# A two-level domain decomposition algorithm for linear complementarity problem

Open Access
Research

## Abstract

In this paper, a two-level domain decomposition algorithm for linear complementarity problem (LCP) is introduced. Inner and outer approximation sequences to the solution of LCP are generated by the proposed algorithm. The algorithm is proved to be convergent and can reach the solution of the problem within finite steps. Some simple numerical results are presented to show the effectiveness of the proposed algorithm.

## Keywords

Linear Complementarity Problem Obstacle Problem Domain Decomposition Method Nonlinear Complementarity Problem Outer Approximation
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

## 1 Introduction

In this paper, we consider the following linear complementarity problem (LCP) of finding such that
(1.1)

where , A is an M-matrix, is a given vector.

LCP is a wide class of problems and has many applications in such fields as physics, optimum control, economics, etc. As a result of their broad applications, the literature in this field has benefited from contributions made by mathematicians, computer scientists, engineers of many kinds, and economists of diverse expertise. There are many surveys and special volumes (see, e.g., [1, 2, 3] and the references therein).

Domain decomposition techniques are widely used to solve PDEs since 1980’s. This kind of techniques attracts much attention, since it is portable and easy to be parallelized on parallel machines. It has been applied to solve various linear and nonlinear variational inequality problems, and the numerical results show that it is efficient, see, for example, [4, 5, 6]. It contains many algorithms, such as classical additive Schwarz method (AS), multiplicative Schwarz method (MS), restricted additive Schwarz method (RAS), and so on. In [7], a variant of Schwarz algorithm, called two-level additive Schwarz algorithm (TLAS), was proposed for the solution of a kind of linear obstacle problem. This method can divide the original problem into subproblems in an ‘efficient’ way. In other words, the domain is decomposed in different way at each step and the dimensions of the subproblems we deal with are lower than that of the original problem. The numerical results show that the TLAS is significant. In [8], the TLAS is extended for the nonlinear complementarity problem with an M-function. The algorithm offers a possibility of making use of fast nonlinear solvers to the subproblems, and the choice of the initial is much easier than that of the TLAS. Another efficient way to solve problem (1.1) is given by semismooth Newton methods (e.g., see [9, 10]). This method is attractive, because it converges rapidly from any sufficiently good initial iterate, and the subproblems are also systems of equation. An active set strategy is also an efficient way to solve discrete obstacle problems, see, for example, [11, 12, 13]. Based on some kind of active set strategy, the discrete obstacle problem can be reduced to a sequence of linear problems, which are then solved by some efficient methods. In this paper, we combine the idea of the active set strategy with the thought of TLAS, i.e., constructing inner and outer approximation sequences to the solution of LCP, and present a two-level domain decomposition algorithm. As we will see in the sequel, the main difference between the two-level domain decomposition algorithm (TLDD) and TLAS discussed in [7] lies in the way of constructing the outer approximation of the solution. What’s more, with the idea of an active set strategy, the TLDD may be easier extended to other problems, such as bilateral obstacle problem.

The paper in the sequel is organized as follows. In Section 2, we give some preliminaries and present a two-level domain decomposition algorithm for problem (1.1). In Section 3, we discuss the convergence of the algorithm proposed in Section 2. In Section 4, we report some simple numerical results.

## 2 Preliminaries and two-level domain decomposition algorithm

In this section, we give some preliminaries and present a two-level domain decomposition algorithm for solving problem (1.1).

Firstly, similarly to [7, 8], we introduce two operators, which will be useful in the construction of the algorithm in this paper. Let . Let I, J be a nonoverlapping decomposition of N. That is, and . For any , we introduce the following linear problem of finding such that
(2.1)
where denotes the subvector of v with elements (). Similar notation will be used in the sequel. We denote linear system (2.1) above by the operation form
Similarly, we introduce the following problem of finding such that
(2.2)
We denote nonlinear problem (2.2) above by the operation form

Theorem 2.1 [1]

Problem (1.1) is equivalent to the following variational inequality of finding such that
(2.3)

Theorem 2.2 [8]

The solution of problem (1.1), or equivalently (2.3), is unique and is the minimal element of S, where S is the supersolution set of problem (1.1), which is defined by

Similarly, we have the following theorem.

Theorem 2.3 The solution of problem (1.1), or equivalently (2.3), is unique and is the maximal element of U, where U is the subsolution set of problem (1.1), which is defined by

Based on Theorems 2.1 and 2.2, we can construct the following additive Schwarz algorithm for LCP (1.1).

Algorithm 2.1 (Additive Schwarz algorithm with two subdomains)

Let I and J be a decomposition of N, i.e., . Given . For  , do the following two steps until convergence.

Step 1: Solve the following two subproblems in parallel
where

Here we define for any subset I of N.

Step 2: , where ‘min’ should be understood by componentwise.

Similar to the proof of Theorem 2.4 in [8], we have the following convergence theorem for Algorithm 2.1.

Theorem 2.4 Let the sequence be generated by Algorithm 2.1. For  , we have
1. (a)

, and then ,

2. (b)

, and then ,

3. (c)

,

where u is the solution of problem (1.1).

In what follows, we let , , where u is the solution of problem (1.1). If , then the sequence generated by Algorithm 2.1 is in S and monotonically decreases and converges to the solution. Hence, if we define the coincidence set of as follows
(2.4)
we have by the monotonicity of such that

Actually, this gives inner approximations for the coincidence set .

There are many algorithms based on active set strategy. Based on some kind of criterion, the index set is divided into two parts: active set and inactive set. We only need to calculate the simplified linear system related to the inactive set. We also draw on the experience of active set strategy to derive the outer approximations for the coincidence set. To be precise, we define
(2.5)
and define as
(2.6)
may contain both elements of and . So, it is called the critical subsets. Let
(2.7)

where is a subset of N corresponding to an overlapping of the subsets associated with and . That is and .

Now, we are ready to present two-level domain decomposition algorithm for problem (1.1).

Algorithm 2.2 (Two-level domain decomposition algorithm)

1. 1.

Initialization. :

2. (a)

Choose an initial , w such that and . Define the coincidence set according to (2.4).

3. (b)
Solve such that
(2.8)

and define , and according to (2.5), (2.6) and (2.7), respectively.
1. 2.

Iteration step:

2. (a)

Inner approximation (additive Schwarz algorithm with two subdomains). Solve the following two subproblems in parallel: Let and define the coincidence set according to (2.4).

3. (i)
The subproblem defined by the following obstacle problem

4. (ii)
The subproblem defined by the following linear equation
(2.9)

5. (b)
Outer approximation. Solve the linear system
(2.10)

If , then stop; is the solution. Otherwise, define and according to (2.5) and (2.7), respectively, and let and return to step 2.

Remark 2.1 The subproblems in PSOR method and classical Schwarz algorithm are obstacle problems, while the subproblems (2.9) and (2.10) can be solved by the use of fast linear solvers.

Remark 2.2 The difference between Algorithm 2.2 and Algorithm 3.3 in [7] lies on the way of generating the outer approximation sequence. Algorithm 3.3 in [7] seems difficult to extend to other problems, such as bilateral obstacle problem, while the idea of Algorithm 2.2 may be easier to be applied to other problems.

## 3 The convergence of Algorithm 2.2

In this section, we analyze the convergence of Algorithm 2.2. First, we introduce some lemmas.

Lemma 3.1 Let , and be defined by (2.8). Then, we have and .

Proof Let , where , and . By the definition of , we have . By Theorems 2.2 and 2.3, we have . Hence if , we have . Then . Since , we have . Hence, noting that , and A is an M-matrix, we have . This completes the proof. □

Lemma 3.2 Let , let subsets and be defined by (2.5) and (2.7), respectively, then
(3.1)
(3.2)
(3.3)
(3.4)
Proof Equation (3.1) can be directly obtained by Theorem 2.4. By (2.9), we have
(3.5)
Since , we have
Noticing that , and A is an M-matrix, (3.5) concludes
(3.6)
We have by (3.5), (3.6) that
(3.7)
Let , where , and . Since , , we have for , and then . For , we have , and then . It follows then from (3.5) and that
(3.8)

which means . This, together with (3.7) and (3.8), implies that . Therefore, (3.2) holds. Similar to the proof in Theorem 2.4, we have (3.3) and (3.4). The proof is then completed. □

By Lemmas 3.1 and 3.2, and the principle of induction, we have , ,  .

Lemma 3.3 and ,  . If , is the solution.

Proof If , by the definition of , we have , . Noting that , we have . If , notice that A is an M-matrix, we have , which is a contradiction. Hence, and . , is obvious. Noting (2.10), it is obvious that if for some k such that , is the solution. □

Theorem 3.4 The sequence generated by two-level domain decomposition method (Algorithm 2.2) converges to the solution u of problem (1.1) after a finite number of iterations.

Proof If for some k, , by Lemma 3.1, is the solution and since the problem (1.1) has only one solution. Otherwise, since , we have and hence . Noting that and that N is an index set with finite elements, can only occur in finite steps. By Lemma 3.3, we have , and also can only occur in finite steps. In this case, after some finite steps, we have , . By the definition of , we have , . Hence, by Lemma 3.3, is the solution. This completes the proof. □

## 4 Numerical experiment

In this section, we present numerical experiments in order to investigate the efficiency of Algorithm 2.2. The programs are coded in Visual C++ 6.0 and run on a computer with 2.0 GHz CPU. In the tests, we consider the following LCP:
(4.1)
where
and

, is a given vector. In our test, we set , and , .

The matrix A may be obtained by discretizing the operator by using five-point difference scheme with a constant mesh step size , where m denotes the number of mesh nodes in x- or y-direction ( is the total number of unknowns).

We compare different algorithms from the point of view of iteration numbers and CPU times. Here, we consider three algorithms: classical additive Schwarz algorithm (i.e., Algorithm 2.1, denoted by AS), Newton’s method proposed in [9] (denoted by SSN), and Algorithm 2.2 (denoted by TLDD). In the AS, we decompose N into two equal parts with the overlapping size . In the algorithms we considered, all subproblems relating to obstacle problems are solved by PSOR with the same relaxation parameter , and the initial point is with . The tolerance in the subproblems of the algorithms is chosen to be equal to 10−3 in -norm, while in the outer iterative processes, it is chosen to be equal to 10−6 in -norm. In the TLDD, we choose initial . The tolerance in the subproblems of the algorithms is chosen to be equal to 10−4 in -norm, while in the outer iterative processes, it is chosen to be equal to 10−6 in -norm. In the SSN, we choose , , , , which is defined by the procedure proposed in ([9], Section 7). We choose the initial point .

We investigate the performances of each algorithm with different dimensions. Table 1 gives the iteration numbers and CPU times for the above-mentioned algorithms. From the table, we can easily see that the iteration numbers of TLDD are fewest among the algorithms we considered. The subproblems in AS are solved by PSOR, and it takes very little time to find an approximate solution to the obstacle subproblems. Nevertheless, in order to find the exact solution of subproblems, SSN and TLDD spent much more time to solve the related linear equations at each iteration step. This may explain why these two algorithms did not perform as well as we expected.
Table 1

Comparisons of iteration numbers and cpu times

AS

SSN

TLDD

iter.

cpu

iter.

cpu

iter.

cpu

100

51

0.015

5

0.015

3

0.047

400

155

0.64

10

1.997

6

1.154

900

318

6.567

12

27.378

9

17.755

1,600

546

34.564

14

178.101

11

112.117

Concluding remark In this paper, we propose a new kind of domain decomposition method for linear complementarity problem and establish its convergence. From the numerical result, we can see that this method needs less iteration number to converge to the solution rapidly than the additive Schwarz method and SSN. There are still some interesting future works that need to be done. For example, as we can see from TLDD, the main work is calculating the linear equations; we can discuss the affect of inexact solution for related linear subproblems. It is also interesting for us to extend the new method to some other problems, such as nonlinear complementarity problem and bilateral obstacle problem. We leave it as a possible future research topic.

## Notes

### Acknowledgements

The work was supported by the Natural Science Foundation of Guangdong Province, China (Grant No. S2012040007993) and the Educational Commission of Guangdong Province, China (Grant No. 2012LYM_0122), NSF (Grand No. 11126147) and NSF (Grand No. 11201197).

## References

1. 1.
Harker PT, Pang JS: Finite-dimensional variational inequality and nonlinear complementarity problems: a survey of theory, algorithms and applications. Math. Program. 1990, 48: 161–220. 10.1007/BF01582255
2. 2.
Billups SC, Murty KG: Complementarity problems. J. Comput. Appl. Math. 2000, 124: 303–318. 10.1016/S0377-0427(00)00432-5
3. 3.
Ferris MC, Mangasarian OL, Pang JS (Eds): Complementarity: Applications, Algorithms and Extensions. Kluwer Academic, Dordrecht; 2001.Google Scholar
4. 4.
Badea L, Wang JP: An additive Schwarz method for variational inequalities. Math. Comput. 1999, 69: 1341–1354. 10.1090/S0025-5718-99-01164-3
5. 5.
Zeng JP, Zhou SZ: On monotone and geometric convergence of Schwarz methods for two-sided obstacle problems. SIAM J. Numer. Anal. 1998, 35: 600–616. 10.1137/S0036142995288920
6. 6.
Jiang YJ, Zeng JP: Additive Schwarz algorithm for the nonlinear complementarity problem with M -function. Appl. Math. Comput. 2007, 190: 1007–1019. 10.1016/j.amc.2006.10.062
7. 7.
Tarvainen P: Two-level Schwarz method for unilateral variational inequalities. IMA J. Numer. Anal. 1999, 19: 273–290. 10.1093/imanum/19.2.273
8. 8.
Xu HR, Zeng JP, Sun Z: Two-level additive Schwarz algorithms for nonlinear complementarity problem with an M -funcion. Numer. Linear Algebra Appl. 2010, 17: 599–613.
9. 9.
Luca TD, Facchinei F, Kanzow C: A theoretical and numerical comparison of some semismooth algorithms for complementarity problems. Comput. Optim. Appl. 2000, 16: 173–205. 10.1023/A:1008705425484
10. 10.
Li DH, Li Q, Xu HR: An almost smooth equation reformulation to the nonlinear complementarity problem and Newton’s method. Optim. Methods Softw. 2012, 27: 969–981. 10.1080/10556788.2010.550288
11. 11.
Hintermüller M, Ito K, Kunisch K: The primal-dual active set strategy as a semismooth Newton method. SIAM J. Optim. 2002, 13: 865–888. 10.1137/S1052623401383558
12. 12.
Kunisch K, Rösch A: Primal-dual active set strategy for a general class of constrained optimal control problems. SIAM J. Optim. 2002, 13: 321–334. 10.1137/S1052623499358008
13. 13.
Kärkkäinen T, Kunisch K, Tarvainen P: Augmented Lagrangian active set methods for obstacle problems. J. Optim. Theory Appl. 2003, 119: 499–533.