1.
Introduction
Fixed point (fp) theorems have extensive applications in multiple disciplines. In economics, Arrow [1] applied these theorems to demonstrate the impossibility of a perfect voting system, a cornerstone of social choice theory. The Turing fp theorem [2] in computer science established the undecidability of the halting problem, a fundamental concept in the field. In physics, the fp theory is instrumental in comprehending quantum system behaviors (see [3]). Image processing leverages fp algorithms for image registration, aligning images for purposes such as medical imaging (see [4]). In game theory, Nash [5] employed fp theorems to prove the existence of Nash equilibria in non-cooperative games. In finance, fp methods are crucial for deriving the Black-Scholes equation [6], a pivotal model in financial mathematics. Social sciences utilize fp theory to study network architecture, social dynamics, and system stability (see [6]). Optimization techniques, like the Gauss-Seidel method for solving linear equations, frequently use fp iterations (see [7]). The original approach of Hutchinson [8] to fractals considers the defining equation as an fp problem. Barnsley and Vince [9] used fp theorems to demonstrate that the 'chaos game' technique almost always produces the attractor of an iterated function system. In short, the fp theory is an effective method for solving equations in many fields. The first fp theorem was given by Brouwer [10] in 1912. However, this theorem is not valid in infinite dimensional spaces. The first fp theorem for infinite dimensional Banach spaces was provided by Schauder [11] in 1930. The Schauder fp theorem guarantees the existence of fps for continuous maps defined on a compact, convex subset of a Banach space. Despite the extensive attention researchers have dedicated to analytical solutions, their scarcity in numerous scenarios remains a challenging yet accepted reality.
Given these circumstances, researchers have used iterative algorithms to seek approximate solutions. One prominent approach is the Picard iterative algorithm [12], which is used for contraction maps in the Banach fp theorem [13]. However, the Picard iterative algorithm may not always converge to an fp in the class of nonexpansive maps. Alternatively, there are several iterative schemes in the literature having various steps, for example, Mann iteration [14] (one-step), Ishikawa iteration [15] (two-step), and Noor iteration [16] (three-step) for approximating fps of nonexpansive maps in Banach spaces. In 2007, Agarwal et al. [17] introduced a two-step iteration independent of the Mann and Ishikawa iterative algorithms. This iterative algorithm is more applicable than the Picard, Mann, and Ishikawa iterative algorithms because it converges faster than these iterative algorithms for contraction maps and works for nonexpansive maps. In 2014, Abbas and Nazir [18] introduced a three-step iterative algorithm, which converges faster than Agarwal et al. iterative algorithm. In 2016, Thakur et al. [19] proposed a new three-step iterative algorithm to approximate the fps of nonexpansive maps, proving that it converges faster than existing algorithms for contraction maps. In 2018, Ullah and Arshad [20] proposed a new three-step iterative algorithm, called the M-iterative algorithm, to approximate the fps of Suzuki generalized nonexpansive maps in Banach spaces. In 2020, Ali and Ali [21] introduced the three-step F-iterative algorithm, which slightly modifies the M-iterative algorithm and is independent of all iterative schemes in the existing literature. They proved that this iterative algorithm converges faster than other iterative algorithms.
Abbas et al. [22] introduced a new four-step iterative algorithm, termed the AA-iterative algorithm, in Banach spaces as follows:
Using this iterative algorithm, they established a stability outcome for enriched contraction maps and convergence outcomes for enriched nonexpansive maps in Banach spaces with an application to a delay fractional differential equation. Also, they proved that the AA-iterative algorithm converges faster than all the previously mentioned iterative algorithms for enriched contraction maps. Moreover, Beg et al. [23] presented the strong and weak convergence outcomes of the AA-iterative algorithm (1.1) for generalized α-nonexpansive maps in Banach spaces with an application to a delay composite functional differential equation. Later, Asghar et al. [24] approximated the fps of generalized αm-nonexpansive maps employing the AA-iterative algorithm in the structure of modular spaces and proved the stability theorem of this iterative algorithm for m-contraction maps in the modular space. In the same year, Suanoom et al. [25] proved the strong and weak convergence results using the AA-iterative algorithm for the generalized AK-α-nonexpansive maps in Banach spaces. Asghar et al. [26] proposed an efficient inertial viscosity algorithm hybrid with the AA-iteration for approximating the common solution of more generalized nonlinear problems. Abbas et al. [27] also used the AA-iterative algorithm to approximate solutions for boundary value problems involving Caputo fractional differential equations and proved the stability theorem of this iterative algorithm in Banach spaces. All these studies have highlighted the widely adopted AA-iterative algorithm, which continues to advance computational techniques in finding fps and addressing other nonlinear problems.
Given the prevalence of nonlinear phenomena in nature, mathematicians and scientists continuously strive to devise techniques for addressing real-world nonlinear problems. Consequently, translating linear problems into their nonlinear counterparts holds significant relevance. Therefore, once the approximation of an fp is established in a Banach space, then the extension of such findings on a nonlinear domain, especially the hyperbolic space (HS) defined by Kohlenbach [28], is always desirable. The reason behind this fact is that the scope of many problems naturally falls within the HS setting.
Motivated by the above works, we investigate the AA-iterative algorithm's applicability in the HS. Our focus is developing the HS adaptation of the AA-iterative algorithm and establishing the weak w2-stability theorem of this iterative algorithm for contraction maps. We also aim to obtain the strong and Δ-convergence theorems of this iterative algorithm for generalized (α,β)-nonexpansive (GαβN) maps in HSs. Furthermore, we furnish an illustrative example of GαβN maps and conduct a comparative analysis of convergence rates between the AA-iterative and other iterative algorithms for this class of maps. We employ our major findings to demonstrate practical applicability in solving linear Fredholm integral equations (FIEs) and nonlinear Fredholm-Hammerstein integral equations (FHIEs) on time scales, supported by a numerical example. Our study is more general and unifies the comparable results in the existing literature, such as those presented in [22,23,27].
2.
Preliminaries
2.1. Essentials on metric and hyperbolic spaces
In this section, we provide essential definitions and theorems necessary for establishing our primary outcomes.
Consider a nonempty subset L of a metric space (M,ϱ) and a map φ:L→L. The map φ is called a contraction if there exists a constant θ∈[0,1) such that ϱ(φ(u),φ(v))≤θϱ(u,v) for all u,v∈L. In the contraction map, if θ=1, that is, ϱ(φ(u),φ(v))≤ϱ(u,v), it is described as nonexpansive. Nonexpansive maps are a natural generalization of contraction maps. If ϱ(φ(u),u∗)≤ϱ(u,u∗) for all u∈L and each u∗∈Fφ, where Fφ is the set of all fps of φ, it is called quasi-nonexpansive. All nonexpansive mappings with an fp are quasi-nonexpansive.
The class of nonexpansive maps has been extensively studied because of their diverse applications. Various authors have extensively studied different generalizations of nonexpansive maps (see, e.g., [29,30,31,32,33,34]). Below, we outline some of these maps.
Definition 1. Let φ be a self-map on a nonempty subset L of a metric space (M,ϱ). Then, the map φ is said to be
(i) (see [29]) Suzuki generalized nonexpansive if for all u,v∈L,
(ii) (see [30]) generalized α-nonexpansive if, for all u,v∈L, there exists α∈[0,1) such that
(iii) (see [31]) β-Reich-Suzuki-type nonexpansive if, for all u,v∈L, there exists β∈[0,1) such that
It is clear that every nonexpansive map is Suzuki generalized nonexpansive, and the reverse is not always valid. See, for instance, the following example.
Example 1. [29, Example 1] Let L=[0,3] and set φ:L→L by
Here, the map φ is a Suzuki generalized nonexpansive but not a nonexpansive.
When α=0 and β=0 in Definition 1(ⅱ) and (ⅲ), respectively, the generalized α-nonexpansive and β-Reich-Suzuki type nonexpansive maps are reduced to a Suzuki generalized nonexpansive map. The following example shows that the reverse implication does not generally hold.
Example 2. Let M=ℜ be a space endowed with the usual metric ϱ(u,v)=|u−v|.
(i) (see [35, Example 4.6]) Let L=[0,∞) be a subset of ℜ and φ:L→L be defined as
Then, the map φ is generalized 13-nonexpansive but not a Suzuki generalized nonexpansive.
(ii) (see [31, Example 3.4]) Let L=[−2,2] be a subset of ℜ. Define φ:L→L by
Then, the map φ is 12-Reich-Suzuki type nonexpansive but not a Suzuki generalized nonexpansive.
In 2020, Ullah et al. [36] proposed a novel category of generalized nonexpansive maps that surpasses the scope of previously established classes, such as Suzuki generalized nonexpansive, generalized α-nonexpansive, and β-Reich-Suzuki type nonexpansive maps. They also outlined the fundamental characteristics of this expanded class of maps.
Definition 2. A self map φ on a nonempty subset L of a metric space (M,ϱ) is said to be GαβN if there exist α,β∈ℜ+ satisfying α+β<1 such that 12⋅ϱ(u,φ(u))≤ϱ(u,v) implies
for all u,v∈L.
Remark 1. The validity of the following statements is readily apparent.
(i) If φ is identified as Suzuki generalized nonexpansive, it automatically qualifies as generalized (0,0)-nonexpansive.
(ii) Whenever φ is deemed generalized α-nonexpansive, it implies its classification as generalized (α,0)-nonexpansive.
(iii) Given that φ is characterized as β-Reich-Suzuki-type nonexpansive, it follows that φ meets the criteria for being generalized (0,β)-nonexpansive.
Proposition 1. [36] Let φ be a GαβN map. Then, the following statements are valid.
(i) If Fφ≠∅, then φ is quasi-nonexpansive.
(ii) The set Fφ is closed.
(iii) For all u,v∈L,
In 1990, Reich and Shafrir [37] introduced the concept of HS and investigated an iterative algorithm tailored for nonexpansive maps within these spaces. In 2004, Kohlenbach [28] expanded on this concept by providing a more comprehensive definition of HS.
Definition 3. [28] Let (M,ϱ) be a metric space. Then (M,ϱ,Q) will be the HS if the function Q:M×M×[0,1]→M satisfies the following properties
(i) ϱ(z,Q(u,v,α))≤(1−α)⋅ϱ(z,u)+α⋅ϱ(z,v),
(ii) ϱ(Q(u,v,α),Q(u,v,β))=|α−β|⋅ϱ(u,v),
(iii) Q(u,v,α)=Q(v,u,1−α),
(iv) ϱ(Q(u,z,α),Q(v,w,α))≤(1−α)⋅ϱ(u,v)+α⋅ϱ(z,w),
for all u,v,z,w∈M and α,β∈[0,1].
If M satisfies only condition (ⅰ), then the structure (M,ϱ,Q) coincides with the convex metric space described by Takahashi [38]. For the broader context of convex metric spaces, the subsequent equalities are valid: for all u,v∈M, and α∈[0,1],
It follows that
A linear instance of an HS is a Banach space, and nonlinear instances are Hadamard manifolds, the Hilbert open unit ball endowed with the hyperbolic metric, and CAT(0) spaces as defined by Gromov [39].
Here, we present an example of an HS which is not linear. Therefore, it is a non-trivial example of an HS.
Example 3. [31, Example 3.5] Let M={(u1,u2)∈ℜ2:u1,u2>0}. Define ϱ:M×M→[0,∞) by
for all u=(u1,u2) and v=(v1,v2) in M. Then, (M,ϱ) is a metric space. Now, for α∈[0,1], define a function Q:M×M×[0,1]→M by
Then, (M,ϱ,Q) is an HS but not a normed linear space.
In a given HS (M,ϱ,Q), a subset L is termed convex if, for any scalar α∈[0,1], the point Q(u,v,α) lies within L for all pairs of elements u,v∈L.
An HS (M,ϱ,Q) is uniformly convex if, for any r>0 and ϵ∈(0,2], there exists a constant δ∈(0,1] such that
for all u,v,ω∈M with ϱ(u,ω)≤r, ϱ(v,ω)≤r and ϱ(u,v)≥r⋅ϵ.
A map ξ:(0,∞)×(0,2]→(0,1] is called the modulus of uniform convexity if γ=ξ(r,ϵ) for any r>0 and ϵ∈(0,2]. Additionally, the function γ is termed monotone if it decreases with respect to r for a fixed ϵ.
Lemma 1. [40] Let (M,ϱ,Q) be a uniformly convex HS with the monotone modulus of convexity ξ. Assume that u∈M and {τn} is a sequence in [p,r] for some p,r∈(0,1). If {un} and {vn} are sequences in M such that
for some ς≥0, then
Let L be a nonempty subset of an HS (M,ϱ,Q), and {un} be a bounded sequence in M. For each u∈M, define:
(ⅰ) asymptotic radius of {un} at u by Ar(u,{un}):=limsupn→∞ ϱ(u,un);
(ⅱ) asymptotic radius of {un} concerning L by Ar(L,{un})=inf {Ar(u,{un}):u∈L};
(ⅲ) asymptotic center of {un} concerning L by Ac(L,{un})={u∈L:Ar(u,{un})=Ar(L,{un})}.
Lemma 2. [41] A bounded sequence {un} in a complete uniformly convex HS M with the monotone modulus of uniform convexity ξ has a unique asymptotic center concerning every nonempty closed convex subset L of M.
In 1976, Lim [42] introduced the notion of Δ-convergence, akin to weak convergence but applicable to metric spaces, employing the idea of the asymptotic center.
Definition 4. [42] In a metric space (M,ϱ), a sequence {un} is Δ-convergent to a point u∈M if u serves as the unique asymptotic center for every subsequence {kn} of {un}.
Definition 5. [43] Two sequences {un} and {pn} are said to be equivalent if
Timiş [44] defined the following concept of weak w2-stability using equivalent sequences.
Definition 6. [44, Definition 2.4] Let (M,ϱ) be a metric space, φ be a self-map on M, and for arbitrary u1∈M, {un}⊂M be the iterative algorithm defined by
Suppose that {un} converges strongly to u∗∈Fφ. If for any equivalent sequence {pn}⊂M of {un},
then the iterative sequence {un} is said to be weak w2-stable with respect to φ.
Remark 2. [44] Any stable iteration will be also weakly stable, but the reverse is generally not true.
2.2. Fundamental information about time scales
In this section, we provide a concise overview of fundamental concepts in time scales. Time scale theory, which has garnered considerable interest recently, was pioneered by Hilger [45] in his Ph.D. thesis to bridge continuous and discrete analysis.
In this study, we denote a time scale by the symbol Γ, which signifies any arbitrary nonempty closed subset of the real numbers ℜ. Well-known examples of time scales include ℜ, Z, N, [0,1], and the Cantor set. However, C, Q, ℜ−Q, and (0,1) do not qualify as time scales.
The forward and backward jump operators σ,ρ:Γ→Γ are respectively defined by σ(t)=inf{s∈Γ:s>t} and ρ(t)=sup{s∈Γ:s<t}, where we put inf∅=supΓ and infΓ=sup∅. A point t∈Γ is said to be right-dense if σ(t)=t, right-scattered if σ(t)>t, left-dense if ρ(t)=t, left-scattered if ρ(t)<t, isolated if ρ(t)<t<σ(t), and dense if ρ(t)=t=σ(t). The graininess function μ:Γ→[0,+∞) is defined by μ(t)=σ(t)−t. If Γ has a left-scattered maximum, then we define Γκ=Γ−maxΓ; otherwise, Γκ=Γ.
Definition 7. [46, Definition 1.10] Assume that h:Γ→ ℜ is a function and fix t∈Γκ. The Δ-derivative hΔ(t) exists if, for every ϵ>0, there exists a neighbourhood U=(t−δ,t+δ)∩Γ for some δ>0 such that
Here, we illustrate an example of time scales.
Example 4. Let Γ={n3, n∈N0=N∪{0}}. For all t∈Γ, σ(t)=t+13 and μ(t)=13. Then, all points of this time scale are right-scattered. Consider the continuous functions h(t)=t22−t6 and g(t)=t33−t26+t54 for t∈Γ. By Theorem 1.16 in [46], we get
and
Definition 8. [46, Definition 1.1] A function h:Γ→ ℜ is called rd-continuous, provided it is continuous at all right-dense points in Γ and its left-sided limits exist (finite) at all left-dense points in Γ.
If h is rd-continuous, then there exists a function H such that HΔ(t)=h(t) (see [46, Theorem 1.74]). In this case, the Cauchy Δ-integral is defined by
Remark 3. [47, Theorem 2.14] Assume c,d∈Γ and c<d. If Γ= R, then a bounded function h on [c,d) is Δ-integrable from c to d if and only if h is Riemann integrable on [c,d) in the classical sense; in this case
where the integral on the right is the usual Riemann integral.
Theorem 1. [47] Let c,d∈Γ. Suppose h and g are Δ-integrable on [c,d).
(i) h+g is Δ-integrable and d∫c[h(t)+g(t)]Δt=d∫ch(t)Δt+d∫cg(t)Δt.
(ii) If h(t)≤g(t) for all t∈[c,d), then d∫ch(t)Δt≤d∫cg(t)Δt.
(iii) Then |d∫ch(t)⋅g(t)Δt|≤d∫c|h(t)⋅g(t)|Δt≤(supt∈[c,d)|h(t)|)⋅d∫c|g(t)|Δt.
Adomian [48] established a decomposition method in 1988, recently attracting much attention in applied mathematics and infinite series solutions. It is an effective method for solving a large class of differential and integral equations. The Adomian decomposition method defines the solution u(t) by the series
or equivalently,
where the components un(t), n∈N0, are to be determined recurrently. To establish the recursive relation, we substitute (2.3) into the following linear Fredholm integral equation (FIE) of the second kind on a time scale
where the kernel function K(t,s) and the function h(t) are given, the unknown function u(t) must be determined, and λ is a real parameter. Then, we obtain
By Theorem 1(ⅰ), we set
and so on for the other components, or equivalently,
Given (2.5), the components u0(t),u1(t),u2(t),... are completely determined. The solution u(t) of (2.4) in a series form is obtained using the series (2.3). In other words, the Adomian decomposition method converts the FIE into a determination of computable components. Note that the obtained series converges to the solution if an exact solution exists for (2.4).
3.
The weak w2-stability result
Initially, we extend the AA-iterative algorithm (1.1) into HSs in the following manner:
where {σn},{ρn} and {ηn} are real sequences in [0,1].
We prove the following strong convergence theorem, which will play a significant role in establishing our weak w2-stability result.
Theorem 2. Let L be a nonempty, closed, and convex subset of an HS M, φ:L→L be a contraction map with the constant θ∈[0,1) such that Fφ≠∅, and {un} be an iterative sequence generated by (3.1). Then limn→∞un=u∗, where u∗∈Fφ.
Proof. Let u∗∈Fφ. Using (3.1), we have
Since θ∈[0,1) and 0≤σn≤1, then we know that 1−σn(1−θ)≤1. Thus, (3.2) becomes
We also obtain
Again, since θ∈[0,1) and 0≤ρn≤1, then we know that 1−ρn(1−θ)≤1. Thus, by (3.3), the inequality (3.4) becomes
From (3.1) and (3.5), we have
Since θ∈[0,1), by (3.3) and (3.6), we get
Finally, using (3.7) and the fact θ∈[0,1), we obtain
If we put ϱ(un,u∗)=An, then (3.8) takes the form
Hence, {An} is a monotone decreasing sequence of real numbers. Furthermore, it is bounded below, so we have
Therefore, we get
□
Remark 4. The strong convergence theorem of the iterative algorithm (1.1) can be obtained as a corollary from Theorem 2.
Now, we prove that the modified iteration algorithm defined by (3.1) is weak w2-stable.
Theorem 3. Suppose that all conditions of Theorem 2 hold. Then, the iterative algorithm (3.1) is weak w2-stable with respect to φ.
Proof. We assume that the sequence {pn}⊂L is equivalent to the sequence {un} defined by (3.1) and let the sequence {ϵn}⊂ℜ+ be defined by
where {σn},{ρn} and {ηn} are real sequences in [0,1]. Suppose limn→∞ϵn=0 and u∗∈Fφ. Recalling that θ∈[0,1) and 0≤σn,ηn,ρn≤1, then it follows that 1−σn(1−θ)≤1,1−ρn(1−θ)≤1 and 1−ηn(1−θ)≤1. So, we have
From (3.10), we obtain
Using (3.10) and (3.11), we have
By (3.1), (3.9), and (3.12), we get
As established in Theorem 2, limn→∞ϱ(un,u∗)=0. Therefore, we have limn→∞ϱ(un+1,u∗)=0. Because {un} and {pn} are equivalent sequences, we have limn→∞ϱ(un,pn)=0. Now, taking the limit of both sides of (3.13) and then using the assumption limn→∞ϵn=0, it yields to limn→∞ϱ(pn+1,u∗)=0. Thus, the iterative sequence {un} is weak w2-stable with respect to φ. □
Remark 5. Since the concept of weak w2-stability is more general than the concept of stability, then Theorem 3 improves the stability results proved in [22,27].
4.
Convergence outcomes
For simplicity, we use M to represent a complete uniformly convex HS with the monotone modulus of uniform convexity ξ for the rest of the paper.
We present the Δ-convergence outcome of the modified iterative algorithm (3.1).
Theorem 4. Let L be a nonempty, closed, and convex subset of M, φ:L→L be a GαβN map with Fφ≠∅, and {un} be an iterative sequence generated by (3.1) with the real sequence {σn} in [p,r] for some p,r∈(0,1). Then, {un} is Δ-convergent to an fp of φ.
Proof. The proof is split into three parts.
Part 1. For any u∗∈Fφ, we prove that
Since u∗∈Fφ, by Proposition 1(ⅰ), φ is a quasi-nonexpansive map, i.e.,
Now, using (3.1), we have
From (4.2), we obtain
By combining (4.2) and (4.3), we have
Finally, using (3.1) and (4.4), we get
Then, by (4.5), {ϱ(un,u∗)} is a non-increasing sequence of real numbers that is bounded below. Hence, it implies the desired outcome (4.1).
Part 2. Next, we prove that
From (4.1), we have limn→∞ϱ(un,u∗) exists for each fp u∗ of φ. Thus, we can put
By (4.2) and (4.7), we obtain
Since φ is quasi-nonexpansive, we get
On the other hand, by (3.1), we have
which implies that
Therefore
By (4.8) and (4.10), we obtain
From (4.11), we have
Finally, from (4.7), (4.9), and (4.12), and applying Lemma 1, we obtain the required result (4.6).
Part 3. We are ready to establish the Δ-convergence of {un}. Because we have seen that the sequence {un} is bounded, it essentially has a unique asymptotic center Ac(L,{un})={u∗} by Lemma 2. Let {kn} be any subsequence of {un} such that Ac(L,{kn})={k}. Then, by (4.6), we get
We want to show that k is an fp of φ. By Proposition 1(ⅲ), we have
This implies that φ(k)∈Ac(L,{kn}). Now, the uniqueness of the asymptotic center suggests φ(k)=k, that is, k∈Fφ. Subsequently, we assert that the fp k stands as the unique asymptotic center for any subsequence {kn} derived from {un}. Conversely, let us suppose that u∗≠k. By (4.1), we deduce that limn→∞ϱ(un,k) exists. Now, keeping the uniqueness of the asymptotic center in mind, we can see that
However, this is a contradiction. Thus, u∗∈Fφ is the unique asymptotic center for each subsequence {kn} of {un}. This proves that {un} is Δ-convergent to an fp of φ. □
Now, we present the necessary and sufficient conditions for the strong convergence of the iterative algorithm (3.1).
Theorem 5. Let L,φ, and {un} be the same as in Theorem 4. Then {un} converges strongly to an fp of φ if and only if
where ϱ(u,Fφ)=inf{ϱ(u,u∗):u∗∈Fφ}.
Proof. If {un} converges strongly to a point u∗∈Fφ, then limn→∞ϱ(un,u∗)=0. Because 0≤ϱ(un,Fφ)≤ϱ(un,u∗), we have
For the converse part, assume that liminfn→∞ ϱ(un,Fφ)=0. By Proposition 1(ⅱ), the set Fφ is closed in L. The rest of the proof can be continued similarly to the proof of Theorem 7 in [49] and hence is omitted.
□
In 1974, Senter and Dotson [50] presented a map that fulfills condition (I), as articulated below.
Definition 9. [50] A map φ:L→L satisfies condition (I) if there exists a non-decreasing function f:[0,∞)→[0,∞) with f(0)=0, f(r)>0 for all r∈(0,∞) such that ϱ(u,φ(u))≥f(ϱ(u,Fφ)) for each u∈L.
Based on condition (Ⅰ), we present the following outcome.
Theorem 6. Given the assumptions outlined in Theorem 4, if φ satisfies condition (I), then {un} converges strongly to an fp of φ.
Proof. By (4.6), we have limn→∞ϱ(un,φ(un))=0. By condition (Ⅰ), we get
that is, limn→∞f(ϱ(un,Fφ))=0. It follows from the properties of f that
Since all the requirements of Theorem 5 are now available, {un} has a strong limit in Fφ. □
The following outcome is based on the compactness of the domain.
Theorem 7. Let L be a nonempty, compact, and convex subset of M, φ:L→L be a GαβN map with Fφ≠∅, and {un} be an iterative sequence generated by (3.1) with the real sequence {σn} in [p,r] for some p,r∈(0,1). Then, the sequence {un} converges strongly to an fp of φ.
Proof. Consider an element u∗∈L. Given that L is compact, we can conclude that there exists a subsequence {kn} of {un} such that limn→∞ϱ(kn,u∗)=0. From (4.6), we have limn→∞ϱ(kn,φ(kn))=0. By Proposition 1(iii), we get
Hence, we obtain φ(u∗)=u∗, that is, u∗∈Fφ. Also, limn→∞ϱ(un,u∗) exists by (4.1). Thus, u∗ is the strong limit of {un}.
□
Remark 6. Theorems 4–7 extend the corresponding findings of Beg et al. [23] in two ways: (i) from the class of generalized α-nonexpansive maps to the class of GαβN maps, (ii) from uniformly convex Banach spaces to complete uniformly convex HSs.
From Remark 1(ⅱ) and (ⅲ), we obtain the following new result in the literature.
Corollary 1. Consider the set L and the sequence {un} as defined in Theorem 4. If φ:L→L is a generalized α-nonexpansive (or β-Reich-Suzuki-type nonexpansive) map such that Fφ≠∅, then the following holds:
(i) {un} is Δ-convergent to an fp of φ.
(ii) {un} converges strongly to an fp of φ if and only if liminf n→∞ϱ(un,Fφ)=0 or limsup n→∞ϱ(un,Fφ)=0.
(iii) If φ satisfies condition (I) or L is compact, then {un} converges strongly to an fp of φ.
Remark 7. Corollary 1 generalizes Theorems 2–5 in [23] from a uniformly convex Banach space to a complete uniformly convex HS.
5.
An illustrative example
Next, we will illustrate a map that satisfies the GαβN condition but does not meet the conditions of being Suzuki generalized nonexpansive, generalized α-nonexpansive, and β-Reich Suzuki type.
Example 5. Let M=ℜ be a space endowed with the metric ϱ(u,v)=|u−v|, and Q be a map defined by Q(u,v,α)=(1−α)⋅u+α⋅v for u,v∈M and α∈[0,1]. It has been clearly seen that (M,ϱ,Q) is an HS. Assume that L=[0,∞). Consider a self-map φ:L→L defined by
Clearly, u∗=0 is the unique fp of φ.
Now, taking α=14 and β=14, consider the following cases.
Case 1. If u,v∈[0,18], then we obtain φ(u)=φ(v)=0. Thus,
Case 2. If u,v>18, then it follows φ(u)=19u40 and φ(v)=19v40. Thus,
Case 3.If u∈[0,18] and v>18, then one has φ(u)=0 and φ(v)=19v40. Thus,
Consequently, φ is a GαβN map with α=β=14.
Let u=18 and v=23120. Then, we have that 12⋅ϱ(u,φ(u))=116<115=ϱ(u,v), while
(i) ϱ(φ(u),φ(v))=4374800>115=ϱ(u,v),
(ii) ϱ(φ(u),φ(v))=4374800>172319200=14⋅ϱ(u,φ(v))+14⋅ϱ(v,φ(u))+(1−2⋅(14))⋅ϱ(u,v),
(iii) ϱ(φ(u),φ(v))=|φ(u)−φ(v)|=4374800>172319200=14⋅ϱ(u,φ(u))+14⋅ϱ(v,φ(v))+(1−2⋅(14))⋅ϱ(u,v).
Therefore, φ does not satisfy the conditions of being Suzuki generalized nonexpansive, generalized α-nonexpansive, and β-Reich Suzuki type.
Table 1 and Figure 1 illustrate that the AA-iterative algorithm convergences faster than other algorithms for the map φ with the specified parameters σn=1013,ρn=1012 and ηn=1011 for all n∈N and the initial point u1=20.
In Table 2, we examine the influence of initial points for various iterative algorithms using σn=1013, ρn=1012 and ηn=1011 for all n∈N.
Also, we obtain the influence of the parameters for various iterative algorithms with the initial point u1=20 in Table 3.
Remark 8. In Tables 2 and 3, the items in bold show that the AA-iterative algorithm (3.1) has a better convergence rate than other iterative methods for the class of GαβN maps.
6.
Applications to some special integral equations on time scales
Many problems in mathematical physics, engineering, and mechanics can be formulated as Hammerstein integral equations; see [51,52,53]. Kalkan et al. [54] showed that the homogeneous FHIE of the second kind on a time scale has a unique solution. In this section, we use the AA-iterative algorithm to approximate the solutions of linear FIEs and nonlinear FHIEs, two particular kinds of integral equations on time scales.
We now define the nonlinear FHIE of the second kind on a time scale as follows.
Definition 10. Let Γ be a time scale with the Δ-derivative and c,d∈Γ. A nonlinear FHIE of the second kind on the time scale Γ is defined by
where h:[c,d]Γ→ℜ is a function, λ∈ℜ is a non-zero constant, and the kernel function K:[c,d]Γ×[c,d]Γ→ℜ and the nonlinear function ψ:[c,d]Γ×ℜ→ℜ are Δ-integrable.
Let M=C([c,d]Γ) be the space of all continuous functions u:[c,d]Γ→ℜ endowed with the norm ‖. Clearly, (\mathbb{M}, \|\cdot \|) is a Banach space and, therefore, a linear HS.
Next, we prove that the AA -iterative sequence convergences strongly to the solution of the FHIE (6.1).
Theorem 8. Let L be a nonempty, compact, and convex subset of \mathbb{M} , and \varphi :L{\rightarrow L} be defined by
Suppose the following conditions are satisfied:
(i) h, K , and \psi are continuous functions.
(ii) There exists a constant k\geq 0 such that
(iii) There exists a constant \phi \geq 0 such that
(iv) \left\vert \lambda \right\vert \leq \left(\phi\cdot k\right) ^{-1}.
Then, the FHIE (6.1) has a solution in L , and the iterative sequence \{u_{n}\} produced by (3.1) converges strongly to the solution.
Proof. Observe that, by the conditions (ⅱ), (ⅲ), and Theorem 1, we get
Thus, we have
Since \left\vert \lambda \right\vert \cdot k \cdot \phi \leq 1, we obtain
Hence, \varphi is a nonexpansive map and, therefore, continuous. By the Schauder fp theorem, the map \varphi defined by (6.2) has an fp in L ; that is, the FHIE (6.1) has a solution. Since \varphi is a nonexpansive map, it is a Suzuki generalized nonexpansive, and so is a generalized (0, 0) -nonexpansive map. Consequently, all assumptions of Theorem 7 have been satisfied, and the iterative sequence \{u_{n}\} produced by (3.1) converges strongly to the solution of the FHIE (6.1).
□
The following example illustrates the result of Theorem 8.
Example 6. Consider the time scale \Gamma = \Re and the following nonlinear FHIE
where h(t) = \sqrt{t}-\frac{28}{9} is chosen so that the exact solution is u(t) = \sqrt{t} . Also, here K(t, s) = 1 , \lambda = \frac{1}{12} and \psi(t, u(t)) = \sqrt{[u(t)]^2+4} . Using the mean value theorem, we get
Hence, the inequality (6.3) holds with k = 1 . By Remark 3, we have
that is, \phi = 12 > 0. Also, we obtain \lambda = \frac{1}{12} = \frac{1}{\phi\cdot k}. As an outcome, all assumptions of Theorem 8 are met. Then, the iterative sequence \{u_{n}\} produced by (3.1) converges strongly to the fp of the map given by
and hence to the solution of the FHIE (6.4).
If we take u(t) instead of \psi(t, u(t)) in Theorem 8, then we can similarly obtain the following result, which is new in the literature. Hence, we omit its proof.
Theorem 9. Let L be a nonempty, compact, and convex subset of \mathbb{M} , and \varphi :L{\rightarrow L} be defined by
Suppose the following conditions are satisfied:
(i) h and K are continuous functions.
(ii) There exists a constant \phi \geq 0 such that
(iii) \left\vert \lambda \right\vert \leq \left(\phi\right) ^{-1}.
Then, the linear FIE (2.4) has a solution in L , and the iterative sequence \{u_{n}\} produced by (3.1) converges strongly to the solution.
The following example illustrates the result of Theorem 9.
Example 7. Consider the time scale in Example 4 and the following linear FIE
Here, h(t) = t+1, K(t, s) = t\cdot s and \lambda = 1. From (2.1), we get for t\in \lbrack 0, 1]_{\Gamma}
that is, here \phi = \frac{1}{3} > 0. Also, we have \lambda = 1 < 3 = \frac{1}{\phi}. As an outcome, all assumptions of Theorem 9 are met. Then, the iterative sequence \{u_{n}\} produced by (3.1) converges strongly to the fp of the map given by
and hence to the solution of the FIE (6.6).
The solution to the FIE (6.6) can be found using the Adomian decomposition method (2.3). If we apply this method using (2.1) and (2.2), we get
Then, the solution in a series form is given by
The solution of the FIE (6.6) is u(t) = \frac{18}{11} \cdot t +1 , where t\in \lbrack 0, 1]_{\Gamma}.
7.
Conclusions
We present several novel contributions:
(ⅰ) We adapted the AA -iterative algorithm, as shown in (1.1), to the HS and established the stability outcome for contraction maps and convergence outcomes for G\alpha \beta N maps in HSs using this modified iterative algorithm.
(ⅱ) We presented a numerical illustration of G\alpha \beta N maps and employed Python software to generate tabular and graphical representations for the given example.
(ⅲ) To demonstrate the practical applicability of our results, we applied our findings to certain solutions of linear FIEs and nonlinear FHIEs on time scales.
(ⅳ) Our results hold in both Banach and CAT(0) spaces, generalizing the stability results of [22,27] and the convergence results of [23].
In forthcoming research, numerical examples of G\alpha \beta N maps in HSs that do not comply with the property of Banach space and applications of our theoretical results to solve the linear and nonlinear Volterra integral equations on time scales may be offered. Furthermore, it is anticipated that convergence results for enriched G\alpha \beta N maps in HSs will be investigated.
Author contributions
Aynur Şahin: conceptualization, methodology, software, supervision, writing-review and editing; Zeynep Kalkan: methodology, writing-original draft, writing-review and editing. All authors have read and agreed to the published version of the manuscript.
Use of AI tools declaration
The authors declare they have not used Artificial Intelligence (AI) tools to create this article.
Acknowledgments
We would like to express our sincere gratitude to the anonymous referees for their helpful comments, which contributed to improving the quality of the paper.
Conflict of interest
The authors declare that they have no conflicts of interest.