Relaxations and Cutting Planes for Linear Programs with Complementarity Constraints
Abstract
We study relaxations for linear programs with complementarity constraints, especially instances whose complementary pairs of variables are not independent. Our formulation is based on identifying vertex covers of the conflict graph of the instance and generalizes the extended reformulation-linearization technique of Nguyen, Richard, and Tawarmalani to instances with general complementarity conditions between variables. We demonstrate how to obtain strong cutting planes for our formulation from both the stable set polytope and the boolean quadric polytope associated with a complete bipartite graph. Through an extensive computational study for three types of practical problems, we assess the performance of our proposed linear relaxation and new cutting-planes in terms of the optimality gap closed.
Key words: Complementarity constraints; Cutting-planes; Convex hull; Disjunctive programming; Boolean quadric polytope
1 Introduction
In this paper we study the linear programming problem with complementarity constraints (LPCC) of the following form:
(LPCC) |
Here for , and denotes the -dimensional vector with all components having value one. We assume that finite upper bounds on the variables y are given, so it is without loss of generality that we may scale their upper bounds to be . The set consists of unordered pairs of elements in , and we denote by the so-called conflict graph of (LPCC). Throughout the paper we assume that is simple, so it contains no loops or parallel edges. We denote by the feasible region of (LPCC), and by
the linear programming (LP) relaxation of .
The conditions known as complementarity constraints, are a special case of Special Ordered Sets of type 1 (SOS1) [7], which is a set of variables in which at most one may take a non-zero value. Practical problems involving complementarity constraints arise extensively in business, engineering, and economics, and we refer the reader to [16] for a detailed survey of applications. In many applications of LPCC, its associated conflict graph is 1-regular, i.e., every variable is contained in exactly one complementarity constraint. An important example of this case arises from imposing optimality conditions on decisions in a multi-level setting. In other applications, however, the conflict graph is more general. For example, consider scheduling a set of jobs , where each job has processing times and benefit . The goal is to optimally select a subset of jobs to complete in a given time limit , where jobs may be partially executed, and certain pairs of jobs may not both be selected. This problem, known as the continuous knapsack problem with conflicts, can be formulated as an LPCC:
In this paper, we propose a new extended formulation for whose natural relaxation is strong, and we demonstrate additional cutting-planes to strengthen the relaxation. We call a set an extended relaxation for a set in if and . A recent paper by Nguyen et al. [27] is closely related to our research. The authors propose an extension of the well-known reformulation-linearization technique (RLT) of Sherali and Adams [32], coined ERLT, to the LPCC with a 1-regular conflict graph, and show that the resulting extended relaxation is stronger. As we will see in Section 2.2, when the conflict graph is 1-regular, our extended relaxation coincides with the relaxation given by the first-level ERLT. The paper [27] also describes the standard, iterative, multi-level process to strengthen ERLT. From a computational perspective, the first level ERLT relaxation is the most relevant, and throughout this paper, when we reference the ERLT relaxation, we mean the first-level ERLT.
For (LPCC) with a 1-regular conflict graph, many approaches have been given for strengthening the LP relaxation. Ibaraki [21] applies the work of Balas [4] to obtain a family of cutting-planes that can be derived from the simplex tableau of the linear programming relaxation of LPCC, and an improvement to these cuts is proposed by Sherali et al. [31] using disjunctive programming techniques. Jeroslow [24] gave a finite sequential procedure for generating all valid inequalities of the feasible set when every variable appears in some complementarity constraint. Moreover, Hu et al. [19, 20] studied the complementarity constraints arising from KKT conditions for linear programming problems with quadratic objective, and proposed a Benders type approach for solving the resulting LPCC. When the complementarity constraints are a collection of disjoint SOS1, the corresponding conflict graph is the union of a set of cliques. In this case, de Farias et al. [10, 11, 12] analyzed the polyhedral properties of the feasible sets that arise in this scenario and derived cutting-planes by a sequential lifting procedure of cover inequalities. Moreover, with the setting, Del Pia et al. [14] studied how to derive strong cutting-planes from another complementary concept of cover called “pack”. Most existing research for the case of a general conflict graphs focuses on integer programming [1, 2, 3, 18, 26, 30]. Recently, Fischer and Pfetsch [17] investigated a branch-and-cut algorithm to solve LPCC with a general conflict graph and demonstrated its effectiveness by an extensive computational study.
The structure of this paper is as follows: In Section 2, using concepts of vertex cover in graph theory and motivated by the disjunctive formulation, we present an extended relaxation for . We show that for the special case where the conflict graph is 1-regular, our extended relaxation coincides with the ERLT relaxation introduced by Nguyen et al. [27]. In particular, from the disjunctive perspective of our formulation and the idealness of Balas’ disjunctive formulation, we are able to derive Theorem 2 and Theorem 3 in [27]. In Section 3, we study a sub-structure that arises from our proposed extended formulation, and we show that all valid inequalities for a particular Boolean Quadric Polytope (BQP) [28] associated with a complete bipartite graph, can be added as cutting-planes to our extended relaxation proposed in the previous section. In Section 4, we conduct an extensive numerical study over a series of randomly generated problems and illustrate that when combined with the cutting-planes from Section 3, our extended relaxation is able to significantly close the optimality gap, compared to some other benchmark linear relaxations. We give concluding remarks in Section 5.
Notation. Throughout this paper, vectors are written in bold, e.g., , and matrices are written in capital letters. The notation is used to denote the -th row of a matrix , for . For a given vector and set , we use the common notation . For a node of the conflict graph , the notation refers to the set of nodes in adjacent to , and for any , we define . The notation denotes the -dimensional vector with all components 1, and the orthogonal projection of a set onto the space of x-variables is given by The set of all subsets of a given set is denoted as .
2 A Vertex cover-based extended relaxation
In this section, we introduce a new extended relaxation for (LPCC) that generalizes the ERLT procedure [27] to the case of complementarity conditions forming an arbitrary conflict graph. The extension relies on the concept of vertex covers.
Definition 1.
A vertex cover of a graph is a subset of such that for every edge , at least one among and is in . A minimum vertex cover is a vertex cover with the smallest size.
The following lemma follows directly from the definition of a vertex cover.
Lemma 1.
Let and let be a vertex cover of . Then y satisfies the complementarity constraints of (LPCC) if and only if for any , either or for every .
Proof.
First, assume satisfies the complementarity constraints for all , and assume that for some . Then we must have for any .
On the other hand, assume that for any , either or for every . Take an arbitrary edge . Since is a vertex cover, either or . Suppose without loss of generality that . Then by assumption we obtain that either or for every . Since , it follows that . ∎
Our extended relaxation is based on the notion of a (feasible) cover partition.
Definition 2.
We say that is a cover partition of if is a vertex cover of , and for any . A cover partition of is a feasible cover partition if for any and any , we have .
For notational convenience, for any set , define the sets
From Section 1, it follows that if is a vertex cover of the conflict graph of (LPCC), then . If is a feasible cover partition of , then because for any and , we have that . Thus, we have the following chain of equalities:
(1) |
Hence for a feasible cover partition , one natural convex relaxation for is
In the remainder of the paper, we always assume that is a feasible cover partition. We first notes that this relaxation is a polyhedron.
Observation 1.
For any and is a polyhedron.
Proof.
Since and the hyperplanes defining and only involve variables, the recession cone of the both polyhedra and is . It is well-known (see, e.g., [9]) that if the polyhedra share the same recession cone, the convex hull of the union of the polyhedra is polyhedral. ∎
A consequence of Section 1 is that (unlike in [27]), we need not assume is compact. From Section 1 and Balas’ classical results on disjunctive programming [6, 5], for each , has the following extended formulation:
(2) | |||
(3) | |||
(4) | |||
(5) | |||
(6) | |||
(7) |
where , , , are vectors of variables, and and are scalar variables. For a given feasible cover partition , by enumerating the extended formulations for each , we obtain a relaxation for in the extended space . We call this extended relaxation the vertex-cover-based extended relaxation of :
Here we should remark that only depends on the linear constraints of the polyhedron and the feasible cover partition . Due to the natural connection between and the disjunctive formulation of with , we naturally have the following result.
Theorem 1.
Let be a polyhedron such that , and let be a feasible cover partition of the conflict graph . Then for each ,
Proof.
The set is constructed by enumerating Balas’ disjunctive formulation of for each , so the second subset relation holds trivially. To show the first subset relation, since is a convex set, we need only need to show , so we will show that for any , there exists such that . Given , for each , let
. Since , by the definition of , the corresponding constraints (2) and (3) with respect to are naturally satisfied. Now we check constraint (4). Since is a feasible cover partition, for any and , Also, since y satisfies the complementarity constraints, for any , either or . Hence, either or . In the first case, is defined to be 0, and equations of (4) hold; In the second case, and (4) holds. It is easy to verify that the remaining constraints (5)-(7) are also satisfied by for any . ∎
We define to be the linear relaxation of in the original space of variables. Furthermore, for any and , we recursively define , where . We obtain the following theorem.
Theorem 2.
Let be a feasible cover partition of . For any , and for any collection of distinct elements of ,
(8) |
Proof.
The proof is by induction. When , this result reduces to Section 1 by picking . Assume now that the result holds for , where and consider the case . Let , and . By the inductive hypothesis, we have:
(9) |
Applying Section 1 for and , we have
(10) |
Combining (9) and (10), we obtain
Notice that both and are faces of the set , hence we have and . Therefore:
Hence (8) also holds for , and the proof is complete. ∎
Note that Section 2 implies that for any feasible cover partition of , which naturally leads to the following definition.
Definition 3.
Let be a feasible cover partition for the conflict graph of (LPCC) whose feasible region is . The cover-partition rank of for , denoted , is the least number such that .
An immediate corollary of Section 2 is that the cover-partition rank is upper bounded by the cardinality of the feasible cover partition for any polyhedron .
Corollary 1.
.
2.1 Edge-based extended relaxation
From a similar disjunctive perspective as that which motivated the chain of equations (1), a natural relaxation of contain be obtained using the following relations:
Therefore, using disjunctive programming, the following linear system provides another extended relaxation of :
(11) |
Let denote the set in given by the linear system (11). It can be shown that is never a stronger relaxation than the relaxation provided by with respect to some feasible cover partition .
Proposition 1.
Let . Then .
Proof.
Arbitrarily pick . There exist variables such that satisfies the following constraints:
(12) |
Later in Section 4, we will show empirically that can provide a significantly stronger relaxation than . The strength of the relaxation depends on the choice of , so an important question is how to select the cover partition. Intuition given by Section 1 suggests that we should choose a feasible cover partition of small cardinality, as the cardinality upper bounds the cover-partition rank. In this case, the simple choice of feasible cover partition of Proposition 1 is not likely to lead to the strongest relaxation. Moreover, a feasible cover partition with cardinality produces a linear relaxation with linear constraints and additional variables, so a smaller feasible cover partition will also be more favorable from a computational perspective. In the numerical experiments that we present later in Section 4, we will use the feasible cover partition given by some approximate minimum vertex cover, which can be easily accessed using the Python package NetworkX.
2.2 Equivalence of vertex cover-based extended relaxation and ERLT for 1-regular conflict graph
In this section, we demonstrate that if the conflict graph of complementarity condition is 1-regular, then the vertex-cover-based extended relaxation is the same as the relaxation from the Extended Reformulation Linearization Technique (ERLT) proposed by Nguyen et al. [27].
We begin by briefly reviewing the ERLT procedure. Let be a given polytope in , where the complementarity constraints are for any . Given a matrix and a subset , we denote by the sub-matrix obtained by removing from all columns with indices not in , and denote by the sub-matrix obtained by removing from all columns with indices in . Using this notation, then applying the ERLT to gives the linear description
(13) |
in the variables , and for . The primary difference between the original Reformulation Linearization Technique (RLT) for binary mixed integer programs [32] and ERLT is that in RLT we multiply the linear constraints of the problem with binary variables (and their complements) from the existing problem, while in ERLT, auxiliary variables are created, and the original linear constraints are multiplied with these auxiliary variables. After multiplication, the reformulation and linearization steps are the same in RLT and ERLT.
Next, consider the vertex-cover-based relaxation for (LPCC) with a 1-regular conflict graph . When is 1-regular, the number of nodes of is even, and we assume without loss of generality that , where . Throughout this section, we define
Any minimum vertex cover of has the property that for any , and by symmetry of variables and we may assume without loss of generality that the feasible cover partition is . Applying the vertex-cover-based extended relaxation procedure and renaming variables, we obtain the following extended relaxation for :
Here for each . Now we denote , and for any , and let matrix , where denotes the sub-matrix of given by the first columns, and denotes the sub-matrix of given by the remaining columns. Then we have
(14) | |||
(15) | |||
(16) | |||
(17) | |||
(18) | |||
(19) |
Here , and for each . Lastly, for any , by eliminating variables and using equations (16), (18) and (19), the above linear system will coincide exactly with the ERLT relaxation (13), demonstrating their equivalence.
By this observation, the ERLT proposed in [27] can be seen as a special case of our vertex-cover-based extended relaxation. More specifically, by the construction of , we provide a disjunctive perspective for the ERLT procedure. Once consequence of this different perspective is that Theorem 2 in [27] can be deduced from the fact that the disjunctive formulation provides an extended formulation for the convex hull of multiple polyhedra with identical recession cones.
3 Cutting-planes in extended space
In this section, we study how to strengthen the extended relaxation through cutting planes. First, we strengthen the relaxation by imposing additional valid bilinear equations:
(20) | ||||
(21) |
and we define the set
(22) |
We first show that these bilinear equations are indeed valid by demonstrating that is an extended formulation for .
Proposition 2.
Proof.
First, we show Pick . From constraints (2), (3), (5), (6), (7), we know . Moreover, for each , from (4), (20), (21), we have for any , and for any . Since by (7), we have either or . These yield that either or , which means because of (1).
Now we arbitrarily pick . For each , we define , , and are defined by (20) and (21), respectively. In order to show that , it suffices to show that (4) holds for each , since all the remaining constraints are naturally satisfied from the construction of . For each and ,
Next we verify that for any . Since satisfies the complementarity constraints of , by (1) we know that either or . If , then , which implies for any ; If , then for any , so we have for any . Hence we have shown that , which completes the proof. ∎
From the disjunctive interpretation of the auxiliary variables in defining and , we can further obtain the following proposition. Here for graph , a clique of is defined to be a subset of nodes such that every two distinct nodes in the clique are adjacent.
Proposition 3.
Let be a feasible cover partition of the conflict graph , and let be a clique of . If are different node sets in such that for any , then:
Proof.
From Section 2, we only need to show the projection onto -space of the set defined in the statement of this proposition contains .
Arbitrarily pick . For each , we define , , and are defined by (20) and (21), respectively. It is obvious that . Let and be the node sets defined in the statement of this proposition.
First of all, we show that . If , from the definition of , we know there are such that . Say for . Since , and is a clique, we know there exists and , such that is an edge in . Hence . By definition of feasible cover partition, . Therefore, , so , which means is also an edge of . However, , , thus we get the contradiction using the complementarity constraints.
Lastly, follows immediately from (21) in the definition of . ∎
In particular, Section 3 implies that all inequalities in Section 3 can be added to the formulation of to obtain a stronger extended relaxation.
Even though Section 2 shows that is a formulation of in an extended space, in general is not expected to be polyhedral. In order to obtain a polyhedral relaxation of which is stronger than the previous extended relaxation , we define as the set of points in that satisfy the constraints defining in (22) which do not involve variables and . Namely
(23) |
Here we ignore the equation in (6) since it is induced by (21) and . Note that:
(24) |
Obviously, the relaxation of in (24) is tighter than . In the next result we show that it is indeed a polyhedral relaxation.
Proposition 4.
The extreme points of are contained in . Hence the set is polyhedral.
Proof.
Let be an extreme point of . It suffices to show that and , since from equations and , the integrality of the remaining variables follows.
First, we show . Assume for a contradiction that for some . Let be the vector in obtained from by setting and for any . Similarly, let be obtained from by setting and for any .
Now we show that both vectors and are in . From the construction of and , it suffices to check that (4) are satisfied by both and . Note that (component-wise), so the fact that satisfies (4) directly implies that satisfies (4). For , we want to check that: for any , , and . Since satisfies (4), and from the construction of , it suffices to check that: for any with , and for any with . Since satisfies (4) and for any , we obtain that for any with , and for any with . By assumption of , we get for any with , and for any with . Therefore, we have shown that both are in .
Next, we show that can be written as the convex combination of and :
(25) |
From the construction of and , we only need to consider the components of and for all . The component of (25) is trivial to check. For any , we have
where the first equations of both lines are from the fact that , and the second equations are from the definition of and . We have thereby shown that, if has fractional components, then can be written as the convex combination of two different points in . This contradicts the fact that is an extreme point.
Next, we show . Assume for a contradiction that for some . Let be the vector in obtained from by setting , , , . Similarly, let be obtained from by setting , , , . Now, we show that . Here we only have to show that (4) are satisfied by both and . For , we need to show: and for any . By definition of , we only need to show . By assumption of , we also have . Since (4) and (21) imply , for any we have for any . Hence we have shown . Similarly, we can obtain . Lastly, we show that:
(26) |
From the definition of and , we only need to consider the components of for any . The components of (26) are trivial to check. For any , we have
where the first equations of both lines are from the fact that , and the second equations are from the definition of and . Therefore, can be written as the convex combination of two different points in , which contradicts the fact that is an extreme point. ∎
According to Section 4, the convex hull of in (23) can be rewritten as:
(27) |
Here constraints (5) are redundant hence they have been removed.
For the purpose of studying quadratic 0-1 programming problems, Padberg [28] proposed the boolean quadric polytope (BQP), which is a polytope in a higher dimensional space that results from the linearization of the quadratic terms. In particular, the BQP with respect to the complete bipartite graph that can be bipartitioned into and nodes is defined as
In fact, this special case of BQP corresponding to a complete bipartite graph is also called bipartite BQP, and its structural properties have been recently studied in [33]. Using this definition, by (27), we have the following relaxation for
(28) |
Here we also include the equations for all , since they are obviously valid for . Interestingly, the next theorem shows that, the relaxation given in (28) is in fact a formulation of . It is worth mentioning that such result is non-trivial in general, since (7) and are not facial constraints to , and equations are redundant in the definition (23) of , while they are necessary in order for the statement of the next theorem to hold.
Theorem 3.
.
Proof.
Because of (28), here we only have to show the other direction: .
Arbitrarily pick which also satisfies (4), (7), and for every . We want to show that . Here can be written as the convex combination of some binary points in :
(29) |
Our goal is to show that either all of those are contained in , or there exist some other binary points in which contain in their convex hull.
First of all, since satisfies (4) for any , and can be written as the convex combination in (29), we know that satisfies (4) for all . If for any and , we also have , then we complete the proof, since all of these , and .
Now, assume equation is not satisfied by all , for some . Since is satisfied by , we know there must exist some point with and some other point with . Namely, there exist such that for all , and for all . Next, we want to transform into some other binary points in with . For all points in with index in , we replace their component by , and change those components correspondingly to make remain feasible in . We denote the obtained set of binary points by . Clearly, after such transformation, those new points now all satisfy the equation . Now we verify that can still be written as their convex combination, with the same convex combination coefficients: . Note that the only components changed in from are and . From the transformation above, the change occurred to component of from is: . By the fact that and , we have:
which gives us . So the component of remains unchanged from . Similarly, the change occurred to components of from is: , where are the components of point for any . According to the fact that and , here we have:
This gives us , which means that the components of remain unchanged from . Therefore, . The above argument holds for any which has for some . Eventually, we end up getting binary points in that contain in their convex hull, hence . ∎
From Section 3, in order to fully utilize the cutting-planes provided by , one only needs to consider valid inequalities of as well as some additional equations in (28). However, it is challenging to enumerate the facets of even for a very small graph, see [15]. The polyhedral structure of for a series-parallel or an acyclic graph were studied originally by Padberg [28]. More recently, Sripratak et al. [33] studied valid inequalities for over a complete bipartite graph, which is particularly interesting for our setting and they coined it as bipartite boolean quadric polytope. In that paper, the authors proposed a few families of valid inequalities, e.g., odd-cycle inequalities, rounded clique inequalities, rounded cut inequalities, etc., among which odd-cycle inequalities are the only family of inequalities that can be facet-defining. Therefore, even though we have a complete characterization of in terms of , facet-defining inequalities of are still generally hard to obtain. Now, we will generate valid inequalities of from a different perspective.
It is simple to see that, by studying the sub-system of (LPCC) involving only variables, we are also able to derive valid inequalities for . Namely, any valid inequality for the convex set
(30) |
can be utilized as a cutting-plane involving only -variables to strengthen the LP relaxation . In fact, as we will see in the next result, the convex set (30) is simply the stable set polytope of the graph , and any valid inequality for such stable set polytope is actually valid for the projection of .
Proposition 5.
For any graph and any feasible cover partition of , .
Proof.
To show the second equation, it suffices to show that the set (30) has binary extreme points. Let be a fractional point of (30), with . Consider the two points and , where denotes the unit vector with th-component being 1. Since , by complementarity constraints, we know for any . Therefore, it is easy to verify that both and satisfy the complementarity constraints . Since can be written as the convex combination of and , we know that the fractional point cannot be an extreme point of set (30).
To prove the first equation, by Section 4, we only need to show that, for any binary and any , we have . Since is a feasible cover partition, there exists such that or . Without loss of generality assume . We then obtain . By equations (4), (7), (21) with respect to index , we have: , , . Since and , at least one of and is 0. Thus we complete the proof. ∎
From Section 5, we directly obtain the next corollary.
Corollary 2.
Let be a graph and let be a feasible cover partition of . If is a valid inequality for the stable set polytope of , then for any , and are both valid inequalities for .
4 Numerical experiments
In this section, we conduct numerical experiments to compare the optimality gaps of various relaxations for some particular LPCCs. We use Python 3.6.0 with CPLEX 12.9 as the LP and MIP solver.
For each LPCC instance we created, its optimal value is obtained from formulating it as a MIP. Specifically, for any complementarity constraint , we add additional binary variables and enforce , , . Then the optimality gap of one particular relaxation procedure is , where denotes the optimal value of such relaxation. Here we take the absolute value, because our generated instances are not necessarily all maximization problems, and can also be negative.
In this section, we use the following acronyms to denote the optimality gap for each individual relaxation method:
-
LP: Optimality gap of the LP relaxation of the LPCC, where we simply ignore all the complementarity constraints.
-
B&C: When formulating the LPCC as a MIP, it denotes the optimality gap of the internal branch-and-cut procedure of CPLEX, where we only allow the branching to occur at the root node and turn off a list of generic-purpose cuts: disjunctive cuts, Gomory cuts, multi-commodity flow cuts, zero-half cuts, MIR cuts, lift-and-project cuts, and flow cover cuts. All the other problem-specific cuts, e.g., clique cuts, cover cuts, GUB cuts are kept.
-
ER-ee: Optimality gap of the edge-by-edge-based extended relaxation in (11).
-
ER-vc: Optimality gap of the vertex-cover-based extended relaxation .
-
ER-vc-cuts: Optimality gap of the relaxation obtained by adding some of the cutting-planes we introduced before (see Section 4.1 for details) to the vertex-cover-based extended relaxation .
In particular, by comparing columns ER-vc and ER-vc-cuts, one is able to see the strength of those added cuts. Here we should mention that, due to the lack of an efficient separation method for those cuts, to show how much they can further tighten the extended relaxation, when computing ER-vc-cuts we treated those cuts as additional linear constraints and added them altogether into the formulation of . Next, we introduce the specific cutting-planes from Section 3 that were added into extended relaxations to obtain ER-vc-cuts.
4.1 Cutting-planes for experiments
4.1.1 Stable set cuts
The first type of cuts comes from the stable set polytope of . In specific, we consider the following well-known inequalities for the stable set polytope:
-
1.
Clique constraints: where is a clique.
-
2.
Odd cycle constraints: where induces a chordless odd cycle.
-
3.
Odd anti-cycle constraints: where induces the complement of a chordless odd cycle.
See [29] and [25] for a detailed introduction to these families of cuts. By Section 5, all these inequalities are valid for , hence can be used as cutting-planes to strenghten . By Section 2, the corresponding inequalities involving and can also be added as cuts.
For a given graph , we used the Python package NetworkX to create the list of maximal cliques, odd cycles and odd anti-cycles.
4.1.2 Clique q-cuts
This type of cuts comes from Section 3: If clique is covered by a minimal subset of , then adding into remains to be an extended formulation of , so it can be added to tighten the linear system of . Such inequality comes from a clique of the conflict graph and it only involves -variables, hence we name it clique q-cut. Similarly, inequality can also be added into to tighten the linear relaxation.
4.1.3 BQP cuts
The last type of cuts we added comes from . As recently studied by Sripratak et al. [33], a few families of valid inequalities have been proposed. However, the odd-cycle inequalities are the only inequalities that can be facet-defining for , while all the other inequalities therein, e.g., rounded clique inequalities, rounded cut inequalities are actually valid for the linear relaxation given by the McCormick constraints. Due to the lack of a complete understanding of the polyhedral structure of , we only added odd-cycle inequalities with a particular size into our formulation. Specifically, we added the ones corresponding to a cycle with and the edge subset with in equation (24) in [28]. For any and , we obtain odd-cycle inequalities:
Similarly, by picking a cycle with and edge subset with , for any and , we obtain odd-cycle inequalities:
We mention that the number of inequalities of the above form is which is also . Without an efficient separation heuristic, adding these inequalities can be a great burden to the solver. Therefore, for this type of cuts, instead of adding all of them into the relaxation, we adopt the following iterative procedure: for each iteration and the optimal solution obtained at current step, we only add the BQP cuts that are able to separate , and then solve the new relaxation and obtain a new optimal solution for the next iteration. We terminate the iterations when the optimal value obtained in the current iteration is within a small distance from the optimal value in the last iteration, or when the iteration number exceeds a certain threshold (we pick 5 as the iteration upper bound for our later experiments).
4.2 Instance sets and experimental results
In the following, we describe three applications from which we generated instances for our numerical experiments. For the first two types of instances in Section 4.2.1 and Section 4.2.2, the corresponding conflict graphs were generated randomly according to the Erdős-Rényi model with respect to some pre-determined density , where each edge is included in the conflict graph with probability , independently from every other edge. This can be realized using function erdos_renyi_graph of Python package NetworkX. For each of these conflict graphs, the function min_weighted_vertex_cover of NetworkX will also produce an approximate minimum vertex cover, from which we produced the feasible cover partition to construct our extended formulation . For the third type of instances in Section 4.2.3, we specifically considered the LPCC with 1-regular conflict graph, which has been studied extensively in the literature.
4.2.1 Transportation problem with exclusionary side constraints
The first type of instances we considered are instances of the Transportation Problem with Exclusionary Side Constraints (TPESC), which was originally proposed by Cao [8] and later also studied by Sun [34], and by Syarif and Gen [35]. In this problem the goal is to transport goods from several sources to destinations at the lowest cost, while meeting all constraints on the supplies and demands. Due to some specific reasons, in this problem it is not allowed to carry certain goods to the same destination. For instance, hazardous materials may not be stored in the same warehouse. Denote the source-destination pairs , and the flow on arc is denoted by . If then is also denoted as . Here we assume that for any . Then TPESC can be modeled as a classical transportation problem with additional complementarity constraints:
(TPESC) |
We remark that (TPESC) is a minimization problem instead of a maximization problem as (LPCC). Here denotes the supplies, denotes the demands and denotes the transportation costs. We further assume that and , for any , since otherwise (TPESC) is infeasible. Let denote the set of conflicting pairs of which cannot transport goods to the same destination in . In other words, the conflict graph of (TPESC) is given by
For fixed source set and destination set , we randomly generated our instances in the following way: was chosen uniformly at random from for any , was chosen uniformly at random from for any , and was chosen uniformly at random from for any . In case supply exceeds demand, i.e., , then values were evenly reduced until the sums are balanced. We analogously treated the values in case demand exceeds supply, i.e., .
Notice that for TPESC, the number of variables in the extended relaxation is . For the ease of computation and illustration, we implemented our experiments using instances with relatively small sizes. In specific, we considered three problem sizes: ; and . For each problem size, we also considered various conflict graph densities, and 10 randomly generated instances were solved with respect to each fixed and conflict graph density . For each relaxations mentioned before, the averaged numerical results are recorded in Section 1.
LP | B&C | ER-ee | ER-vc | ER-vc-cuts | |
---|---|---|---|---|---|
(10, 10, 0.2) | 4.98 | 0.06 | 0.48 | 0.43 | 0.00 |
(10, 10, 0.4) | 11.35 | 0.10 | 3.03 | 2.14 | 0.00 |
(10, 10, 0.6) | 12.45 | 0.85 | 3.60 | 1.72 | 0.00 |
(30, 10, 0.04) | 3.33 | 0.17 | 0.18 | 0.11 | 0.00 |
(30, 10, 0.1) | 17.7 | 1.84 | 3.24 | 3.24 | 0.00 |
(30, 10, 0.2) | 28.95 | 8.22 | 12.57 | 11.43 | 0.67 |
(50, 5, 0.04) | 8.40 | 0.31 | 0.31 | 0.27 | 0.02 |
(50, 5, 0.08) | 15.68 | 2.16 | 3.58 | 3.58 | 0.00 |
(50, 5, 0.12) | 20.99 | 5.85 | 8.01 | 8.01 | 2.86 |
The first thing that one might notice is that the optimality gaps of almost all relaxations increase when the conflict graph becomes denser. Also, as shown by the smaller values in column ER-vc than those in ER-ee, we know that the vertex-cover-based formulation is generally a tighter relaxation than the edge-by-edge formulation . This observation justifies our statement at the end of Section 2.1. Moreover, even though in most of the testing results, the extended relaxation itself alone does not seem to provide better optimality gap than the relaxation of BC, but adding cutting-planes into the extended relaxation is able to provide a huge improvement for closing the optimality gap. This phenomenon will be further verified by the following experiments.
4.2.2 Continuous multi-dimensional knapsack problem with conflicts
The second type of instances that we considered comes from the Continuous Multi-dimensional Knapsack Problem with Conflicts (CMKPC):
(CMKPC) |
Here and .
The special case of CMKPC where there is only a single knapsack constraint and the conflict graph is given by the union of some disjoint cliques, was first investigated by Ibaraki et al. [22, 23]. Later, de Farias et al. [11] studied inequalities that define facets of the convex hull of its feasible set. Later, Hifi and Michrafy [18], Pferschy and Schauer [30], Luiz et al. [26] dealt with the knapsack problem with general conflict graph, but with binary variables.
Within the implementation of the experiments over CMKPC, we specifically considered three problem sizes: ; and . For each problem size we randomly generated conflict graph with respect to various graph densities. Then for each problem size and graph density, we conducted numerical experiments over 10 randomly generated instances, where we adopted the same setup as in [17]: the objective coefficients and row coefficients were generated uniformly at random in the interval , and the right hand side coefficients were determined by , which comes from de Farias and Nemhauser [13]. We report the averaged numerical results of those 10 experiments in Section 2.
LP | B&C | ER-ee | ER-vc | ER-vc-cuts | |
---|---|---|---|---|---|
(20, 5, 0.05) | 2.05 | 0.23 | 0.01 | 0.01 | 0.00 |
(20, 5, 0.1) | 4.89 | 0.69 | 0.18 | 0.15 | 0.00 |
(20, 5, 0.35) | 17.82 | 1.89 | 6.83 | 5.18 | 0.00 |
(20, 5, 0.6) | 57.35 | 0.65 | 41.61 | 29.27 | 0.00 |
(60, 4, 0.05) | 4.37 | 0.23 | 0.26 | 0.23 | 0.00 |
(60, 4, 0.1) | 10.37 | 0.38 | 0.82 | 0.79 | 0.02 |
(60, 4, 0.15) | 25.90 | 5.49 | 11.96 | 11.96 | 0.76 |
(60, 4, 0.2) | 41.90 | 11.68 | 26.51 | 25.60 | 1.78 |
(60, 4, 0.35) | 102.17 | 15.72 | 79.01 | 77.78 | 3.73 |
(60, 4, 0.6) | 220.51 | 21.21 | 187.36 | 161.09 | 3.90 |
(100, 2, 0.05) | 13.68 | 0.18 | 0.91 | 0.91 | 0.00 |
(100, 2, 0.1) | 29.24 | 6.29 | 10.99 | 10.99 | 1.07 |
(100, 2, 0.15) | 54.78 | 20.57 | 40.58 | 40.57 | 8.14 |
(100, 2, 0.2) | 93.45 | 22.76 | 70.12 | 69.90 | 9.52 |
The numerical results in Section 2 further illustrate the great performance of our proposed extended relaxation when enhanced with cutting-planes. One can also see that, when the conflict graph is sparse, the extended relaxation from either the edge-by-edge formulation or the vertex-cover-based formulation can actually provide a decent approximation value for the corresponding LPCC. However, when the conflict graph becomes denser, those additional cutting-planes are able to dramatically further close the optimality gap.
4.2.3 LPCC with 1-regular conflict graph
For the last type of instances, we considered the special case of LPCC with 1-regular conflict graph, which is the problem studied in Sect. 4.2 of [27]:
(1R) |
Here , , , , , .
We generated 25 instances of (1R) for each set of problem size using the same setup as in [27] (Sect. 4.2). In detail:
-
1.
The entries of vectors are integers generated uniformly at random between -15 and 5;
-
2.
The entries of and are integers generated uniformly at random between -20 and 30;
-
3.
The entries of are obtained by generating integers uniformly at random between -10 and 10, and then by computing ;
-
4.
The entries of are obtained by generating reals uniformly at random between 0 and 1, and then by computing .
Unlike in [27], where the authors only considered problem size , here we also considered another two sets of problem size: and .
For LPCC with 1-regular conflict graph, when constructing the vertex-cover-based extended relaxation, we chose as the vertex cover, which are the set of indices correspond to the -components. It is not hard to observe that, in this case, the edge-by-edge extended relaxation (11) coincides with such vertex-cover-based extended relaxation. Therefore, we do not report results of ER-ee. Furthermore, when the conflict graph is 1-regular, it will not contain any odd cycle, odd anti-cycle, or clique with size larger than 2, so for ER-vc-cuts, the cutting-planes we added into only came from the BQP cuts in Section 4.1.3. We report the detailed results in Section 3.
LP | B&C | ER-vc | ER-vc-cuts | |
(6, 10, 10) | 30.41 | 16.27 | 0.83 | 0.70 |
(20, 10, 5) | 13.64 | 3.36 | 0.29 | 0.28 |
(20, 20, 20) | 322.87 | 98.29 | 0.60 | 0.46 |
As we have argued in Section 2.2, for LPCC with 1-regular conflict graph, our proposed extended relaxation coincides with the ERLT relaxation in [27]. For this class of instances, the above Section 3 demonstrates the great performance of such extended relaxation, which confirms that ERLT relaxation can be significantly stronger than those available in literature, as remarked in [27]. Notice that when the conflict graph is 1-regular, the density of the edges is simply , which means that 1-regular conflict graphs are quite sparse. As we have also observed in Section 4.2.2, our extended relaxation can generally provide much better results when the conflict graph is sparse. Therefore, in some sense, this justifies the great performance of ERLT for this type of problems. Moreover, the last column of ER-vc-cuts shows that, despite the great performance of ERLT relaxation as shown in column ER-vc, additional BQP cuts can still further close the optimality gaps.
5 Conclusion
In this paper, we studied linear relaxations in an extended space for linear programs with general complementarity constraints, which generalizes the recent convexification technique called ERLT developed by Nguyen et al. [27]. We then proposed a few classes of cutting-planes to further strengthen the linear relaxation. We presented numerical experiments that showcase the significant improvement obtained from the addition of those cuts. To facilitate the future practical uses, one interesting future direction is the study of efficient separation algorithms for those cuts in the extended space. We believe that this paper provides a new perspective for developing branch-and-cut approaches for solving LPCCs with general conflict graph.
References
- [1] Agostinho Agra, Mahdi Doostmohammadi, and Cid C. de Souza. Valid inequalities for a single constrained 0-1 MIP set intersected with a conflict graph. Discrete Optim., 21:42–70, 2016.
- [2] Alper Atamtürk, George L. Nemhauser, and Martin W. P. Savelsbergh. Conflict graphs in solving integer programming problems. European J. Oper. Res., 121(1):40–55, 2000.
- [3] Alper Atamtürk, George L. Nemhauser, and Martin W. P. Savelsbergh. The mixed vertex packing problem. Math. Program., 89(1, Ser. A):35–53, 2000.
- [4] Egon Balas. Intersection cuts—a new type of cutting planes for integer programming. Operations Res., 19:19–39, 1971.
- [5] Egon Balas. Disjunctive programming and a hierarchy of relaxations for discrete optimization problems. SIAM J. Algebraic Discrete Methods, 6(3):466–486, 1985.
- [6] Egon Balas. Disjunctive programming: properties of the convex hull of feasible points. Discrete Appl. Math., 89(1-3):3–44, 1998.
- [7] Evelyn Martin Lansdowne Beale and John A Tomlin. Special facilities in a general mathematical programming system for non-convex problems using ordered sets of variables. OR, 69(447-454):99, 1970.
- [8] B. Cao. Transportation problem with nonlinear side constraints: a branch and bound approach. Z. Oper. Res., 36(2):185–197, 1992.
- [9] M. Conforti, G. Cornuejols, and G. Zambelli. Integer Programming. Springer Publishing Company, Incorporated, 2014.
- [10] IR de Farias, Ellis L Johnson, and George L Nemhauser. Branch-and-cut for combinatorial optimization problems without auxiliary binary variables. The Knowledge Engineering Review, 16(1):25–39, 2001.
- [11] IR de Farias, Ellis L Johnson, and George L Nemhauser. Facets of the complementarity knapsack polytope. Mathematics of Operations Research, 27(1):210–226, 2002.
- [12] IR de Farias, Ernee Kozyreff, and Ming Zhao. Branch-and-cut for complementarity-constrained optimization. Mathematical Programming Computation, 6(4):365–403, 2014.
- [13] IR de Farias and George L Nemhauser. A polyhedral study of the cardinality constrained knapsack problem. Math. Program., 96(3, Ser. A):439–467, 2003.
- [14] Alberto Del Pia, Jeff Linderoth, and Haoran Zhu. New classes of facets for complementarity knapsack problems. arXiv preprint arXiv:2203.02873, 2022.
- [15] Michel Deza and Mathieu Dutour Sikirić. Enumeration of the facets of cut polytopes over some highly symmetric graphs. Int. Trans. Oper. Res., 23(5):853–860, 2016.
- [16] Michael C Ferris and Jong-Shi Pang. Engineering and economic applications of complementarity problems. Siam Review, 39(4):669–713, 1997.
- [17] Tobias Fischer and Marc E. Pfetsch. Branch-and-cut for linear programs with overlapping SOS1 constraints. Math. Program. Comput., 10(1):33–68, 2018.
- [18] Mhand Hifi and Mustapha Michrafy. Reduction strategies and exact algorithms for the disjunctively constrained knapsack problem. Computers & operations research, 34(9):2657–2673, 2007.
- [19] Jing Hu, John E. Mitchell, Jong-Shi Pang, Kristin P. Bennett, and Gautam Kunapuli. On the global solution of linear programs with linear complementarity constraints. SIAM J. Optim., 19(1):445–471, 2008.
- [20] Jing Hu, John E. Mitchell, Jong-Shi Pang, and Bin Yu. On linear programs with linear complementarity constraints. J. Global Optim., 53(1):29–51, 2012.
- [21] Toshihide Ibaraki. The use of cuts in complementary programming. Operations Research, 21(1):353–359, 1973.
- [22] Toshihide Ibaraki. Approximate algorithms for the multiple-choice continuous knapsack problems. J. Oper. Res. Soc. Japan, 23(1):28–63, 1980.
- [23] Toshihide Ibaraki, Toshiharu Hasegawa, Katsumi Teranaka, and Jiro Iwase. The multiple-choice knapsack problem. Journal of the Operations Research Society of Japan, 21(1):59–95, 1978.
- [24] Robert G Jeroslow. Cutting-planes for complementarity constraints. SIAM Journal on Control and Optimization, 16(1):56–62, 1978.
- [25] László Lovász. Semidefinite programs and combinatorial optimization. In Recent advances in algorithms and combinatorics, pages 137–194. Springer, 2003.
- [26] Thiago Alcântara Luiz, Haroldo Gambini Santos, and Eduardo Uchoa. Cover by disjoint cliques cuts for the knapsack problem with conflicting items. Oper. Res. Lett., 49(6):844–850, 2021.
- [27] Trang T. Nguyen, Jean-Philippe P. Richard, and Mohit Tawarmalani. Convexification techniques for linear complementarity constraints. J. Global Optim., 80(2):249–286, 2021.
- [28] Manfred Padberg. The Boolean quadric polytope: some characteristics, facets and relatives. Math. Programming, 45(1, (Ser. B)):139–172, 1989.
- [29] Manfred W. Padberg. On the facial structure of set packing polyhedra. Math. Programming, 5:199–215, 1973.
- [30] Ulrich Pferschy and Joachim Schauer. The knapsack problem with conflict graphs. J. Graph Algorithms Appl., 13(2):233–249, 2009.
- [31] H. D. Sherali, R. S. Krishnamurthy, and F. A. Al-Khayyal. Enhanced intersection cutting-plane approach for linear complementarity problems. J. Optim. Theory Appl., 90(1):183–201, 1996.
- [32] Hanif D. Sherali and Warren P. Adams. A hierarchy of relaxations between the continuous and convex hull representations for zero-one programming problems. SIAM J. Discrete Math., 3(3):411–430, 1990.
- [33] Piyashat Sripratak, Abraham P Punnen, and Tamon Stephen. The bipartite boolean quadric polytope. Discrete Optimization, page 100657, 2021.
- [34] Minghe Sun. A tabu search heuristic procedure for solving the transportation problem with exclusionary side constraints. Journal of Heuristics, 3(4):305–326, 1998.
- [35] Admi Syarif and Mitsuo Gen. Solving exclusionary side constrained transportation problem by using a hybrid spanning tree-based genetic algorithm. Journal of Intelligent Manufacturing, 14(3):389–399, 2003.