Loading [MathJax]/jax/output/SVG/jax.js
Research article Special Issues

Applying faster algorithm for obtaining convergence, stability, and data dependence results with application to functional-integral equations

  • The goal of this manuscript is to create a new faster iterative algorithm than the previous writing's sober algorithms. In the setting of Banach spaces, this algorithm is used to analyze convergence, stability, and data-dependence results. Basic numerical examples are also provided to highlight the behavior and effectiveness of our approach. Ultimately, the proposed approach is used to solve the functional Volterra-Fredholm integral problem as an application.

    Citation: Hasanen A. Hammad, Habib Ur Rehman, Mohra Zayed. Applying faster algorithm for obtaining convergence, stability, and data dependence results with application to functional-integral equations[J]. AIMS Mathematics, 2022, 7(10): 19026-19056. doi: 10.3934/math.20221046

    Related Papers:

    [1] Farah Liyana Azizan, Saratha Sathasivam, Nurshazneem Roslan, Ahmad Deedat Ibrahim . Logic mining with hybridized 3-satisfiability fuzzy logic and harmony search algorithm in Hopfield neural network for Covid-19 death cases. AIMS Mathematics, 2024, 9(2): 3150-3173. doi: 10.3934/math.2024153
    [2] Nadiyah Hussain Alharthi, Mdi Begum Jeelani . Analyzing a SEIR-Type mathematical model of SARS-COVID-19 using piecewise fractional order operators. AIMS Mathematics, 2023, 8(11): 27009-27032. doi: 10.3934/math.20231382
    [3] Said Gounane, Jamal Bakkas, Mohamed Hanine, Gyu Sang Choi, Imran Ashraf . Generalized logistic model with time-varying parameters to analyze COVID-19 outbreak data. AIMS Mathematics, 2024, 9(7): 18589-18607. doi: 10.3934/math.2024905
    [4] Mohammad Hamidi, Florentin Smarandache . Valued-inverse Dombi neutrosophic graph and application. AIMS Mathematics, 2023, 8(11): 26614-26631. doi: 10.3934/math.20231361
    [5] Deniz UÇAR, Elçin ÇELİK . Analysis of Covid 19 disease with SIR model and Taylor matrix method. AIMS Mathematics, 2022, 7(6): 11188-11200. doi: 10.3934/math.2022626
    [6] Xiaoying Pan, Longkun Tang . A new model for COVID-19 in the post-pandemic era. AIMS Mathematics, 2024, 9(8): 21255-21272. doi: 10.3934/math.20241032
    [7] Tahir Khan, Fathalla A. Rihan, Muhammad Bilal Riaz, Mohamed Altanji, Abdullah A. Zaagan, Hijaz Ahmad . Stochastic epidemic model for the dynamics of novel coronavirus transmission. AIMS Mathematics, 2024, 9(5): 12433-12457. doi: 10.3934/math.2024608
    [8] M. J. Huntul . Inverse source problems for multi-parameter space-time fractional differential equations with bi-fractional Laplacian operators. AIMS Mathematics, 2024, 9(11): 32734-32756. doi: 10.3934/math.20241566
    [9] Ishtiaq Ali, Sami Ullah Khan . Dynamics and simulations of stochastic COVID-19 epidemic model using Legendre spectral collocation method. AIMS Mathematics, 2023, 8(2): 4220-4236. doi: 10.3934/math.2023210
    [10] CW Chukwu, S. Y. Tchoumi, Z. Chazuka, M. L. Juga, G. Obaido . Assessing the impact of human behavior towards preventative measures on COVID-19 dynamics for Gauteng, South Africa: a simulation and forecasting approach. AIMS Mathematics, 2024, 9(5): 10511-10535. doi: 10.3934/math.2024514
  • The goal of this manuscript is to create a new faster iterative algorithm than the previous writing's sober algorithms. In the setting of Banach spaces, this algorithm is used to analyze convergence, stability, and data-dependence results. Basic numerical examples are also provided to highlight the behavior and effectiveness of our approach. Ultimately, the proposed approach is used to solve the functional Volterra-Fredholm integral problem as an application.



    In the mid-19th century, the English physician John Snow [9] refused to accept the theories of cholera infection prevailing at that time. Both the sharing of clothing and transmission through the air seemed to him to be insufficient explanations for what was happening in London, under an epidemic that was undermining the entire population of any social class. He established a famous practical example of spatial epidemiology, measuring the distances of each patient to the nearest water source.

    Not only Covid-19 [11,22], but many other infectious diseases [6] are forcing us, in general, to rethink new techniques for describing and discovering spatial epidemiology, that is, "the description and analysis of geographic variations in disease with respect to demographic, environmental, behavioral, socioeconomic, genetic, and infectious risk factors" [10]. To this end, we can draw on data that reflect human behavior in terms of spatial location and movement. In particular, geolocation data [24], which includes geographical location information associated with the hosting device (e.g., mobile phone), is key for modeling the spread and evolution of infectious diseases in space and time.

    Using this kind of data, we cannot only track the movement patterns of individuals, but also derive general mobility patterns for the population over time. They give insight into, e.g., "the prediction of future moves, detecting modes of transport, mining trajectory patterns and recognizing location-based activities" [13]. That is, geolocation data is key data computational spatial empidemiologic models and simulations.

    The idea that a microscopic coronavirus in the city of Wuhan has caused an economic crisis in Europe reminds us of Edward Lorenz's famous speech at MIT, where he raised how the flapping of a butterfly in Brazil could cause a tornado in Texas. That is, the well-known butterfly effect and its repercussions on chaos theory.

    In this work, data about spatial population movement such as geolocation data are used as key sources of insight in the way infectious diseases spread in space and time among individuals. To this end, this work proposes a mathematical foundation following an inverse methodology on the chaotic bases [18] since it raises the search of the starting attractor or "patient zero". This procedure collects the ideas of reverse engineering, as a way of establishing the unknown initial parameters of a problem whose solutions and effects are known.

    In particular, tracking and analyzing population movements are key to get insights about patterns of propagation of environmentally-transmitted pathogens. For example in the case of Covid-19, "[...] changing geography of migration, the diversification of jobs taken by migrants, the rapid growth of tourism and business trips, and the longer distance taken by people for family reunion are what make the spread of COVID-19 so differently from that of SARS" [19].

    To this end, we introduce a graph-based approach to model population movements in space and time, including a health status of individuals that allows us to classify risks for individuals as well as spatial locations and temporal periods.

    The main methods to be used will be differential geometry of curves adapted to the symptomatology of the disease and graph theory for its representation and monitoring [16]. In its inverse reasoning, we can establish algorithms that, e.g., facilitate finding a "patient zero", classify possible originators of the contagion [1,3,12,17,20], or classify spatial locations with respect to the spread of pathogens.

    As a key source of human mobility patterns, we consider mobile phone location data. The high penetration of mobile phones in the population allows a very representative survey of mobility dynamics [14].

    The trajectories on which we base the monitoring of population movements are those recorded by the smartphones devices with GPS. We know that both smartphones and social networks [23] have the ability to store the paths followed by their owners, just as telephone companies can track that path followed by their customers [7,8]. This information is collected both by these devices and by the telephone companies, and can be represented geospatially by the different navigation systems. As an example we can see the path followed by an smartphone and represented in Figure 1 using Google Maps software:

    Figure 1.  Geolocation register.

    Definition 2.1. For every patient P we distinguish three disjointed and sequential time intervals (as can be seen in the medical graphs in Figure 2) that we will note by:

    Figure 2.  Incubation Time.

    1. H: where the person is "healthy". In the timeline it will be distinguished by a simple line and during this interval [5] (before infection) the value of the state variable will be 1.

    2. C: where the person is "contagious" (incubation period). This interval or latency period will be estimated, given the patient's symptoms, based on the maximum and minimum time it could take to become "ill". It will be represented by a double line and its state variable will be 2. Currently this period is from 0 to 7 days aproximately.

    3. I: where the patient is "ill". It will be represented by a triple line, together with the previous one completes the incubation time [21] and its state variable will be 3.

    Definition 2.2. To establish the path we use the notation of differential geometry by using Cartesian coordinates, incorporating the state variable over time ρ(t){1,2,3} remaining:

    α(t)=(x(t),y(t),ρ(t))witht{HCI}

    and whose graph is represented in Figure 3.

    Figure 3.  Patient graph.

    Definition 2.3. We will say that a contagion has occurred if, given two patients Pi and Pj it is fulfilled:

    the paths cross in a sufficiently close environment, i.e. there is a maximum transmission distance M such that:

    foraninstanttitisfulfilledthat(xi(t)xj(t))2+(yi(t)yj(t))2M

    To simplify the calculation, without loss of generality, we will consider that this distance M is null, or what is the same, they are in the same place. With this we have:

    foraninstanttitisfulfilledthat(xi(t),yi(t))=(xj(t),yj(t))

    one patient's status must be "contagious" and the other patient's status must be "ill", i.e., tC for Pi and tI for Pj or vice versa. This is simplified as ρi(t)ρj(t)=6 (product of a state that is "contagious" by another "ill").

    We will note the contagion between both patients as PiPj.

    Notation 2.4. The point of infection of each patient P will be identified with the symbol and its coordinates will be =(x,y,n,t) where:

    x and y are the cartesian coordinates of the place of infection

    n is the variable where the number of infections produced in this place is accumulated.

    t is the variable that indicates the furthest moment in which the contagion occurred in this place.

    It can be seen in the contagion graph of Figure 4 that a different situation occurs at each confluence i since in

    Figure 4.  Contagious points graph.

    1 Both patients are healthy

    2 The second patient P2 has been infected by the first P1

    3 The first patient P1 is still "healthy" after meeting the second P2 who is ill. They may not have coincided in time at this intersection and the first one was not in a "contagious" state.

    4 Here both patients are already "ill"

    Procedure 3.1 (Intersections analysis). Given two different paths, αi and αj, these can be subdivided into segments, being considered therefore as polygonal *. Hence, the analysis of intersections is restricted to the calculation of common points between two segments of different paths [16]. Let us consider the segments between points:

    *A polygonal sufficiently close to the curve is considered. Its existence is assured by Schoenflies theorem for polygonal Jordan curves. This concept also appears in the formulation of the length of a parametric curve, making use of the approximations by sufficiently small segments and its use in the Riemann integral.

    Sip=¯(xip(t1),yip(t1))(xip+1(t2),yip+1(t2))αi
    Sjq=¯(xjq(t3),yjq(t3))(xjq+1(t4),yjq+1(t4))αj

    1. We check for the existence of temporal (one-dimensional) intersection, that is, time concurrence:

    (t1,t2)(t3,t4)Øt1t4t3t2

    2. We check for geometric (two-dimensional) intersection:

    (a) It can be done by solving the system, as long as it is well-conditioned:

    {xip(t1)+λ(xip+1(t2)xip(t1))=xjq(t3)+μ(xjq+1(t4)xjq(t3))yip(t1)+λ(yip+1(t2)yip(t1))=yjq(t3)+μ(yjq+1(t4)yjq(t3))

    If there are 0λ1 and 0μ1 that fulfill both equations or are collinear, that is:

    |xip+1(t2)xip(t1)xjq+1(t4)xjq(t3)yip+1(t2)yip(t1)yjq+1(t4)yjq(t3)|=0

    where contagion could occur if they are coincidental:

    xip+1(t2)xip(t1)yip+1(t2)yip(t1)=xjq+1(t4)xjq(t3)yjq+1(t4)yjq(t3)=xip(t1)xjq(t3)yip(t1)yjq(t3)

    In any other situation, as there are no points in common between the segments, the minimum distances between each point and the opposite segment are calculated. Finally, it is checked whether the minimum of them is below the maximum transmission distance, so that there is a possibility of contagion (as Figure 5):

    Figure 5.  Distances between points and opposite segments.
    min{d1,d2,d3,d4}M

    In this case the execution time for n segments would be

    Θ(n2)

    (b) Or using Bentley's & Ottmann algorithm [4], whose execution time for n segments with s points of intersection is

    Θ(nlog(n)+slog(n))

    Procedure 3.2 (Establishing Contagion). The big data algorithm must fulfill the following phases:

    1. Analyze the intersections of patient trajectories by pairs (αi and αj) where contagion may occur [15]:

    findtsuchthat(xi(t),yi(t))=(xj(t),yj(t))withρi(t)ρj(t)=6

    2. In each analysis, establish the possible point of contagion (if any) and increase both its contagion index and its most remote time variable in which a contagion occurred

    For=(x,y,n,t),isexecutedn=n+1

    3. Patients are classified according to the sum of the indexes of all the points of contagion contained in their trajectory. In this way, we will order the patients from the one that has caused the most infections to the one that has caused the least.

    4. Patients are classified according to the lowest value of t contained in their points of contagion. With this we can establish patient zero.

    With this procedure, we calculate the distribution of contagion points of known patients k, and the final number of contagions in each one of them k, which gives us an image of the city as shown in Figure 6:

    Figure 6.  Number of possible contagions at each point.

    Once the possible cut-off points between known patient routes have been established, we ask ourselves whether there are any undetected patients who can be deduced from the possible points of contagion. This question involves a probabilistic analysis of what the possible path of the unknown patient would look like.

    Let us suppose that there is an unknown patient that has been causing an uncontrolled contagion, which we will call Px.

    1. If the contagion has occurred at an intersection ij of two "contagious" patients Pi and Pj, that is, ρi(t)ρj(t)=4, it could be that:

    (a) one of them was already really ill: This forces a recalculation of the C and I intervals for both. In this case, if the one who was already ill had been Pi, he must have been previously infected by a stranger, and therefore there was a cross with Px. Similarly for Pj.

    (b) neither of them infected the other: In this case there is a coincidence of the path of both with the one of Px at the point of infection.

    In both cases we assign a new contagion in the point ij, although in the first assumption we also know that there is some point in the path of Pi or Pj in the state C where it must have crossed with that of Px in the state I. Therefore, if we call t(ij,C0i) and t(ij,C0j) the time from the crossing point to the place where Pi and Pj met Px respectively, which are C0i and C0j, then the crossing probabilities (CP) with Px of each interval are set as:

    PC(x,i)=t(ij,C0i)[Ci]
    PC(x,j)=t(ij,C0j)[Cj]

    where [Ci] and [Cj] are the times at which Pi and Pj have been contagious.

    2. If the infection has occurred in the C range of any patient Pi, the path of Px matches that of Pi with ρi(t)=2 and ρx(t)=3. In this case it is known that there is some point in the path of Pi in the state C where it should have crossed with that of Px in the state I. Here the probability of the whole C interval is equal to 1.

    The zone graph, in these cases, is represented by Figure 7

    Figure 7.  Intervals with probability of contagion.

    Procedure 4.1 (Inverse graphs by big data). The big data algorithm will then be based on finding, of all existing paths of citizens that go through this area, those that achieve a higher sum of probabilities at the intersections of the N intervals of known contagion [12].

    1. To do this, the route followed by each citizen's smartphone Px is analysed and its intersections with the probable paths, assuming that this citizen was permanently ill:

    αx(t)=(x(t),y(t),3)

    2. This would cause a contagion at each intersection and would add probabilities to its final value.

    Ni=1PC(x,i)conPxPi

    3. Those candidates with the highest score will be studied to see if they are carriers or not. A new set of patients will be deducted from the patients prior to the existing ones. Using the procedure recursively, we will reach patient zero.

    After the theoretical development of the Inverse Graph method, the general geolocation algorithm has been programmed using a Computer Algebra System (CAS) as MatLab . The developed algorithm has a quadratic execution time, i.e. Θ(n2) and its pseudo-code would be as follows:

    Algorithms and functions programmed in MatLab version R2020b and tested on a MacBook with processor 1.3 GHz Intel Core m7

    All that appears between braces are comments

    begin      Read kml compress files from Google Maps timeline for each

             user i. Build matrix Mi of coordinates and its convex hull.

             Analyzes only disjunct concentrations of convex hulls (Figure 8)

    Figure 8.  Convex hulls non-disjoint and spatial-temporal intersections.

    M=[]; for i:1:users do M=[M;Mi] end for

    Times = intervals(M);      {Build matrix time interval for all users}

    I = sort(Times)      {Sort the intervals as a function of time}

    point = []; inter = size(I, 1);

    for j = 2:inter

         for i = 1:j-1      {Check the space-time match}

             if fit(Times(i), Times(j))

                 point = cuts(I, Times, M);      {Found intersection points}

             end if

         end for

      end for

    end

    Next Table 1 and Figures below (Figures 9 and 10) show execution times (in seconds) and the number of contact points that occurred between different people, based on user graph intersections for the last twelve days, with an average of 388 vertexes at their polygonal paths for each user

    Table 1.  Execution time and intersection points found.
    Users Time Points
    10 0.29 837
    20 0.41 1755
    30 0.72 2565
    40 0.94 3595
    50 1.20 4954
    100 3.60 10746
    150 7.68 15397

     | Show Table
    DownLoad: CSV
    Figure 9.  Execution time.
    Figure 10.  Intersection points.

    The capacity of Big Data to solve the problem will depend on the reduction that is made on the population to be analyzed for the search of the patient zero [20].

    This reduction is conditioned by the need for temporal and geometric coincidence of the routes with those of the probable intervals. Therefore, it is a priority to establish the condition of temporal coincidence, which will considerably reduce the set of candidates (Figure 11), and then analyze the intersections in the plane.

    Figure 11.  Progressive reduction.

    Each element aij of a dispersed matrix of contagions A=(aij) would represent with values 0 or 1 the possibility that the patient Pi has infected the patient Pj, with i,j{1,,N}

    With this representation the rows i, whose sum of terms is greater Nj=1aij, will correspond to the index of the most dangerous patients. The number of infections of the most dangerous patient will be indicated by

    ||A||=maxiNj=1aij

    The application of Markov Chains on arrays, whose elements represent the mesh of an area, will allow us to see to which position each individual moves in a unit of time and to which state of health he can evolve [3,17].

    Neural networks can provide a trained system for the pre-selection of possible candidates for asymptomatic or unknown patients [1].

    We thank the support of this paper from University of Málaga and CBUA (funding for open access charge: Universidad de Málaga / CBUA) and we thank also the anonymous reviewers whose suggestions helped improve and clarify this manuscript.. This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.

    The authors declare that there are no conflicts of interest.



    [1] W. R. Mann, Mean value methods in iteration, Proc. Amer. Math. Soc., 4 (1953), 506–510. https://doi.org/10.1090/S0002-9939-1953-0054846-3 doi: 10.1090/S0002-9939-1953-0054846-3
    [2] S. Ishikawa, Fixed points by a new iteration method, Proc. Amer. Math. Soc., 44 (1974), 147–150. https://doi.org/10.1090/S0002-9939-1974-0336469-5 doi: 10.1090/S0002-9939-1974-0336469-5
    [3] M. A. Noor, New approximation schemes for general variational inequalities, J. Math. Anal. Appl., 251 (2000), 217–229. https://doi.org/10.1006/jmaa.2000.7042 doi: 10.1006/jmaa.2000.7042
    [4] R. P. Agarwal, D. O. Regan, D. R. Sahu, Iterative construction of fixed points of nearly asymptotically nonexpansive mappings, J. Nonlinear Convex Anal., 8 (2007), 61–79.
    [5] M. Abbas, T. Nazir, A new faster iteration process applied to constrained minimization and feasibility problems, Math. Vesn., 66 (2014), 223–234.
    [6] W. Phuengrattana, S. Suantai, On the rate of convergence of Mann, Ishikawa, Noor and SP-iterations for continuous functions on an arbitrary interval, J. Comput. Appl. Math., 235 (2011), 3006–3014. https://doi.org/10.1016/j.cam.2010.12.022 doi: 10.1016/j.cam.2010.12.022
    [7] I. Karahan, M. Ozdemir, A general iterative method for approximation of fixed points and their applications, Adv. Fixed Point Theory, 3 (2013), 510–526.
    [8] R. Chugh, V. Kumar, S. Kumar, Strong convergence of a new three step iterative scheme in Banach spaces, Amer. J. Comput. Math., 2 (2012), 345–357. https://doi.org/10.4236/ajcm.2012.24048 doi: 10.4236/ajcm.2012.24048
    [9] D. R. Sahu, A. Petruşel, Strong convergence of iterative methods by strictly pseudocontractive mappings in Banach spaces, Nonlinear Anal.: Theory Methods Appl., 74 (2011), 6012–6023. https://doi.org/10.1016/j.na.2011.05.078 doi: 10.1016/j.na.2011.05.078
    [10] F. Gürsoy, V. Karakaya, A Picard-S hybrid type iteration method for solving a differential equation with retarded argument, arXiv, 2014. https://arXiv.org/abs/1403.2546
    [11] B. S. Thakur, D. Thakur, M. Postolache, A new iterative scheme for numerical reckoning fixed points of Suzuki's generalized nonexpansive mappings, Appl. Math. Comput., 275 (2016), 147–155. https://doi.org/10.1016/j.amc.2015.11.065 doi: 10.1016/j.amc.2015.11.065
    [12] K. Ullah, M. Arshad, Numerical reckoning fixed points for Suzuki's generalized nonexpansive mappings via new iteration process, Filomat, 32 (2018), 187–196. https://doi.org/10.2298/FIL1801187U doi: 10.2298/FIL1801187U
    [13] K. Ullah, M. Arshad, New iteration process and numerical reckoning fixed points in Banach spaces, U. P. B. Sci. Bull., Ser. A, 79 (2017), 113–122.
    [14] C. Garodia, I. Uddin, A new fixed point algorithm for finding the solution of a delay differential equation, AIMS Math., 5 (2020), 3182–3200. https://doi.org/10.3934/math.2020205 doi: 10.3934/math.2020205
    [15] S. Thianwan, Common fixed points of new iterations for two asymptotically nonexpansive nonself-mappings in a Banach space, J. Comput. Appl. Math., 224 (2009), 688–695. https://doi.org/10.1016/j.cam.2008.05.051 doi: 10.1016/j.cam.2008.05.051
    [16] H. A. Hammad, H. ur Rehman, M. De la Sen, A novel four-step iterative scheme for approximating the fixed point with a supportive application, Inf. Sci. Lett., 10 (2021), 14.
    [17] H. A. Hammad, H. ur Rehman, H. Almusawa, Tikhonov regularization terms for accelerating inertial Mann-Like algorithm with applications, Symmetry, 13 (2021), 554. https://doi.org/10.3390/sym13040554 doi: 10.3390/sym13040554
    [18] K. Ullah, M. Arshad, New three-step iteration process and fixed point approximation in Banach spaces, J. Linear Topol. Algebra, 7 (2018), 87–100.
    [19] K. Maleknejad, P. Torabi, Application of fixed point method for solving Volterra-Hammerstein integral equation, U. P. B. Sci. Bull., Ser. A., 74 (2012), 45–56.
    [20] K. Maleknejad, M. Hadizadeh, A New computational method for Volterra-Fredholm integral equations, Comput. Math. Appl., 37 (1999), 1–8. https://doi.org/10.1016/S0898-1221(99)00107-8 doi: 10.1016/S0898-1221(99)00107-8
    [21] A. M. Wazwaz, A reliable treatment for mixed Volterra-Fredholm integral equations, Appl. Math. Comput., 127 (2002), 405–414. https://doi.org/10.1016/S0096-3003(01)00020-0 doi: 10.1016/S0096-3003(01)00020-0
    [22] Y. Atlan, V. Karakaya, Iterative solution of functional Volterra-Fredholm integral equation with deviating argument, J. Nonlinear Convex Anal., 18 (2017), 675–684.
    [23] N. Lungu, I. A. Rus, On a functional Volterra-Fredholm integral equation, via Picard operators, J. Math. Ineq., 3 (2009), 519–527.
    [24] A. E. Ofem, D. I. Igbokwe, An efficient iterative method and its applications to a nonlinear integral equation and a delay differential equation in Banach spaces, Turkish J. Ineq., 4 (2020), 79–107.
    [25] A. E. Ofem, U. E. Udofia, Iterative solutions for common fixed points of nonexpansive mappings and strongly pseudocontractive mappings with applications, Canad. J. Appl. Math., 3 (2021), 18-36.
    [26] H. A. Hammad, H. Aydi, M. De la Sen, Solutions of fractional differential type equations by fixed point techniques for multivalued contractions, Complexity, 2021 (2021), 5730853. https://doi.org/10.1155/2021/5730853 doi: 10.1155/2021/5730853
    [27] V. Berinde, On the approximation of fixed points of weak contractive mapping, Carpathian J. Math., 19 (2003), 7–22.
    [28] V. Berinde, Picard iteration converges faster than Mann iteration for a class of quasicontractive operators, Fixed Point Theory Appl., 2004 (2004), 716359. https://doi.org/10.1155/S1687182004311058 doi: 10.1155/S1687182004311058
    [29] H. F. Senter, W. G. Dotson, Approximating fixed points of nonexpansive mapping, Proc. Amer. Math. Soc., 44 (1974), 375–380. https://doi.org/10.1090/S0002-9939-1974-0346608-8 doi: 10.1090/S0002-9939-1974-0346608-8
    [30] T. Suzuki, Fixed point theorems and convergence theorems for some generalized nonexpansive mappings, J. Math. Anal. Appl. Math., 340 (2008), 1088–10995. https://doi.org/10.1016/j.jmaa.2007.09.023 doi: 10.1016/j.jmaa.2007.09.023
    [31] S. M. Şoltuz, T. Grosan, Data dependence for Ishikawa iteration when dealing with contractive like operators, Fixed Point Theory Appl., 2008 (2008), 242916. https://doi.org/10.1155/2008/242916 doi: 10.1155/2008/242916
    [32] J. Schu, Weak and strong convergence to fixed points of asymptotically nonexpansive mappings, B. Aust. Math. Soc., 43 (1991), 153–159. https://doi.org/10.1017/S0004972700028884 doi: 10.1017/S0004972700028884
    [33] A. Bielecki, Une remarque sur l'application de la méthode de Banach-Cacciopoli-Tikhonov dans la théorie de l'équation s=f(x,y,z,p,q), Bull. Acad. Polon. Sci. Sér. Sci. Math. Phys. Astr., 4 (1956), 265–357.
    [34] F. Facchinei, J. S. Pang, Finite-dimensional variational inequalities and complementarity problems, Springer Series in Operations Research, New York: Springer, 2003. https://doi.org/10.1007/b97543
    [35] I. Konnov, Combined relaxation methods for variational inequalities, Lecture Notes in Economics and Mathematical Systems, Berlin: Springer-Verlag, 2001. https://doi.org/10.1007/978-3-642-56886-2
    [36] G. M. Korpelevich, The extragradient method for finding saddle points and other problems, Matecon, 12 (1976), 747–756.
    [37] C. Martinez-Yanes, H. K. Xu, Strong convergence of the CQ method for fixed point iteration processes, Nonlinear Anal., 64 (2006), 2400–2411. https://doi.org/10.1016/j.na.2005.08.018 doi: 10.1016/j.na.2005.08.018
    [38] H. A. Hammad, H. ur. Rahman, M. De la Sen, Shrinking projection methods for accelerating relaxed inertial Tseng-type algorithm with applications, Math. Probl. Eng., 2020 (2020), 7487383. https://doi.org/10.1155/2020/7487383 doi: 10.1155/2020/7487383
    [39] T. M. Tuyen, H. A. Hammad, Effect of shrinking projection and CQ-methods on two inertial forward-backward algorithms for solving variational inclusion problems, Rend. Circ. Mat. Palermo, II. Ser., 70 (2021), 1669–1683. https://doi.org/10.1007/s12215-020-00581-8 doi: 10.1007/s12215-020-00581-8
    [40] H. H. Bauschke, P. L. Combettes, Convex analysis and monotone operator theory in Hilbert spaces, New York: Springer, 2011. https://doi.org/10.1007/978-1-4419-9467-7
    [41] H. H. Bauschke, J. M. Borwein, On projection algorithms for solving convex feasibility problems, SIAM Rev., 38 (1996), 367–426. https://doi.org/10.1137/S0036144593251710 doi: 10.1137/S0036144593251710
    [42] P. Chen, J. Huang, X. Zhang, A primal-dual fixed point algorithm for convex separable minimization with applications to image restoration, Inverse Probl., 29 (2013), 025011. https://doi.org/10.1088/0266-5611/29/2/025011 doi: 10.1088/0266-5611/29/2/025011
    [43] Y. Dang, J. Sun, H. Xu, Inertial accelerated algorithms for solving a split feasibility problem, J. Ind. Manag. Optim., 13 (2017), 1383–1394. https://doi.org/10.3934/jimo.2016078 doi: 10.3934/jimo.2016078
  • This article has been cited by:

    1. Dennis Opoku Boadu, Justice Kwame Appati, Joseph Agyapong Mensah, Exploring the Effectiveness of Graph-based Computational Models in COVID-19 Research, 2024, 5, 2662-2556, 10.1007/s43069-024-00362-4
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2088) PDF downloads(77) Cited by(6)

Figures and Tables

Figures(5)  /  Tables(5)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog