A Monotone Semismooth Newton Method for a Kind of Tensor Complementarity Problem

Abstract

Tensor complementarity problem (TCP) is a special kind of nonlinear complementarity problem (NCP). In this paper, we introduce a new class of structure tensor and give some examples. By transforming the TCP to the system of nonsmooth equations, we develop a semismooth Newton method for the tensor complementarity problem. We prove the monotone convergence theorem for the proposed method under proper conditions.

Share and Cite:

Xie, S. (2021) A Monotone Semismooth Newton Method for a Kind of Tensor Complementarity Problem. Advances in Pure Mathematics, 11, 369-376. doi: 10.4236/apm.2021.114023.

1. Introduction

A Tensor is a multi-arrray. We denote by T ( m , n ) the space of all m-order and n-dimension tensors. A T ( m , n ) is in the form of

A = [ a i 1 i 2 i m ] , a i 1 i 2 i m R , 1 i 1 , i 2 , , i m n .

If the entries a i 1 i 2 i m are invariant under any permutation of their indices, then A is called a symmetric tensor. We denote by S T ( m , n ) T ( m , n ) the space of all symmetric tensors in T ( m , n ) .

In this paper, we discuss the following tensor complementarity problem (simplified as TCP ( A , p , q ) ): finding a point x R n such that

F ( x ) = A x m 1 q 0 , x p , ( x p ) T F ( x ) = 0 , (1.1)

where q , p R n , p > 0 and A S T ( m , n ) . A x m 1 is an n-dimensional vector, whose ith component is given by [1]

( A x m 1 ) i = i 2 , , i m = 1 n a i i 2 i m x i 2 x i 3 x i m .

A x m 2 is an n × n matrix, whose ith row and jth column is given by

( A x m 2 ) i j = i 3 , , i m = 1 n a i j i 3 i m x i 3 x i 4 x i m .

It is obvious that F ( x ) = ( m 1 ) A x m 2 .

Tensor complementarity problem has many applications, such as nonlinear compressed sensing, communications, DNA microarrays, n-person noncooperative game and so on, see for example [2] [3]. TCP has received much attention and has taken good progress in recent years [4] - [13], such as the structure of the solution set, the global uniqueness solvability and the error bound and so on. Bai, Huang and Wang [4] proved that the P-tensor complementarity problem has a nonempty compact solution set. What’s more, they showed the global uniqueness solvability property for the TCP with a strong P-tensor. Che, Qi and Wei [5] showed that when the tensor is a positive definite or strictly copositive tensor, the TCP has a nonempty compact solution set. On the other hand, however, the study in the related numerical methods is very few. Luo, Qi and Xiu [3] proposed an iterative method to find the sparsest solutions to theZ-tensor complementarity problem with a non-positive constant term. Xu, Li and Xie [14] concerned with the tensor complementarity problem with a positive semi-definite Z-tensor. Under the assumption that the problem has a solution at which the strict complementarity holds, they showed that the problem is equivalent to a system of lower dimensional tensor equations. In this paper, we present a semismooth Newton method for TCP, under the assumption that F ( x ) is a concave function, we establish the monotone convergence theorem for the proposed method. Here F ( x ) is concave means F i ( x ) is a concave function, i = 1 , 2 , , n .

For convenience of presentation, we introduce some concepts and notations which will be used throughout the paper. We denote [ n ] = { 1,2, , n } . Let I [ n ] with | I | = r . Denote by ( A x m 1 ) I the r-dimensional subvector of A x m 1 and its elements are ( A x m 1 ) i , i I . Similarly, we denote q I as the r-dimensional subvector of q and its elements are q i , i I .

2. Semismooth Newton Method and Its Convergence

We first introduce a new class of structure tensor, called M-like tensor.

Definition 2.1. A tensor A T ( m , n ) is called an M-like tensor, if for x R + n , A x m 2 is an M-matrix.

Remark 2.1. As an example, it is easy to verify that the even-order diagonal tensors with all positive diagonal entries are M-like tensors. We give a non-diagonal M-like tensor.

Example 2.1. Let A be a 4th-order 2-dimensional tensor with elements

{ a 1111 = a 2222 = 2 , a 1212 = a 1221 = 1 / 2 , a 2112 = a 2121 = 1 / 3 .

It is easy to verify A is an M-like tensor over R + 2 . In the following, without specification, we always suppose A is an M-like tensor.

Let ϕ : R 2 R be the well-known Fischer-Burmeister function defined by

ϕ ( μ , ν ) = μ + ν μ 2 + ν 2 . (2.1)

It is easy to see that TCP (1.1) can be transformed to the system of nonsmooth equations:

H ( x ) ( H 1 ( x ) H 2 ( x ) H n ( x ) ) ( ϕ ( x 1 p 1 , F 1 ( x ) ) ϕ ( x 2 p 2 , F 2 ( x ) ) ϕ ( x n p n , F n ( x ) ) ) = 0 , (2.2)

where F i ( x ) = ( A x m 1 q ) i .

Let B H ( x ( k ) ) denote the B-subdifferential of H at x ( k ) . V k B H ( x ( k ) ) , if it satisfies

H ( x ( k ) ) H ( x ) V k ( x ( k ) x ) = O ( x ( k ) x 2 ) as x ( k ) x 0.

For any V B H ( x ) can be expressed as follows.

V = d i a g ( a i ) ( m 1 ) ( A x m 2 ) + d i a g ( b i ) , (2.3)

where

( a i 1 ) 2 + ( b i 1 ) 2 1, i = 1,2, , n . (2.4)

It is easy to see that a i 0, b i 0 and a i 2 + b i 2 > 0 for i = 1,2, , n .

Now, we present semismooth Newton method for TCP (1.1).

Algorithm 2.1 (Semismooth Newton Method)

Step 0. Choose ε > 0 and initial point x ( 0 ) . Let k = 0 .

Step 1. If H ( x ( k ) ) < ε , stop.

Step 2. Choose V k B H ( x ( k ) ) , calculate d k satisfying the following linear equations

V k d k = H ( x ( k ) ) . (2.5)

Step 3. Calculate

x ( k + 1 ) = x ( k ) + d ( k ) . (2.6)

Let k : = k + 1 and goto Step 1.

Theorem 2.2. [15] Let x be the solution of (1). Then the sequence { x ( k ) } generated by (6) is Q-quadratically convergent to x if x ( 0 ) is sufficiently close to x .

In the following, we will prove the sequence { x ( k ) } monotonically converges to the solution of (1). First, we give some useful lemmas.

Lemma 2.3. [16] Let A R n × n be an M-matrix and B A satisfy b i j 0 for i j . Then B is an M-matrix and

0 B 1 A 1 .

Furthermore, any principle submatrix of A is again an M-matrix.

By the definition of V, the ith row V i of V can be presented by

V i = { ( m 1 ) a i ( A x m 2 ) i + b i e i , a i > 0 and b i > 0 , ( m 1 ) ( A x m 2 ) i , a i = 1 and b i = 0 , e i , a i = 0 and b i = 1 ,

where ( A x m 2 ) i is the ith row of A x m 2 and e i is the ith row of the n × n identity matrix. It is easy to verify V = K B , where K = d i a g ( k i ) with

k i = { a i , a i 0 , 1 / ( a i i ) , a i = 0

and

B = ( B 1 B 2 B n )

with

B i = { ( m 1 ) ( A x m 2 ) i + ( b i / a i ) e i , a i 0 , a i i e i , a i = 0 ,

where a i i is the ith diagonal element of ( m 1 ) A x m 2 . Noting that B ( m 1 ) A x m 2 with the off-diagonal element being nonpositive, we have B is an M-matrix and 0 B 1 ( ( m 1 ) A x m 2 ) 1 by Lemma 2.3. This together with K being a positive diagonal matrix, we obtain the following lemma.

Lemma 2.4. Let the matrix V be defined by (2.3), then V is an M-matrix.

Define the set D by

D = { x p | H ( x ) 0 } .

As p always belongs to D, D is not empty.

Lemma 2.5. Let x be the solution of (1.1). Then x D and

x x , x D .

Proof. Since x is the solution of (1.1), we have x p and H ( x ) = 0 . This implies that x D .

For any x D , we have x p and H ( x ) 0 . Associated to x, we define two disjoint index sets as follows:

I 1 : = { i | x i = p i } and I 2 : = { i | x i > p i } .

This together with the fact x p implies x i x i for all i I 1 . Since H ( x ) 0 , we have

F I 2 ( x ) 0 F I 2 ( x ) .

Noting that A is an M-like tensor, by Theorem 4 in [17], we have F ( x ) is a strong T-monotone function. Hence by Lemma 2.2 in [18], we immediately have that x x . This completes the proof.

Lemma 2.6. Let x ( 0 ) D . Then the sequence { x ( k ) } generated by (2.6) is contained in D and satisfies

x ( k ) x ( k + 1 ) , k = 0 , 1 ,

Proof. We prove the conclusion by induction. For simplicity, we denote x ( k ) and x ( k + 1 ) by x and y respectively. Suppose x D , we only need to verify x y and y D . Since V 1 0 , by (2.5) we have

d = V 1 H ( x ) 0.

Hence, we get

y = x + d x p . (2.7)

Now, we prove H ( y ) 0 . Associated to x, we define four disjoint index sets as follows:

J 1 : = { i | x i = p i , F i ( x ) > 0 } , J 2 : = { i | x i > p i , F i ( x ) = 0 } ,

J 3 : = { i | x i = p i , F i ( x ) = 0 } , J 4 : = { i | x i p i , F i ( x ) < 0 } .

Then by (2.1), (2.2), (2.4), we have

{ H i ( x ) = 0 , a i = 0 , b i = 1 , if i J 1 , H i ( x ) = 0 , a i = 1 , b i = 0 , if i J 2 , H i ( x ) = 0 , a i 0 , b i 0 , if i J 3 , H i ( x ) < 0 , a i > 1 , b i ( 0 , 1 ] , if i J 4 . (2.8)

If i J 1 , by (2.3), (2.5), (2.8) we get d i = H i ( x ) = 0 and y i = x i + d i = x i = p i . This together with (2.2), (2.1) implies H i ( y ) 0 .

If i J 2 , y i = x i + d i x i > p i . Since F i ( x ) is concave, by (2.3), (2.5), (2.8) again, we have

F i ( y ) = F i ( x + d ) = F i ( x ) + 0 1 F i ( x + t ( y x ) ) T ( y x ) d t F i ( x ) + 0 1 F i ( x ) T ( y x ) d t = 0.

Hence, H i ( y ) 0 .

If i J 3 , by (2.5) and (2.3), we obtain

a i ( m 1 ) ( A x m 2 ) i T d + b i d i = H i ( x ) = 0.

where a i 0 and b i 0 . Hence, we have

a i ( m 1 ) ( A x m 2 ) T d = b i d i 0.

If a i > 0 , then F i ( y ) F i ( x ) + ( m 1 ) ( A x m 2 ) i T d 0 , which implies H i ( y ) 0 .

If a i = 0 , then by (2.4) we have b i = 1 , and then d i = 0 . Since A is an M-like tensor, ( A x m 2 ) i j 0 and d j 0 for j i , we have

F i ( y ) F i ( x ) + ( m 1 ) ( A x m 2 ) i T d = ( m 1 ) j i ( A x m 2 ) i j d j 0.

Hence, H i ( y ) 0 .

Similarly, if i J 4 , by simple calculations,

a i ( m 1 ) ( A x m 2 ) i T d H i ( x ) and a i = 1 F i ( x ) / x i 2 + F i 2 ( x ) ,

and hence

( m 1 ) ( A x m 2 ) i T d x i 2 + F i 2 ( x ) x i F i ( x ) 1 F i ( x ) / x i 2 + F i 2 ( x ) .

Therefore, we have

F i ( y ) F i ( x ) + ( m 1 ) ( A x m 2 ) i T d F i ( x ) + x i 2 + F i 2 ( x ) x i F i ( x ) 1 F i ( x ) / x i 2 + F i 2 ( x ) = x i 2 x i x i 2 + F i 2 ( x ) x i 2 + F i 2 ( x ) F i ( x ) 0.

Hence,

H i ( y ) 0, i J 4 .

The above argument has shown H ( y ) 0 . From (2.7), we have y x and y D . The proof is completed.

Noting that the sequence { V k } is uniformly bounded, by Lemmas 2.5 and 2.6 and Theorem 2.2, it is easy to obtain the following theorem.

Theorem 2.7. Let x ( 0 ) D and { x ( k ) } be the sequence generated by (2.6). Then we have for all k 0

x ( k ) x ( k + 1 ) x .

Moreover, the sequence { x ( k ) } converges to x Q-quadratically.

3. Conclusion

We have introduced a new kind of structure tensor and discussed the numerical algorithm for TCP. By transforming the TCP to the system of nonsmooth equations, we have presented a semismooth Newton method for TCP. At each iteration, only linear equations need to be solved. The sequence generated by the algorithm is monotonically convergent to the solution of the TCP under proper conditions. This method can be regarded as a kind of Newton-iteration method. There are still some interesting future works that need to be done. For example, we can extend Algorithm 2.1 for other structure TCP and discuss its convergence.

Founding

The work was supported by the Educational Commission of Guangdong Province, China (grant No. 2019KTSCX172).

Conflicts of Interest

The author declares no conflicts of interest regarding the publication of this paper.

References

[1] Qi, L. (2005) Eigenvalues of a Real Supersymmetric Tensor. Journal of Symbolic Computation, 40, 1302-1324.
https://doi.org/10.1016/j.jsc.2005.05.007
[2] Huang, Z. and Qi, L. (2017) Formulating an n-Person Noncooperative Game as a Tensor Complementarity Problem. Computation Optimization and Applications, 66, 557-576.
https://doi.org/10.1007/s10589-016-9872-7
[3] Luo, Z.Y., Qi, L. and Xiu, N.H. (2017) The Sparse Solutions to Z-Tensor Complemenatiry Problems. Optimization Letters, 11, 471-482.
https://doi.org/10.1007/s11590-016-1013-9
[4] Bai, X.L., Huang, Z.H. and Wang, Y. (2016) Global Uniqueness and Solvability for Tensor Complementarity Problems. Journal of Optimization Theory and Applications, 170, 72-84.
https://doi.org/10.1007/s10957-016-0903-4
[5] Che, M., Qi, L. and Wei, Y. (2016) Positive-Definite Tensors to Nonlinear Complementarity Problems. Journal of Optimization Theory and Applications, 168, 475-487.
https://doi.org/10.1007/s10957-015-0773-1
[6] Ding, W., Luo, Z. and Qi, L. (2015) P-Tensors, P0-Tensors, and Tensor Complementarity Problem. arXiv:1507.06371.
[7] Gowda, M.S., Luo, Z., Qi, L. and Xiu, N. (2015) Z-Tensors and Complementarity Problems. arXiv:1510.07933.
[8] Huang, Z., Suo, Y. and Wang, J. (2015) On Q-tensors. arXiv:1509.03088.
[9] Song, Y. and Qi, L. (2015) Properities of Some Classes of Structured Tensors. Journal of Optimization Theory and Applications, 165, 854-873.
https://doi.org/10.1007/s10957-014-0616-5
[10] Song, Y. and Qi, L. (2017) Properties of Tensor Complemenatiry Problem and Some Classes of Structured Tensors. Annals of Applied Mathematics, 33, 308-323.
[11] Song, Y. and Qi, L. (2015) Error Bound of P-Tensor Nonlinear Complementarity Problem. arXiv:1508.02005v2.
[12] Song, Y. and Yu, G.H. (2016) Properties of Solution Set of Tensor Complemenatiry Problem. Journal of Optimization Theory and Applications, 170, 85-96.
https://doi.org/10.1007/s10957-016-0907-0
[13] Wang, Y., Huang, Z.H. and Bai, X.L. (2016) Exceptionally Regular Tensors and Tensor Complementarity Problems. Optimization Methods and Software, 31, 815-828.
https://doi.org/10.1080/10556788.2016.1180386
[14] Xu, H.R., Li, D.H. and Xie, S.L. (2019) An Equivalent Tensor Equation to the Tensor Complementarity Problem with Positive Semi-Definite Z-Tensor. Optimization Letters, 13, 685-694.
https://doi.org/10.1007/s11590-018-1268-4
[15] Qi, L. (1993) Convergence Analysis of some Algorithms for Solving Nonsmooth Equations. Mathematics of Operations Research, 18, 227-244.
https://doi.org/10.1287/moor.18.1.227
[16] Hackbusch, W. (1994) Iterative Solution of Large Sparse Systems of Equations, Springer-Verlag, Berlin.
https://doi.org/10.1007/978-1-4612-4288-8
[17] Zeng, J.P. and Xu, H.R. (2008) T-Monotone Mapping and Its Properties. Mathematica Applicata, 21, 288-292.
[18] Xu, H.R. (2011) An Additive Schwarz Algorithm for NCP with a T-Monotone Function. Journal of Jiaying University, 29, 15-17.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.