MULTI-OBJECTIVE Linear Programming
MULTI-OBJECTIVE Linear Programming
November 1966
00
by
David Savir
CLEARINGHOUSE
FOR FEDERAL SCIENTIFIC AND
TECHNICAL INFORMATION
Hardoopy { Microfiche
oo .66
1&
mmi mf
C*f-T%£- I
UNIVERSITY OF C A L I F 0 R N I A - B E R K E L E Y
■
by
David Savlr
This research was supported by the Office of Naval Research under Contract
Nonr-222(83), the National Science Foundation under Grant GP-4593 with the
University of California. Reproduction in whole or in part is permitted for
any purpose of the United States Government.
t ~
ABSTRACT
In this paper we will investigate linear programs with more than one
objective function:
0) Objective function z = Q^
subject to Ax = b
x > 0
where 2 is a p-vector
x an n-vector
b an m-vector
n . • _ / 1 k p.'
Q a p x n matrix = (c ,..,c ,..,c )
A an n x m matrix.
(x) on z cai be made c>uch that XQx will be minimized and the minimizer x
will be attained by the same x . Also for any x such that Qx 'S not in
1 2
Z , Qx can be strictly decreased to a point Qx which Is in Z . Hence the
simplex method will always yield points in Z as optimal basic feasible solutions.
a set of extreme points which also contains a preferred extreme point (assuming
for example: production planning over sequential periods where decisions are
We will assume throughout this paper that T is nonempty and bounded. In general
Although other approaches can no doubt be taken, it seems both legitimate and
maker (DM) and the linear program problem solver (LP) . First, mathematically,
optimal solution. If the decision maker is satisfied with some optimal solution
unsatisfied but no feasible optimal solution satisfies him more, then the solution
We shall prove in Section k that under certain conditions one of these solutions
Secondly, physically, the problem thus far stated (l) can be decomposed
Both the decision maker and the decision maker function will be called DM for
notational simplicity. Similarly, both the linear program problem solver and
its correspondence will be called LP . No ambiguity will occur.
ß w
(Recall that T is nonempty and bounded.) DM now evaluates the solution.
to one unit of cost, #- units of value to one unit of execution time, etc.,
program. We will assure that the decision maker cannot establ ish such a unit
of value.
(2) Find (x, DM) , x e T , DM e <{2k]>+t such that x e LP(DM) and x POAP .
Equivalently:
"For each X" seems to imply that the set of X is at most countable, which is
not true. However in Section 6 we will show that there exist a finite number of
sets A. , and any X e A. will generate the same solution set {x} as any
X' e A- • Thus "for each X" is to be interpreted "for any X from each A-'1
tt,.'<[*.}>" reads "the convex hull of the set of all zk."
We will approach (2') eventually as a two stage problem: firstly, for some X ,
and revising X if necessary. Call then the first stage, i.e. (2'), neglecting
conditions, and that the simplex method will find a subset of these solutions.
The metiiod proposed for finding a solution has little practical significance
for a single problem, since the value cf X needed to obtain a POAP solution
is known only after the POAP solution has been found. (This is clear from
class (? of problems possessing certain properties, and the first T-l sequential
problem can be solved more efficiently when LP has available the values
th
Let C »_ be
e C? oe the
tne tr sequential problem of form (2') possessing a
POAP solution.
d) z is common to C , V t
ß m
Now we require some assumptions on LP and on DM . Our recognition of
it will read and interpret submitted data without error, that it will produce
an optimal feasible solution with certainty, and that it will yield DM the
preferred.
such that d(x + ed, S) < d(x,S) for arbitrarily small e > 0 . No
terminate if LP produces x e S .
subject to Ax = b j
! or x e T
x > 0)
"z £ z0" reads "it is not true that z. < z.0 , k=l ,p ."
We can P.TW find a set of x which will solve (3).
How can we produce the inverse images of such z. ? Consider one such Problem-
en) min z = Qx , x e T
w.r.t. k
Clearly z, , , k' ^ k , can adopt any value and is independent of the minimizing
(5) min z. = c x , x e T
can find p basic feasible solutions to (3). each of which has the minimal
/ \ k*
property in a different component. Call a feasible solution to (5) x
** k*
Theorem 1 (3) has a minimum solution x if and only if fl X ^ U 1 and any
It follows that z ' ' <i 2. , k=l p . so x' solves (5) for
,'—1. KJL
x,W e Xk'" for all k , and x"' e 0 Xk,% . Suppose HX " ^ 0 . Let
k
f m
8
Now a minimum solution to (3) seems the best we can hope for, and indeed
will solve (2') provided we can show that it is POAP . Theorem 3 will give us
k*
Now we have shown that a set UX of solutions to (3) exists, and we
would like to discover, if possible, a maximal such set from which to select
some preferred or almost preferred x . Also, since we have the simplex method
specify X and thus generate a specific solution. If the rows of Q are not
* m
10
i o
a- z. = a constant
where Z = (z.1 ,. . . ,r 0)
P
.,,0/0 o o%
Let Zk - (zk , zk ,. . .,zk ) .
0
r[where
u / 0 , x. 0
Xv = (x. x
0
\)
X k 0 = (x k 0 * x k 0 » • • • »Ä
xu 0)1
'J
- a'QCx0 - xk0) .
We have now found X" , the set of all solutions to (2' ') . We show that
(2'') then is equ:valent to (3) and a search for a weakly undominated z replaced
undominated; or
(ii) cy'z is minimal for some o > 0 . Suppose there exists some
Thus far we have produced a set of solutions X" , each element of which is
to restrict) x to a preferred set S . Now that we know that the search for
f w
12
points that LP can propose is indeed that set of points from which DM wishes
tias no such thing. Now suppose that we have a set X obtained from solving
(2'') or from solving (3), we will show that a complete solution to (2') exists.
(A) x ■ E y..x{ , where fi} is the index set of all extreme points
p. > 0 , E p,. = 1 .
(B) x = r X. x. . where {j} 'S the index set of all extreme points
if ^b > ^ » ^L- ~ M-b • Thus the extreme points of (A) are the
%
same as those of (B) and x = Z^,. x." . But all x. , i e fi}
t i
Theorem 3 will show under what conditions a preferred solution can be found.
The lemma has shown that X is a simply connected part of the boundary
Using the decision maker's axioms, and starting from the left of the Figure, almost
determined by the original trial solution and the direction of search. The
Fig. 1
* ■m
1^
Even if the diagram is less pathological (Fig.2) there is still and almost
Fig. 2,
Fig. 3
15
Fig. ^4.
can be produced,
be produced.
a) x e S or
•X.
no ex reme point and S P X" / 0 the simplex method will have LP oscillating
so far discussed we have shown that a solution x POAP can Indeed be found.
can terminate when by DM2 he must reverse direction; and If an almost preferred
maker's preference, and then to find a function which will yield this optimum,
rather than to find an optimizing function and insist that the decision-maker
like It. We are granting him intuition and knowledge that he has withheld from
Why then bother with X at all? A very simple approach could be select
1 2
any extreme point x , rejectin g it and selecting X and some direction
1 1 2 1
of improvement d such that d (x - x) > 0 , and continuing until no
n+l
X
such that n
can be found. Then X is clearly optimal
by the convexity of T •
If we follow this approach, though, we find that the solution to the tth
on the decision maker as the first problem , even thou gh the solut ions may be
produce 700 Rolls Royces and 400 Bentleys. Now in Fe brua r y he notices that
management policy remains the sa me a nd that all his unit costs and unit profits
are in the same proportion. Consequently , he decides that rather than reinvestigating
1
all the extreme points anew he wi ll again select X = (700,400) . However,
1
he d i scovers very qu ickly t hat either X i s infeasible for February, or t hat
2
it is not optima 1 : he could fi nd some better X which is preferred. He
realizes that conditions (a) throu gh (e) of Section 2 hold. He sees that the
0
January problem could have been solved by (2 1 ) for some "A. , and if he knew
x 1 that would be both feas i bl e and opti n~l. Further reflection, and an
0
unde r standing of linear programmi ng , tells him that in general "A. is a point
in a closed convex set A and a ny A€A would have solved the January problem.
to select arb i trar ily AI from and to hope that AI would also be in
AI A2
But now he recal l s condition (e) wh ich tells him that there is some ~ which
1
t: n.
Similarly the t+lth problem would be entered using At+l = ~ L: )
l:o: A.
t.1= 1 t
(If we were to waive the as s umption of time invariance of s the mean J:
I
might be a weighted mean.) As t becomes large ~t approaches \ in Cesaro
th 1
Consider the t+l sequential problem. The first solution offered X
i+l
6. The Generation of X
i ~ i .
The problem to which X is the solution, using 1\ , IS
min z
Subject to Ax =b
X ::::_ 0 ,
A.iOx =z
20
Rearranging columns so that the first m columns are the basis B. we have
C.
_z.
to nonbasic variables. The solution x is found by premult iply ing both sides by
B. 0
i
yielding
1
-X'k B^ 1
i
r "I
(7) I B
i C
i v I
B. b
i
x' = (B^b , 0) .
problem. Of course, If we were to try to resolve the problem using this constraint
direction; but we will use the constraint to determine which variables can enter
(7') I B-'C X
B
V'b 1
B
I+1 e
Theorem h If a solution x exists x will enter the basis (B- + i) ft>r
1+1 . e -1 e
x only If d- -dB C > 0 , whert e denotes a column of C .
as , i+1 > dx
dx , i .
• i
k d
c -1 dpB'Ve
-d, 0 we have
(9) B C o" X B b
" B1
c
o W 1 x
c
0 x(Qc- QßB c) 0_
oj _s J Lz-XQßB'^J
The m+1 row of the system (second row of the matrix (9)) is infeasible since
e -1 e i+l
Corollary k If d- - d-B C < 0 for all e=m+l,...,n then no feasible x
e
Now suppose that some x can be found to enter B_, . As e increases
i+l
Q
so does x until some x ,tA = l,...,m , is reduced to zero and is driven out
of the basis.
P
Let A = {X|X.>0 , Z X.=l}
K k
k=l
X.Qx
1 is minimized by x and X.Qx is also minimized by x .
H 2 V
Let X1 and >.2 eA^ , X^Q = c1 , ^2^=c2 ' 't 's a
well-known
result that [a- c. + (l-ry) c_ ]x is also minimized by x , where
X is the most likely value to use to achieve our aim, but we also know that
X will not work because we have already tried it. Consequently, we try some
we drop the superscript of X ; where no affix exists we refer only to the new
X that we are seeking. Suppose that we can generate x using XeA 1 • Then
the canonical set of equations is still (7'), although the value of X is not
What can we say from this? Firstly, the solution is x since x=(B b,0)
ß m
2U
Secondly, since x' is optimal XC^-Q^B" C)>0 . Thirdly, XeA . But from
(10) XC^-OgB"^)^
x>o
p
E >.. = 1
k
k=l
and also (a) that there is at least one equality in the first row of (10),
that there is a one to one correspondence between the columns of C and the rows
1ine of (10) Is eligible for equal ity. For simplicity of notat ion we will
kV
(11) min TA\
subject to RX<0
x>o
ö.k=i
where R = -(QC-(LB'1C)
By inspection the optimal solution is >.=X , the point from which we started.
p
The constraint set has an interesting geometrical interpretation. In R all
25
if no such point can be found then case (ii) of Theorem 3 holds. If X lies
on the axis of the orthant a solution (in general) does not exist there since
n
A Av, i 's not
necessary at the boundary of A , hence a change of basis in (?)
(12) R iI 0 0 0 0 X 0 i
1 0 0 0 0 0 a = 1
unrestricted TT and zero v which is optimal both a fortiori and by the Wolfe
simplex phase 1 we make the first n-m+k columns basic, and immediately obtain
Y 1 (s+1 Y
l ,s+n-m+p
1 ?!
B2
(13) •J
Y s,s+l 's.s+n-nH-p
S
26
where s*2(n-m)+p+l
7. The Computation of X
v +
_L. enters the basis. From the last row of (12):
P J
TT. = V , .
J P+J
a. and v +,. cannot simultaneously be in the basis hence the pivot operation
J P J
entering
y v and expelling3 a must be on vY +. • . .• • From Kuhn-Tucker theory
P J.s+p+j
we obtain that the multipliers rr. are nonpositive, hence v .. < 0 (since
J P+J -
the solution will be nonoptimal with respect to the Wolfe algorithm). Since
vY . . < 0 .
p+j ,s+p+j
Y,
Y
p+j ,s+p+j
2
2 ^ B. p-Kj
B
P+J Y
p+j.s+p+j
27
2
and 0 < B
- k
We have thus found the conditions by which -. may leave the basis
1) Identify jeE
2) El imi na*-« j » y
p+j ,s+p+j > 0
2
k) Eliminate j > B. . < 0 , Ji V j
J
Those that survive the test are feasible and we wish to minimize the
deviation from X . It
is sufficient to minimize EJX. -X.|1 since the expressi on
k k
2
is monotone with respect to E(X. -A )
We have found values of X , if they exist, which will make a new basis
n-m+p columns. This will not be optimal since X is excluded from the constraint
set. Consequently there will be at least one value of a < 0 . Again using
Theorem ^4 we find that value of v , if any, which satisfies the conditions for
p ivot i ng.
Case M. The program can find no v to bring into the basis which satisfies
the pivoting rules. Then case ii of Theorem 3 applies and the last x is the
=
Vi (txt-x;+1)/(t+i)
as in case I.
Case 111. The decision maker causes cycling between a number > 2 of solutions.
This implies that S does not contain an extreme point and the decision maker
-xl + 2x
2 £ ^
x + l/2x < 6
2x] - x2 < 4
c x = -x1
2
ex- -X-
X1 = X = (1/2,1/2)
+ 2x
"xl 2 -Li
x1 + 2x2 < 6
2x x
l ~ 2 £ ^
e -I e
We compute d- - dRB C for x, and x
d B } k
d^ - B ' t = 0 - [0 1 0] "1/5
2/5 -2/5
.-3/5.
d5 - dgB^C5 = 0 - [0 1 0] 2/5
-1/5 1/5
V5J
0 -1 0 2/5 -1/5 0 0
.-3/5 V5.
-1/5 -2/5
-2/5 1/5
ß m
30
min (A 1 -~ )2 + (A 2 -~) 2
[-1/5
[~]
subject to
]
-215 Al
-215 115 0 A2 =
1 0 (J l
(J2
We have seen that only x5 can enter the next basis. x5 is the second
column of c ' so ~ = (2} • We reach the tableau (13); showing y .. and the
IJ
RHS:
=
-3I 2 o]·( 111o \ = [ : ] + ~
1 -312J] = [1 13]
[
3120 -911oo 1 2 [
3/20 213
dT
T
t+l
Fig. 5.
32
REFERENCES
Unclass i fied
University of California, Berkeley 2b CROUP
3 REPORT TITLE
Research Report
S A UTMORfS.) Ci-aaf name first nam« initial)
Savir, David
November 1966 36
8a CONTRACT OR GRANT NO 9a ORIGINATOR'S RFPORT NUMBERCSJ
Nonr-222(83)
b PROJBC T NO
ORC 66-21
NR 0^7 033
c 9b OTHER REPORT NOC5; (A ny othat numbara iiat may ba a$*l0^ta
thla raporl)
Research Project No. RR 003-07-01
10 AVAILABILITY/LIMITATION NOTICES
DD I
FORM
JAN «4 1473 Unclass i fied
Security Classification
Unclass if ted
Security Classification
M LINK A LINK B LINK C
KEY WORDS
ROLE
IMS1KUCTIONS
I OKIGINATING »CTIVITY: Enter th* name -nd address imposed by security r'.ussification, using standard statements
nf the coiitriictor, subcontractor, grantee. Department f De- such as:
(enae activity or other organization (corp-rate author) issuing
(1) "Qualifiri irq'j^steri may obtain copies of this
the report.
report from DDC "
2a. REPORT SECURITY CLASSIMC A': U.N: Enter the c. er-
(2) "Foreign announcement »nd disseiriination of this
all security claasificalion of the repn-,. indicate wheth/r
report t y V'OC is not authorised."
"Reatricted Data" is imluded. Marking is to be in uncord
ance with appropriate security reg Uatiuns. (3) "U. S. Government agencies mny obtain copies of
thiu report dire<-tly from DDC. Other qualified DDC
2b. "IROUP: Automatic downgrading is specified in DuD Di- users shall request through
rective 5200,10 and Armed Forces Industrial Manual, Etilt
the group number Also, when apph able, show that optional
markings have been used for Group 3 and (jroup 4 as luthor- (4) "U. S. military agencies may obtain copies of this
ized.
report directly from DDC Other qualified users
3. RETORT TITLE; Enfei the comple'e report title in all shall request through
< apilal letters. Titles in alt cases ahoiild be unclassified.
If a meaningful title cannot be selected without lussifica-
tiun, show title classification in all capitals in parenthesis (5) "All distribution of this report is controlled Qual-
immediately following the tnle. ified DDC users shall request through
4. DESCRIPTIVE NOTES; If appropriate rnter the type of
report, e.g., interim, progress, summary, an mal. ot final. If the report has been furnished to the Office of fechnical
Give the inclusive dates when a apecifn ri-porting penou is Services, Department of Commerce, for sale to the public, indi-
rovered, cate this fact and enter the price, if known.
5. ALrTHOR(S). Enter the name(s) of auihoKs1 us ^hc.wn on 11. SUPPLEMENTARY NOTES: Use for additional explana-
or in th" report. F.itei 'as« name, first name, midiiie initial. tory notes.
If T.ilitarv, show rank an'l bran« h of servii e. 7 ht- name of
ihe pnnciphl « 'thor is an absolute minirmim t. q'l'rement. 12. SPONSORING MILITARY ACTIVITY: Enter the name of
-
the departmental project office or laboratory sponsoring (pay-
h. REPORT DAT ^ Enter (he \nr ai u. rn« »:' as da, , ing for) the research and development. Include address.
month, ynar, or month, year. If " ^r(. th'.n ■>"? •'ate appears
in the ro^iort, use date <■( pub'iLwtion 13 ABSTRACT: Enter an abstract giving a brief and factual
0 summary of the document indicative of the report, even though
7a. TOTAL NUMBER Of" PA'.R . The tola' pf/e count it may also appear elsewhere in the body of the technical re-
should follow nomia! r.vination , .occlurer, i.e., '-nter the port. If additional space is required, a continuation sheet shall
number of ?*$,' s i vitainmg infcmaliora. be attached
7b. NUMBER OF kt ^•«RFNCFS Enter ihc total nur.bar of It is highly desirable that the abstract of classified reports
'cferpm es cileil ,n ne r-^ ■ t be unclassified. Each paragraph of the abslrsct shsll end with
8u. CONTKAt : ■. ^ ■.'- ANT M'MBF.K J I appropriate, enter I an indication of the military security classification of the in-
Ihe «pplvcable tiu";( - ■: Ihf rontract or grunt under which formation in the paragraph, represented as (TS). (S), (C), or (U)
•he report was wf t'"p. ! There is no limitation on the length of the abstract, How
8b, SL, flt 8d. PROJECT NUMBEK. Enter the appi >pri«te ever, the sugges ed length is from 150 to 225 words.
military department i ientifi "ation, such u» project number. |
14 KEY WORDS: Key words are technically meaningful terms
subproject number, oyster.- number«, task numbe , etc.
or short phrases that characterize a report and may be used as
-
4« ORIGINATOR'S R KP OP ; NUMBER(S): Enter the of fi index entries for cataloging the report. Key words must be
cial report number JV vSu-f; 'he i ^current will he Identified selected so that no security classification is required. Identi-
und rontrolird by Ihe >r ^matins activity. Dus number fiiust , fiers, such at equipment model designation, trade name, military
be unique to this report. I project code name, geographic location, may be used as key
')', >TliEK REPORT NUMBF.RtS; :i the report has been , words but will be followed by an indication of technical con-
text. The assignment of links, roles, and weights is optional.
assi^neri dnv other repor' nunbers ~,thfr bv the originator
or h\ (^e sponsor , els^. enter this nLiniber(g;. .
10, AVAILABILITY LIMJ'TATION NOTICES: Enter any Um- j
itu'.icns on further dissemination of tue report, other than thosej
DD I
FORM
J • N 64 1473 (BACK) Unclass i fled
Security Classification