. Uryasev, Optimization of conditional value-at-risk, J. Risk, 3 (2000), 21–41.
    [32] R. Sehgal, A. Mehra, Robust reward–risk ratio portfolio optimization, Int. T. Oper. Res., 28 (2021), 2169–2190. http://dx.doi.org/10.1111/itor.12652 doi: 10.1111/itor.12652
    [33] R. L. Sun, T. F. Ma, S. Z. Liu, Portfolio selection based on semivariance and distance correlation under minimum variance framework, Stat. Neerl., 73 (2019), 373–394. http://dx.doi.org/10.1111/stan.12174 doi: 10.1111/stan.12174
    [34] X. J. Tong, F. L. Wu, L. Q. Qi, Worst-case cvar based portfolio optimization models with applications to scenario planning, Optim. Method. Softw., 24 (2009), 933–958. http://dx.doi.org/10.1080/10556780902865942 doi: 10.1080/10556780902865942
    [35] X. J. Tong, F. L. Wu, Robust reward–risk ratio optimization with application in allocation of generation asset, Optimization, 63 (2014), 1761–1779. http://dx.doi.org/10.1080/02331934.2012.672419 doi: 10.1080/02331934.2012.672419
    [36] X. T. Wang, Z. Li, L. Zhuang, Risk preference, option pricing and portfolio hedging with proportional transaction costs, Chaos Soliton. Fract., 95 (2017), 111–130. https://dx.doi.org/10.1016/j.chaos.2016.12.010 doi: 10.1016/j.chaos.2016.12.010
    [37] L. J. Xu, Y. J. Zhou, New robust reward-risk ratio models with CVaR and standard deviation, J. Math., 2022 (2022), 8304411. http://dx.doi.org/10.1155/2022/8304411 doi: 10.1155/2022/8304411
    [38] C. L. Zheng, Y. Chen, Portfolio selection based on relative entropy coherent risk measure, Systems Engineering-Theory & Practice, 34 (2014), 648–655.
    [39] Y. J. Zhou, L. Yang, L. J. Xu, B. Yu, Inseparable robust reward–risk optimization models with distribution uncertainty, Japan J. Indust. Appl. Math., 33 (2016), 767–780. http://dx.doi.org/10.1007/s13160-016-0230-z doi: 10.1007/s13160-016-0230-z
    [40] S. S. Zhu, D. Li, S. Y. Wang, Robust portfolio selection under downside risk measures, Quant. Financ., 9 (2009), 869–885. http://dx.doi.org/10.1080/14697680902852746 doi: 10.1080/14697680902852746
    [41] S. S. Zhu, M. Fukushima, Worst-case conditional value-at-risk with application to robust portfolio management, Oper. Res., 57 (2009), 1155–1168. http://dx.doi.org/10.1287/opre.1080.0684 doi: 10.1287/opre.1080.0684
    [42] J. X. Zhu, Optimal financing and dividend distribution with transaction costs in the case of restricted dividend rates, ASTIN Bull., 47 (2017), 239–268. http://dx.doi.org/10.1017/asb.2016.29 doi: 10.1017/asb.2016.29
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1568) PDF downloads(57) Cited by(0)

Figures and Tables

Figures(3)  /  Tables(4)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog