Next Article in Journal
A Reduced-Dimension Weighted Explicit Finite Difference Method Based on the Proper Orthogonal Decomposition Technique for the Space-Fractional Diffusion Equation
Previous Article in Journal
A Method for Calculating the Reliability of 2-Separable Networks and Its Applications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Split Equality Fixed-Point Problem and Its Applications

by
Lawan Bulama Mohammed
1,* and
Adem Kilicman
2
1
Department of Mathematics, Faculty of Physical Sciences, Federal University Dutse, Dutse PMB 7156, Jigawa State, Nigeria
2
School of Mathematical Sciences, College of Computing, Informatics and Mathematics, Universiti Teknologi MARA, Shah Alam 40450, Selangor, Malaysia
*
Author to whom correspondence should be addressed.
Axioms 2024, 13(7), 460; https://doi.org/10.3390/axioms13070460
Submission received: 30 May 2024 / Revised: 4 July 2024 / Accepted: 4 July 2024 / Published: 8 July 2024

Abstract

:
It is generally known that in order to solve the split equality fixed-point problem (SEFPP), it is necessary to compute the norm of bounded and linear operators, which is a challenging task in real life. To address this issue, we studied the SEFPP involving a class of quasi-pseudocontractive mappings in Hilbert spaces and constructed novel algorithms in this regard, and we proved the algorithms’ convergences both with and without prior knowledge of the operator norm for bounded and linear mappings. Additionally, we gave applications and numerical examples of our findings. A variety of well-known discoveries revealed in the literature are generalized by the findings presented in this work.

1. Introduction

In this manuscript, we utilize the following notations: . , . denotes an inner product and . represents its corresponding norm. We designate H j , j = 1 , 2 , 3 , as Hilbert spaces, K j as nonempty, convex, and closed subsets of H j , and D j : H j H j , j = 1 , 2 , as bounded and linear mappings. The symbols ⇀ and → signify weak and strong convergences, respectively.
A mapping T : H 1 H 1 is known as a fixed point of T (Fix( T )) if T p = p , for all p H 1 . We denote the set of Fix( T ) by { p F i x ( T ) : T p = p } . T is known to be quasi-nonexpansive if T y p y p , y H 1 and p Fix ( T ) . It is obvious that if T is quasi-nonexpansive then T y y 2 y T y , y p .   T is called demicontractive if p T y 2   p y 2 +   β y T y 2 , y H 1 , p F i x ( T ) and β [ 0 , 1 ) , and it is called quasi-pseudocontractive if β = 1 .   T is known as β strongly monotone if T y T p , y p β T y T p 2 , y , p H 1 , β > 0 .
Remark 1. 
The quasi-pseudocontractive mapping encompasses various types of mappings, including quasi-nonexpansive, demicontractive, and several others. For further details, please refer to [1] and the cited references therein.
The problem of finding
p * K 1 such that D 1 p * K 2
is known as the “Split Feasibility Problem (SFP)”. The SFP, initially introduced by [2], has garnered significant attention from researchers due to its versatile applications in practical domains. These applications span a wide spectrum, encompassing fields such as signal processing, intensity-modulated radiation therapy, and image reconstruction, as documented in [3,4,5].
If the problem stated in (1) possesses a solution, it is evident that p * K 1 is a solution to Equation (1) if and only if it also solves
p * = P K 1 I λ D 1 * ( I P K 2 ) D 1 p * , p * K 1 ,
where λ > 0 , P K j are metric projections on K j , j = 1 , 2 , respectively.
To address problem (1), Byrne [6] proposed the following algorithm, known as the CQ algorithm:
x n + 1 = P K 1 I λ D 1 * ( I P K 2 ) D 1 x n ,
where λ ( 0 , 2 D 1 D 1 * ) . Equation (3) involves the computation of P K j onto K j , j = 1 , 2 , and this is known to be implementable when the projections have closed-form expressions.
Related to SFP, we have the “Split Equality Problem (SEP)”. This problem was introduced by Moudafi and Al-Shemas [7] and it entails finding
p * K 1 and q * K 2 such that D 1 p * = D 2 q * .
By using D 2 = I (identity mapping), it is easy to see that the SEP reduces to the SFP. The following algorithm was taken into consideration by Moudafi and Al-Shemas [7] to solve the SEP (4):
x n + 1 = P K 1 x n λ n D 1 * ( D 1 x n D 2 y n ) , n 0 ; y n + 1 = P K 2 y n + λ n D 2 * ( D 1 x n D 2 y n ) , n 0 ;
where ( x 0 , y 0 ) H 1 × H 2 are chosen arbitrarily and P K j , j = 1 , 2 , were metric projections on K j s . After some certain condition was imposed on λ n , they obtained a weak convergence result.
As any nonempty, closed, and convex subset of a Hilbert space can be viewed as the fixed point set of its corresponding projector, Equation (4) is consequently simplified to find
p * F i x ( T 1 ) and q * F i x ( T 1 ) such that D 1 p * = D 2 q * ,
where T j : K j H j , j = 1 , 2 , are nonlinear operators with F i x ( T j ) . Equation (6) is regarded as the “Split Equality Fixed-Point Problem (SEFPP)”.
Motivated by the result in [7], Moudafi [8] considered the algorithm below:
x n + 1 = T 1 x n λ n D 1 * ( D 1 x n D 2 y n ) , n 0 ; y n + 1 = T 2 y n + λ n D 2 * ( D 1 x n D 2 y n ) , n 0 .
After some conditions were imposed on the parameters and operators involved, they proved weak convergence results.
To solve (7), the inverse of a bounded and linear operator must be computed, and this is known to be no easy task. This is why Byne [6] considered an algorithm for solving the SFP without the stated inverse.
It was reported by Mohammed and Kilicman [9] that the SFP can be reduced to a convex feasibility problem (CFP) as well as a fixed-point problem (FPP). Fixed-point theory (FPT) can be considered a core area of research in nonlinear analysis due to its various applications in many areas of research, such as image processing and equilibrium problems, the study of the existence and uniqueness of solutions for the integral, and differential equations, selection, and matching problems (see Mohammed et al. [10]).
The roots of fixed-point theory can be traced back to the early developments in topology, notably through contributions from Poincaré, Lefschetz–Hopf, and Leray–Schauder. These pioneers laid the groundwork that now spans diverse areas of analysis. Topological considerations play a pivotal role in FPT, often intersecting with degree theory to tackle significant existence problems. This approach is invaluable in scenarios ranging from solving elliptic partial differential equations to identifying closed periodic orbits in dynamical systems. For more details, see Khan [11]. For further exploration, recent studies by Antón-Sancho [12] delve into the fixed points of automorphisms within vector bundle moduli spaces over compact Riemann surfaces, offering new perspectives and advancing the interdisciplinary scope of fixed-point theory.
Moudafi’s algorithm in [8] involved firmly quasi-nonexpansive mapping; this mapping includes the quasi-nonexpansive class. Very recently, Che and Li [13] considered the following algorithm for finding the solution of the SEP and proved the convergence results of the algorithm:
x n + 1 = β n u n + ( 1 β n ) T 1 u n ; u n = x n λ n D 1 * ( D 1 x n D 2 y n , n 0 ; y n + 1 = β n v n + ( 1 β n ) T 2 v n ; v n = y n + λ n D 2 * ( D 1 x n D 2 y n ) , n 0 ;
where T 1 and T 2 are strictly pseudononspreading mappings.
Since quasi-pseudocontractive mapping includes firmly quasi-nonexpansive, quasi-nonexansive, directed, and demicontractive mappings, this motivated Chang et al. [1] to introduce the following algorithm for solving the SEFPP involving quasi-pseudocontractive mappings and proved the convergence result of the algorithm:
x n + 1 = β n x n + ( 1 β n ) ( 1 η ) I + η T 1 ( ( 1 ζ ) I + ζ T 1 ) + β n u n ; u n = x n λ n D 1 * ( D 1 x n D 2 y n ) , n 0 . y n + 1 = β n y n + ( 1 β n ) ( 1 η ) I + η T 1 ( ( 1 ζ ) I + ζ T 2 ) + β n u n ; v n = y n + λ n D 2 * ( D 1 x n D 2 y n ) , n 0 .
The proposed algorithm by Chang et al. [1] requires prior knowledge of operator norms. A similar result had been proved in [14]. Very recently, Mohammed et al. [10] proved the convergence of the following algorithm for the class of total quasi-asymptotically nonexpansive mappings:
x n + 1 = ( 1 β n ) u n + β n T 1 n u n ; u n = ( 1 γ n ) x n + γ n T 1 n x n λ n D 1 * ( D 1 x n D 2 y n ) , n 0 ; y n + 1 = ( 1 β n ) v n + β n T 2 n v n ; v n = ( 1 γ n ) y n + γ n T 1 n y n λ n D 2 * ( D 1 x n D 2 y n ) , n 0 ;
The findings in [1,10,14] both converged weakly; in an infinite-dimensional space, weak convergence does not imply strong convergence, whereas strong and weak convergences coincide if the dimension is finite.
Based on these findings, we set out to develop new methods for solving the SEFPP for quasi-pseudocontractive mappings in Hilbert spaces and to demonstrate how the suggested methods converge. The suggested algorithms’ convergence findings will also be presented in a form that frees them from the constraints imposed by the operator norm of bounded and linear operators. At the end, we provide numerical examples that highlight our findings.
The following is how the paper is set up: The background of the study is explained in the introduction, and some fundamental findings are presented in the Section 2. The main result is discussed in Section 3, while in Section 4, applications and numerical results are discussed.

2. Preliminaries

This section offers a few fundamental findings that support the paper’s primary findings.
Definition 1. 
A mapping T : H 1 H 1 is said to be semi-compact if for any bounded sequence { x n } H 1 with x n T x n 0 , then there exist { x n i } { x n } such that x n i x H 1 .
Lemma 1 
(Chang et al. [14]). Suppose T : H 1 H 1 is Lipschitz with L > 0 , and U : = ( 1 η ) I + η T ( ( 1 ζ ) I + ζ T ) , then
a. 
F i x ( T ) = F i x ( ( 1 η ) I + η T ( ( 1 ζ ) I + ζ T ) = F i x ( U ) ;
b. 
U is demiclosed at zero only if T is demiclosed at zero.
c. 
U is Lipschitz with L 2
d. 
U is quasi-nonexpansive only if T is quasi-pseudocontractive.
Lemma 2 
(Opial, [15]). Suppose Ω H , for { x n } Ω , then
a. 
lim n x n x , x Ω , exist;
b. 
For any weak cluster point of x n Ω , then x n y , y Ω .
Lemma 3 
(Xu, [16]). Let { x n } , { γ n } R + such that
x n + 1 ( 1 ξ n ) x n + γ n , n 0 ,
where { ξ n } ( 0 , 1 ) , then
a. 
lim n ξ n = 0 and n ξ n = ;
b. 
lim sup n γ n ξ n 0 or n | γ n | < , then, lim n x n = 0 .
Lemma 4 
(Xu, [16]). Let { ξ n } , { η n } R + such that n = 0 η n < . If
ξ n + 1 ( 1 + η n ) ξ n o r ξ n + 1 ξ n + η n , n 0 ,
then lim n ξ n exist.

3. Main Results

The sequel will use Γ to represent the solution set for (6), that is
Γ : = { x * Fix ( T 1 ) and y * Fix ( T 2 ) such that D 1 x * = D 2 y * } .
The following presumptions were used to approximate (11).
Suppose that
(A1)
T j : H j H j , j = 1 , 2 , are two quasi-pseudocontractive operators with F i x ( T j ) , j = 1 , 2 , in addition, suppose T 1 is L-Lipschitz.
(A2)
D j : H j H j , j = 1 , 2 , are linear and bounded operators with their adjoints D 1 * and D 2 * , respectively.
(A3)
( T j I ) , j = 1 , 2 , are demiclosed at origin.
(A4)
Let U and V be defined below:
U = ( 1 η ) I + η T 1 ( ( 1 ζ ) I + ζ T 1 ) , V = ( 1 η ) I + η T 2 ( ( 1 ζ ) I + ζ T 2 ) ,
where 0 < η < ζ < 1 1 + 1 + L 2 .
(A5)
Algorithm:Let ( x n , y n )   H 1 × H 2 , be defined by
x n + 1 = ( 1 α n ) v n + α n U v n ; v n = ( 1 τ n ) x n + τ n U x n + τ n D 1 * ( D 2 y n D 1 x n ) , n 0 , y n + 1 = ( 1 α n ) w n + α n V w n ; w n = ( 1 τ n ) y n + τ n V y n + τ n D 2 * ( D 1 x n D 2 y n ) , n 0 ,
where ( x 0 , y 0 ) H 1 × H 2 are chosen arbitrarily, 0 < a < α n < 1 , and τ n 0 , 2 L 1 + L 2 , where L 1 = D 1 * D 1 and L 2 = D 2 * D 2 , respectively, lim n τ n = 0 and n τ n = .
Theorem 1. 
Suppose ( A 1 ) ( A 5 ) are held and that Γ . Then, { ( x n , y n ) } defined by (13) converges weakly to ( x * , y * ) Γ , in addition if T 1 and T 2 are semi-compact, then { ( x n , y n ) } converges strongly to ( x * , y * ) Γ .
Proof. 
Let ( p , q ) Γ , noticing that U is quasi-nonexpansive (see Lemma 1), then by (13), we have
x n + 1 p 2 = ( 1 α n ) v n + α n U v n p 2 = ( 1 α n ) ( v n p ) + α n ( U v n p ) 2 = ( 1 α n ) v n p 2 + α n U v n p 2 ( 1 α n ) α n U v n v n 2 v n p 2 , and
v n p 2 = ( 1 τ n ) x n + τ n U x n + τ n D 1 * ( D 2 y n D 1 x n ) p 2 = ( 1 τ n ) ( x n p ) + τ n ( U x n P ) + τ n D 1 * ( D 2 y n D 1 x n ) 2 = ( 1 τ n ) ( x n p ) + τ n ( U x n p ) 2 + τ n 2 D 1 * ( D 2 y n D 1 x n ) 2 + 2 τ n ( 1 τ n ) ( x n p ) + τ n ( U x n p ) , D 1 * ( D 2 y n D 1 x n ) = ( 1 τ n ) x n p 2 + τ n U x n p 2 ( 1 τ n ) τ n U x n x n 2 + τ n 2 D 1 * ( D 2 y n D 1 x n ) 2 + 2 τ n ( 1 τ n ) x n p , D 1 * ( D 2 y n D 1 x n ) + 2 τ n 2 U x n x n + x n p , D 1 * ( D 2 y n D 1 x n ) x n p 2 ( 1 τ n ) τ n U x n x n 2 + τ n 2 D 1 * ( D 2 y n D 1 x n ) 2 + 2 τ n ( 1 τ n ) x n p , D 1 * ( D 2 y n D 1 x n ) + 2 τ n 2 U x n x n , D 1 * ( D 2 y n D 1 x n ) + 2 τ n 2 x n p , D 1 * ( D 2 y n D 1 x n ) x n p 2 + τ n 2 D 1 * ( D 2 y n D 1 x n ) 2 ( 1 τ n ) τ n U x n x n 2 + 2 τ n D 1 x n D 1 p , D 2 y n D 1 x n + 2 τ n 2 U D 1 x n D 1 x n , D 2 y n D 1 x n x n p 2 + τ n 2 D 1 * ( D 2 y n D 1 x n ) 2 ( 1 τ n ) τ n U x n x n 2 + 2 τ n D 1 x n D 1 p , D 2 y n D 1 x n τ n 2 U D 1 x n D 1 x n 2 .
By (14) and (15), we have
x n + 1 p 2 x n p 2 + τ n 2 L 1 D 2 y n D 1 x n 2 ( 1 τ n ) τ n U x n x n 2 2 τ n D 1 x n D 1 p , D 2 y n D 1 x n τ n 2 U D 1 x n D 1 x n 2 .
Similarly,
y n + 1 q 2 y n q 2 + τ n 2 L 2 D 1 x n D 2 y n 2 ( 1 τ n ) τ n V y n y n 2 + 2 τ n D 2 y n D 2 q , D 1 x n D 2 y n τ n 2 V D 2 y n D 2 y n 2 .
Since D 1 p = D 2 q , coupled with (16) and (17), we have
x n + 1 p 2 + y n + 1 q 2 x n p 2 + y n q 2 τ n 2 τ n ( L 1 + L 2 ) D 1 x n D 2 y n 2 ( 1 τ n ) τ n U x n x n 2 + V y n y n 2 τ n 2 U D 1 x n D 1 x n 2 + V D 2 y n D 2 y n 2 .
This implies that
s n + 1 s n τ n 2 τ n ( L 1 + L 2 ) D 1 x n D 2 y n 2 ( 1 τ n ) τ n U x n x n 2 + V y n y n 2 τ n 2 U D 1 x n D 1 x n 2 + V D 2 y n D 2 y n 2 ,
where s n : = x n p 2 + y n q 2 .
Thus, s n + 1 s n , therefore, s n is a decreasing sequence that is bound from below by 0, hence, s n converges, therefore, we have that
D 1 x n D 2 y n 2 s n s n + 1 τ n 2 τ n ( L 1 + L 2 ) 2 ( s n s n + 1 ) 2 τ n ( L 1 + L 2 ) ( L 1 + L 2 ) ,
U x n x n 2 + V y n y n 2 s n s n + 1 τ n 1 τ n 2 ( s n s n + 1 ) 1 τ n ( L 1 + L 2 ) , and
U D 1 x n D 1 x n 2 + V D 2 y n D 2 y n 2 s n s n + 1 τ n 2 2 ( s n s n + 1 ) L 1 + L 2 .
These lead to
lim n D 1 x n D 2 y n = 0 ,
lim n U D 1 x n D 1 x n = 0 , lim n U x n x n = 0 , and lim n V D 2 y n D 2 y n = 0 , lim n V y n y n = 0 .
Since, U = ( 1 η ) I η T 1 ( ( 1 ζ ) I + ζ T 1 ) I , where 0 < η < ζ < 1 1 + 1 + L 2 and T 1 is Lipschitz, we have
η x n η T 1 x n =   x n ( 1 η ) x n η T 1 x n =   x n ( 1 η ) x n η T 1 ( ( 1 ζ ) I + ζ T 1 ) x n + η T 1 ( ( 1 ζ ) I + ζ T 1 ) x n η T 1 x n   x n ( 1 η ) x n η T 1 ( ( 1 ζ ) I + ζ T 1 ) x n +   η T 1 ( ( 1 ζ ) I + ζ T 1 ) x n η T 1 x n   x n U x n + η L ( ( 1 ζ ) I + ζ T 1 ) x n x n =   x n U x n + η ζ L x n T 1 x n .
Therefore,
x n T 1 x n 1 ( 1 ζ L ) η x n U x n .
Similarly,
y n T 2 y n 1 ( 1 ζ L ) η y n V y n .
By (21), we see that
lim n T 1 x n x n = 0 , and lim n T 2 y n y n = 0 .
Claim ( x n , y n ) ( x * , y * )
Since { s n } converges, it follows that ( x n , y n ) is bounded, which implies that there exist ( x * , y * ) Γ for which x n x * and y n y * .
Now, v n = x n τ n ( U x n x n ) + τ n D 1 * ( D 2 y n D 1 x n ) and w n = y n τ n ( V y n y n ) + τ n D 2 * ( D 1 x n D 2 y n ) , couple with (20) and (21), we deduce that v n x * and w n y * .
On the other hand, x n x * ,   v n x * , and lim n D 1 x n D 2 y n = 0 together with
v n = ( 1 τ n ) x n + τ n U x n + τ n D 1 * ( D 1 x n D 2 y n ) ,
we deduce that x * = U x * . Similarly, y * = V y * . These imply that x * = T 1 x * and y * = T 2 y * , see Lemma 1.
Now that x n x * and lim n T 1 x n x n = 0 couple with the demiclosedness of ( T 1 I ) at origin, we have x * F i x ( T 1 ) .
Similarly, y n y * and lim n T 2 y n y n = 0 together with the demiclosedness of ( T 2 I ) at origin, we see that y * F i x ( T 2 ) .
Since v n x * ,   w n y * and D 1 and D 2 are linear mappings, we have
D 1 v n D 1 x * , and D 2 w n D 2 y * .
This implies that
D 1 v n D 2 w n D 1 x * D 2 y * ,
which implies that
D 1 x * D 2 y * lim inf n D 1 v n D 2 w n = 0 .
Therefore, D 1 x * = D 2 y * . Noticing that ( x * , y * ) F i x ( T 1 ) × F i x ( T 2 ) , we conclude that ( x * , y * ) Γ .
Thus,
(i)
lim n s n exist, for all ( x * , y * ) Γ ,
(ii)
( x n , y n ) belong to Γ .
Hence, by Lemma 2, we see that ( x n , y n ) ( x * , y * ) Γ . Furthermore, since ( x n , y n ) is bounded coupled with Equation (24) and Definition 1 we deduce that ( x n , y n ) ( x * , y * ) Γ . This completes the proof. □

4. The SEFPP without Prior Knowledge of Operator Norms

This section gives the convergent result of the SEFPP without prior knowledge of the operator norms of bounded and linear operators D 1 : H 1 H 2 and D 2 : H 2 H 3 , respectively.
Theorem 2. 
Assume ( A 1 ) ( A 4 ) are satisfied, Γ , and let { ( x n , y n ) } be defined by
U = ( 1 η ) I + η T 1 ( ( 1 ζ ) I + ζ T 1 ) ; x n + 1 = ( 1 α n ) v n + α n U v n ; v n = ( 1 τ n ) x n + τ n U x n + τ n D 1 * ( D 1 y n D 1 x n ) , n 0 ; V = ( 1 η ) I + η T 2 ( ( 1 ζ ) I + ζ T 2 ) ; y n + 1 = ( 1 α n ) w n + α n V w n ; w n = ( 1 τ n ) y n + τ n V y n + τ n D 2 * ( D 1 x n D 2 y n ) , n 0 ;
where ( x 0 , y 0 ) H 1 × H 2 are chosen arbitrarily and
(i) 
0 < a < α n < 1 ;
(ii) 
τ n ( 0 , 1 ) , such that τ n = and τ n 2 < ;
then, ( x n , y n ) ( x * , y * ) Γ . In addition, if T 1 and T 2 are semi-compact, then { ( x n , y n ) } ( x * , y * ) Γ .
Proof. 
By (14), we deduce that
x n + 1 p 2 v n p 2 = x n τ n x n U x n τ n D 1 * ( D 2 y n D 1 x n ) p 2 = x n τ n k n p 2 , where k n = x n U x n D 1 * ( D 2 y n D 1 x n ) = x n p 2 2 τ n x n p , k n + τ n 2 k n 2 ,
thus,
x n + 1 p 2 x n p 2 2 τ n x n p , k n + τ n 2 k n 2 , and
x n p , k n = x n p , x n U x n D 1 * ( D 2 y n D 1 x n ) = x n p , x n U x n D 1 x n D 1 p , D 2 y n D 1 x n 1 2 x n U x n 2 D 1 x n D 1 p , D 2 y n D 1 x n ,
where U is quasi-nonexpansive.
Similarly,
y n + 1 q 2 y n q 2 2 τ n y n q , r n + τ n 2 r n 2 ,
where r n = y n V y n D 2 * ( D 1 x n D 2 y n ) , and
y n q , r n 1 2 y n V y n 2 D 2 y n D 2 q , D 1 x n D 2 y n ,
where V is quasi-nonexpansive. By (27) and (29), and the fact that D 1 p = D 2 q , we have
x n p , k n   + y n q , r n 1 2 x n U x n 2 D 1 x n D 1 p , D 2 y n D 1 x n + 1 2 y n V y n 2 D 2 y n D 2 q , D 1 x n D 2 y n = 1 2 x n U x n 2 + D 1 x n D 2 y n 2 + 1 2 y n V y n 2 + D 1 x n D 2 y n 2 1 2 x n U x n 2 + 1 D 1 2 D 1 * ( D 1 x n D 2 y n ) 2 + 1 2 y n V y n 2 + 1 D 2 2 D 2 * ( D 1 x n D 2 y n ) 2 1 2 max { 1 , D 1 2 } x n U x n 2 + D 1 * ( D 1 x n D 2 y n ) 2 + 1 2 max { 1 , D 2 2 } y n V y n 2 + D 2 * ( D 1 x n D 2 y n ) 2 1 4 max { 1 , D 1 2 , D 2 2 } ( y n V y n + D 1 * ( D 1 x n D 2 y n ) 2 + x n U x n 2 + D 2 * ( D 1 x n D 2 y n ) 2 ) η k n 2 + r n 2 ,
where η = 1 4 max { 1 , D 1 2 , D 2 2 } , k n   y n V y n + D 1 * ( D 1 x n D 2 y n ) and r n   x n U x n + D 2 * ( D 1 x n D 2 y n ) .
By (26), (28) and (30), we have
x n + 1 p 2 + y n + 1 q 2 x n p 2 + y n q 2 2 τ n x n p , k n 2 τ n y n q , r n + τ n 2 k n 2 + τ n 2 r n 2 x n p 2 + y n q 2 + τ n 2 k n 2 + r n 2 2 τ n η k n 2 + r n 2 , = x n p 2 + y n q 2 2 τ n η τ n 2 k n 2 + r n 2 .
The fact that U is L 2 -Lipschitzian, we have
k n = x n U x n D 1 * ( D 2 y n D 1 x n ) ( p U p ) + D 1 * ( D 2 q D 1 p ) x n p U ( x n P ) + D 1 * ( D 2 q D 1 p ) D 1 * ( D 2 y n D 1 x n ) ( 1 + L 2 ) x n p + D 1 * ( D 1 x n D 1 p ) ( D 2 y n D 2 q ) ( 1 + L 2 ) x n p + D 1 * D 1 x n p + D 2 y n q ( 1 + L 2 ) x n p + D 1 * max D 1 , D 2 x n p + y n q .
This gives
k n ( 1 + L 2 ) x n p + D 1 * max D 1 , D 2 x n p + y n q .
Similarly,
r n ( 1 + L 2 ) y n q + D 2 * max D 1 , D 2 x n p + y n q .
By (32) and (33), we deduce that
k n + r n 1 + L 2 + max ( D 1 2 , D 2 2 ) x n p + y n q .
This gives
max ( k n 2 , r n 2 ) φ 2 x n p + y n q 2 2 φ 2 x n p 2 + y n q 2 ,
where φ : = 1 + L 2 + max ( D 1 2 , D 2 2 ) .
Equations (31) and (35) give
x n + 1 p 2 + y n + 1 q 2 x n p 2 + y n q 2 + 2 φ 2 τ n 2 x n p 2 + y n q 2 .
Noticing that n φ 2 τ n 2 < , by Lemma 4 we deduce that lim n x n p 2 + y n q 2 exist. Thus, ( x n , y n ) is bounded, and it is not difficult to see that k n 2 + r n 2 is bounded.
Next, we show that lim n U x n x n = 0 , lim n V y n y n = 0 and lim n D 1 x n D 2 y n = 0 .
By (31), we have
2 τ n η k n 2 + r n 2   x n p 2 x n + 1 p 2 + y n q 2 y n + 1 q 2 +   τ n 2 k n 2 + r n 2 ,
thus,
2 η n τ n k n 2 + r n 2   n x n p 2 x n + 1 p 2 + y n q 2 y n + 1 q 2 +   n = 0 τ n 2 k n 2 + r n 2 =   x 0 p 2 x 1 p 2 + y 0 q 2 y 1 q 2 +   x 1 p 2 x 2 p 2 + y 1 q 2 y 2 q 2 +   x 2 p 2 x 3 p 2 + y 2 q 2 y 3 q 2 . . . +   n = 0 τ n 2 k n 2 + r n 2 =   x 0 p 2 + y 0 q 2 + n = 0 τ n 2 k n 2 + r n 2 .
Since n τ n = , n τ n 2 < and k n 2 +   r n 2 is bounded, thus, we deduce from (38) that
lim sup n k n 2 +   r n 2 = 0 .
On the other hand,
k n + 1 k n   x n + 1 x n U ( x n + 1 x n ) +   D 1 * ( D 2 y n D 1 x n ) D 1 * ( D 2 y n + 1 D 1 x n + 1 )   ( 1 + L 2 ) x n + 1 x n + D 1 * ( D 1 x n + 1 D 1 x n ) ( D 2 y n + 1 D 2 y n )   ( 1 + L 2 ) x n + 1 x n + D 1 * D 1 x n + 1 x n + D 2 y n + 1 y n   ( 1 + L 2 ) x n + 1 x n +   D 1 * max D 1 , D 2 x n + 1 x n + y n + 1 y n ,
and
x n + 1 x n τ n k n and y n + 1 y n n r n .
By (40) and (41), we have that
k n + 1 k n ( 1 + L 2 ) τ n k n + D 1 * max D 1 , D 2 τ n k n + r n .
Similarly,
r n + 1 r n ( 1 + L 2 ) τ n r n + D 2 * max D 1 , D 2 τ n r n + k n .
By (42) and (43), we have
max k n + 1 k n , r n + 1 r n ( 1 + L 2 ) τ n k n + r n + D 1 * max D 1 2 , D 2 2 τ n k n + r n = τ n j D 1 , D 2 k n + r n ,
where j D 1 , D 2 = ( 1 + L 2 ) + D 1 * max D 1 2 , D 2 2 . Thus,
max k n + 1 k n , r n + 1 r n τ n j D 1 , D 2 k n + r n .
By (44), we deduce that
k n , k n + 1 k n + r n , r n + 1 r n   k n k n + 1 k n + r n r n + 1 r n   τ n 2 j D 1 , D 2 2 k n + r n 2   2 τ n 2 j D 1 , D 2 2 k n 2 + r n 2 .
On the other hand,
k n + 1 2 + r n + 1 2 =   k n 2 + k n , k n + 1 k n + k n + 1 k n 2 +   r n 2 + r n , r n + 1 r n + r n + 1 r n 2 1 + 2 τ n 2 j D 1 , D 2 2 + 4 τ n 2 j D 1 , D 2 2 k n 2 + r n 2 .
Noticing that n ( 6 τ n 2 j D 1 , D 2 2 ) < , thus, by Lemma 4, we deduce that
lim n k n 2 + r n 2 exist , this imply that
lim n ( k n + r n ) exist .
Therefore, we deduce from (39) and (48) that
lim n k n = lim n x n U x n D 1 * ( D 2 y n D 1 x n ) = 0 and lim n r n = lim n y n V y n D 2 * ( D 1 x n D 2 y n ) = 0 .
It is known that U is quasi-nonexpansive mapping if and only if 1 2 x n U x n 2 x n U x n , x n p , p F i x ( U ) . This implies that
1 2 x n U x n 2 +   D 1 x n D 2 y n , D 1 x n D 1 p x n U x n , x n p +   D 1 x n D 2 y n , D 1 x n D 1 p =   x n U x n D 1 * ( D 1 x n D 2 y n ) , x n p   x n U x n D 1 * ( D 1 x n D 2 y n ) x n p .
Thus, by (49) we get
lim n x n U x n = 0 .
Similarly,
lim n y n V y n = 0 ,
and
D 1 x n D 2 y n 2 = D 1 x n D 2 y n , D 1 x n D 2 y n = D 1 x n D 2 y n , D 1 x n D 1 p + D 2 y n D 1 x n , D 2 y n D 2 q , = D 1 * ( D 1 x n D 2 y n ) , x n p + D 2 * ( D 2 y n D 1 x n ) , y n q   D 1 * ( D 1 x n D 2 y n ) + ( x n U x n ) ( x n U x n ) x n p +   D 2 * ( D 2 y n D 1 x n ) + ( y n m a t h b b V y n ) ( y n V y n ) y n q   D 1 * ( D 1 x n D 2 y n ) ( x n U x n ) x n p + ( x n U x n ) x n p +   D 2 * ( D 2 y n D 1 x n ) ( y n V y n ) y n q + ( y n V y n ) y n q
Thus, by (51), (52) and the fact that { x n p } and { y n q } are bounded, we deduce that
lim n D 1 x n D 2 y n = 0 .
Next, we show that ( x n , y n ) ( x * , y * ) Γ . This follows directly from Section 3. This completes the proof. □
Corollary 1. 
Suppose for j = 1 , 2 , T j : H j H j are k j demicontractive mappings with F i x ( T j ) such that ( T j I ) are demiclosed at zero. Let ( x n , y n ) H 1 × H 2 , be generated by
x n + 1 = ( 1 α n ) v n + α n T 1 v n ; v n = ( 1 τ n ) x n + τ n T 1 x n + τ n D 1 * ( D 2 y n D 1 x n ) , n 0 ; y n + 1 = ( 1 α n ) w n + α n T 2 w n ; w n = ( 1 τ n ) y n + τ n T 2 y n + τ n D 2 * ( D 1 x n D 1 y n ) , n 0 ;
where ( x 0 , y 0 ) H 1 × H 2 , are chosen arbitrarily, 0 < a < α n < 1 , and τ n 0 , 2 L 1 + L 2 , where L 1 = D 1 * D 1 and L 2 = D 2 * D 2 , respectively. Then, { ( x n , y n ) } defined by (55) converges to ( x * , y * ) Γ .
Corollary 2 
(Chang et al. [14]). Suppose ( A 1 ) ( A 4 ) are satisfied, and that Γ . Let { ( x n , y n ) } defined by
x n + 1 = α n x n + ( 1 α n ) ( 1 η n ) I + η n T 1 ( ( 1 ζ n ) I + ζ n T 1 ) v n ; v n = x n + τ n D 1 * ( D 2 y n D 1 x n ) , n 0 . y n + 1 = α n y n + ( 1 α n ) ( 1 η n ) I + η n T 2 ( ( 1 ζ n ) I + ζ n T 2 ) w n ; w n = y n + τ n D 2 * ( D 1 x n D 2 y n ) , n 0 .
where 0 < η n < ζ n < 1 1 + 1 + L 2 ,   0 < a < α n < 1 , and τ n 0 , 2 L 1 + L 2 with L 1 = D 1 * D 1 , L 2 = D 2 * D 2 , and ( x 0 , y 0 ) H 1 × H 2 are chosen arbitrarily. Then, { ( x n , y n ) } converges to ( x * , y * ) Γ .
Proof. 
Algorithm (56) is a special case of algorithm (13) by taking τ n = 1 , V y n = y n and β n = ( 1 α n ) . Therefore, the proof of this corollary follows directly from Theorem 1. □
Corollary 3 
(Chang et al. [1]). Suppose ( A 1 ) ( A 4 ) are satisfied and that Γ . Let { ( x n , y n ) } defined by
U = ( 1 η n ) I + η n T 1 ( ( 1 ζ n ) I + ζ n T 1 ) ; x n + 1 = x n τ n x n U x n + D 1 * ( D 2 y n D 1 x n ) , n 0 . V = ( 1 η n ) I + η n T 2 ( ( 1 ζ n ) I + ζ n T 2 ) ; y n + 1 = y n τ n y n V y n + D 2 * ( D 1 x n D 2 y n ) , n 0 .
where 0 < η n < ζ n < 1 1 + 1 + L 2 ,   0 < a < α n < 1 , and τ n 0 , 2 L 1 + L 2 with L 1 = D 1 * D 1 ,   L 2 = D 2 * D 2 , and x 0 H 1 are chosen arbitrarily. Then, { ( x n , y n ) } converges to ( x * , y * ) Γ .
Proof. 
Algorithm (57) is a special case of algorithm (13) by taking α n = 0 . Therefore, the proof of this corollary follows directly from Theorem 1. □

5. Applications

This section provides applications for SEFPP.

5.1. Application to the SFP

We denote the solution set of the SFP (1) by Γ 1 .
In (4), if D 2 = I (identity mapping), then the SEFPP reduces to (1). Furthermore, in algorithm (13), let y n : = T 1 D 1 x n , we therefore deduce the following result:
Corollary 4. 
Let H j , j = 1 , 2 , K j , j = 1 , 2 , D 1 , D 1 * , T and ( T I ) be as in Theorem 1. Let { x n } be defined by
x n + 1 = ( 1 α n ) v n + α n U v n ; v n = ( 1 τ n ) x n + τ n U x n + τ n D * ( T D x n D x n ) ; U = ( 1 η ) I + η T ( ( 1 ζ ) I + ζ T ) ;
where 0 < η < ζ < 1 1 + 1 + L 2 ,   0 < a < α n < 1 , and τ n 0 , 2 L 1 with L 1 = D 1 * D 1 , and x 0 H 1 are chosen arbitrarily. Then, { x n } converges weakly to x * Γ 1 .

5.2. Application to the Split Variational Inequality Problem (SVIP)

The SVIP was introduced by Censor et al. [17] and it entails finding
x * K 1 such that T 1 ( x * ) , x x * 0 , x K 1 ,
and y * = D 1 x * K 2 solves T 2 ( y * ) , y y * 0 , y K 2 ,
where T j : H j H j , j = 1 , 2 , are some nonlinear mappings.
Equation (59) is called the variational inequality problem (VIP), and we denote its solution set by V I ( K 1 , T 1 ) . Subsequently, the solution set of the SVIP is denoted by
Γ 2 = ( x * , y * ) × VI ( K 1 , T 1 ) × VI ( K 2 , T 2 ) K 1 such that D 1 x * = D 2 y * .
Let g 1 ( y , t ) : K 1 × K 2 R be defined by
g 1 ( y , t ) = T 1 y , t y , t , y K 1 ,
and g 2 ( x , t ) : K 2 × K 2 R be defined by
g 2 ( x , t ) = T 2 x , t x , x , t K 2 .
For λ > 0 , the re-solvent operators of g 1 and g 2 are denoted by R λ , g 1 and R λ , g 2 , and are defined by
R λ , g 1 ( q ) = y K 1 : g 1 ( y , t ) + 1 λ t y , y q , t K 1 ,
and
R λ , g 2 ( p ) = x K 2 : g 2 ( x , t ) + 1 λ t x , x p , t K 2 ,
respectively.
It was proved in [1] that R λ , g 1 and R λ , g 2 are quasi-pseudocontractive and 1-Lipschitzian mappings with F i x ( R λ , g 1 ) = V I ( K 1 , g 1 ) and F i x ( R λ , g 2 ) = V I ( K 2 , g 2 ) . Therefore, the SVIP is equivalent to the following split equality fixed-point problem:
F i n d x * F i x ( R λ , g 1 ) a n d y * F i x ( R λ , g 2 ) such that D 1 x * = D 2 y * .
Hence, we have the following result: Suppose that
(B1)
R λ , g 1 and R λ , g 2 be defined as in (62) and (63);
(B2)
D j , j = 1 , 2 and D j * , j = 1 , 2 as in Theorem 1.
(B3)
( R λ , g 1 I ) and ( R λ , g 2 I ) are demiclosed at zero.
(B4)
Let U and V be defined as follows:
U = ( 1 η ) I + η R λ , g 1 ( ( 1 ζ ) I + ζ R λ , g 1 ) , V = ( 1 η ) I + η R λ , g 2 ( ( 1 ζ ) I + ζ R λ , g 2 ) ,
where 0 < η < ζ < 1 1 + 1 + L 2 .
(B5)
Algorithm:Let ( x n , y n ) H 1 × H 2 be defined by
x n + 1 = ( 1 α n ) v n + α n U v n ; v n = ( 1 τ n ) x n + τ n U x n + τ n D 1 * ( D 2 y n D 1 x n ) , n 0 . y n + 1 = ( 1 α n ) w n + α n V w n ; w n = ( 1 τ n ) y n + τ n V y n + τ n D 2 * ( D 1 x n D 2 y n ) , n 0 .
where ( x 0 , y 0 ) H 1 × H 2 are chosen arbitrarily, 0 < a < α n < 1 , and τ n 0 , 2 L 1 + L 2 , with L 1 = D 1 * D 1 and L 2 = D 2 * D 2 , respectively.
Corollary 5. 
Suppose that assumptions ( B 1 ) ( B 5 ) are satisfied and that Γ 2 . Then, the sequence { ( x n , y n ) } generated by (65) converges to the solution of SVIP.

5.3. Application to the Split Convex Minimization Problem (SCMP)

Let M : K 1 R and N : K 2 R be lower semi-continuous and proper convex functions. The SCMP is formulated as follows:
M ( x * ) = min x K 1 M ( x ) , a n d N ( y * ) = min y K 2 N ( y ) such that D 1 x * = D 2 y * .
We denote the solution set of the SCMP by
Γ 3 = { ( x * , y * ) K 1 × K 2 , M ( x * ) = min x K 1 M ( x ) , and N ( y * ) = min y K 2 N ( y ) such that D 1 x * = D 2 y * } .
Let h ( x , y ) : K 1 × K 1 R and l ( r , t ) : K 2 × K 2 R be defined by h ( x , y ) = M ( x ) N ( y ) and l ( r , t ) = M ( r ) N ( t ) , respectively. For arbitrary λ > 0 , Chang et al. [1] defined the re-solvent operators of λ , h and l as follows:
R λ , h ( x ) = t C : f ( t , y ) + 1 λ y t , t x ,
and
R λ , l ( y ) = t C : f ( t , x ) + 1 λ x t , t y .
It was proved in [1] that F i x ( R λ , h ) = M ( x * ) = min x K 1 M ( x ) , and F i x ( R λ , l ) = N ( y * ) = min y K 2 N ( y ) . Therefore, the SCMP for M and N is equivalent to the following SEFPP:
Γ 3 = { f i n d x * F i x ( R λ , h ) a n d y * F i x ( R λ , l ) such that D 1 x * = D 2 y * } .
It was proved in [1] that R λ , h and R λ , l are firmly nonexpansive with F i x ( R λ , h ) and F i x ( R λ , k ) , hence, we deduce the following results from Theorem 1: Suppose that
(C1)
R λ , h and R λ , l be defined as above;
(C2)
D j , j = 1 , 2 and D j * , j = 1 , 2 as in Theorem 1;
(C3)
( R λ , h I ) and ( R λ , l I ) are demiclosed at zero;
(C4)
Let U and V be defined as
U = ( 1 η ) I + η R λ , h ( ( 1 ζ ) I + ζ R λ , h ) , V = ( 1 η ) I + η R λ , l ( ( 1 ζ ) I + ζ R λ , l ) ,
where 0 < η < ζ < 1 1 + 1 + L 2 .
(C5)
Algorithm: Let ( x n , y n ) H 1 × H 2 , be defined as
x n + 1 = ( 1 α n ) v n + α n U v n , v n = ( 1 τ n ) x n + τ n U x n + τ n D 1 * ( D 2 y n D 1 x n ) , n 0 ; y n + 1 = ( 1 α n ) w n + α n V w n , w n = ( 1 τ n ) y n + τ n V y n + τ n D 2 * ( D 1 x n D 2 y n ) , n 0 ;
where x 0 H 1 and y 0 H 2 are chosen arbitrarily, 0 < a < α n < 1 , and τ n 0 , 2 L 1 + L 2 , where L 1 = D 1 * D 1 and L 2 = D 2 * D 2 , respectively.
Corollary 6. 
Suppose that assumptions ( C 1 ) ( C 5 ) are satisfied and that Γ 3 . Then, the sequence { ( x n , y n ) } generated by (69) converges weakly to the solution of the SCMP.

6. Numerical Examples

This section gives numerical examples that illustrate our results.
Example 1. 
In Theorem 1, let H 1 = R , C , Q ( 0 , ) , and let D 1 x = x 2 , D 2 y = y 3 , then D 1 = D 1 * = 1 2 and D 2 = D 2 * = 1 3 ,   r e s p e c t i v e l y . Define T : C R and S : Q R by T x = x + 4 2 , x C and S y = y 2 + 2 y + 4 , for all y Q . Clearly, T and S are quasi-pseudo-demicontractive mappings with Fix(T) = 4 and Fix(S) = 1 2 , and (I-T) and (I-S) are demiclosed at zero. In algorithm (11), let η = 1 2 ,   ξ = 1 5 , τ n = 1 7 ,   α n = 1 6 , clearly, these parameters satisfy the hypothesis of Theorem 1. Setting the number of iterations to 100 by using Maple, we obtain the following results in Table 1 and Figure 1:
Example 2. 
In Theorem 1, let H 1 = R , C , Q ( 0 , ) , and let A x = x 2 , B y = y 3 , then A = A * = 1 2 and B = B * = 1 3 ,   r e s p e c t i v e l y . Define T : C R and S : Q R by
T x = x 5 + 6 x 4 + 2 , x C and S y = y 3 + 4 y 2 + y , for all y Q . Clearly, T and S are quasi-pseudo-demicontractive mappings with Fix(T) = 2 and Fix(S) = 2, and (I-T) and (I-S) are demiclosed at zero. In algorithm (13), choose η = 1 2 ,   ξ = 1 5 ,   τ n = 1 6 ,   α n = 1 7 . Clearly, these parameters satisfy the hypothesis of Theorem (1). Setting the number of iterations to 1000 by using Maple, we obtain the following results in Table 2 and Figure 2:

7. Conclusions

It is generally known that in order to solve the split equality fixed-point problem (SEFPP), it is necessary to compute the norm of bounded and linear operators, which is a challenging task in real life. To address this issue, we studied the SEFPP involving the class of quasi-pseudocontractive mappings in Hilbert spaces and constructed novel algorithms in this regard, and we proved the algorithms’ convergences both with and without prior knowledge of the operator norm for bounded and linear mappings. Additionally, we gave applications and numerical examples of our findings as discussed in the Table 1 and Table 2 and graphs in Figure 1 and Figure 2, respectively. The discoveries highlighted in this work contribute to the generalization of various well-known findings documented in the literature. Furthermore, quasi-pseudocontractive mappings encompass various types, including quasi-nonexpansive, demicontractive, and directed mappings.
The SEFPP explored in our study is highly general; as a special example, it covers a wide range of problems, including split fixed points, split equality, and split feasibility problems. Our findings not only complement and generalize the findings in Chang et al. [1], Moudafi [7,8], and Chang et al. [14], but also offer a cohesive framework for researching further problems pertaining to the SEFPP.
Finally, strong convergence was obtained by imposing the semi-compactness condition. This compactness condition appears very strong as some mappings are not semi-compact; therefore, new research can be carried out to prove the strong convergence results without imposing the compactness condition.

Author Contributions

All authors contributed equally and have reviewed and approved the final version of the manuscript for publication.

Funding

This research did not receive any external funding.

Data Availability Statement

No new data were created or analyzed in this study.

Conflicts of Interest

The authors have disclosed that they have no conflicts of interest.

References

  1. Chang, S.-S.; Yao, J.-C.; Wen, C.-F.; Zhao, L.-C. On the split equality fixed point problem of quasi-pseudo-contractive mappings without a priori knowledge of operator norms with applications. J. Optim. Theory Appl. 2020, 185, 343–360. [Google Scholar] [CrossRef]
  2. Censor, Y.; Elfving, T. A multiprojection algorithm using Bregman projections in a product space. Numer. Algorithms 1994, 8, 221–239. [Google Scholar] [CrossRef]
  3. Censor, Y.; Bortfeld, T.; Martin, B.; Trofimov, A. A unified approach for inversion problems in intensity-modulated radiation therapy. Phys. Med. Biol. 2006, 51, 2353–2365. [Google Scholar] [CrossRef] [PubMed]
  4. Censor, Y.; Elfving, T.; Kopf, N.; Bortfeld, T. The multiple-sets split feasibility problem and its applications for inverse problems. Inverse Probl. 2005, 21, 2071–2084. [Google Scholar] [CrossRef]
  5. Censor, Y.; Motova, A.; Segal, A. Perturbed projections and subgradient projections for the multiple-sets split feasibility problem. J. Math. Anal. Appl. 2007, 327, 1244–1256. [Google Scholar] [CrossRef]
  6. Byrne, C. Iterative oblique projection onto convex subsets and the split feasibility problem. Inverse Probl. 2002, 18, 441–453. [Google Scholar] [CrossRef]
  7. Moudafi, A.; Al-Shemas, E. Simultaneous iterative methods for split equality problem. Trans. Math. Program. Appl. 2013, 1, 1–10. [Google Scholar]
  8. Moudafi, A. Alternating CQ-algorithm for convex feasibility and split fixed-point problems. J. Nonlinear Convex Anal. 2014, 15, 809–818. [Google Scholar]
  9. Mohammed, L.B.; Kılıçman, A. Strong Convergence for the Split Common Fixed-Point Problem for Total Quasi-Asymptotically Nonexpansive Mappings in Hilbert Space. Abstr. Appl. Anal. 2015, 2015, 1–7. [Google Scholar] [CrossRef]
  10. Mohammed, L.; Kılıçman, A.; Saje, A.U. On split equality fixed-point problems. Alex. Eng. J. 2023, 66, 43–51. [Google Scholar] [CrossRef]
  11. Khan, A.R. Iterative Methods for Nonexpansive Type Mappings. In Fixed Point Theory and Graph Theory; Academic Press: Cambridge, MA, USA, 2016; pp. 231–285. [Google Scholar]
  12. Antón-Sancho, Á. Fixed points of automorphisms of the vector bundle moduli space over a compact Riemann surface. Mediterr. J. Math. 2024, 21, 1–20. [Google Scholar] [CrossRef]
  13. Che, H.; Li, M. A simultaneous iterative method for split equality problems of two finite families of strictly pseudononspreading mappings without prior knowledge of operator norms. Fixed Point Theory Appl. 2015, 2015, 1. [Google Scholar] [CrossRef]
  14. Chang, S.-S.; Wang, L.; Qin, L.-J. Split equality fixed point problem for quasi-pseudo-contractive mappings with applications. Fixed Point Theory Appl. 2015, 2015, 208. [Google Scholar] [CrossRef]
  15. Opial, Z. Weak convergence of the sequence of successive approximations for nonexpansive mappings. Bull. Am. Math. Soc. 1967, 73, 591–597. [Google Scholar] [CrossRef]
  16. Xu, H.-K. Iterative Algorithms for Nonlinear Operators. J. Lond. Math. Soc. 2002, 66, 240–256. [Google Scholar] [CrossRef]
  17. Censor, Y.; Gibali, A.; Reich, S. Algorithms for the Split Variational Inequality Problem. Numer. Algorithms 2012, 59, 301–323. [Google Scholar] [CrossRef]
Figure 1. Graph of algorithm (13) at 100 iterations, starting with the initial values x 1 = 1 and y 1 = 1 , which shows that ( x n , y n ) converges to (4, 1/2).
Figure 1. Graph of algorithm (13) at 100 iterations, starting with the initial values x 1 = 1 and y 1 = 1 , which shows that ( x n , y n ) converges to (4, 1/2).
Axioms 13 00460 g001
Figure 2. Graph of algorithm (13) at 100 iterations, starting with the initial values x 1 = 1 and y 1 = 1 , which shows that ( x n , y n ) converges to (2,2).
Figure 2. Graph of algorithm (13) at 100 iterations, starting with the initial values x 1 = 1 and y 1 = 1 , which shows that ( x n , y n ) converges to (2,2).
Axioms 13 00460 g002
Table 1. Numerical results of algorithm (13) starting with the initial values x 1 = 1 and y 1 = 1 , which shows that ( x n , y n ) converges to (4, 1/2).
Table 1. Numerical results of algorithm (13) starting with the initial values x 1 = 1 and y 1 = 1 , which shows that ( x n , y n ) converges to (4, 1/2).
n x n y n
11.0000000001.000000000
21.4464285710.8831268924
31.8264243190.7916797163
...
...
73.0.5000000002
74.0.5000000000
...
983.9999995820.5000000000
993.9999996440.5000000000
1003.9999996970.5000000000
Table 2. Numerical results of algorithm (13) starting with the initial values x 1 = 1 and y 1 = 1 , which shows that ( x n , y n ) converges to (2,2).
Table 2. Numerical results of algorithm (13) starting with the initial values x 1 = 1 and y 1 = 1 , which shows that ( x n , y n ) converges to (2,2).
n x n y n
11.0000000001.000000000
21.4021415021.283490816
31.5847799611.420942750
...
...
...
801.999999998.
811.999999999.
...
981.9999999991.998915702
991.9999999991.998975310
1001.9999999991.999031634
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Mohammed, L.B.; Kilicman, A. The Split Equality Fixed-Point Problem and Its Applications. Axioms 2024, 13, 460. https://doi.org/10.3390/axioms13070460

AMA Style

Mohammed LB, Kilicman A. The Split Equality Fixed-Point Problem and Its Applications. Axioms. 2024; 13(7):460. https://doi.org/10.3390/axioms13070460

Chicago/Turabian Style

Mohammed, Lawan Bulama, and Adem Kilicman. 2024. "The Split Equality Fixed-Point Problem and Its Applications" Axioms 13, no. 7: 460. https://doi.org/10.3390/axioms13070460

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop