<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">An Infinitesimal Approach for Analysis of Convex Optimization Problem with Duality Gap</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Sergey</forename><surname>Trofimov</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Aleksey</forename><surname>Ivanov</surname></persName>
						</author>
						<author role="corresp">
							<persName><forename type="first">Yury</forename><surname>Fettser</surname></persName>
							<email>fettsery@gmail.com</email>
						</author>
						<author>
							<persName><forename type="first">Yu</forename><forename type="middle">G</forename><surname>Evtushenko</surname></persName>
						</author>
						<author>
							<persName><forename type="first">M</forename><forename type="middle">Yu</forename><surname>Khachay</surname></persName>
						</author>
						<author>
							<persName><forename type="first">O</forename><forename type="middle">V</forename><surname>Khamisov</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Yu</forename><forename type="middle">A</forename><surname>Kochetov</surname></persName>
						</author>
						<author>
							<persName><forename type="first">V</forename><forename type="middle">U</forename><surname>Malkova</surname></persName>
						</author>
						<author>
							<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Posypkin</surname></persName>
						</author>
						<author>
							<affiliation key="aff0">
								<orgName type="institution">Ural Federal University</orgName>
								<address>
									<addrLine>19, Mira Str</addrLine>
									<postCode>620002</postCode>
									<settlement>Ekaterinburg</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<orgName type="institution">Ural Federal University</orgName>
								<address>
									<addrLine>19, Mira Str</addrLine>
									<postCode>620002</postCode>
									<settlement>Ekaterinburg</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="institution">Ural Federal University</orgName>
								<address>
									<addrLine>19, Mira Str</addrLine>
									<postCode>620002</postCode>
									<settlement>Ekaterinburg</settlement>
									<country key="RU">Russia</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">An Infinitesimal Approach for Analysis of Convex Optimization Problem with Duality Gap</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">70E2ED141D694AD0AACCDFFB384BCA3D</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-19T17:47+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>We consider the problem of finding target vectors for which the nonzero duality gap exists in the problem of convex optimization. An infinitesimal approach to the duality gap analysis of convex problems is proposed. The approach is based on finding the order of smallness and the proportionality coefficient of perturbation function of the original optimization problem. We show that in case of duality gap this order is smaller than one for zero duality gap. An example of using the approach is given.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Consider a primal-dual pair of convex optimization problems of the form</p><formula xml:id="formula_0">(P 0 ) v = inf {(c, x) : g(x) 0},<label>(1)</label></formula><formula xml:id="formula_1">(P * 0 ) v * = sup u 0 inf x {(c, x) + ug(x)},<label>(2)</label></formula><p>where c, x ∈ R n , g : R n → R is a convex function, (•, •) denotes the dot product of two vectors, v, v * denote the optimal values of the primal (P 0 ) and dual problems (P * 0 ), respectively. A duality gap plays an important role both in theoretical and numerical analysis of the problems (P 0 ), (P * 0 ). The duality gap is determined by the following formula:</p><formula xml:id="formula_2">δ = v − v * 0.</formula><p>Two cases are distinguished: a zero duality gap(δ = 0) and a nonzero duality gap(δ &gt; 0). Traditionally, results are formulated under the assumption that the duality gap is zero. However, it is known that the zero duality gap is satisfied only for limited class of optimization problems, for example, satisfying the Slater condition, and in general the duality gap may turn out to be nonzero. Theoretical approaches to the characterization of duality gap in convex programming are discussed in articles <ref type="bibr" target="#b0">[Chames, 1962]</ref>, <ref type="bibr" target="#b1">[Champion, 2004]</ref>, <ref type="bibr" target="#b2">[Ban, 2009]</ref>, <ref type="bibr" target="#b2">[Borwein, 2014]</ref>. It is important to note that the analysis of duality gap in practice with these approaches may be difficult due to the nontriviality of the corresponding characterizations. This circumstance requires new approaches for duality gap analysis in optimization problems.</p><p>The aim of this paper is to propose an approach to finding the set of target vectors c with the nonzero duality gap between (P 0 ) and (P * 0 ). We denote this set as</p><formula xml:id="formula_3">DG = {c ∈ R n : δ &gt; 0}.</formula><p>A theoretical approach to problem solving was presented in the previous work <ref type="bibr" target="#b7">[Trofimov, 1992]</ref>. In this approach, a convex set is constructed for an arbitrary point x 0 from the feasible set of problem (P 0 )</p><formula xml:id="formula_4">T 1 (x) = lim n→∞ ∂ 1 (n • g(x)),</formula><p>where ∂ ε f (x 0 ) denotes epsilon-subdifferential of the f at x 0 .</p><p>Recall <ref type="bibr" target="#b8">[Rockafellar, 1972]</ref> that the gauge γ(•|T ) of set T is defined by</p><formula xml:id="formula_5">γ(x|T ) = inf{µ &gt; 0|µ −1 • x ∈ T }.</formula><p>Then by <ref type="bibr">[Trofimov, 1992, Theorem</ref></p><formula xml:id="formula_6">, Corollary 1] v = (c, x 0 ) − γ(c| − clT 1 (x 0 )), v * = (c, x 0 ) − γ(c| − T 1 (x 0 ))</formula><p>and consequently</p><formula xml:id="formula_7">DG = {c : γ(c| − T 1 (x 0 )) − γ(c| − clT 1 (x 0 )) &gt; 0}.</formula><p>Thus, the set DG of target vectors with nonzero duality gap characterizes the closure property of the surface of some convex set T 1 . At the same time, the vectors c ∈ DG correspond to points from the non-closed part of the boundary T 1 . Applying the described approach for finding the set DG is difficult because the procedure for finding the set T 1 is nontrivial.</p><p>Note that the situation is similar for a semi-infinite linear programming problem (SILP). SILP is linear optimization problem in which either the dimension of the decision space or the number of constraints (but not both) is infinite. In particular, SILP deals with problem of the form:</p><formula xml:id="formula_8">(L) v = inf{(c, x) : (a α , x) ≤ b α , ∀α ∈ Ω}, where Ω is an infinite index set, c ∈ R n , a α ∈ R n , b α ∈ R.</formula><p>The model (L) naturally arises in an abundant number of applications in different fields of mathematics and engineering <ref type="bibr" target="#b3">[Goberna, 2002]</ref>. It is known that convex problem can be reformulated as SILP.In SILP the duality gap is characterized by the nonclosed boundary of the conic hull K = cone{[a α ; b α ], [0 n ; 1] : α ∈ Ω} of the coefficients of the semi-infinite constraint system. The sets T 1 and K have similar properties: they allow us to find the optimal values of v and v * , determine the attainability of these values and in some cases find optimal solutions for dual problems. However, the convex and possibly nonclosed cone K ⊂ R n+1 in SILP corresponds to the set T 1 ⊂ R n . The set DG may have a complex structure: the DG is not convex or closed, and there may be very many target vectors with nonzero duality gap. In <ref type="bibr" target="#b5">[Astaf'ev, 2017]</ref>, an example is given where the dimension of the relative interior of DG is only one less than the number of variables (n).</p><p>On the other hand, it is well known that the existence of duality gap is closely related to the study of the ε-perturbed problems (P ε ) given by</p><formula xml:id="formula_9">(P ε ) v(ε) = inf {(c, x) : g(x) ε} ,</formula><p>where ε is a positive parameter, v(ε) denotes perturbation function of problem (P 0 ). The existence of nonzero duality gap is equivalent to the fact that v(ε) is not lower semi-continuous at the origin <ref type="bibr" target="#b6">[Rockafellar, 1970]</ref>.</p><p>In this work, we propose a new approach for finding the set DG, which is based on an infinitesimal analysis of the perturbation function v(ε). The approach presupposes finding the order of smallness and the proportionality coefficient of an infinitely small quantity (ISQ), which represents the difference between the perturbation function v(ε) and the optimal value v = v(0) of the original problem (P 0 ).</p><p>The optimal value of the dual problem and the duality gap are determined by the limit of the optimal values of the ε-perturbed primal problem. It is clear that the ε-perturbed constraints lead to an extension of the feasible set of the primal problem. The degree of expansion of the feasible set can be study in several ways: by a given target direction c (point approach) and by the shift value of the supporting plane v = (c, x) (integral approach). We consider the second method, which leads to the optimal value of the dual problem. This method generates infinitesimals. As a rule, ISQs have the integer orders of smallness, i.e. have the corresponding integer derivatives. In some cases, infinitesimals appear in which the exponents of the power series form arithmetic progression. We propose a method for study the duality gap, in which the ISQ with the highest monomial with a fractional exponent appears.</p><p>We also apply the method to study the quality of a geometric domain, considered as the feasible set F of problem (P 0 ). The quality of the geometric domain is determined by the existence of duality gap on certain target directions c. If the geometric domain is unbounded, then we are dealing with the classical problem of convex nonlinear programming with duality gap. In the case of boundedness of the geometric domain, we propose to determine the quality by the order of smallness of the perturbation function v(ε) for small perturbations ε. If the orders of smallness for all directions are the same, the geometric domain quality is good. Thus, the duality gap is generalized from the case of an unbounded feasible set to the case of a bounded feasible set. In the paper, we apply the method for study the quality of the geometric domain</p><formula xml:id="formula_10">F = {x ∈ R 2 : −x 1 + √ x 2 1 + x 2 2 0}.</formula><p>The paper is organized as follows. In Section 2 we introduce the notion of log-image and define an analytical representation of the log-image. Section 3 is devoted to an exposition of the method of finding the ISQ characteristics using the asymptotic properties of the logarithm of given function. In Section 4 we present an algorithm for computing the above ISQ characteristics. The algorithm is based on the procedure of identifying the asymptote coefficients of the ISQ logarithmic characteristic. The algorithm uses processing of points of the logarithmic characteristic with a sliding window and subsequent clustering. The main result on the connection between the duality gap and ISQ characteristics (theorem 2) is given in Section 5. In Section 6 the proposed approach is applied for numerical example. We end the paper with conclusions and an outlook on future work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Analytical Representation of Log-Images</head><p>Let us remind that the function f (x) is called infinitely small quantity or infinitesimal as</p><formula xml:id="formula_11">x → +0 if lim x→0 f (x) = 0.</formula><p>For a given infinitesimal y = f (x), we call function g(x) the log-image (name by analogy, for example, with Laplace image): ỹ = g(x), where x = lg x, ỹ = lg |y|.</p><p>Note the following simple properties of log-images:</p><formula xml:id="formula_12">i) Cg 1 (x) ↔ f 1 (x) C , C = const. ii) C + g 1 (x) ↔ 10 C f 1 (x), C = const. iii) g 1 (x) + g 2 (x) ↔ f 1 (x)f 2 (x). iiii) g 1 (x)g 2 (x) ↔ f 2 (x) lg f1(x) = f 1 (x) lg f2(x) .</formula><p>The property i) follows from obvious relation</p><formula xml:id="formula_13">Cg 1 (x) = Clg f 1 (x) = lgf 1 (x) C .</formula><p>Properties ii)-iiii) are proved similarly. Note that the operations of the sum and the product of log-images are commutative.</p><p>Thus, the arithmetic operations on the ISQ log-images correspond to certain operations on the ISQ originals.</p><p>The log-image is the main tool in our approach to find ISQ characteristics. Later we will show that the log-image can be constructed numerically using a table-defined function. In this case, the use of numerical logimage for finding ISQ characteristics can lead to significant errors. We show that the log-image can be obtained analytically. This makes it possible to avoid numerical errors in determining ISQ characteristics.</p><p>Let φ(x) be a continuous monotone function defined on the set X ∈ R with the range</p><formula xml:id="formula_14">Y ∈ R. It has the inverse function φ −1 , i. e. φ ( φ −1 (x) ) = ( φ • φ −1 ) (x) = x for every x ∈ X.</formula><p>We take an arbitrary function f (x) : X → X and for f (x) construct a functional Φ(f ) as follows:</p><formula xml:id="formula_15">g = Φ(f ), if g = φ • f • φ −1 .</formula><p>(3)</p><p>The function g is defined on the set Y with the range Y . From definition (3) it follows that f = φ −1 • g • φ. Take for the function φ(x) the decimal logarithm: φ(x) = lg x. Then</p><formula xml:id="formula_16">φ −1 (x) = 10 x , X = R + = {x : x &gt; 0} , Y = R.</formula><p>Suppose that the function g(x) is a log-image of the function f (x). Then for all x ∈ X we have lg f</p><formula xml:id="formula_17">(x) = g (lg x), Φ • f = g • φ.</formula><p>Hence, we obtain an analytic representation of the log-image g of the function f :</p><formula xml:id="formula_18">g = φ • f • φ −1 = Φ(f ), g (x) = lg f ( 10 x)</formula><p>.</p><p>(4)</p><p>For the original f (x), we similarly obtain</p><formula xml:id="formula_19">f = φ −1 • g • φ = Φ −1 (g), f (x) = 10 g(lg (x)) .</formula><p>Applying (4), one can obtain ISQs with infinitely small and infinitely large order of smallness. An example of ISQ with infinitely small order of smallness is the function:</p><formula xml:id="formula_20">f (x) = 10 − √ −lg x , 0 &lt; x &lt; 1, g(x) = − √ −x, x &lt; 0.</formula><p>An example of ISQ with infinitely large order of smallness is the function:</p><formula xml:id="formula_21">f (x) = 10 −lg 2 x , 0 &lt; x &lt; 1, g(x) = −x 2 , x &lt; 0.</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Asymptotic Method for Determining the Characteristics of Infinitesimals</head><p>Recall that an order of smallness of ISQ is a minimal positive number p (if it exists) for which there exists a finite limit</p><formula xml:id="formula_22">b = lim x→0 f (x) x p , b ̸ = 0.</formula><p>(5) Definition (5) does not provide a constructive way of finding p, since p is not known in advance. We give a numerical method for calculation the order of smallness.</p><p>Without loss of generality, we assume that the ISQ f (x) &gt; 0 for x &gt; 0.</p><p>Suppose that the ISQ log-image ỹ = g(x) has a slant asymptote ỹ = a + kx, (</p><p>where a and k are asymptote coefficients.</p><p>It is known that these coefficients are determined by the formulas</p><formula xml:id="formula_24">a = lim x→−∞ [g(x) − kx], (7) k = lim x→−∞ g(x) x , (<label>8</label></formula><formula xml:id="formula_25">)</formula><p>if these limits exist.</p><p>The following theorem is valid Theorem 1 <ref type="bibr">([Trofimov, 2015, p. 14]</ref>). ISQ f (x) has the order of smallness p if and only if the ISQ log-image has a left slant asymptote ỹ = a + kx, where a and k are asymptote coefficients, wherein p = k, a = lg b.</p><p>Proof. The theorem follows from the representation of the ISQ f (x) in the form</p><formula xml:id="formula_26">f (x) ≈ Cx p + o(x p ). Then lg f (x) ≈ lg C + plg x,</formula><p>or making the substitution x = lg x, ỹ = lg f (x), a = lg C, k = p, we obtain ỹ ≈ a + kx.</p><p>It follows from Theorem 1 that ISQ characteristics can be found from the analytical formulas ( <ref type="formula">7</ref>)-( <ref type="formula" target="#formula_24">8</ref>) if the function g is given analytically(see ( <ref type="formula">4</ref>)).</p><p>The main disadvantage of the asymptotic method is that it is necessary to analytically calculate the limits ( <ref type="formula">7</ref>)-( <ref type="formula" target="#formula_24">8</ref>) for finding ISQ characteristics. In the next section, we will consider a numerical method for identifying the coefficients of the logarithmic asymptote (6).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Clustering Method for Finding Characteristics of Infinitesimals</head><p>As follows from Theorem 1, the order of smallness and the proportionality coefficient of the ISQ are determined by the parameters k and a of the asymptote (6) of the ISQ log-image. The linear nature of the dependence ỹ(x) allows us to reduce the problem of finding the parameters k and a to estimate the linear regression parameters. To solve the latter problem, the ordinary least squares method (OLS) can be used. The classical version of OLS reduces to the solution of a certain system of linear algebraic equations ( ( X, 1) m ( X, X) ( X, 1)</p><formula xml:id="formula_27">) ( a k ) = ( ( Ỹ , 1) ( X, Ỹ ) ) , (<label>9</label></formula><formula xml:id="formula_28">)</formula><p>where m denotes the number of variable values pairs (x i , ỹi ), i = 1, 2, . . . , m, X = (x 1 , x2 , . . . , xm ), Ỹ = (ỹ 1 , ỹ2 , . . . , ỹm ). However, applying the OLS method to a real data set ( X, Ỹ ) can lead to significant errors in the estimates of a and k. First of all, this is due to the errors in setting the initial ISQ, and hence the ISQ log-image. In our case, the errors arise in the numerical solution of ε-perturbed problems P ε , i.e. when the perturbation function v(ε) is calculated. In connection with this, it is required to develop other methods of reliable determination of the coefficients a and k.</p><p>In this section, we propose an approach to constructing a numerical method that approximately finds the coefficients a and k of the logarithmic asymptote (6). This approach consists of two steps. The first step is to divide points of the logarithmic characteristic with windows of predefined size and calculate linear approximations of a and k on each window. The second step is to cluster result approximations {a, k} with k-means clustering method. As estimates of a and k we take the centers of these clusters.</p><p>The outline of the algorithm can be summarized as follows Algorithm 1 Clustering Algorithm for Finding Characteristics of Infinitesimals</p><formula xml:id="formula_29">1: procedure Clustering(X, Y , w) Input : A sequence of n numbers X = [x 1 , . . . , x n ]; A sequence of n numbers Y = [y 1 , . .</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>. , y n ];</head><p>A value w is slice window width; Output :</p><p>A coefficient of proportionality b; An order of smallness p; Initialization</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>2:</head><p>Let n is the number elements of input array X  Ỹi ← (ỹ i , ỹi+1 , . . . , ỹi+w−1 ) 12:</p><formula xml:id="formula_30">for i ← 1, n do 5: X[i] ← lg X[i] 6: Ỹ [i] ← lg Y [i]</formula><formula xml:id="formula_31">(a i , k i ) ← OLS( Xi , Ỹi )</formula><p>◃ Call Ordinary Least Square Procedure return (b, p) ◃ The Characteristics of Infinitesimal 19: end procedure When we have two clusters it means that the logarithmic characteristics has two asymptotes: the main and secondary. So that the next order of smallness comes out. For example, for infinitesimal y(x) = 1 2 x</p><formula xml:id="formula_32">1 3 + 1 2 x 1 2</formula><p>method finds a ≈ −0.25 and k ≈ 0.34. So b ≈ 0.55 and p ≈ 0.34.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Connection Between the Duality Gap and Infinitesimals</head><p>We now formulate a theorem relating the duality gap to the order of smallness of the perturbation function v(ε) of the convex problem. Further, without loss of generality, we assume that v = v(0) = 0. Denote primal problem (P 0 ) with the target vector c m by P 0,m and the dual problem (P * 0 ) with the target vector c m by P * 0,m Consider the sequence of target vectors {c m }, for which the duality relation v m = Inf(P 0,m ) = Sup(P * 0,m ) = v * m holds, i.e. c m / ∈ DG. For example, we can take c m from the relative interior of the cone T 1 <ref type="bibr">[Trofimov, 1992, Corollary 3]</ref>. We denote by p m and b m the order of smallness and the coefficient of proportionality of the perturbed function of (P 0,m ) with the target vector c m .</p><p>Let p and b be analogous parameters of the perturbed function v(ε) of (P 0 ) for the target vector c with nonzero duality gap. The following theorem is valid Theorem 2. Let {c m } → c ∈ DG. Suppose that the duality relation holds for the vectors {c m }. Suppose also that for every m dual problems (P 0,m ) and (P * 0,m ) with target vector c m have unique solutions. Then starting with a certain number, the sequence {p m } is constant and equal to 1, and the sequence {b m } → +∞ and p = 0.</p><p>Proof. <ref type="bibr">By [Rockafellar, 1972, Theorem 29</ref>.1], we have u</p><formula xml:id="formula_33">* m = −v ′ m (ε) | ε=0 . Hence v m (ε) = v m (0) − u m (ε) * • ε + o(ε). (10) and, consequently p m = 1. Since c ∈ DG, then 0 = v(0) &gt; v * (0). Hence v(ε) is not ISQ, since lim ε→0 v(ε) = v * (0) &lt; v(0) = 0,<label>(11)</label></formula><p>and, consequently p = 0. Since</p><formula xml:id="formula_34">lim ε→0 v(ε) ε 0 = lim ε→0 v(ε) = v * , then b = v * ̸ = 0.</formula><p>Since the perturbation function v c (ε) is continuous with respect to the vector c for any ε 0, then we have</p><formula xml:id="formula_35">lim m→∞ v m (ε) = v(ε) (12)</formula><p>and lim</p><formula xml:id="formula_36">m→∞ v m (0) = v(0). (<label>13</label></formula><formula xml:id="formula_37">)</formula><p>It follows from ( <ref type="formula">10</ref>), ( <ref type="formula">12</ref>), ( <ref type="formula" target="#formula_36">13</ref>), ( <ref type="formula" target="#formula_33">11</ref>) that ∀ε &gt; 0</p><formula xml:id="formula_38">lim m→∞ u * m (ε) • ε = ε • lim m→∞ u * m (ε) = −v(ε) &gt; 0.</formula><p>Then we have</p><formula xml:id="formula_39">lim m→∞ u * m (ε) = − v(ε) ε &gt; 0.</formula><p>and consequently lim </p><formula xml:id="formula_40">b m = lim m→∞ [ lim ε→0 u * m (ε) ] = lim ε→0 [ lim m→∞ u * m (ε) ] = +∞.</formula><p>Theorem 2 allows us to construct a numerical algorithm for finding the target vectors c, for which a nonzero duality gap exists in the convex optimization problem.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Numerical Example</head><p>Consider the following convex optimization problem</p><formula xml:id="formula_41">f (x 1 , x 2 ) = c 1 x 1 + c 2 x 2 → min subject to g(x 1 , x 2 ) = −x 1 + √ x 2 1 + x 2 2 0.</formula><p>Problem with similar constraint is considered in the papers <ref type="bibr" target="#b10">[Karney, 1982]</ref>, <ref type="bibr" target="#b1">[Champion, 2004]</ref>.</p><p>The feasible set of the unperturbed problem is a ray F = {x : x = (t, 0), t 0} .</p><p>For the target vectors c 1 = (1, 1), c 2 = (0, ±1) and c 3 = (−1, −1), we have the following duality relations:</p><formula xml:id="formula_42">v c 1 = v * c 1 = 0; v c 2 = 0, v * c 2 = −∞; v c 3 = −∞, v * c 3 = − ∞.</formula><p>Along with this problem, we consider the ε-perturbed problem for ε &gt; 0</p><formula xml:id="formula_43">f (x 1 , x 2 ) = c 1 x 1 + c 2 x 2 → min (= v(ε)) subject to g(x 1 , x 2 ) = −x 1 + √ x 2 1 + x 2 2 ε,</formula><p>and additional constraints that ensure the compactness of feasible set</p><p>x 1 5, x 2 5.</p><p>It is known that optimal value v(ε) is finite for convex optimization problem with bounded feasible set. Then <ref type="bibr">[Eremin, 1976, p. 100]</ref>  For the case of the classical duality gap (the vector c 2 ), we obtain p = 0.5. Thus, the difference in the order of smallness of the perturbation function for different target directions is directly related to the duality gap and the quality of the constraints of a compact feasible set.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>1 . . . n] and Ỹ [1 . . . n] be new arrays 574 4:</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head></head><label></label><figDesc>Set of Points {a, k} Main 9: for i ← 1, n − w + 1 do 10: Xi ← (x i , xi+1 , . . . , xi+w−1 ) 11:</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head></head><label></label><figDesc>solutions x * m and u * m are unique, the gradient ∇g(x * ) exists, unique and continuous with respect to ε. The continuity of the function u * m (ε) with respect to m and ε follows from c m = u * m (ε) • ∇g(x * m ). As a consequence, transposition of limits is possible lim m→∞</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head></head><label></label><figDesc>lim ε→0 v(ε) exists andv * = lim ε→0 v(ε).Thus, strong duality holds for the perturbed problem. The characteristics of the infinitesimal v(ε) for each of the target vectors c 1 , c 2 and c 3 are as follows:p c 1 = 1, p c 2 = 0.5, p c 3 = 0. b c 1 ≈ −0.71, b c 2 ≈ −3.16, b c 3 ≈ −5.00.</figDesc></figure>
		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Conclusions and Future Work</head><p>In this paper we considered the problem of finding the set DG of target vectors with duality gap in convex problem. We proposed the approach for finding set DG, based on an infinitesimal analysis of the perturbation function v(ε). The approach presupposes finding the order of smallness of an infinitely small quantity, which represents the difference between the perturbation function v(ε) and the optimal value v = v(0) of the original problem. We proposed the algorithm for computing the above ISQ characteristics. The algorithm is based on the procedure of identifying the asymptote coefficients of the ISQ logarithmic characteristic. The algorithm uses processing of points of the logarithmic characteristic with a sliding window and subsequent clustering.</p><p>It is shown that for target vectors with a nonzero duality gap the order of smallness of the perturbation function differs from the corresponding order with no duality gap. This approach can be used to study problems with a bounded feasible set in which the classical duality gap is absent and the order of smallness of the perturbation function is different.</p><p>In further research, it is planned to develop highly reliable methods for finding the ISQ characteristics, and the construction a numerical method for finding target vectors with a nonzero duality gap in convex optimization problem.</p></div>			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">A duality theory for convex programs with convex constraints</title>
		<author>
			<persName><forename type="first">A</forename><surname>Chames ; Chames</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">W</forename><surname>Cooper</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">O</forename><surname>Kortanek</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Bulletin of the American Mathematical Society</title>
		<imprint>
			<biblScope unit="volume">68</biblScope>
			<biblScope unit="page" from="605" to="608" />
			<date type="published" when="1962">1962. 1962</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Duality gap in convex programming</title>
		<author>
			<persName><forename type="first">T</forename><surname>Champion ; Champion</surname></persName>
		</author>
		<idno type="DOI">10.1007/s10107-003-0461-z</idno>
	</analytic>
	<monogr>
		<title level="j">Math. Program</title>
		<imprint>
			<biblScope unit="volume">99</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="487" to="498" />
			<date type="published" when="2004">2004. 2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Duality gap of the conic convex constrained optimization problems in normed spaces</title>
		<author>
			<persName><forename type="first">L</forename><surname>Ban ; Ban</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Song</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Borwein</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">S</forename><surname>Burachik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Yao</surname></persName>
		</author>
		<idno type="DOI">10.1007/s10107-008-0207-z</idno>
	</analytic>
	<monogr>
		<title level="j">J. Nonlinear Convex Anal</title>
		<imprint>
			<biblScope unit="volume">119</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="167" to="190" />
			<date type="published" when="2009">2009. 2009. 2014</date>
		</imprint>
	</monogr>
	<note>Math. Program</note>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Linear semi-infinite programming theory: An updated survey</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Goberna ; Goberna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Lopez</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">European Journal of Operational Research</title>
		<imprint>
			<biblScope unit="volume">143</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="390" to="405" />
			<date type="published" when="2002">2002. 2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">N</forename><surname>Astaf'ev ; Astaf'ev</surname></persName>
		</author>
		<title level="m">Infinite Systems of Linear Inequalities in Mathematical Programming</title>
				<meeting><address><addrLine>Moscow</addrLine></address></meeting>
		<imprint>
			<publisher>Nauka</publisher>
			<date type="published" when="1991">1991. 1991</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">The set of target vectors in a problem of semi-infinite linear programming with a duality gap</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">N</forename><surname>Astaf'ev ; Astaf'ev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Ivanov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">P</forename><surname>Trofimov</surname></persName>
		</author>
		<idno type="DOI">10.21538/0134-4889-2016-22-4-43-52</idno>
	</analytic>
	<monogr>
		<title level="j">Trudy Inst. Mat. i Mekh. UrO RAN</title>
		<imprint>
			<biblScope unit="volume">22</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page">4352</biblScope>
			<date type="published" when="2017">2017. 2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Ordinary convex programs without a duality gap</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">T</forename><surname>Rockafellar ; Rockafellar</surname></persName>
		</author>
		<idno type="DOI">10.1007/BF00932472</idno>
	</analytic>
	<monogr>
		<title level="j">J. Optim. Theory Appl</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="143" to="148" />
			<date type="published" when="1970">1970. 1970</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">On an explicit representation of the optimal values of a pair of dual convex programming problems</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">P</forename><surname>Trofimov ; Trofimov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Metody vypukl. programmirovaniya i nekotor. pril</title>
				<editor>
			<persName><surname>Nauch</surname></persName>
		</editor>
		<meeting><address><addrLine>Sverdlovsk</addrLine></address></meeting>
		<imprint>
			<publisher>UrO AN SSSR</publisher>
			<date type="published" when="1992">1992. 1992</date>
			<biblScope unit="page" from="96" to="103" />
		</imprint>
	</monogr>
	<note>in Russian</note>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Convex analysis</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">T</forename><surname>Rockafellar ; Rockafellar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Introduction to the Theory of Linear and Convex Programming</title>
				<editor>
			<persName><forename type="first">I</forename><forename type="middle">I</forename><surname>Eremin</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">N</forename><forename type="middle">N</forename><surname>Astaf'ev</surname></persName>
		</editor>
		<meeting><address><addrLine>Princeton; Moscow</addrLine></address></meeting>
		<imprint>
			<publisher>Nauka</publisher>
			<date type="published" when="1972">1972. 1972. 1976. 1976</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Numerical method for determining the order of smallness of the infinitesimal</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">P</forename><surname>Trofimov ; Trofimov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Bulletin of Ural Institute of Economics, Management and Law</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">32</biblScope>
			<biblScope unit="page" from="12" to="17" />
			<date type="published" when="2015">2015. 2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">A pathological semi-infinite program verifying Karlovitzs conjecture</title>
		<author>
			<persName><surname>Karney</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">F</forename><surname>Karney</surname></persName>
		</author>
		<idno type="DOI">10.1007/BF00934327</idno>
	</analytic>
	<monogr>
		<title level="j">J. Optim. Theory Appl</title>
		<imprint>
			<biblScope unit="volume">38</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="137" to="141" />
			<date type="published" when="1982">1982. 1982</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
