Loading [MathJax]/jax/output/SVG/jax.js
Research article

Unified relational-theoretic approach in metric-like spaces with an application

  • Received: 22 April 2021 Accepted: 09 June 2021 Published: 15 June 2021
  • MSC : 45J05, 47H10, 54H25

  • In this paper, we introduce a modified implicit relation and obtain some new fixed point results for σ-implicit type contractive conditions in relational metric-like spaces. We present some nontrivial examples to illustrative facts and compare our results with the related work. We also discuss sufficient conditions for the existence of a unique positive definite solution of the non-linear matrix equation U=D+mi=1AiG(U)Ai, where D is an n×n Hermitian positive definite matrix, A1, A2, , Am are n×n matrices, and G is a non-linear self-mapping of the set of all Hermitian matrices which is continuous in the trace norm. Finally, we discuss a couple of examples, convergence and error analysis, average CPU time analysis and visualization of solution in surface plot.

    Citation: Reena Jain, Hemant Kumar Nashine, Jung Rye Lee, Choonkil Park. Unified relational-theoretic approach in metric-like spaces with an application[J]. AIMS Mathematics, 2021, 6(8): 8959-8977. doi: 10.3934/math.2021520

    Related Papers:

    [1] Ahmed Alamer, Faizan Ahmad Khan . Boyd-Wong type functional contractions under locally transitive binary relation with applications to boundary value problems. AIMS Mathematics, 2024, 9(3): 6266-6280. doi: 10.3934/math.2024305
    [2] Muhammad Tariq, Muhammad Arshad, Mujahid Abbas, Eskandar Ameer, Saber Mansour, Hassen Aydi . A relation theoretic m-metric fixed point algorithm and related applications. AIMS Mathematics, 2023, 8(8): 19504-19525. doi: 10.3934/math.2023995
    [3] Xiu-Liang Qiu, Selim Çetin, Ömer Kişi, Mehmet Gürdal, Qing-Bo Cai . Octonion-valued b-metric spaces and results on its application. AIMS Mathematics, 2025, 10(5): 10504-10527. doi: 10.3934/math.2025478
    [4] Anas A. Hijab, Laith K. Shaakir, Sarah Aljohani, Nabil Mlaiki . Double composed metric-like spaces via some fixed point theorems. AIMS Mathematics, 2024, 9(10): 27205-27219. doi: 10.3934/math.20241322
    [5] Mohammed Shehu Shagari, Saima Rashid, Khadijah M. Abualnaja, Monairah Alansari . On nonlinear fuzzy set-valued Θ-contractions with applications. AIMS Mathematics, 2021, 6(10): 10431-10448. doi: 10.3934/math.2021605
    [6] Md Hasanuzzaman, Mohammad Imdad . Relation theoretic metrical fixed point results for Suzuki type ZR-contraction with an application. AIMS Mathematics, 2020, 5(3): 2071-2087. doi: 10.3934/math.2020137
    [7] Hasanen A. Hammad, Maryam G. Alshehri . Generalized Ξ-metric-like space and new fixed point results with an application. AIMS Mathematics, 2023, 8(2): 2453-2472. doi: 10.3934/math.2023127
    [8] Afrah. A. N. Abdou . Fixed points of Kannan maps in modular metric spaces. AIMS Mathematics, 2020, 5(6): 6395-6403. doi: 10.3934/math.2020411
    [9] Monairah Alansari, Mohammed Shehu Shagari, Akbar Azam, Nawab Hussain . Admissible multivalued hybrid Z-contractions with applications. AIMS Mathematics, 2021, 6(1): 420-441. doi: 10.3934/math.2021026
    [10] Xun Ge, Songlin Yang . Some fixed point results on generalized metric spaces. AIMS Mathematics, 2021, 6(2): 1769-1780. doi: 10.3934/math.2021106
  • In this paper, we introduce a modified implicit relation and obtain some new fixed point results for σ-implicit type contractive conditions in relational metric-like spaces. We present some nontrivial examples to illustrative facts and compare our results with the related work. We also discuss sufficient conditions for the existence of a unique positive definite solution of the non-linear matrix equation U=D+mi=1AiG(U)Ai, where D is an n×n Hermitian positive definite matrix, A1, A2, , Am are n×n matrices, and G is a non-linear self-mapping of the set of all Hermitian matrices which is continuous in the trace norm. Finally, we discuss a couple of examples, convergence and error analysis, average CPU time analysis and visualization of solution in surface plot.



    Let Γ be a strongly regular graph with v vertices and parameters k, λ and μ. Then Γ is defined as follows: (1) For any two adjacent vertices x and y, there are exactly λ vertices adjacent to both x and y; (2) for any two nonadjacent vertices x and y, there are exactly μ vertices adjacent to both x and y. For a more detailed introduction on strongly regular graphs, please refer to [1,2].

    Cayley graphs are an effective tool constructing strongly regular graphs. Let (G,+) be a finite abelian group and S be a subset of G{0} such that S=S, where 0 is the identity of G. The Cayley graph Cay(G,S) is defined as the graph Γ(G,E) where two vertices a and b are adjacent if and only if abS. Let ˆG be the character group of G consisting of all characters of G. The eigenvalues of Cay(G,S) are given by ϕ(S)=xSϕ(x), where ϕˆG. It is well known that Cay(G,S) is strongly regular if and only if ϕ(S) with ϕˆG{1ˆG} take exactly two values, where 1ˆG is the identity of ˆG. By the determination of Cayley graphs in the additive groups of finite fields, strongly regular cayley graphs were proposed in [3,4,5,6].

    It should be noted that strongly regular graphs are related to some combinational objects, such as linear codes, two-intersection sets and partial difference set [7,8]. For these connections, we are inspired to construct asymptotically optimal codebooks by using the connection set S of Cay(G,S). An (N,K) codebook C is defined to be a set {ci}N1i=0 of N units norm 1×K complex vectors ci, and ci (0iN1) are called codewords of the codebook C. As an important measure of performance of a codebook C in code-division multiple access system, the maximum correlation amplitudes Imax(C) is defined by

    Imax(C)=max0ijN1|cicHj|,

    where cHj denotes the conjugate transpose of a complex vector cj.

    Minimizing Imax(C) is a meaningful problem as it can optimize some performance metrics such as average signal-to-noise ratio and outage probability. Hence, for a given K, it is desirable to construct codebooks with N as large as possible and Imax(C) as small as possible simultaneously. Unfortunately, there is a tradeoff among the parameters N, K and Imax(C). Let Iw(C)=(NK)/((N1)K), we know Imax(C)Iw(C) [9]. If C achieves the Welch bound, that is, Imax(C)=Iw(C), then C is referred to as a Welch-bound-equality codebook. In ordinary circumstance, it is extremely difficult to construct codebooks achieving the Welch bound. As a consequence, researchers attempt to construct codebooks asymptotically meeting the Welch bound, that is, Imax(C) is slightly higher than Iw(C), but limNImax(C)/Iw(C)=1 [10,11,12].

    This paper is organized as follows. Some interesting mathematical foundations will be introduced in Section II. Based on these related character sums, a class of strongly regular graphs and nearly optimal codebooks are presented in Section III. In addition, these constructed codebooks have new parameters.

    For convenience, we use the following notations in the following sequel.

    m, s are positive integers and n=ms.

    p is an odd prime and q=pn.

    Trnm denotes the trace function from Fpn to Fpm.

    β is a primitive element of Fpn.

    ζp=e2π1p is a p-th primitive root of complex unity.

    ηn and ηm denote the quadratic characters of Fpn and Fpm, separately.

    χn and χm denote the canonical additive characters of Fpn and Fpm, separately.

    μa denotes an additive character of Fpn for aFpn.

    In this section, we start with characters of finite fields. To prove the main results of this letter, we need a number of results on exponential sums that are derived for the proofs.

    For an odd prime p, let q=pn and Fq denote the finite field with q elements. Then Trnm is defined by

    Trnm(x)=n/m1j=0x(pm)j

    and Trnm is called the trace function from Fpn to Fpm.

    An additive character of Fpn is a homomorphism χ from the additive group of Fpn to the multiplicative group of complex numbers of absolute value 1. The function

    χn(x)=ζTrn1(x)p, xFpn,

    defines an additive character of Fpn and χn is called the canonical additive character of Fpn. For aFpn, define

    μa(x)=χn(ax)=ζTrn1(ax)p,  xFpn.

    Obviously, μa is also an additive character of Fpn. And every additive character of Fpn can be obtained in this way [13]. Its orthogonality relation is given by

    xFpnμa(x)=xFpnχn(ax)={pn,if  a=0,0,if  aFpn.

    Let β be a primitive element of Fq. For a fixed integer j, 0jq2, the function

    χj(βi)=e2π1jiq1, i=0,1,,q2,

    defines a multiplicative character of Fq. In this paper, we use ηn to denote the quadratic character χ(q1)/2 of Fq. And the quadratic character ηn is extended by letting ηn(0)=0. The orthogonality relation for quadratic characters is given by

    xFpkηk(x)=0,

    where ηk is the quadratic character of Fpk and k is a positive integer.

    The Gauss sum G(ηm,χm) over Fpm is defined by [13]

    G(ηm,χm)=xFpmηm(x)χm(x),

    where ηm and χm are the quadratic and canonical additive characters of Fpm, respectively.

    The Gauss sum G(ηm,χm) can be evaluated explicitly and the result on G(ηm,χm) is given in the following lemma.

    Lemma 1. [13, Theorem 5.15] Let Fpm be the finite field with pm element, where p is an odd prime. Then

    G(ηm,χm)=(1)m1(p)m2,

    where p=(1p)p.

    Hence, we shall abbreviate G(ηm,χm) to Gm. The following lemma establishes a relationship between the quadratic character ηm and the canonical additive character χm of Fpm.

    Lemma 2. [13, p. 195] With symbols and notations above, we have

    ηm(x)=1pmaFpmGmηm(a)χm(ax).

    Let f(x) be a function from Fq to Fp. The Walsh transform of f is defined by

    Wf(β):=xFqζf(x)+Trn1(βx)p,

    for βFq. The following lemma states a property of the Walsh transform of f(x)=αx2, where αFq.

    Lemma 3. [14] For αFq, the Walsh transform coefficient of Trn1(αx2) is equal to

    ωα(β)=xFqζTrn1(αx2)+Trn1(βx)p=(1)n1ηn(α)(p)n2ζTrn1(β24α)p,

    where βFq and p=(1p)p.

    Below we give a few results which are used to obtain the main results of this paper.

    Lemma 4. Let symbols be the same as before. Then we have:

    (1) If s2 is even, then ηn(z)=1, for zFpm.

    (2) If s2 is odd, then ηn(z)=ηm(z), for zFpm.

    Proof. Assume that Fpn=β, we get Fpm=βpn1pm1. For n=ms, we have

    pn1pm1=pm(s1)+pm(s2)++pm+1.

    This means that the parity of (pn1)/(pm1) is the same as s. Hence, we have

    ηn(z)={1,if  s  is even, ηm(z),if   s  is odd,

    for zFpm.

    Lemma 5. [13, Theorem 5.12] For yFpm, we obtain

    zFpmηm(z)ζTrm1(zy)p={0,if  y=0,Gmηm(y),if  yFpm.

    In this section, we provide a construction of strongly regular Cayley graphs and a family of asymptotically optimal codebooks. For αFq, let

    Dα={xFq:ηm(Trnm(αx2))=1}. (3.1)

    The following lemma gives the cardinality of the special subset Dα of Fq.

    Lemma 6. Let symbols be the same as before. Then the cardinality |Dα| of Dα is given by:

    (1) If s is even, then

    |Dα|=12pm(pm1)(pn+ηn(α)(p)n2).

    (2) If s is odd, then

    |Dα|=12(pnpnm+(pm1)(1)n+(p+1)m2(p)m+n2ηn(α)pm).

    Proof. In order to determine the cardinality of Dα, we firstly compute the values of the following two equalities:

    A1=xFpnTrnm(αx2)=01, αFq,A2=xFpnTrnm(αx2)0ηm(Trnm(αx2)), αFq.

    It is clear that

    A1=1pmxFpnzFpmχm(zTrnm(αx2))=1pm(pn+zFpmxFpnχm(Trnm(zαx2))). (3.2)

    Note that

    zFpmxFpnχm(Trnm(zαx2))=zFpmxFpnχn(zαx2).

    By Lemmas 3 and 4, we get

    zFpmxFpnχn(zαx2)={(1)n1ηn(α)pn2(pm1),if  s  even,0,if  s  odd. (3.3)

    Hence, we obtain

    A1={pn+(1)n1ηn(α)(p)n2(pm1)pm,if  s  even,pnm,if  s  odd. (3.4)

    Now we determine the values of A2. By Lemma 2, we have

    A2=GmpmaFpmηm(a)xFpnχn(aαx2)=ηn(α)GmGnpmaFpmηm(a)ηn(a)={0,if  s  even,(1)(p1)m2(pm1)ηn(α)(1)n+m(p)n+m2pm,if   s  odd, (3.5)

    where the last equality follows from the fact that aFpmηm(a)=0 and Lemma 4. By definition, we deduce that

    |Dα|=xFpnTrnm(αx2)0ηm(Trnm(αx2))+12=pn212xFpnTrnm(αx2)=01+12xFpnTrnm(αx2)0ηm(Trnm(αx2)), (3.6)

    The results of this lemma follow from (3.4)–(3.6).

    Example 1. Let p=5, n=4, m=2 and s=2. If α is a primitive element of F54, by Lemma 6 we get |Dα|=288, which agrees with numerical computations by Magma. If α=1, then |D1|=240, which is consistent with Magma program computation.

    Example 2. Let p=7, n=3, m=1 and s=3. If α is a primitive element of F73, by Lemma 6 we get |Dα|=168, which agrees with Magma program. If α=1, then |D1|=126, which coincides with numerical results by Magma program computation.

    Lemma 7. For a,αFpn, define

    Eα,a=xFpnTrnm(αx2)0μa(x).

    (1) If s is an even integer, then

    Eα,a={A(pm1),if  Trnm(a24α)=0,A,if  Trnm(a24α)0,

    where A=(1)n1ηn(α)(p)n2pm.

    (2) If s is an odd integer, then

    Eα,a={0,if  Trnm(a24α)=0,B,if  Trnm(a24α)F2pm,B,if  Trnm(a24α)FpmF2pm,

    where B=(1)n+m(p)m+n2ηn(α)pm.

    Proof. For aFpn, by the orthogonality relation of μa we get

    Eα,a=xFpnTrnm(αx2)=0μa(x)=1pmxFpnzFpmχm(zTrmn(αx2))μa(x)=1pmzFpmxFpnχn(zαx2+ax).

    By Lemma 3, we get

    Eα,a=1pmzFpm(1)n1ηn(zα)(p)n2ζTrn1(a24zα)p.

    From the map z1z, we obtain

    Eα,a=1pmzFpm(1)n1ηn(zα)(p)n2ζTrn1(za24α)p. (3.7)

    When s is even, from Lemmas 4 and 5, we have the result (1) of this lemma.

    When s is odd, the desired result follows from Lemmas 4 and 5.

    Lemma 8. For a,αFpn, let

    Nα,a=xFpnTrnm(αx2)0ηm(Trnm(αx2))μa(x).

    (1) If s is even, then

    Nα,a={0,if  Trnm(a24α)=0,(p)mA,if  Trnm(a24α)F2pm,(p)mA,if  Trnm(a24α)FpmF2pm,

    where A=(1)n1(p)n2ηn(α)pm.

    (2) If s is odd, then

    Nα,a={(pm1)B,if  Trnm(a24α)=0,B,if  Trnm(a24α)0,

    where B=(1)n+m(p)m+n2ηn(α)pm.

    Proof. It follows from Lemma 2 that

    pmNα,a=GmxFpnzFpmχn(ax)ηm(z)χn(zαx2)=GnGmzFpmηm(z)ηn(zα)ζTrn1(a24zα)p.

    From the map z1z, we derive that

    pmNα,a=GnGmηm(z)ηn(zα)ζTrm1(zTrnm(a24α))p. (3.8)

    The desired result follows from (3.8), Lemmas 4 and 5.

    Theorem 9. Let symbols be the same as before and s2 be even. Then the Cayley graph Cay(Fpn,Dα) is strongly regular with non-trivial eigenvalues (p)n2(pm+1)ηn(α)/(2pm) and (p)n2(pm1)ηn(α)/(2pm).

    Proof. For aFpn, we deduce that

    xDαμa(x)=xFpnTrnm(αx2)0μa(x)ηm(Trnm(αx2))+12=12xFpnTrnm(αx2)0μa(x)+12xFpnTrnm(αx2)0μa(x)ηm(Trnm(αx2)),

    where the last equality follows from that ηm(0)=0. Then the desired conclusions follow from Lemmas 7 and 8.

    Remark 1. Let s>1 be an odd integer. Then the eigenvalues of the Cayley graph Cay(Fpn,Dα) can also be computed by a similar method given in Theorem 9. It can be easily checked that

    xDαμa(x){0,(pm1)B2,B},

    where aFpn and B=(1)n+mηn(α)(p)m+n2/pm. This means that the Cayley graph Cay(Fpn,Dα) is not strong regular if s is odd.

    Motivated by the work in [15], we give a construction of asymptotically optimal codebooks based on the strongly regular Cayley graph Cay(Fpn,Dα) defined in Theorem 9. For αFpn, let

    Cα={cα,a:aFpn}, (3.9)

    where cα,a=(1|Dα|μa(x))xDα.

    Theorem 10. Let

    K=12pm(pm1)(pn+ηn(α)(p)n2),

    and let s2 be a fixed even integer. Then Cα defined by (3.9) is an asymptotically optimal codebook with parameters [pn,K].

    Proof. By the definition of Cα and Lemma 6, we deduce that Cα is a [pn,K] codebook. For any two distinct codewords ca and cb in Cα (i.e., abFpn), it can be easily checked that

    |cacHb|=1K|xDαμa(x)¯μb(x)|=1K|xDαμab(x)|.

    It follows from Theorem 9 that

    |cacHb|{pn2(pm+1)2Kpm,pn2(pm1)2Kpm},

    which implies that

    Imax(Cα)=pn2(pm+1)2Kpm.

    According to the Welch bound, we have

    Iw(Cα)=pn+pnm+ηn(α)(1p)n2(pn2m2pn2)2(pn1)K.

    It is easy to check that

    limpn+Imax(Cα)Iw(Cα)=1,

    which means that the codebook Cα is asymptotically optimal with respect to the Welch bound.

    Remark 2. Many readers may wonder what parameters the codebook Cα has when s is an odd integer and whether it is asymptotically optimal. If s is odd, then by Theorems 6 and 9 we know the codebook Cα defined in (3.9) has parameters

    N=pn, K=12(pnpnm+(pm1)(1)n+(p+1)m2(p)m+n2ηn(α)pm),Imax(Cα)=(pm1)B2K.

    It can be verified that

    limpn+Imax(Cα)Iw(Cα)1,

    which implies that C is not asymptotically optimal.

    In Table 1, we assume that α is a primitive element of Fpn, p=3 and s=4. And we show some parameters of the codebook Cα in this table. From Table 1, it can be seen that Cα is asymptotically optimal with respect to the Welch bound for sufficiently large N. This also agrees with the result of Theorem 10.

    Table 1.  The parameters of the codebook Cα in (3.9) for p=3 and s=4.
    m N K Imax(Cα) IW(Cα) Imax/Iw
    2 6561 2808 5/312 1.4273×102 1.2273
    3 531441 254826 7/4719 1.4292×103 1.0379
    4 43046721 21228480 41/262080 1.5452×104 1.0124
    5 348684401 1735953120 61/3571920 1.7008×105 1.0041
    6 282429536481 141013893384 365/193434696 1.884×106 1.0014

     | Show Table
    DownLoad: CSV

    To give a comparison, we present the parameters (N,K) of some known asymptotically optimal codebooks and the codebook defined in (3.9) in Table 2. From this table, we can conclude that Cα has new parameters.

    Table 2.  The parameters of codebooks asymptotically meeting the Welch bound.
    Constraints Ref. Parameters (N,K)
    q is a prime power [16] (q,q+12)
    n>1, 1il, si>1
    qi=2si l>1
    [17] (2K+(1)ln,K),
    K=(q11)n(ql1)n(1)ln2
    1il, qi is a prime power, qi3(mod4) [18] (q1q2ql,(q1q2ql1)/2)
    q is a prime power, >2 [19] ((q1)+M,M)
    M=(q1)+(1)+1q,
    q is a prime power [20] (q3+q2q,q2q)
    q is a prime power [20] (q3+q2,q2)
    s>1, m>1,
    q is a prime power
    [21] ((qs1)m+qsm1,qsm1)
    s>1, m>1,
    q is a prime power
    [21] ((qs1)m+M,M)
    M=(qs1)m+(1)m+1q
    αFpn,
    p is an odd prime,
    n=ms, s is even Thm. 10 (pn,pm12pmC)
    C=pn+ηn(α)(1p)n2pn2

     | Show Table
    DownLoad: CSV

    In this paper, we propose a method for constructing strongly regular graphs. Then we use the connection set Dα (αFpn) of the strongly regular graph Cay(Fpn,Dα) to give a class of codebook Cα. In addition, the parameters [N,K] and Imax(Cα) of the codebook Cα are determined in Theorem 10. Table 1 demonstrates that these proposed codebooks are asymptotically optimal according to the Welch bound.

    The authors declare that they have not used Artificial Intelligence (AI) tools in the creation of this article.

    This work was supported by the Innovation Project of Engineering Research Center of Integration and Application of Digital Learning Technology (No.1221049), Humanities and Social Sciences Youth Foundation of Ministry of Education of China (No. 22YJC870018), the Science and Technology Development Fund of Tianjin Education Commission for Higher Education (No. 2020KJ112, KYQD1817, 2022KJ075), Haihe Laboratory of Information Technology Application Innovation (No. 22HHXCJC00002), the National Natural Science Foundation of China (Grant No. 12301670).

    The authors declare no conflicts of interest.



    [1] M. Ahmadullah, J. Ali, M. Imdad, Unified relation-theoretic metrical fixed point theorems under an implicit contractive condition with an application, Fixed Point Theory A., 2016 (2016), 1–15. doi: 10.1186/s13663-015-0491-2
    [2] M. Ahmadullah, M. Imdad, Unified relation-theoretic fixed point results via F-Suzuki-contractions with an application, Fixed Point Theor., 21 (2020), 19–34. doi: 10.24193/fpt-ro.2020.1.02
    [3] M. Ahmadullah, M. Imdad, R. Gubran, Relation-theoretic metrical fixed point theorems under nonlinear contractions, Fixed Point Theor., 20 (2019), 3–18. doi: 10.24193/fpt-ro.2019.1.01
    [4] M. Ahmadullah, A. R. Khan, M. Imdad, Relation-theoretic contraction principle in metric-like spaces, Bull. Math. Anal. Appl., 9 (2017), 31–41.
    [5] A. Alam, M. Imdad, Relation-theoretic contraction principle, J. Fix. Point Theory A., 17 (2015), 693–702. doi: 10.1007/s11784-015-0247-y
    [6] A. Aliouche, A. Djoudi, Common fixed point theorems for mappings satisfying an implicit relation without decreasing assumption, Hacet. J. Math. Stat., 36 (2007), 11–18.
    [7] I. Altun, M. Asim, M. Imdad, W. M. Alfaqih, Fixed point results for FR-generalized contractive mappings in partial metric spaces, Math. Slovaca, 69 (2019), 1413–1424. doi: 10.1515/ms-2017-0318
    [8] I. Altun, A. Erduran, Fixed point theorems for monotone mappings on partial metric spaces, Fixed Point Theory A., 2011 (2011), 1–10.
    [9] A. Amini-Harandi, Metric-like spaces, partial metric spaces and fixed points, Fixed Point Theory A., 2012 (2012), 1–10. doi: 10.1186/1687-1812-2012-1
    [10] H. A. Hammad, M. De la Sen, A solution of Fredholm integral equation by using the cyclic ηqs-rational contractive mappings technique in b-metric-like spaces, Symmetry, 11 (2019), 1–22.
    [11] H. A. Hammad, M. De la Sen, H. Aydi, Analytical solution for differential and nonlinear integral equations via Fωe-Suzuki contractions in modified ωe-metric-like spaces, J. Funct. Space. Appl., 2021 (2021), 1–13.
    [12] P. Hitzler, Generalized metrics and topology in logic programing semantics, 2001, https://corescholar.libraries.wright.edu/cse/229.
    [13] V. Ilić, D., Pavlović, V. Rakočević, Some new extensions of Banach's contractions principle in partial metric spaces, Appl. Math. Lett., 24 (2011), 1326–1330. doi: 10.1016/j.aml.2011.02.025
    [14] G. S. Jeong, B. E. Rhoades, More maps for which F(T)=F(Tn), Demonstratio Math., XL (2007), 671–680.
    [15] Z. Kadelburg, H. K. Nashine, S. Radenović, Fixed point results under various contractive conditions in partial metric spaces, RACSAM Rev. R. Acad. A, 107 (2013), 241–256.
    [16] B. Kolman, R. C. Busby, S. Ross, Discrete mathematical structures, Prentice Hall, 2000.
    [17] S. Lipschutz, Schaum's outlines of theory and problems of set theory and related topics, 1964.
    [18] R. D. Maddux, Relation algebras, Elsevier, Amsterdam, 2006.
    [19] S. G. Matthews, Partial metric topology, Ann. NY Acad. Sci., 728 (1994), 183–197. doi: 10.1111/j.1749-6632.1994.tb44144.x
    [20] H. K. Nashine, A. Gupta, Z. Kadelburg, Rational gω-weak contractions and fixed point theorems in 0σ-complete metric-like spaces, Nonlinear Anal. Model., 22 (2017), 51–63.
    [21] J. J. Nieto, R. R. López, Contractive mapping theorems in partially ordered sets and applications to ordinary differential equations, Order, 22 (2005), 223–239.
    [22] J. J. Nieto, R. R. López, Fixed point theorems in ordered abstract spaces, P. Am. Math. Soc., 135 (2007), 2505–2517. doi: 10.1090/S0002-9939-07-08729-1
    [23] V. Popa, M. Mocanu, Altering distance and common fixed points under implicit relations, Hacet. J. Math. Stat., 38 (2009), 329–337.
    [24] A. C. M. Ran, M. C. B. Reurings, On the matrix equation X+AF(X)A=Q: Solutions and perturbation theory, Linear Algebra Appl., 346 (2002), 15–26. doi: 10.1016/S0024-3795(01)00508-0
    [25] B. Samet, M. Turinici, Fixed point theorems on a metric space endowed with an arbitrary binary relation and applications, Commun. Math. Anal., 13 (2012), 82–97.
    [26] M. Turinici, Abstract comparison principles and multivariable Gronwall-Bellman inequalities, J. Math. Anal. Appl., 117 (1986), 100–127. doi: 10.1016/0022-247X(86)90251-9
    [27] M. Turinici, Fixed points for monotone iteratively local contractions, Demonstr. Math., 19 (1986), 171–180.
  • This article has been cited by:

    1. Amine Jaid, Youssef Touail, Driss El Moutawakil, On μF-contraction: New types of fixed points and common fixed points in Banach spaces, 2023, 16, 1793-5571, 10.1142/S179355712350198X
    2. Reena Jain, Hemant Kumar Nashine, 2024, Chapter 15, 978-981-99-9206-5, 271, 10.1007/978-981-99-9207-2_15
  • Reader Comments
  • © 2021 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2717) PDF downloads(70) Cited by(2)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog