Next Article in Journal
Bearing Fault Diagnosis for an Induction Motor Controlled by an Artificial Neural Network—Direct Torque Control Using the Hilbert Transform
Next Article in Special Issue
Characterization Results on Lifetime Distributions by Scaled Reliability Measures Using Completeness Property in Functional Analysis
Previous Article in Journal
Wolbachia Invasion Dynamics by Integrodifference Equations
Previous Article in Special Issue
New Generalized Contractions by Employing Two Control Functions and Coupled Fixed-Point Theorems with Applications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A New Four-Step Iterative Procedure for Approximating Fixed Points with Application to 2D Volterra Integral Equations

by
Hasanen A. Hammad
1,2,*,
Habib ur Rehman
3 and
Manuel De la Sen
4
1
Department of Mathematics, Unaizah College of Sciences and Arts, Qassim University, Buraydah 52571, Saudi Arabia
2
Department of Mathematics, Faculty of Science, Sohag University, Sohag 82524, Egypt
3
Department of Mathematics, Monglkut’s University of Technology, Bangkok 10140, Thailand
4
Institute of Research and Development of Processes, Department of Electricity and Electronics, Faculty of Science and Technology, University of the Basque Country, 48940 Leioa, Bizkaia, Spain
*
Author to whom correspondence should be addressed.
Submission received: 21 October 2022 / Revised: 8 November 2022 / Accepted: 9 November 2022 / Published: 14 November 2022
(This article belongs to the Special Issue Mathematical Analysis and Functional Analysis and Their Applications)

Abstract

:
This work is devoted to presenting a new four-step iterative scheme for approximating fixed points under almost contraction mappings and Reich–Suzuki-type nonexpansive mappings (RSTN mappings, for short). Additionally, we demonstrate that for almost contraction mappings, the proposed algorithm converges faster than a variety of other current iterative schemes. Furthermore, the new iterative scheme’s ω 2 —stability result is established and a corroborating example is given to clarify the concept of ω 2 —stability. Moreover, weak as well as a number of strong convergence results are demonstrated for our new iterative approach for fixed points of RSTN mappings. Further, to demonstrate the effectiveness of our new iterative strategy, we also conduct a numerical experiment. Our major finding is applied to demonstrate that the two-dimensional (2D) Volterra integral equation has a solution. Additionally, a comprehensive example for validating the outcome of our application is provided. Our results expand and generalize a number of relevant results in the literature.

1. Prelude and Basic Notions

Nowadays, after the huge amount of valuable papers that include the fixed point (FP) method, these points have become the mainstay for nonlinear analysis due to the ease and smoothness of this method, in addition to the numerous and exciting applications in economics, biology, chemistry, game theory, engineering, physics, etc. [1,2,3,4,5].
A very important branch is the involvement of FPs in approximation by algorithms. Numerous problems such as convex feasibility problems, convex optimization problems, monotone variational inequalities, and image restoration problems can be thought of as FP problems of nonexpansive mappings, hence approximating them has a range of specialized applications, see [6,7,8,9,10,11,12]. Iteration approaches for FP issues of nonexpansive mappings have received a lot of attention in the literature, for example, see [13,14,15,16,17].
From now on, the symbols R , N , Ξ ( ) , Δ , and Π , denote the set of real numbers, natural numbers, FPs of the mapping ℑ, and a nonempty subset of a Banach space (BS) Π , respectively.
Assume that : Δ Δ is a self-mapping, then for each ϖ , υ Δ ,
  • is called a contraction if there is [ 0 , 1 ) so that ϖ υ ϖ υ .
  • is called nonexpansive if ϖ υ ϖ υ , i.e., it is a contraction with = 1 .
  • owns an FP ϖ , if ϖ = ϖ .
There are two main categories that can be used to group the main concepts of FP theory. Finding the prerequisites and requirements necessary for an operator to admit fixed points is the first step. Another option is to locate these fixed points using certain schematic methods. The first category is known formally as the existence part, while the second category is known as the computation or approximation part. Studying the behaviors of FPs, such as stability and data dependence, is an essential but less well-known topic of FP theory.
The class of weak contractions that appropriately covers the class of Zamfirescu operators [18] was supplied by Berinde in [19]. Many authors also refer to this class of mappings as “almost contraction mappings (ACM)”.
 Definition 1. 
If there are [ 0 , 1 ) and δ 0 , the inequality below holds
ϖ υ ϖ υ + δ ϖ ϖ , f o r a l l ϖ , υ Δ .
Then : Δ Δ is called ACM.
Via the concept of strictly increasing continuous functions (SIC functions), the condition (1) generalized by Imoru and Olantiwo [20] as follows:
 Definition 2. 
If there is a constant [ 0 , 1 ) and a SIC function ξ : [ 0 , ) [ 0 , ) with ξ ( 0 ) = 0 such that
ϖ υ ϖ υ + ξ ϖ ϖ , f o r a l l ϖ , υ Δ .
Then : Δ Δ is called contractive-like.
Clearly, the inequality (2) reduces to (1), if ξ ( τ ) = δ τ .
Due to its significance in terms of applications, numerous writers have studied nonexpansive mappings extensions and generalizations in recent years. Suzuki [20] presented an intriguing generalization of nonexpansive mappings and attained some results for existence and convergence. These mappings are frequently referred to as mappings satisfying condition ( C ) .
 Definition 3. 
If the inequality below is true
1 2 ϖ ϖ ϖ υ ϖ υ ϖ υ , f o r a l l ϖ , υ Δ .
Then : Δ Δ is said to satisfy condition ( C ) .
In 2019, the class of RSTN mappings was considered by Pant and Pandey [21] as the following:
 Definition 4. 
If there is a constant [ 0 , 1 ) so that
1 2 ϖ ϖ ϖ υ ϖ υ ϖ ϖ + υ υ + ( 1 2 ) ϖ υ ,
for all ϖ , υ Δ . Then : Δ Δ is called an RSTN mapping.
Surely, every mapping satisfying condition ( C ) is an RSTN mapping with = 0 . The converse, however, is false, as demonstrated in [21].
The analysis of the performance and behavior of algorithms that make significant contributions to real-world applications is one of the key trends in FP techniques. Therefore, in order to enhance the functionality and convergence behavior of algorithms for nonexpansive mappings, several authors tended to develop numerous iterative schemes for approximating FPs, for example Mann [22], Ishikawa [23], Noor [24], Argawal et al. [25], Abbas and Nazir [26], CR [27], Normal-S [28], Picard-S [29], Thakur et al. [30], and M-iterative [31] schemes.
Recently, Ahmad et al. [32] presented a good iterative method known as the JK-iterative procedure:
z 1 Δ , ϖ r = ( 1 η r ) z r + η r z r , ϑ r = ϖ r , z r + 1 = ( 1 γ r ) ϖ r + γ r ϑ r , for all r 1 ,
where η r and γ r are sequences in ( 0 , 1 ) . For the mappings satisfying condition ( C ) , the authors generated several weak and strong convergence results and also showed numerically that the iterative method (5) converges quicker than the iteration [25,30].
Very recently, Hasanen et al. [33] presented a novel four-step iterative scheme known as the HR-iteration:
z 0 Δ , ϖ r = ( 1 η r ) z r + η r z r , ω r = ( 1 α r ) ϖ r + α r ϖ r , ϑ r = ( 1 γ r ) ω r + γ r ω r z r + 1 = ϑ r , for all r 1 ,
where α i , η i , and γ i are sequences in [ 0 , 1 ] . Additionally, the authors proved that this algorithm converges faster than the methods presented in [27,29,30,31] numerically.
According to the above works, we build a new four-step iterative procedure called HR*-iteration for obtaining a novel approximation to FPs of ACMs and RSTN mappings as follows:
ϱ 0 Δ , ρ r = ( 1 s r ) ϱ r + s r ϱ r , ω r = ( 1 t r ) ρ r + t r ρ r , ϑ r = ω r , ϱ r + 1 = ( 1 e r ) ϑ r + e r ϑ r , for all r 1 ,
where s r , t r , and e r are sequences in ( 0 , 1 ) .
The goal of this manuscript is to show that the iteration (7) converges faster than iterations (5), (6), and Thakur et al.’s [30] iterative scheme. Hence, it is faster than many sober iterative methods in this direction for ACMs. Additionally, the property of ω 2 —stability for the proposed algorithm is shown with a supported example. Moreover, weak and strong convergence results of the considered method are obtained for RSTN mappings. Ultimately, we prove that a 2D Volterra integral equation has a solution in BSs using our main findings.

2. Definitions and Auxiliary Lemmas

In this part, we provide some basic definitions and concepts that help us in our desired goal and also facilitate the reader to understand our manuscript.
Assume that Π * is a dual of a BS Π , . , . refers to the generalized duality pairing between Π and Π * , ⟶ denotes strong convergence, and ⇀ denotes weak convergence. For ϖ Π , the normalized duality mapping Θ : Π 2 Π * is a multivalued mapping defined as
Θ ( ϖ ) = υ Π * : ϖ , υ = ϖ 2 = υ 2 .
A BS Π is called smooth if the limit below exists for all ϖ , υ P
lim a 0 ϖ + a υ ϖ a ,
where P = υ Π : υ = 1 . Here, the norm of Π is called Gâteaux differentiable. Clearly, if Π is smooth, then Θ is a single-valued mapping. Further, if the limit (8) exists and is attained uniformly for υ Z , then the norm of Π is called Fréchet differentiable for ϖ P and the following inequality is true
ϖ , Θ ϖ + 1 2 ϖ 2 1 2 ϖ + υ 2 υ , Θ ϖ + 1 2 ϖ 2 + z ( υ ) ,
where z : [ 0 , ) [ 0 , ) is an increasing function so that lim υ 0 z ( υ ) υ = 0 .
 Definition 5. 
If for each ϵ ( 0 , 2 ] , there exists δ > 0 so that υ 1 , υ 1 and υ ϖ > ϵ , we get υ + ϖ 2 < 1 δ for υ , ϖ Π . Then a BS Π is called a uniformly convex.
 Definition 6. 
If for any sequence { ν i } in Π so that υ i υ Π , implies
lim sup r υ r υ < lim sup r υ r ϖ , f o r a l l ϖ Π w i t h ν ϖ .
Then a BS Π is said to satisfy Opial’s condition.
 Definition 7. 
Assume that { υ r } is a bounded sequence in a BS Π . For υ Δ Π , put
( υ , { υ r } ) = lim sup r υ r υ .
  • The asymptotic radius of { υ i } relative to Π is described as
    ( Π , { υ r } ) = inf { ( υ , { υ r } ) : υ Π } .
  • The asymptotic center of { υ i } relative to Π is given by
    Z ( Π , { υ r } ) = { υ Π : ( υ , { υ r } ) = ( Π , { υ r } ) } .
Clearly, Z ( Π , { υ r } ) consists of exactly one point in a uniformly convex BS.
 Definition 8. 
Assume that Δ is a closed convex subset of a BS Π . A self-mapping : Δ Δ is called demiclosed with respect to ϖ Π , if for all a sequence { ϖ r } Δ and { ϖ r } υ implies ϖ = υ .
 Definition 9 
([34]). Suppose that { s r } and { t r } are two sequences of real numbers that, respectively, converge to s and t . If there is α = lim r s r s t r t . Then
 (i) 
{ s r } is converges to s faster than { t r } does to t, if α = 0 ,
 (ii) 
the two sequences { s r } and { t r } have the same rate of convergence, if α ( 0 , ) .
 Definition 10 
([34]). Assume that { φ r } and { ϕ r } are two FP iteration procedures which converge to the same point υ ˜ , the error estimates
φ r υ ˜ s r a n d ϕ r υ ˜ t r , r N
are accessible, where { s r } and { t r } are defined in Definition 9 and converging to 0 . Then, { φ r } converges faster to υ ˜ than { ϕ r } if { s r } converges faster than { t r } .
 Definition 11. 
For a mapping : Δ Δ , if
lim r υ r υ r = 0 .
Then the sequence { υ r } in Δ is called an approximate FP sequence for a mapping .
 Definition 12 
([35]). Assume that κ : ( 0 , ) ( 0 , ) is a nondecreasing function with κ ( 0 ) = 0 and for each τ > 0 , if κ ( τ ) > 0 so that ϖ ϖ κ d ( ϖ , Ξ ( ) ) , for all ϖ Δ , where d ( ϖ , Ξ ( ) ) = inf ϖ * Ξ ( ) ϖ ϖ * , then the mapping : Δ Δ is said to satisfy the condition (I).
 Lemma 1 
([36]). Assume that { ξ r } and { ζ r } are two non-negative real sequences verifying the inequality below
ξ r + 1 ( 1 θ r ) ξ r + ζ r , r N ,
where θ r ( 0 , 1 ) , r = 0 θ r = and lim r ζ r θ r = 0 , then lim r ξ r = 0 .
 Lemma 2 
([28]). Suppose that { ϖ r } and { υ r } are any sequences of a uniformly convex BS Π such that the following inequalities hold
lim sup r ϖ r h , lim sup r υ r h a n d lim sup r ς r ϖ r + ( 1 ς r ) υ r = h ,
for some h 0 , where { ς r } is any sequence satisfying 0 < ϖ ς r υ < 1 . Then lim r ϖ r υ r = 0.
 Lemma 3 
([32]). Assume that : Δ Δ is a given mapping. If is an RSTN mapping with Ξ ( ) , then for arbitrary point ϖ Δ and ϖ * Ξ ( ) , we have ϖ ϖ * ϖ ϖ * . Moreover, if satisfies condition (C), then is an RSTN mapping.
 Lemma 4 
([37]). Suppose that : Δ Δ is an RSTN mapping, then for all ϖ , υ Δ and some ( 0 , 1 ) , the inequality below holds
ϖ υ 3 + 1 ϖ ϖ + ϖ υ .
We now provide a numerical example that meets the inequality (10) but does not satisfy condition (C).
 Example 1. 
Assume that R endowed with a usual norm . is a BS and 1 Δ 1 . Define a mapping : Δ Δ by
ϖ = ϖ 4 , if 1 ϖ < 0 , ϖ , if ϖ [ 0 , 1 ] \ { 1 4 } , 0 , if ϖ { 1 4 } .
If we set ϖ = 1 4 and υ = 1 , we have
1 2 ϖ ϖ = 1 2 1 4 1 4 = 1 8 3 4 = ϖ υ .
However,
ϖ υ = 1 4 ( 1 ) = 1 > 3 4 = ϖ υ .
Therefore, the mapping : Δ Δ does not satisfy condition (C).
On the other hand, w prove that fulfills the inequality (10). To reach this result, we suggest the following positions:
( p 1 )
if 1 ϖ , υ < 0 , we get
ϖ υ ϖ ϖ + ϖ υ = ϖ ϖ + 1 4 ϖ υ 3 + ϖ 1 ϖ ϖ ϖ + ϖ υ .
( p 2 )
if ϖ , υ [ 0 , 1 ] \ { 1 4 } , then
ϖ υ ϖ ϖ + ϖ υ = ϖ ϖ + ϖ υ .
( p 3 )
if 1 ϖ < 0 and υ [ 0 , 1 ] \ { 1 4 } , we have
ϖ υ = ϖ + υ ϖ + υ 5 4 ϖ + ϖ υ ( s i n c e ϖ < 0 a n d υ 0 ) = ϖ ϖ 4 + ϖ υ = ϖ ϖ + ϖ υ .
( p 4 )
if 1 ϖ < 0 and υ = 1 4 , one can write
ϖ υ = ϖ 5 4 ϖ + ϖ 1 4 = ϖ ϖ + ϖ υ .
( p 5 )
if ϖ [ 0 , 1 ] \ { 1 4 } and υ = 1 4 , we obtain
ϖ υ = ϖ 2 ϖ + ϖ 1 4 = ϖ ϖ + ϖ υ .
Based on the above cases, we conclude that fulfills the inequality (10) with 3 + ϖ 1 ϖ 1 .

3. Rate of the Convergence

In this part, we demonstrate analytically that for ACMs, our iterative method (7) converges faster than the iterative method in (5).
 Theorem 1. 
Let Δ be a closed convex subset of a BS Π and : Δ Δ be ACM. If { ϱ r } is a sequence iterated by (7). Then { ϱ r } ϱ , where ϱ is a unique FP of .
 Proof. 
Consider ϱ Ξ ( ) . Based on (1) and (7), we have
ρ r ϱ = ( 1 s r ) ϱ r + s r ϱ r ϱ ( 1 s r ) ϱ r ϱ + s r ϱ r ϱ ( 1 s r ) ϱ r ϱ + s r ϱ r ϱ + δ ϱ ϱ = ( 1 s r 1 ) ϱ r ϱ .
From (7) and (12), we get
ω r ϱ = ( 1 t r ) ρ r + e r ρ r ϱ ( 1 t r ) ρ r + e r ρ r ϱ ( 1 t r ) ρ r ϱ + e r ρ r ϱ ( 1 t r 1 ) ρ r ϱ ( 1 s r 1 ) ( 1 t r 1 ) ϱ r ϱ .
Using (7) and (13), we obtain that
ϑ r ϱ = ω r ϱ ω r ϱ 2 ω r ϱ 3 ( 1 s r 1 ) ( 1 t r 1 ) ϱ r ϱ .
Finally, from (7) and (14), one can write
ϱ r + 1 ϱ = ( 1 e r ) ϑ r + e r ϑ r ϱ ( 1 e r ) ϑ r ϱ + e r ϑ r ϱ 1 e r ( 1 ) ϑ r ϱ 3 1 e r ( 1 ) 1 s r 1 1 t r 1 ϱ r ϱ .
As ( 0 , 1 ) and 0 < e r , s r , t r < 1 , it follows that 1 e r ( 1 ) < 1 , 1 s r 1 < 1 and 1 t r 1 < 1 , hence
1 e r ( 1 ) 1 s r 1 1 t r 1 < 1 .
Thus, (15) reduces to
ϱ i + 1 ϱ 3 ϱ r ϱ .
By induction, one can write
ϱ r + 1 ϱ 3 ( r + 1 ) ϱ 0 ϱ 0 as r .
Hence, ϱ r ϱ . The uniqueness ϱ follows immediately by the definition of . This finishes the proof. □
 Theorem 2. 
Let Δ be a closed convex subset of a BS Π and : Δ Δ be ACM. If { ϱ r } is a sequence iterated by (7). Then { ϱ r } converges faster than { z r } , which is made by the iterative scheme (5).
 Proof. 
Keeping in mind (15) of Theorem 1, we get
ϱ r + 1 ϱ 3 ( r + 1 ) ϱ 0 ϱ , r N .
Additionally, using (5), one can obtain
ϖ r ϱ = ( 1 η r ) z r + η r z r ϱ ( 1 η r ) z r ϱ + η r z r ϱ ( 1 η r ( 1 ) ) z r ϱ .
From (5) and (17), we have
ϑ r ϱ = ϖ r ϱ ϖ r ϱ ( 1 η r ( 1 ) ) z r ϱ .
Again, using (5), (17), and (18), one has
z r + 1 ϱ = ( 1 γ r ) ϖ r + γ r ϑ r ϱ ( 1 γ r ) ϖ r + γ r ϑ r ϱ ( 1 γ r ) ϖ r ϱ + γ r ϑ r ϱ 2 ( 1 γ r ) ϖ r ϱ + γ r ϑ r ϱ 2 ( 1 γ r ) ( 1 η r ( 1 ) ) z r ϱ + γ r ( 1 η r ( 1 ) ) z r ϱ 2 ( 1 γ r ( 1 ) ) ( 1 η r ( 1 ) ) z r ϱ 2 z r ϱ .
By induction, we have
z r + 1 ϱ 2 ( r + 1 ) z r ϱ .
Dividing (15) by (18), we find that
ϱ r + 1 ϱ z r + 1 ϱ 3 ( r + 1 ) ϱ 0 ϱ 2 ( r + 1 ) z r ϱ = ( r + 1 ) ϱ 0 ϱ z r ϱ 0 , as r ,
which implies that { ϱ r } converges faster than { z r } to ϱ . □
 Example 2. 
Assume that Π = R 3 and Δ = ϖ = ( ϖ 1 , ϖ 2 , ϖ 3 ) : ( ϖ 1 , ϖ 2 , ϖ 3 ) [ 0 , 6 ] 3 , where [ 0 , 6 ] 3 = [ 0 , 6 ] × [ 0 , 6 ] × [ 0 , 6 ] is a subset of Π equipped with the norm ϖ = ( ϖ 1 , ϖ 2 , ϖ 3 ) = ϖ 1 + ϖ 2 + ϖ 3 . Define a mapping : Δ Δ by
ϖ = ϖ 1 3 , ϖ 2 3 , ϖ 3 3 , if ( ϖ 1 , ϖ 2 , ϖ 3 ) [ 0 , 3 ) 3 , ϖ 1 6 , ϖ 2 6 , ϖ 3 6 , if ( ϖ 1 , ϖ 2 , ϖ 3 ) [ 3 , 6 ] 3 .
It is clear that ℑ owns a unique FP, it is ( 0 , 0 , 0 ) . Now, we shall show that ℑ is a contractive-like mapping and, hence, ACM. For this, we define the function ξ : [ 0 , ) [ 0 , ) by ξ ( ϖ ) = ϖ 4 . Obviously, ξ is a SIC function with ξ ( 0 ) = 0 . If ϖ [ 0 , 3 ) 3 , we have
ϖ ϖ = ( ϖ 1 , ϖ 2 , ϖ 3 ) ϖ 1 3 , ϖ 2 3 , ϖ 3 3 = 2 ϖ 1 3 , 2 ϖ 2 3 , 2 ϖ 3 3 ,
and
ξ ϖ ϖ = ξ 2 ϖ 1 3 , 2 ϖ 2 3 , 2 ϖ 3 3 = ϖ 1 6 , ϖ 2 6 , ϖ 3 6 = ϖ 1 6 + ϖ 2 6 + ϖ 3 6 .
Analogously, if ϖ [ 3 , 6 ] 3 , one has
ϖ ϖ = ( ϖ 1 , ϖ 2 , ϖ 3 ) ϖ 1 6 , ϖ 2 6 , ϖ 3 6 = 5 ϖ 1 6 , 5 ϖ 2 6 , 5 ϖ 3 6 ,
and
ξ ϖ ϖ = ξ 5 ϖ 1 6 , 5 ϖ 2 6 , 5 ϖ 3 6 = 5 ϖ 1 24 , 5 ϖ 2 24 , 5 ϖ 3 24 = 5 ϖ 1 24 + 5 ϖ 2 24 + 5 ϖ 3 24 .
After that, we discuss the cases below:
 (I) 
If ϖ , υ [ 0 , 3 ) 3 , then by (19), we get
ϖ υ = ϖ 1 3 , ϖ 2 3 , ϖ 3 3 υ 1 3 , υ 2 3 , υ 3 3 = ϖ 1 3 υ 1 3 + ϖ 2 3 υ 2 3 + ϖ 3 3 υ 3 3 = 1 3 ϖ 1 υ 1 + ϖ 2 υ 2 + ϖ 3 υ 3 = 1 3 ( ϖ 1 , ϖ 2 , ϖ 3 ) ( υ 1 , υ 2 , υ 3 ) = 1 3 ϖ υ 1 3 ϖ υ + ϖ 1 6 + ϖ 2 6 + ϖ 3 6 = 1 3 ϖ υ + ξ ϖ ϖ .
 (II) 
If ϖ , υ [ 3 , 6 ] 3 , then by (20), we have
ϖ υ = ϖ 1 6 , ϖ 2 6 , ϖ 3 6 υ 1 6 , υ 2 6 , υ 3 6 = ϖ 1 6 υ 1 6 + ϖ 2 6 υ 2 6 + ϖ 3 6 υ 3 6 = 1 6 ϖ 1 υ 1 + ϖ 2 υ 2 + ϖ 3 υ 3 = 1 6 ( ϖ 1 , ϖ 2 , ϖ 3 ) ( υ 1 , υ 2 , υ 3 ) = 1 6 ϖ υ 1 6 ϖ υ + 5 ϖ 1 24 + 5 ϖ 2 24 + 5 ϖ 3 24 1 3 ϖ υ + ξ ϖ ϖ .
 (III) 
If ϖ [ 0 , 3 ) 3 and υ [ 3 , 6 ] 3 , then by (19), we obtain that
ϖ υ = ϖ 1 3 , ϖ 2 3 , ϖ 3 3 υ 1 6 , υ 2 6 , υ 3 6 = ϖ 1 3 υ 1 6 , ϖ 2 3 υ 2 6 , ϖ 3 3 υ 3 6 = ϖ 1 6 + ϖ 1 6 υ 1 6 , ϖ 2 6 + ϖ 2 6 υ 2 6 , ϖ 3 6 + ϖ 3 6 υ 3 6 ϖ 1 6 + ϖ 1 6 υ 1 6 + ϖ 2 6 + ϖ 2 6 υ 2 6 + ϖ 3 6 + ϖ 3 6 υ 3 6 ϖ 1 6 + ϖ 2 6 + ϖ 3 6 + ϖ 1 6 υ 1 6 + ϖ 2 6 υ 2 6 + ϖ 3 6 υ 3 6 = 1 6 ϖ 1 υ 1 + ϖ 2 υ 2 + ϖ 3 υ 3 + ξ ϖ ϖ 1 3 ( ϖ 1 , ϖ 2 , ϖ 3 ) ( υ 1 , υ 2 , υ 3 ) + ξ ϖ ϖ = 1 3 ϖ υ + ξ ϖ ϖ .
 (IV) 
If υ [ 0 , 3 ) 3 and ϖ [ 3 , 6 ] 3 , then by (19), one has
ϖ υ = ϖ 1 6 , ϖ 2 6 , ϖ 3 6 υ 1 3 , υ 2 3 , υ 3 3 = ϖ 1 6 υ 1 3 , ϖ 2 6 υ 2 3 , ϖ 3 6 υ 3 3 = ϖ 1 3 ϖ 1 6 υ 1 3 , ϖ 2 3 ϖ 2 6 υ 2 3 , ϖ 3 3 ϖ 3 6 υ 3 3 ϖ 1 3 ϖ 1 6 υ 1 3 + ϖ 2 3 ϖ 2 6 υ 2 3 + ϖ 3 3 ϖ 3 6 υ 3 3 ϖ 1 6 + ϖ 2 6 + ϖ 3 6 + ϖ 1 3 υ 1 3 + ϖ 2 3 υ 2 3 + ϖ 3 3 υ 3 3 = 1 3 ϖ 1 υ 1 + ϖ 2 υ 2 + ϖ 3 υ 3 + ξ ϖ ϖ = 1 3 ( ϖ 1 , ϖ 2 , ϖ 3 ) ( υ 1 , υ 2 , υ 3 ) + ξ ϖ ϖ = 1 3 ϖ υ + ξ ϖ ϖ .
Based on the above cases, we conclude that condition (1) is satisfied. Hence, ℑ is a contractive-like mapping.

4. Stability Analysis

In 1987, Harder [38] rigorously examined the idea of stability of an FP iteration process in her Ph.D. thesis as follows:
 Definition 13 
([38]). Let : Δ Δ be a given mapping and ϖ r + 1 = g ( , ϖ r ) be an FP iteration so that { ϖ r } converges to ϖ Ξ ( ) . For a chosen sequence { q r } in Π , define
ε r = q r g ( , q r ) , f o r a l l r N .
Then, an FP iteration method is called —stable if the assertion below holds
lim r ε r = 0 i f f lim r q r = ϖ .
Several writers have lately examined the idea of stability in Definition 13 for various classes of contraction mappings, for example, see [39,40]. Because the sequence { q r } is arbitrarily chosen, Berinde pointed out in [41] that the concept of stability in Definition 13 is not precise. To get over this restriction, the same author noted that if { q r } were approximate sequences of { ϖ r } , then the definition would make sense. As a result, any iteration process will be weakly stable if it is stable, but the converse is not true in general.
 Definition 14 
([41]). A sequence { q r } Δ is called an approximate sequence of { ϖ r } Δ , if for any b 1 , there is α = α ( b ) so that
ϖ r q r α , for all r b .
 Definition 15 
([41]). Let { ϖ r } be an iterative process defined for ϖ 0 Δ and
ϖ r + 1 = g ( , ϖ r ) , r 0 ,
where : Δ Δ is a given mapping. Suppose that { ϖ r } converges to an FP ϖ * of ℑ and for any approximate sequence { q r } Δ of { ϖ r }
lim r ε r = lim r q r + 1 g ( , q r ) = 0 implies lim r q r = ϖ * ,
then, Equation (21) is called weakly stable with respect to , or weakly —stable.
By using the more general concept of the equivalent sequence in place of the approximate sequence in Definition 15, Timis [42] studied a new concept of weak stability in 2012 as follows:
 Definition 16 
([43]). The sequences { ϖ r } and { q r } are called equivalent if
lim r ϖ r q r = 0 .
 Definition 17 
([42]). Assume that { ϖ r } is an iterative procedure defined for ϖ 0 Δ and
ϖ r + 1 = g ( , ϖ r ) , r 0 ,
where : Δ Δ is a self-mapping. Suppose that { ϖ r } converges to an FP ϖ * of ℑ and for any equivalent sequence { q r } Δ of { ϖ r }
lim r ε r = lim r q r + 1 g ( , q r ) = 0 implies lim r q r = ϖ * ,
then, Equation (21) is called weakly ω 2 —stable with respect to ℑ.
Any analogous sequence is an approximative sequence, as demonstrated with an example in [42], but the opposite is not true.
Here, we demonstrate that for contractive-like mappings, the H R * —iterative method (7) is ω 2 —stable with respect to .
 Theorem 3. 
Under the requirements of Theorem 1, the proposed algorithm (7) is ω 2 —stable with respect to .
 Proof. 
Suppose that { q r } Δ is an equivalent sequence of { ϱ r } . Set ε r = q r + 1 ( 1 e r ) c r e r c r ) , where c r = d r , d r = ( 1 t r ) f r + t r f r , f r = ( 1 s r ) q r + s r q r . Assume that lim r ε r = 0 . Then, by triangle inequality and (2) and (7), we get
q r + 1 ϖ * q r + 1 ϱ r + 1 + ϱ r + 1 ϖ * q r + 1 ( 1 e r ) c r e r c r + ( 1 e r ) c r + e r c r ϱ r + 1 + ϱ r + 1 ϖ * = ε r + ( 1 e r ) c r + e r c r ( 1 e r ) ϑ r e r ϑ r + ϱ r + 1 ϖ * ε r + ( 1 e r ) c r ϑ r + e r c r ϑ r + ϱ r + 1 ϖ * ε r + ( 1 e r ) c r ϑ r + e r c r ϑ r + ξ c r c r + ϱ r + 1 ϖ * ε r + ( 1 ( 1 ) e r ) c r ϑ r + e r ξ c r ϖ * + ϖ * c r + ϱ r + 1 ϖ * ε r + ( 1 ( 1 ) e r ) c r ϑ r + e r ξ ( 1 + ) c r ϖ * + ϱ r + 1 ϖ * .
Because ( 1 ( 1 ) e r ) < 1 , for r 1 , then (24) reduces to
q r + 1 ϖ * ε r + c r ϑ r + e r ξ ( 1 + ) c r ϖ * + ϱ r + 1 ϖ * .
Additionally, one can obtain
c r ϑ r = d r ω r d r ω r + ξ ω r ω r d r ω r + ξ ω r ω r + ξ ω r ϖ * + ω r ϖ * 2 d r ω r + ξ ω r ϖ * + ω r ϖ * + ξ ω r ϖ * + ω r ϖ * 2 d r ω r + ξ ( 1 + ) ω r ϖ * + ξ ω r ϖ * + 2 ω r ϖ * 2 d r ω r + ξ ( 1 + ) ω r ϖ * + ξ ( ( 1 + ) ω r ϖ * .
Analogously, we can write
d r ω r 2 ρ r f r + ξ ( 1 + ) ρ r ϖ * + ξ ( ( 1 + ) ρ r ϖ * .
Finally, for r 1 , we get
ρ r f r = ( 1 s r ) ϱ r q r + s r ϱ r q r ( 1 s r ) ϱ r q r + s r ϱ r q r + s r ξ ϱ r ϱ r ( 1 ( 1 ) s r ) ϱ r q r + s r ( 1 + ) ξ ϱ r ϖ * ϱ r q r + s r ( 1 + ) ϱ r ϖ * , sin ce ( 1 ( 1 ) s r ) < 1 .
It follows from (24)–(28) that
q r + 1 ϖ * ε r + 4 ϱ r q r + 4 s r ξ ( 1 + ) ϱ r ϖ * 2 ξ 1 + ρ r ϖ * + 2 ξ ( ( 1 + ) ρ r ϖ * + ξ 1 + ω r ϖ * + ξ ( 1 + ) ω r ϖ * + e r ξ ( 1 + ) c r ϖ * + ϱ r + 1 ϖ * .
From Theorem 1, we find that lim r ϱ r ϖ * = 0 . Since ξ and is a SIC-functions with ξ ( 0 ) = 0 , hence lim r ϱ r + 1 ϖ * = 0 . Because { ϱ r } and { q r } are equivalent, we have lim r ϱ r q r = 0 . Taking the limit of (29) and since lim r ε r = 0 , we get lim r q r ϖ * = 0 . Hence, the considered algorithm (7) is ω 2 —stable with respect to .
Now, we present the following illustrative example to support the analytical proof of Theorem 3.
 Example 3. 
Assume that Δ = [ 0 , 1 ] and ( R , . ) is a BS equipped with the usual norm. Define a mapping : [ 0 , 1 ] [ 0 , 1 ] by ϱ = ϱ 8 . Clearly, 0 is a unique FP of and fulfills (1) with = 1 8 .
After that, we show that the sequence { ϱ r } produced by (7) converges to 0 Ξ ( ) . For this, assume that s r = t r = e r = 1 r + 4 and ϱ 0 [ 0 , 1 ] , then by (7), one has
ρ r = 1 1 r + 4 + 1 8 r + 4 ϱ r = 1 7 8 r + 4 ϱ r , ω r = 1 8 1 7 4 r + 4 + 49 8 2 r + 4 2 ϱ r , ϑ r = 1 8 3 1 7 4 r + 4 + 49 8 2 r + 4 2 ϱ r , ϱ r + 1 = 1 8 3 1 42 8 r + 4 + 49 8 2 r + 4 2 + 147 2 × 8 2 ( r + 4 ) 2 343 8 3 ( r + 4 ) 3 ϱ r = 1 8 3 42 8 4 r + 4 + 49 8 5 r + 4 2 + 147 2 × 8 5 ( r + 4 ) 2 343 8 6 ( r + 4 ) 3 = 1 511 512 + 42 8 4 r + 4 49 8 5 r + 4 2 147 2 × 8 5 ( r + 4 ) 2 + 343 8 6 ( r + 4 ) 3 ϱ r .
Put π r = 511 512 + 42 8 4 r + 4 49 8 5 r + 4 2 147 2 × 8 5 ( r + 4 ) 2 + 343 8 6 ( r + 4 ) 3 . Clearly π r ( 0 , 1 ) for each r > 0 and r = 0 π r = . Hence, by Lemma 1, we deduce that lim r ϱ r = 0 . Additionally, it is simple to see that lim r ϱ r = lim r ϱ r = 0 . Then, if we consider q r = 1 r + 5 for each r > 0 , we have
0 lim r ϱ r q r lim r ϱ r + lim r q r = 0 ,
which implies that lim r ϱ r q r = 0 . Hence, the two sequences { ϱ r } and { q r } are equivalent.
Ultimately, assume that ε r is the sequence associated with the iterative sequence { ϱ r } , then, we have
ε r = q r + 1 511 512 + 42 8 4 r + 4 49 8 5 r + 4 2 147 2 × 8 5 ( r + 4 ) 2 + 343 8 6 ( r + 4 ) 3 q r = 1 r + 6 511 512 + 42 8 4 r + 4 49 8 5 r + 4 2 147 2 × 8 5 ( r + 4 ) 2 + 343 8 6 ( r + 4 ) 3 q r 0 , as r .
Therefore, the proposed Algorithm (7) is ω 2 —stable with respect to .

5. Results of the Convergence

This part is devoted to proving the weak and strong convergence theorems for our iterative procedure (7) for RSTN mappings.
 Lemma 5. 
Assume that Δ is a closed convex subset of a BS Π and : Δ Δ is an RSTN mapping with Ξ ( ) . Suppose that { ϱ r } is a sequence maked by (7), then lim r ϱ r ϖ * exists for each ϖ * Ξ ( ) .
 Proof. 
Let ϖ * Ξ ( ) . According to Lemma 3, we get
ρ r ϖ * = ( 1 s r ) ϱ r + s r ϱ r ϖ * ( 1 s r ) ϱ r ϖ * + s r ϱ r ϖ * ( 1 s r ) ϱ r ϖ * + s r ϱ r ϖ * = ϱ r ϖ * ,
ω r ϖ * = ( 1 t r ) ρ r + t r ρ r ϖ * ( 1 t r ) ρ r + t r ρ r ϖ * ( 1 t r ) ρ r ϖ * + t r ρ r ϖ * ρ r ϖ * ϱ r ϖ * ,
ϑ r ϖ * = ω r ϖ * ω r ϖ * ω r ϖ * ρ r ϖ * ϱ r ϖ * ,
and
ϱ r + 1 ϖ * = ( 1 e r ) ϑ r + e r ϑ r ϖ * ( 1 e r ) ϑ r ϖ * + e r ϑ r ϖ * ϑ r ϖ * ω r ϖ * ρ r ϖ * ϱ r ϖ * .
This proves that { ϱ r ϖ * } is a bounded and decreasing sequence of R . Hence, lim r ϱ r ϖ * exists for each ϖ * Ξ ( ) .
 Lemma 6. 
Assume that Δ is a closed convex subset of a uniformly convex BS Π and : Δ Δ is an RSTN mapping. Let { ϱ r } be a sequence produced by (7). Then Ξ ( ) iff { ϱ r } is bounded and lim r ϱ r ϱ r = 0 .
 Proof. 
Let Ξ ( ) and ϖ * Ξ ( ) . Based on Lemma 5, we have lim r ϱ r ϖ * exists and { ϱ r } is bounded. Set
lim r ϱ r ϖ * = u .
It follows from (30) and (31) that
lim sup r ρ r ϖ * u and lim sup r ω r ϖ * u .
Again, using Lemma 3, one has
lim sup r ϱ r ϖ * lim sup r ϱ r ϖ * = u .
From (7) and Lemma 5, one can obtain
ϱ r + 1 ϖ * = ( 1 e r ) ϑ r + e r ϑ r ϖ * ( 1 e r ) ϑ r ϖ * + e r ϑ r ϖ * ( 1 e r ) ϱ r ϖ * + e r ϑ r ϖ * ( 1 e r ) ϱ r ϖ * + e r ω r ϖ * ( 1 e r ) ϱ r ϖ * + e r ω r ϖ * ( 1 e r ) ϱ r ϖ * + e r ω r ϖ * = ϱ r ϖ * e r ϱ r ϖ * + e r ω r ϖ * ,
which leads to
ϱ r + 1 ϖ * ϱ r ϖ * ϱ r + 1 ϖ * ϱ r ϖ * e r ω r ϖ * ϱ r ϖ * .
Hence,
u lim inf r ω r ϖ * .
Using (32) and (33), we deduce that lim r ω r ϖ * = u . Similarly, one can prove that lim r ρ r ϖ * = u . Again, using (7), we have
u = lim r ρ r ϖ * = lim r ( 1 s r ) ( ϱ r ϖ * ) + s r ( ϱ r ϖ * ) .
Because s r < 1 for each r 1 , then by Lemma 2, we get
lim r ϱ r ϱ r = 0 .
Conversely, assume that { ϱ r } is bounded and lim r ϱ r ϱ r = 0 . Let ϖ * Z ( Δ , { ϱ r } ) . Based on Lemma 4, we obtain
( ϖ * , { ϱ r } ) = lim sup r ϱ r ϖ * 3 + 1 lim sup r ϱ r ϱ r + lim sup r ϱ r ϖ * = lim sup r ϱ r ϖ * = ( ϖ * , { ϱ r } ) .
Thus, ϖ * Z ( Δ , { ϱ r } ) . As Π is uniformly convex, then Z ( Δ , { ϱ r } ) has exactly one point, hence ϖ * = ϖ * .
We now prove the weak convergence result. The following lemma will be relevant in this situation:
 Lemma 7. 
Assume that all requirements of Theorem 4 are satisfied, then lim r ϱ r , Θ ϖ 1 * ϖ 2 * exists for any ϖ 1 * , ϖ 2 * Ξ ( ) and for each ϱ , q w ( ϱ r ) , lim r ϱ q , Θ ϖ 1 * ϖ 2 * = 0 , where w ( ϱ r ) refer to the set of all weak limit points of { ϱ r } .
 Proof. 
The proof follows immediately from Lemma 2.3 [44]. □
 Theorem 4. 
Assume that Δ , ℑ and { ϱ r } are as in Lemma 6. Let Π be a uniformly convex BS. Suppose also that the assertions below hold:
( a 1 )
I is demiclosed with respect to zero and Δ satisfies Opial’s condition;
( a 2 )
Δ has a Fréchet differential norm.
Then the sequence { ϱ r } x , provided that Ξ ( ) .
 Proof. 
Based on Lemma 5, we have that lim r ϱ r ϖ * exists. It is now sufficient to demonstrate that { ϱ r } has a unique weak subsequential limit in Ξ ( ) . Assume that { ϱ r i } and { ϱ r j } are two subsequences of { ϱ r } so that { ϱ r i } x and { ϱ r j } y . If the assertion ( a 1 ) holds, then by Lemma 6, lim r ϱ r ϱ r = 0 . Since I is demiclosed with respect to zero, then we obtain that ( 1 ) x = 0 , i.e., x = x , similarly y = y . For uniqueness, as x , y Ξ ( ) , then lim r ϱ r x and lim r ϱ r y exist. If x and y are distinct, then by Opial’s condition, one has
lim r ϱ r x = lim r i ϱ r i x < lim r i ϱ r i y = lim r ϱ r y = lim r ϱ r j y < lim r ϱ r j x = lim r ϱ r x ,
which is a contradiction. hence x = y . If the assertion ( a 2 ) holds, then by Lemma 7, one can write for all ϱ , q w ( ϱ r ) , lim r ϱ q , Θ ϖ 1 * ϖ 2 * = 0 . Thus, x y 2 = x y , Θ x y , this leads to x = y .
The strong convergence results that we now establish are as follows:
 Theorem 5. 
Let Δ , ℑ, and Π be as in Lemma 6. The sequence { ϱ r } produced by HR * iterative procedure (7) converges to an element of Ξ ( ) iff lim inf r d ( ϱ r , Ξ ( ) ) = 0 , where d ( ϱ r , Ξ ( ) ) = inf ϱ r ϖ * : ϖ * Ξ ( ) .
 Proof. 
Prove the necessity is clear. Contrariwise, assume that lim inf r d ( ϱ r , Ξ ( ) ) = 0 and ϖ * Ξ ( ) . From Lemma 5 , lim r ϱ r ϖ * exists for any ϖ * Ξ ( ) . It is enough to demonstrate that the sequence { ϱ r } is Cauchy in Δ . As lim r d ( ϱ r , Ξ ( ) ) = 0 , then for given ε > 0 , there is θ 0 N so that
d ( ϱ r , Ξ ( ) ) < ε 2 and inf ϱ r ϖ * : ϖ * Ξ ( ) < ε 2 , for all r θ 0 .
Particularly, inf ϱ θ 0 ϖ * : ϖ * Ξ ( ) < ε 2 . Hence, there is ϖ * Ξ ( ) so that
ϱ θ 0 ϖ * < ε 2 .
Now, for θ , r θ 0 , we get
ϱ θ + r ϱ r ϱ θ + r ϖ * + ϱ r ϖ * ϱ θ 0 ϖ * + ϱ θ 0 ϖ * = 2 ϱ θ 0 ϖ * < ε .
This proves that the sequence { ϱ r } is Cauchy in Δ . The closedness of Δ implies that there is an element q Δ so that lim r ϱ r = q . Additionally, lim r d ( ϱ r , Ξ ( ) ) = 0 leads to d ( q , Ξ ( ) ) = 0 , that is q Ξ ( ) .
If we take the set Δ as nonempty compact convex (NCC, for short), we have the following theorem:
 Theorem 6. 
Let and Π be as in Lemma 6. Assume that Δ is a NCC subset of Π . If { ϱ r } is an iterative sequence generated by HR * iterative scheme (7), then { ϱ r } q Ξ ( ) .
 Proof. 
Based on Lemma 6, lim r ϱ r ϱ r = 0 . Because Δ is a NCC, then there is a convergent subsequence { ϱ r i } of { ϱ r } so that { ϱ r i } q Ξ ( ) . Setting ϱ r i = υ in Lemma 4, we have
ϱ r i q 3 + 1 ϱ r i ϱ r i + ϱ r i q .
As i , one can find that ϱ r i q , this implies that q = q , i.e., q Ξ ( ) . We conclude from Lemma 5 that lim r ϱ r q exists, hence { ϱ r } q Ξ ( ) .
The following theorem is obtained in the strong convergence for the sequence { ϱ r } if the operator meets condition ( I ) :
 Theorem 7. 
Let Δ , ℑ, and Π be as in Lemma 6. If { ϱ r } is an iterative sequence generated by HR * iterative scheme (7), then { ϱ r } q Ξ ( ) if ℑ satisfies condition ( I ) .
 Proof. 
According to Lemma 6, lim r ϱ r ϱ r = 0 . Using Definition 12, we get
0 lim r κ d ( ϱ r , Ξ ( ) ) lim r ϱ r ϱ r implies lim r κ d ( ϱ r , Ξ ( ) ) = 0 .
Since κ : ( 0 , ) ( 0 , ) is a nondecreasing function with κ ( 0 ) = 0 and for all w > 0 , κ ( w ) > 0 , we get lim r d ( ϱ r , Ξ ( ) ) = 0 . Because all of the prerequisites of Theorem 5 have been demonstrated, then one can infer that the sequence { ϱ r } q Ξ ( ) . □

6. Numerical Example

In this part, we provide an illustrative example of an RSTN mapping that does not meet condition ( C ) . We also assess the convergence of the HR * iterative scheme in comparison to some of the most popular iterative schemes in the literature.
 Example 4. 
Consider R , . as a BS equipped with the usual norm and Δ = [ 3 , 5 ] . Define a mapping : Δ Δ by
ϖ = ϖ + 6 3 , i f ϖ < 5 , 2 , i f ϖ = 5 .
In order to prove that ℑ does not satisfy condition (C), we take ϖ = 4 and υ = 5 , hence
1 2 ϖ ϖ = 1 2 4 4 = 1 3 < 1 = ϖ υ .
However,
ϖ υ 4 5 = 10 3 6 3 = 4 3 > 1 = ϖ υ .
Now, to show that ℑ is an RSTN mapping, we consider the cases below:
 (I) 
If ϖ , υ < 5 , we get
ϖ ϖ + υ υ + ( 1 2 ) ϖ υ = 1 2 ϖ ϖ + 6 3 + 1 2 υ υ + 6 3 = 1 2 2 ϖ 6 3 + 1 2 2 υ 6 3 1 2 2 ϖ 6 3 2 υ 6 3 = 1 2 2 ϖ 3 2 υ 3 = 1 3 ϖ υ = ϖ υ .
 (II) 
If ϖ < 5 and υ = 5 , we obtain
ϖ ϖ + υ υ + ( 1 2 ) ϖ υ = 1 2 ϖ ϖ + 6 3 + 1 2 5 2 = 1 2 2 ϖ 6 3 + 3 2 = ϖ 3 + 1 2 ϖ 3 = ϖ υ .
 (III) 
If υ < 5 and ϖ = 5 , we have
ϖ ϖ + υ υ + ( 1 2 ) ϖ υ = 1 2 5 2 + 1 2 υ υ + 6 3 = 3 2 + 1 2 2 υ 6 3 = 1 2 + υ 3 υ 3 = ϖ υ .
  • If υ = ϖ = 5 , we can write
    ϖ ϖ + υ υ + ( 1 2 ) ϖ υ = 3 > 0 = 2 υ = ϖ υ .
Hence, ℑ is RSTN mapping and has a unique FP 3 .
Numerically, by using MATLAB R2015a, we found that our iterative scheme converges faster than both iterations (5) and (6) according to Table 1 and Table 2 and Figure 1, Figure 2, Figure 3, Figure 4, Figure 5 and Figure 6 as follows:

7. Solving 2D Volterra Integral Equation

In this section, we investigate how our main results can be applied to the nonlinear 2D Volterra integral equation of the form:
ϰ ( λ , δ ) = β ( λ , δ ) + 0 λ 0 δ Ω 1 r , u , ϰ ( r , u ) d r d u + η 0 λ Ω 2 δ , u , ϰ ( λ , u ) d u + γ 0 δ Ω 3 λ , r , ϰ ( δ , r ) d r ,
for all λ , δ , r , u [ 0 , 1 ] , where ϰ Λ × Λ , β : [ 0 , 1 ] × [ 0 , 1 ] R 2 , Ω i ( i = 1 , 2 , 3 ) : [ 0 , 1 ] × [ 0 , 1 ] × R 2 R 2 , η , γ 0 and Λ = C [ 0 , 1 ] is a BS with the maximum norm
ϖ υ = max τ [ 0 , 1 ] ϖ ( τ ) υ ( τ ) , for all ϖ , υ C [ 0 , 1 ] .
Now, our main theorem here is as follows:
 Theorem 8. 
Assume that ℧ is a nonempty closed convex subset of Λ and : described as
ϰ ( λ , δ ) = β ( λ , δ ) + 0 λ 0 δ Ω 1 r , u , ϰ ( r , u ) d r d u + η 0 λ Ω 2 δ , u , ϰ ( λ , u ) d u + γ 0 δ Ω 3 λ , r , ϰ ( δ , r ) d r .
Assume also the assertions below are true
( A 1 )
the function ϰ : Λ × Λ R 2 is continuous;
( A 2 )
the functions Ω i ( i = 1 , 2 , 3 ) : [ 0 , 1 ] × [ 0 , 1 ] × R 2 R 2 are continuous and there are the constants 1 , 2 , 3 > 0 so that
Ω 1 r , u , ϖ 1 ( r , u ) Ω 1 r , u , ϖ 2 ( r , u ) 1 ϖ 1 ϖ 2 , Ω 2 r , u , ϖ 1 ( r , u ) Ω 2 r , u , ϖ 2 ( r , u ) 2 ϖ 1 ϖ 2 , Ω 3 r , u , ϖ 1 ( r , u ) Ω 3 r , u , ϖ 2 ( r , u ) 3 ϖ 1 ϖ 2 ,
for ϖ 1 , ϖ 2 R 2 ;
( A 3 )
for η , γ 0 , 1 + η 2 + γ 3 ξ , where ξ ( 0 , 1 ) .
Then, the 2D Volterra integral Equation (34) has a solution in × provided that has an FP.
 Proof. 
Let ϰ , ϰ * Λ × Λ , then
ϰ ϰ * = max τ [ 0 , 1 ] ϰ ( λ , δ ) τ ϰ * ( λ , δ ) = max τ [ 0 , 1 ] ϰ ( λ , δ ) τ β ( λ , δ ) τ 0 λ 0 δ Ω 1 r , u , ϰ * ( r , u ) d r d u η 0 λ Ω 2 δ , u , ϰ * ( λ , u ) d u γ 0 δ Ω 3 λ , r , ϰ * ( δ , r ) d r max τ [ 0 , 1 ] ϰ ( λ , δ ) τ β ( λ , δ ) τ 0 λ 0 δ Ω 1 r , u , ϰ ( r , u ) d r d u η 0 λ Ω 2 δ , u , ϰ ( λ , u ) d u γ 0 δ Ω 3 λ , r , ϰ ( δ , r ) d r + 0 λ 0 δ Ω 1 r , u , ϰ ( r , u ) d r d u 0 λ 0 δ Ω 1 r , u , ϰ * ( r , u ) d r d u + η 0 λ Ω 2 δ , u , ϰ ( λ , u ) d u 0 λ Ω 2 δ , u , ϰ * ( λ , u ) d u + γ 0 δ Ω 3 λ , r , ϰ ( δ , r ) d r γ 0 δ Ω 3 λ , r , ϰ * ( δ , r ) d r max τ [ 0 , 1 ] ϰ ( λ , δ ) τ ϰ ( λ , δ ) + 1 max τ [ 0 , 1 ] 0 λ 0 δ ϰ ( r , u ) ϰ * ( r , u ) d r d u + η 2 max τ [ 0 , 1 ] 0 λ ϰ ( r , u ) ϰ * ( r , u ) d u + γ 3 max τ [ 0 , 1 ] 0 δ ϰ ( r , u ) ϰ * ( r , u ) d r ,
which implies that
ϰ ϰ * max τ [ 0 , 1 ] ϰ ( λ , δ ) τ ϰ ( λ , δ ) + max τ [ 0 , 1 ] 1 ϰ ( r , u ) ϰ * ( r , u ) + η 2 max τ [ 0 , 1 ] ϰ ( r , u ) ϰ * ( r , u ) + γ 3 max τ [ 0 , 1 ] ϰ ( r , u ) ϰ * ( r , u ) ϰ ϰ * + ( 1 + η 2 + γ 3 ) max τ [ 0 , 1 ] ϰ ( r , u ) ϰ * ( r , u ) ϰ ϰ * + ξ ϰ ϰ * ϰ ϰ * + ϰ ϰ * .
Hence, by Lemma 4, is an RSTN mapping because it fulfills the condition (10) on ℧ with 3 + 1 = 1 . Set = Δ and Λ = Π , we find that all requirements of Lemma 6 are satisfied. Therefore, has at least one FP. Thus, problem (33) has a solution on × .
The following example support Theorem 8:
 Example 5. 
Consider the following 2D Volterra integral equation
ϰ ( λ , δ ) = π 2 λ δ 2 7 π + 0 λ 0 δ cos ϰ ( r u ) 2 d r d u + 2 7 0 λ cos ϰ ( λ u ) 2 d u + 1 7 0 δ cos ϰ ( δ r ) 2 d r .
It is clear that problem (35) is a special case of (34) with
β ( λ , δ ) = π 2 λ δ 2 7 π , Ω 1 r , u , ϰ ( r , u ) = cos ϰ ( r u ) 2 , Ω 2 δ , u , ϰ ( λ , u ) = cos ϰ ( λ u ) 2 , Ω 3 λ , r , ϰ ( δ , r ) = cos ϰ ( δ r ) 2 , η = 2 7 and γ = 1 7 .
Then, for any r , u [ 0 , 1 ] and ϖ 1 , ϖ 2 R 2 , we find that
Ω 1 r , u , ϖ 1 ( r , u ) Ω 1 r , u , ϖ 2 ( r , u ) 1 2 cos ϖ 1 cos ϖ 2 , Ω 2 r , u , ϖ 1 ( r , u ) Ω 2 r , u , ϖ 2 ( r , u ) 1 2 cos ϖ 1 cos ϖ 2 , Ω 3 r , u , ϖ 1 ( r , u ) Ω 3 r , u , ϖ 2 ( r , u ) 1 2 cos ϖ 1 cos ϖ 2 ,
According to the mean-value theorem, for any ϖ 1 , ϖ 2 R 2 with ϖ 1 < ϖ 2 there is b ϖ 1 , ϖ 2 so that
cos ϖ 1 cos ϖ 2 ϖ 1 ϖ 2 = sin ( b ) , implies cos ϖ 1 cos ϖ 2 ϖ 1 ϖ 2 = sin ( b ) 1 .
Hence, cos ϖ 1 cos ϖ 2 ϖ 1 ϖ 2 and (36) reduces to
Ω 1 r , u , ϖ 1 ( r , u ) Ω 1 r , u , ϖ 2 ( r , u ) 1 2 ϖ 1 ϖ 2 , Ω 2 r , u , ϖ 1 ( r , u ) Ω 2 r , u , ϖ 2 ( r , u ) 1 2 ϖ 1 ϖ 2 , Ω 3 r , u , ϖ 1 ( r , u ) Ω 3 r , u , ϖ 2 ( r , u ) 1 2 ϖ 1 ϖ 2 ,
where 1 = 2 = 3 = 1 2 and 1 + η 2 + γ 3 = ξ = 5 7 < 1 . It is easy to see that β ( λ , δ ) is continuous on [ 0 , 1 ] .
Consequently, all conditions of Theorem 8 are satisfied. Therefore, there exists a solution to the problem (36).

8. Conclusions and Future Works

In this study, a four-step iterative scheme known as the H R * —iterative scheme (7) is presented for approximating the fixed points of contractive-like mappings and RSTN mappings. Analytically, it has been demonstrated that the new iterative scheme converges faster than the iterative method (5) for contractive-like mappings. Furthermore, we have shown numerically that for contractive-like mappings, our novel iterative method converges faster than several popular iterative schemes in the literature. Additionally, the ω 2 —stability result of the H R * —iterative scheme (7) has also been obtained. To clarify the idea of ω 2 —stability of the considered algorithm with regard to , we have given an example. Additionally, we have demonstrated a number of weak and strong convergence theorems for RSTN mappings in uniformly convex BSs. In order to compare the convergence behavior of the proposed algorithm (7) with certain well-known iterative schemes, a novel example of RSTN mappings has been supplied. As a practical application, we proved that a 2D Volterra integral equation has a solution. Additionally, we provided an engaging example to explain the outcome of our application. Finally, as future work for this paper, we suggest the following:
(1)
If we define a mapping in a Hilbert space Δ endowed with inner product space, we can find a common solution to the variational inequality problem by using our iteration (7). This problem can be stated as follows: find * Δ such that
* , * 0 for all Δ ,
where : Δ Δ is a nonlinear mapping. Variational inequalities are an important and essential modeling tool in many fields such as engineering mechanics, transportation, economics, and mathematical programming, see [45,46,47].
(2)
We can generalize our algorithm to gradient and extra-gradient projection methods, these methods are very important for finding saddle points and solving many problems in optimization, see [6].
(3)
We can accelerate the convergence of the proposed algorithm by adding shrinking projection and CQ terms. These methods stimulate algorithms and improve their performance to obtain strong convergence, for more details, see [7].
(4)
If we consider the mapping as an α —inverse strongly monotone and the inertial term is added to our algorithm, then we have the inertial proximal point algorithm. This algorithm is used in many applications such as monotone variational inequalities, image restoration problems, convex optimization problems, and split convex feasibility problems, see [48,49,50]. For more accuracy, these problems can be expressed as mathematical models such as machine learning and the linear inverse problem.
(5)
We can try to determine the error of our present iteration.

Author Contributions

H.A.H. contributed in conceptualization, investigation, methodology, validation and writing the theoretical results; H.u.R. contributed in conceptualization, investigation and writing the numerical results; M.D.l.S. contributed in funding acquisition, methodology, project administration, supervision, validation, visualization, writing and editing. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the Basque Government under Grant IT1555-22.

Data Availability Statement

The data used to support the findings of this study are available from the corresponding author upon request.

Acknowledgments

The authors thank the Basque Government for Grant IT1555-22.

Conflicts of Interest

The authors declare that they have no competing interests.

References

  1. Arias, A.; Gheondea, A.; Gudder, S. Fixed points of quantum operations. J. Math. Phys. 2002, 43, 5872. [Google Scholar] [CrossRef] [Green Version]
  2. Lan, K.Q.; Wu, J.H. A fixed-point theorem and applications to problems on sets with convex sections and to Nash equilibria. Math. Comput. Mod. 2002, 36, 139–145. [Google Scholar] [CrossRef]
  3. Amar, A.B.; Jeribi, A.; Mnif, M. Some fixed point theorems and application to bio-logical model. Numer. Funct. Anal. Optim. 2008, 29, 1–23. [Google Scholar] [CrossRef]
  4. Eke, K.S.; Olisama, V.O.; Bishop, S.A.; Liu, L. Some fixed point theorems for convex contractive mappings in complete metric spaces with applications. Cogent Math. Stat. 2019, 6, 1655870. [Google Scholar] [CrossRef]
  5. Georgescu, F. IFS consisting of generalized convex contractions. Anal. Stiintifice Ale Univers. Ovidius Const. 2017, 25, 77–86. [Google Scholar]
  6. Korpelevich, G.M. The extragradient method for finding saddle points and other problems. Ekon. Mat. Metod. 1976, 12, 747–756. [Google Scholar]
  7. Martinez-Yanes, C.; Xu, H.K. Strong convergence of the CQ method for fixed point iteration processes. Nonlinear Anal. 2006, 64, 2400–2411. [Google Scholar] [CrossRef]
  8. Bauschke, H.H.; Combettes, P.L. Convex Analysis and Monotone Operator Theory in Hilbert Spaces; Springer: Berlin, Germany, 2011. [Google Scholar]
  9. Adamu, A.; Kitkuan, D.; Padcharoen, A.; Chidume, C.E.; Kumam, P. Inertial viscosity-type iterative method for solving inclusion problems with applications. Math. Comput. Simul. 2022, 194, 445–459. [Google Scholar] [CrossRef]
  10. Adamu, A.; Deepho, J.; Ibrahim, A.H.; Abubakar, A.B. Approximation of zeros of sum of monotone mappings with applications to variational inequality and image restoration problems. Nonlinear Funct. Anal. Appl. 2021, 26, 411–432. [Google Scholar]
  11. Tuyen, T.M.; Hammad, H.A. Effect of shrinking projection and CQ-methods on two inertial forward–backward algorithms for solving variational inclusion problems. Rend. Circ. Mat. Palermo II Ser. 2021, 70, 1669–1683. [Google Scholar] [CrossRef]
  12. Watcharaporna, C.; Damrongsak, Y.; Hammad, H.A. Modified hybrid projection methods with SP iterations for quasi-nonexpansive multivalued mappings in Hilbert spaces. Bull. Iran. Math. Soc. 2021, 47, 1399–1422. [Google Scholar]
  13. Picard, E. Memoire sur la theorie des equations aux derivees partielles et la methode des approximations successives. J. Math. Pures et Appl. 1890, 6, 145–210. [Google Scholar]
  14. Halpern, B. Fixed points of nonexpanding maps. Bull. Am. Math. Soc. 1967, 73, 957–961. [Google Scholar] [CrossRef] [Green Version]
  15. He, S.; Yang, C. Boundary point algorithms for minimum norm fixed points of nonexpansive mappings. Fixed Point Theory Appl. 2014, 2014, 56. [Google Scholar] [CrossRef] [Green Version]
  16. Hammad, H.A.; Rahman, H.u.; De la Sen, M. Shrinking projection methods for accelerating relaxed inertial Tseng-type algorithm with applications. Math. Probl. Eng. 2020, 2020, 7487383. [Google Scholar] [CrossRef]
  17. Hammad, H.A.; Rahman, H.u.; De la Sen, M. Advanced algorithms and common solutions to variational inequalities. Symmetry 2020, 12, 1198. [Google Scholar] [CrossRef]
  18. Zamfirescu, T. Fixed point theorems in metric spaces. Arch. Math. 1972, 23, 292–298. [Google Scholar] [CrossRef]
  19. Berinde, V. On the approximation of fixed points of weak contractive mappings. Carpath. J. Math. 2003, 19, 7–22. [Google Scholar]
  20. Suzuki, T. Fixed point theorems and convergence theorems for some generalized nonexpansive mappings. J. Math. Anal. Appl. 2008, 340, 1088–1095. [Google Scholar] [CrossRef] [Green Version]
  21. Pant, R.; Pandey, R. Existence and convergence results for a class of non-expansive type mappings in hyperbolic spaces. Appl. Gen. Topol. 2019, 20, 281–295. [Google Scholar] [CrossRef]
  22. Mann, W.R. Mean value methods in iteration. Proc. Am. Math. Soc. 1953, 4, 506–510. [Google Scholar] [CrossRef]
  23. Ishikawa, S. Fixed points by a new iteration method. Proc. Am. Math. Soc. 1974, 44, 147–150. [Google Scholar] [CrossRef]
  24. Noor, M.A. New approximation schemes for general variational inequalities. J. Math. Anal. Appl. 2000, 251, 217–229. [Google Scholar] [CrossRef] [Green Version]
  25. Agarwal, R.P.; Regan, D.O.; Sahu, D.R. Iterative construction of fixed points of nearly asymptotically nonexpansive mappings. J Nonlinear Convex Anal. 2007, 8, 61–79. [Google Scholar]
  26. Abbas, M.; Nazir, T. A new faster iteration process applied to constrained minimization and feasibility problems. Math. Vesn. 2014, 66, 223–234. [Google Scholar]
  27. Chugh, R.; Kumar, V.; Kumar, S. Strong convergence of a new three step iterative scheme in Banach spaces. Am. J. Comp. Math. 2012, 2, 345–357. [Google Scholar] [CrossRef] [Green Version]
  28. Sahu, D.R.; Petrusel, A. Strong convergence of iterative methods by strictly pseudocontractive mappings in Banach spaces. Nonlinear Anal. Theory Methods Appl. 2011, 74, 6012–6023. [Google Scholar] [CrossRef]
  29. Gursoy, F.; Karakaya, V. A Picard-S hybrid type iteration method for solving a differential equation with retarded argument. arXiv 2014, arXiv:1403.2546v2. [Google Scholar]
  30. Thakur, B.S.; Thakur, D.; Postolache, M. A new iterative scheme for numerical reckoning fixed points of Suzuki’s generalized nonexpansive mappings. Appl. Math. Comput. 2016, 275, 147–155. [Google Scholar] [CrossRef]
  31. Ullah, K.; Arshad, M. Numerical reckoning fixed points for Suzuki’s generalized nonexpansive mappings via new iteration process. Filomat 2018, 32, 187–196. [Google Scholar] [CrossRef] [Green Version]
  32. Ahmad, J.; Ullah, K.; Arshad, M.; Ma, Z. A new iterative method for Suzuki mappings in Banach spaces. J. Math. 2021, 2021, 6622931. [Google Scholar] [CrossRef]
  33. Hammad, H.A.; Rehman, H.u.; Zayed, M. Applying faster algorithm for obtaining convergence, stability, and data dependence results with application to functional-integral equations. AIMS Math. 2022, 7, 19026–19056. [Google Scholar] [CrossRef]
  34. Berinde, V. Picard iteration converges faster than Mann iteration for a class of quasicontractive operators. Fixed Point Theory Appl. 2004, 2, 97–105. [Google Scholar] [CrossRef] [Green Version]
  35. Senter, H.F.; Dotson, W.G. Approximating fixed points of nonexpansive mapping. Proc. Am. Math. Soc. 1974, 44, 375–380. [Google Scholar] [CrossRef]
  36. Weng, X. Fixed point iteration for local strictly pseudocontractive mapping. Proc. Am. Math. Soc. 1991, 113, 727–731. [Google Scholar] [CrossRef]
  37. Ullah, K.; Ahmad, J.; De la Sen, M. On generalized nonexpansive maps in Banach spaces. Computer 2020, 8, 61. [Google Scholar] [CrossRef]
  38. Harder, A.M. Fixed Point Theory and Stability Results for Fixed-Point Iteration Procedures. Ph.D. Thesis, University of Missouri-Rolla, St. Rolla, MO, USA, 1987. [Google Scholar]
  39. Hammad, H.A.; Rahman, H.u.; De la Sen, M. A novel four-step iterative scheme for approximating the fixed point with a supportive application. Inf. Sci. Lett. 2021, 10, 333–339. [Google Scholar]
  40. Okeke, G.A.; Abbas, M.; Sen, M.D. Approximation of the fixed point of multivalued quasi-nonexpansive mappings via a faster iterative process with applications. Discrete Dyn. Nat. Soc. 2020, 2020, 8634050. [Google Scholar] [CrossRef]
  41. Berinde, V. Iterative Approximation of Fixed Points; Springer: Berlin, Germany, 2007. [Google Scholar]
  42. Timis, I. On the weak stability of Picard iteration for some contractive type mappings and coincidence theorems. Int. J. Comput. Appl. 2012, 37, 9–13. [Google Scholar] [CrossRef]
  43. Cardinali, T.; Rubbioni, P. A generalization of the Caristi fixed point theorem in metric spaces. Fixed Point Theory 2010, 11, 3–10. [Google Scholar]
  44. Khan, S.H.; Kim, J.K. Common fixed points of two nonexpansive mappings by a modified faster iteration scheme. Bull. Korean Math. Soc. 2010, 47, 973–985. [Google Scholar] [CrossRef]
  45. Facchinei, F.; Pang, J.S. Finite-Dimensional Variational Inequalities and Complementarity Problems; Springer Series in Operations Research; Springer: New York, NY, USA, 2003; Volume II. [Google Scholar]
  46. Konnov, I.V. Combined Relaxation Methods for Variational Inequalities; Springer: Berlin, Germany, 2001. [Google Scholar]
  47. Hammad, H.A.; Cholamjiak, W.; Yambangwai, D.; Dutta, H. A modified shrinking projection methods for numerical reckoning fixed points of G-nonexpansive mappings in Hilbert spaces with graph. Miskolc Math. Notes 2019, 20, 941–956. [Google Scholar] [CrossRef]
  48. Chen, P.; Huang, J.; Zhang, X. A primal-dual fixed point algorithm for convex separable minimization with applications to image restoration. Inverse Probl. 2013, 29, 025011. [Google Scholar] [CrossRef]
  49. Hammad, H.A.; Rehman, H.u.; Almusawa, H. Tikhonov regularization terms for accelerating inertial Mann-Like algorithm with applications. Symmetry 2021, 13, 554. [Google Scholar] [CrossRef]
  50. Dang, Y.; Sun, J.; Xu, H. Inertial accelerated algorithms for solving a split feasibility problem. J. Ind. Manag. Optim. 2017, 13, 1383–1394. [Google Scholar] [CrossRef]
Figure 1. A graphical comparison of Algorithms (5)–(7), where z 1 = 3.00 .
Figure 1. A graphical comparison of Algorithms (5)–(7), where z 1 = 3.00 .
Mathematics 10 04257 g001
Figure 2. A graphical comparison of Algorithms (5)–(7), where z 1 = 3.00 .
Figure 2. A graphical comparison of Algorithms (5)–(7), where z 1 = 3.00 .
Mathematics 10 04257 g002
Figure 3. A graphical comparison of Algorithms (5)–(7), where z 1 = 3.82 .
Figure 3. A graphical comparison of Algorithms (5)–(7), where z 1 = 3.82 .
Mathematics 10 04257 g003
Figure 4. A graphical comparison of Algorithms (5)–(7), where z 1 = 3.82 .
Figure 4. A graphical comparison of Algorithms (5)–(7), where z 1 = 3.82 .
Mathematics 10 04257 g004
Figure 5. A graphical comparison of Algorithms (5)–(7), where z 1 = 4.44 .
Figure 5. A graphical comparison of Algorithms (5)–(7), where z 1 = 4.44 .
Mathematics 10 04257 g005
Figure 6. A graphical comparison of Algorithms (5)–(7), where z 1 = 4.44 .
Figure 6. A graphical comparison of Algorithms (5)–(7), where z 1 = 4.44 .
Mathematics 10 04257 g006
Table 1. Numerical comparison of results of Algorithms (5)–(7).
Table 1. Numerical comparison of results of Algorithms (5)–(7).
Number of Iterations
Initial Point ( z 1 )Algorithm (5)Algorithms (6)Algorithms (7)
3.00 16137
3.82 231810
4.44 252010
Table 2. Numerical comparison of results of Algorithms (5)–(7).
Table 2. Numerical comparison of results of Algorithms (5)–(7).
Execution Time in Seconds
Initial Point ( z 1 )Algorithm (5)Algorithms (6)Algorithms (6)
3.00 0.004832900000000000.005957500000000000.000157200000000000
3.82 0.002367600000000000.007555200000000000.00779860000000000
4.44 0.007059300000000000.009460300000000000.00744400000000000
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Hammad, H.A.; Rehman, H.u.; De la Sen, M. A New Four-Step Iterative Procedure for Approximating Fixed Points with Application to 2D Volterra Integral Equations. Mathematics 2022, 10, 4257. https://0-doi-org.brum.beds.ac.uk/10.3390/math10224257

AMA Style

Hammad HA, Rehman Hu, De la Sen M. A New Four-Step Iterative Procedure for Approximating Fixed Points with Application to 2D Volterra Integral Equations. Mathematics. 2022; 10(22):4257. https://0-doi-org.brum.beds.ac.uk/10.3390/math10224257

Chicago/Turabian Style

Hammad, Hasanen A., Habib ur Rehman, and Manuel De la Sen. 2022. "A New Four-Step Iterative Procedure for Approximating Fixed Points with Application to 2D Volterra Integral Equations" Mathematics 10, no. 22: 4257. https://0-doi-org.brum.beds.ac.uk/10.3390/math10224257

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop