Next Article in Journal
Neural Networks and Markov Categories
Previous Article in Journal
Feature Selection Based on Three-Dimensional Correlation Graphs
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Novel Algorithm Based on the Bundle Method for Solving the Max-Cut Problem

by
Fadhl Jawad Kadhim
* and
Ahmed Sabah Al-Jilawi
Mathematics Department, College of Education for Pure Science, University of Babylon, Hilla 51001, Iraq
*
Author to whom correspondence should be addressed.
AppliedMath 2025, 5(3), 92; https://doi.org/10.3390/appliedmath5030092
Submission received: 16 June 2025 / Revised: 7 July 2025 / Accepted: 8 July 2025 / Published: 17 July 2025

Abstract

A novel algorithm was proposed for solving the max-cut problem, which seeks to identify the cut with the maximum weight in a given graph. Our technique is based on the bundle approach, applied to a newly formulated semidefinite relaxation. This research establishes the theoretical convergence of our approximation technique and presents the numerical results obtained on several large-scale graphs from the BiqMac library, specifically with 100, 250, and 500 nodes. The resulting performance was compared with that produced by two alternative semidefinite programming-based approximation methods, namely the BiqMac and BiqBin solvers, by comparing the CPU time and the number of function calls. The primary objective of this work was to enhance the scalability and computational efficiency in solving the max-cut problem, particularly for large-scale graph instances. Despite the development of numerous approximation algorithms, a persistent challenge lies in effectively handling problems with a large number of constraints. Our algorithm addresses this by integrating a novel semidefinite relaxation with a bundle-based optimization framework, achieving faster convergence and fewer function calls. These advancements mark a meaningful step forward in the efficient resolution of NP-hard combinatorial optimization problems.

1. Introduction

The max-cut problem is a well-known NP-hard problem in graph theory. It has several applications in different domains, including computer science, engineering, and physics [1]. Over the years, numerous exact algorithmic approaches have been proposed to solve the max-cut problem, with notable solvers such as BiqBin and BiqMac gaining recognition [2,3]. Despite advancements, solving the max-cut problem optimally remains a computational challenge, even for moderately sized instances [1,4]. As a result, approximation and heuristic algorithms are often employed to find near-optimal solutions efficiently [5].
Commander [6] suggested a heuristic solution for the max-cut problem, utilizing a continuous greedy randomized adaptive search technique to enhance the modeling capabilities. Building on this, Muñoz-Arias et al. [7] explored the performance of the Goemans and Williamson approximation algorithm on various graph families, including K-regular and weighted complete graphs. Similarly, Wang et al. [8] introduced the concept of a relation tree to represent graph cuts and compared multiple solving algorithms across graph classes to evaluate their relative effectiveness. Dolezal et al. [9] contributed a comparative analysis of several approximation strategies, highlighting the conditions under which each performs optimally.
In recent decades, a shift has occurred toward more refined relaxation techniques, particularly those rooted in semidefinite programming (SDP) and Lagrangian duality [10]. Charfreitag et al. [11] proposed an improved integer programming formulation for max-cut, employing odd-cycle inequalities within branch-and-cut frameworks to strengthen the linear relaxation and reduce the solving time for dense graphs. Hrga and Povh [12] investigated augmented Lagrangian methods for solving the SDP relaxation of the max-cut problem. Their use of L-BFGS-B optimization demonstrated high-quality upper bounds for instances.
Lu et al. [13] developed a branch-and-bound (B&B) algorithm based on SDP relaxations, incorporating a novel hierarchical decomposition strategy. Their approach achieved considerable computational gains over methods such as BiqCrunch and bundle. A critical contribution in this domain is by Gruber and Rendl [14], who introduced the bundle method to efficiently solve Lagrangian relaxations of combinatorial optimization problems. By maintaining a compact cutting plane model, they demonstrated scalability and solution accuracy, laying the groundwork for further hybrid methods.
Expanding on this, Rendl et al. [15] combined SDP and polyhedral relaxations into a B&B strategy, using the bundle method for upper bound calculations. Their algorithm proved highly effective for dense graphs with up to 100 nodes. More recently, Gu and Yang [16] applied pointer networks and reinforcement learning to approximate max-cut solutions in large graphs, reflecting a growing synergy between combinatorial optimization and deep learning techniques. Avinash [17] analyzed the exactness of SDP relaxations, identifying graph structures where these relaxations are tight and establishing conditions for solution uniqueness.
Many researchers have proposed algorithms to solve the max-cut problem, relying on various approximation methods such as the interior point method and the penalty method [18,19,20]. However, these approaches are generally inefficient for solving optimization problems with a large number of constraints. In contrast, the bundle method is more efficient than previous methods in solving optimization problems with a large number of constraints, particularly for large-scale graphs. This efficiency stems from the bundle method’s ability to approximate the non-smooth objective function using multiple subgradients gathered across iterations, rather than relying solely on local information like gradient-based methods. Furthermore, instead of incorporating all the constraints explicitly in each iteration, the bundle approach leverages Lagrangian relaxation and constructs moderately sized subproblems, which dramatically reduces the computational burden. As Gruber and Rendl [14] demonstrate, this allows for rapid and scalable optimization, making the bundle method particularly well suited for large-scale combinatorial problems.
Building on this advantage, this study proposes a bundle-method-based algorithm specifically designed to efficiently solve the max-cut problem on large-scale graphs. The proposed approach achieved high-quality SDP bounds with fewer computations and a shorter processing time compared to existing methods.
This article is organized as follows. Section 2 introduces the key concepts necessary for this study, including semidefinite programming, combinatorial optimization, and general bundle methods. It also describes the new SDP relaxation applied to the max-cut problem, and outlines our proposed method for computing SDP bounds, including a convergence analysis. Section 3 presents the numerical results, which are analyzed in detail in Section 4. Finally, Section 5 concludes the paper with a summary of the findings.

2. Materials and Methods

2.1. Semidefinite Programming

Semidefinite programming (SDP) is a significant category of convex optimization problems that aim to optimize a linear objective function [20]. To mathematically formulate SDP problems, let S n = { X R n × n     X = X T represent the collection of all real symmetric matrices of dimension n × n . The notation X 0 signifies that X is a positive semidefinite matrix. Moreover, define S + n = X S n   X 0 } as the collection of all positive semidefinite matrices. The primal problem of SDP is given by the following:
( P ) min X   C , X s . t .     A i , X = b i ,   i = 1 ,   ,   m X S + n ,
where C , A 1 , , A m S n and b R m constitute the given problem data [21].
And the dual problem of SDP is formulated as follows:
( D ) max y , Z   b T y   s . t .     Z + i = 1 m A i y i = C Z S + n ,

2.2. Problem Formulation

The central problem under consideration is the max-cut problem, which holds a significant position within the class of combinatorial optimization problems. Due to its broad applicability across various fields, semidefinite programming (SDP) serves as a powerful tool for tackling it. Goemans and Williamson presented a fundamental approach using SDP, attaining a 0.878-approximation for max-cut in polynomial time [22,23]. The max-cut problem aims to divide the set of n vertices in an undirected graph G = ( V , E ) into two subsets, S and S ¯ , where S ¯ = V \ S , to maximize the number of edges connecting S and S ¯ [24]. To mathematically define max-cut, let x { 1 , + 1 } n represent an assignment of vertices to clusters. Associate weights w i j with each edge ( i ,   j ) E , where w i j = 0 if i and   j are not connected by an edge. The max-cut problem can be defined by the following [25]:
( M C )   max i , j E w i j 1 x i x j 2   s . t .     x i 2 = 1 ,     i = 1 , , n .   .

2.3. Semidefinite Relaxation of the Max-Cut Problem

This subsection presents a concise overview of the standard SDP relaxation and its dual formulation for the max-cut problem. For further technical details, the reader is referred to source [25]. The focus here, however, is on the proposed SDP relaxation.
The basic SDP relaxation of the max-cut is given by the following:
M C B A S I C   max L , X s . t .     d i a g X = e Y S m ,     X 0 ,
where X S + n is a symmetric positive semidefinite matrix, L is the Laplace matrix of the graph, and e R m is the all-ones vector. Its dual formulation is expressed as follows:
( M C D B A S I C )   min e T u s . t .     D i a g u L 0
where u R m is the dual variable vector associated with the diagonal constraint on X .
Our approach to semidefinite relaxation formulates the SDP without considering the complete graph. Instead, we index the matrix variable solely with pairs of nodes that correspond to non-zero weighted edges—specifically, those included in the edge set E ( G ) . Let y { 1 , + 1 } m + 1 , m = E ( G ) ; it is defined as follows:
y = 1 y { j , k } = v j v k ,       j k E G ,   j < k .
This construction represents the structure of a cut using a binary vector v { 1 , + 1 } m , where each entry indicates the partition assignment of a node. The scalar component y = 1 s erves as a normalization term, while each entry y { j , k } reflects the relative position of nodes j and k with respect to the cut, based on the product v j v k for edges j k E G . Accordingly, the vector y takes the following form:
y = 1 v 1 v 2 v j v k ,   y     { 1 , + 1 } m + 1 .
A product of this vector yields the matrix Y = y y T , whose block matrix form is denoted by the following:
Y = y y T = Y , Y { j , k } ,       Y , { k , l } Y { j , k } , { l , r } .
To guarantee that Y is consistent with an underlying cut, certain equality constraints must be satisfied. These include the following:
Triangle constraint:
Y { j , l } , { l , k } = Y , j , k ,   triangles   j , k , l   G .
Four-cycle symmetry constraint:
Y { j , k } , { l , r } = Y j , r , k , l ,   4 -cycles   j , k , l , r   G .
Additional 4-cycle condition:
Y { j , k } , { k , l } = Y j , r , l , r ,   4 -cycles   j , k , l , r G with   j l   E ( G ) .
Equation (9a,b) have already been trivially proven to hold for matrices Y derived from a valid cut vector v . Equation (9c) can be justified by the following:
If j l E ( G ) , then the corresponding triangle constraints must be satisfied:
Y { j , k } , { k , l } =   Y , j , l   and   Y { j , r } , { l , r } = Y , j , l .
Thus,
Y { j , k } , { k , l } = Y j , r , l , r
Since no constraints exist for this edge, the following condition can be added:
Y { j , k } , { k , l } = Y j , r , l , r
To define the cost structure of the relaxation, a matrix Q L S m + 1 is constructed using the graph Laplacian L = [ l i j ] . Its entries are defined as follows:
( Q L ) , = 1 4 i = 1 n l i i ( Q L ) , { i , j } = ( Q L ) i , j , = 1 4 l i i ,     i j E G .
Thus, Q L takes the following structured form:
Q L = 1 4 l i i l i 1 j 1 l i 1 j 1 0         l i 2 j 2     0     l i 2 j 2     0                 0         .
is associated with a cut δ ( S ) , then the entries satisfy the following condition:
Y , i , j = Y i , j , = 1     1 i f   i j δ S o t h e r w i s e .
This behavior implies that the inner product Q L , Y computes the weight of the cut δ ( S ) .
Specifically,
Q L ,   Y = Y , Q L , + 2 i j E G Y , i , j Q L , i , j = w ( δ S ) ,
Based on this derivation, the following SDP relaxation is obtained:
( M C R E L A X ) max Q L , Y s u b j e c t   t o   d i a g Y = e A Y = b Y S m + 1 ,     Y 0 ,
Here, A Y = b represents a set of equality constraints—including triangle relations and, when applicable, 4-cycle conditions—that ensure the structural integrity of the cut within the graph.

2.4. The Bundle Method

The bundle method enhances the convergence rate and numerical stability of the cutting plane method by integrating a regularization strategy [26]. Unlike the cutting plane method, which relies solely on the lower approximation function, the bundle method refines its iterates by solving a regularized master problem, effectively taking a proximal step towards the lower approximation model   f ^ t ( x ) :
x t + 1 * argmin x Ω   f ^ t x + α 2 A T ( x w t ) 2 2
where w t R m represents the current reference point, while α > 0 serves as a penalty for deviations from w t . The bundle method updates the iterate w t only when the decrease in the objective function f ( · ) meets or exceeds a specified fraction of the reduction predicted by the approximated model   f ^ t ( x ) . Specifically, 0 < β < 1 ; this ensures controlled and effective progress in optimization.
β f t w f ^ t x t + 1 * f t w   f t x t + 1 * .
Otherwise, if sufficient progress is not achieved, we retain the previous iterate with w t + 1 = w t (null step). In either case, the subgradient g t + 1 f ( x t + 1 * ) at the new point x t + 1 * is used to refine the lower approximation   f ^ t + 1 ( x ) . Specifically, this can be updated using the following:
f ^ t x =   max i = 1 , , t f x i + g i , x x i
In particular, the bundle method ensures convergence, provided that the lower approximation model   f ^ t + 1 satisfies the following three key properties for all x :
Minorant: The function   f ^ t + 1 serves as a lower bound for f , ensuring that
  f ^ t + 1 x     f ( x )
Subgradient lower bound: The function   f ^ t + 1 is bounded below by the linearization defined by a subgradient g t + 1 f ( x t + 1 * ) . Specifically, it satisfies the following:
f x t + 1 * + g t + 1 , x x t + 1 * f ^ t + 1 ( x )
Model subgradient lower bound: The function   f ^ t + 1 is lower-bounded by the linearization of the previous model   f ^ t   , given by the following:
f ^ t x t + 1 * + s t + 1 , x x t + 1 *   f ^ t + 1 x
where s t + 1 certifies the optimality of x t + 1 * for Problem (15).
With these foundations in place, the general algorithm for the bundle method is now presented in Algorithm 1 [2,10]:
Algorithm 1. Bundle Method
Input:  f ( x ) , Ω , α > 0 , 0 < β < 1 , t m a x 1 .
                   for t = 1 , 2 , , t m a x do
Repeat: solve (15) to obtain a candidate iterate x t + 1 * .
         if (16) satisfied then
              set w t + 1 = x t + 1 * .
              else w t + 1 = w t .
              end if
Update approximation model f ^ t without violating (18a)–(18c).
         if stopping criterion then
Quit
      end if
end for

2.5. Proposed Method

The semidefinite relaxation of the max-cut problem is given in Equation (14) and is addressed through the proposed solution framework. The method can be derived as follows:
Let ε = { Y     S m + 1   ;   Y     0   w i t h d i a g Y = e } , where the constraint Y 0   ensures positive semidefiniteness and d i a g Y = e enforces unit values on the diagonal to approximate the binary structure. Thus, Equation (14) is equivalent to the SDP relaxation.
( M C R E L A X ) max Q L , Y A Y = b Y ε .
To derive its dual, the Lagrangian is introduced as follows:
L M Y = Q L , Y + M T ( b A Y ) .
This formulation incorporates the constraint into the objective via the dual variable M . The corresponding dual function is as follows:
f M = max Y ε   L M Y =   b T M + m a x Y ε Q L A T M , Y ,
The expression Q L A T M reflects the interaction between the original objective function and the constraint structure within the dual formulation.
Whenever f M = L M Y , the subgradient
g M = b A Y ,
provides the constraint residual, which is essential for bundle-based subgradient updates.
The Lagrangian dual problem is then as follows:
max Y ε   min M   L M Y =   min M   max Y ε   L M Y = min M   f M .
Under standard convexity conditions, the equality between the primal and dual optima holds due to strong duality. To approximate the dual function computationally, a bundle of matrices Y 1 , , Y k     E is employed, and the following approximation is defined:
f appr M = max { L M Y : Y   c o n v ( Y 1 , , Y k ) } .
The feasible set is now restricted to a polyhedral subset, reducing computational complexity. Each Y     c o n v ( Y 1 ,   ,   Y k ) can be expressed as a convex combination Y = i = 1 k λ i Y i , where λ     Λ = { λ     0 ,   e T λ = 1 } .
At each iteration, a regularized minimization is performed to stabilize updates:
min M   f a p p r M + 1 2 t M M ^ 2 ,
where > 0 and the proximal term 1 2 t M M ^ 2 stabilizes convergence by penalizing large deviations from the current center M ^ . This formulation ensures smoothness and convergence through proximal regularization.
Introducing notation: define γ λ = i = 1 k λ i Y i , G = ( g 1 , , g k ) R L × k , and F i = Q L , Y i . Then, f a p p r M is as follows:
f a p p r M = max λ Λ   b T M + Q L A T M , γ λ = max b A γ λ , M + Q L , γ λ λ Λ = m a x λ Λ   M T G λ + F T λ
This linear reformulation in λ enables an efficient evaluation of the approximate dual function at each iteration.
In the following, a detailed outline of the algorithm developed to solve the semidefinite relaxation of the max-cut problem, as formulated in Equation (14), is presented.

2.6. Convergence of the Method

Problem (25) to be solved can be defined by the following:
min M   f appr M + 1 2 t M M ^   2 = min M max λ Λ M T + F T λ + 1 2 t M M ^   2 = m a x m i n M λ Λ M T G λ + F T λ + 1 2 t M M ^ 2
Also, in Equation (26), the inner product is a convex quadratic unconstrained problem in M ; then, by sitting ( . ) x = 0 , the minimizer is obtained:
x ( M T G λ + F T λ + 1 2 t M M ^ 2 ) = 0 G λ + 1 t M M ^ = 0 M = M ^ t G λ
By substituting Equation (28) into Equation (27), the following result can be derived:
max λ Λ M T G λ + F T λ + 1 2 t M M ^   2 = max λ Λ ( M ^ t G λ ) T G λ + F T λ + 1 2 t M ^ t G λ M ^ 2 = max λ Λ M ^ T G λ t G λ 2 + F T λ + t 2 G λ 2 = max λ Λ ( G T M ^ + F ) T λ t 2 G λ   2
This convex quadratic problem over Λ can be solved more efficiently using an interior point approach. Consequently, the convergence of Algorithm 2 is supported by Robinson’s analysis within the convergence theory for the bundle approach [27].
Algorithm 2. Our proposed technique for Solving M C R E L A X
Input: Define Q L , A and b,
                     with initial point M ^ R m (optimal),
                     and parameters t, α and ε.
Start: i = 1 , done = false.
                  Evaluate f at M ^ .
                            Solve max Q L A T M ^ , Y s.t. Y ε givining M ^ ,
                             f M ^ = b T M ^ + Q L A T M ^ , Y ^ ,
                            Subgradient G = g M ^ = b A ( Y ^ ) .
Repeat: solve (25), which is minimized (26) and obtain λ .
                         M t e s t = M ^ t G λ .
                         f a p p r M t e s t = ( F + G T M t e s t ) T λ .
                        if i i t e r m a x and f M ^ f a p p r M t e s t > Ɛ
                              Evaluate f at M t e s t .
                                  Solve max Q L A T M , Y s.t. Y Ɛ givining Y t e s t ,
                             f t e s t = b T M t e s t + Q L A T M t e s t , Y t e s t ,
                            Subgradient g t e s t = b A ( Y t e s t ) .
                      if f t e s t α f a p p r M t e s t + ( 1 α ) f M ^
                                  Serious step: M ^ = M t e s t
                                  Increase t
                      else
                                  Null step: decrease t .
                                  Append Y t e s t to γ , g t e s t to G and Q L , Y t e s t to F .
                                   i = i + 1 .
                      else
                          done
Algorithm 2 is more efficient for solving graphs containing a star because it leverages the relaxation method ( M C R E L A X ) . This method possesses a significant property: the bound it provides is at least as strong as the bound obtained from solving ( M C B A S I C ). This is formally demonstrated in the following theorem.
Theorem 1.
Suppose there exists a vertex u V ( G ) such that d e g ( u ) = n 1 . Then, the upper bound obtained from M C R E L A X is at least as strong as the bound from ( M C B A S I C ).
Proof of Theorem 1.
Let Y be the optimal solution to the relaxation problem ( M C R E L A X ) and u     V ( G ) with d e g u = n 1 . Define the matrix X     S m ,   w h e r e   X = ( x i j )   is given by the following:
x i j = Y i , u , j , u   ,       i f   i     u   a n d   j     u Y i , u , ,         ,       i f   i     u   a n d   j = u Y , ,         ,       i f   i = j = u   ,
For all i , j V ( G ) . That is, X is the principal submatrix of Y formed by selecting the rows and columns indexed by { { 1 , u } ,   { 2 ,   u } ,   , { u 1 , u } ,   0 ,   { u ,   u + i } ,   , { u ,   n } } . Since Y is a solution of ( M C R E L A X ), we have d i a g Y = e ; it follows that d i a g X = e .
Furthermore, because X is the principal submatrix of Y , and Y is a positive semidefinite matrix, this implies that X is also positive semidefinite. Furthermore, we obtain 1 4 L ,   X = Q L ,   Y . Hence, X is a feasible solution for ( M C B A S I C ) , and consequently, the optimal value of ( M C B A S I C ) is at least Q L ,   Y . □

2.7. BiqMac and BiqBin Solvers

The BiqMac and BiqBin solvers are widely recognized as two of the most potent techniques for tackling binary quadratic problems. The foundation of BiqMac is the enhanced SDP relaxation. By solely dialyzing the triangle inequality requirements with dual variable γ     0 , the authors derived the partial dual function:
B i q M a c f γ = e T γ + max L B T γ , X subject   to   diag X = e X     0
Assessing the dual function and calculating a subgradient necessitates resolving a semidefinite program of the model ( M C B A S I C ) , which can be efficiently handled by utilizing an interior-point approach specifically designed for the problem. To approximate the minimizer of the dual problem,
B i q M a c D min f ( γ ) subject   to   γ     0
The bundle approach is employed. BiqBin further strengthens this by dialyzing both pentagonal and heptagonal inequalities. Consequently, the bundle approach is employed to optimize the partial dual function of ( M C H Y P ) , providing an even more refined approach to solving binary quadratic problems.

3. Results

In this test, the proposed method was compared with two semidefinite exact solvers: BiqBin and BiqMac. A wide variety of test problems (or graphs) were collected from the BiqMac library. The instances of those problems were taken from sources [24,25]. Here, the numerical results of the proposed approach, along with those of BiqMac and BiqBin, are presented for the aforementioned graphs. Throughout this section, the dimension, the number of edges, and the density of the graph are denoted by n , m , and d , respectively.

3.1. Experimental Setup

All the computational experiments were conducted on a personal workstation equipped with an Intel Core i7-12700H processor (14 cores, 20 threads), 32 GB of RAM, and the 64-bit version of Windows 11. The proposed algorithm, along with the baseline solvers BiqMac and BiqBin, was implemented in Python 3.10 using standard numerical libraries, including NumPy and CVXPY.
To ensure statistical reliability, each problem instance was executed five times under identical hardware and software conditions. The reported CPU time reflects the mean value, accompanied by the standard deviation. As all the algorithms considered in this study are deterministic, the variation across runs was negligible. Nonetheless, pairwise comparisons using the Wilcoxon signed-rank test were performed on selected performance metrics to further ensure robustness and fairness in the evaluation.
Additionally, three key metrics were used to evaluate the performance: (1) the CPU time, which measures the elapsed wall-clock time and reflects the computational efficiency under consistent system conditions; (2) the number of function calls, indicating the algorithmic cost in evaluating the objective function or its gradient; and (3) the number of iterations, highlighting the convergence behavior and algorithmic stability. Collectively, these metrics provide a comprehensive assessment of the computational and optimization performance, enabling a robust and balanced comparison across methods.

3.2. Numerical Results of Instances Introduced by Glover, Kockenberger, and Alidaee

In Table 1, Table 2 and Table 3, the set of instances introduced by Glover, Kockenberger, and Alidaee (denoted by gka) were applied as shown. The properties of the applied problems of the numerical results are outlined in the following points:
  • The collection of instances represented by gka_i_c is characterized by n ∈ [40, 100] and d ∈ [0.1, 0.8]. Also, the diagonal and off-diagonal coefficients are located in the intervals [−100, 100] and [−50, 50], respectively.
  • The collection of instances represented by gka_i_d is characterized by n = 100 and d ∈ [0.1, 0.8]. Also, the diagonal and off-diagonal coefficients are located in the intervals [−100, 100] and [−50, 50], respectively.
  • The collection of instances represented by gka_i_e is characterized by n = 200 and d ∈ [0.1, 0.5]. Moreover, their diagonal and off-diagonal coefficients are located in the intervals [−100, 100] and [−50, 50], respectively.
Table 1, Table 2 and Table 3 present the raw performance metrics obtained from solving instances of the gka benchmark sets using our proposed method and the BiqMac and BiqBin solvers. These metrics include the number of iterations, the number of function calls, and the CPU time required to reach convergence across a range of instance sizes and densities.
To statistically validate the performance differences, the Wilcoxon signed-rank test was applied to the CPU time results between our proposed method and each baseline (BiqMac and BiqBin) across all problem sets. This non-parametric test was selected due to its robustness and suitability for paired comparisons of performance measures without assuming normality. The test results, which are summarized in Table 4, indicate that the observed improvements were statistically significant in cases (p < 0.05), particularly favoring the bundle method in terms of the computational efficiency.
These findings reinforce the consistency and robustness of the proposed algorithm, supporting its advantage over existing methods when solving gka instances of varying complexity.

3.2.1. Interpretation of Statistical Test Results for gka Instances

The outcomes of the Wilcoxon signed-rank test, summarized in Table 4, provide strong statistical evidence in favor of the proposed method. For all problem sets examined (gka_i_c, gka_i_d, and gka_i_e), the p-values were consistently below the 0.05 significance threshold, indicating that the observed reductions in the CPU time were unlikely due to random variation. Particularly notable are the cases where the W-statistic equaled 0.0 or 1.0, reflecting a consistent dominance of the proposed method across nearly all instance comparisons. These findings highlight the method’s robustness and computational efficiency, reinforcing its suitability as a competitive alternative to existing solvers.

3.2.2. Numerical Results of Graph gka3d

The graph named gka3d represents an instance of Glover, Kockenberger, and Alidaee, characterized by n = 100 , m = 1645 , and an SDP bound of approximately 9261.
In Figure 1, we illustrate the relationship between the CPU time and the bounds to compare the convergence and performance of the proposed method, as well as the BiqMac and BiqBin solvers. Our observations revealed that, at bounds of more than 9590, the BiqMac approach exhibited a faster convergence than the other two methods. However, as the solution neared the SDP bound, our bundle method achieved the fastest convergence. Moreover, the BiqMac approach converged after 0.4279 s and the BiqBin approach converged after 0.3391 s, while only 0.3218 s were required for the convergence by our bundle approach.
Furthermore, Figure 2 illustrates the relationship between the number of function calls and the bounds of the above graph. While the function calls remain unaffected by any other software running concurrently with our solver on the same computer, the CPU time may vary between runs due to the presence of other active software on the system. From the results, we observed that BiqMac initially converged faster than the other two approaches, aligning with the bundle method at a bound of 9693. Beyond this threshold, the proposed bundle method outperformed the others, requiring 922 function calls for convergence, 1083 function calls for BiqBin, and 1156 function calls for BiqMac.
This analysis underscores the efficiency of the proposed bundle approach in handling convergence near SDP bounds.

3.3. Numerical Results of Instances Introduced by Beasley

Experiments were conducted in this test using the Beasley dataset (bqp) from the BiqMac library, specifically the instances denoted as bqp100, bqp250, and bqp500, corresponding to graphs with 100, 250, and 500 nodes, respectively. Each instance has a density of d = 0.1 . The results presented in Table 5, Table 6 and Table 7 provide a comparative analysis of the CPU time, the number of function calls and iterations required to solve the given graph using the proposed method, and the BiqMac and BiqBin solvers.
As shown in Table 8, the results reveal that the proposed method achieved statistically significant improvements in cases (p < 0.05), particularly demonstrating its advantage in computational efficiency across increasing problem sizes.
These outcomes emphasize the reliability and consistency of the proposed algorithm when applied to the bqp benchmark set, further validating its potential as a scalable and effective alternative to existing solvers.

3.3.1. Interpretation of Statistical Test Results for bqp Instances

The results of the Wilcoxon signed-rank test, summarized in Table 8, offer compelling statistical support for the superiority of the proposed method. For all instance categories evaluated (bqp100_i, bqp250_i, and bqp500_i), the p-values fell below the standard 0.05 threshold, indicating that the improvements in the CPU time were unlikely to be due to chance. Especially noteworthy are the comparisons where the W-statistic equaled 0.0 or 1.0, which reflect a consistent performance gain of the proposed method over the baselines across nearly all individual instances.
Together, these findings highlight the method’s robustness and scalability, reinforcing its effectiveness in tackling binary quadratic programming problems of an increasing size and complexity.

3.3.2. Numerical Results of Graph bqp500-1

To illustrate the effectiveness of our approach, we examined the instance bqp500-1, which contains 500 nodes. Figure 3 presents a plot of the CPU time against the bound, with the semidefinite programming (SDP) bound at 121,001. Figure 4 presents a plot of the number of function calls against the bound. From Figure 1 and Figure 2, we observed that the proposed bundle method required 64.0592 s of CPU time to achieve the SDP bound, whereas BiqBin and BiqMac required 74.4438 s and 88.2436 s, respectively. Additionally, our method demonstrated a superior efficiency, requiring only 2102 function calls to reach the SDP bound, while BiqBin and BiqMac required 2435 and 3119 function calls, respectively.

3.4. Numerical Results for the Graph Identified as w0.1_100. i

A performance evaluation of the three methods was carried out using a collection of graphs labeled w0.1_100.i from the BiqMac library, consisting of 10 distinct instances. Each instance is characterized by a graph of dimension n = 100   and edge density d = 0.1 . The integer edge weights were randomly selected from the interval [−10, 10]. Table 9 presents a comparative analysis of the CPU time, the number of function calls, and the number of iterations required to solve the given graph instances using the proposed approach, alongside the BiqMac and BiqBin solvers.
To statistically substantiate the observed performance differences, the Wilcoxon signed-rank test was employed to compare the CPU time between the proposed method and each of the baseline solvers across the 10 problem instances. Table 10 presents the results of this analysis. As observed, the p-values fell well below the 0.05 significance threshold in both comparisons, indicating that the improvements in the CPU time achieved by the proposed method were statistically significant. These results further affirm the computational efficiency and reliability of the proposed approach, particularly when applied to sparse graphs with randomly weighted edges.

Interpretation of Statistical Test Results for w0.1_100.i Instances

The Wilcoxon signed-rank test results summarized in Table 10 provide strong statistical evidence for the performance advantage of the proposed method on the w0.1_100.i instance set. Both comparisons—against BiqBin and BiqMac—yielded p-values below the standard significance level (0.0221 and 0.0347, respectively), reinforcing the conclusion that the CPU time improvements are not attributable to random variation. Remarkably, the W-statistic values of 1.0 and 0.0 reflect near-universal performance superiority across all the evaluated instances.
Collectively, these findings corroborate the method’s robustness, even when applied to uniformly structured, yet randomly weighted, graph models, underscoring its effectiveness as a general-purpose solver for binary quadratic problems.

4. Discussion

To assess the efficacy and scalability of the proposed method, extensive numerical comparisons were conducted on several benchmark families, including the Glover–Kockenberger–Alidaee (gka), Beasley (bqp), and w0.1_100.i instances. These benchmarks comprise diverse graph structures across varying sizes and densities, offering a comprehensive platform for a performance evaluation.
Firstly, a further evaluation of the proposed method performance was conducted on the gka benchmark instances, as presented in Table 1, Table 2 and Table 3. These include problem sets of varying sizes and densities, offering a comprehensive benchmark for an algorithmic comparison.
As shown in Table 1 (gka_i_c with n     [ 40 ,   100 ]), the proposed method achieved the shortest CPU times in five out of seven instances. The average runtime was 0.2596 s, compared to 0.3595 s for BiqMac and 0.3587 s for BiqBin. It also required an average of 34.1 iterations and 38.3 function calls, significantly outperforming BiqBin (54.9/48.1) and BiqMac (42.3/39.4) in terms of the computational effort. This demonstrates the method’s efficiency for graphs with small to moderate dimensions and varying densities.
As detailed in Table 2 (gka_i_d with fixed n = 100 ), the proposed method maintained its advantage, achieving the shortest CPU time in eight out of ten instances. The average runtime was 0.4572 s, while BiqMac and BiqBin recorded 0.5614 and 0.6294 s, respectively. Moreover, the method averaged 52.9 iterations and 1153.5 function calls, once again surpassing BiqMac (66.2/1293.9) and BiqBin (83.0/1403.6). These trends suggest that the proposed approach becomes increasingly efficient as the edge density increases—a critical advantage for real-world graph applications.
In Table 3 (gka_i_e, n = 200 ), the proposed method continued to perform strongly, attaining the best CPU time in four out of five instances. Its average runtime was 1.3927 s, compared to 1.8585 for BiqMac and 1.6869 for BiqBin. It also maintained a reasonable iteration count (110.0) and function calls (1171.2), outperforming BiqMac (121.0/1334.2) and BiqBin (149.2/1542.2). The ability to maintain a low computational overhead even at larger problem scales further confirms the scalability of the proposed method.
These findings collectively underscore the robustness, adaptability, and scalability of our bundle method. Whether the graph is sparse or dense, small or large, the method consistently delivers lower runtimes and fewer evaluations, making it a strong candidate for solving semidefinite relaxations of the max-cut problem under practical constraints.
The performance of the proposed method is now evaluated on the Beasley (bqp) benchmark instances, as shown in Table 5, Table 6 and Table 7. These datasets—bqp100, bqp250, and bqp500—represent graphs of increasing size with a fixed edge density of d = 0.1 , providing a valuable test of scalability and computational resilience.
As shown in Table 5 (bqp100 with n = 100 ), the proposed method achieved the shortest CPU time in seven out of ten cases. The average CPU time was 0.4874 s, outperforming BiqMac (0.5544 s) and BiqBin (0.5970 s). Moreover, the proposed approach required the fewest average number of iterations (56.3) and function calls (1118.3) compared to BiqMac (65.2/1295.2) and BiqBin (72.9/1469.6). These results confirm the method’s efficiency for moderately sized graphs.
In Table 6 (bqp250 with n = 250 ), the proposed method continued to demonstrate a competitive performance. It recorded the shortest CPU time in six out of ten cases, with an average of 2.8098 s, while BiqMac and BiqBin recorded 3.4297 s and 4.1662 s, respectively. The bundle method also required fewer resources in terms of iterations (75.5) and function calls (2445.7) on average, in contrast to BiqMac (77.1/2491.0) and BiqBin (80.0/2936.3). These findings highlight the method’s balanced performance and scalability for larger graphs.
In Table 7 (bqp500 with n = 500 ), the proposed method achieved the shortest CPU time in seven out of ten instances. The average runtime was 45.56 s, significantly lower than BiqMac (56.56 s) and BiqBin (70.30 s). The method also required the lowest average number of iterations (76.9) and function calls (3420.4), outperforming BiqMac (91.3/3512.1) and BiqBin (85.9/3955.7). These results indicate the method’s robustness and sustained efficiency, even at a substantially increased problem scale.
Altogether, these findings reinforce the capability of the proposed bundle method to solve semidefinite relaxations of max-cut efficiently across varying instance sizes. The method consistently achieved reduced runtimes and computational workload compared to established solvers, demonstrating strong practical relevance and scalability.
Finally, the performance of the proposed method was assessed on the w0.1_100.i instances from the BiqMac library. As shown in Table 9, our bundle method consistently outperformed both BiqBin and BiqMac across the ten problem instances. Specifically, the proposed approach achieved the shortest CPU times, with an average time of 0.8717 s compared to 1.1595 s for BiqMac and 1.2295 s for BiqBin. In addition, our method required the fewest function calls and iterations in the majority of instances, demonstrating an improved computational efficiency without compromising the accuracy. These results further underscore the effectiveness of the proposed method for solving graphs with moderate dimensions ( n = 100 , d = 0.1 ), where the proposed approach reliably converges to the SDP bound with a lower computational overhead. The performance on these structurally randomized problems highlights the robustness of the bundle method in handling varied input characteristics.
In summary, the proposed bundle method consistently demonstrated a superior performance across all the tested benchmarks, achieving the lowest runtimes and requiring fewer iterations and function evaluations, even as the problem complexity increased. These results establish the method as a robust and scalable solution for semidefinite relaxations of the max-cut problem. Overall, these results confirm that our method is highly effective for solving large-scale graphs with a substantial number of nodes.

5. Conclusions

This study proposed a novel bundle-based approximation algorithm for solving the max-cut problem via a newly formulated semidefinite relaxation. The method demonstrated strong theoretical convergence and consistently outperformed the solvers BiqMac and BiqBin across a wide range of benchmark instances from the BiqMac library. It achieved lower CPU times, fewer iterations, and reduced function evaluations, particularly for large-scale and dense graphs, thereby confirming its robustness and scalability.
The algorithm’s efficiency stems from its low per-iteration complexity, relying primarily on solving a sparse linear system and projecting onto the nonnegative orthant and the semidefinite cone. These computational advantages make it a promising tool for addressing NP-hard combinatorial optimization problems in practice.
However, this study is not without limitations. The current implementation was tested only on graphs with up to 500 nodes, leaving its performance on significantly larger or real-time instances unverified. Additionally, the method assumes fixed edge densities and does not yet incorporate adaptive mechanisms for varying graph topologies or dynamic data streams.
Future research will focus on extending the algorithm’s applicability to larger-scale and dynamic graphs, integrating parallelization strategies, and exploring hybrid approaches that combine bundle methods with machine learning to guide search directions or predict promising cuts. Investigating tighter relaxations and incorporating additional cutting planes may also further enhance the solution quality.
In conclusion, the proposed method offers a scalable, efficient, and theoretically grounded approach for solving semidefinite relaxations of the max-cut problem. Its consistent performance across diverse benchmarks highlights its potential for broader applications in combinatorial optimization and related fields.

Author Contributions

Conceptualization, F.J.K. and A.S.A.-J.; methodology, F.J.K. and A.S.A.-J.; software, F.J.K.; validation, F.J.K. and A.S.A.-J.; formal analysis, F.J.K.; investigation, F.J.K. and A.S.A.-J.; resources, F.J.K.; data curation, F.J.K. and A.S.A.-J.; writing—original draft preparation, F.J.K. and A.S.A.-J.; writing—review and editing, F.J.K.; visualization, A.S.A.-J.; supervision, F.J.K.; project administration, F.J.K.; funding acquisition, A.S.A.-J. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The data supporting the findings of this study are publicly available at the following link: https://drive.google.com/file/d/1mvw1bwdk395FkVVWl2BqoSGAYoCenOCK/view?usp=drive_link ( accessed on 11 June 2025).

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
PSDpositive semidefinite
SDPsemidefinite programming
L Laplacian matrix
S n set of symmetric matrices
S + n set of PSD matrices
M dual variable
e all-ones vector
Y outer product matrix of cut indicator
Q L relaxation cost matrix
δ S cut set
Λsimplex constraint set
εfeasible SDP matrix set
γ λ approximate dual relaxation cost function
Q L semidefinite programming

References

  1. Hrga, T.; Povh, J. MADAM: A parallel exact solver for max-cut based on Semidefinite programming and ADMM. Comput. Optim. Appl. 2021, 80, 347–375. [Google Scholar] [CrossRef]
  2. Liao, F.Y.; Ding, L.; Zheng, Y. An overview and comparison of spectral bundle methods for primal and dual semidefinite programs. arXiv 2023. [Google Scholar] [CrossRef]
  3. Habibi, S.; Kočvara, M.; Stingl, M. Solving Lasserre Relaxations of Unconstrained Binary Quadratic Optimization Problems by an Interior-Point Method; Springer: Berlin/Heidelberg, Germany, 2023. [Google Scholar]
  4. Wang, R.S.; Wang, L.M. Maximum cut in fuzzy nature: Models and algorithms. J. Comput. Appl. Math. 2010, 234, 240–252. [Google Scholar] [CrossRef]
  5. Jia, X.; Kanzow, C.; Mehlitz, P.; Wachsmuth, G. An augmented Lagrangian method for optimization problems with structured geometric constraints. Math. Program. 2023, 199, 1365–1415. [Google Scholar] [CrossRef]
  6. Commander, C.W. Maximum cut problem, MAX-cut. In Encyclopedia of Optimization; Springer: Boston, MA, USA, 2009; Volume 2. [Google Scholar]
  7. Muñoz-Arias, M.H.; Kourtis, S.; Blais, A. Low-depth Clifford circuits approximately solve MaxCut. Phys. Rev. Res. 2024, 6, 023294. [Google Scholar] [CrossRef]
  8. Wang, J.; Wu, C.; Zuo, F. More on greedy construction heuristics for the MAX-CUT problem. arXiv 2023. [Google Scholar] [CrossRef]
  9. Dolezal, O.; Hofmeister, T.; Lefmann, H. A Comparison of Approximation Algorithms for the MAXCUT-Problem. Research Report; Universität Dortmund: Dortmund, Germany, 2001. [Google Scholar]
  10. Angell, R.; McCallum, A. Fast, Scalable, Warm-Start Semidefinite Programming with Spectral Bundling and Sketching. arXiv 2023, arXiv:2312.11801. [Google Scholar]
  11. Charfreitag, J.; Mallach, S.; Mutzel, P. Integer programming for the maximum cut problem: A refined model and implications for branching. In Proceedings of the SIAM Conference on Applied and Computational Discrete Algorithms (ACDA23), Seattle, WA, USA, 31 May–2 June 2023; pp. 63–74. [Google Scholar]
  12. Hrga, T.; Povh, J. Solving SDP relaxations of Max-Cut problem with large number of hypermetric inequalities by L-BFGS-B. Optim. Lett. 2023, 17, 1201–1213. [Google Scholar] [CrossRef]
  13. Lu, C.; Deng, Z.; Fang, S.C.; Xing, W. A New Global Algorithm for Max-Cut Problem with Chordal Sparsity. J. Optim. Theory Appl. 2023, 197, 608–638. [Google Scholar] [CrossRef]
  14. Gruber, G.; Rendl, F. The bundle method for hard combinatorial optimization problems. In Proceedings of the Combinatorial Optimization—Eureka, You Shrink! Papers Dedicated to Jack Edmonds 5th International Workshop, Aussois, France, 5–9 March 2001; Springer: Berlin/Heidelberg, Germany, 2003; pp. 78–88. [Google Scholar]
  15. Rendl, F.; Rinaldi, G.; Wiegele, A. Solving max-cut to optimality by intersecting semidefinite and polyhedral relaxations. Math. Program. 2010, 121, 307–335. [Google Scholar] [CrossRef]
  16. Gu, S.; Yang, Y. A deep learning algorithm for the max-cut problem based on pointer network structure with supervised learning and reinforcement learning strategies. Mathematics 2020, 8, 298. [Google Scholar] [CrossRef]
  17. Avinash, B.; Hritiz, G.; Vishnu, N.; Abhishek, P. On exactness of semidefinite programming relaxation for the maximum cut problem. arXiv 2025. [Google Scholar] [CrossRef]
  18. Helmberg, C.; Weismantel, R. Cutting Plane Algorithms for Semidefinite Relaxations; The American Mathematical Society: Providence, RI, USA, 1997. [Google Scholar]
  19. Alridha, A.H.; Al-Jilawi, A.S. Solving NP-hard problem using a new relaxation of approximate methods. Int. J. Health Sci. 2022, 6, 523–536. [Google Scholar] [CrossRef]
  20. Helmberg, C. An Interior Point Method for Semidefinite Programming and Max-Cut Bounds. Research Report; Technische Universität Graz: Graz, Austria, 1994. [Google Scholar]
  21. Liao, S.C.; Leonid, A.; Hemati, M.S.; Seiler, P.J. A convex optimization approach to compute trapping regions for lossless quadratic systems. Int. J. Robust Nonlinear Control. 2025, 35, 2425–2436. [Google Scholar] [CrossRef]
  22. Kathuria, T. Improved Interior Point Methods for Some Structured Combinatorial Problems. Ph.D. Thesis, UC Berkeley, Berkeley, CA, USA, 2023. [Google Scholar]
  23. Sezginler, S. An SDP Approximation for Quadratic Binary Problem with Arbitrary Weight Matrix. Ph.D. Thesis, Tilburg University, Tilburg, The Netherlands, 2021. [Google Scholar]
  24. Wiegele, A. Nonlinear optimization techniques applied to combinatorial optimization Problems. Ph.D. Thesis, The University of Klagenfurt, Klagenfurt, Austria, 2006; pp. 1–131. [Google Scholar]
  25. Al-Jilawi, A. Solving the Semidefinite Programming Relaxation of Maxcut Using an Augmented Lagrangian Method; Northern Illinois University: DeKalb, IL, USA, 2019. [Google Scholar]
  26. Karmitsa, N.; Joki, K.; Airola, A.; Pahikkala, T. Limited memory bundle DC algorithm for sparse pairwise kernel learning. J. Glob. Optim. 2025, 92, 55–85. [Google Scholar] [CrossRef]
  27. Robinson, S.M. Bundle-based decomposition: Conditions for convergence. Ann. Inst. Henri Poincare-Analyse Non Lineaire 1989, 6, 435–447. [Google Scholar] [CrossRef]
Figure 1. Comparison of the CPU time of our bundle method, BiqMac, and BiqBin on the gka3d problem.
Figure 1. Comparison of the CPU time of our bundle method, BiqMac, and BiqBin on the gka3d problem.
Appliedmath 05 00092 g001
Figure 2. Comparison of the function calls of our bundle method, BiqMac, and BiqBin on the gka3d problem.
Figure 2. Comparison of the function calls of our bundle method, BiqMac, and BiqBin on the gka3d problem.
Appliedmath 05 00092 g002
Figure 3. Comparison of the CPU time of our bundle method, BiqMac, and BiqBin on the bqp500.1 problem.
Figure 3. Comparison of the CPU time of our bundle method, BiqMac, and BiqBin on the bqp500.1 problem.
Appliedmath 05 00092 g003
Figure 4. Comparison of the function calls of our bundle method, BiqMac, and BiqBin on the bqp500.1 problem.
Figure 4. Comparison of the function calls of our bundle method, BiqMac, and BiqBin on the bqp500.1 problem.
Appliedmath 05 00092 g004
Table 1. The number of iterations (iter), the number of function calls (fcalls), and the CPU time to solve gka_i_c problems.
Table 1. The number of iterations (iter), the number of function calls (fcalls), and the CPU time to solve gka_i_c problems.
ProblemBiqBin MethodBiqMac MethodOur Bundle Method
gka_i_cntime (s)fcallsitertime (s)fcallsitertime (s)fcallsiter
1400.084413180.094418200.07631723
2500.127417290.135723210.11081620
3600.348132520.336636440.29622830
4700.390350480.406340430.30753335
5800.458277860.326929620.31012048
6900.495353550.337848480.28535039
71000.603293960.290478580.43076654
Table 2. The number of iterations (iter), the number of function calls (fcalls), and the CPU time to solve gka_i_d problems.
Table 2. The number of iterations (iter), the number of function calls (fcalls), and the CPU time to solve gka_i_d problems.
ProblemBiqBin MethodBiqMac MethodOur Bundle Method
gka_i_dntime (s)fcallsitertime (s)fcallsitertime (s)fcallsiter
11000.88511342970.6970853930.6147104576
21000.7244996880.52451019710.509491163
31000.42791156850.33911083730.321892269
41000.45731175740.39061384500.4637136560
51000.53371481980.46121595650.5584151653
61000.62061956700.41191753830.3784103467
71000.72901986870.40482167500.3960151735
81000.40271556410.63391425710.3948111326
91000.59481817510.58371545370.5205148727
101000.3223525820.6669522690.315576553
Table 3. The number of iterations (iter), the number of function calls (fcalls) and the CPU time to solve gka_i_e problems.
Table 3. The number of iterations (iter), the number of function calls (fcalls) and the CPU time to solve gka_i_e problems.
ProblemBiqBin MethodBiqMac MethodOur Bundle Method
gka_i_entime (s)fcallsitertime (s)fcallsitertime (s)fcallsiter
12000.84391020860.8152953880.7388907114
22001.239210421421.2073842910.996374288
32001.704420471321.793514841241.59021346109
42002.319914691772.131911881361.84731038113
52002.327521732092.444622041661.78911823126
Table 4. Wilcoxon signed-rank test results for CPU time comparisons between the proposed method and baseline solvers on gka problems.
Table 4. Wilcoxon signed-rank test results for CPU time comparisons between the proposed method and baseline solvers on gka problems.
ProblemCompared Methodsp-ValueW-Statistic Statistically   Significant   ( p < 0.05 )
gka_i_cProposed method vs. BiqBin0.01551.0Yes
Proposed method vs. BiqMac0.02351.0Yes
gka_i_dProposed method vs. BiqBin0.01970.0Yes
Proposed method vs. BiqMac0.03821.0Yes
gka_i_eProposed method vs. BiqBin0.00590.0Yes
Proposed method vs. BiqMac0.02351.0Yes
Table 5. Number of iterations (iter), number of function calls (fcalls), and CPU time to solve bqp100-i problems.
Table 5. Number of iterations (iter), number of function calls (fcalls), and CPU time to solve bqp100-i problems.
ProblemBiqBin MethodBiqMac MethodOur Bundle Method
bqp100-intime (s)fcallsitertime (s)fcallsitertime (s)fcallsiter
11000.42781342470.339853370.3217104536
21000.7006996870.61151019770.588291170
31000.71811156980.70681083620.490692256
41000.883411758080.50021384680.6616109586
51000.48381481970.48771595630.5305151661
61000.54141956660.51361753650.5092103442
71000.57561986670.54022167670.5334151771
81000.53881556790.53191425600.4216111358
91000.49941817590.50261545590.4878148752
101000.5899929540.5026822340.298176531
Table 6. Number of iterations (iter), number of function calls (fcalls), and CPU time to solve bqp250-i problems.
Table 6. Number of iterations (iter), number of function calls (fcalls), and CPU time to solve bqp250-i problems.
ProblemBiqBin MethodBiqMac MethodOur Bundle Method
Bqp250-intime (s)fcallsitertime (s)fcallsitertime (s)fcallsiter
12503.34022711883.754325041052.9413206189
22505.329433921083.02123035912.4603338375
32506.51262709804.73021928683.71771872116
42506.91122760792.01362412712.1167213264
52506.15242785785.84852637815.2115253894
62503.47152712773.32811945843.0272258468
72504.85451236883.53331145732.9624109280
82503.957539861012.68343830642.6321370168
92501.36292716692.38152707622.3831232764
102502.87392334323.32092077681.6753201337
Table 7. Number of iterations (iter), number of function calls (fcalls), and CPU time to solve bqp500-i problems.
Table 7. Number of iterations (iter), number of function calls (fcalls), and CPU time to solve bqp500-i problems.
ProblemBiqBin MethodBiqMac MethodOur Bundle Method
Bqp500-intime (s)fcallsitertime (s)fcallsitertime (s)fcallsiter
150088.2435311910774.4437243511764.05912102107
250079.801528517861.5212217412671.73531993106
350094.8193402210880.3998419714239.8457419866
450070.964145317651.873939989142.7919375070
550067.201542967228.545440204526.8794380186
650092.5868580010955.569642619539.1479402969
750082.718441988140.001140765935.7738380590
8500115.798387010663.827239397556.9992322270
950055.996740025834.444839365827.8367359692
1050051.866320286437.770229455031.8744240849
Table 8. Wilcoxon signed-rank test results for CPU time comparisons between the proposed method and baseline solvers on bqp problems.
Table 8. Wilcoxon signed-rank test results for CPU time comparisons between the proposed method and baseline solvers on bqp problems.
ProblemCompared Methodsp-ValueW-Statistic Statistically   Significant   ( p < 0.05 )
bqp100-iProposed method vs. BiqBin 0.03200.0Yes
Proposed method vs. BiqMac 0.02881.0Yes
bqp250-iProposed method vs. BiqBin 0.01421.0Yes
Proposed method vs. BiqMac 0.03171.0Yes
bqp500-iProposed method vs. BiqBin 0.00650.0Yes
Proposed method vs. BiqMac 0.02450.0Yes
Table 9. Number of iterations (iter), number of function calls (fcalls), and CPU time to solve w01_100.i problems.
Table 9. Number of iterations (iter), number of function calls (fcalls), and CPU time to solve w01_100.i problems.
ProblemBiqBin MethodBiqMac MethodOur Bundle Method
w01_100.intime (s)fcallsitertime (s)fcallsitertime (s)fcallsiter
11001.47299621041.927312641620.748583399
21000.903319622150.975617331481.18451971171
31001.67368181521.5753868861.083946271
41001.63902011981.35361533670.9326135255
51000.59329631050.76387101240.579060367
61000.82651184830.93861201961.087291194
71000.935814411130.608710291030.594586692
81000.698416191180.88381439910.5639134477
91001.5371862611.4383532470.808369241
101001.004510952200.84977271360.7357693104
Table 10. Wilcoxon signed-rank test results for CPU time comparisons between the proposed method and the baseline solvers on w01_100.i problems.
Table 10. Wilcoxon signed-rank test results for CPU time comparisons between the proposed method and the baseline solvers on w01_100.i problems.
ProblemCompared Methodsp-ValueW-Statistic Statistically   Significant   ( p < 0.05 )
w01_100.iProposed method vs. BiqBin0.02211.0Yes
Proposed method vs. BiqMac0.03470.0Yes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kadhim, F.J.; Al-Jilawi, A.S. A Novel Algorithm Based on the Bundle Method for Solving the Max-Cut Problem. AppliedMath 2025, 5, 92. https://doi.org/10.3390/appliedmath5030092

AMA Style

Kadhim FJ, Al-Jilawi AS. A Novel Algorithm Based on the Bundle Method for Solving the Max-Cut Problem. AppliedMath. 2025; 5(3):92. https://doi.org/10.3390/appliedmath5030092

Chicago/Turabian Style

Kadhim, Fadhl Jawad, and Ahmed Sabah Al-Jilawi. 2025. "A Novel Algorithm Based on the Bundle Method for Solving the Max-Cut Problem" AppliedMath 5, no. 3: 92. https://doi.org/10.3390/appliedmath5030092

APA Style

Kadhim, F. J., & Al-Jilawi, A. S. (2025). A Novel Algorithm Based on the Bundle Method for Solving the Max-Cut Problem. AppliedMath, 5(3), 92. https://doi.org/10.3390/appliedmath5030092

Article Metrics

Back to TopTop