Next Article in Journal
Toeplitz Operators with Radial Symbols on Weighted Pluriharmonic Bergman Spaces over Reinhardt Domains
Previous Article in Journal
Abundant Exact Traveling-Wave Solutions for Stochastic Graphene Sheets Model
Previous Article in Special Issue
A B-Polynomial Approach to Approximate Solutions of PDEs with Multiple Initial Conditions
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Convergence and ω2-Stability Analysis of a Hybrid-Type Iterative Scheme with Application to Functional Delay Differential Equations

1
Department of Mathematics and Statistics, North Carolina A&T State University, Greensboro, NC 27411, USA
2
Department of Sciences and Humanities, National University of Computer and Emerging Sciences, Lahore Campus, Lahore 54000, Pakistan
3
Department of Mechanical Engineering Sciences, University of Johannesburg, Johannesburg 2006, South Africa
4
Department of Medical Research, China Medical University, Taichung 406040, Taiwan
*
Author to whom correspondence should be addressed.
Axioms 2025, 14(6), 475; https://doi.org/10.3390/axioms14060475
Submission received: 9 May 2025 / Revised: 30 May 2025 / Accepted: 4 June 2025 / Published: 19 June 2025
(This article belongs to the Special Issue Differential Equations and Related Topics, 2nd Edition)

Abstract

:
The purpose of this article is to analyze a hybrid-type iterative algorithm for a class of generalized non-expansive mappings satisfying the Garcia-Falset property in uniformly convex Banach spaces. Some existing results for such mappings have been obtained using the given algorithm. The ω 2 -stability of the iterative process is also studied. Using some examples, numerical experiments are conducted by comparing this iterative algorithm with different well-known iterative schemes. It is concluded that this iterative algorithm converges faster to the fixed point and is preferable over the previously known iterative schemes using the Garcia-Falset property. A weak solution of the Volterra–Stieltjes-type delay functional differential equation is presented to demonstrate the significance of the proposed results.

1. Introduction

Fixed point theory deals with the study of conditions that guarantee the existence and approximation of the solutions of linear and nonlinear operator equations. The development of fixed point iterative algorithms to approximate the solution of certain operator equations is another domain of fixed point theory. These iterative algorithms are classified based on their stability, data dependency, rate of convergence, time and space complexities, and well-posedness.
Banach contraction principle (BCP), a well-known result in metric fixed point theory, applies to a large range of problems dealing with the existence and approximation of the solution of nonlinear operator equations such as differential and integral equations. BCP has some limitations as well. A natural extension of Banach contraction mapping is a non-expansive mapping whose fixed points cannot be approximated through the Picard iteration algorithm employed in BCP, refer to [1]. Indeed, it does not apply to several important classes of mappings that arise in modeling different convex optimization problems. Therefore, this principle has been generalized and extended by weakening the contraction condition. Kirk [2], Browder [3], and Gohde [4] established the existence of fixed points of non-expansive mappings defined on a specific subset of a Banach space satisfying certain geometric conditions. It was proved in 1955 that Picard’s iteration for non-expansive mappings may not converge to a fixed point [5]. For the approximation of fixed points in these mappings, numerous iterative processes have been introduced, for instance, by Mann [6], Ishikawa [7], Abbas and Nazir [8], Thakur et al. [9], and Picard–Mann [10].
Non-expansive mappings were extended by Suzuki [11] and Garcia-Falset et al. [12], which gave rise to two classes of generalized non-expansive mappings: the Suzuki mapping, which is the class of mappings that satisfy property C, and the Garcia-Falset mappings, which satisfy property E, a property that is weaker than the property C. The concept of Suzuki mapping is weaker than non-expansive mappings but stronger than quasi-non-expansive mappings. Similarly, the notion of Garcia-Falset mapping is weaker than Suzuki mappings [11] but not from quasi-non-expansive mappings, as shown by Proposition 1 and Example 1 below. Several authors presented examples on R , R 2 , and on some infinite-dimensional spaces to show the inclusivity of Suzuki mappings [9,11,13]. Using three-step iterative methods, results for the existence of fixed points and convergence behavior were studied for the above-mentioned generalized non-expansive mappings [14,15,16].
Over the last few years, different iterative algorithms have been presented to obtain a faster rate of convergence. Moreover, the stability results and data dependency of these algorithms have also been studied (see, for example, [17,18,19,20]). Hacıoğlu [21] suggested a new iterative algorithm and examined the data dependency, convergence, and stability for the class of almost contraction mappings.
An iterative algorithm is preferred over another one if it converges to a fixed point with minimal iterations and computational time. To the best of our knowledge, the convergence analysis of fixed point iterative algorithms involving mapping satisfying the Garcia-Falset condition is not widely available in the literature.
In 2019, Houmani and Turcanu [14] introduced a new class of mappings satisfying the property E and employed Thakur’s three-step iteration algorithm to approximate the fixed point of such mappings. In this paper, we employ an iterative algorithm presented in [21] and extend the results in [14] to Garcia-Falset mapping. We also present existence and ω 2 -stability results. We provide examples satisfying the Garcia-Falset property and conduct numerical experiments to compare the proposed iterative algorithm with other iterative algorithms. Finally, a weak solution of a Volterra–Stieltjes-type delay functional differential equation is presented to demonstrate the significance of our results.
The hybrid-type iterative algorithm [21] is as follows:
Let S be a self-map on a convex, closed, and nonempty subset A of a Banach space B. Define the sequence { a n } by:
a 0 A b n = S ( ( 1 s n ˜ ) S a n + s n ˜ S 2 a n ) , n N , a n + 1 = S b n .
Here, { s n ˜ } n = 0 is a sequence of real numbers in [ 0 , 1 ] .
Let us consider the following two cases in (1).
  • Case 1. When s n ˜ = 0 , then we have
    a 0 A a n + 1 = S b n , b n = S ( S a n ) , n N ,
    and
  • Case 2. When s n ˜ = 1 , then we have
    a 0 A a n + 1 = S b n , b n = S ( S 2 a n ) , n N .
Hence, we may see that (1) does not reduce to Picard, Mann, Ishikawa, Picard–Mann, or Thakur for any s n ˜ .

2. Preliminaries

Definition 1.
Let B be a Banach space, A B . A mapping S : A A is called non-expansive if, for all a , b A , the following inequality holds:
S a S b a b .
Definition 2.
A mapping S : A A is said to be quasi-non-expansive if for all a A and p F S , we have
S a p a p ,
where, the set { p A : S p = p } of all fixed points of S is denoted by F S .
Definition 3.
A mapping S : A A is said to be a Suzuki mapping or Suzuki generalized non-expansive mapping if for all a , b A ,
1 2 a S a a b implies that S a S b a b .
Definition 4.
Let B be a Banach space, A B , and ν 1 . A mapping S : A B is said to satisfy the ( E ν ) -property or called Garcia-Falset mapping if for all a , b A , the following holds:
a S b ν a S a + a b .
We say condition ( E ) on A is satisfied by S , whenever S fulfills condition ( E ν ) for some ν 1 .
Definition 5.
Two sequences { a n } n = 0 and { b n } n = 0 in A is said to be equivalent if
lim n a n b n = 0 .
The notion of stability or weak stability often lacks precision when the sequence { b n } is chosen arbitrarily. To address this ambiguity, it is more natural to consider { b n } as an approximate or equivalent sequence to { a n } , respectively. In this context, we introduce the concept of weak ω 2 -stability, as proposed in [22], where the approximate sequence is replaced by an equivalent one, providing a more rigorous formulation of weak ω 2 -stability.
Definition 6
([22]). Let ( A , d ) be a metric space and S : A A and p F ( S ) . Consider an iterative sequence { a n } n = 0 defined by
a 0 A a n + 1 = f ( S , a n ) , n N ,
where f : A A is any function. Suppose that
lim n a n p = 0 ,
and for any equivalent sequence { b n } n = 0 A of { a n } n = 0 , if
lim n b n + 1 f ( S , b n ) = 0 implies lim n b n = p ,
then we say that { a n } n = 0 is weak ω 2 -stable in S.
Definition 7
([1]). For two sequences { a n } and { b n } with lim n a n = a and lim n b n = b , if
lim n a n a b n b = 0 ,
then, we say that { a n } converges faster than { b n } .
Definition 8.
Suppose that two iterative sequences { a n } and { b n } are converging to p F ( S ) and we have the following error estimates,
a n p c n , and b n p d n , for all n N .
If the sequence { c n } of positive real numbers converges to 0 faster than the sequence { d n } of positive real numbers does, then we say that { a n } p faster than { b n } p .
Definition 9.
If, for every sequence, { a n } converges weakly to a B , and for each d B with a d , we have
lim inf n a n a < lim inf n a n d .
Then the Banach space B is said to satisfy Opial’s condition.
Sentor and Dotson [23] introduced Condition ( I ) on given self-mappings as follows:
Definition 10.
A mapping S : A A is said to satisfy the Condition ( I ) if there is a non-decreasing function h : [ 0 , ) [ 0 , ) such that
d ( a , S a ) h ( d ( a , F ( S ) ) ) ,
holds for all a in A , where
i. 
h ( 0 ) = 0
ii. 
h ( t ) > 0 , for all t > 0
iii. 
d ( a , F ( S ) ) = inf { d ( a , p ) : p F ( S ) } .
Let us recall the definitions given in [24].
Definition 11.
Suppose that { a n } is a bounded sequence in B . Define the R ( . , { a n } ) : B R + by:
R ( d , { a n } ) = lim sup n a n d .
A positive real number R ( d , { a n } ) is known as an asymptotic radius of the sequence { a n } at d .
If A B , then asymptotic radius of { a n } relative to A is defined by
R ( A , { a n } ) = inf d A R ( d , { a n } ) .
The set is defined as:
C ( A , { a n } ) = { d A : R ( A , { a n } ) = R ( d , { a n } ) } ,
is called asymptotic center of { a n } relative to A .
The asymptotic center is a singleton whenever B is a uniformly convex Banach space space [25].
Definition 12.
Let A be a nonempty subset of a Banach space B. A mapping S : A B is said to be demiclosed at d B if, for every sequence { a n } in A converging weakly to a in A and S a n converging strongly to d gives that S a = d .
It is known that if A is a nonempty closed, bounded, and convex subset of a uniformly convex Banach space B and S : A B is non-expansive, then I S is demiclosed.
Proposition 1
([12]). Suppose a mapping S : A B satisfies Garcia-Falset property on A , then S is quasi-non-expansive provided that F ( S ) is nonempty.
Proof. 
Suppose p F ( S ) , i.e., S p = p , and b A be arbitrarily chosen. Using the Garcia-Falset condition with a = p , we have:
p S b ν p S p + p b .
Since S p = p , it follows that p S p = 0 . Hence,
p S b p b ,
which shows that S is quasi-non-expansive. □
However, the converse does not hold. This is illustrated by the following example.
Example 1.
Define S : [ 0 , 2 ] [ 0 , 2 ] as
S ( x ) = 0 , if x [ 0 , 1 ) , x , if x [ 1 , 2 ] .
All fixed points are clearly in { 0 } [ 1 , 2 ] and S is clearly quasi-non-expansive mapping.
Now, take a = 1 , b = 0.9 .
Then,
a S b = 1 S ( 0.9 ) = 1 0 = 1 ,
but,
1 S ( 1 ) + 1 0.9 = 0 + 0.1 = 0.1 .
But, 1 0.1 ; hence, S is a quasi-non-expansive mapping, but does not satisfy ( E ν ) .
Lemma 1
([26]). Suppose B is a uniformly convex Banach space and 0 < i s n j < 1 for all n Z + . Let { p n } and { q n } be two sequences satisfying lim sup n p n c , lim sup n q n c and lim sup n ( 1 s n ) p n + s n q n = c for any c 0 , then lim n p n q n = 0 .
Lemma 2
([11]). Suppose that A is a weakly compact subset of a uniformly convex Banach space. If S satisfies the Condition C, then S has a fixed point.

3. Convergence Theorems

We now present the convergence of an iterative algorithm of the mapping satisfying the Garcia-Falset property. Throughout the section, B is a uniformly convex Banach space and A is a closed and convex subset of B .
Lemma 3.
Suppose that S : A A satisfies the Garcia-Falset property and F ( S ) . Let a 0 be an arbitrary fixed element in A. For an iterative algorithm { a n } given in (1). Then, lim n a n p exists, where p F ( S ) .
Proof. 
As S satisfies Garcia-Falset property, and F ( S ) from Proposition 1, S is quasi-non-expansive. Note that,
b n p = S ( ( 1 s n ˜ ) S a n + s n ˜ S 2 a n ) p ( 1 s n ˜ ) S a n p + s n ˜ S 2 a n p a n p .
Thus, we have
b n p a n p .
Also,
a n + 1 p = S b n p S ( ( 1 s n ˜ ) S a n + s n ˜ S 2 a n ) p .
It follows from (6) that
a n + 1 p a n p .
By (8), { a n p } is decreasing and bounded below, for all p F ( S ) . Hence, lim n a n p exists. □
Lemma 4.
Suppose that S : A A satisfies the Garcia-Falset property. Let a 0 be an arbitrary fixed element in A. For an iterative algorithm { a n } given in (1). Then, F ( S ) if and only if { a n } is bounded and lim n S a n a n = 0 .
Proof. 
Suppose that { a n } is bounded, lim n S a n a n = 0 and p C ( A , { a n } ) . As S is Garcia-Falset mapping, we obtain that
R ( S p , { a n } ) = lim sup n a n S p lim sup n ν a n S a n + a n p = lim sup n a n p = R ( p , { a n } ) ,
which implies that S p C ( A , { a n } ) .
Since B is a uniformly convex Banach space, by the uniqueness of asymptotic center, C ( A , { a n } ) is a singleton. Thus, S p = p . Conversely, suppose that p F ( S ) . From Lemma 3, lim n a n p exists and { a n } is bounded. Suppose that
lim n a n p = l .
From (7), we have
lim sup n b n p lim sup n a n p = l .
Since S is a quasi-non-expansive mapping, we have
lim n S a n p lim n a n p = l .
Now,
a n + 1 p b n p .
From (9) and (10), we obtain that
l = lim sup n a n + 1 p lim sup n b n p l
Thus,
lim sup n b n p = l .
We can rewrite that
lim sup n b n p = lim sup n S ( ( 1 s n ˜ ) S a n + s n ˜ S 2 a n ) p lim n ( 1 s n ˜ ) ( a n p ) + s n ˜ ( S a n p ) = l .
From (10), (11), (13) and Lemma 1, we have
lim n a n S a n = 0 .
Theorem 1.
Suppose S : A A satisfies the Garcia-Falset property and F ( S ) . Let a 0 be an arbitrary fixed element in A. For an iterative algorithm { a n } , given in (1), { a n } converges weakly to p F ( S ) when B fulfills the Opial’s condition.
Proof. 
From the Lemma 3, lim n a n p exists. Let { a n k } and { a n l } be two subsequences of { a n } with weak limits j 1 and j 2 , respectively. By Lemma 4, we have lim n a n S a n = 0 . Using demiclosedness of I S at zero, we have ( I S ) j 1 = 0 , that is, S j 1 = j 1 . Similarly, S j 2 = j 2 . We now show that j 1 = j 2 . If not, then by using Opial’s condition, we have
lim n a n j 1 = lim n { a n k } j 1 < lim n k a n k j 2 = lim n a n j 2 = lim n l a n l j 2 < lim n l a n l j 1 = lim n a n j 1 ,
which is a contradiction. Hence, { a n } converges weakly to p F ( S ) .
Theorem 2.
Suppose that S : A A satisfies the Garcia-Falset property, where A is nonempty closed and convex subset of B. Let a 0 be an arbitrary fixed element in A. For an iterative algorithm { a n } given in (1), then { a n } converges to p if, and only if, lim inf n d ( a n , F ( S ) ) = 0 or lim sup n d ( a n , F ( S ) ) = 0 .
Proof. 
Let lim n a n = p where p F ( S ) , we have lim inf n d ( a n , F ( S ) ) = 0 or lim sup n d ( a n , F ( S ) ) = 0 .
Conversely, suppose that lim inf n d ( a n , F ( S ) ) = 0 . From Lemma 3, lim n a n p exists for all p F ( S ) . We now show that { a n } is a Cauchy sequence. As lim inf n d ( a n , F ( S ) ) = 0 , for ϵ > 0 , there exists n 0 Z + , such that
inf { d ( a k , F ( S ) ) : k n } < ϵ 2 , for every n n 0 , that is , inf p F ( S ) { d ( a k , p ) : k n } < ϵ 2 , for every n n 0 .
Particularly, inf { a n p : p F } < ϵ 2 . This implies that there is p F ( S ) , such that
a n 0 p ϵ 2 .
For i , j n 0 , we have
a i + j a n a i + j p + a n p a n 0 p + a n 0 p = 2 a n 0 p ϵ .
Thus, { a n } is Cauchy. As A is closed, there exists q A , such that lim n a n = q . Now, lim inf n d ( a n , F ( S ) ) = 0 implies that q F ( S ) .
Theorem 3.
Suppose that S : A A satisfies the Garcia-Falset property, where A is a nonempty compact and convex subset of B. Let a 0 be an arbitrary fixed element in A. For the iterative algorithm { a n } given in (1), if F ( S ) , then { a n } converges strongly to p F ( S ) .
Proof. 
Suppose F ( S ) then from Lemma 4, we get lim n a n S a n = 0 . By compactness of A , there exists a subsequence { a n k } of { a n } , such that a n k p A . By Garcia-Falset property, we have
a n k S p ν a n k S a n k + a n k p .
On taking limit as k , we have a n k S p . Hence, S p = p . i.e., p F ( S ) .
By Lemma 3, lim n a n p exists, and hence { a n } p .  □
The following result establishes strong convergence using Condition (I).
Theorem 4.
Suppose that S : A A satisfies the Garcia-Falset property and the Condition (I), where A is a nonempty closed and convex subset of B. Let a 0 be an arbitrary fixed element in A for an iterative algorithm { a n } given in (1). Then, { a n } converges strongly to p F ( S ) .
Proof. 
From Lemma 4, we have
lim n a n S a n = 0 .
Using the Condition ( I ) , we have
lim n a n S a n lim n h ( d ( a n , F ( S ) ) ) 0 ,
which implies that
lim n h ( d ( a n , F ( S ) ) ) = 0 .
Hence, we get
lim n d ( a n , F ( S ) ) = 0 .
Finally, all conditions of the Theorem 2 are satisfied, so { a n } converges strongly to a fixed point of S .
We will demonstrate the strong convergence and ω 2 -stability of the iterative algorithm (1) under the following contractive condition: there is a constant ζ [ 0 , 1 ) and a continuous, monotonic increasing function φ : [ 0 , ) [ 0 , ) with φ ( 0 ) = 0 , such that for any a , b A , the following inequality holds:
S a S b φ ( a S a ) + ζ a b .
Theorem 5.
Suppose that S : A A satisfies the contractive condition (14). Let a 0 be an arbitrary fixed element in A. Then, an iterative algorithm { a n } given in (1) converges strongly to p F ( S ) with the following estimate:
a n + 1 p ζ 3 ( n + 1 ) a 0 p , for all n N .
Proof. 
Using Equation (14) and algorithm (1), we have
p a n + 1 = p S b n = S p S b n φ ( p S p ) + ζ p b n = ζ | | p S ( ( 1 s n ˜ ) S a n + s n ˜ S 2 a n ) | | = ζ S p S ( ( 1 s n ˜ ) S a n + s n ˜ S 2 a n ) ) ζ 2 p ( ( 1 s n ˜ ) S a n + s n ˜ S 2 a n ) ζ 2 ( ( 1 s n ˜ ) S a n p + s n ˜ S 2 a n p ) ζ 2 [ ζ ( 1 s n ˜ ) + ζ 2 s n ˜ ) ] a n p = ζ 3 [ 1 s n ˜ + ζ s n ˜ ] a n p
Since 1 s n ˜ + ζ s n ˜ < 1 , this implies
p a n + 1 ζ 3 a n p .
Inductively, we have
a n + 1 p ζ 3 ( n + 1 ) a 0 p , for all n N .
On taking the limit as n , we have
lim n a n + 1 p = 0 ,
that is, { a n } n = 0 converges strongly to p .

4. Weak ω 2 -Stability

In this section, we prove weak ω 2 -stability of iterative algorithm given by (1) for contractive mappings.
Theorem 6.
Suppose that S : A A is satisfying contractive condition (14) and p F ( S ) . Let { v n } n = 0 A be an equivalent sequence of { a n } n = 0 , given by (1). Consider a sequence { η n } n = 0 R + defined by:
η n = v n + 1 S w n , w n = S ( ( 1 s n ˜ ) S v n + s n ˜ S 2 v n ) , n N ,
where s n ˜ is sequence of real numbers in [ 0 , 1 ] . Then, { a n } n = 0 is weak ω 2 -stable with respect to S .
Proof. 
From Theorem 5, a n p as n . Assume that lim n η n = 0 . We have to show that v n p when n . Using (1), (14) and (17), we have
v n + 1 p v n + 1 a n + 1 + a n + 1 p v n + 1 S w n + S w n a n + 1 + a n + 1 p .
a n + 1 S w n a n + 1 p + p S w n φ ( p S p ) + ζ p w n + a n + 1 p = ζ p w n + a n + 1 p = ζ p S ( 1 s n ˜ ) S v n + s n ˜ S 2 v n + a n + 1 p ζ 2 ( 1 s n ˜ ) S v n + s n ˜ S 2 v n p + a n + 1 p ζ 2 ( ( 1 s n ˜ ) S v n p + s n ˜ S 2 v n p ) + a n + 1 p .
Using (16), we obtain
a n + 1 S w n ζ 3 v n p + a n + 1 p .
Using (18) and (20), we obtain
v n + 1 p v n + 1 S w n + S w n a n + 1 + a n + 1 p for all n N . η n + ζ 3 v n p + 2 a n + 1 p η n + ζ 3 ( v n a n + a n p ) + 2 a n + 1 p .
Since v n and a n are equivalent sequences, so we have lim n v n a n = 0 and also lim n η n = 0 . Using Theorem 5, we obtain lim n a n p = lim n a n + 1 p = 0 , inequality (21) gives
| v n + 1 p = 0 .

5. Numerical Experiments and Graphical Analysis

This section is dedicated to numerical and graphical convergence analysis of the iterative algorithm (1). In the Examples 2–4, we compare some famous iterative algorithms with the algorithms (1) and (2) (Case 1). The criterion of comparison chosen here is the error a n p , where a n is an iterative sequence and p is a fixed point. Different initial points are selected from the domain to compare the computational efficiency of the iterative processes.
Example 2.
Let A = [ 0 , 4 ] be endowed with the usual norm. Define the mapping S : A A by
S ( a ) = a + c o s ( a ) + s i n ( a ) 2 .
Take s n ˜ = n n + 1 for all n N and initial guess a 0 = 2 . Numerical computations with MATLAB version 9.10.0.1602886 (R2021a) software suggest that p 1.25872 is the unique fixed point of the map S, satisfying the fixed point equation a = cos ( a ) + sin ( a ) approximately. Moreover, Figure 1 visually confirms that inequality (4) holds, indicating that the mapping S satisfies the E ν -property. Since S satisfies the Garcia-Falset property and F ( S ) , it follows from Theorem 3 that the iterative algorithm (1) converges to the fixed point p 1.25872 . Observe that the algorithm (1) converges faster than the iterative algorithms given by Picard–Mann, Mann, Ishikawa, and Thakur, as shown in Table 1 and Figure 2.
In Table 2, we compare the convergence of various iterative algorithms for different choices of initial points. The parameter s n was chosen to be 2 n 5 n + 2 .
Example 3.
Let A = [ 0 , 4 ] be endowed with the usual norm. Define a mapping S : A A by S ( a ) = 1 3 + 1 6 c o s ( 2 a ) . Numerical simulations show that p 0.4396 is a unique fixed point of S. Also, S satisfies E ν -property given by (4). Choose s n ˜ = 1 n 2 + 1 , for all n N . We pick a 0 = 2 as initial guess. Now, all the conditions of Theorem 3 are fulfilled and iterative algorithm (1) converges to p = 0.4396 . Clearly, it converges faster than the iterative algorithms given by Picard–Mann, Mann, Ishikawa, and Thakur, as shown in Table 3 and Figure 3.
For parameter s n = 2 n 5 n + 2 ,  Table 4 exhibits the quicker convergence of the iterative algorithm (1) for different choices of initial points.
Example 4.
Suppose A = [ 0 , ) is equipped with the usual norm. Define the mapping S : [ 0 , ) [ 0 , ) by:
S ( a ) = a 2 , a 2 0 , a [ 0 , 2 ) .
Note that S does not satisfy the Condition ( C ) . However, S is a Garcia-Falset mapping.
Indeed, for a = 3 2 and b = 5 2 , we have
1 2 | a S ( a ) | = 1 2 | 3 2 0 | = 3 4 .
Also
| a b | = | 3 2 5 2 | = 1 .
Hence,
1 2 | a S ( a ) | < | a b | ,
but | S ( a ) S b | > | a b | . This implies that S does not satisfy the Condition ( C ) .
Suppose that ν = 1 . Consider the following cases.
  • Case I.
    a > 2 and b [ 0 , 2 ) give that
    | a S b | ν | a S a | + | a b | | a 0 | | a b | + | a a 2 | | a | | a b | + | a 2 | b a 2 ,
    which is true.
  • Case II.
    When a , b > 2 , it gives
    | a S b | ν | a S a | + | a b | | a b 2 | | a b | + | a a 2 | | 2 a b 2 | | a b | + | a 2 | 2 a b 2 | a b | + a 2 ,
    If a < b , we obtain a b 2 ( b a ) , which leads to a b , a statement that is true. On the other hand, if a b , we derive a b 2 ( a b ) , which simplifies to 0 a b , and this is also true.
  • Case III.
    a [ 0 , 2 ) and b > 2 give
    | a S b | ν | a S a | + | a b | | a b 2 | | a b | + | a 0 | | 2 a b 2 | | a b | + | a | .
We can easily check that it is true. Thus, S is the Garcia-Falset mapping.
We now present a numerical experiment for the comparison of the convergence of algorithm (1). Taking an initial value a 0 = 8 A and s n ˜ = n n 2 + 4 n + 1 , it is noted that the iterative algorithm (1) has the quickest convergence rate, as compared to other algorithms, as shown in Table 5 and Figure 4 with fixed point 0.
Now, we compare the convergence of the iterative algorithm (1) with other iterative algorithms by choosing different initial points. Take parameter s n = 2 n 5 n + 2 . Indeed, the algorithm (1) proves to be more suitable for Garcia-Falset operators as it has a quicker rate of convergence. The numerical results are demonstrated in Table 6.
In the following example, it must be noted that the mapping does not have a unique fixed point, and different iterative processes may converge to any of the fixed points for a certain initial value. Hence, to test the convergence, we employ an appropriate stopping criterion: a n a n 1 + b n b n 1 0.005 for n N , ( a n , b n ) R 2 .
Example 5.
Define a mapping S : [ 0 , 2 ] 2 [ 0 , 2 ] 2 by,
S a = ( 1 7 ( a 1 + 1 2 ) 2 , 2 2 5 a 2 ) , a 1 [ 0 , 1 5 ) ( a 1 5 + 2 5 , 2 2 5 a 2 ) , a 1 [ 1 5 , 2 ] .
where a = ( a 1 , a 2 ) . The distance between the points is defined using the Euclidean norm. First, we show that S is not non-expansive. Consider the points a = ( 0.1 , 0.5 ) and b = ( 0.3 , 0.5 ) . Then,
S ( a ) = 1 7 ( 0.6 ) 2 , 1.8 ( 0.0514 , 1.8 ) , S ( b ) = 0.46 , 1.8 .
We compute the Euclidean distance:
S ( a ) S ( b ) = ( 0.0514 0.46 ) 2 + ( 1.8 1.8 ) 2 = 0.4086 ,
and
a b = ( 0.1 0.3 ) 2 + ( 0.5 0.5 ) 2 = 0.2 .
Thus,
S ( a ) S ( b ) 0.4086 , a b = 0.2 ,
which implies S ( a ) S ( b ) > a b . Hence, S is not non-expansive.
To show that S satisfies the Garcia-Falset property, we consider the following cases:
  • Case I.
    If a 1 , b 1 [ 0 , 1 5 ) , then for ν = 1 , following inequality, it must hold for S to satisfy the condition ( E 1 )
    | a 1 1 7 b 1 1 7 b 1 2 1 28 | + | a 2 2 5 b 2 2 | | a 1 1 7 ( a 1 + 1 2 ) | 2 + | a 2 2 + 2 5 a 2 | + | a 1 b 1 | + | a 2 b 2 | .
    Divide the above inequality into two parts:
    | a 1 1 7 b 1 1 7 b 1 2 1 28 | | a 1 1 7 ( a 1 + 1 2 ) | 2 + | a 1 b 1 | .
    | a 2 + 2 5 b 2 2 | | a 2 2 + 2 5 a 2 | + | a 2 b 2 | .
    If we consider (22), then for a 1 , b 1 [ 0 , 1 5 ) , we have
    | a 1 1 7 b 1 1 7 b 1 2 1 28 | 23 140
    and
    | a 1 1 7 ( a 1 + 1 2 ) | 2 + | a 1 b 1 | 395 196 23 140 .
    If we take (23), then for the given range of a 2 and b 2 , we have
    | a 2 2 5 b 2 2 | 2
    and
    | a 2 2 + 2 5 a 2 | + | a 2 b 2 | 4 2 .
    From the above inequalities, it is clear that S has the Garcia-Falset property.
  • Case II.
    Let a 1 , b 1 [ 1 5 , 2 ] , then for ν = 1 , following inequality, it should hold for S to satisfy the condition ( E 1 ) ;
    | a 1 1 5 b 1 2 5 | + | a 2 + 2 5 b 2 2 | | a 1 1 5 ( a 1 + 2 ) | + | a 2 2 + 2 5 a 2 | + | a 1 b 1 | + | a 2 b 2 | .
Again, divide the above inequality into two parts:
| a 1 1 5 b 1 2 5 | | a 1 1 5 ( a 1 + 2 ) | + | a 1 b 1 | .
| a 2 + 2 5 b 2 2 | | a 2 2 + 2 5 a 2 | + | a 2 b 2 | .
For the given range of a and b, (24) becomes
| a 1 1 5 b 1 2 5 | 1.56 . | a 1 1 5 ( a 1 + 2 ) | + | a 1 b 1 | 3 .
That is, 1.56 < 3 . So the inequality is satisfied. The inequality (25) is proven in Case I. Hence, S satisfies the Garcia-Falset property for Case II.
To analyze the rate of convergence of different iterative algorithms and iterative algorithm (1), we have chosen the sequence s n ˜ = n n + 1 with initial guess as ( a 0 , b 0 ) = ( 0.25 , 0.5 ) . Finally, through numerical approximation using MATLAB version 9.10.0.1602886 (R2021a) software, it is determined that the iterative algorithm (1) converges to the fixed point ( 1 2 , 10 7 ) faster than Picard–Mann, Mann, Ishikawa, and Thakur’s iterative algorithms, as shown in Figure 5.
Again, for a different initial guess ( 1 , 1.5 ) , we conclude that the iterative algorithm (1) converges to fixed point ( 0.04 , 10 7 ) faster than Picard–Mann, Mann, Ishikawa, and Thakur iterative algorithms, as shown in Figure 6.
Now, we compare the iterative algorithms using different initial points. It can be observed from Table 7 that algorithm (1) and its Case (2) converges in a lesser number of iterations.

6. Application to Volterra–Stieltjes-Type Delay Functional Differential Equation

Recently, many authors have studied the existence and uniqueness of the solution of Volterra–Stieltjes-type delay functional differential equations, see [27,28] and references therein. As an application of our results, we propose the approximation of the weak solution of Volterra–Stieltjes-type delay functional differential equation utilizing the iterative method (1). Suppose B is a reflexive Banach space equipped with the norm . B , the dual space of B is denoted as B * , and the class of continuous functions is denoted as C [ L , B ] , L = [ 0 , I ] with the norm as follows:
a C = sup i L a ( i ) B , a C [ L , B ] .
Let us consider a non-linear second-order Volterra–Stieltjes-type initial value delay functional differential problem as follows:
d d i a ( i ) = g 1 i , 0 h ( i ) g 2 ( i , s , a ( s ) ) d s f ( i , s ) , i L
with the initial condition
a ( 0 ) = a 0 .
Let us consider the following assumptions:
i.
h : L L is continuously non-decreasing and h ( i ) i .
ii.
For q = 1 , 2 , each g q : L × B B weakly fulfills the Lipschitz condition and is weakly continuous, such that
| ϕ ( g q ( i , a ) g q ( i , b ) ) | k q | ϕ ( a b ) | , k q > 0 , ( i , a ) , ( i , b ) L × B , ϕ B * .
where k q are Lipschitz constants.
iii
f : L × R R is continuous function with
m = max { sup | f ( i , h ( i ) ) | + sup | f ( i , 0 ) | } on L .
iv.
k 1 k 2 m i < 1 .
Lemma 5
([27]). A solution of the non-linear second-order Volterra–Stieltjes-type initial value delay functional differential problem (26) and (27) exists whenever it is expressed as an integral equation as follows:
a ( i ) = a 0 + 0 i g 1 t , 0 h ( i ) g 2 ( t , θ , a ( θ ) ) d θ f ( t , θ ) d t .
We derive the following theorem for the existence of the solution of (26) and (27) by using an iterative algorithm (1).
Theorem 7.
Suppose that the assumptions (i)–(iv) hold and { a n } is a sequence approximated by (1). Then, initial value problem (26) and (27) has a unique solution p C [ L , B ] and a n converges to p .
Proof. 
Let { a n } be sequence approximated by (1). Let S be an operator on C [ L , B ] by
S ( a ( i ) ) = a 0 + 0 i g 1 t , 0 h ( i ) g 2 ( t , θ , a ( θ ) ) d θ f ( t , θ ) d t .
We have
c n p C = ( 1 s n ˜ ) S a n + s n ˜ S 2 a n p C ( 1 s n ˜ ) S a n p + | s n ˜ S 2 a n p C .
Consider
S a n p C = S a n S p a 0 + 0 i g 1 t , 0 h ( t ) g 2 ( t , θ , a n ( θ ) ) d θ f ( t , θ ) d t a 0 0 i g 1 t , 0 h ( t ) g 2 ( t , θ , p ( θ ) ) d θ f ( t , θ ) d t C = | S ( 0 i g 1 t , 0 h ( t ) g 2 ( t , θ , a n ( θ ) ) d θ f ( t , θ ) d t 0 i g 1 t , 0 h ( t ) g 2 ( t , θ , p ( θ ) ) d θ f ( t , θ ) ) d t | .
Using assumption (ii), we have
S a n p C 0 i k 1 | S ( 0 h ( t ) g 2 ( t , θ , a n ( θ ) ) ) d θ f ( t , θ ) 0 h ( t ) g 2 ( t , θ , p ( θ ) ) d θ f ( t , θ ) ) | d t k 1 0 i 0 h ( t ) | S ( g 2 ( t , θ , a n ( θ ) ) ) g 2 ( t , θ , p ( θ ) ) ) d θ f ( t , θ ) | d t ,
and
S a n p C k 1 0 i 0 h ( t ) k 2 | S a n ( θ ) p ( θ ) d θ f ( t , θ ) | d t k 1 k 2 a n p C 0 i 0 h ( t ) d θ f ( t , θ ) d t = k 1 k 2 a n p C 0 i ( f ( t , h ( t ) ) f ( t , 0 ) ) d t k 1 k 2 m a n p C 0 i d t = k 1 k 2 m i a n p C .
Moreover, k 1 k 2 m i < 1 yields
S a n p C a n p C .
Also,
S 2 a n p C = S ( S a n ) S p = a 0 + 0 i g 1 t , 0 h ( t ) g 2 ( t , θ , S a n ( θ ) ) d θ f ( t , θ ) d t a 0 0 i g 1 t , 0 h ( t ) g 2 ( t , θ , p ( θ ) ) d θ f ( t , θ ) d t C = | S ( 0 i g 1 t , 0 h ( t ) g 2 ( t , θ , S a n ( θ ) ) d θ f ( t , θ ) d t 0 i g 1 t , 0 h ( t ) g 2 ( t , θ , p ( θ ) ) d θ f ( t , θ ) ) d t | .
Further, from assumption (ii), we get
S 2 a n p C 0 i k 1 | S ( 0 h ( t ) g 2 ( t , θ , S a n ( θ ) ) ) d θ f ( t , θ ) 0 h ( t ) g 2 ( t , θ , p ( θ ) ) d θ f ( t , θ ) ) | d t k 1 0 i 0 h ( t ) | S ( g 2 ( t , θ , S a n ( θ ) ) ) g 2 ( t , θ , p ( θ ) ) ) d θ f ( t , θ ) | d t ,
and
S 2 a n p C k 1 0 i 0 h ( t ) k 2 | S S a n ( θ ) p ( θ ) d θ f ( t , θ ) | d t k 1 k 2 S a n p C 0 i 0 h ( t ) d θ f ( t , θ ) d t = k 1 k 2 S a n p C 0 i ( f ( t , h ( t ) ) f ( t , 0 ) ) d t k 1 k 2 m S a n p C 0 i d t = k 1 k 2 m i S a n p C .
Since k 1 k 2 m i < 1 ,
S 2 a n p C S a n p C .
Using (29) we obtain
S 2 a n p C a n p C .
We have
c n p ( 1 s n ˜ ) a n p + | s n ˜ a n p C a n p C .
Thus,
b n p = S c n p a n p .
By setting a n p C = r n , we obtain
r n + 1 r n , for all n N ,
which implies
lim n r n = 0 .
So, a n p .

7. Conclusions

In this paper, an iterative algorithm (1) is analyzed for generalized non-expansive mappings satisfying the Garcia-Falset property on a uniformly convex Banach space. Weak and strong convergence theorems for such mappings are established. It is demonstrated that the iterative algorithm (1) is ω 2 -stable. Numerical experiments have been performed to show that this iterative algorithm converges to a fixed point faster than iterative algorithms such as Picard–Mann, Mann, Ishikawa, and Thakur. To exhibit the utility of the proposed results, we approximated the weak solution of Volterra–Stieltjes-type delay functional differential equation using the mentioned iterative algorithm.

Author Contributions

All authors contributed equally. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Data is contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Berinde, V.; Takens, F. Iterative Approximation of Fixed Points; Springer: Berlin/Heidelberg, Germany, 2007; Volume 1912. [Google Scholar]
  2. Kirk, W.A. A fixed point theorem for mappings that do not increase distances. Am. Math. Mon. 1965, 72, 1004–1006. [Google Scholar] [CrossRef]
  3. Browder, F.E. Nonexpansive nonlinear operators in a Banach space. Proc. Natl. Acad. Sci. USA 1965, 54, 1041–1044. [Google Scholar] [CrossRef]
  4. Göhde, D. Zum Prinzip der Kontraktiven Abbildung. Math. Nachr. 1965, 30, 251–258. [Google Scholar] [CrossRef]
  5. Krasnoselskii, M.A. Two remarks on the method of successive approximations. Uspekhi Math. Nauk. 1955, 10, 123–127. [Google Scholar]
  6. Mann, W.R. Mean value methods in iteration. Proc. Am. Math. Soc. 1953, 4, 506–510. [Google Scholar] [CrossRef]
  7. Ishikawa, S. Fixed points by a new iteration method. Proc. Am. Math. Soc. 1974, 44, 147–150. [Google Scholar] [CrossRef]
  8. Abbas, M.; Nazir, T. A new, faster iteration process applied to constrained minimization and feasibility problems. Mat. Vesn. 2014, 66, 223–234. [Google Scholar]
  9. Thakur, B.S.; Thakur, D.; Postolache, M. A new iterative scheme for numerical reckoning fixed points of Suzuki’s generalized nonexpansive mappings. Appl. Math. Comput. 2016, 275, 147–155. [Google Scholar] [CrossRef]
  10. Khan, S.H. A Picard-Mann hybrid iterative process. Fixed Point Theory Appl. 2013, 2013, 69. [Google Scholar] [CrossRef]
  11. Suzuki, T. Fixed point theorems and convergence theorems for some generalized nonexpansive mappings. J. Math. Anal. Appl. 2008, 340, 1088–1095. [Google Scholar] [CrossRef]
  12. Garcia-Falset, J.; Llorens-Fuster, E.; Suzuki, T. Fixed point theory for a class of generalized nonexpansive mappings. J. Math. Anal. Appl. 2011, 375, 185–195. [Google Scholar] [CrossRef]
  13. Usurelu, G.I.; Postolache, M. Convergence analysis for a three-step Thakur iteration for Suzuki-type nonexpansive mappings with visualization. Symmetry 2019, 11, 1441. [Google Scholar] [CrossRef]
  14. Houmani, H.; Turcanu, T. CQ-Type algorithm for reckoning best proximity points of EP-operators. Symmetry 2019, 12, 4. [Google Scholar] [CrossRef]
  15. Maldar, S.; Gürsoy, F.; Atalan, Y.; Abbas, M. On a three-step iteration process for multivalued Reich-Suzuki type α-nonexpansive and contractive mappings. J. Appl. Math. Comput. 2022, 68, 863–883. [Google Scholar] [CrossRef]
  16. Pant, R.; Shukla, R. Approximating fixed points of generalized α-nonexpansive mappings in Banach spaces. Numer. Anal. Optim. 2017, 38, 248–266. [Google Scholar] [CrossRef]
  17. Gürsoy, F.; Khan, A.R.; Ertürk, M.; Karakaya, V. Weak w2 and data dependence of Mann iteration method in Hilbert spaces. Rev. Real Acad. Cienc. Exactas Fís. Nat. Ser. A Mat. 2019, 113, 11–20. [Google Scholar] [CrossRef]
  18. Hacıoğlu, E.; Gürsoy, F.; Maldar, S.; Atalan, Y.; Milovanović, G.V. Iterative approximation of fixed points and applications to two-point second-order boundary value problems and to machine learning. Appl. Numer. Math. 2021, 167, 143–172. [Google Scholar] [CrossRef]
  19. Khatoon, S.; Uddin, I.; Ali, J.; George, R. Common fixed points of two nonexpansive mappings via a faster iteration procedure. J. Funct. Spaces 2021, 2021, 9913540. [Google Scholar] [CrossRef]
  20. Maniu, G. On a three-step iteration process for Suzuki mappings with a qualitative study. Numer. Funct. Anal. Optim. 2020, 41, 929–949. [Google Scholar] [CrossRef]
  21. Hacıoğlu, E. A comparative study on iterative algorithms of almost contractions in the context of convergence, stability, and data dependency. Comput. Appl. Math. 2021, 40, 282. [Google Scholar] [CrossRef]
  22. Timis, I. On the weak stability of Picard iteration for some contractive type mappings. Ann. Univ. Craiova Math. Comput. Sci. Ser. 2010, 37, 106–114. [Google Scholar]
  23. Senter, H.F.; Dotson, W. Approximating fixed points of nonexpansive mappings. Proc. Am. Math. 1974, 44, 375–380. [Google Scholar] [CrossRef]
  24. Edelstein, M. Fixed point theorems in uniformly convex Banach spaces. Proc. Am. Math. Soc. 1974, 44, 369–374. [Google Scholar] [CrossRef]
  25. Clarkson, J.A. Uniformly convex spaces. Trans. Am. Math. Soc. 1936, 40, 396–414. [Google Scholar] [CrossRef]
  26. Schu, J. Weak and strong convergence to fixed points of asymptotically nonexpansive mappings. Bull. Aust. Math. Soc. 1991, 43, 153–159. [Google Scholar] [CrossRef]
  27. El-Sayed, A.M.; Omar, Y.M. On the weak solutions of a delay composite functional integral equation of Volterra-Stieltjes type in reflexive Banach space. Mathematics 2022, 10, 245. [Google Scholar] [CrossRef]
  28. Beg, I.; Abbas, M.; Asghar, M.W. Convergence of AA-Iterative Algorithm for Generalized α-Nonexpansive Mappings with an Application. Mathematics 2022, 10, 4375. [Google Scholar] [CrossRef]
Figure 1. Graph of Garcia-Falset inequality for Example 2.
Figure 1. Graph of Garcia-Falset inequality for Example 2.
Axioms 14 00475 g001
Figure 2. Graphs of | a n p | .
Figure 2. Graphs of | a n p | .
Axioms 14 00475 g002
Figure 3. Graphs of | a n p | .
Figure 3. Graphs of | a n p | .
Axioms 14 00475 g003
Figure 4. Graphs of | a n p | .
Figure 4. Graphs of | a n p | .
Axioms 14 00475 g004
Figure 5. Graphs of | a n a n + 1 | + | b n b n + 1 | with initial guess ( 0.25 , 0.5 ) .
Figure 5. Graphs of | a n a n + 1 | + | b n b n + 1 | with initial guess ( 0.25 , 0.5 ) .
Axioms 14 00475 g005
Figure 6. Graphs of | a n a n + 1 | + | b n b n + 1 | with initial guesses ( 1 , 1.5 ) .
Figure 6. Graphs of | a n a n + 1 | + | b n b n + 1 | with initial guesses ( 1 , 1.5 ) .
Axioms 14 00475 g006
Table 1. Convergence behavior of | a n p | for various iterative algorithms.
Table 1. Convergence behavior of | a n p | for various iterative algorithms.
Numb. Iter.Picard–MannIter. (1)Iter. (2)Iter. MannIter. Ishi.Iter. Tha.
10.01619.5334  × 10 4 3.852  × 10 4 0.20310.53410.0188
20.0020000.08340.36480.0022
32.6305  × 10 4 000.03770.24502.5028  × 10 4
40000.01770.16360
50000.00850.10890
60000.00410.07230
70000.00200.04800
80009.8868  × 10 4 0.03180
900000.02100
1000000.01390
1100000.00920
Table 2. Convergence behavior at different initial points.
Table 2. Convergence behavior at different initial points.
Initial Pts.Picard–MannIter. (1)Iter. (2)Iter. MannIter. Ishi.Iter. Tha.
0.164313216
14329164
3.553211205
Table 3. Convergence behavior of | a n p | for various iterative algorithms.
Table 3. Convergence behavior of | a n p | for various iterative algorithms.
Numb. Iter.Picard–MannIter. (1)Iter. (2)Iter. MannIter. Ishi.Iter. Tha.
10.27090.03160.01160.29211.03720.2530
20.03560.00132.1799  × 10 4 0.03840.62880.0296
30.00516.7602  × 10 5 00.00700.37030.036
47.3869  × 10 4 000.00140.21514.3864  × 10 4
50003.1227  × 10 4 0.12390
600000.07090
700000.04040
800000.02300
900000.01300
1000000.00730
1100000.00410
Table 4. Convergence behavior at different initial points.
Table 4. Convergence behavior at different initial points.
Initial Pts.Picard–MannIter. (1)Iter. (2)Iter. MannIter. Ishi.Iter. Tha.
0.15325124
15335135
3.54327205
Table 5. Convergence behavior of | a n p | for various iterative algorithms.
Table 5. Convergence behavior of | a n p | for various iterative algorithms.
Numb. Iter.Picard–MannIter. (1)Iter. (2)Iter. MannIter. Ishi.Iter. Tha.
13.42861.857142914.5714297.38783.676
21.42860.431120.125002.6122456.82241.689475686151179
30.58820.10080.015631.476496.348410.7823
40.24060.023710.0019530.82515.953010.365887450858190
50.098040.00562.441406  × 10 4 0.45645.619520.172232522988864
60.03980.001300.2503035.334450.081566
70.01613.18952  × 10 4 00.136245.087640.038822964674253
80.006537.648328  × 10 5 00.07374.871510.018557138861690
90.002641.839777  × 10 5 00.0396274.6803230.008902166228661
100.00106000.021214.509720.00428371
112103  × 10 4 000.0113034.3563040.00206682
120000.00604.21749.99533  × 10 4
130000.003175434.0908944.843748124  × 10 4
140000.001675233.97504622.3515521  × 10 4
150008.8139084  × 10 4 3.868454161.14348626  × 10 4
160004.6259333  × 10 4 3.76995575.5685004  × 10 5
170002.4224943  × 10 4 3.6785810
180001.26602718  × 10 4 3.59351640
190006.60410533  × 10 5 3.51406960
2000003.4396509762394160
Table 6. Convergence behavior at different initial points.
Table 6. Convergence behavior at different initial points.
Initial Pts.Picard–MannIter. (1)Iter. (2)Iter. MannIter. Ishi.Iter. Tha.
81286--13
2107529-12
10128634-13
40139737-13
19119261
Table 7. Convergence behavior at different initial points.
Table 7. Convergence behavior at different initial points.
Initial Pts.Picard–MannIter. (1)Iter. (2)Iter. MannIter. Ishi.Iter. Tha.
(0.25, 0.5)5331065
(1, 1.5)433-612
(0.5,1.3)533444
(0.1,1.9)644854
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Khan, S.H.; Dilawer, H.; Iqbal, H.; Abbas, M. Convergence and ω2-Stability Analysis of a Hybrid-Type Iterative Scheme with Application to Functional Delay Differential Equations. Axioms 2025, 14, 475. https://doi.org/10.3390/axioms14060475

AMA Style

Khan SH, Dilawer H, Iqbal H, Abbas M. Convergence and ω2-Stability Analysis of a Hybrid-Type Iterative Scheme with Application to Functional Delay Differential Equations. Axioms. 2025; 14(6):475. https://doi.org/10.3390/axioms14060475

Chicago/Turabian Style

Khan, Safeer Hussain, Hina Dilawer, Hira Iqbal, and Mujahid Abbas. 2025. "Convergence and ω2-Stability Analysis of a Hybrid-Type Iterative Scheme with Application to Functional Delay Differential Equations" Axioms 14, no. 6: 475. https://doi.org/10.3390/axioms14060475

APA Style

Khan, S. H., Dilawer, H., Iqbal, H., & Abbas, M. (2025). Convergence and ω2-Stability Analysis of a Hybrid-Type Iterative Scheme with Application to Functional Delay Differential Equations. Axioms, 14(6), 475. https://doi.org/10.3390/axioms14060475

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop