Research article Special Issues

State-and-transition simulation modeling to compare outcomes of alternative management scenarios under two natural disturbance regimes in a forested landscape in northeastern Wisconsin, USA

  • Comparisons of the potential outcomes of multiple land management strategies and an understanding of the influence of potential increases in climate-related disturbances on these outcomes are essential for long term land management and conservation planning. To provide these insights, we developed an approach that uses collaborative scenario development and state-and-transition simulation modeling to provide land managers and conservation practitioners with a comparison of potential landscapes resulting from alternative management scenarios and climate conditions, and we have applied this approach in the Wild Rivers Legacy Forest (WRLF) area in northeastern Wisconsin. Three management scenarios were developed with input from local land managers, scientists, and conservation practitioners: 1) continuation of current management, 2) expanded working forest conservation easements, and 3) cooperative ecological forestry. Scenarios were modeled under current climate with contemporary probabilities of natural disturbance and under increased probability of windthrow and wildfire that may result from climate change in this region. All scenarios were modeled for 100 years using the VDDT/TELSA modeling suite. Results showed that landscape composition and configuration were relatively similar among scenarios, and that management had a stronger effect than increased probability of windthrow and wildfire. These findings suggest that the scale of the landscape analysis used here and the lack of differences in predominant management strategies between ownerships in this region play significant roles in scenario outcomes. The approach used here does not rely on complex mechanistic modeling of uncertain dynamics and can therefore be used as starting point for planning and further analysis.

    Citation: Amanda Swearingen, Jessica Price, Janet Silbernagel, Randy Swaty, Nicholas Miller. State-and-transition simulation modeling to compare outcomes of alternative management scenarios under two natural disturbance regimes in a forested landscape in northeastern Wisconsin, USA[J]. AIMS Environmental Science, 2015, 2(3): 737-763. doi: 10.3934/environsci.2015.3.737

    Related Papers:

    [1] Md Hasanuzzaman, Mohammad Imdad . Relation theoretic metrical fixed point results for Suzuki type $\mathcal{Z_\mathcal{R}}$-contraction with an application. AIMS Mathematics, 2020, 5(3): 2071-2087. doi: 10.3934/math.2020137
    [2] Noor Muhammad, Ali Asghar, Samina Irum, Ali Akgül, E. M. Khalil, Mustafa Inc . Approximation of fixed point of generalized non-expansive mapping via new faster iterative scheme in metric domain. AIMS Mathematics, 2023, 8(2): 2856-2870. doi: 10.3934/math.2023149
    [3] Aftab Hussain . Fractional convex type contraction with solution of fractional differential equation. AIMS Mathematics, 2020, 5(5): 5364-5380. doi: 10.3934/math.2020344
    [4] Muhammad Tariq, Muhammad Arshad, Mujahid Abbas, Eskandar Ameer, Saber Mansour, Hassen Aydi . A relation theoretic m-metric fixed point algorithm and related applications. AIMS Mathematics, 2023, 8(8): 19504-19525. doi: 10.3934/math.2023995
    [5] Ahmed Alamer, Faizan Ahmad Khan . Boyd-Wong type functional contractions under locally transitive binary relation with applications to boundary value problems. AIMS Mathematics, 2024, 9(3): 6266-6280. doi: 10.3934/math.2024305
    [6] Hongyan Guan, Jinze Gou, Yan Hao . On some weak contractive mappings of integral type and fixed point results in $ b $-metric spaces. AIMS Mathematics, 2024, 9(2): 4729-4748. doi: 10.3934/math.2024228
    [7] Fatima M. Azmi . New fixed point results in double controlled metric type spaces with applications. AIMS Mathematics, 2023, 8(1): 1592-1609. doi: 10.3934/math.2023080
    [8] Iqra Shamas, Saif Ur Rehman, Thabet Abdeljawad, Mariyam Sattar, Sami Ullah Khan, Nabil Mlaiki . Generalized contraction theorems approach to fuzzy differential equations in fuzzy metric spaces. AIMS Mathematics, 2022, 7(6): 11243-11275. doi: 10.3934/math.2022628
    [9] Faruk Sk, Faizan Ahmad Khan, Qamrul Haq Khan, Aftab Alam . Relation-preserving generalized nonlinear contractions and related fixed point theorems. AIMS Mathematics, 2022, 7(4): 6634-6649. doi: 10.3934/math.2022370
    [10] Hanadi Zahed, Zhenhua Ma, Jamshaid Ahmad . On fixed point results in $ \mathcal{F} $-metric spaces with applications. AIMS Mathematics, 2023, 8(7): 16887-16905. doi: 10.3934/math.2023863
  • Comparisons of the potential outcomes of multiple land management strategies and an understanding of the influence of potential increases in climate-related disturbances on these outcomes are essential for long term land management and conservation planning. To provide these insights, we developed an approach that uses collaborative scenario development and state-and-transition simulation modeling to provide land managers and conservation practitioners with a comparison of potential landscapes resulting from alternative management scenarios and climate conditions, and we have applied this approach in the Wild Rivers Legacy Forest (WRLF) area in northeastern Wisconsin. Three management scenarios were developed with input from local land managers, scientists, and conservation practitioners: 1) continuation of current management, 2) expanded working forest conservation easements, and 3) cooperative ecological forestry. Scenarios were modeled under current climate with contemporary probabilities of natural disturbance and under increased probability of windthrow and wildfire that may result from climate change in this region. All scenarios were modeled for 100 years using the VDDT/TELSA modeling suite. Results showed that landscape composition and configuration were relatively similar among scenarios, and that management had a stronger effect than increased probability of windthrow and wildfire. These findings suggest that the scale of the landscape analysis used here and the lack of differences in predominant management strategies between ownerships in this region play significant roles in scenario outcomes. The approach used here does not rely on complex mechanistic modeling of uncertain dynamics and can therefore be used as starting point for planning and further analysis.


    The first significant result in metric fixed point theory about contractive mappings, the Banach contraction principle (BCP) was established by S. Banach [1] in 1922. Due to its simplicity, this theorem vest as a conventional research tool in many different fields of mathematics. Then, several researchers proposed various types of fixed point theorems concerning different kinds of contractive mappings, see [2,3,4] and references therein. In 1968, R. Kannan [5] introduced the concept of K-contractions, and then in 1972, S. K Chatterjea [6] initiated the idea of C-contractions.

    Definition 1.1. [5,6] Let $ (X, d) $ be a metric space and $ f $ a self-mapping on $ X $. Then,

    (i) A mapping $ f $ is said to be K-contraction if there exists $ \beta \in [0, \frac{1}{2}) $ such that

    $ d(fx,fy)β[d(x,fx)+d(y,fy)]x,yX;
    $

    (ii) A mapping $ f $ is said to be C-contraction if there exists $ \beta \in [0, \frac{1}{2}) $ such that

    $ d(fx,fy)β[d(x,fy)+d(y,fx)]x,yX.
    $

    Kannan [5] proved that every K-contraction mapping in a complete metric space has a unique fixed point. Chatterjea [6] proved a similar fixed theorem using C-contraction mappings.

    Further, generalizations of C-contraction and K-contraction mappings were introduced by B. S. Choudhury [7] and Razani and Parvaneh [8] respectively as follows:

    Definition 1.2. [7,8] Let $ (X, d) $ be a metric space, $ f: X \rightarrow X $ a self-mapping and $ \phi: [0, \infty)^{2}\rightarrow [0, \infty) $ a continuous mapping with $ \phi(x, y) = 0 $ if and only if $ x = y = 0 $. Then,

    (i) $ f $ is said to be a weak C-contraction if

    $d(fx, fy) \leq \frac{1}{2}[d(x, fy) + d(y, fx)] - \phi(d(x, fy), d(y, fx))$ $\forall$ $x, y\in X$;

    (ii) $ f $ is said to be a weak K-contraction if

    $d(fx, fy) \leq \frac{1}{2}[d(x, fx) + d(y, fy)] - \phi(d(x, fx), d(y, fy))$ $\forall$ $x, y\in X$.

    In 2009, Choudhury [7] established a fixed point theorem using weak C-contraction as follows:

    Theorem 1.3. [7] Every weak C-contraction in a complete metric space has a unique fixed point.

    On the other hand, in 2015, Alam and Imdad [9] established another generalization of the classical Banach contraction principle using an amorphous (arbitrary) binary relation. In this context, many relation-theoretic variants of existing fixed point results have been reported for both linear and nonlinear contractions, see [10,11,12] and references therein. For nonlinear contractions, the underlying binary relation should be transitive. To make the transitivity condition weaker, Alam and Imdad [13] introduced the concept of locally $ f $-transitivity.

    Fixed point theory is used as a requisite tool in investigating the existence and uniqueness of solutions of differential and integral equations, see [14,15,16] and references therein. Also, the fixed point theorems for contractive mappings are used in economics, game theory, and many branches of mathematics. For instance, consider the following integral equation

    $ f(x)=g(x)+x0k(x,s)u(s,f(s))ds,x[0,1].
    $
    (1.1)

    where $ g: [0, 1] \rightarrow \mathbb{R}, $ $ k: [0, 1] \times [0, 1] \rightarrow [0, \infty) $ and $ u : [0, 1] \times \mathbb{R} \rightarrow \mathbb{R} $ are three continuous functions. The Eq (1.1) can be studied by means of fixed point theory in view of the fact that $ f(x) $ is a solution of (1.1) if and only if $ f(x) $ is a fixed point of $ T $ where $ T $ is defined by

    $Tf(x) = g(x) + \int_{0}^{x} k(x, s)u(s, f(s)) ds, x\in [0, 1].$

    This paper aims to establish some coincidence point theorems for weak C-contraction and K-contraction mappings involving a new auxiliary function in a metric space endowed with a locally $ f $-transitive binary relation. We also deduce related fixed point theorems. As a consequence, these results improve and sharpen some existing fixed point results. Further, we give an example that shows the effectiveness of our results.

    In this section, we recall some basic definitions which will be required in proving our main results. We denote $ \mathbb{N} $ $ \cup $ $ \{0\} $ as $ \mathbb{N}_{0} $ throughout the paper.

    Definition 2.1. [17,18] Let $ X $ be a nonempty set and $ (f, g) $ be a pair of self-mappings on $ X $. Then

    (i) an element $ x\in X $ is called a coincidence point of $ f $ and $ g $ if

    $f(x) = g(x)$,

    (ii) if $ x\in X $ is a coincidence point of $ f $ and $ g $ and $ \bar{x}\in X $ such that $ \bar{x} = g(x) = f(x) $, then $ \bar{x} $ is called a point of coincidence of $ f $ and $ g $,

    (iii) if $ x\in X $ is a coincidence point of $ f $ and $ g $ such that $ x = f(x) = g(x) $, then $ x $ is called a common fixed point of $ f $ and $ g $,

    (iv) the pair $ (f, g) $ is said to be commuting if

    $g(fx) = f(gx)$ $\forall$ $x\in X$,

    (v) the pair $ (f, g) $ is said to be weakly compatible (or partially commuting or coincidentally commuting) if $ f $ and $ g $ commute at their coincidence points, i.e.,

    $g(fx) = f(gx)$ whenever $g(x) = f(x)$.

    Definition 2.2. [19] Let $ X $ be a nonempty set. A subset $ \mathcal{R} $ of $ X^2 $ is called a binary relation on $ X $. The subsets, $ X^{2} $ and $ \emptyset $ of $ X^{2} $ are called the universal relation and empty relation respectively.

    Definition 2.3. [9] Let $ \mathcal{R} $ be a binary relation on a nonempty set $ X $. For $ x, y\in X $, we say that $ x $ and $ y $ are $ \mathcal{R} $-comparative if either $ (x, y)\in \mathcal{R} $ or $ (y, x)\in \mathcal{R} $. We denote it by $ [x, y]\in \mathcal{R} $.

    Definition 2.4. [19,20,21,22,23,24] A binary relation $ \mathcal{R} $ defined on a nonempty set $ X $ is called

    (i) amorphous if $ \mathcal{R} $ has no specific property at all,

    (ii) reflexive if $ (x, x)\in \mathcal{R}\; \forall\; x\in X $,

    (iii) symmetric if $ (x, y)\in \mathcal{R} $ $ \implies $ $ (y, x)\in \mathcal{R} $,

    (iv) anti-symmetric if $ (x, y)\in \mathcal{R} $ and $ (y, x)\in \mathcal{R} $ $ \implies $ $ x = y $,

    (v) transitive if $ (x, y)\in \mathcal{R} $ and $ (y, w)\in \mathcal{R} $ $ \implies $ $ (x, w)\in \mathcal{R} $,

    (vi) complete, connected or dichotomous if $ [x, y] $ $ \in $ $ \mathcal{R} $ $ \forall $ $ x, y $ $ \in $ $ X $,

    (vii) a partial order if $ \mathcal{R} $ is reflexive, anti-symmetric and transitive.

    Definition 2.5. [19] Let $ X $ be a nonempty set and $ \mathcal{R} $ be a binary relation on $ X $.

    (i) The inverse, transpose or dual relation of $ \mathcal{R} $, denoted by $ \mathcal{R}^{-1} $ is defined by,

    $\mathcal{R}^{-1}$ $ = $ $\{(x, y) \in X^{2} : (y, x) \in \mathcal{R}\}.$

    (ii) Symmetric closure of $ \mathcal{R} $, denoted by $ \mathcal{R}^{s} $, is defined to be the set $ \mathcal{R} $ $ \cup $ $ \mathcal{R}^{-1} $(i.e., $ \mathcal{R}^{s} = \mathcal{R} \cup \mathcal{R}^{-1} $).

    Proposition 2.6. [9] For a binary relation $ \mathcal{R} $ defined on a nonempty set $ X $,

    $ (x, y) \in \mathcal{R}^{s} \implies [x, y] \in \mathcal{R}. $

    Definition 2.7. [25] Let $ X $ be a nonempty set, $ E \subseteq X $ and $ \mathcal{R} $ be a binary relation on $ X $. Then, the restriction of $ \mathcal{R} $ to $ E $, denoted by $ \mathcal{R}|_{E} $, is defined to be the set $ \mathcal{R} \cap E^{2} $ (i.e. $ \mathcal{R}|_{E} = \mathcal{R} \cap E^{2} $). Indeed, $ \mathcal{R}|_{E} $ is a relation on $ E $ induced by $ \mathcal{R} $.

    Definition 2.8. [9] Let $ X $ be a nonempty set and $ \mathcal{R} $ be a binary relation on $ X $. A sequence $ \{x_{n}\} $ $ \subset $ $ X $ is called $ \mathcal{R} $-preserving if

    $ (x_{n}, x_{n+1}) \in \mathcal{R} \quad \forall \; n \; \in \; \mathbb{N}_{0}. $

    Definition 2.9. [9] Let $ X $ be a nonempty set and $ f $ be a self-mapping on $ X $. A binary relation $ \mathcal{R} $ on $ X $ is called $ f $-closed if $ \forall $ $ x, y\in X $,

    $(x, y) \in \mathcal{R} \implies (fx, fy) \in \mathcal{R}.$

    Definition 2.10. [26] Let $ X $ be a nonempty set and $ f $ and $ g $ be two self-mappings in $ X $. A binary relation $ \mathcal{R} $ defined on $ X $ is called $ (f, g) $-closed if $ \forall $ $ x, y\in X $

    $(gx, gy) \in \mathcal{R}$ $\implies$ $(fx, fy) \in \mathcal{R}$.

    Note that under the restriction $ g = I $, the identity mapping on $ X $, Definition 2.10 reduces to the notion of $ f $-closedness of $ \mathcal{R} $ defined in Definition 2.9.

    Definition 2.11. [26] Let $ (X, d) $ be a metric space and $ \mathcal{R} $ be a binary relation on $ X $. We say that $ (X, d) $ is $ \mathcal{R} $-complete if every $ \mathcal{R} $-preserving Cauchy sequence in $ X $ converges.

    Clearly, every complete metric space is $ \mathcal{R} $-complete with respect to a binary relation $ \mathcal{R} $ but not conversely. For instance, Suppose $ X = (-1, 1] $ together with the usual metric $ d $. Notice that $ (X, d) $ is not complete. Now endow $ X $ with the following relation:

    $ \mathcal{R} = \{(x, y)\in X^2: x, y \geq 0\}. $

    Then, $ (X, d) $ is a $ \mathcal{R} $-complete metric space. Particularly, under the universal relation, the notion of $ \mathcal{R} $-completeness coincides with usual completeness.

    Definition 2.12. [26] Let $ (X, d) $ be a metric space and $ \mathcal{R} $ be a binary relation on $ X $ with $ x\in X $. A mapping $ f:X\rightarrow X $ is called $ \mathcal{R} $-continuous at $ x $ if for any $ \mathcal{R} $-preserving sequence $ \{x_{n}\} $ such that $ x_{n} \xrightarrow{d} x, $ we have $ f(x_{n}) \xrightarrow{d} f(x). $ Moreover, $ f $ is called $ \mathcal{R} $-continuous if it is $ \mathcal{R} $-continuous at each point of $ X $.

    Clearly, every continuous mapping is $ \mathcal{R} $-continuous under any binary relation $ \mathcal{R} $. Particularly, under the universal, relation the notion of $ \mathcal{R} $-continuity coincides with usual continuity.

    Definition 2.13. [27,28] Let $ (X, d) $ be a metric space and $ (f, g) $ be a pair of self-mappings on $ X $. The the pair $ (f, g) $ is said to be compatible if

    $\lim\limits_{n\to\infty}d(gfx_{n}, fgx_{n}) = 0, $

    whenever $ \{x_{n}\} $ is a sequence in $ X $ such that

    $\lim\limits_{n\to\infty}g(x_{n}) = \lim\limits_{n\to\infty} f(x_{n}).$

    Definition 2.14. [26] Let $ (X, d) $ be a metric space and $ \mathcal{R} $ be a binary relation on $ X $ and let $ f $ and $ g $ be two self-mappings on $ X $. Then the mappings $ f $ and $ g $ are $ \mathcal{R} $-compatible if for any sequence $ \{x_{n}\} \subset X $ such that $ \{fx_{n}\} $ and $ \{gx_{n}\} $ are $ \mathcal{R} $-preserving and $ \lim\limits_{n\to\infty}gx_{n} = \lim\limits_{n\to\infty}fx_{n} $, we have

    $ \lim\limits_{n\to\infty}d(gfx_{n}, fgx_{n}) = 0. $

    Remark 2.15. [26] In a metric space $ (X, d) $ endowed with a binary elation $ \mathcal{R} $,

    $ {\text{commutativity}} \Rightarrow {\text{compatibility}} \Rightarrow {\cal R} - {\text{compatibility}} \Rightarrow {\text{weakcompatibility}}. $

    In particular, under the universal relation, the notion of $ \mathcal{R} $-compatibility coincides with usual compatibility.

    Definition 2.16. [9] Let $ (X, d) $ be a metric space. A binary relation $ \mathcal{R} $ defined on $ X $ is called $ d $-self-closed if whenever $ \{x_{n}\} $ is an $ \mathcal{R} $-preserving sequence and

    $ x_{n} \xrightarrow{d} x, $

    then there exists a subsequence $ \{x_{n_{k}}\} $ of $ \{x_{n}\} $ with $ [x_{n_{k}}, x] $ $ \in $ $ \mathcal{R} $ $ \forall $ $ k $ $ \in $ $ \mathbb{N}_{0}. $

    Definition 2.17. [26] Let $ (X, d) $ be a metric space, and let $ g $ be a self-mapping on $ X $. A binary relation $ \mathcal{R} $ defined on $ X $ is called $ (g, d) $-self-closed if for any $ \mathcal{R} $-preserving sequence $ \{x_{n}\} $ such that $ \{x_{n}\} \rightarrow x $, there exists a subsequence $ \{x_{n_{k}}\} $ of $ \{x_{n}\} $ with $ [gx_{n_{k}}, gx] \in \mathcal{R} $ $ \forall $ $ k\in \mathbb{N}_{0} $.

    Note that under the restriction $ g = I $, the identity mapping on $ X $, Definition 2.17 reduces to the notion of $ d $-self-closedness of $ \mathcal{R} $.

    Definition 2.18. [29] Given a mapping $ f: X \rightarrow X $, a binary relation $ \mathcal{R} $ defined on $ X $ is called $ f $-transitive if for any $ x, y, z\in X $,

    $(fx, fy), (fy, fz) \in \mathcal{R}$ $\implies$ $(fx, fz) \in \mathcal{R}.$

    Later, Alam and Imdad [13] introduced the concept of locally $ f $-transitivity.

    Definition 2.19. [13] Let $ X $ be a nonempty set, and $ f $ be a self-mapping on $ X $. A binary relation $ \mathcal{R} $ on $ X $ is called locally $ f $-transitive if for each (effectively) $ \mathcal{R} $-preserving sequence $ \{x_{n}\} \subset f(X) $ (with range $ E = \{x_{n}\in \mathbb{N}_{0}\}) $, the binary relation $ \mathcal{R}|_{E} $ is transitive.

    Clearly, for a given self-mapping $ f $ and a binary relation $ \mathcal{R} $ on a nonempty set $ X $,

    ${\text{transitivity}} \Rightarrow f - {\text{transitivity}} \Rightarrow {\text{locally}}\;\;f - {\text{transitivity}}.$

    Definition 2.20. [24] Let $ X $ be a nonempty set and $ \mathcal{R} $ a binary relation on $ X $. A subset $ E $ of $ X $ is called $ \mathcal{R} $-directed if for each $ x, y\in E $, there exists $ z\in X $ such that $ (x, z)\in \mathcal{R} $ and $ (y, z)\in \mathcal{R} $.

    Now we recollect the following lemma which will be required in the proof of our main results.

    Lemma 2.21. [30] Let $ (X, d) $ be a metric space and $ \{x_{n}\} $ be a sequence in $ X $. If $ \{x_{n}\} $ is not a Cauchy sequence, then there exist $ \epsilon > 0 $ and two subsequence $ \{x_{n_{k}}\} $ and $ \{x_{m_{k}}\} $ of $ \{x_{n}\} $ such that

    (i) $ k < m_{k} < n_{k} $ $ \forall $ $ k\in \mathbb{N} $,

    (ii) $ d(x_{m_{k}}, x_{n_{k}}) \geq \epsilon $,

    (iii) $ d(x_{m_{k}}, x_{n_{k}-1}) < \epsilon $.

    In addition to this, if $ \{x_{n}\} $ also satisfies $ \lim\limits_{n\to\infty}d(x_{n}, x_{n+1}) = 0 $, then

    $\lim\limits_{k\to\infty}d(x_{m_{k}}, x_{n_{k}}) = \lim\limits_{k\to\infty}d(x_{m_{k}-1}, x_{n_{k}}) = \lim\limits_{k\to\infty}d(x_{m_{k}}, x_{n_{k}-1}) = \epsilon.$

    Now we are equipped to prove our main results.

    In what follows, we define a family of functions as follows:

    $\Phi = \{\phi : [0, \infty)^{2} \rightarrow [0, \infty) : \phi\; \text{is a function such that} \liminf\limits_{n\to\infty} \phi(a_{n}.b_{n}) > 0\; \text{whenever the pair}\; (a_{n}, b_{n}) \rightarrow \\ (a, b) \neq (0, 0)\}.$

    Consider a function $ \phi: [0, \infty)^2 \rightarrow [0, \infty) $ defined by

    $ \phi(x, y) = {16(x6+3y+1),whenx,y[0,1]1,others.
    $

    Notice that $ \phi \in \Phi $ but $ \phi $ is not continuous, which establishes the fact that the family of functions $ \Phi $ is larger than the family of functions considered by Choudhury [7] and Razani and Parvaneh [8].

    Now we present our first result on the existence of coincidence points under weak C-contractions.

    Theorem 3.1. Let $ (X, d) $ be a $ \mathcal{R} $-complete metric space endowed with a binary relation $ \mathcal{R} $ and $ f $, $ g $ be two self-mappings on $ X $. Suppose that the following conditions hold:

    (a) $ f(X) \subseteq g(X) $,

    (b) $ \mathcal{R} $ is $ (f, g) $-closed and locally f-transitive,

    (c) there exists $ x_{0}\in X $ such that $ (gx_{0}, fx_{0})\in \mathcal{R} $,

    (d) $ f $ and $ g $ are $ \mathcal{R} $-compatible,

    (e) $ g $ is $ \mathcal{R} $-continuous,

    (f) either $ f $ is $ \mathcal{R} $-continuous or $ \mathcal{R} $ is $ (g, d) $-self-closed,

    (g) there exists $ \phi \in \Phi $ such that

    $d(fx, fy) \leq \frac{1}{2}[d(gx, fy) + d(gy, fx)] - \phi\big(d(gx, fy), d(gy, fx)\big)$

    $ \forall $ $ x, y\in X $ with $ (gx, gy) \in \mathcal{R}. $

    Then $ f $ and $ g $ have a coincidence point.

    Proof. By assumption $ (c) $, there exists $ x_{0}\in X $ such that $ (gx_{0}, fx_{0})\in \mathcal{R} $. If $ f(x_{0}) = g(x_{0}) $, then we are done. Otherwise, by $ (a) $ we can choose $ x_{1} \in X $ such that $ g(x_{1}) = f(x_{0}) $. Again from $ f(X) \subseteq g(X) $ there exists $ x_{2} \in X $ such that $ g(x_{2}) = f(x_{1}) $. Continuing this process inductively, we can define a sequence $ \{x_{n}\} $ $ \subset $ $ X $ of joint iterates such that

    $ g(xn+1)=f(xn)nN0.
    $
    (3.1)

    Now, we assert that $ \{g{x_{n}}\} $ is a $ \mathcal{R} $-preserving sequence, i.e.,

    $ (gxn,gxn+1)RnN0.
    $
    (3.2)

    We prove the fact by mathematical induction. On using assumption $ (c) $ and Eq (3.1) with $ n = 0 $, we have

    $(gx_{0}, gx_{1}) \in \mathcal{R}.$

    Thus (3.2) holds for $ n = 0 $. Now suppose (3.2) holds for $ n = r > 0 $, i.e.,

    $ (gxr,gxr+1)R,
    $
    (3.3)

    then we have to show that (3.2) holds for $ n = r+1 $. since $ \mathcal{R} $ is $ (f, g) $-closed, we have from (3.3),

    $ (gxr,gxr+1)R(fxr,fxr+1)R(gxr+1,gxr+2)R,
    $

    that is, (3.2) holds for $ n = r+1 $ also. Thus, by induction (3.2) holds $ \forall $ $ n\in\mathbb{N}_{0} $. In view of (3.1) and (3.2), the sequence $ \{fx_{n}\} $ is also $ \mathcal{R} $-preserving, i.e.,

    $ (fxn,fxn+1)RnN0.
    $

    If $ g(x_{n_{0}}) = g(x_{n_{0}+1}) $ for some $ n_{0} \in \mathbb{N} $, then using (3.1) we have $ g(x_{n_{0}}) = f(x_{n_{0}}) $, i.e., $ x_{n_{0}} $ is a coincidence point of $ f $ and $ g $ and hence we are done.

    On the other hand, if $ g(x_{n}) \neq g(x_{n+1}) $ $ \forall $ $ n\in \mathbb{N}_{0} $ then $ d(gx_{n}, gx_{n+1}) \neq 0 $, then we can define a sequence $ \{d_{n}\}^{\infty}_{n = 0} $ $ \subset $ $ (0, \infty) $ by

    $ dn=d(gxn,gxn+1).
    $

    Applying (3.1), (3.2) and assumption $ (g) $,

    $ dn+1=d(gxn+1,gxn+2)=d(fxn,fxn+1)12[d(gxn,fxn+1)+d(gxn+1,fxn)]ϕ(d(gxn,fxn+1),d(gxn+1,fxn))12[d(gxn,gxn+2)+d(gxn+1,gxn+1)]ϕ(d(gxn,gxn+2),d(gxn+1,gxn+1))=12d(gxn,gxn+2)ϕ(d(gxn,gxn+2),0)
    $
    (3.4)
    $ 12d(gxn,gxn+2)
    $
    (3.5)
    $ 12d(gxn,gxn+1)+12d(gxn+1,gxn+2)
    $
    (3.6)

    which gives

    $ dn+112dn+12dn+1dn+1dn.
    $

    Therefore, the sequence $ \{d_{n}\} $ is a decreasing sequence of non-negative real numbers and hence it is convergent. Suppose there exists $ r \geq 0 $ such that

    $ dnr,i.e.,d(gxn,gxn+1)r.
    $
    (3.7)

    We will show that $ r = 0 $. Suppose $ r > 0 $, then letting $ n\to\infty $ in (3.5) and (3.6) we get

    $ rlimn12d(gxn,gxn+2)12(r+r)=rlimnd(gxn,gxn+2)=2r.
    $
    (3.8)

    Again, taking upper limit in (3.4) and using (3.7) and (3.8), we get

    $ lim supnd(gxn+1,gxn+2)lim supn12d(gxn,gxn+2)+lim supn(ϕ(d(gxn,gxn+2),0)).
    $

    Using the fact that for any sequence $ \{x_{n}\} $, $ \limsup (-x_{n}) = -\liminf(x_{n}) $, we get

    $ lim supnd(gxn+1,gxn+2)12lim supnd(gxn,gxn+2)lim infnϕ(d(gxn,gxn+2),0)r12.2rlim infnϕ(d(gxn,gxn+2),0)
    $

    which gives $ \liminf\limits_{n\to\infty}\phi(d(gx_{n}, gx_{n+2}), 0) \leq 0 $ which is a contradiction to the property of $ \phi $, since $ (d(gx_{n}, gx_{n+2}), 0) $ $ \rightarrow $ $ (2r, 0)\neq (0, 0) $. Hence,

    $ limnd(gxn,gxn+1)=0.
    $
    (3.9)

    Now, we show that $ \{gx_{n}\} $ is a Cauchy sequence. Suppose that $ \{gx_{n}\} $ is not a Cauchy sequence. Therefore, by Lemma 2.21, there exist $ \epsilon > 0 $ and two subsequences $ \{gx_{n_{k}}\} $ and $ \{gx_{m_{k}}\} $ such that

    $ d(gxmk,gxnk)ϵ
    $
    (3.10)

    for $ n_{k} > m_{k} > k $, further, corresponding to $ m_{k} $ we can choose $ n_{k} $ in such a way that it is the smallest integer $ n_{k} > m_{k} $ and satisfy (3.10). Then,

    $ d(gxmk,gxnk1)<ϵ.
    $
    (3.11)

    Further, in view of (3.9), (3.10), (3.11) and Lemma 2.21, we have

    $ limnd(gxmk,gxnk)=limnd(gxmk,gxnk1)=limnd(gxmk1,gxnk)=ϵ.
    $
    (3.12)

    As $ \{gx_{n}\} $ is $ \mathcal{R} $-preserving and $ \{gx_{n}\} \subseteq f(X) $, by the local $ f $-transitivity of $ \mathcal{R} $, we have $ (gx_{m_{k}}, gx_{n_{k}}) \in \mathcal{R} $. Hence, applying contractivity condition $ (g) $, we obtain

    $ (gxmk,gxnk)=d(fxmk1,fxnk1)12[d(gxmk1,fxnk1)+d(gxnk1,fxmk1)]ϕ(d(gxmk1,fxnk1),d(gxnk1,fxmk1))=12[d(gxmk1,gxnk)+d(gxnk1,gxmk)]ϕ(d(gxmk1,gxnk),d(gxnk1,gxmk)).
    $

    Taking the upper limit in the above equation and in view of (3.12), we get

    $ limsupnd(gxmk,gxnk)12[limsupnd(gxmk1,fxnk1)+limsupnd(gxnk1,fxmk1)]+limsupn(ϕ(d(gxmk1,fxnk1),d(gxnk1,fxmk1)))
    $

    Since for any sequence $ \{x_{n}\} $, $ \limsup (-x_{n}) = -\liminf(x_{n}) $, we get using (3.12)

    $ ϵ12(ϵ+ϵ)lim infnϕ(d(gxmk1,fxnk1),d(gxnk1,fxmk1))
    $
    $ lim infnϕ(d(gxmk1,fxnk1),d(gxnk1,fxmk1))0
    $

    which is a contradiction to the property of $ \phi $, since

    $ (d(gx_{m_{k}-1}, fx_{n_{k}-1}), d(gx_{n_{k}-1}, fx_{m_{k}-1})) \rightarrow (\epsilon, \epsilon) \neq (0, 0). $

    Hence, $ \{gx_{n}\} $ is a Cauchy sequence. Now since $ \{gx_{n}\} $ is a $ \mathcal{R} $-preserving sequence and $ X $ is $ \mathcal{R} $-complete, $ \{gx_{n}\} $ converges to an element $ z\in X $, i.e.,

    $ limng(xn)=z.
    $
    (3.13)

    Also, from (3.1),

    $ limnf(xn)=z.
    $
    (3.14)

    By $ \mathcal{R} $-continuity of $ g $,

    $ limng(gxn)=g(limngxn)=g(z).
    $
    (3.15)

    Utilizing (3.14) and $ \mathcal{R} $-continuity of $ g $,

    $ limng(fxn)=g(limnfxn)=g(z).
    $
    (3.16)

    Since $ \{fx_{n}\} $ and $ \{gx_{n}\} $ are $ \mathcal{R} $-preserving and

    $ limnfxn=limngxn=z,
    $

    by the $ \mathcal{R} $-compatibility of $ f $ and $ g $,

    $ limnd(gfxn,fgxn)=0.
    $
    (3.17)

    Now, we prove that $ z $ is a coincidence point of $ f $ and $ g $.

    Suppose that $ f $ is $ \mathcal{R} $-continuous. Using (3.2), (3.13) and $ \mathcal{R} $-continuity of $ f $,

    $ limnf(gxn)=f(limngxn)=f(z).
    $
    (3.18)

    Applying (3.16), (3.17) and continuity of $ d $,

    $ d(gz,fz)=d(limngfxn,limnfgxn)=limnd(gfxn,fgxn)=0
    $

    so that $ g(z) = f(z) $. Hence, $ z $ is a coincidence point of $ f $ and $ g $.

    Alternately, suppose that $ \mathcal{R} $ is $ (g, d) $-self-closed. As $ \{gx_{n}\} $ is $ \mathcal{R} $-preserving and $ gx_{n} \rightarrow z $, due to $ (g, d) $-self-closedness of $ \mathcal{R} $, there exists a subsequences $ \{gx_{n_{k}}\} $ of $ \{gx_{n}\} $ such that

    $ [ggxnk,gz]RkN0.
    $
    (3.19)

    Since $ gx_{n_{k}} \rightarrow z $, Eqs (3.13)–(3.17) also holds for $ \{x_{n_{k}}\} $ instead of $ \{x_{n}\} $. In view of (3.19) and using assumption $ (g) $, we get

    $ d(fgxnk,fz)12[d(ggxnk,fz)+d(gz,fgxnk)]ϕ(d(ggxnk,fz),d(gz,fgxnk))12[d(ggxnk,fz)+d(gz,fgxnk)]12[d(ggxnk,fz)+d(gz,gfxnk)+d(gfxnk,fgxnk)].
    $
    (3.20)

    Now using triangle inequality and (3.20) we get

    $ (gz,fz)d(gz,gfxnk)+d(gfxnk,fgxnk)+d(fgxnk,fz)d(gz,gfxnk)+d(gfxnk,fgxnk)+12[d(ggxnk,fz)+d(gz,gfxnk)+d(gfxnk,fgxnk)].
    $

    Letting $ k\to\infty $ in the above equation, we get

    $ d(gz,fz)d(gz,gz)+12[d(gz,fz)+d(gz,gz)]12d(gz,fz)12d(gz,fz)0
    $

    which gives $ d(gz, fz) = 0 $, i.e, $ z $ is a coincidence point of $ f $ and $ g $.

    Theorem 3.2. In addition to Theorem 3.1, if we consider the following condition:

    (h) $ f(X) $ is $ \mathcal{R}^{s}_{g(X)} $-directed,

    then $ f $ and $ g $ have a unique point of coincidence.

    Proof. Suppose there exist $ x, y\in X $ such that

    $ f(x)=g(x)=ˉxandf(y)=g(y)=ˉy.
    $
    (3.21)

    We show that $ \bar{x} = \bar{y} $. As $ f(x), f(y) \in f(X) \subseteq g(X) $, by assumption $ (h) $, there exist $ g(z) $ such that

    $ [fx,gz]R[gx,gz]R
    $
    (3.22)

    and

    $ [fy,gz]R[gy,gz]R.
    $
    (3.23)

    Now define the constant sequences: $ z^{0}_{n} = x $ and $ z^{2}_{n} = y $ $ \forall n\in \mathbb{N}_{0}, $ then using (3.21),

    $ g(z0n+1)=f(z0n)=ˉx,
    $
    (3.24)
    $ g(z2n+1)=f(z2n)=ˉy.
    $
    (3.25)

    Suppose $ z^{1}_{0} = z $. Since $ f(X) \subseteq g(X) $, we can define a sequence $ \{z^{1}_{n}\} $ such that $ g(z^{1}_{n+1}) = f(z^{1}_{n}) $ $ \forall $ $ n\in \mathbb{N}_{0}. $ Therefore,

    $ g(zin+1)=f(zin)nN0andi=0,1.
    $
    (3.26)

    We claim that

    $ [g(zin),g(zi+1n)]RnN0andi=0,1.
    $
    (3.27)

    We prove this fact by mathematical induction. It follows from (3.22) and (3.23) that (3.27) holds for $ n = 0 $. Suppose that (3.27) holds for $ n = r > 0 $, i.e.,

    $ [g(zir),g(zi+1r)]Randi=0,1.
    $

    As $ \mathcal{R} $ is $ (f, g) $-closed, we have

    $ [f(zir),f(zi+1r)]Randi=0,1,
    $

    which gives in view of (3.26), we get

    $ [g(zir+1),g(zi+1r+1)]Randi=0,1.
    $

    Therefore, (3.27) holds for $ n = r+1 $ also. Hence, (3.27) holds $ \forall $ $ n\in\mathbb{N}_{0} $. Now in view of (3.27) and using (3.26) and assumption $ (g) $, we get

    $ d(gz0n+1,gz1n+1)=d(fz0n,fz1n)12[d(gz0n,fz1n)+d(gz1n,fz0n)]ϕ(d(gz0n,fz1n),d(gz1n,fz0n))=12[d(gz0n,gz1n+1)+d(gz1n,gz0n+1)]ϕ(d(gz0n,gz1n+1),d(gz1n,gz0n+1))
    $

    which gives

    $ (gz0n+1,gz1n+1)12[d(gz0n+1,gz1n+1)+d(gz1n,gz0n)]ϕ(d(gz0n+1,gz1n+1),d(gz1n,gz0n))
    $
    (3.28)

    which implies

    $ d(gz0n+1,gz1n+1)12[d(gz0n+1,gz1n+1)+d(gz1n,gz0n)]
    $

    which implies

    $ d(gz0n+1,gz1n+1)d(gz0n,gz1n).
    $

    Therefore, the sequence $ \{d(gz^{0}_{n}, gz^{1}_{n})\} $ is decreasing non-negative sequence which converges to a non-negative real number $ r $, i.e,

    $\{d(gz^{0}_{n}, gz^{1}_{n})\}$ $\rightarrow $ $r$.

    We will show that $ r = 0 $. Suppose that $ r > 0 $, then taking upper limit in (3.28) and utilizing the same method as used earlier in this proof, we get

    $ r12(r+r)lim infnϕ(d(gz0n+1,gz1n+1),d(gz1n,gz0n))
    $

    which gives $ \liminf\limits_{n\to\infty}\phi\big(d(gz^{0}_{n+1}, gz^{1}_{n+1}), d(gz^{1}_{n}, gz^{0}_{n})\big) \leq 0 $, which is a contradiction to the property of $ \phi $. Hence,

    $ limnd(gz0n,gz1n)=0.
    $
    (3.29)

    Similarly, we can show that

    $ limnd(gz1n,gz2n)=0.
    $
    (3.30)

    Now, using triangle inequality, (3.24) and (3.25), we get

    $ d(ˉx,ˉy)=d(gz0n,gz2n)d(gz0n,gz1n)+d(gz1n,gz2n).
    $

    Letting $ n\to\infty $ and in view of (3.29) and (3.30), we get

    $d(\bar{x}, \bar{y}) = 0$.

    Hence, $ f $ and $ g $ have unique point of coincidence.

    Now we present coincidence point results for mappings satisfying weak K-contraction.

    Theorem 3.3. Let $ (X, d) $ be a $ \mathcal{R} $-complete metric space endowed with a binary relation $ \mathcal{R} $. Let $ f $ and $ g $ be two self-mappings on $ X $. Suppose that the following conditions hold:

    (a) $ f(X) \subseteq g(X) $,

    (b) $ \mathcal{R} $ is $ (f, g) $-closed and locally $ f $-transitive,

    (c) there exists $ x_{0}\in X $ such that $ (gx_{0}, fx_{0})\in \mathcal{R} $,

    (d) $ f $ and $ g $ are $ \mathcal{R} $-compatible,

    (e) $ g $ is $ \mathcal{R} $-continuous,

    (f) either $ f $ is $ \mathcal{R} $-continuous or $ \mathcal{R} $ is $ (g, d) $-self-closed,

    (g) there exists $ \phi \in \Phi $ such that

    $d(fx, fy) \leq \frac{1}{2} [d(gx, fx) + d(gy, fy)] - \phi (d(gx, fx), d(gy, fy))$

    $ \forall $ $ x, y\in X $ with $ (gx, gy)\in \mathcal{R} $.

    Then $ f $ and $ g $ have a coincidence point.

    Proof. Following the proof of Theorem 3.1, we can construct the sequence $ \{gx_{n}\} $ defined in (3.1) and claim that the sequences $ \{gx_{n}\} $ and $ \{fx_{n}\} $ are $ \mathcal{R} $-preserving. If $ g(x_{n_{0}}) = g(x_{n_{0}+1}) $ for some $ n_{0} \in \mathbb{N} $, then using (3.1) we have $ g(x_{n_{0}}) = f(x_{n_{0}}) $ i.e. $ x_{n_{0}} $ is a coincidence point of $ f $ and $ g $, hence we are done. On the other hand, if $ g(x_{n}) \neq g(x_{n+1}) $ $ \forall $ $ n\in \mathbb{N}_{0} $ then $ d(gx_{n}, gx_{n+1}) \neq 0 $. On using (3.1), (3.2) and assumption $ (g) $, we have

    $ (gxn+1,gxn+2)=d(fxn,fxn+1)12[d(gxn,fxn)+d(gxn+1,fxn+1)]ϕ(d(gxn,fxn),d(gxn+1,fxn+1))=12[d(gxn,gxn+1)+d(gxn+1,gxn+2)]ϕ(d(gxn,gxn+1),d(gxn+1,gxn+2))
    $
    (3.31)

    which gives

    $ d(gxn+1,gxn+2)12[d(gxn,gxn+1)+d(gxn+1,gxn+2)]d(gxn+1,gxn+2)d(gxn,gxn+1).
    $

    Hence, the sequence $ \{d(gx_{n}, gx_{n+1})\} $ is a decreasing sequence which converges to $ r\geq0 $. Using the same technique as in Theorem 3.1, we get

    $ limnd(gxn,gxn+1)=0.
    $
    (3.32)

    Now, we show that $ \{gx_{n}\} $ is a Cauchy sequence. Following the lines of Theorem 3.1, there exist subsequences $ \{gx_{n_{k}}\} $ and $ \{gx_{m_{k}}\} $ of $ \{gx_{n}\} $ such that $ (gx_{m_{k}}, gx_{n_{k}}) \in \mathcal{R} $. Then applying condition $ (g) $, we obtain

    $ (gxmk,gxnk)=d(fxmk1,fxnk1)12[d(gxmk1,fxmk1)+d(gxnk1,fxnk1)]ϕ(d(gxmk1,fxmk1),d(gxnk1,fxnk1))=12[d(gxmk1,gxmk)+d(gxnk1,gxnk)]ϕ(d(gxmk1,gxmk),d(gxnk1,gxnk)).
    $

    Letting $ k\to\infty $ in the above equation and using the property of $ \phi $, we get that the sequence $ \{gx_{n}\} $ is Cauchy. The rest of the proof is similar to Theorem 3.1.

    Theorem 3.4. In addition to Theorem 3.3, if we consider the following condition:

    (h) $ f(X) $ is $ \mathcal{R}^{s}_{g(X)} $-directed,

    then $ f $ and $ g $ have a unique point of coincidence.

    Proof. The proof is almost similar to Theorem 3.2. Here,

    $ d(gz0n+1,gz1n+1)=d(fz0n,fz1n)12[d(gz0n,fz0n)+d(gz1n,fz1n)]ϕ(d(gz0n,fz0n),d(gz1n,fz1n))=12[d(gz0n,gz0n+1)+d(gz1n,gz1n+1)]ϕ(d(gz0n,gz0n+1),d(gz1n,gz1n+1))=12d(gz1n,gz1n+1)ϕ(0,d(gz1n,gz1n+1))
    $
    (3.33)

    which gives

    $ d(gz0n+1,gz1n+1)12d(gz1n,gz1n+1)
    $
    (3.34)
    $ 12[d(gz1n,gz0n)+d(gz0n,gz1n+1)12[d(gz1n,gz0n)+d(gz0n+1,gz1n+1)
    $
    (3.35)
    $ d(gz0n+1,gz1n+1)d(gz1n,gz0n).
    $
    (3.36)

    Therefore, the sequence $ \{d(gz^{1}_{n}, gz^{0}_{n})\} $ is decreasing non-negative sequence which converges to a non-negative real number, i.e.,

    $ \lim\limits_{n\to\infty} d(gz^{1}_{n}, gz^{0}_{n}) = r. $

    Also in view of (3.34) and (3.35), we get

    $ \lim\limits_{n\to\infty} d(gz^{1}_{n}, gz^{1}_{n+1}) = 2r. $

    Now taking the upper limit in (3.33) and using the property of $ \phi $, we get

    $ limnd(gz0n,gz1n)=0
    $

    Similarly,

    $ limnd(gz1n,gz2n)=0.
    $

    Now the conclusion is immediate following Theorem 3.2.

    Remark 3.5. Theorem 3.2 (Theorem 3.4) also guarantees the existence of a unique common fixed point of $ f $ and $ g $.

    Proof. Let $ x $ be a coincidence point of $ f $ and $ g $. So we have, $ g(x) = f(x) = \bar{x} $. Using Remark 2.15, every $ \mathcal{R} $-compatible pair is weakly compatible. Therefore, $ \bar{x} $ is also a coincidence point of $ f $ and $ g $. In view of Theorem 3.2 (Theorem 3.4), we get $ g(x) = g(\bar{x}) $ which gives

    $ \bar{x} = g(\bar{x}) = f(\bar{x}). $

    Hence, $ \bar{x} $ is a common fixed point of $ f $ and $ g $. To claim the uniqueness, we assume $ x' $ be another common fixed point of $ f $ and $ g $. Using Theorem 3.2 (Theorem 3.4), we get

    $ x' = g(x') = g(\bar{x}) = \bar{x} $

    which concludes the proof.

    Under universal relation (i.e. $ \mathcal{R} = X^{2} $), Theorem 3.1 together with Theorems 3.2, 3.3, 3.4 reduce to the following coincidence point theorems

    Corollary 3.6. Let $ (X, d) $ be a complete metric space and $ f $, $ g $ be two self-mappings on $ X $. Suppose that the following conditions hold:

    (a) $ f(X) \subseteq g(X) $,

    (b) $ f $ and $ g $ are compatible,

    (c) $ g $ is continuous,

    (c) there exists $ \phi \in \Phi $ such that

    $d(fx, fy) \leq \frac{1}{2}[d(gx, fy) + d(gy, fx)] - \phi\big(d(gx, fy), d(gy, fx)\big)$

    $ \forall $ $ x, y\in X $.

    Then $ f $ and $ g $ have a unique point of coincidence.

    Corollary 3.7. Let $ (X, d) $ be a complete metric space and $ f $, $ g $ be two self-mappings on $ X $. Suppose that the following conditions hold:

    (a) $ f(X) \subseteq g(X) $,

    (b) $ f $ and $ g $ are compatible,

    (c) $ g $ is continuous,

    (d) there exists $ \phi \in \Phi $ such that

    $d(fx, fy) \leq \frac{1}{2}[d(gx, fx) + d(gy, fy)] - \phi\big(d(gx, fx), d(gy, fy)\big)$

    $ \forall $ $ x, y\in X $.

    Then $ f $ and $ g $ have a unique point of coincidence.

    In this section, we derive several fixed point results of the existing literature as consequences of our newly proved results.

    Taking $ g = I $, the identity map on $ X $ in Theorems 3.1, 3.2, 3.3 and 3.4, we obtain

    Corollary 4.1. Let $ (X, d) $ be a $ \mathcal{R} $-complete metric space endowed with a binary relation $ \mathcal{R} $ and $ f $ a self-mappings on $ X $. Suppose that the following conditions hold:

    (a) $ \mathcal{R} $ is $ f $-closed and locally f-transitive,

    (b) there exists $ x_{0}\in X $ such that $ (x_{0}, fx_{0})\in \mathcal{R} $,

    (c) either $ f $ is $ \mathcal{R} $-continuous or $ \mathcal{R} $ is $ d $-self-closed,

    (d) there exists $ \phi \in \Phi $ such that

    $d(fx, fy) \leq \frac{1}{2}[d(x, fy) + d(y, fx)] - \phi\big(d(x, fy), d(y, fx)\big)$

    $ \forall $ $ x, y\in X $ with $ (x, y) \in \mathcal{R}. $

    Then $ f $ has a fixed point. Moreover, if

    (e) $ f(X) $ is $ \mathcal{R}^{s} $-directed,

    then $ f $ has a unique fixed point.

    Corollary 4.2. Let $ (X, d) $ be a $ \mathcal{R} $-complete metric space endowed with a binary relation $ \mathcal{R} $ and $ f $ a self-mappings on $ X $. Suppose that the following conditions hold:

    (a) $ \mathcal{R} $ is $ f $-closed and locally f-transitive,

    (b) there exists $ x_{0}\in X $ such that $ (x_{0}, fx_{0})\in \mathcal{R} $,

    (c) either $ f $ is $ \mathcal{R} $-continuous or $ \mathcal{R} $ is $ d $-self-closed,

    (d) there exists $ \phi \in \Phi $ such that

    $d(fx, fy) \leq \frac{1}{2}[d(x, fx) + d(y, fy)] - \phi\big(d(x, fx), d(y, fy)\big)$

    $ \forall $ $ x, y\in X $ with $ (x, y) \in \mathcal{R}. $

    Then $ f $ has a fixed point. Moreover, if

    (e) $ f(X) $ is $ \mathcal{R}^{s} $-directed,

    then $ f $ has a unique fixed point.

    Under universal relation (i.e. $ \mathcal{R} = X^{2} $), taking $ g = I $, the identity map on $ X $ in Theorems 3.1, 3.2, 3.3 and 3.4, we obtain:

    Corollary 4.3. Let $ (X, d) $ be a complete metric space and $ f $ be a self-mapping on $ X $. If there exists $ \phi \in \Phi $ such that

    $d(fx, fy) \leq \frac{1}{2}[d(x, fy) + d(y, fx)] - \phi\big(d(x, fy), d(y, fx)\big)$

    $ \forall $ $ x, y\in X $. Then, $ f $ has a unique fixed point.

    Corollary 4.4. Let $ (X, d) $ be a complete metric space and $ f $ a self-mapping on $ X $. If there exists $ \phi \in \Phi $ such that

    $d(fx, fy) \leq \frac{1}{2}[d(x, fx) + d(y, fy)] - \phi\big(d(x, fx), d(y, fy)\big)$

    $ \forall $ $ x, y\in X $. Then, $ f $ has a unique fixed point.

    Taking $ \mathcal{R} = \preceq $, the partial order and $ g = I $, the identity map on $ X $ in Theorem 3.1 we obtain the following result:

    Corollary 4.5. Let $ (X, d, \preceq) $ be a complete metric space endowed with usual partial order and $ f $ a self-mapping on $ X $. Suppose the following conditions hold:

    (a) there exists $ x_{0} \in X $ such that $ x_{0} \preceq fx_{0} $,

    (b) $ f $ is nondecreasing with respect to $ \preceq $,

    (c) $ f $ is continuous or $ (X, d, \preceq) $ is regular,

    (d) there exists $ \phi \in \Phi $ such that

    $d(fx, fy) \leq \frac{1}{2}[d(x, fy) + d(y, fx)] - \phi\big(d(x, fy), d(y, fx)\big)$ $\forall$ $x\succeq y$,

    then, $ f $ has a fixed point.

    Notice that Corollary 4.1 improves and sharpens Theorem 1.3 and Theorem 2.1 of Harjani et al. [30] since the auxiliary function $ \phi $ considered here is relatively weaker than the existing one.

    Remark 4.6. Taking $ \phi (x, y) = k(x+y) $, where $ 0 < k < 1 $ in Corollaries 4.3 and 4.4 we obtain the classical fixed point theorems given by Kannan [5] and Chatterjea [6] respectively.

    Consider the metric space $ (X, d) $ with $ X = (-1, 1] $ with the usual metric $ d $. Define two functions $ f, g: X \rightarrow X $ by

    $ f(x)={1x4,ifx(1,0)x3,ifx[0,1]andg(x)=3x4.
    $

    Now endow $ X $ with the following binary relation

    $ \mathcal{R} = \{(x, y)\in X^{2}: x\geq y\geq 0\}. $

    Obviously, $ X $ is $ \mathcal{R} $-complete metric space. Consider a function $ \phi: [0, \infty)^2 \rightarrow [0, \infty) $ defined by

    $ \phi(x, y) = {14(x5+2y),whenx,y[0,1]1,others.
    $

    For $ x, y \in X $ with $ (gx, gy)\in \mathcal{R} $,

    $ d(fx,fy)=x3y3=112[4xy]112[9209x4y]112[(12120)9x4y]112[(12120)9x4y+(1212)9y4x]112[12{9x4y+9y4x}14{159x4y+29y4x}]12{9x4y12+9y4x12}14{159x4y12+29y4x12}=12[d(gx,fy)+d(gy,fx)]ϕ(d(gx,fy),d(gy,fx)).
    $

    Therefore, the condition $ (g) $ of Theorem 3.1 is satisfied. Also, by routine calculation, it can be observed that all the other conditions of Theorems 3.1 and 3.2 are satisfied, and $ f $ and $ g $ have a unique point of coincidence, namely: $ x = 0 $, which is also a unique common fixed point of $ f $ and $ g $ in view of Remark 3.5.

    Notice that condition $ (g) $ of Theorem 3.1 does not hold for the whole space (for example, take $ x = 0 \; \text{and} \; y = 1 $). Also, the used auxiliary function $ \phi $ in this example is discontinuous. Therefore, this example cannot be solved by the existing results, which establishes the importance of our results.

    In this paper, we observed that some of the conditions of the auxiliary function $ \phi $ are not necessary for weak C-contractions and weak K-contractions. Moreover, we established the relation-theoretic variants of some coincidence point as well as fixed point theorems for these contractions. Also, the presented example shows the effectiveness of our newly proved results over corresponding several noted results. Now, for possible problems, one can attempt to prove related contractions like weakly $ f $-Kannan, weakly $ f $-Chatterjea etc., with the newly introduced family of auxiliary functions.

    The authors would like to thank the anonymous referees for their comments that helped us improve this article. The first author would like to thank the Council of Scientific and Industrial Research (CSIR), Government of India for JRF (File No. 09/112(0604)/2018-EMR-I).

    The authors declare no conflict of interest.

    [1] Fairfax S, Gwin L, King M, et al. (2005) Buying nature: the limits of land acquisition as a conservation strategy, 1780-2004. Cambridge, Massachusetts: MIT Press, 379.
    [2] Hobbs R (2007) Setting effective and realistic restoration goals: key directions for research. Restor Ecol 15: 354-357. doi: 10.1111/j.1526-100X.2007.00225.x
    [3] Turner M, Gardner R, O'Neill R (2001) Landscape ecology in theory and practice: pattern and process. New York: Springer.
    [4] Boutin S, Herbert D (2002) Landscape ecology and forest management: developing an effective partnership. Ecol Appl 12: 390-397.
    [5] Cissel B, Swanson F, Mckee W, et al. (1994) Using the past to plan the future in the Pacific Northwest. J Forest 92: 30-31.
    [6] Franklin J, Forman R (1987) Creating landscape patterns by forest cutting: ecological consequences and principles. Landsc Ecol 1: 5-18. doi: 10.1007/BF02275261
    [7] Li H, Franklin J, Swanson F, et al. (1993). Developing alternative forest cutting patterns: a simulation approach. Landscape Ecol 8: 63-75.
    [8] Silbernagel J, Price J, Swaty R, et al. (2011) The next frontier: projecting the effectiveness of broad-scale forest conservation strategies. In C. Li, R. Lafortezza, & J. Chen Eds., Landscape Ecology in Forest Management and Conservation: Challenges and Solutions in a Changing Globe, New York: Springer, 209-230.
    [9] Coreau A, Pinay G, Thompson J, et al. (2009) The rise of research on futures in ecology: rebalancing scenarios and predictions. Ecol Lett 12: 1277-1286. doi: 10.1111/j.1461-0248.2009.01392.x
    [10] Wollenberg E, Edmunds D, Buck L (2000) Using scenarios to make decisions about the future: anticipatory learning for the adaptive co-management of community forests. Landscape Urban Plan 47: 65-77. doi: 10.1016/S0169-2046(99)00071-7
    [11] Gustafson E, Lytle D, Swaty R, et al. (2006) Simulating the cumulative effects of multiple forest management strategies on landscape measures of forest sustainability. Landsc Ecol 22: 141-156.
    [12] Provencher L, Forbis T, Frid L, et al. (2007) Comparing alternative management strategies of fire, grazing, and weed control using spatial modeling. Ecol Model 209: 249-263. doi: 10.1016/j.ecolmodel.2007.06.030
    [13] Frid L, Holcombe T, Morisette J, et al. (2013) Using state-and-transition modeling to account for imperfect detection in invasive species management. Invas Plant Sci Mana 6: 36-47 doi: 10.1614/IPSM-D-11-00065.1
    [14] Kurz W, Beukema B, Klenner W, et al. (2000) TELSA: the tool for exploratory landscape scenario analyses. Comput Electron Agr 27: 227-242. doi: 10.1016/S0168-1699(00)00109-5
    [15] Beukema S, Kurz W, Pinkham C, et al. (2003) Vegetation Dynamics Development Tool: user's guide version 4.4c. Vancouver: ESSA Technologies Ltd.
    [16] Evers L, Miller R, Doescher P, et al. (2013) Simulating Current Successional Trajectories in Sagebrush Ecosystems With Multiple Disturbances Using a State-and-Transition Modeling Framework. Rangel Ecol Manag 66: 313-329. doi: 10.2111/REM-D-11-00220.1
    [17] Provencher L, Anderson T (2011) Climate Change Revisions to Nevada's Wildlife Action Plan: Vegetation Mapping and Modeling Report to the Nevada Department of Wildlife.
    [18] Halofsky J, Hemstrom M, Conklin D, et al. (2013) Assessing potential climate change effects on vegetation using a linked model approach. Ecol Modell 266: 131-143. doi: 10.1016/j.ecolmodel.2013.07.003
    [19] Yospin G, Bridgham S, Neilson R, et al. (2015) A new model to simulate climate-change impacts on forest succession for local land management. Ecol Appl 25: 226-242. doi: 10.1890/13-0906.1
    [20] Nowacki G, Abrams M (2014) Is climate an important driver of post-European vegetation change in the Eastern United States? Glob Change Biol 21: 314-334.
    [21] Costanza J, Terando A, McKerrow A, et al. (2015) Modeling climate change, urbanization, and fire effects on Pinus palustris ecosystems of the southeastern U.S. J Environ Manage 151: 186-199. doi: 10.1016/j.jenvman.2014.12.032
    [22] Price J, Silbernagel J, Miller N, et al. (2012) Eliciting expert knowledge to inform landscape modeling of conservation scenarios. Ecol Modell 229: 76-87. doi: 10.1016/j.ecolmodel.2011.09.010
    [23] Janowiak M, Iverson L, Mladenoff D, et al. (2014) Forest ecosystem vulnerability assessment and synthesis for northern Wisconsin and western Upper Michigan: a report from the northwoods climate change response framework project. Gen Tech Rep NRS-136.
    [24] WICCI, Forestry Working Group Report. Madison, Wisconsin: Nelson Institute for Environmental Studies, University of Wisconsin-Madisonand the Wisconsin Department of Natural Resources, 2011. Available from: http://www.wicci.wisc.edu/report/Forestry.pdf.
    [25] Turner M (1989) Landscape Ecology: The Effect of Pattern on Process. Annu Rev Ecol Syst 20:171-197. doi: 10.1146/annurev.es.20.110189.001131
    [26] LANDFIRE, LANDFIRE National Vegetation Dynamics Models. U.S. Department of Agriculture, Forest Service; U.S. Department of Interior, 2007. Available from http://www.landfire.gov/index.php.
    [27] TNC, Adapting LANDFIRE vegetation dynamics models manual v.1. Tallahassee, FL: TNC Global Fire Initiative, 2009. Available from: http://www.tncfire.org/documents/Aug12pluslinksFINAL_003.pdf.
    [28] Ryan KC, Opperman TS (2013) LANDFIRE-A national vegetation/fuels data base for use in fuels treatment, restoration, and suppression planning. Forest Ecol Manage 294: 208-216. doi: 10.1016/j.foreco.2012.11.003
    [29] Rollins M (2009) LANDFIRE: A nationally consistent vegetation, wildland fire, and fuel assessment. Int J Wildl Fire 18: 235-249. doi: 10.1071/WF08088
    [30] Wisconin Department of Natural Resources, Wisconsin's managed forest law: a program summary. Wisconsin Department of Natural Resources. PUB-FR-295, 2013. Available from: http://dnr.wi.gov/files/pdf/pubs/fr/FR0295.pdf
    [31] Cleland D, Crow T, Saunders S, et al. (2004) Characterizing historical and modern fire regimes in Michigan (USA): a landscape ecosystem approach. Landsc Ecol 19: 311-325. doi: 10.1023/B:LAND.0000030437.29258.3c
    [32] Schulte L, Mladenoff D, Crow T, et al. (2007) Homogenization of northern U.S. Great Lakes forests due to land use. Landsc Ecol 22: 1089-1103.
    [33] Drever C, Bergeron Y, Drever M, et al. (2009) Effects of climate on occurrence and size of large fires in a northern hardwood landscape: historical trends, forecasts, and implications for climate change in Temiscamingue, Quebec. Appl Veg Sci 12: 261-272. doi: 10.1111/j.1654-109X.2009.01035.x
    [34] Drobyshev I, Goebel P, Bergeron Y, et al. (2012) Detecting changes in climate forcing on the fire regime of a North American mixed-pine forest: A case study of Seney National Wildlife Refuge, Upper Michigan. Dendrochronologia 30: 137-145. doi: 10.1016/j.dendro.2011.07.002
    [35] Flannigan M, Stocks B, Turetsky M, et al. (2009) Impacts of climate change on fire activity and fire management in the circumboreal forest. Glob Chang Bio 15: 549-560. doi: 10.1111/j.1365-2486.2008.01660.x
    [36] Overpeck J, Rind D, Goldberg R (1990) Climate-induced changes in forest disturbance and vegetation. Nature 343: 51-53. doi: 10.1038/343051a0
    [37] Woolford D, Cao J, Dean C, et al. (1999) Signals in a region of the Canadian boreal forest. Environmetrics 21: 789-800.
    [38] Guyette RP, Thompson FR, Whittier J, et al. (2014). Future Fire Probability Modeling with Climate Change Data and Physical Chemistry. Forest Sci 60: 862-870. doi: 10.5849/forsci.13-108
    [39] Andresen J, Hilberg S, Kunkel K (2012) Historical Climate and Climate Trends in the Midwestern USA. U.S. Natl Clim Assess Midwest Tech Input Rep. 3-16.
    [40] Peterson C (2000) Catastrophic wind damage to North American forests and the potential impact of climate change. Sci Total Environ 262: 287-31. doi: 10.1016/S0048-9697(00)00529-5
    [41] Coniglio M, Stensrud D (2004) Interpreting the Climatology of Derechos. Weather Forecast 19: 95-605.
    [42] Dale V, Joyce L, McNulty S, et al. (2001) Climate Change and Forest Disturbances. Bioscience 51: 723-734. doi: 10.1641/0006-3568(2001)051[0723:CCAFD]2.0.CO;2
    [43] LANDFIRE, LANDFIRE National Vegetation Dynamics Models. U.S. Department of Agriculture, Forest Service; U.S. Department of Interior, 2007. Availble from: http://www.landfire.gov/national_veg_models_op2.php
    [44] ESRI (Environmental Systems Research Institute) (2008) ArcGIS: Release 9.3 software. Environmental Systems Research Institute, Redlands, California
    [45] McGarigal K, Cushman S, Neel M, et al. FRAGSTATS: Spatial pattern analysis program for categorical maps. University of Massachusetts, Amherst, 2002. Available from: http://www.umass.edu/landeco/research/fragstats/fragstats.
    [46] Li B, Archer S (1997) Weighted mean patch size: A robust index for quantifying landscape structure. Ecol Modell 102: 353-361. doi: 10.1016/S0304-3800(97)00071-9
    [47] Riitters K, O'Neill R, Hunsaker C, et al. (1995) A factor analysis of landscape pattern and structure metrics. Landsc Ecol 10: 23-39. doi: 10.1007/BF00158551
    [48] R Core Team, R: A language environment for statistical computing. R Foundation for Statistical Computing, Vienna, Austira. 2013. Available from: http://www.R-project.org/.
    [49] Merenlender A, Huntsinger L, Guthey G, et al. (2004) Land trusts and conservation easements: Who is conserving what for whom? Conserv Biol 18: 65-75. doi: 10.1111/j.1523-1739.2004.00401.x
    [50] Scheller R, Mladenoff D (2007) An ecological classification of forest landscape simulation models: tools and strategies for understanding broad-scale forested ecosystems. Landsc Ecol 22: 491-505. doi: 10.1007/s10980-006-9048-4
    [51] Wear D, Turner M, Flamm R, et al. (1996) Ecosystem management with multiple owners: landscape dynamics in a Southern Appalachian watershed. Ecol Appl 6: 1173-1188. doi: 10.2307/2269600
    [52] Zollner P, Roberts L, Gustafson E, et al. (2008) Influence of forest planning alternatives on landscape pattern and ecosystem processes in northern Wisconsin, USA. Forest Ecol Management 254: 429-444. doi: 10.1016/j.foreco.2007.07.038
    [53] Levins R (1966) The strategy of model building in population biology. Ameri Scientist 54: 421-431.
    [54] Radeloff V, Mladenoff D, Gustafson E, et al. (2006) Modeling forest harvesting effects on landscape pattern in the Northwest Wisconsin Pine Barrens. Forest Ecol Management 236: 113-126. doi: 10.1016/j.foreco.2006.09.007
    [55] Peterson G (2002) Contagious disturbance, ecological memory, and the emergence of landscape pattern. Ecosystems 5: 329-338.56. Drescher M, Perera A, Buse L, et al. (2008) Uncertainty in expert knowledge of forest succession: A case study from boreal Ontario. For Chron 84: 194-209. doi: 10.5558/tfc84194-2
  • This article has been cited by:

    1. Faizan Ahmad Khan, Faruk Sk, Maryam Gharamah Alshehri, Qamrul Haq Khan, Aftab Alam, Cristian Chifu, Relational Meir-Keeler Contractions and Common Fixed Point Theorems, 2022, 2022, 2314-8888, 1, 10.1155/2022/3550923
    2. Alexander Greshnov, Vladimir Potapov, About coincidence points theorems on 2-step Carnot groups with 1-dimensional centre equipped with Box-quasimetrics, 2023, 8, 2473-6988, 6191, 10.3934/math.2023313
    3. Nifeen Hussain Altaweel, Faizan Ahmad Khan, Relation-Theoretic Fixed Point Theorems Involving Certain Auxiliary Functions with Applications, 2022, 14, 2073-8994, 2614, 10.3390/sym14122614
    4. Asik Hossain, Faizan Ahmad Khan, Qamrul Haq Khan, A Relation-Theoretic Metrical Fixed Point Theorem for Rational Type Contraction Mapping with an Application, 2021, 10, 2075-1680, 316, 10.3390/axioms10040316
    5. Asik Hossain, Mohammad Arif, Salvatore Sessa, Qamrul Haque Khan, Nonlinear Relation-Theoretic Suzuki-Generalized Ćirić-Type Contractions and Application to Fractal Spaces, 2022, 6, 2504-3110, 711, 10.3390/fractalfract6120711
    6. Asik Hossain, Aftab Alam, Salvatore Sessa, Qamrul Haque Khan, Relation-Theoretic Weak Contractions and Applications, 2023, 11, 2227-7390, 1976, 10.3390/math11091976
    7. Doaa Filali, Faizan Ahmad Khan, Relation-Preserving Functional Contractions Involving a Triplet of Auxiliary Functions with an Application to Integral Equations, 2024, 16, 2073-8994, 691, 10.3390/sym16060691
  • Reader Comments
  • © 2015 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(7548) PDF downloads(1420) Cited by(2)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog