1.
Introduction
The split feasibility problem (SFP) in Euclidean spaces was introduced by Censor and Elfving[1] in 1994. It is depicted as finding a point x such that
where C⊂H1 and Q⊂H2 are nonempty closed convex sets; A is a bounded linear operator from a Hilbert space H1 onto a Hilbert space H2 with A≠0. Denote the set of solutions for (1.1) by Δ. The SFP plays an important role in the study of medical image reconstruction, signal processing, etc. Many scholars regard the SFP and its generalizations, such as the multiple-set SFP and the split common-fixed-point problem as their research direction (see [2,3,4,5,6]).
It is known that Byrne [7,8] proposed the famous CQ algorithm (CQA) for solving the problem (1.1). The proposed method is given as follows:
where τn∈(0,2‖A‖2) is the step size, A∗ is the adjoint operator of A, PC is the projection onto C and PQ is the projection onto Q. Regrettably, there are two drawbacks of applying (1.2). On one hand, estimating the operator norm can often be challenging. On the other hand, computing projections onto both C and Q can be very difficult.
To overcome the first drawback, López et al. [9] proposed a novel approach for selecting the step size, denoted by τn, which is defined as follows:
where f(xn):=12‖(I−PQ)Axn‖2, ∇f(xn)=A∗(I−PQ)Axn, ρn∈(0,4) and infn∈Nρn(4−ρn)>0.
To overcome the second drawback, Fukushima [10] introduced the level sets C and Q:
where ϕ:H1→R and φ:H2→R are convex, subdifferential and weakly lower semi-continuous functions. Motivated by Fukushima's method, Yang [11] introduced a new relaxed CQA by replacing PC with PCn and PQ with PQn. The algorithm has the form
where αn∈(0,2‖AA∗‖), A∗ is the adjoint operator of A and Cn and Qn are defined as follows:
and
where ∂ϕ and ∂φ are bounded operators.
Qin and Wang [12] introduced (1.4) to find a common solution of the SFP (1.1) and fixed-point problem in 2019. Their algorithm has the form
where g is a k-contraction from C onto C, S is nonexpansive from C onto C and Fix(S):={x∈H:Sx=x}. {αn}, {βn}, {γn}, {δn} and {τn} are included in (0,1); they satisfy the following:
(i) ∑∞n=1αn=∞, limn→∞αn=0;
(ii) 0<lim infn→∞βn≤lim supn→∞βn<1;
(iii) αn+βn+γn=1;
(iv) limn→∞|τn−τn+1|=0, 0<lim infn→∞τn≤lim supn→∞τn<2‖A‖2;
(v) limn→∞|δn−δn+1|=0, 0<lim infn→∞δn≤lim supn→∞δn<1.
Then, there is a point q of Δ∩Fix(S) with xn→q. Furthermore, it satisfies (1.5):
Motivated by López et al. [9], Wang et al. [13] improved the selection of step size in (1.4). In order to accelerate the convergence rate, they introduced (1.6) to solve the SFP (1.1) and fixed-point problem. Given that x0,x1∈H, their algorithm has the form
where μ≥0, τn=ρnf(wn)‖∇f(wn)‖2, 0<ρn<4, f(wn):=12‖(I−PQ)Awn‖2 and ∇f(wn)=A∗(I−PQ)Awn. Assume that S:H1→H1 is quasi-nonexpansive, I−S is demiclosed at zero and g:H1→H1 is a k-contraction. {αn}, {βn}, {γn} and {δn} are included in [0,1], which satisfy the following conditions:
(i) ∑∞n=1αn=∞, limn→∞αn=0;
(ii) lim supn→∞βn<1;
(iii) αn+βn+γn=1;
(iv) 0<lim infn→∞δn≤lim supn→∞δn<1;
(v) εn>0, limn→∞εnαn=0.
Then, there is a point q of Fix(S)∩Δ with xn→q. Furthermore, it satisfies (1.7):
In addition, Tian [14] introduced an iterative form:
Suppose that Fix(S)≠∅, where Fix(S):={x∈H:Sx=x}. Then, there is a point q in Fix(S) with xn→q. Furthermore, it satisfies the following:
where B is ¯λ-strongly monotone and M-Lipschitz continuous from H onto H with ¯λ,M>0, S is nonexpansive from H onto H and g is a k-contraction from H onto H with 0<k<1. Let ι,λ∈R and {αn}⊂(0,1) satisfy the following:
(i) 0<ι<2¯λM2;
(ii) 0<λ<ι¯λ−M2ι2k;
(iii) ∑∞n=1|αn+1−αn|<∞, ∑∞n=1αn=∞, limn→∞αn=0.
Motivated by the algorithms developed by Qin and Wang [12], Wang et al. [13], Tian [14] and Kwari et al. [15], we propose a new half-space relaxation projection method for solving the SFP and fixed-point problem of demicontractive mappings by expanding the scope of operator S, modifying the iteration format and optimizing the selection of step sizes. Our result in this article extends and improves many recent correlative results of other authors. Particularly, our method extends and improves the methods in some papers of other authors in the following ways: (1) We have considered and studied a new modified half-space hybrid method to solve the fixed-point problem and SFP of nonlinear operators at the same time. And, our method can be used more widely; (2) We extend the nonexpansive mapping and the quasi-nonexpansive mapping to the demicontractive mapping, which expands the scope of the study; (3) The inertia is added to accelerate the convergence rate further; (4) The selection of the step size is a multistep and self-adaptive process, so it no longer depends on the operator norm; (5) The projection onto a half-space greatly facilitates the calculation, and under some weaker conditional assumptions, the iterative sequence generated by our new algorithm converges strongly to the common solution of the two problems. At last, we present some numerical experiments to show the effectiveness and feasibility of our new iterative method.
2.
Preliminaries
In this paper, let H be a real Hilbert space; the inner product be denoted by ⟨⋅,⋅⟩ and the norm be denoted by ‖⋅‖. We use the symbol ⇀ to indicate weak convergence and → to indicate strong convergence.
Definition 2.1. A self-mapping P is said to be
(i) nonexpansive if
(ii) quasi-nonexpansive if Fix(P)≠∅ such that
(iii) α -demicontractive (0≤α<1) if Fix(P)≠∅ such that
(iv) firmly nonexpansive if
(v) t-contractive (0≤t<1) if
(vi) M-Lipschitz continuous (M>0) if
(vii) β-strongly monotone (β≥0) if
When Fix(P)≠∅, we obtain (i)⇒(ii)⇒(iii).
Definition 2.2. When the function f:H→R is convex and subdifferentiable, an element d∈H is called a subgradient of f(x0) if
The set of subgradients of f at x0 is denoted by ∂f(x0).
Definition 2.3. The function f:H→R is called weakly lower semi-continuous if xn⇀x0 implies that
Lemma 2.1 ([16,17,18]). Let D⊂H be a nonempty, convex and closed set. For any x∈H, we have
(i) ‖PDx−y‖2≤‖x−y‖2−‖x−PDx‖2, ∀y∈D;
(ii) ⟨x−PDx,y−PDx⟩≤0, ∀y∈D;
(iii) ‖PDx−PDy‖2≤⟨PDx−PDy,x−y⟩, ∀y∈H;
(iv) ‖(I−PD)x−(I−PD)y‖2≤⟨(I−PD)x−(I−PD)y,x−y⟩, ∀y∈H.
Lemma 2.2 ([19,20]). For any x,y∈H, the following results hold
(i) ‖x+y‖2≤2⟨y,x+y⟩+‖x‖2;
(ii) ‖(1−m)x+my‖2=m‖y‖2+(1−m)‖x‖2−(1−m)m‖x−y‖2, m∈R.
Lemma 2.3 ([14]). Assume that B is an M-Lipschitz continuous and ¯λ-strongly monotone operator with ¯λ,M>0. For μ,ν>0, they satisfy the following conditions:
Let {γn}⊂(0,1) and limn→∞γn=0. If n is a sufficiently large number, we have
Proof.
Combining limn→∞γn=0 and μ−γn>0 (n sufficiently large), we have
Since 1−γnν>0 (n sufficiently large), we have
□
Lemma 2.4 ([21]). Let the self-mapping S be α-demicontractive in H and Fix(S)≠∅. Define Sσ=(1−σ)I+σS, σ∈(0,1−α); then, we have the following:
(i)Fix(S)=Fix(Sσ)⊂H is convex and closed;
(ii) ‖Sσx−q‖2≤‖x−q‖2−1σ(1−α−σ)‖(I−Sσ)x‖2∀x∈H, q∈Fix(S).
Lemma 2.5 ([8]). Let f(z)=12‖(I−PQ)Az‖2. We can know that ∇f is M-Lipschitz continuous with M=‖A‖2.
Lemma 2.6 ([22]). Let {an} be a sequence of nonnegative numbers such that
where n0 is a sufficiently large integer, the sequence {Θn} is contained in (0,1), the real sequence {Πn} is nonnegative {Υn} and {Γn} are two sequences which are included in R. If the following conditions hold
(i)∑∞n=0Θn=∞; (ii)limn→∞Γn=0;
(iii)limi→∞Πni=0 ⇒ lim supi→∞Υni≤0, ∀{ni}⊆{n}, then limn→∞an=0.
3.
Results
In this section, C and Q are defined by (1.3). We give some conditions for the convergence analysis of our Algorithm 1.
(C1) ∑∞n=1αn=∞, limn→∞αn=0, 0<αn<1;
(C2) βn∈[0,1], lim supn→∞βn<1;
(C3) εn>0, limn→∞εnαn=0;
(C4) 0<lim infn→∞δn≤lim supn→∞δn<1;
(C5) σn∈(0,1−α], lim infn→∞σn>0;
(C6) infn∈Nρn(4−ρn)>0, {ρn}⊂(0,4).
Theorem 3.1. Let S:H1→H1 be α-demicontractive, I−S be demiclosed at zero and g:H1→H1 be k-contractive. Moreover, let operator B be L-Lipschitz continuous and ¯λ-strongly monotone. Assume that {αn}, {βn}, {δn}, {σn}, {ρn} are sequences satisfying (C1)−(C6) and Fix(S)∩Δ≠∅. Then, the {xn} generated by Algorithm 1 converges strongly to x∗∈Fix(S)∩Δ. Furthermore, it is the unique solution of (3.1):
Proof. Let r∈Δ∩Fix(S). Since C⊂Cn and Q⊂Qn, we have that r∈Cn, Ar∈Qn and r∈Fix(S). By combining Lemma 2.1 with Lemma 2.2, we get
Set
according to Lemma 2.4, we have
From the definition of ∇fn(dn), we have
which means that when ‖∇fn(dn)‖=0, we get that fn(dn)=0. Substituting (3.3) into (3.2), we have
Noting that {δn} is a sequence in (0,1) and ρn∈(0,4), we derive that
From the definition of dn, we have
In the rest of the proof, n0 is assumed to be a sufficiently large positive integer and n≥n0.
Now, let γn:=αn1−βn. By Lemma 2.3, (3.5) and (3.6), we estimate ‖xn+1−r‖:
We can assume that M is a suitable positive number such that εnαn≤M since limn→∞εnαn=0. Next, we have
Therefore, the sequence {xn} is bounded.
From the definition of xn+1,
set
then, we obtain
In view of the arbitrariness of r, Lemma 2.2, Lemma 2.3, (3.5) and (3.7), we have
According to the definition of {dn} and Lemma 2.2, we have
Next, we can estimate ‖xn+1−x∗‖2. On the one hand, in view of (3.6), (3.8), (3.9), (3.10) and Lemma 2.2, we obtain
On the other hand, using the definition of {zn}, Lemma 2.2, (3.4) and (3.10), we get
Apply the following:
Thus, we can rewrite (3.11) and (3.12):
It is easy for us to know that limn→∞Θn=0, ∑∞n=1Θn=∞ andlimn→∞Γn=0. If we prove that lim supi→∞Υni≤0 when limi→∞Πni=0 for any subsequence {ni}⊂{n}, we can get that limn→∞‖xn−x∗‖=0 by Lemma 2.6.
Assume that
Using the conditions of {βn}, {δn} and {σn}, we have
From (3.13) and the conditions of {ρn}, we deduce that
If ‖∇fni(dni)‖≠0, we have that fni(dni)≠0 and
which means that infi∈Nτni>0. Hence, we obtain fni(dni)→0 as i→∞. This implies that
Using (3.16) and the conditions of {ρn}, we have
Moreover, from (3.14) and the condition of {σn}, we get
Using (3.15) and the definition of yn, we have
again using (3.15), we obtain
i.e.,
Due to (3.17) and (3.19), we get
i.e.,
Then, we have
combining (3.18) with (3.20), we obtain
Moreover, using the definition of {μn} and the boundedness of {xn}, we can have
Next, combining (3.21) and (3.22), we have
It is easy for us to know that ωw(dni)⊂Fix(S) by combining (3.18) and the case that I−S is demiclosed at zero. Now, we choose a subsequence {dnij} of {dni} to satisfy
Without loss of generality, we suppose that dnij⇀z′. It is easy to get that ynij⇀z′ and xnij⇀z′ by using (3.21) and (3.23). Now, we show that z′∈C. We know that ynij∈Cnijby the definition of ynij; this implies that
where ϑnij∈∂ϕ(xnij). From (3.23) and the boundedness of ∂ϕ, we have
as n→∞. Because of the weakly lower semi-continuous nature of ϕ, xnij⇀z′ and (3.25), the following holds:
Hence z′∈C.
Next, we show that Az′∈Q. Since PQnij(Axnij)∈Qnij, we have
where χnij∈∂φ(Axnij). Given that limi→∞‖(I−PQni)Adni‖=0 and (3.22), we get that limi→∞‖(I−PQni)Axni‖=0. By (3.26) and the boundedness of ∂φ, we have
as n→∞. In view of xnij⇀z′, Axnij⇀Az′, the weakly lower semi-continuous nature of φ and (3.27), we can get
Hence Az′∈Q.
From the above proof process, we can derive that z′∈Fix(S)∩Δ. Now, using (3.21), we get
It means that
□
4.
Numerical experiments
Now, we present a comparison of Algorithm 1 with other algorithms by describing two numerical experiments. All of the programs were written in Matlab 9.5 and performed on a desktop PC with AMD Ryzen 7 4800U with Radeon Graphics 1.80 GHz, RAM 16.0GB.
Example 4.1. We assume that H1=H2=C=R4 and Q={b}, where b∈R4; then, we have that Δ={x∈R4:Ax=b}. Considering the system of linear equations Ax=b, let
By calculation, we can find that Ax=b has a unique solution x∗=(−1,−2,1,2)T. Let
By calculation, we can find that the mapping S is nonexpansive and x∗=(−1,−2,1,2)T∈Fix(S).
In Algorithm 1 and scheme (1.4), we let αn=110n, βn=0.2, δn=0.5, x1=(1,2,3,4)T and g=0.2I; in scheme (1.4), we let τn=74‖A‖2; in Algorithm 1, we let ϕ(x)=0, ∀x∈R4, φ(y)=‖y−b‖, ∀y∈R4, B=I, λ=1, εn=1n2, μ=1.5, σn=1, ρn=3.5, τ=1 and x0=(1,2,3,4)T. The results of numercial experiments are revealed in Table 1 and Figure 1.
From Table 1, we can find that xn is closer to the exact solution x∗ with an increase of the number of iterations. We can also see that errors are closer to 0. Therefore, it can be concluded that Algorithm 1 is feasible. From Figure 1, we can find that the number of iterations for Algorithm 1 is less than that for scheme (1.4).
Example 4.2. Assume that H1=R, H2=R3, C=[−2,6], Q={(ya,yb,yc)T:|ya|+|yb|+|yc|≤3},
We can see that S is not nonexpansive but quasi-nonexpansive [23]. By calculation, we can find that Fix(S)={0}. It is easy to obtain that 0∈Δ. We denote x∗=0.
In Algorithm 1 and scheme (1.6), we let x0=x1=1, εn=1n2, μ=0.9, βn=0.5, ρn=3.5, δn=0.4, g(x)=13sinx and αn=18np, where 0<p≤1; in scheme (1.6), we used the function quadprog to compute the projection over Q by using Matlab 9.5 Optimization Toolbox; In Algorithm 1, we let ϕ(x)=(x−6)(x+2), ∀x∈R, φ(y)=|ya|+|yb|+|yc|−3, ∀y=(ya,yb,yc)T∈R3, B=I, λ=1, σn=1 and τ=1. We used ‖xn−x∗‖≤10−8 as the stopping criterion. The results of numerical experiments for different values of p are shown in Table 2. The convergence behavior for p=0.5 is shown in Figures 2 and 3.
5.
Conclusions
In this work, we developed a method for solving the SFP and the fixed-point problem involving demicontractive mapping. In Algorithm 1, we have expanded the nonexpansive mapping to the demicontractive mapping, selected a new step size and added the inertial method based on scheme (1.4). Our Algorithm 1 exhibits better convergence behavior than scheme (1.4). Additionally, we have extended the quasi-nonexpansive mapping to the demicontractive mapping, applied projection onto a half-space and selected a new step size in our Algorithm 1 based on scheme (1.6). Our Algorithm 1 also demonstrated superior convergence behavior compared to scheme (1.6). From the above, our algorithm exhibits a superior convergence rate and a wider range for the operator, thus making it applicable in a broader range of scenarios. Furthermore, we have presented two numerical results that demonstrate the feasibility and effectiveness of our method. In the following work, we intend to extend the demicontractive mapping to the quasi-pseudocontractive mapping and extend the SFP to the multiple-set split feasibility problem.
Use of AI tools declaration
The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.
Acknowledgments
This work was supported by the National Natural Science Foundation of China (Grant no. 12171435).
Conflict of interest
The authors declare that they have no competing interests.