Processing math: 47%
Research article Special Issues

An analytic pricing formula for timer options under constant elasticity of variance with stochastic volatility

  • Timer options, which were first introduced by Société Générale Corporate and Investment Banking in 2007, are financial securities whose payoffs and exercise are determined by a random time associated with the accumulated realized variance of the underlying asset, unlike vanilla options exercised at the prescribed maturity date. In this paper, taking account of the correlation between the underlying asset price and volatility, we investigate the pricing of timer options under the constant elasticity of variance (CEV) model, proposed by Cox and Ross [10], taking advantage of the approach of asymptotic analysis. Additionally, we validate the pricing precision of the approximate formula for timer options using the Monte Carlo method. We conduct numerical experiments based on our corrected prices and analyze price sensitivities concerning various model parameters, with a focus on the value of elasticity.

    Citation: Sun-Yong Choi, Donghyun Kim, Ji-Hun Yoon. An analytic pricing formula for timer options under constant elasticity of variance with stochastic volatility[J]. AIMS Mathematics, 2024, 9(1): 2454-2472. doi: 10.3934/math.2024121

    Related Papers:

    [1] Xiaowei Fang . A derivative-free RMIL conjugate gradient method for constrained nonlinear systems of monotone equations. AIMS Mathematics, 2025, 10(5): 11656-11675. doi: 10.3934/math.2025528
    [2] Xuejie Ma, Songhua Wang . A hybrid approach to conjugate gradient algorithms for nonlinear systems of equations with applications in signal restoration. AIMS Mathematics, 2024, 9(12): 36167-36190. doi: 10.3934/math.20241717
    [3] Habibu Abdullahi, A. K. Awasthi, Mohammed Yusuf Waziri, Issam A. R. Moghrabi, Abubakar Sani Halilu, Kabiru Ahmed, Sulaiman M. Ibrahim, Yau Balarabe Musa, Elissa M. Nadia . An improved convex constrained conjugate gradient descent method for nonlinear monotone equations with signal recovery applications. AIMS Mathematics, 2025, 10(4): 7941-7969. doi: 10.3934/math.2025365
    [4] Xiyuan Zhang, Yueting Yang . A new hybrid conjugate gradient method close to the memoryless BFGS quasi-Newton method and its application in image restoration and machine learning. AIMS Mathematics, 2024, 9(10): 27535-27556. doi: 10.3934/math.20241337
    [5] Yixin Li, Chunguang Li, Wei Yang, Wensheng Zhang . A new conjugate gradient method with a restart direction and its application in image restoration. AIMS Mathematics, 2023, 8(12): 28791-28807. doi: 10.3934/math.20231475
    [6] Abdulkarim Hassan Ibrahim, Poom Kumam, Auwal Bala Abubakar, Umar Batsari Yusuf, Seifu Endris Yimer, Kazeem Olalekan Aremu . An efficient gradient-free projection algorithm for constrained nonlinear equations and image restoration. AIMS Mathematics, 2021, 6(1): 235-260. doi: 10.3934/math.2021016
    [7] Rabiu Bashir Yunus, Ahmed R. El-Saeed, Nooraini Zainuddin, Hanita Daud . A structured RMIL conjugate gradient-based strategy for nonlinear least squares with applications in image restoration problems. AIMS Mathematics, 2025, 10(6): 14893-14916. doi: 10.3934/math.2025668
    [8] Sani Aji, Poom Kumam, Aliyu Muhammed Awwal, Mahmoud Muhammad Yahaya, Kanokwan Sitthithakerngkiet . An efficient DY-type spectral conjugate gradient method for system of nonlinear monotone equations with application in signal recovery. AIMS Mathematics, 2021, 6(8): 8078-8106. doi: 10.3934/math.2021469
    [9] Jamilu Sabi'u, Ibrahim Mohammed Sulaiman, P. Kaelo, Maulana Malik, Saadi Ahmad Kamaruddin . An optimal choice Dai-Liao conjugate gradient algorithm for unconstrained optimization and portfolio selection. AIMS Mathematics, 2024, 9(1): 642-664. doi: 10.3934/math.2024034
    [10] Maulana Malik, Ibrahim Mohammed Sulaiman, Auwal Bala Abubakar, Gianinna Ardaneswari, Sukono . A new family of hybrid three-term conjugate gradient method for unconstrained optimization with application to image restoration and portfolio selection. AIMS Mathematics, 2023, 8(1): 1-28. doi: 10.3934/math.2023001
  • Timer options, which were first introduced by Société Générale Corporate and Investment Banking in 2007, are financial securities whose payoffs and exercise are determined by a random time associated with the accumulated realized variance of the underlying asset, unlike vanilla options exercised at the prescribed maturity date. In this paper, taking account of the correlation between the underlying asset price and volatility, we investigate the pricing of timer options under the constant elasticity of variance (CEV) model, proposed by Cox and Ross [10], taking advantage of the approach of asymptotic analysis. Additionally, we validate the pricing precision of the approximate formula for timer options using the Monte Carlo method. We conduct numerical experiments based on our corrected prices and analyze price sensitivities concerning various model parameters, with a focus on the value of elasticity.



    Systems of nonlinear equations are fundamental to a diverse range of applications, including power flow analysis [1], economic equilibrium modeling [2], the development of generalized Bregman distance proximal point methods [3], and traffic assignment [4]. Meanwhile, these systems also involve monotone variational inequalities [5,6] and compression sensing problems [7,8]. Given the ubiquity and significance of such problems across these varied domains, the study and development of numerical methods to efficiently solve systems of nonlinear equations are of considerable practical importance. In this paper, we focus on a specific class of systems of nonlinear equations subject to convex constraints, which can be formulated as follows:

    θ(a)=0,aΘ, (1.1)

    where ΘRn is a non-empty, and closed convex set. The function θ:RnRn is assumed to possess monotonicity and continuous differentiability, satisfying the following condition:

    θ(a)θ(b),ab0,a,bRn.

    Generally, the gradient-type method generates a sequence {ak}, defined as follows:

    ak+1=ak+tkdk,k0,

    where tk is the step length, and dk denotes the search direction. The choice of the search direction dk gives rise to various gradient-type methods, such as the steepest descent methods, Newton's methods, and quasi-Newton methods [9,10]. Newton's and quasi-Newton methods, along with their numerous variants, have been extensively studied due to their strong local linear convergence properties. For instance, Mahdavi et al. [11] proposed and analyzed a nonmonotone quasi-Newton algorithm for strongly convex multiobjective optimization, demonstrating its global convergence and local superlinear convergence rate under certain conditions. Sihwail et al. [12] proposed a novel hybrid method, Newton-Harris hawks optimization, which combines Newton's methods and Harris hawks optimization to effectively solve systems of nonlinear equations. Moreover, Krutikov et al. [13] demonstrated that quasi-Newton methods, when applied to strongly convex functions with a Lipschitz gradient, achieve geometric convergence without relying on local quadratic approximations. However, despite these advantages, Newton's and quasi-Newton methods involve the computation of the Hessian matrix or its approximation value at each iteration, which significantly increases computational complexity. This requirement can be a limiting factor, particularly for large-scale problems where the Hessian matrix is difficult to compute and store efficiently.

    The conjugate gradient method [14,15] is one of the most effective approaches in the field of the gradient-type methods. It is highly recognized for its efficiency, simplicity, lower storage requirements, and reliable convergence properties. These characteristics make it particularly well-suited for solving large-scale systems of nonlinear equations [16,17]. The method's search direction is typically defined as follows:

    dk={θk,k=0,θk+βkdk1,k1,

    where θkθ(ak) and βk is known as the conjugate parameter. The choice of βk differentiates various conjugate gradient methods. Several advancements have been made in the development of conjugate gradient methods with different conjugate parameters [18]. For instance, Ma et al. [19] proposed a modified inertial three-term conjugate gradient method for solving nonlinear monotone equations with convex constraints. This method is notable for its global and Q-linear convergence properties, and has demonstrated superior numerical performance in applications such as sparse signal recovery and image restoration in compressed sensing. Furthermore, Liu et al. [20] introduced a spectral conjugate gradient method with an inertial factor for solving nonlinear pseudo-monotone equations over a convex set. Additionally, Sabiu et al. [21] developed an optimal scaled Perry conjugate gradient method for solving large-scale systems of monotone nonlinear equations. This method ensures global convergence under the conditions of monotonicity and Lipschitz continuity.

    Inspired by the classical Liu-Story (LS) [22] and Rivai-Mohamad-Ismail-Leong (RMIL) [23] conjugate parameters, as well as incorporating the hybrid technique (e.g, [24,25]) and the projection approach, we develop a modified LS-RMIL-type conjugate gradient projection algorithm. The proposed algorithm is specifically designed for solving systems of nonlinear equations with convex constraints. In this paper, and , represent the Euclidean norm and the inner product of vectors, respectively.

    In this section, we refine and enhance the search direction employed in the optimization processes of the LS and RMIL methods. Specifically, Liu et al. [22] and Rivai et al. [23] introduced conjugate parameters, defined respectively as:

    βLSk=θk,yk1θk1,dk1,βRMILk=θk,yk1dk12.

    Based on the insights derived from these parameters, we adopt the hybrid technique (e.g., [24,25]) that combines their key features. This leads to the formulation of a new conjugate parameter, which is subsequently incorporated into the framework of a three-term search direction. Our primary objective is to construct a novel search direction that ensures both the sufficient descent and trust-region properties, which are critical for the robustness and efficiency of the optimization process. To accomplish this, we carefully design a novel search direction tailored to meet these requirements. The designed search direction dk is defined as follows:

    dk={θk,k=0,θk+βkdk1+ϖkyk1,k1, (2.1)

    where the conjugate parameter βk and the scalar parameter ϖk are given by

    βk=θk,yk1ckyk12θk,dk1c2kandϖk=νkθk,dk1ck, (2.2)

    with yk1=θkθk1. One scalar parameter ck is crucial for maintaining stability in the iterative process, and is defined by

    ck=max{μdk1yk1,θk1,dk1,dk12},

    where μ is a positive constant. Another scalar parameter νk is introduced to fine-tune the adjustment of the search direction. It is defined as νk=min{˜ν,max{ˉνk,0}} with 0<˜ν<1, and ˉνk=θk,yk1sk1θk2, where sk1=akak1 represents the difference between the iterative points ak and ak1 of the optimization variable.

    Before delving into the sufficient descent and trust-region properties of the designed search direction (2.1), we can deduce some important bounds from the definition of βk and ϖk. We consider the bound for βk:

    |βk|θkyk1ck+yk12θkdk1c2k,

    which can be further bounded by

    |βk|θkyk1μdk1yk1+yk12θkdk1μ2dk12yk12.

    Simplifying this, we obtain

    |βk|(1μ+1μ2)θkdk1. (2.3)

    Next, we consider the bound for ϖk:

    |ϖk|νkθkdk1ck˜νkθkdk1μdk1yk1=˜νμθkyk1. (2.4)

    Lemma 1. The search direction dk generated by (2.1) satisfies the sufficient descent property:

    θk,dkMθk2,

    where M=114(1+˜ν)2.

    Proof. For k=0, the conclusion is straightforward, which implies θ0,d0=θ02Mθ02. For k1, together with the search direction generated by (2.1), we have:

    θk,dk=θk,θk+βkdk1+ϖkyk1=θk2+θk,yk1θk,dk1ckyk12θk,dk12c2k+νkθk,yk1θk,dk1ck=θk2+(1+νk)θk,yk1θk,dk1ckyk12θk,dk12c2k. (2.5)

    By applying the inequality ek,gk12(ek2+gk2), where ek=(1+νk)θk/2 and gk=2θk,dk1yk1/ck, we obtain the following result:

    (1+νk)θk,yk1θk,dk1ck14(1+νk)2θk2+θk,dk12yk12c2k. (2.6)

    Substituting (2.6) into (2.5), we obtain

    θk,dkθk2+14(1+˜νk)2θk2(114(1+˜ν)2)θk2.

    Thus, the result holds.

    Lemma 2. The search direction dk generated by (2.1) satisfies the trust-region property:

    MθkdkNθk,

    where N=1+1μ+1μ2+˜νμ.

    Proof. From Lemma 1, we have θkdkθk,dkMθk2, which implies:

    dkMθk.

    Additionally, together with (2.1), we obtain:

    dk=θk+βkdk1+ϖkyk1θk+|βk|dk1+|ϖk|yk1.

    Substituting the inequalities |βk| and |ϖk| defined in (2.3) and (2.4), respectively, into the above equality, we have

    dk(1+1μ+1μ2+˜νμ)θk.

    Thus, the result holds.

    Before delving into the specifics of our proposed algorithm, it is essential to first clarify the line search approach, the projection operator, and the iterative update rule employed in the proposed algorithm. These foundational components play a crucial role in the overall efficacy of the proposed algorithm.

    First, in the proposed algorithm, the line search approach is used to determine an appropriate step length tk=ηρik. Specifically, this step length is computed based on the following procedure, where ik={i:i=0,1,} is the smallest non-negative integer i that satisfies the following inequality:

    θ(ak+ηρidk),dkσηρiθ(ak+ηρidk)dk2, (2.7)

    where η>0, ρ(0,1), and σ>0 are algorithmic parameters.

    Furthermore, the projection operator PΘ[] is a critical component that ensures the iterative points remain within the feasible region Θ. Specifically, the projection of a point aRn onto the set Θ is defined as

    PΘ[a]=argmin{ab:bΘ},aRn.

    This operator identifies the point in Θ closest to a in the Euclidean norm. Moreover, the projection operator is non-expansive, meaning it satisfies the property:

    PΘ[a]PΘ[b]ab. (2.8)

    Finally, the iterative update rule forms the core of the proposed algorithm, indicating how the next iterative point ak+1 is computed from the current iterative point ak. Specifically, the update is performed by using the following formula:

    ak+1=PΘ[akγwkθ(zk)],wk=θ(zk),akzk||θ(zk)||2, (2.9)

    where zk=ak+tkdk and γ(0,2). This projection-based update ensures that the new iterative point remains feasible and moves towards reducing the objective function.

    With the foundational components described above, we now present the detailed steps of an improved LS-RMIL-type conjugate gradient projection algorithm (Abbr. ILR algorithm), which is described as Algorithm 1.

    Algorithm 1 An improved LS-RMIL-type conjugate gradient projection algorithm
      1: Initialization: a0Rn, μ>0, ˜ν(0,1), η,σ>0, ρ(0,1), τ>0, and set k:=0.
      2: while θk>τ do
      3:        Evaluate two parameters βk and ϖk from (2.2) and search direction dk from (2.1).
      4:        Evaluate the step length tk from (2.7) and set the trial point zk=ak+tkdk.
      5:        if zkΘ and θ(zk)<τ then
      6:                break.
      7:        else
      8:                Evaluate the next iterative point ak+1 from (2.9).
      9:        end if
    10:        Set k:=k+1.
    11: end while

    In this section, we provide a comprehensive analysis of the global convergence properties of the ILR algorithm. To facilitate this analysis, we introduce the following key assumptions.

    Assumption B:

    (B1) The solution set Θ of problem (1.1) is non-empty.

    (B2) The function θ(a) exhibits a monotonicity property, i.e.,

    θ(a)θ(b),ab0,a,bRn.

    These assumptions are fundamental in establishing the convergence behavior of the ILR algorithm as they ensure that the iterative process converges to a solution within the feasible region of problem (1.1).

    The following lemma demonstrates that the line search approach defined in (2.7) of the ILR algorithm is indeed well-defined and can be successfully applied in the iterative process.

    Lemma 3. Consider the sequence {tk} generated by the ILR algorithm. Then, there exists a step length tk at each iteration that satisfies the line search approach defined in (2.7).

    Proof. We proceed by contradiction and assume that inequality (2.7) does not hold. Specifically, suppose there exists a positive index k0 such that, for all i{0}N, the following inequality is satisfied:

    θ(ak0+ηρidk0),dk0<σηρiθ(ak0+ηρidk0)dk02.

    By utilizing the continuity of θ and taking the limit as i, the above inequality yields:

    θ(ak0),dk00. (3.1)

    On the other hand, invoking Lemma 1 and again taking the limit as i, we obtain:

    θ(ak0),dk0Mθ(ak0)2>0,

    which clearly contradicts inequality (3.1). This contradiction implies that the initial assumption must be false, and therefore inequality (2.7) must hold.

    The following lemma establishes that the sequence {ak} generated by the ILR algorithm exhibits monotonic behavior with respect to the solutions set Θ of problem (1.1).

    Lemma 4. Consider the sequences {ak} and {zk} generated by the ILR algorithm. Then, the following properties hold:

    (i) The sequence {ak} is bounded, meaning that there exists a constant D>0 such that akD for all k0.

    (ii) The sequence {zk} converges to the sequence {ak}, i.e., limkzkak=0.

    Proof. From the definition of the projection operator PΘ[] and the non-expensive property defined in (2.8), we can derive the following inequality:

    ak+1a2=PΘ[akγwkθ(zk)]PΘ[a]2akγwkθ(zk)a2=aka22γwkθ(zk),aka+γ2w2kθ(zk)2, (3.2)

    where a denotes a solution of problem (1.1). Next, starting from Assumption B2, the definition of zk, and the line search approach (2.7), we can further establish the following inequality:

    θ(zk),aka=θ(zk),akzk+θ(zk),zkaθ(a),zkaθ(zk),akzkσt2kθ(zk)dk2. (3.3)

    Combining with (3.2), (3.3), and the definition of wk, we can derive

    ak+1a2aka22γwkθ(zk),akzk+γ2w2kθ(zk)2,=aka22γw2kθ(zk)2+γ2w2kθ(zk)2,=aka2(2γγ2)w2kθ(zk)2, (3.4)

    Given the definition of wk and (3.3), we have

    θ(zk)2wk=θ(zk),akzkσt2kθ(zk)dk2,

    which implies that θ(zk)wkσt2kdk2. Substituting this into (3.4), we obtain

    ak+1a2aka2(2γγ2)(σt2kdk2)2,=aka2(2γγ2)σ2t4kdk4,=aka2(2γγ2)σ2akzk4. (3.5)

    This result indicates that the sequence {aka} is monotonically decreasing, meaning that it consistently reduces as k increases. Hence, the sequence {ak} is bounded.

    By reorganizing the formula defined in (3.5), we obtain

    (2γγ2)σ2k=0akzk4k=0(aka2ak+1a2)a0a. (3.6)

    This implies that limkzkak=0.

    Theorem 1. Consider the sequence {θk} generated by the ILR algorithm. Then, the following conclusion is satisfied:

    limkθk=0. (3.7)

    Proof. To demonstrate the desired result, we begin by assuming the contrary. Suppose that there exists a constant A1>0 such that θk>A1 for all k0. This assumption, combined with Lemma 2, gives us the following relation dkMθk>M A1 for all k0. Given the continuity of the function θ(a) and the boundedness of the sequence {ak}, it follows that the sequence {θk} is also bounded. In other words, there exists a non-negative constant A2 such that θkA2 for all \(k \geq 0\). By incorporating this bound with Lemma 2, we obtain dkNθkNA2 for all k0. The two inequalities derived above imply that the sequence {dk} is bounded. Together with Lemma 4(ii) and the definition of zk, we have limkzkak=limkak+tkdkak=limktkdk=0, which leads to the conclusion that limktk=0 with the boundedness of the sequence {dk}.

    Since the sequences {ak} and {dk} are both bounded, we can extract two convergent subsequences, {aki} and {dki}, such that limi,iKaki=ˉa and limi,iKdki=ˉd, where K denotes an infinite index set. Utilizing Lemma 1, we have θki,dkiMθki2. Taking the limit as i in the above inequality and invoking the continuity of θ(a), we obtain

    θ(ˉa),ˉdMθ(ˉa)2MA21>0.

    Furthermore, we adopt the line search approach defined in (2.7), which implies the following inequality holds: θ(aki+(ηρ)1tkidki),dki<ση(ηρ)1tkiθ(aki+(ηρ)1tkidki)dki2. Taking the limit as i in the above inequality, and using the continuity of θ(a), we conclude

    θ(ˉa),ˉd0.

    These two results directly contradict each other. Therefore, the assumption that θk>A1 for all \(k \geq 0\) must be false, and the desired result follows.

    In this section, we evaluate the effectiveness of the proposed ILR algorithm through a comprehensive set of numerical experiments. These experiments are designed to solve large-scale systems of nonlinear equations with convex constraints, thereby assessing the algorithm's computational efficiency. For benchmarking purposes, we compare the ILR algorithm with two established methods (e.g., VRMILP and DFPRPMHS) across various test problems, initial points, and dimensional settings.

    In this section, we utilize the ILR algorithm to address large-scale systems of nonlinear equations with convex constraints. We then compare it with two existing algorithms: the VRMILP algorithm [26] and the DFPRPMHS algorithm [27]. All experimental codes are executed on a 64-bit Ubuntu 20.04.2 LTS operating system with an Intel(R) Xeon(R) Gold 5115 2.40GHz CPU. The parameters for the ILR algorithm are set as follows:

    μ=0.02,˜ν=0.105,η=1,σ=104,ρ=0.74,τ=105.

    For the VRMILP and DFPRPMHS algorithms, we adhere to the parameter settings provided in their respective original works. Seven test problems are selected for evaluation, with problem dimensions set at {5,000 10,000 50,000 100,000 150,000}. Each test problem is initialized by the following points: a1=(12,122,,12n), a2=(0,1n,2n,,n1n), a3=(1,12,,1n), a4=(1n,2n,,nn), a5=(13,132,,13n), a6=(2,2,,2) a7=(11n,12n,,1nn), a8[0,1]n. The stopping criteria for all algorithms is set to either θkτ or a maximum of 3000 iterations. Here, θ(a)=(θ1(a),θ2(a),,θn(a))T with a=(a1,a2,,an)T. The seven test problems are described as follows:

    Problem 1 [7]:

    θi(a)=eai1,fori=1,2,,n,

    with the constraint set Θ=Rn+. The unique solution is a=(0,0,,0)T.

    Problem 2 [7]:

    θi(a)=ineai1,fori=1,2,,n,

    with the constraint set Θ=Rn+.

    Problem 3 [5]:

    θi(a)=log(ai+1)ain,fori=1,2,,n,

    with the constraint set Θ=[1,+).

    Problem 4 [5]:

    θi(a)=(eai)2+3sin(ai)cos(ai)1,fori=1,2,,n,

    with the constraint set Θ=Rn+.

    Problem 5 [5]:

    θ1(a)=2a1+sin(a1)1,θi(a)=2ai1+2ai+sin(ai)1,fori=2,3,,n1,θn(a)=2an+sin(an)1,

    with the constraint set Θ=Rn+.

    Problem 6 [7]:

    θi(a)=1neai1,fori=1,2,,n,

    with the constraint set Θ=Rn+.

    Problem 7 [5]:

    θi(a)=ai2sin(|ai1|),fori=1,2,,n,

    with the constraint set Θ=Rn+.

    The performance of the ILR, VRMILP, and DFPRPMHS algorithms are systematically evaluated through a series of test problems, with the numerical results presented in Tables 17. In these tables, "Init" refers to the initial point used in each test problem, "n" refers to the problem dimension multiplied by 1000, "CPUT" refers to the CPU time in seconds, "Nfunc" refers to the number of function evaluations, and "Niter" refers to the number of iterations. A notable observation from the numerical results is that all three algorithms successfully solve the test problem across various initial points and problem dimensions. To be specific, the ILR algorithm demonstrates superior performance in most cases compared to the other two algorithms.

    Table 1.  Numerical results for Problem 1.
    Inti(n) ILR VRMILP DFPRPMHS
    CPUT/Nfunc/Niter CPUT/Nfunc/Niter CPUT/Nfunc/Niter
    a1(5) 1.93×103/4/1 4.45×104/4/1 1.57×102/332/7
    a2(5) 1.84×103/23/7 3.47×103/60/15 2.15×102/487/24
    a3(5) 2.11×103/29/9 2.16×103/37/8 1.75×102/447/10
    a4(5) 1.55×103/23/7 2.13×103/39/9 1.86×102/405/31
    a5(5) 1.57×103/23/7 3.33×103/60/15 2.04×102/487/24
    a6(5) 5.08×104/7/1 4.16×104/7/1 2.00×103/9/1
    a7(5) 1.92×103/23/7 3.46×103/60/15 2.07×102/487/24
    a8(5) 2.21×103/30/9 2.16×103/39/9 2.30×102/563/14
    a1(10) 6.36×104/4/1 4.22×104/4/1 2.50×102/332/7
    a2(10) 3.69×103/23/7 6.19×103/57/14 4.11×102/487/24
    a3(10) 4.66×103/29/9 3.96×103/37/8 3.44×102/447/10
    a4(10) 3.48×103/23/7 4.12×103/39/9 3.59×102/408/32
    a5(10) 3.45×103/23/7 6.12×103/57/14 3.98×102/487/24
    a6(10) 8.35×104/7/1 7.34×104/7/1 1.99×103/9/1
    a7(10) 3.56×103/23/7 6.10×103/57/14 3.88×102/487/24
    a8(10) 6.37×103/41/13 5.28×103/48/12 4.40×102/563/14
    a1(50) 3.75×103/4/1 1.64×103/4/1 9.06×102/332/7
    a2(50) 1.35×102/23/7 2.48×102/60/15 1.51×101/596/26
    a3(50) 1.27×102/29/9 1.72×102/37/8 1.02×101/447/10
    a4(50) 9.17×103/23/7 1.11×102/39/9 1.39×101/602/28
    a5(50) 1.39×102/23/7 2.47×102/60/15 1.49×101/596/26
    a6(50) 2.67×103/7/1 4.30×103/7/1 5.98×103/9/1
    a7(50) 1.13×102/23/7 1.95×102/60/15 1.32×101/596/26
    a8(50) 1.06×102/23/7 1.86×102/56/14 1.30×101/576/16
    a1(100) 7.76×103/4/1 2.44×103/4/1 1.21×101/332/7
    a2(100) 1.49×102/23/7 3.51×102/66/17 1.44×101/487/24
    a3(100) 1.69×102/29/9 1.64×102/37/8 1.24×101/447/10
    a4(100) 1.49×102/23/7 1.56×102/39/9 1.84×101/602/28
    a5(100) 1.24×102/23/7 2.76×102/66/17 1.38×101/487/24
    a6(100) 2.91×103/7/1 2.55×103/7/1 5.45×103/9/1
    a7(100) 1.22×102/23/7 2.67×102/66/17 1.50×101/487/24
    a8(100) 1.32×102/23/7 3.29×102/60/15 1.92×101/677/18
    a1(150) 3.49×103/4/1 2.63×103/4/1 1.13×101/332/7
    a2(150) 1.88×102/23/7 3.88×102/75/19 2.84×101/602/28
    a3(150) 1.95×102/29/9 1.88×102/37/8 1.71×101/447/10
    a4(150) 1.65×102/23/7 2.08×102/39/9 2.36×101/602/28
    a5(150) 1.65×102/23/7 3.80×102/75/19 2.40×101/602/28
    a6(150) 5.11×103/7/1 4.06×103/7/1 1.05×102/9/1
    a7(150) 1.75×102/23/7 4.80×102/75/19 2.46×101/602/28
    a8(150) 1.95×102/23/7 2.97×102/45/11 2.34×101/575/18

     | Show Table
    DownLoad: CSV
    Table 2.  Numerical results for Problem 2.
    Inti(n) ILR VRMILP DFPRPMHS
    CPUT/Nfunc/Niter CPUT/Nfunc/Niter CPUT/Nfunc/Niter
    a1(5) 8.86×103/29/11 8.84×103/96/25 3.91×102/576/23
    a2(5) 2.64×102/400/52 1.73×102/281/31 5.06×102/893/43
    a3(5) 2.85×103/30/11 6.36×103/88/23 2.04×102/300/34
    a4(5) 2.69×102/414/53 1.86×102/310/30 4.14×102/692/44
    a5(5) 4.95×103/54/20 7.76×103/107/28 2.56×102/406/35
    a6(5) 1.57×102/232/31 7.92×103/114/25 5.95×102/1056/34
    a7(5) 5.33×103/54/20 7.78×103/107/28 2.59×102/406/35
    a8(5) 4.65×102/727/76 1.90×102/305/36 4.12×102/688/41
    a1(10) 1.22×102/56/20 1.26×102/84/22 5.03×102/411/37
    a2(10) 5.78×102/435/47 4.50×102/398/34 7.79×102/703/22
    a3(10) 6.49×103/29/11 1.56×102/82/22 5.64×102/353/55
    a4(10) 8.59×102/582/57 4.34×102/387/36 8.26×102/721/25
    a5(10) 1.05×102/50/18 1.92×102/128/32 4.28×102/300/37
    a6(10) 3.89×102/276/35 1.51×102/108/24 9.90×102/851/40
    a7(10) 1.07×102/50/18 1.87×102/128/32 4.04×102/300/37
    a8(10) 8.75×102/673/60 6.39×102/541/52 1.09×101/966/39
    a1(50) 5.65×102/57/20 5.36×102/90/24 1.69×101/320/41
    a2(50) 4.89×101/997/80 4.34×101/951/57 3.28×101/731/24
    a3(50) 2.44×102/35/13 5.55×102/99/26 1.42×101/327/35
    a4(50) 4.42×101/926/83 3.80×101/957/55 3.09×101/731/24
    a5(50) 4.08×102/55/19 6.92×102/124/31 1.93×101/409/36
    a6(50) 2.48×101/510/51 5.96×102/114/25 4.73×101/1119/36
    a7(50) 3.77×102/55/19 6.56×102/124/31 1.99×101/409/36
    a8(50) 4.88×101/1011/86 3.19×101/699/50 3.04×101/686/20
    a1(100) 7.76×102/75/27 7.69×102/92/24 4.11×101/613/31
    a2(100) 8.14×101/1187/92 8.34×101/1259/65 4.43×101/727/24
    a3(100) 9.47×102/96/33 7.82×102/94/25 2.83×101/413/39
    a4(100) 7.69×101/1073/90 8.34×101/1193/66 5.16×101/728/24
    a5(100) 9.05×102/76/26 1.01×101/119/31 3.28×101/493/29
    a6(100) 3.62×101/505/46 9.80×102/122/27 6.84×101/1006/46
    a7(100) 8.67×102/76/26 9.83×102/119/31 3.27×101/493/29
    a8(100) 1.18×100/1610/106 5.32×101/800/52 4.04×101/608/25
    a1(150) 8.00×102/54/20 1.15×101/99/26 3.48×101/330/40
    a2(150) 1.15×100/1130/87 1.34×100/1408/76 7.09×101/726/24
    a3(150) 8.44×102/57/18 1.25×101/102/26 4.08×101/400/35
    a4(150) 1.17×100/1165/95 1.26×100/1365/69 6.80×101/726/24
    a5(150) 9.90×102/69/25 1.44×101/124/32 4.11×101/407/38
    a6(150) 7.33×101/714/63 1.32×101/117/26 8.80×100/8853/275
    a7(150) 1.24×101/69/25 1.73×101/124/32 4.47×101/407/38
    a8(150) 1.33×100/1224/91 1.27×100/1255/71 7.01×101/657/29

     | Show Table
    DownLoad: CSV
    Table 3.  Numerical results for Problem 3.
    Inti(n) ILR VRMILP DFPRPMHS
    CPUT/Nfunc/Niter CPUT/Nfunc/Niter CPUT/Nfunc/Niter
    a1(5) 8.33×103/23/8 2.50×103/21/9 3.90×102/544/11
    a2(5) 8.23×103/61/21 8.17×103/82/22 6.76×102/977/19
    a3(5) 5.10×103/45/16 5.06×103/60/16 3.11×102/492/30
    a4(5) 7.16×103/66/23 6.87×103/82/22 5.68×102/977/19
    a5(5) 6.90×103/61/21 7.31×103/82/22 5.94×102/977/19
    a6(5) 2.28×103/19/7 3.53×103/33/14 6.56×102/1084/21
    a7(5) 7.05×103/61/21 6.94×103/82/22 5.87×102/977/19
    a8(5) 4.85×103/44/15 8.76×103/105/28 5.83×102/977/19
    a1(10) 6.23×103/23/8 3.88×103/21/9 5.47×102/544/11
    a2(10) 9.75×103/49/17 1.26×102/85/23 1.05×101/986/21
    a3(10) 1.12×102/54/19 8.97×103/60/16 5.92×102/499/31
    a4(10) 1.67×102/78/28 1.27×102/85/23 1.07×101/986/21
    a5(10) 1.04×102/49/17 1.24×102/85/23 1.09×101/986/21
    a6(10) 4.08×103/19/7 5.89×103/33/14 1.06×101/977/19
    a7(10) 1.10×102/49/17 1.44×102/85/23 1.11×101/986/21
    a8(10) 8.57×103/44/15 1.47×102/98/27 9.76×102/890/24
    a1(50) 2.84×102/23/8 1.39×102/21/9 1.18×101/437/9
    a2(50) 4.56×102/74/26 3.72×102/94/25 3.08×101/978/19
    a3(50) 2.33×102/44/15 2.67×102/60/16 1.04×101/279/31
    a4(50) 4.24×102/61/21 4.43×102/93/25 2.94×101/978/19
    a5(50) 5.26×102/74/26 4.02×102/94/25 2.85×101/978/19
    a6(50) 1.01×102/19/7 1.48×102/35/15 2.93×101/977/19
    a7(50) 4.55×102/74/26 4.41×102/94/25 2.97×101/978/19
    a8(50) 4.27×102/63/22 5.60×102/102/27 2.92×101/978/19
    a1(100) 1.51×102/20/7 1.14×102/18/7 1.52×101/437/9
    a2(100) 5.81×102/72/25 6.66×102/104/28 3.86×101/978/19
    a3(100) 4.40×102/58/20 3.25×102/60/16 1.36×101/364/19
    a4(100) 4.69×102/61/21 5.44×102/104/28 4.02×101/978/19
    a5(100) 5.39×102/72/25 5.64×102/104/28 3.98×101/978/19
    a6(100) 1.69×102/19/7 2.70×102/35/15 4.70×101/1085/21
    a7(100) 5.06×102/72/25 5.60×102/104/28 4.14×101/978/19
    a8(100) 6.54×102/76/26 5.91×102/109/29 3.98×101/978/19
    a1(150) 1.99×102/20/7 1.50×102/18/7 2.04×101/437/9
    a2(150) 7.71×102/71/25 8.53×102/99/27 5.09×101/978/19
    a3(150) 5.08×102/51/17 4.93×102/60/16 1.65×101/274/19
    a4(150) 8.24×102/74/25 8.47×102/99/27 5.37×101/978/19
    a5(150) 7.76×102/71/25 6.93×102/99/27 5.39×101/978/19
    a6(150) 2.37×102/22/8 3.91×102/35/15 5.64×101/978/19
    a7(150) 8.44×102/71/25 8.50×102/99/27 5.38×101/978/19
    a8(150) 6.24×102/62/22 7.60×102/105/28 5.27×101/978/19

     | Show Table
    DownLoad: CSV
    Table 4.  Numerical results for Problem 4.
    Inti(n) ILR VRMILP DFPRPMHS
    CPUT/Nfunc/Niter CPUT/Nfunc/Niter CPUT/Nfunc/Niter
    a1(5) 1.58×101/3/1 4.47×103/3/1 2.10×102/3/1
    a2(5) 1.70×102/44/5 1.91×102/149/16 4.55×102/651/16
    a3(5) 9.99×103/63/8 1.86×102/247/26 2.06×102/259/7
    a4(5) 3.70×103/44/5 1.33×102/225/24 2.86×102/509/12
    a5(5) 5.19×103/44/5 1.36×102/149/16 3.72×102/651/16
    a6(5) 8.76×104/4/1 5.51×104/4/1 2.28×103/4/1
    a7(5) 3.48×103/44/5 9.75×103/149/16 3.18×102/651/16
    a8(5) 3.25×103/44/5 1.24×102/200/21 3.11×102/626/14
    a1(10) 1.03×103/3/1 5.12×104/3/1 3.02×103/3/1
    a2(10) 5.99×103/44/5 2.83×102/243/26 6.79×102/660/16
    a3(10) 8.56×103/63/8 2.97×102/246/26 2.56×102/259/7
    a4(10) 5.47×103/44/5 1.59×102/141/15 5.05×102/509/12
    a5(10) 5.66×103/44/5 2.84×102/243/26 6.01×102/660/16
    a6(10) 1.04×103/4/1 6.07×104/4/1 1.69×103/4/1
    a7(10) 5.08×103/44/5 2.48×102/243/26 5.86×102/660/16
    a8(10) 5.28×103/44/5 2.45×102/229/24 3.55×102/364/17
    a1(50) 8.54×103/3/1 1.09×103/3/1 3.14×103/3/1
    a2(50) 2.88×102/44/5 6.72×102/159/17 1.44×101/509/12
    a3(50) 2.57×102/63/8 7.24×102/237/25 6.79×102/259/7
    a4(50) 1.77×102/44/5 9.94×102/245/26 1.31×101/509/12
    a5(50) 1.74×102/44/5 6.06×102/159/17 1.66×101/509/12
    a6(50) 2.83×103/4/1 3.46×103/4/1 4.31×103/4/1
    a7(50) 1.88×102/44/5 5.47×102/159/17 1.40×101/509/12
    a8(50) 1.87×102/44/5 8.57×102/244/26 1.81×101/725/17
    a1(100) 3.06×103/3/1 2.70×103/3/1 4.55×103/3/1
    a2(100) 2.59×102/44/5 1.15×101/250/27 1.79×101/509/12
    a3(100) 3.02×102/63/8 8.74×102/197/21 8.90×102/259/7
    a4(100) 2.46×102/44/5 8.31×102/176/19 1.76×101/509/12
    a5(100) 2.40×102/44/5 1.17×101/250/27 1.83×101/509/12
    a6(100) 1.20×102/11/1 1.08×102/11/1 5.98×103/4/1
    a7(100) 2.57×102/44/5 1.21×101/250/27 1.97×101/509/12
    a8(100) 2.37×102/44/5 9.33×102/187/20 1.82×101/509/12
    a1(150) 3.87×103/3/1 1.92×103/3/1 6.30×103/3/1
    a2(150) 3.76×102/44/5 1.33×101/201/22 2.57×101/509/12
    a3(150) 4.78×102/63/8 1.15×101/179/19 1.22×101/259/7
    a4(150) 3.00×102/44/5 8.73×102/132/14 2.34×101/509/12
    a5(150) 3.16×102/44/5 1.34×101/201/22 2.51×101/509/12
    a6(150) 1.60×102/11/1 1.42×102/11/1 1.33×102/8/1
    a7(150) 3.09×102/44/5 1.32×101/201/22 2.46×101/509/12
    a8(150) 3.17×102/44/5 2.09×101/301/32 3.02×101/642/24

     | Show Table
    DownLoad: CSV
    Table 5.  Numerical results for Problem 5.
    Inti(n) ILR VRMILP DFPRPMHS
    CPUT/Nfunc/Niter CPUT/Nfunc/Niter CPUT/Nfunc/Niter
    a1(5) 5.45×102/283/36 3.93×102/309/34 6.74×102/694/43
    a2(5) 2.50×102/235/30 3.07×102/330/36 9.82×102/1113/46
    a3(5) 2.09×102/191/24 2.60×102/294/32 5.82×102/663/50
    a4(5) 2.41×102/235/30 3.07×102/330/36 8.84×102/1125/46
    a5(5) 2.04×102/212/27 3.62×102/289/31 1.26×101/1142/56
    a6(5) 2.66×102/253/32 2.25×102/286/32 1.41×101/1265/113
    a7(5) 2.84×102/212/27 3.94×102/289/31 1.22×101/1142/56
    a8(5) 3.33×102/247/32 3.92×102/331/35 2.61×101/2555/55
    a1(10) 6.23×102/254/32 9.28×102/356/39 1.72×101/757/57
    a2(10) 5.84×102/239/31 6.88×102/308/33 1.68×101/800/48
    a3(10) 5.94×102/258/33 6.19×102/296/33 1.20×101/565/46
    a4(10) 5.24×102/232/30 6.53×102/308/33 1.60×101/800/48
    a5(10) 5.56×102/239/31 6.79×102/325/35 1.65×101/789/62
    a6(10) 4.87×102/205/26 6.13×102/282/32 1.81×101/887/53
    a7(10) 5.46×102/239/31 6.68×102/325/35 1.63×101/789/62
    a8(10) 6.69×102/275/36 7.43×102/350/37 2.56×101/1297/54
    a1(50) 2.56×101/211/27 3.13×101/308/33 5.78×101/657/46
    a2(50) 2.42×101/229/29 2.56×101/279/31 1.24×100/1319/111
    a3(50) 2.35×101/250/32 2.68×101/308/33 6.76×101/682/59
    a4(50) 2.38×101/229/29 2.83×101/279/31 1.17×100/1276/105
    a5(50) 2.33×101/228/29 3.54×101/340/38 9.50×101/983/83
    a6(50) 2.17×101/219/28 2.92×101/324/35 8.49×101/937/52
    a7(50) 2.46×101/228/29 3.07×101/340/38 9.22×101/983/83
    a8(50) 2.32×101/241/31 3.16×101/364/39 1.09×100/1238/56
    a1(100) 3.79×101/220/28 4.93×101/325/35 1.12×100/753/44
    a2(100) 4.04×101/236/30 4.62×101/283/32 1.24×100/768/61
    a3(100) 4.28×101/250/32 4.92×101/317/34 1.87×100/1229/56
    a4(100) 3.82×101/236/30 4.27×101/273/31 1.24×100/768/61
    a5(100) 4.77×101/262/33 5.63×101/331/36 1.40×100/892/65
    a6(100) 4.27×101/254/33 5.55×101/314/34 1.66×100/1020/50
    a7(100) 4.73×101/262/33 5.60×101/331/36 1.30×100/892/65
    a8(100) 4.79×101/291/38 5.78×101/380/41 1.96×100/1246/58
    a1(150) 5.67×101/221/28 6.78×101/287/31 2.40×100/1010/50
    a2(150) 5.10×101/206/26 8.62×101/375/41 2.98×100/1327/123
    a3(150) 5.57×101/228/29 6.93×101/325/35 1.95×100/832/52
    a4(150) 5.48×101/206/26 8.80×101/375/41 3.41×100/1363/126
    a5(150) 5.66×101/214/27 8.50×101/358/40 2.31×100/1031/78
    a6(150) 4.97×101/240/31 7.32×101/313/34 1.83×100/875/46
    a7(150) 5.95×101/214/27 9.02×101/358/40 2.42×100/1031/78
    a8(150) 6.91×101/291/38 1.13×100/456/49 2.85×100/1242/58

     | Show Table
    DownLoad: CSV
    Table 6.  Numerical results for Problem 6.
    Inti(n) ILR VRMILP DFPRPMHS
    CPUT/Nfunc/Niter CPUT/Nfunc/Niter CPUT/Nfunc/Niter
    a1(5) 7.08×103/34/14 6.92×103/84/22 4.32×102/672/21
    a2(5) 7.84×103/69/27 5.48×103/71/22 2.96×102/513/40
    a3(5) 4.14×103/34/14 7.29×103/111/27 2.58×102/504/34
    a4(5) 7.08×103/74/28 4.61×103/71/22 2.23×102/414/41
    a5(5) 5.92×103/69/27 4.87×103/71/22 2.85×102/513/40
    a6(5) 3.27×103/32/13 2.77×103/28/11 3.18×102/670/20
    a7(5) 6.28×103/69/27 4.86×103/71/22 2.74×102/513/40
    a8(5) 6.68×103/79/30 5.76×103/84/25 2.66×102/446/40
    a1(10) 6.94×103/31/13 8.81×103/67/20 4.26×102/424/29
    a2(10) 6.88×103/34/14 1.25×102/95/27 6.07×102/672/21
    a3(10) 6.52×103/31/13 1.68×102/142/31 3.96×102/384/30
    a4(10) 6.86×103/34/14 1.36×102/90/26 6.88×102/672/21
    a5(10) 7.18×103/34/14 1.23×102/95/27 6.25×102/672/21
    a6(10) 7.48×103/35/14 4.64×103/33/13 5.18×102/561/18
    a7(10) 6.86×103/34/14 1.20×102/95/27 6.47×102/672/21
    a8(10) 6.92×103/34/14 1.10×102/86/25 6.35×102/672/21
    a1(50) 3.20×102/41/17 3.59×101/1099/94 2.04×101/698/31
    a2(50) 2.57×102/36/15 4.34×102/105/29 1.82×101/572/23
    a3(50) 2.34×102/38/16 2.38×101/769/56 1.70×101/511/38
    a4(50) 2.23×102/36/15 3.88×102/101/28 1.87×101/572/23
    a5(50) 2.68×102/36/15 4.40×102/105/29 1.84×101/572/23
    a6(50) 2.29×102/37/15 1.08×102/25/10 2.13×101/672/21
    a7(50) 2.70×102/36/15 5.36×102/105/29 1.88×101/572/23
    a8(50) 2.61×102/36/15 4.65×102/102/28 1.88×101/572/23
    a1(100) 3.96×102/41/17 5.61×102/84/25 2.28×101/569/22
    a2(100) 5.49×102/57/24 6.17×102/100/28 2.95×101/676/23
    a3(100) 3.64×102/41/17 4.73×102/84/23 2.08×101/411/43
    a4(100) 4.85×102/57/24 6.49×102/100/28 2.92×101/676/23
    a5(100) 4.61×102/57/24 5.92×102/100/28 2.79×101/676/23
    a6(100) 3.35×102/39/16 2.28×102/33/13 2.64×101/673/22
    a7(100) 4.73×102/57/24 6.31×102/100/28 2.89×101/676/23
    a8(100) 7.09×102/83/33 5.68×102/100/28 3.00×101/676/23
    a1(150) 4.56×102/38/16 6.69×102/83/24 4.36×101/678/24
    a2(150) 5.06×102/41/17 1.01×101/125/35 3.39×101/512/39
    a3(150) 4.98×102/38/16 1.21×101/154/34 4.10×101/661/52
    a4(150) 4.84×102/41/17 1.21×101/125/35 3.36×101/517/41
    a5(150) 4.28×102/41/17 1.23×101/125/35 3.83×101/512/39
    a6(150) 6.04×102/39/16 3.64×102/35/14 3.85×101/674/22
    a7(150) 4.13×102/41/17 9.58×102/125/35 3.00×101/512/39
    a8(150) 4.37×102/41/17 1.17×101/129/36 3.59×101/597/33

     | Show Table
    DownLoad: CSV
    Table 7.  Numerical results for Problem 7.
    Inti(n) ILR VRMILP DFPRPMHS
    CPUT/Nfunc/Niter CPUT/Nfunc/Niter CPUT/Nfunc/Niter
    a1(5) 1.75×102/111/18 6.37×103/73/12 4.54×102/752/32
    a2(5) 9.71×103/118/19 1.35×102/207/29 3.64×102/811/55
    a3(5) 5.77×103/104/17 3.63×103/73/12 3.20×102/829/17
    a4(5) 6.72×103/126/20 5.25×103/112/17 3.93×102/934/46
    a5(5) 6.59×103/118/19 9.84×103/207/29 3.90×102/891/51
    a6(5) 5.47×103/96/17 3.57×103/72/13 4.04×102/1024/21
    a7(5) 6.59×103/118/19 1.00×102/207/29 3.93×102/892/51
    a8(5) 6.74×103/128/20 9.35×103/207/29 4.15×102/927/45
    a1(10) 1.70×102/113/18 8.21×103/73/12 6.53×102/735/43
    a2(10) 1.72×102/148/22 1.30×102/137/20 8.32×102/1047/35
    a3(10) 1.36×102/133/20 6.79×103/73/12 6.49×102/830/17
    a4(10) 1.71×102/138/22 1.12×102/112/17 7.33×102/913/30
    a5(10) 1.73×102/148/22 1.28×102/137/20 1.07×101/1047/35
    a6(10) 1.19×102/96/17 8.66×103/72/13 8.01×102/1024/21
    a7(10) 1.66×102/148/22 1.44×102/137/20 8.95×102/1047/35
    a8(10) 1.54×102/131/21 2.27×102/241/33 7.95×102/914/43
    a1(50) 4.83×102/118/19 2.48×102/79/13 2.08×101/836/16
    a2(50) 4.34×102/133/21 4.56×102/185/26 2.22×101/988/27
    a3(50) 3.22×102/105/17 2.33×102/79/13 1.81×101/772/37
    a4(50) 3.98×102/133/21 2.78×102/112/17 2.34×101/999/52
    a5(50) 4.44×102/133/21 4.96×102/185/26 2.44×101/988/27
    a6(50) 3.19×102/102/18 2.16×102/78/14 2.29×101/1024/21
    a7(50) 4.29×102/133/21 4.79×102/185/26 2.28×101/988/27
    a8(50) 4.32×102/133/21 5.52×102/209/29 2.13×101/931/27
    a1(100) 6.02×102/118/19 3.75×102/79/13 2.51×101/838/16
    a2(100) 5.16×102/133/21 6.32×102/205/29 2.91×101/1018/31
    a3(100) 4.38×102/117/19 2.48×102/79/13 2.37×101/849/18
    a4(100) 5.98×102/133/21 4.46×102/112/17 2.75×101/1018/31
    a5(100) 5.15×102/133/21 6.67×102/205/29 2.78×101/1018/31
    a6(100) 4.26×102/102/18 2.68×102/78/14 2.74×101/1024/21
    a7(100) 5.38×102/133/21 8.67×102/205/29 3.08×101/1018/31
    a8(100) 5.41×102/130/21 9.41×102/241/33 3.10×101/1058/36
    a1(150) 5.88×102/111/18 4.44×102/79/13 3.23×101/838/16
    a2(150) 6.85×102/139/22 7.94×102/168/24 4.13×101/1048/35
    a3(150) 7.80×102/142/22 3.71×102/79/13 3.38×101/787/49
    a4(150) 6.78×102/132/21 5.61×102/127/19 3.81×101/1018/31
    a5(150) 7.81×102/139/22 8.21×102/168/24 4.24×101/1048/35
    a6(150) 5.85×102/108/19 4.74×102/78/14 4.21×101/1024/21
    a7(150) 7.66×102/139/22 8.18×102/168/24 3.88×101/1048/35
    a8(150) 8.15×102/149/24 5.84×102/118/18 4.22×101/1056/36

     | Show Table
    DownLoad: CSV

    To provide a clearer characterization of the performance differences among the three algorithms, we adopt the performance profiles proposed by Dolan and Moré [28]. These profiles evaluate algorithmic behavior based on several key performance indicators, specifically the CPU time in seconds, the number of function evaluations, and the number of iterations. By plotting these indicators, the profiles offer a visual and comparative summary of algorithm efficiency. In these plots, a higher performance curve corresponds to better overall performance, making interpretation both intuitive and informative. By drawing these performance profiles for these three algorithms, we can visually assess and compare their efficiency, as shown in Figures 13. According to Figure 1, the ILR algorithm demonstrates significant efficiency, solving approximately 56% of the test problems with the lowest CPUT compared to the VRMILP and DFPRPMHS algorithms, which solve around 44% and 4% of the test problems, respectively. Similarly, Figure 2 shows that the ILR algorithm maintains its superior performance, solving approximately 75% of the test problems with the fewest Nfunc. In contrast, the VRMILP and DFPRPMHS algorithms solve about 26% and 7% of the test problems, respectively, with the least number of function evaluations. Lastly, Figure 3 further confirms the ILR algorithm's efficiency, solving approximately 53% of the test problems with the fewest Niter, while the VRMILP and DFPRRMHS algorithms solve around 37% and 20% of the test problems, respectively, with the fewest iterations.

    Figure 1.  Performance profiles on CPUT.
    Figure 2.  Performance profiles on Nfunc.
    Figure 3.  Performance profiles on Niter.

    Overall, these performance profiles highlight the ILR algorithm's effectiveness in solving large-scale nonlinear systems of equations with convex constraints, outperforming the VRMILP and DFPRPMHS algorithms across multiple performance metrics.

    In this section, we extend the evaluation of the proposed ILR algorithm to impulse noise image restoration problems. To validate the effectiveness of the ILR algorithm, we apply it to benchmark grayscale images subjected to varying levels of impulse noise.

    Impulse noise image restoration is a critical topic in the field of image processing, particularly due to its importance in improving the quality of images corrupted by noise. Noise in images can be introduced through various sources, such as malfunctioning pixels in camera sensors, faulty memory locations in hardware, or transmission errors in communication channels. Common types of noise include Gaussian noise and impulse noise, with the latter often manifesting as salt-and-pepper noise. To address the challenge of removing impulse noise, Chan et al. [29] proposed a two-phase denoising scheme. This scheme combines the adaptive median filter (AMF) method with a variational method to effectively detect and restore noisy pixels.

    Let m×n denote the pixel size of an original image. The pixel locations are indexed by the set M={1,2,,m}×{1,2,,n}. We denote the noise candidate set by NM, and |N| represents the number of elements in N. In the first phase, noise detection is performed using an AMF. For a pixel located at (i,j)M, the observed pixel value is denoted by yij, and the neighborhood of pixel (i,j) is defined as Vij={(i,j1),(i,j+1),(i1,j),(i+1,j)}. The AMF detects noise by considering these neighborhood values. Once the noisy pixels are detected, the second phase involves the restoration of these pixels. This is achieved by minimizing the following regularization function:

    minx(i,j)N[|xi,jyi,j|+β2(2Φ1i,j+Φ2i,j)],

    where

    Φ1i,j=(m,n)VijNφα(xi,jym,n),Φ2i,j=(m,n)VijNφα(xi,jum,n).

    Here, β is a regularization parameter, and φα() is an even edge-preserving potential function with parameter α>0. The vector x=[xi,j](i,j)N is optimized lexicographically to achieve denoising. The regularization problem posed in the second phase is nonsmooth due to the data-fitting term |xi,jyi,j|. To address this, Cai et al. [30] proposed removing the nonsmooth term and instead solving the following smooth unconstrained optimization problem:

    minxfα(x):=(i,j)N(2Φ1i,j+Φ2i,j).

    The potential function φα() plays a crucial role in preserving edges while smoothing the image. A commonly used potential function is the Huber function, defined as:

    φα(t)={t22α,for |t|α,|t|α2,for |t|>α.

    This function is convex and first-order Lipschitz continuous, making it suitable for the minimization problems described above. Let fα(x) denote the gradient of the function fα(x). In alignment with Proposition 6 in [30], if φα is convex, then fα(x) is monotone.

    In this section, all parameters for these three algorithms are set as described in Section 4. The stopping criteria for these three algorithms are defined as follows:

    xkxk1xkτor|fα(xk)fα(xk1)||fα(xk)|τ.

    For this experiment, we utilize the well-known grayscale test images Man (1024×1024) and Tank2 (512×512), which are sourced from the website https://www.hlevkin.com. We examine the performance of these three algorithms by applying them to images corrupted with 30% and 70% impulse noise. The noisy images, as well as the images recovered by these three algorithms, are shown in Figures 4 and 5. The corresponding numerical results are provided in Table 8. Based on these figures and the table, we can draw the following conclusions: (1) Figures 4 and 5 demonstrate that all three algorithms successfully recover the images affected by 30% and 70% impulse noise; (2) Recovering an image with 30% impulse noise requires less CPU time and fewer iterations compared to recovering an image with 70% impulse noise; (3) Among these three algorithms, the ILR algorithm generally requires less CPU time and fewer iterations than the VRMILP and DFPRPMHS algorithms for a given level of impulse noise.

    Figure 4.  From left to right: A noisy image with 30% impulse noise and recovered images obtained by the ILR, VRMILP, and DFPRPMHS algorithms.
    Figure 5.  From left to right: A noisy image with 70% impulse noise and recovered images obtained by the ILR, VRMILP, and DFPRPMHS algorithms.
    Table 8.  The numerical results of the ILR, VRMILP, and DFPRPMHS algorithms.
    Algorithm Man Tank
    Noise: 30% Noise: 70% Noise: 30% Noise: 70%
    Niter/CPUT Niter/CPUT Niter/CPUT Niter/CPUT
    ILR 14/13.38 29/29.04 8/1.46 16/3.66
    VRMILP 22/28.26 39/55.89 18/5.47 20/6.52
    DFPRPMHS 27/38.08 42/46.95 17/2.59 18/3.92

     | Show Table
    DownLoad: CSV

    In this paper, we presented an improved LS-RMIL-type conjugate gradient projection algorithm aimed at efficiently solving systems of nonlinear equations with convex constraints. The proposed algorithm demonstrates several key advantages, including the ability to generate search directions that satisfy sufficient descent and trust-region properties independently of the line search approach. Additionally, the proposed algorithm only requires continuous and monotone assumptions for systems of nonlinear equations, which makes it applicable under less restrictive conditions compared to existing methods. We established the global convergence of the proposed algorithm without relying on the Lipschitz continuity assumption, further relaxing the conditions that need to be satisfied for successful implementation. Extensive numerical simulations, including large-scale systems of nonlinear equations and impulse noise image restoration problems, have shown that the proposed algorithm exhibits superior efficiency and stability compared to existing algorithms. These results indicate that the proposed algorithm is a promising and competitive approach, with significant potential for practical applications, such as image restoration.

    Yan Xia: Conceptualization, Investigation, Writing–original draft, Writing–review and editing, Funding acquisition; Xuejie Ma: Writing–review and editing, Funding acquisition; Dandan Li: Conceptualization, Funding acquisition, Writing–review and editing. All authors have read and approved the final version of the manuscript for publication.

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.

    This work is supported by the Guangzhou Huashang College Daoshi Project (2024HSDS28).

    The authors declare that there are no conflicts of interest regarding the publication of this paper.



    [1] F. Black, M. Scholes, The pricing of options and corporate liabilities, J. Polit. Econ., 81 (1973), 637–654.
    [2] S. L. Heston, A closed-form solution for options with stochastic volatility with applications to bond and currency options, Rev. Financ. Stud., 6 (1993), 327–343. https://doi.org/10.1093/rfs/6.2.327 doi: 10.1093/rfs/6.2.327
    [3] J. P. Fouque, G. Papanicolaou, R. Sircar, K. Sølna, Multiscale stochastic volatility for equity, interest rate, and credit derivatives, Cambridge University Press, 2011.
    [4] J. Hull, A. White, The pricing of options on assets with stochastic volatilities, J. Financ., 42 (1987), 281–300. https://doi.org/10.1111/j.1540-6261.1987.tb02568.x doi: 10.1111/j.1540-6261.1987.tb02568.x
    [5] L. O. Scott, Option pricing when the variance changes randomly: Theory, estimation, and an application, J. Financ. Quant. Anal., 22 (1987), 419–438. https://doi.org/10.2307/2330793 doi: 10.2307/2330793
    [6] M. Chesney, L. Scott, Pricing European currency options: A comparison of the modified Black-Scholes model and a random variance model, J. Financ. Quant. Anal., 24 (1989), 267–284. https://doi.org/10.2307/2330812 doi: 10.2307/2330812
    [7] R. Schöbel, J. Zhu, Stochastic volatility with an Ornstein-Uhlenbeck process: An extension, Rev. Financ., 3 (1999), 23–46. https://doi.org/10.1023/A:1009803506170 doi: 10.1023/A:1009803506170
    [8] B. Dupire, Pricing with a smile, Risk, 7 (1994), 18–20.
    [9] E. Derman, I. Kani, Riding on a smile, Risk, 7 (1994), 32–39.
    [10] J. C. Cox, S. A. Ross, The valuation of options for alternative stochastic processes, J. Financ. Econ., 3 (1976), 145–166. https://doi.org/10.1016/0304-405X(76)90023-4 doi: 10.1016/0304-405X(76)90023-4
    [11] Y. Tian, Z. Zhu, G. Lee, F. Klebaner, K. Hamza, Calibrating and pricing with a stochastic-local volatility model, J. Deriv., 22 (2015), 21–39. https://doi.org/10.3905/jod.2015.22.3.021 doi: 10.3905/jod.2015.22.3.021
    [12] E. Ghysels, A. C. Harvey, E. Renault, 5 Stochastic volatility, Handb. Stat., 14 (1996), 119–191. https://doi.org/10.1016/S0169-7161(96)14007-4
    [13] A. W. V. Stoep, L. A. Grzelak, C. W. Oosterlee, The Heston stochastic-local volatility model: Efficient Monte Carlo simulation, Int. J. Theor. Appl. Fin., 17 (2014), 1450045. https://doi.org/10.1142/S0219024914500459 doi: 10.1142/S0219024914500459
    [14] Z. Cui, J. L. Kirkby, D. Nguyen, A general valuation framework for SABR and stochastic local volatility models, SIAM J. Financ. Math., 9 (2018), 520–563. https://doi.org/10.1137/16M1106572 doi: 10.1137/16M1106572
    [15] L. B. Andersen, V. V. Piterbarg, Moment explosions in stochastic volatility models, Financ. Stoch., 11 (2007), 29–50. https://doi.org/10.1007/s00780-006-0011-7 doi: 10.1007/s00780-006-0011-7
    [16] R. Lord, R. Koekkoek, D. V. Dijk, A comparison of biased simulation schemes for stochastic volatility models, Quant. Financ., 10 (2010), 177–194. https://doi.org/10.1080/14697680802392496 doi: 10.1080/14697680802392496
    [17] S. Y. Choi, J. P. Fouque, J. H. Kim, Option pricing under hybrid stochastic and local volatility, Quant. Financ., 13 (2013), 1157–1165. https://doi.org/10.1080/14697688.2013.780209 doi: 10.1080/14697688.2013.780209
    [18] Z. Cui, J. L. Kirkby, D. Nguyen, Efficient simulation of generalized SABR and stochastic local volatility models based on Markov chain approximations, Eur. J. Oper. Res., 290 (2021), 1046–1062. https://doi.org/10.1016/j.ejor.2020.09.008 doi: 10.1016/j.ejor.2020.09.008
    [19] P. Carr, D. Madan, Towards a theory of volatility trading, Volat. New Estim. Tech. Pric. Deriv., 29 (1998), 417–427. https://doi.org/10.1017/CBO9780511569708.013 doi: 10.1017/CBO9780511569708.013
    [20] A. Badescu, Z. Cui, J. P. Ortega, Closed-form variance swap prices under general affine GARCH models and their continuous-time limits, Ann. Oper. Res., 282 (2019), 27–57. https://doi.org/10.1007/s10479-018-2941-9 doi: 10.1007/s10479-018-2941-9
    [21] K. Demeterfi, E. Derman, M. Kamal, A guide to volatility and variance swaps, J. Deriv., 6 (1999), 9–32. https://doi.org/10.3905/jod.1999.319129 doi: 10.3905/jod.1999.319129
    [22] S. P. Zhu, G. H. Lian, A closed-form exact solution for pricing variance swaps with stochastic volatility, Math. Financ., 21 (2011), 233–256. https://doi.org/10.1111/j.1467-9965.2010.00436.x doi: 10.1111/j.1467-9965.2010.00436.x
    [23] W. Zheng, Y. K. Kwok, Closed form pricing formulas for discretely sampled generalized variance swaps, Math. Financ., 24 (2014), 855–881. https://doi.org/10.1111/mafi.12016 doi: 10.1111/mafi.12016
    [24] A. Issaka, Variance swaps, volatility swaps, hedging and bounds under multi-factor Heston stochastic volatility model, Stoch. Anal. Appl., 38 (2020), 856–874. https://doi.org/10.1080/07362994.2020.1730903 doi: 10.1080/07362994.2020.1730903
    [25] Y. Xi, H. Y. Wong, Discrete variance swap in a rough volatility economy, J. Futures Markets, 41 (2021), 1640–1654. https://doi.org/10.1002/fut.22242 doi: 10.1002/fut.22242
    [26] O. E. Euch, M. Rosenbaum, The characteristic function of rough Heston models, Math. Financ., 29 (2019), 3–38. https://doi.org/10.1111/mafi.12173 doi: 10.1111/mafi.12173
    [27] A Neuberger, Volatility trading, Institute of Finance and Accounting: London Business School, Working Paper, 1990.
    [28] N. Sawyer, SG CIB launches timer options, Risk, 20 (2007), 6.
    [29] A. Bick, Quadratic-variation-based dynamic strategies, Manag. Sci., 41 (1995), 722–732. https://doi.org/10.1287/mnsc.41.4.722 doi: 10.1287/mnsc.41.4.722
    [30] C. Li, Managing volatility risk innovation of financial derivatives, stochastic models and their analytical implementation, Doctoral dissertation, Columbia University, 2010.
    [31] D. Saunders, Pricing timer options under fast mean-reverting stochastic volatility, Can. Appl. Math. Q., 17 (2009), 737–753.
    [32] L. Z. J. Liang, D. Lemmens, J. Tempere, Path integral approach to the pricing of timer options with the Duru-Kleinert time transformation, Phys. Rev. E, 83 (2011), 056112. https://doi.org/10.1103/PhysRevE.83.056112 doi: 10.1103/PhysRevE.83.056112
    [33] C. Bernard, Z. Cui, Pricing timer options, J. Comput. Financ., 15 (2011), 1–37. https://doi.org/10.21314/JCF.2011.228
    [34] M. Li, F. Mercurio, Closed-form approximation of perpetual timer option prices, Int. J. Theor. Appl. Fin., 17 (2014), 1450026. https://doi.org/10.1142/S0219024914500265 doi: 10.1142/S0219024914500265
    [35] J. Ma, D. Deng, Y. Lai, Explicit approximate analytic formulas for timer option pricing with stochastic interest rates, North Am. J. Econ. Financ., 34 (2015), 1–21. https://doi.org/10.1016/j.najef.2015.07.002 doi: 10.1016/j.najef.2015.07.002
    [36] C. Li, Bessel processes, stochastic volatility, and timer options, Math. Financ., 26 (2016), 122–148. https://doi.org/10.1111/mafi.12041
    [37] J. Zhang, X. Lu, Y. Han, Pricing perpetual timer option under the stochastic volatility model of Hull-White, ANZIAM J., 58 (2017), 406–416. https://doi.org/10.21914/anziamj.v58i0.11281 doi: 10.21914/anziamj.v58i0.11281
    [38] Z. Cui, J. L. Kirkby, G. Lian, D. Nguyen, Integral representation of probability density of stochastic volatility models and timer options, Int. J. Theor. Appl. Fin., 20 (2017), 1750055. https://doi.org/10.1142/S0219024917500558 doi: 10.1142/S0219024917500558
    [39] X. Wang, S. J. Wu, X. Yue, Pricing timer options: Second-order multiscale stochastic volatility asymptotics, ANZIAM J., 63 (2021), 249–267. https://doi.org/10.21914/anziamj.v63.15291 doi: 10.21914/anziamj.v63.15291
    [40] J. L. Kirkby, J. P. Aguilar, The return barrier and return timer option with pricing under Levy processes, Expert Syst. Appl., 233 (2023), 120920. https://doi.org/10.1016/j.eswa.2023.120920 doi: 10.1016/j.eswa.2023.120920
    [41] B. Bock, S. Y. Choi, J. H. Kim, The pricing of European options under the constant elasticity of variance with stochastic volatility, Fluct. Noise Lett., 12 (2013), 1350004. https://doi.org/10.1142/S0219477513500041 doi: 10.1142/S0219477513500041
    [42] J. H. Kim, M. K. Lee, S. Y. Sohn, Investment timing under hybrid stochastic and local volatility, Chaos Soliton. Fract., 67 (2014), 58–72. https://doi.org/10.1016/j.chaos.2014.06.007 doi: 10.1016/j.chaos.2014.06.007
    [43] S. Y. Choi, J. H. Kim, Equity-linked annuities with multiscale hybrid stochastic and local volatility, Scand. Actuar. J., 2016 (2016), 466–487. https://doi.org/10.1080/03461238.2014.955048 doi: 10.1080/03461238.2014.955048
    [44] S. Y. Choi, J. H. Kim, J. H. Yoon, Foreign exchange rate volatility smiles and smirks, Appl. Stoch. Model. Bus., 37 (2021), 628–660. https://doi.org/10.1002/asmb.2602 doi: 10.1002/asmb.2602
    [45] J. P. Fouque, G. Papanicolaou, K. R. Sircar, Mean-reverting stochastic volatility, Int. J. Theor. Appl. Fin., 3 (2000), 101–142. https://doi.org/10.1142/S0219024900000061 doi: 10.1142/S0219024900000061
    [46] H. Geman, Y. F. Shih, Modeling commodity prices under the CEV model, J. Altern. Invest., 11 (2009), 65–84. https://doi.org/10.3905/JAI.2009.11.3.065 doi: 10.3905/JAI.2009.11.3.065
    [47] B. Øksendal, Stochastic differential equations: An introduction with applications, 6 Eds., Springer, 2010.
    [48] M. Ha, D. Kim, J. H. Yoon, Valuing of timer path-dependent options, Math. Comput. Simul., 215 (2024), 208–227. https://doi.org/10.1016/j.matcom.2023.08.010 doi: 10.1016/j.matcom.2023.08.010
    [49] A. Lipton, Mathematical methods for foreign exchange: A financial engineer's approach, World Scientific, 2001. https://doi.org/10.1142/4694
    [50] J. P. Fouque, M. J. Lorig, A fast mean-reverting correction to Heston's stochastic volatility model, SIAM J. Financ. Math., 2 (2011), 221–254. https://doi.org/10.1137/090761458 doi: 10.1137/090761458
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1647) PDF downloads(95) Cited by(1)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog