Processing math: 53%
Research article Special Issues

Intra-regular semihypergroups characterized by Fermatean fuzzy bi-hyperideals

  • Received: 26 September 2024 Revised: 02 December 2024 Accepted: 13 December 2024 Published: 24 December 2024
  • MSC : 08A72, 20M10, 20M17

  • The concept of Fermatean fuzzy sets was introduced by Senapati and Yager in 2019 as a generalization of fuzzy sets, intuitionistic fuzzy sets, and Pythagorean fuzzy sets. In this article, we apply the notions of Fermatean fuzzy left (resp., right) hyperideals and Fermatean fuzzy (resp., generalized) bi-hyperideals in semihypergroups to characterize intra-regular semihypergroups, such as S is an intra-regular semihypergroup if and only if LRLR, for every Fermatean fuzzy left hyperideal L and Fermatean fuzzy right hyperideal R of a semihypergroup S. Moreover, we introduce the concept of Fermatean fuzzy interior hyperideals of semihypergroups and use these properties to describe the class of intra-regular semihypergroups. Next, we demonstrate that Fermatean fuzzy interior hyperideals coincide with Fermatean fuzzy hyperideals in intra-regular semihypergroups. However, in general, Fermatean fuzzy interior hyperideals do not necessarily have to be Fermatean fuzzy hyperideals in semihypergroups. Finally, we discuss some characterizations of semihypergroups when they are both regular and intra-regular by means of different types of Fermatean fuzzy hyperideals in semihypergroups.

    Citation: Warud Nakkhasen, Teerapan Jodnok, Ronnason Chinram. Intra-regular semihypergroups characterized by Fermatean fuzzy bi-hyperideals[J]. AIMS Mathematics, 2024, 9(12): 35800-35822. doi: 10.3934/math.20241698

    Related Papers:

    [1] Xiaowei Fang . A derivative-free RMIL conjugate gradient method for constrained nonlinear systems of monotone equations. AIMS Mathematics, 2025, 10(5): 11656-11675. doi: 10.3934/math.2025528
    [2] Xuejie Ma, Songhua Wang . A hybrid approach to conjugate gradient algorithms for nonlinear systems of equations with applications in signal restoration. AIMS Mathematics, 2024, 9(12): 36167-36190. doi: 10.3934/math.20241717
    [3] Habibu Abdullahi, A. K. Awasthi, Mohammed Yusuf Waziri, Issam A. R. Moghrabi, Abubakar Sani Halilu, Kabiru Ahmed, Sulaiman M. Ibrahim, Yau Balarabe Musa, Elissa M. Nadia . An improved convex constrained conjugate gradient descent method for nonlinear monotone equations with signal recovery applications. AIMS Mathematics, 2025, 10(4): 7941-7969. doi: 10.3934/math.2025365
    [4] Xiyuan Zhang, Yueting Yang . A new hybrid conjugate gradient method close to the memoryless BFGS quasi-Newton method and its application in image restoration and machine learning. AIMS Mathematics, 2024, 9(10): 27535-27556. doi: 10.3934/math.20241337
    [5] Yixin Li, Chunguang Li, Wei Yang, Wensheng Zhang . A new conjugate gradient method with a restart direction and its application in image restoration. AIMS Mathematics, 2023, 8(12): 28791-28807. doi: 10.3934/math.20231475
    [6] Abdulkarim Hassan Ibrahim, Poom Kumam, Auwal Bala Abubakar, Umar Batsari Yusuf, Seifu Endris Yimer, Kazeem Olalekan Aremu . An efficient gradient-free projection algorithm for constrained nonlinear equations and image restoration. AIMS Mathematics, 2021, 6(1): 235-260. doi: 10.3934/math.2021016
    [7] Rabiu Bashir Yunus, Ahmed R. El-Saeed, Nooraini Zainuddin, Hanita Daud . A structured RMIL conjugate gradient-based strategy for nonlinear least squares with applications in image restoration problems. AIMS Mathematics, 2025, 10(6): 14893-14916. doi: 10.3934/math.2025668
    [8] Sani Aji, Poom Kumam, Aliyu Muhammed Awwal, Mahmoud Muhammad Yahaya, Kanokwan Sitthithakerngkiet . An efficient DY-type spectral conjugate gradient method for system of nonlinear monotone equations with application in signal recovery. AIMS Mathematics, 2021, 6(8): 8078-8106. doi: 10.3934/math.2021469
    [9] Jamilu Sabi'u, Ibrahim Mohammed Sulaiman, P. Kaelo, Maulana Malik, Saadi Ahmad Kamaruddin . An optimal choice Dai-Liao conjugate gradient algorithm for unconstrained optimization and portfolio selection. AIMS Mathematics, 2024, 9(1): 642-664. doi: 10.3934/math.2024034
    [10] Maulana Malik, Ibrahim Mohammed Sulaiman, Auwal Bala Abubakar, Gianinna Ardaneswari, Sukono . A new family of hybrid three-term conjugate gradient method for unconstrained optimization with application to image restoration and portfolio selection. AIMS Mathematics, 2023, 8(1): 1-28. doi: 10.3934/math.2023001
  • The concept of Fermatean fuzzy sets was introduced by Senapati and Yager in 2019 as a generalization of fuzzy sets, intuitionistic fuzzy sets, and Pythagorean fuzzy sets. In this article, we apply the notions of Fermatean fuzzy left (resp., right) hyperideals and Fermatean fuzzy (resp., generalized) bi-hyperideals in semihypergroups to characterize intra-regular semihypergroups, such as S is an intra-regular semihypergroup if and only if LRLR, for every Fermatean fuzzy left hyperideal L and Fermatean fuzzy right hyperideal R of a semihypergroup S. Moreover, we introduce the concept of Fermatean fuzzy interior hyperideals of semihypergroups and use these properties to describe the class of intra-regular semihypergroups. Next, we demonstrate that Fermatean fuzzy interior hyperideals coincide with Fermatean fuzzy hyperideals in intra-regular semihypergroups. However, in general, Fermatean fuzzy interior hyperideals do not necessarily have to be Fermatean fuzzy hyperideals in semihypergroups. Finally, we discuss some characterizations of semihypergroups when they are both regular and intra-regular by means of different types of Fermatean fuzzy hyperideals in semihypergroups.



    Systems of nonlinear equations are fundamental to a diverse range of applications, including power flow analysis [1], economic equilibrium modeling [2], the development of generalized Bregman distance proximal point methods [3], and traffic assignment [4]. Meanwhile, these systems also involve monotone variational inequalities [5,6] and compression sensing problems [7,8]. Given the ubiquity and significance of such problems across these varied domains, the study and development of numerical methods to efficiently solve systems of nonlinear equations are of considerable practical importance. In this paper, we focus on a specific class of systems of nonlinear equations subject to convex constraints, which can be formulated as follows:

    θ(a)=0,aΘ, (1.1)

    where ΘRn is a non-empty, and closed convex set. The function θ:RnRn is assumed to possess monotonicity and continuous differentiability, satisfying the following condition:

    θ(a)θ(b),ab0,a,bRn.

    Generally, the gradient-type method generates a sequence {ak}, defined as follows:

    ak+1=ak+tkdk,k0,

    where tk is the step length, and dk denotes the search direction. The choice of the search direction dk gives rise to various gradient-type methods, such as the steepest descent methods, Newton's methods, and quasi-Newton methods [9,10]. Newton's and quasi-Newton methods, along with their numerous variants, have been extensively studied due to their strong local linear convergence properties. For instance, Mahdavi et al. [11] proposed and analyzed a nonmonotone quasi-Newton algorithm for strongly convex multiobjective optimization, demonstrating its global convergence and local superlinear convergence rate under certain conditions. Sihwail et al. [12] proposed a novel hybrid method, Newton-Harris hawks optimization, which combines Newton's methods and Harris hawks optimization to effectively solve systems of nonlinear equations. Moreover, Krutikov et al. [13] demonstrated that quasi-Newton methods, when applied to strongly convex functions with a Lipschitz gradient, achieve geometric convergence without relying on local quadratic approximations. However, despite these advantages, Newton's and quasi-Newton methods involve the computation of the Hessian matrix or its approximation value at each iteration, which significantly increases computational complexity. This requirement can be a limiting factor, particularly for large-scale problems where the Hessian matrix is difficult to compute and store efficiently.

    The conjugate gradient method [14,15] is one of the most effective approaches in the field of the gradient-type methods. It is highly recognized for its efficiency, simplicity, lower storage requirements, and reliable convergence properties. These characteristics make it particularly well-suited for solving large-scale systems of nonlinear equations [16,17]. The method's search direction is typically defined as follows:

    dk={θk,k=0,θk+βkdk1,k1,

    where θkθ(ak) and βk is known as the conjugate parameter. The choice of βk differentiates various conjugate gradient methods. Several advancements have been made in the development of conjugate gradient methods with different conjugate parameters [18]. For instance, Ma et al. [19] proposed a modified inertial three-term conjugate gradient method for solving nonlinear monotone equations with convex constraints. This method is notable for its global and Q-linear convergence properties, and has demonstrated superior numerical performance in applications such as sparse signal recovery and image restoration in compressed sensing. Furthermore, Liu et al. [20] introduced a spectral conjugate gradient method with an inertial factor for solving nonlinear pseudo-monotone equations over a convex set. Additionally, Sabiu et al. [21] developed an optimal scaled Perry conjugate gradient method for solving large-scale systems of monotone nonlinear equations. This method ensures global convergence under the conditions of monotonicity and Lipschitz continuity.

    Inspired by the classical Liu-Story (LS) [22] and Rivai-Mohamad-Ismail-Leong (RMIL) [23] conjugate parameters, as well as incorporating the hybrid technique (e.g, [24,25]) and the projection approach, we develop a modified LS-RMIL-type conjugate gradient projection algorithm. The proposed algorithm is specifically designed for solving systems of nonlinear equations with convex constraints. In this paper, and , represent the Euclidean norm and the inner product of vectors, respectively.

    In this section, we refine and enhance the search direction employed in the optimization processes of the LS and RMIL methods. Specifically, Liu et al. [22] and Rivai et al. [23] introduced conjugate parameters, defined respectively as:

    βLSk=θk,yk1θk1,dk1,βRMILk=θk,yk1dk12.

    Based on the insights derived from these parameters, we adopt the hybrid technique (e.g., [24,25]) that combines their key features. This leads to the formulation of a new conjugate parameter, which is subsequently incorporated into the framework of a three-term search direction. Our primary objective is to construct a novel search direction that ensures both the sufficient descent and trust-region properties, which are critical for the robustness and efficiency of the optimization process. To accomplish this, we carefully design a novel search direction tailored to meet these requirements. The designed search direction dk is defined as follows:

    dk={θk,k=0,θk+βkdk1+ϖkyk1,k1, (2.1)

    where the conjugate parameter βk and the scalar parameter ϖk are given by

    βk=θk,yk1ckyk12θk,dk1c2kandϖk=νkθk,dk1ck, (2.2)

    with yk1=θkθk1. One scalar parameter ck is crucial for maintaining stability in the iterative process, and is defined by

    ck=max{μdk1yk1,θk1,dk1,dk12},

    where μ is a positive constant. Another scalar parameter νk is introduced to fine-tune the adjustment of the search direction. It is defined as νk=min{˜ν,max{ˉνk,0}} with 0<˜ν<1, and ˉνk=θk,yk1sk1θk2, where sk1=akak1 represents the difference between the iterative points ak and ak1 of the optimization variable.

    Before delving into the sufficient descent and trust-region properties of the designed search direction (2.1), we can deduce some important bounds from the definition of βk and ϖk. We consider the bound for βk:

    |βk|θkyk1ck+yk12θkdk1c2k,

    which can be further bounded by

    |βk|θkyk1μdk1yk1+yk12θkdk1μ2dk12yk12.

    Simplifying this, we obtain

    |βk|(1μ+1μ2)θkdk1. (2.3)

    Next, we consider the bound for ϖk:

    |ϖk|νkθkdk1ck˜νkθkdk1μdk1yk1=˜νμθkyk1. (2.4)

    Lemma 1. The search direction dk generated by (2.1) satisfies the sufficient descent property:

    θk,dkMθk2,

    where M=114(1+˜ν)2.

    Proof. For k=0, the conclusion is straightforward, which implies θ0,d0=θ02Mθ02. For k1, together with the search direction generated by (2.1), we have:

    θk,dk=θk,θk+βkdk1+ϖkyk1=θk2+θk,yk1θk,dk1ckyk12θk,dk12c2k+νkθk,yk1θk,dk1ck=θk2+(1+νk)θk,yk1θk,dk1ckyk12θk,dk12c2k. (2.5)

    By applying the inequality ek,gk12(ek2+gk2), where ek=(1+νk)θk/2 and gk=2θk,dk1yk1/ck, we obtain the following result:

    (1+νk)θk,yk1θk,dk1ck14(1+νk)2θk2+θk,dk12yk12c2k. (2.6)

    Substituting (2.6) into (2.5), we obtain

    θk,dkθk2+14(1+˜νk)2θk2(114(1+˜ν)2)θk2.

    Thus, the result holds.

    Lemma 2. The search direction dk generated by (2.1) satisfies the trust-region property:

    MθkdkNθk,

    where N=1+1μ+1μ2+˜νμ.

    Proof. From Lemma 1, we have θkdkθk,dkMθk2, which implies:

    dkMθk.

    Additionally, together with (2.1), we obtain:

    dk=θk+βkdk1+ϖkyk1θk+|βk|dk1+|ϖk|yk1.

    Substituting the inequalities |βk| and |ϖk| defined in (2.3) and (2.4), respectively, into the above equality, we have

    dk(1+1μ+1μ2+˜νμ)θk.

    Thus, the result holds.

    Before delving into the specifics of our proposed algorithm, it is essential to first clarify the line search approach, the projection operator, and the iterative update rule employed in the proposed algorithm. These foundational components play a crucial role in the overall efficacy of the proposed algorithm.

    First, in the proposed algorithm, the line search approach is used to determine an appropriate step length tk=ηρik. Specifically, this step length is computed based on the following procedure, where ik={i:i=0,1,} is the smallest non-negative integer i that satisfies the following inequality:

    θ(ak+ηρidk),dkσηρiθ(ak+ηρidk)dk2, (2.7)

    where η>0, ρ(0,1), and σ>0 are algorithmic parameters.

    Furthermore, the projection operator PΘ[] is a critical component that ensures the iterative points remain within the feasible region Θ. Specifically, the projection of a point aRn onto the set Θ is defined as

    PΘ[a]=argmin{ab:bΘ},aRn.

    This operator identifies the point in Θ closest to a in the Euclidean norm. Moreover, the projection operator is non-expansive, meaning it satisfies the property:

    PΘ[a]PΘ[b]ab. (2.8)

    Finally, the iterative update rule forms the core of the proposed algorithm, indicating how the next iterative point ak+1 is computed from the current iterative point ak. Specifically, the update is performed by using the following formula:

    ak+1=PΘ[akγwkθ(zk)],wk=θ(zk),akzk||θ(zk)||2, (2.9)

    where zk=ak+tkdk and γ(0,2). This projection-based update ensures that the new iterative point remains feasible and moves towards reducing the objective function.

    With the foundational components described above, we now present the detailed steps of an improved LS-RMIL-type conjugate gradient projection algorithm (Abbr. ILR algorithm), which is described as Algorithm 1.

    Algorithm 1 An improved LS-RMIL-type conjugate gradient projection algorithm
      1: Initialization: a0Rn, μ>0, ˜ν(0,1), η,σ>0, ρ(0,1), τ>0, and set k:=0.
      2: while θk>τ do
      3:        Evaluate two parameters βk and ϖk from (2.2) and search direction dk from (2.1).
      4:        Evaluate the step length tk from (2.7) and set the trial point zk=ak+tkdk.
      5:        if zkΘ and θ(zk)<τ then
      6:                break.
      7:        else
      8:                Evaluate the next iterative point ak+1 from (2.9).
      9:        end if
    10:        Set k:=k+1.
    11: end while

    In this section, we provide a comprehensive analysis of the global convergence properties of the ILR algorithm. To facilitate this analysis, we introduce the following key assumptions.

    Assumption B:

    (B1) The solution set Θ of problem (1.1) is non-empty.

    (B2) The function θ(a) exhibits a monotonicity property, i.e.,

    θ(a)θ(b),ab0,a,bRn.

    These assumptions are fundamental in establishing the convergence behavior of the ILR algorithm as they ensure that the iterative process converges to a solution within the feasible region of problem (1.1).

    The following lemma demonstrates that the line search approach defined in (2.7) of the ILR algorithm is indeed well-defined and can be successfully applied in the iterative process.

    Lemma 3. Consider the sequence {tk} generated by the ILR algorithm. Then, there exists a step length tk at each iteration that satisfies the line search approach defined in (2.7).

    Proof. We proceed by contradiction and assume that inequality (2.7) does not hold. Specifically, suppose there exists a positive index k0 such that, for all i{0}N, the following inequality is satisfied:

    θ(ak0+ηρidk0),dk0<σηρiθ(ak0+ηρidk0)dk02.

    By utilizing the continuity of θ and taking the limit as i, the above inequality yields:

    θ(ak0),dk00. (3.1)

    On the other hand, invoking Lemma 1 and again taking the limit as i, we obtain:

    θ(ak0),dk0Mθ(ak0)2>0,

    which clearly contradicts inequality (3.1). This contradiction implies that the initial assumption must be false, and therefore inequality (2.7) must hold.

    The following lemma establishes that the sequence {ak} generated by the ILR algorithm exhibits monotonic behavior with respect to the solutions set Θ of problem (1.1).

    Lemma 4. Consider the sequences {ak} and {zk} generated by the ILR algorithm. Then, the following properties hold:

    (i) The sequence {ak} is bounded, meaning that there exists a constant D>0 such that akD for all k0.

    (ii) The sequence {zk} converges to the sequence {ak}, i.e., limkzkak=0.

    Proof. From the definition of the projection operator PΘ[] and the non-expensive property defined in (2.8), we can derive the following inequality:

    ak+1a2=PΘ[akγwkθ(zk)]PΘ[a]2akγwkθ(zk)a2=aka22γwkθ(zk),aka+γ2w2kθ(zk)2, (3.2)

    where a denotes a solution of problem (1.1). Next, starting from Assumption B2, the definition of zk, and the line search approach (2.7), we can further establish the following inequality:

    θ(zk),aka=θ(zk),akzk+θ(zk),zkaθ(a),zkaθ(zk),akzkσt2kθ(zk)dk2. (3.3)

    Combining with (3.2), (3.3), and the definition of wk, we can derive

    ak+1a2aka22γwkθ(zk),akzk+γ2w2kθ(zk)2,=aka22γw2kθ(zk)2+γ2w2kθ(zk)2,=aka2(2γγ2)w2kθ(zk)2, (3.4)

    Given the definition of wk and (3.3), we have

    θ(zk)2wk=θ(zk),akzkσt2kθ(zk)dk2,

    which implies that θ(zk)wkσt2kdk2. Substituting this into (3.4), we obtain

    ak+1a2aka2(2γγ2)(σt2kdk2)2,=aka2(2γγ2)σ2t4kdk4,=aka2(2γγ2)σ2akzk4. (3.5)

    This result indicates that the sequence {aka} is monotonically decreasing, meaning that it consistently reduces as k increases. Hence, the sequence {ak} is bounded.

    By reorganizing the formula defined in (3.5), we obtain

    (2γγ2)σ2k=0akzk4k=0(aka2ak+1a2)a0a. (3.6)

    This implies that limkzkak=0.

    Theorem 1. Consider the sequence {θk} generated by the ILR algorithm. Then, the following conclusion is satisfied:

    limkθk=0. (3.7)

    Proof. To demonstrate the desired result, we begin by assuming the contrary. Suppose that there exists a constant A1>0 such that θk>A1 for all k0. This assumption, combined with Lemma 2, gives us the following relation dkMθk>M A1 for all k0. Given the continuity of the function θ(a) and the boundedness of the sequence {ak}, it follows that the sequence {θk} is also bounded. In other words, there exists a non-negative constant A2 such that θkA2 for all \(k \geq 0\). By incorporating this bound with Lemma 2, we obtain dkNθkNA2 for all k0. The two inequalities derived above imply that the sequence {dk} is bounded. Together with Lemma 4(ii) and the definition of zk, we have limkzkak=limkak+tkdkak=limktkdk=0, which leads to the conclusion that limktk=0 with the boundedness of the sequence {dk}.

    Since the sequences {ak} and {dk} are both bounded, we can extract two convergent subsequences, {aki} and {dki}, such that limi,iKaki=ˉa and limi,iKdki=ˉd, where K denotes an infinite index set. Utilizing Lemma 1, we have θki,dkiMθki2. Taking the limit as i in the above inequality and invoking the continuity of θ(a), we obtain

    θ(ˉa),ˉdMθ(ˉa)2MA21>0.

    Furthermore, we adopt the line search approach defined in (2.7), which implies the following inequality holds: θ(aki+(ηρ)1tkidki),dki<ση(ηρ)1tkiθ(aki+(ηρ)1tkidki)dki2. Taking the limit as i in the above inequality, and using the continuity of θ(a), we conclude

    θ(ˉa),ˉd0.

    These two results directly contradict each other. Therefore, the assumption that θk>A1 for all \(k \geq 0\) must be false, and the desired result follows.

    In this section, we evaluate the effectiveness of the proposed ILR algorithm through a comprehensive set of numerical experiments. These experiments are designed to solve large-scale systems of nonlinear equations with convex constraints, thereby assessing the algorithm's computational efficiency. For benchmarking purposes, we compare the ILR algorithm with two established methods (e.g., VRMILP and DFPRPMHS) across various test problems, initial points, and dimensional settings.

    In this section, we utilize the ILR algorithm to address large-scale systems of nonlinear equations with convex constraints. We then compare it with two existing algorithms: the VRMILP algorithm [26] and the DFPRPMHS algorithm [27]. All experimental codes are executed on a 64-bit Ubuntu 20.04.2 LTS operating system with an Intel(R) Xeon(R) Gold 5115 2.40GHz CPU. The parameters for the ILR algorithm are set as follows:

    μ=0.02,˜ν=0.105,η=1,σ=104,ρ=0.74,τ=105.

    For the VRMILP and DFPRPMHS algorithms, we adhere to the parameter settings provided in their respective original works. Seven test problems are selected for evaluation, with problem dimensions set at {5,000 10,000 50,000 100,000 150,000}. Each test problem is initialized by the following points: a1=(12,122,,12n), a2=(0,1n,2n,,n1n), a3=(1,12,,1n), a4=(1n,2n,,nn), a5=(13,132,,13n), a6=(2,2,,2) a7=(11n,12n,,1nn), a8[0,1]n. The stopping criteria for all algorithms is set to either θkτ or a maximum of 3000 iterations. Here, θ(a)=(θ1(a),θ2(a),,θn(a))T with a=(a1,a2,,an)T. The seven test problems are described as follows:

    Problem 1 [7]:

    θi(a)=eai1,fori=1,2,,n,

    with the constraint set Θ=Rn+. The unique solution is a=(0,0,,0)T.

    Problem 2 [7]:

    θi(a)=ineai1,fori=1,2,,n,

    with the constraint set Θ=Rn+.

    Problem 3 [5]:

    θi(a)=log(ai+1)ain,fori=1,2,,n,

    with the constraint set Θ=[1,+).

    Problem 4 [5]:

    θi(a)=(eai)2+3sin(ai)cos(ai)1,fori=1,2,,n,

    with the constraint set Θ=Rn+.

    Problem 5 [5]:

    θ1(a)=2a1+sin(a1)1,θi(a)=2ai1+2ai+sin(ai)1,fori=2,3,,n1,θn(a)=2an+sin(an)1,

    with the constraint set Θ=Rn+.

    Problem 6 [7]:

    θi(a)=1neai1,fori=1,2,,n,

    with the constraint set Θ=Rn+.

    Problem 7 [5]:

    θi(a)=ai2sin(|ai1|),fori=1,2,,n,

    with the constraint set Θ=Rn+.

    The performance of the ILR, VRMILP, and DFPRPMHS algorithms are systematically evaluated through a series of test problems, with the numerical results presented in Tables 17. In these tables, "Init" refers to the initial point used in each test problem, "n" refers to the problem dimension multiplied by 1000, "CPUT" refers to the CPU time in seconds, "Nfunc" refers to the number of function evaluations, and "Niter" refers to the number of iterations. A notable observation from the numerical results is that all three algorithms successfully solve the test problem across various initial points and problem dimensions. To be specific, the ILR algorithm demonstrates superior performance in most cases compared to the other two algorithms.

    Table 1.  Numerical results for Problem 1.
    Inti(n) ILR VRMILP DFPRPMHS
    CPUT/Nfunc/Niter CPUT/Nfunc/Niter CPUT/Nfunc/Niter
    a1(5) 1.93×103/4/1 4.45×104/4/1 1.57×102/332/7
    a2(5) 1.84×103/23/7 3.47×103/60/15 2.15×102/487/24
    a3(5) 2.11×103/29/9 2.16×103/37/8 1.75×102/447/10
    a4(5) 1.55×103/23/7 2.13×103/39/9 1.86×102/405/31
    a5(5) 1.57×103/23/7 3.33×103/60/15 2.04×102/487/24
    a6(5) 5.08×104/7/1 4.16×104/7/1 2.00×103/9/1
    a7(5) 1.92×103/23/7 3.46×103/60/15 2.07×102/487/24
    a8(5) 2.21×103/30/9 2.16×103/39/9 2.30×102/563/14
    a1(10) 6.36×104/4/1 4.22×104/4/1 2.50×102/332/7
    a2(10) 3.69×103/23/7 6.19×103/57/14 4.11×102/487/24
    a3(10) 4.66×103/29/9 3.96×103/37/8 3.44×102/447/10
    a4(10) 3.48×103/23/7 4.12×103/39/9 3.59×102/408/32
    a5(10) 3.45×103/23/7 6.12×103/57/14 3.98×102/487/24
    a6(10) 8.35×104/7/1 7.34×104/7/1 1.99×103/9/1
    a7(10) 3.56×103/23/7 6.10×103/57/14 3.88×102/487/24
    a8(10) 6.37×103/41/13 5.28×103/48/12 4.40×102/563/14
    a1(50) 3.75×103/4/1 1.64×103/4/1 9.06×102/332/7
    a2(50) 1.35×102/23/7 2.48×102/60/15 1.51×101/596/26
    a3(50) 1.27×102/29/9 1.72×102/37/8 1.02×101/447/10
    a4(50) 9.17×103/23/7 1.11×102/39/9 1.39×101/602/28
    a5(50) 1.39×102/23/7 2.47×102/60/15 1.49×101/596/26
    a6(50) 2.67×103/7/1 4.30×103/7/1 5.98×103/9/1
    a7(50) 1.13×102/23/7 1.95×102/60/15 1.32×101/596/26
    a8(50) 1.06×102/23/7 1.86×102/56/14 1.30×101/576/16
    a1(100) 7.76×103/4/1 2.44×103/4/1 1.21×101/332/7
    a2(100) 1.49×102/23/7 3.51×102/66/17 1.44×101/487/24
    a3(100) 1.69×102/29/9 1.64×102/37/8 1.24×101/447/10
    a4(100) 1.49×102/23/7 1.56×102/39/9 1.84×101/602/28
    a5(100) 1.24×102/23/7 2.76×102/66/17 1.38×101/487/24
    a6(100) 2.91×103/7/1 2.55×103/7/1 5.45×103/9/1
    a7(100) 1.22×102/23/7 2.67×102/66/17 1.50×101/487/24
    a8(100) 1.32×102/23/7 3.29×102/60/15 1.92×101/677/18
    a1(150) 3.49×103/4/1 2.63×103/4/1 1.13×101/332/7
    a2(150) 1.88×102/23/7 3.88×102/75/19 2.84×101/602/28
    a3(150) 1.95×102/29/9 1.88×102/37/8 1.71×101/447/10
    a4(150) 1.65×102/23/7 2.08×102/39/9 2.36×101/602/28
    a5(150) 1.65×102/23/7 3.80×102/75/19 2.40×101/602/28
    a6(150) 5.11×103/7/1 4.06×103/7/1 1.05×102/9/1
    a7(150) 1.75×102/23/7 4.80×102/75/19 2.46×101/602/28
    a8(150) 1.95×102/23/7 2.97×102/45/11 2.34×101/575/18

     | Show Table
    DownLoad: CSV
    Table 2.  Numerical results for Problem 2.
    Inti(n) ILR VRMILP DFPRPMHS
    CPUT/Nfunc/Niter CPUT/Nfunc/Niter CPUT/Nfunc/Niter
    a1(5) 8.86×103/29/11 8.84×103/96/25 3.91×102/576/23
    a2(5) 2.64×102/400/52 1.73×102/281/31 5.06×102/893/43
    a3(5) 2.85×103/30/11 6.36×103/88/23 2.04×102/300/34
    a4(5) 2.69×102/414/53 1.86×102/310/30 4.14×102/692/44
    a5(5) 4.95×103/54/20 7.76×103/107/28 2.56×102/406/35
    a6(5) 1.57×102/232/31 7.92×103/114/25 5.95×102/1056/34
    a7(5) 5.33×103/54/20 7.78×103/107/28 2.59×102/406/35
    a8(5) 4.65×102/727/76 1.90×102/305/36 4.12×102/688/41
    a1(10) 1.22×102/56/20 1.26×102/84/22 5.03×102/411/37
    a2(10) 5.78×102/435/47 4.50×102/398/34 7.79×102/703/22
    a3(10) 6.49×103/29/11 1.56×102/82/22 5.64×102/353/55
    a4(10) 8.59×102/582/57 4.34×102/387/36 8.26×102/721/25
    a5(10) 1.05×102/50/18 1.92×102/128/32 4.28×102/300/37
    a6(10) 3.89×102/276/35 1.51×102/108/24 9.90×102/851/40
    a7(10) 1.07×102/50/18 1.87×102/128/32 4.04×102/300/37
    a8(10) 8.75×102/673/60 6.39×102/541/52 1.09×101/966/39
    a1(50) 5.65×102/57/20 5.36×102/90/24 1.69×101/320/41
    a2(50) 4.89×101/997/80 4.34×101/951/57 3.28×101/731/24
    a3(50) 2.44×102/35/13 5.55×102/99/26 1.42×101/327/35
    a4(50) 4.42×101/926/83 3.80×101/957/55 3.09×101/731/24
    a5(50) 4.08×102/55/19 6.92×102/124/31 1.93×101/409/36
    a6(50) 2.48×101/510/51 5.96×102/114/25 4.73×101/1119/36
    a7(50) 3.77×102/55/19 6.56×102/124/31 1.99×101/409/36
    a8(50) 4.88×101/1011/86 3.19×101/699/50 3.04×101/686/20
    a1(100) 7.76×102/75/27 7.69×102/92/24 4.11×101/613/31
    a2(100) 8.14×101/1187/92 8.34×101/1259/65 4.43×101/727/24
    a3(100) 9.47×102/96/33 7.82×102/94/25 2.83×101/413/39
    a4(100) 7.69×101/1073/90 8.34×101/1193/66 5.16×101/728/24
    a5(100) 9.05×102/76/26 1.01×101/119/31 3.28×101/493/29
    a6(100) 3.62×101/505/46 9.80×102/122/27 6.84×101/1006/46
    a7(100) 8.67×102/76/26 9.83×102/119/31 3.27×101/493/29
    a8(100) 1.18×100/1610/106 5.32×101/800/52 4.04×101/608/25
    a1(150) 8.00×102/54/20 1.15×101/99/26 3.48×101/330/40
    a2(150) 1.15×100/1130/87 1.34×100/1408/76 7.09×101/726/24
    a3(150) 8.44×102/57/18 1.25×101/102/26 4.08×101/400/35
    a4(150) 1.17×100/1165/95 1.26×100/1365/69 6.80×101/726/24
    a5(150) 9.90×102/69/25 1.44×101/124/32 4.11×101/407/38
    a6(150) 7.33×101/714/63 1.32×101/117/26 8.80×100/8853/275
    a7(150) 1.24×101/69/25 1.73×101/124/32 4.47×101/407/38
    a8(150) 1.33×100/1224/91 1.27×100/1255/71 7.01×101/657/29

     | Show Table
    DownLoad: CSV
    Table 3.  Numerical results for Problem 3.
    Inti(n) ILR VRMILP DFPRPMHS
    CPUT/Nfunc/Niter CPUT/Nfunc/Niter CPUT/Nfunc/Niter
    a1(5) 8.33×103/23/8 2.50×103/21/9 3.90×102/544/11
    a2(5) 8.23×103/61/21 8.17×103/82/22 6.76×102/977/19
    a3(5) 5.10×103/45/16 5.06×103/60/16 3.11×102/492/30
    a4(5) 7.16×103/66/23 6.87×103/82/22 5.68×102/977/19
    a5(5) 6.90×103/61/21 7.31×103/82/22 5.94×102/977/19
    a6(5) 2.28×103/19/7 3.53×103/33/14 6.56×102/1084/21
    a7(5) 7.05×103/61/21 6.94×103/82/22 5.87×102/977/19
    a8(5) 4.85×103/44/15 8.76×103/105/28 5.83×102/977/19
    a1(10) 6.23×103/23/8 3.88×103/21/9 5.47×102/544/11
    a2(10) 9.75×103/49/17 1.26×102/85/23 1.05×101/986/21
    a3(10) 1.12×102/54/19 8.97×103/60/16 5.92×102/499/31
    a4(10) 1.67×102/78/28 1.27×102/85/23 1.07×101/986/21
    a5(10) 1.04×102/49/17 1.24×102/85/23 1.09×101/986/21
    a6(10) 4.08×103/19/7 5.89×103/33/14 1.06×101/977/19
    a7(10) 1.10×102/49/17 1.44×102/85/23 1.11×101/986/21
    a8(10) 8.57×103/44/15 1.47×102/98/27 9.76×102/890/24
    a1(50) 2.84×102/23/8 1.39×102/21/9 1.18×101/437/9
    a2(50) 4.56×102/74/26 3.72×102/94/25 3.08×101/978/19
    a3(50) 2.33×102/44/15 2.67×102/60/16 1.04×101/279/31
    a4(50) 4.24×102/61/21 4.43×102/93/25 2.94×101/978/19
    a5(50) 5.26×102/74/26 4.02×102/94/25 2.85×101/978/19
    a6(50) 1.01×102/19/7 1.48×102/35/15 2.93×101/977/19
    a7(50) 4.55×102/74/26 4.41×102/94/25 2.97×101/978/19
    a8(50) 4.27×102/63/22 5.60×102/102/27 2.92×101/978/19
    a1(100) 1.51×102/20/7 1.14×102/18/7 1.52×101/437/9
    a2(100) 5.81×102/72/25 6.66×102/104/28 3.86×101/978/19
    a3(100) 4.40×102/58/20 3.25×102/60/16 1.36×101/364/19
    a4(100) 4.69×102/61/21 5.44×102/104/28 4.02×101/978/19
    a5(100) 5.39×102/72/25 5.64×102/104/28 3.98×101/978/19
    a6(100) 1.69×102/19/7 2.70×102/35/15 4.70×101/1085/21
    a7(100) 5.06×102/72/25 5.60×102/104/28 4.14×101/978/19
    a8(100) 6.54×102/76/26 5.91×102/109/29 3.98×101/978/19
    a1(150) 1.99×102/20/7 1.50×102/18/7 2.04×101/437/9
    a2(150) 7.71×102/71/25 8.53×102/99/27 5.09×101/978/19
    a3(150) 5.08×102/51/17 4.93×102/60/16 1.65×101/274/19
    a4(150) 8.24×102/74/25 8.47×102/99/27 5.37×101/978/19
    a5(150) 7.76×102/71/25 6.93×102/99/27 5.39×101/978/19
    a6(150) 2.37×102/22/8 3.91×102/35/15 5.64×101/978/19
    a7(150) 8.44×102/71/25 8.50×102/99/27 5.38×101/978/19
    a8(150) 6.24×102/62/22 7.60×102/105/28 5.27×101/978/19

     | Show Table
    DownLoad: CSV
    Table 4.  Numerical results for Problem 4.
    Inti(n) ILR VRMILP DFPRPMHS
    CPUT/Nfunc/Niter CPUT/Nfunc/Niter CPUT/Nfunc/Niter
    a1(5) 1.58×101/3/1 4.47×103/3/1 2.10×102/3/1
    a2(5) 1.70×102/44/5 1.91×102/149/16 4.55×102/651/16
    a3(5) 9.99×103/63/8 1.86×102/247/26 2.06×102/259/7
    a4(5) 3.70×103/44/5 1.33×102/225/24 2.86×102/509/12
    a5(5) 5.19×103/44/5 1.36×102/149/16 3.72×102/651/16
    a6(5) 8.76×104/4/1 5.51×104/4/1 2.28×103/4/1
    a7(5) 3.48×103/44/5 9.75×103/149/16 3.18×102/651/16
    a8(5) 3.25×103/44/5 1.24×102/200/21 3.11×102/626/14
    a1(10) 1.03×103/3/1 5.12×104/3/1 3.02×103/3/1
    a2(10) 5.99×103/44/5 2.83×102/243/26 6.79×102/660/16
    a3(10) 8.56×103/63/8 2.97×102/246/26 2.56×102/259/7
    a4(10) 5.47×103/44/5 1.59×102/141/15 5.05×102/509/12
    a5(10) 5.66×103/44/5 2.84×102/243/26 6.01×102/660/16
    a6(10) 1.04×103/4/1 6.07×104/4/1 1.69×103/4/1
    a7(10) 5.08×103/44/5 2.48×102/243/26 5.86×102/660/16
    a8(10) 5.28×103/44/5 2.45×102/229/24 3.55×102/364/17
    a1(50) 8.54×103/3/1 1.09×103/3/1 3.14×103/3/1
    a2(50) 2.88×102/44/5 6.72×102/159/17 1.44×101/509/12
    a3(50) 2.57×102/63/8 7.24×102/237/25 6.79×102/259/7
    a4(50) 1.77×102/44/5 9.94×102/245/26 1.31×101/509/12
    a5(50) 1.74×102/44/5 6.06×102/159/17 1.66×101/509/12
    a6(50) 2.83×103/4/1 3.46×103/4/1 4.31×103/4/1
    a7(50) 1.88×102/44/5 5.47×102/159/17 1.40×101/509/12
    a8(50) 1.87×102/44/5 8.57×102/244/26 1.81×101/725/17
    a1(100) 3.06×103/3/1 2.70×103/3/1 4.55×103/3/1
    a2(100) 2.59×102/44/5 1.15×101/250/27 1.79×101/509/12
    a3(100) 3.02×102/63/8 8.74×102/197/21 8.90×102/259/7
    a4(100) 2.46×102/44/5 8.31×102/176/19 1.76×101/509/12
    a5(100) 2.40×102/44/5 1.17×101/250/27 1.83×101/509/12
    a6(100) 1.20×102/11/1 1.08×102/11/1 5.98×103/4/1
    a7(100) 2.57×102/44/5 1.21×101/250/27 1.97×101/509/12
    a8(100) 2.37×102/44/5 9.33×102/187/20 1.82×101/509/12
    a1(150) 3.87×103/3/1 1.92×103/3/1 6.30×103/3/1
    a2(150) 3.76×102/44/5 1.33×101/201/22 2.57×101/509/12
    a3(150) 4.78×102/63/8 1.15×101/179/19 1.22×101/259/7
    a4(150) 3.00×102/44/5 8.73×102/132/14 2.34×101/509/12
    a5(150) 3.16×102/44/5 1.34×101/201/22 2.51×101/509/12
    a6(150) 1.60×102/11/1 1.42×102/11/1 1.33×102/8/1
    a7(150) 3.09×102/44/5 1.32×101/201/22 2.46×101/509/12
    a8(150) 3.17×102/44/5 2.09×101/301/32 3.02×101/642/24

     | Show Table
    DownLoad: CSV
    Table 5.  Numerical results for Problem 5.
    Inti(n) ILR VRMILP DFPRPMHS
    CPUT/Nfunc/Niter CPUT/Nfunc/Niter CPUT/Nfunc/Niter
    a1(5) 5.45×102/283/36 3.93×102/309/34 6.74×102/694/43
    a2(5) 2.50×102/235/30 3.07×102/330/36 9.82×102/1113/46
    a3(5) 2.09×102/191/24 2.60×102/294/32 5.82×102/663/50
    a4(5) 2.41×102/235/30 3.07×102/330/36 8.84×102/1125/46
    a5(5) 2.04×102/212/27 3.62×102/289/31 1.26×101/1142/56
    a6(5) 2.66×102/253/32 2.25×102/286/32 1.41×101/1265/113
    a7(5) 2.84×102/212/27 3.94×102/289/31 1.22×101/1142/56
    a8(5) 3.33×102/247/32 3.92×102/331/35 2.61×101/2555/55
    a1(10) 6.23×102/254/32 9.28×102/356/39 1.72×101/757/57
    a2(10) 5.84×102/239/31 6.88×102/308/33 1.68×101/800/48
    a3(10) 5.94×102/258/33 6.19×102/296/33 1.20×101/565/46
    a4(10) 5.24×102/232/30 6.53×102/308/33 1.60×101/800/48
    a5(10) 5.56×102/239/31 6.79×102/325/35 1.65×101/789/62
    a6(10) 4.87×102/205/26 6.13×102/282/32 1.81×101/887/53
    a7(10) 5.46×102/239/31 6.68×102/325/35 1.63×101/789/62
    a8(10) 6.69×102/275/36 7.43×102/350/37 2.56×101/1297/54
    a1(50) 2.56×101/211/27 3.13×101/308/33 5.78×101/657/46
    a2(50) 2.42×101/229/29 2.56×101/279/31 1.24×100/1319/111
    a3(50) 2.35×101/250/32 2.68×101/308/33 6.76×101/682/59
    a4(50) 2.38×101/229/29 2.83×101/279/31 1.17×100/1276/105
    a5(50) 2.33×101/228/29 3.54×101/340/38 9.50×101/983/83
    a6(50) 2.17×101/219/28 2.92×101/324/35 8.49×101/937/52
    a7(50) 2.46×101/228/29 3.07×101/340/38 9.22×101/983/83
    a8(50) 2.32×101/241/31 3.16×101/364/39 1.09×100/1238/56
    a1(100) 3.79×101/220/28 4.93×101/325/35 1.12×100/753/44
    a2(100) 4.04×101/236/30 4.62×101/283/32 1.24×100/768/61
    a3(100) 4.28×101/250/32 4.92×101/317/34 1.87×100/1229/56
    a4(100) 3.82×101/236/30 4.27×101/273/31 1.24×100/768/61
    a5(100) 4.77×101/262/33 5.63×101/331/36 1.40×100/892/65
    a6(100) 4.27×101/254/33 5.55×101/314/34 1.66×100/1020/50
    a7(100) 4.73×101/262/33 5.60×101/331/36 1.30×100/892/65
    a8(100) 4.79×101/291/38 5.78×101/380/41 1.96×100/1246/58
    a1(150) 5.67×101/221/28 6.78×101/287/31 2.40×100/1010/50
    a2(150) 5.10×101/206/26 8.62×101/375/41 2.98×100/1327/123
    a3(150) 5.57×101/228/29 6.93×101/325/35 1.95×100/832/52
    a4(150) 5.48×101/206/26 8.80×101/375/41 3.41×100/1363/126
    a5(150) 5.66×101/214/27 8.50×101/358/40 2.31×100/1031/78
    a6(150) 4.97×101/240/31 7.32×101/313/34 1.83×100/875/46
    a7(150) 5.95×101/214/27 9.02×101/358/40 2.42×100/1031/78
    a8(150) 6.91×101/291/38 1.13×100/456/49 2.85×100/1242/58

     | Show Table
    DownLoad: CSV
    Table 6.  Numerical results for Problem 6.
    Inti(n) ILR VRMILP DFPRPMHS
    CPUT/Nfunc/Niter CPUT/Nfunc/Niter CPUT/Nfunc/Niter
    a1(5) 7.08×103/34/14 6.92×103/84/22 4.32×102/672/21
    a2(5) 7.84×103/69/27 5.48×103/71/22 2.96×102/513/40
    a3(5) 4.14×103/34/14 7.29×103/111/27 2.58×102/504/34
    a4(5) 7.08×103/74/28 4.61×103/71/22 2.23×102/414/41
    a5(5) 5.92×103/69/27 4.87×103/71/22 2.85×102/513/40
    a6(5) 3.27×103/32/13 2.77×103/28/11 3.18×102/670/20
    a7(5) 6.28×103/69/27 4.86×103/71/22 2.74×102/513/40
    a8(5) 6.68×103/79/30 5.76×103/84/25 2.66×102/446/40
    a1(10) 6.94×103/31/13 8.81×103/67/20 4.26×102/424/29
    a2(10) 6.88×103/34/14 1.25×102/95/27 6.07×102/672/21
    a3(10) 6.52×103/31/13 1.68×102/142/31 3.96×102/384/30
    a4(10) 6.86×103/34/14 1.36×102/90/26 6.88×102/672/21
    a5(10) 7.18×103/34/14 1.23×102/95/27 6.25×102/672/21
    a6(10) 7.48×103/35/14 4.64×103/33/13 5.18×102/561/18
    a7(10) 6.86×103/34/14 1.20×102/95/27 6.47×102/672/21
    a8(10) 6.92×103/34/14 1.10×102/86/25 6.35×102/672/21
    a1(50) 3.20×102/41/17 3.59×101/1099/94 2.04×101/698/31
    a2(50) 2.57×102/36/15 4.34×102/105/29 1.82×101/572/23
    a3(50) 2.34×102/38/16 2.38×101/769/56 1.70×101/511/38
    a4(50) 2.23×102/36/15 3.88×102/101/28 1.87×101/572/23
    a5(50) 2.68×102/36/15 4.40×102/105/29 1.84×101/572/23
    a6(50) 2.29×102/37/15 1.08×102/25/10 2.13×101/672/21
    a7(50) 2.70×102/36/15 5.36×102/105/29 1.88×101/572/23
    a8(50) 2.61×102/36/15 4.65×102/102/28 1.88×101/572/23
    a1(100) 3.96×102/41/17 5.61×102/84/25 2.28×101/569/22
    a2(100) 5.49×102/57/24 6.17×102/100/28 2.95×101/676/23
    a3(100) 3.64×102/41/17 4.73×102/84/23 2.08×101/411/43
    a4(100) 4.85×102/57/24 6.49×102/100/28 2.92×101/676/23
    a5(100) 4.61×102/57/24 5.92×102/100/28 2.79×101/676/23
    a6(100) 3.35×102/39/16 2.28×102/33/13 2.64×101/673/22
    a7(100) 4.73×102/57/24 6.31×102/100/28 2.89×101/676/23
    a8(100) 7.09×102/83/33 5.68×102/100/28 3.00×101/676/23
    a1(150) 4.56×102/38/16 6.69×102/83/24 4.36×101/678/24
    a2(150) 5.06×102/41/17 1.01×101/125/35 3.39×101/512/39
    a3(150) 4.98×102/38/16 1.21×101/154/34 4.10×101/661/52
    a4(150) 4.84×102/41/17 1.21×101/125/35 3.36×101/517/41
    a5(150) 4.28×102/41/17 1.23×101/125/35 3.83×101/512/39
    a6(150) 6.04×102/39/16 3.64×102/35/14 3.85×101/674/22
    a7(150) 4.13×102/41/17 9.58×102/125/35 3.00×101/512/39
    a8(150) 4.37×102/41/17 1.17×101/129/36 3.59×101/597/33

     | Show Table
    DownLoad: CSV
    Table 7.  Numerical results for Problem 7.
    Inti(n) ILR VRMILP DFPRPMHS
    CPUT/Nfunc/Niter CPUT/Nfunc/Niter CPUT/Nfunc/Niter
    a1(5) 1.75×102/111/18 6.37×103/73/12 4.54×102/752/32
    a2(5) 9.71×103/118/19 1.35×102/207/29 3.64×102/811/55
    a3(5) 5.77×103/104/17 3.63×103/73/12 3.20×102/829/17
    a4(5) 6.72×103/126/20 5.25×103/112/17 3.93×102/934/46
    a5(5) 6.59×103/118/19 9.84×103/207/29 3.90×102/891/51
    a6(5) 5.47×103/96/17 3.57×103/72/13 4.04×102/1024/21
    a7(5) 6.59×103/118/19 1.00×102/207/29 3.93×102/892/51
    a8(5) 6.74×103/128/20 9.35×103/207/29 4.15×102/927/45
    a1(10) 1.70×102/113/18 8.21×103/73/12 6.53×102/735/43
    a2(10) 1.72×102/148/22 1.30×102/137/20 8.32×102/1047/35
    a3(10) 1.36×102/133/20 6.79×103/73/12 6.49×102/830/17
    a4(10) 1.71×102/138/22 1.12×102/112/17 7.33×102/913/30
    a5(10) 1.73×102/148/22 1.28×102/137/20 1.07×101/1047/35
    a6(10) 1.19×102/96/17 8.66×103/72/13 8.01×102/1024/21
    a7(10) 1.66×102/148/22 1.44×102/137/20 8.95×102/1047/35
    a8(10) 1.54×102/131/21 2.27×102/241/33 7.95×102/914/43
    a1(50) 4.83×102/118/19 2.48×102/79/13 2.08×101/836/16
    a2(50) 4.34×102/133/21 4.56×102/185/26 2.22×101/988/27
    a3(50) 3.22×102/105/17 2.33×102/79/13 1.81×101/772/37
    a4(50) 3.98×102/133/21 2.78×102/112/17 2.34×101/999/52
    a5(50) 4.44×102/133/21 4.96×102/185/26 2.44×101/988/27
    a6(50) 3.19×102/102/18 2.16×102/78/14 2.29×101/1024/21
    a7(50) 4.29×102/133/21 4.79×102/185/26 2.28×101/988/27
    a8(50) 4.32×102/133/21 5.52×102/209/29 2.13×101/931/27
    a1(100) 6.02×102/118/19 3.75×102/79/13 2.51×101/838/16
    a2(100) 5.16×102/133/21 6.32×102/205/29 2.91×101/1018/31
    a3(100) 4.38×102/117/19 2.48×102/79/13 2.37×101/849/18
    a4(100) 5.98×102/133/21 4.46×102/112/17 2.75×101/1018/31
    a5(100) 5.15×102/133/21 6.67×102/205/29 2.78×101/1018/31
    a6(100) 4.26×102/102/18 2.68×102/78/14 2.74×101/1024/21
    a7(100) 5.38×102/133/21 8.67×102/205/29 3.08×101/1018/31
    a8(100) 5.41×102/130/21 9.41×102/241/33 3.10×101/1058/36
    a1(150) 5.88×102/111/18 4.44×102/79/13 3.23×101/838/16
    a2(150) 6.85×102/139/22 7.94×102/168/24 4.13×101/1048/35
    a3(150) 7.80×102/142/22 3.71×102/79/13 3.38×101/787/49
    a4(150) 6.78×102/132/21 5.61×102/127/19 3.81×101/1018/31
    a5(150) 7.81×102/139/22 8.21×102/168/24 4.24×101/1048/35
    a6(150) 5.85×102/108/19 4.74×102/78/14 4.21×101/1024/21
    a7(150) 7.66×102/139/22 8.18×102/168/24 3.88×101/1048/35
    a8(150) 8.15×102/149/24 5.84×102/118/18 4.22×101/1056/36

     | Show Table
    DownLoad: CSV

    To provide a clearer characterization of the performance differences among the three algorithms, we adopt the performance profiles proposed by Dolan and Moré [28]. These profiles evaluate algorithmic behavior based on several key performance indicators, specifically the CPU time in seconds, the number of function evaluations, and the number of iterations. By plotting these indicators, the profiles offer a visual and comparative summary of algorithm efficiency. In these plots, a higher performance curve corresponds to better overall performance, making interpretation both intuitive and informative. By drawing these performance profiles for these three algorithms, we can visually assess and compare their efficiency, as shown in Figures 13. According to Figure 1, the ILR algorithm demonstrates significant efficiency, solving approximately 56% of the test problems with the lowest CPUT compared to the VRMILP and DFPRPMHS algorithms, which solve around 44% and 4% of the test problems, respectively. Similarly, Figure 2 shows that the ILR algorithm maintains its superior performance, solving approximately 75% of the test problems with the fewest Nfunc. In contrast, the VRMILP and DFPRPMHS algorithms solve about 26% and 7% of the test problems, respectively, with the least number of function evaluations. Lastly, Figure 3 further confirms the ILR algorithm's efficiency, solving approximately 53% of the test problems with the fewest Niter, while the VRMILP and DFPRRMHS algorithms solve around 37% and 20% of the test problems, respectively, with the fewest iterations.

    Figure 1.  Performance profiles on CPUT.
    Figure 2.  Performance profiles on Nfunc.
    Figure 3.  Performance profiles on Niter.

    Overall, these performance profiles highlight the ILR algorithm's effectiveness in solving large-scale nonlinear systems of equations with convex constraints, outperforming the VRMILP and DFPRPMHS algorithms across multiple performance metrics.

    In this section, we extend the evaluation of the proposed ILR algorithm to impulse noise image restoration problems. To validate the effectiveness of the ILR algorithm, we apply it to benchmark grayscale images subjected to varying levels of impulse noise.

    Impulse noise image restoration is a critical topic in the field of image processing, particularly due to its importance in improving the quality of images corrupted by noise. Noise in images can be introduced through various sources, such as malfunctioning pixels in camera sensors, faulty memory locations in hardware, or transmission errors in communication channels. Common types of noise include Gaussian noise and impulse noise, with the latter often manifesting as salt-and-pepper noise. To address the challenge of removing impulse noise, Chan et al. [29] proposed a two-phase denoising scheme. This scheme combines the adaptive median filter (AMF) method with a variational method to effectively detect and restore noisy pixels.

    Let m×n denote the pixel size of an original image. The pixel locations are indexed by the set M={1,2,,m}×{1,2,,n}. We denote the noise candidate set by NM, and |N| represents the number of elements in N. In the first phase, noise detection is performed using an AMF. For a pixel located at (i,j)M, the observed pixel value is denoted by yij, and the neighborhood of pixel (i,j) is defined as Vij={(i,j1),(i,j+1),(i1,j),(i+1,j)}. The AMF detects noise by considering these neighborhood values. Once the noisy pixels are detected, the second phase involves the restoration of these pixels. This is achieved by minimizing the following regularization function:

    minx(i,j)N[|xi,jyi,j|+β2(2Φ1i,j+Φ2i,j)],

    where

    Φ1i,j=(m,n)VijNφα(xi,jym,n),Φ2i,j=(m,n)VijNφα(xi,jum,n).

    Here, β is a regularization parameter, and φα() is an even edge-preserving potential function with parameter α>0. The vector x=[xi,j](i,j)N is optimized lexicographically to achieve denoising. The regularization problem posed in the second phase is nonsmooth due to the data-fitting term |xi,jyi,j|. To address this, Cai et al. [30] proposed removing the nonsmooth term and instead solving the following smooth unconstrained optimization problem:

    minxfα(x):=(i,j)N(2Φ1i,j+Φ2i,j).

    The potential function φα() plays a crucial role in preserving edges while smoothing the image. A commonly used potential function is the Huber function, defined as:

    φα(t)={t22α,for |t|α,|t|α2,for |t|>α.

    This function is convex and first-order Lipschitz continuous, making it suitable for the minimization problems described above. Let fα(x) denote the gradient of the function fα(x). In alignment with Proposition 6 in [30], if φα is convex, then fα(x) is monotone.

    In this section, all parameters for these three algorithms are set as described in Section 4. The stopping criteria for these three algorithms are defined as follows:

    xkxk1xkτor|fα(xk)fα(xk1)||fα(xk)|τ.

    For this experiment, we utilize the well-known grayscale test images Man (1024×1024) and Tank2 (512×512), which are sourced from the website https://www.hlevkin.com. We examine the performance of these three algorithms by applying them to images corrupted with 30% and 70% impulse noise. The noisy images, as well as the images recovered by these three algorithms, are shown in Figures 4 and 5. The corresponding numerical results are provided in Table 8. Based on these figures and the table, we can draw the following conclusions: (1) Figures 4 and 5 demonstrate that all three algorithms successfully recover the images affected by 30% and 70% impulse noise; (2) Recovering an image with 30% impulse noise requires less CPU time and fewer iterations compared to recovering an image with 70% impulse noise; (3) Among these three algorithms, the ILR algorithm generally requires less CPU time and fewer iterations than the VRMILP and DFPRPMHS algorithms for a given level of impulse noise.

    Figure 4.  From left to right: A noisy image with 30% impulse noise and recovered images obtained by the ILR, VRMILP, and DFPRPMHS algorithms.
    Figure 5.  From left to right: A noisy image with 70% impulse noise and recovered images obtained by the ILR, VRMILP, and DFPRPMHS algorithms.
    Table 8.  The numerical results of the ILR, VRMILP, and DFPRPMHS algorithms.
    Algorithm Man Tank
    Noise: 30% Noise: 70% Noise: 30% Noise: 70%
    Niter/CPUT Niter/CPUT Niter/CPUT Niter/CPUT
    ILR 14/13.38 29/29.04 8/1.46 16/3.66
    VRMILP 22/28.26 39/55.89 18/5.47 20/6.52
    DFPRPMHS 27/38.08 42/46.95 17/2.59 18/3.92

     | Show Table
    DownLoad: CSV

    In this paper, we presented an improved LS-RMIL-type conjugate gradient projection algorithm aimed at efficiently solving systems of nonlinear equations with convex constraints. The proposed algorithm demonstrates several key advantages, including the ability to generate search directions that satisfy sufficient descent and trust-region properties independently of the line search approach. Additionally, the proposed algorithm only requires continuous and monotone assumptions for systems of nonlinear equations, which makes it applicable under less restrictive conditions compared to existing methods. We established the global convergence of the proposed algorithm without relying on the Lipschitz continuity assumption, further relaxing the conditions that need to be satisfied for successful implementation. Extensive numerical simulations, including large-scale systems of nonlinear equations and impulse noise image restoration problems, have shown that the proposed algorithm exhibits superior efficiency and stability compared to existing algorithms. These results indicate that the proposed algorithm is a promising and competitive approach, with significant potential for practical applications, such as image restoration.

    Yan Xia: Conceptualization, Investigation, Writing–original draft, Writing–review and editing, Funding acquisition; Xuejie Ma: Writing–review and editing, Funding acquisition; Dandan Li: Conceptualization, Funding acquisition, Writing–review and editing. All authors have read and approved the final version of the manuscript for publication.

    The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.

    This work is supported by the Guangzhou Huashang College Daoshi Project (2024HSDS28).

    The authors declare that there are no conflicts of interest regarding the publication of this paper.



    [1] A. K. Adak, G. Kumar, M. Bhowmik, Pythagorean fuzzy semi-prime ideals of ordered semigroups, International Journal of Computer Applications, 185 (2023), 4–10. http://dx.doi.org/10.5120/ijca2023922661 doi: 10.5120/ijca2023922661
    [2] A. K. Adak, Nilkamal, N. Barman, Fermatean fuzzy semi-prime ideals of ordered semigroups, Topological Algebra in its Applications, 11 (2023), 20230102. http://dx.doi.org/10.1515/taa-2023-0102 doi: 10.1515/taa-2023-0102
    [3] S. Ashraf, S. Abdullah, T. Mahmood, F. Gahni, T. Mahmood, Spherical fuzzy sets and their applications in multi-attribute decision making problems, J. Intell. Fuzzy Syst., 36 (2019), 2829–2844. http://dx.doi.org/10.3233/JIFS-172009 doi: 10.3233/JIFS-172009
    [4] K. T. Atanassov, Intuitionistic fuzzy sets, Fuzzy Set. Syst., 20 (1986), 87–96. http://dx.doi.org/10.1016/S0165-0114(86)80034-3 doi: 10.1016/S0165-0114(86)80034-3
    [5] S. Bashir, M. M. A. Al-Shamiri, S. Khalid, R. Mazhar, Regular and Intra-regular ternary semirings in terms of m-polar fuzzy ideals, Symmetry, 15 (2023), 591. http://dx.doi.org/10.3390/sym15030591 doi: 10.3390/sym15030591
    [6] P. Corsini, V. Leoreanu, Applications of hyperstructures theory, New York: Springer, 2003. http://dx.doi.org/10.1007/978-1-4757-3714-1
    [7] B. C. Cuong, V. Kreinovich, Picture fuzzy sets–A new concept for computational intelligence problems, 2013 Third World Congress on Information and Communication Technologies (WICT 2013), Hanoi, Vietnam, 2013, 1–6. http://dx.doi.org/10.1109/WICT.2013.7113099
    [8] B. Davvaz, P. Corsini, T. Changphas, Relationship between ordered semihypergroups and ordered semigroups by using pseudoorder, Eur. J. Combin., 44 (2015), 208–217. http://dx.doi.org/10.1016/j.ejc.2014.08.006 doi: 10.1016/j.ejc.2014.08.006
    [9] Y. Z. Diao, Q. Zhang, Optimization of management mode of small- and medium-sized enterprises based on decision tree model, J. Math., 2021 (2021), 2815086. http://dx.doi.org/10.1155/2021/2815086 doi: 10.1155/2021/2815086
    [10] J. Y. Dong, S. P. Wan, Interval-valued intuitionistic fuzzy best-worst method with additive consistency, Expert Syst. Appl., 236 (2024), 121213. http://dx.doi.org/10.1016/j.eswa.2023.121213 doi: 10.1016/j.eswa.2023.121213
    [11] Z. X. Duan, J. L. Liang, Z. R. Xiang, H control for continuous-discrete systems in T-S fuzzy model with finite frequency specifications, Discrete Cont. Dyn.-S, 15 (2022), 3155–3172. http://dx.doi.org/10.3934/dcdss.2022064 doi: 10.3934/dcdss.2022064
    [12] D. Fasino, D. Freni, Existence of proper semihypergroups of types U on the right, Discrete Math., 307 (2007), 2826–2836. http://dx.doi.org/10.1016/j.disc.2007.03.001 doi: 10.1016/j.disc.2007.03.001
    [13] A. Hussain, T. Mahmood, M. I. Ali, Rough Pythagorean fuzzy ideals in semigroups, Comp. Appl. Math., 38 (2019), 67. http://dx.doi.org/10.1007/s40314-019-0824-6 doi: 10.1007/s40314-019-0824-6
    [14] K. Hila, B. Davvaz, J. Dine, Study on the structure of Γ-semihypergroups, Commun. Algebra, 40 (2012), 2932–2948. http://dx.doi.org/10.1080/00927872.2011.587855 doi: 10.1080/00927872.2011.587855
    [15] K. Hila, B. Davvaz, K. Naka, On quasi-hyperideals in semihypergroups, Commun. Algebra, 39 (2011), 4183–4194. http://dx.doi.org/10.1080/00927872.2010.521932 doi: 10.1080/00927872.2010.521932
    [16] K. Hila, S. Abdullah, A. Saleem, A study on intuitionistic fuzzy sets in Γ-semihypergroups, J. Intell. Fuzzy Syst., 26 (2014), 1695–1710. http://dx.doi.org/10.3233/IFS-130849 doi: 10.3233/IFS-130849
    [17] U. Jittburus, P. Julatha, A. Pumila, N. Chunseem, A. Iampan, R. Prasertpong, New generalizations of sup-hesitant fuzzy ideals of semigroups, Int. J. Anal. Appl., 20 (2022), 58. http://dx.doi.org/10.28924/2291-8639-20-2022-58 doi: 10.28924/2291-8639-20-2022-58
    [18] N. Kehayopulu, M. Tsingelis, Regular ordered semigroups in terms of fuzzy subsets, Inform. Sciences, 176 (2006), 3675-3693. http://dx.doi.org/10.1016/j.ins.2006.02.004 doi: 10.1016/j.ins.2006.02.004
    [19] A. Khan, M. Shabir, Intuitionistic fuzzy semiprime ideals in ordered semigroups, Russ. Math., 54 (2010), 56–67. http://dx.doi.org/10.3103/S1066369X10050087 doi: 10.3103/S1066369X10050087
    [20] K. H. Kim, On intuitionistic fuzzy semiprime ideals in semigroups, Scientiae Mathematicae Japonicae, 65 (2007), 447–453. https://doi.org/10.32219/isms.65.3_447 doi: 10.32219/isms.65.3_447
    [21] B. X. Li, Y. M. Feng, Intuitionistic (λ,μ)-fuzzy sets in Γ-semigroups, J. Inequal. Appl., 2013 (2013), 107. http://dx.doi.org/10.1186/1029-242X-2013-107 doi: 10.1186/1029-242X-2013-107
    [22] X. Y. Lu, J. Y. Dong, S. P. Wan, H. C. Li, Interactively iterative group decision-making method with interval-valued intuitionistic fuzzy preference relations based on a new additively consistent concept, Appl. Soft Comput., 152 (2024), 111199. http://dx.doi.org/10.1016/j.asoc.2023.111199 doi: 10.1016/j.asoc.2023.111199
    [23] X. Y. Lu, J. Y. Dong, S. P. Wan, H. C. Li, The strategy of consensus and consistency improving considering bounded confidence for group interval-valued intuitionistic multiplicative best-worst method, Inform. Sciences, 669 (2024), 120489. http://dx.doi.org/10.1016/j.ins.2024.120489 doi: 10.1016/j.ins.2024.120489
    [24] F. Marty, On a generalization of the notion of group, The 8th Congres des Mathematiciens, Scandinaves, Stockholm, 1934, 45–49.
    [25] I. A. H. Masmali, Pythagorean picture fuzzy hyperideals in semihypergroups, Int. J. Math. Comput. Sc., 16 (2021), 1533–1553.
    [26] W. Nakkhasen, Characterizng regular and intra-regular semigroups in terms of picture fuzzy bi-ideals, Int. J. Innov. Comput. I., 17 (2021), 2115–2135. http://dx.doi.org/10.24507/ijicic.17.06.2115 doi: 10.24507/ijicic.17.06.2115
    [27] W. Nakkhasen, On picture fuzzy (m,n)-ideals of semigroups, IAENG International Journal of Applied Mathematics, 52 (2022), 1040–1051.
    [28] W. Nakkhasen, Semihypergroups characterized by means of their Fermatean fuzzy bi-hyperideals, Int. J. Innov. Comput. I., 19 (2023), 255–267. http://dx.doi.org/10.24507/ijicic.19.01.255 doi: 10.24507/ijicic.19.01.255
    [29] W. Nakkhasen, Regularity of semigroups in terms of Pythagorean fuzzy bi-ideals, J. Appl. Math. Inform., 42 (2024), 333–351. http://dx.doi.org/10.14317/jami.2024.333 doi: 10.14317/jami.2024.333
    [30] W. Nakkhasen, R. Chinram, Ternary semigroups characterized by spherical fuzzy bi-ideals, Science and Technology Asia, 28 (2023), 86–107. http://dx.doi.org/10.14456/scitechasia.2023.73 doi: 10.14456/scitechasia.2023.73
    [31] W. Nakkhasen, R. Chinram, A. Iampan, On (fuzzy) weakly almost interior Γ-hyperideals in ordered Γ-semihypergrouops, Int. J. Anal. Appl., 21 (2023), 77. http://dx.doi.org/10.28924/2291-8639-21-2023-77 doi: 10.28924/2291-8639-21-2023-77
    [32] A. Nongmenee, S. Leeratanavalee, Regularity in ternary semihypergroups induced by subsets of ternary semigroups, Thai J. Math., 22 (2024), 73–84.
    [33] M. Riaz, M. R. Hashmi, Linear Diophantine fuzzy set and its applications towards multi-attribute decision-making problems, J. Intell. Fuzzy Syst., 37 (2019), 5417–5439. http://dx.doi.org/10.3233/JIFS-190550 doi: 10.3233/JIFS-190550
    [34] T. Senapati, R. R. Yager, Fermatean fuzzy sets, J. Ambient Intell. Human. Comput., 11 (2019), 663–674. http://dx.doi.org/10.1007/s12652-019-01377-0 doi: 10.1007/s12652-019-01377-0
    [35] M. Shabir, T. Abbas, S. Bashir, R. Mazhar, Bipolar fuzzy hyperideals in regular and intra-regular semihypergroups, Comp. Appl. Math., 40 (2021), 196. http://dx.doi.org/10.1007/s40314-021-01574-8 doi: 10.1007/s40314-021-01574-8
    [36] M. Shabir, A. Khan, Intuitionistic fuzzy interior ideals in ordered semigroups, J. Appl. Math. Inform., 27 (2009), 1447–1457.
    [37] M. Shabir, T. Mahmood, Semihypergroups characterized by (,qk)-fuzzy hyperideals, Inf. Sci. Lett., 2 (2013), 101–121.
    [38] Q. D. Sun, J. C. Ren, F. Zhao, Sliding mode control of discrete-time interval type-2 fuzzy Markov jump systems with the preview target signal, Appl. Math. Comput., 435 (2022), 127479. http://dx.doi.org/10.1016/j.amc.2022.127479 doi: 10.1016/j.amc.2022.127479
    [39] J. Tang, B. Davvaz, X. Y. Xie, A study on (fuzzy) quasi-Γ-hyperideals on ordered Γ-semihypergroups, J. Intell. Fuzzy Syst., 32 (2017), 3821–3838. http://dx.doi.org/10.3233/IFS-162117 doi: 10.3233/IFS-162117
    [40] N. Tipachot, B. Pibaljommee, Fuzzy in interior hyperideals in ordered semihypergroups, Ital. J. Pure Appl. Mat., 36 (2016), 859–870.
    [41] S. P. Wan, J. Y. Dong, S. M. Chen, A novel intuitionistic fuzzy best-worst method for group decision making with intuitionistic fuzzy preference relations Inform. Sciences, 666 (2024), 120404. http://dx.doi.org/10.1016/j.ins.2024.120404 doi: 10.1016/j.ins.2024.120404
    [42] Y. D. Xia, J. Wang, B. Meng, X. Y. Chen, Further results on fuzzy sampled-data stabilization of chaotic nonlinear systems, Appl. Math. Comput., 379 (2020), 125225. http://dx.doi.org/10.1016/j.amc.2020.125225 doi: 10.1016/j.amc.2020.125225
    [43] X. Y. Xie, J. Tang, Regular ordered semigroups and intra-regular ordered semigroups in terms of fuzzy subsets, Iran. J. Fuzzy Syst., 7 (2010), 121–140.
    [44] R. R. Yager, Pythagorean fuzzy subsets, 2013 Joint IFSA World Congress and NAFIPS Annual Meeting (IFSA/NAFIPS), Edmonton, AB, Canada, 2013, 57–61. http://dx.doi.org/10.1109/IFSA-NAFIPS.2013.6608375
    [45] L. A. Zadeh, Fuzzy sets, Information and Control, 8 (1965), 338–353. http://dx.doi.org/10.1016/S0019-9958(65)90241-X doi: 10.1016/S0019-9958(65)90241-X
    [46] N. Zhang, W. H. Qi, G. C. Pang, J. Cheng, K. B. Shi, Observer-based sliding mode control for fuzzy stochastic switching systems with deception attacks, Appl. Math. Comput., 427 (2022), 127153. http://dx.doi.org/10.1016/j.amc.2022.127153 doi: 10.1016/j.amc.2022.127153
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(661) PDF downloads(35) Cited by(0)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog