Next Article in Journal
Fractional p-Laplacian Equations with Sandwich Pairs
Previous Article in Journal
Fuzzy Fractional Order PID Tuned via PSO for a Pneumatic Actuator with Ball Beam (PABB) System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Stability, Data Dependence, and Convergence Results with Computational Engendering of Fractals via Jungck–DK Iterative Scheme

1
Department of Pharmaceutical Sciences, “Vasile Goldiş” Western University of Arad, L. Rebreanu Street, No. 86, 310048 Arad, Romania
2
Department of Hospitality Services, Babeş-Bolyai University, Horea Street, No. 7, 400174 Cluj-Napoca, Romania
3
Department of Mathematics, Government College University, Katchery Road, Lahore 54000, Pakistan
4
Department of Mathematics, Babeş-Bolyai University, M. Kogălniceanu Street, No. 1, 400084 Cluj-Napoca, Romania
*
Authors to whom correspondence should be addressed.
Fractal Fract. 2023, 7(6), 418; https://doi.org/10.3390/fractalfract7060418
Submission received: 25 April 2023 / Revised: 12 May 2023 / Accepted: 21 May 2023 / Published: 23 May 2023

Abstract

:
We have developed a Jungck version of the DK iterative scheme called the Jungck–DK iterative scheme. Our analysis focuses on the convergence and stability of the Jungck–DK scheme for a pair of non-self-mappings using the more general contractive condition. We demonstrate that this iterative scheme converges faster than all other leading Jungck-type iterative schemes. To further illustrate its effectiveness, we provide an example to verify the rate of convergence and prove the data dependence result for the Jungck–DK iterative scheme. Finally, we calculate the escape criteria for generating Mandelbrot and Julia sets for polynomial functions and present visually appealing images of these sets by our modified iteration.

1. Introduction

Fixed-point theory occupies a prominent position in both pure and applied mathematics, owing to its numerous applications in areas such as differential and integral equations, variational inequalities, approximation theory, equilibrium problems, fractal generation, and many others.
The Banach contraction theorem, introduced by Banach in 1922, is one of the fundamental results in fixed-point theory. This theorem guarantees the existence and uniqueness of fixed points for contraction mappings in metric fixed-point theory. Additionally, it allows various iterative schemes to converge to a fixed point. The theorem has also become a widely used method for solving existence problems in many mathematical fields.
While there have been numerous studies regarding fixed points of contractive maps, such as those discussed in [1,2,3,4], relatively little research has focused on the convergence of iterative approximations to these common fixed points.
When it comes to approximating fixed points, the well-known Banach contraction theorem employs the Picard iteration method. However, in many cases, obtaining the exact solution to a fixed-point problem is infeasible. Hence, as a result, a wide range of iterative algorithms have been developed and studied for approximating solutions to fixed-point problems [5,6,7,8,9,10,11,12,13,14].
The investigation of iterative methods for approximating fixed points using various types of self-mappings has gained significant attention in recent years. Researchers have introduced several iterative schemes and studied their qualitative features, including convergence, stability, and data dependency. However, non-self-mappings are typically more intricate than self-mappings and are therefore often overlooked in many cases [5,6,7].
Jungck introduced the Jungck iteration scheme [15] to approximate the fixed points for the non-self-mapping U , V : A W , where W is a Banach space and A is an arbitrary set such that V ( A ) U ( A ) satisfies the following Jungck contraction:
d ( V u , V v ) α d ( U u , U v ) , 0 α < 1 .
In 2005, the Jungck–Mann iteration scheme and its stability for two contractive maps were first presented and discussed by Singh et al. [12]. Within this framework, Olatinwo and Imoru [8] and Olatinwo [16,17] introduced the Jungck–Ishikawa and Noor iteration schemes and exhibited how their convergence could be utilised for pairs of some generalized contractive operator for approximating the common fixed point. Chugh and Kumar [9] presented the Jungck–SP iterative scheme, which is defined as follows:
U u n + 1 = ( 1 ρ n ) U v n + ρ n V v n U v n = ( 1 ϱ n ) U w n + ϱ n V w n U w n = ( 1 σ n ) U u n + σ n V u n ,
where ρ n , ϱ n , σ n are in [ 0 , 1 ] .
Nawab Hussain et al. [10] presented the Jungck–CR scheme and used the more general contractive condition of Olatino [16] to prove the stability, data dependency, and convergence of the Jungck–CR iterative scheme. The general contractive condition of Olatino [16] is defined as follows:
Let r [ 0 , 1 ) be a real number and let λ : R + R + be a monotone function such that λ ( 0 ) = 0 . If, for all u , v belongs to A, we have
V u V v λ ( U u V u ) + r U u U v .
The Jungck–CR iterative scheme is defined by the sequence { u n }
U u n + 1 = ( 1 ρ n ) U v n + ρ n V v n U v n = ( 1 ϱ n ) V u n + ϱ n V w n U w n = ( 1 σ n ) U u n + σ n V u n ,
where ρ n , ϱ n , and σ n are sequences of positive numbers in [ 0 , 1 ] .
Motivated by the above literature, we propose the following Jungck type iterative scheme. For ρ n , ϱ n [ 0 , 1 ] , we have
U u n + 1 = ( 1 ρ n ) U w n + ρ n V v n U v n = ( 1 ϱ n ) U u n + ϱ n V w n U w n = V u n
which we call the Jungck–DK iterative scheme.
In this paper, we present the Jungck–DK iterative scheme for analyzing the convergence and stability of a non-self-mapping in a normed linear space. Our work is motivated by previous research in the field. To demonstrate the superior convergence rate of the Jungck–DK iterative scheme compared to other Jungck-type iterative schemes, we provide an example. Additionally, we prove data dependence results. In the final section, we showcase the practical application of the Jungck–DK iterative scheme by generating Mandelbrot and Julia sets of polynomial functions for visualizing images on both sets.

2. Preliminaries

In this section, we set out some lemmas, propositions, and definitions that are used in this paper.
Definition 1
([18]). Suppose that { x n } and { y n } are two real convergent sequences with limits x and y, respectively. Then, { x n } is said to converge faster than { y n } if
lim n | x n x y n y | = 0 .
Definition 2
([19]). Let f 1 and f 2 be two self-maps on W . A point u in W is called the coincidence point of a pair of mappings ( f 1 , f 2 ) if f 1 u = f 2 u and a common fixed point of a pair ( f 1 , f 2 ) if u = f 1 u = f 2 u . If v = f 1 u = f 2 u for some u W , then the point v is coincident point of f 1 and f 2 . A pair ( f 1 , f 2 ) is weakly compatible if f 1 & f 2 commute at v.
Lemma 1
([11]). If υ R such that 0 υ < 1 and { ε } is a sequence of positive numbers such that lim n ε n = 0 , then for any sequence of positive numbers { a n } satisfying
a n + 1 υ a n + ε n , n = 0 , 1 , 2 , ,
one has lim n a n = 0 .
Definition 3
([12]). Let U , V : A W be two non-self operators for an arbitrary set A such that V ( A ) U ( A ) and g * is a point of coincidence of U and V . Let U u n W , be the sequence generated by an iterative scheme
U u n + 1 = f ( V , u n ) , n = 0 , 1 , 2 , ,
where u 0 W is the initial approximation and f is some function. Suppose that { U u n } converges to g * . If { U v n } W is an arbitrary sequence and if ε n = d ( U v n , f ( V , u n ) ) , n = 0 , 1 , 2 , , then the defined iterative scheme is said to be stable or ( U , V ) stable ⇔ lim n ε n = 0 lim n U v n = g * .
Ostrowski [13] found the first stability result for T-stable mappings in 1967, when he talked about the stability of the Picard iteration using the contraction mapping. Harder [14] established how stability results can be used to solve first-order differential equations. Osilike and Udomene [20] came up with a shorter method to show that results are stable. Berinde [21], Imoru and Olatinwo [16], and many others (see [8,9,10]) have also used this method.
Definition 4
([22]). Consider two self-operators S , S 1 : W W and let S 1 be an appropriate operator of S if, for all u W and for a fixed ε > 0 , we have
S u S 1 u ε .
Lemma 2
([22]). Let { a n } be a sequence in R + { 0 } , and let n , n 0 N be a number such that for every n n 0 , the following inequality holds:
a n + 1 ( 1 p n ) a n + p n q n , n N ,
where p n ( 0 , 1 ) , n = 1 p n = and q n 0 , f o r   a l l   n N . Then, 0 lim sup n a n lim sup n q n .

3. Convergence, Data Dependence, and Stability in an Arbitrary Banach Space

This section deals with the convergence, stability, and data dependence of the Jungck–DK iterative scheme.
Theorem 1.
Let A be an arbitrary set of an arbitrary Banach space ( W , | · | ) and let there be two non-self-operators U , V : A W , which satisfy the condition (3). Consider V ( A ) V ( A ) , where V ( A ) is a complete subspace of W and U ( p ) = V ( p ) = u * (say). For u 0 A , a sequence { U ( u n ) } is the sequence of the Jungck–DK iterative scheme defined by (5), where 0 ρ n , ϱ n , σ n 1 , with { ρ n } satisfying n = 0 { ρ n } < . Then, the scheme (5) converges strongly to u * . Moreover, if A = W with U and V satisfy the weak compatibility property, then u * is also a unique common fixed point of both operators.
Proof. 
In the beginning, we demonstrated that the Jungck–DK iterative scheme (5) converges to u * , where u * is a fixed point of U and V .
From (5)
U u n + 1 u * = ( 1 ρ n ) U w n + ρ n V v n u *
( 1 ρ n ) U w n u * + ρ n V v n u * V v n u * = V v n V p λ ( U p V p ) + r U p U v n r U p U v n
= r U v n u * . U v n u * = ( 1 ϱ n ) U u n + ϱ n V w n u *
( 1 ϱ n ) U u n u * + ϱ n V w n u * V w n u * = V p V w n λ ( U p V p ) + r U p U w n r U p U w n
= r U w n u *
U w n u * = V u n V p λ ( U p V p ) + r U p U u n r U p U u n = r U u n u * .
From (10) and (9), we have
V w n u * r 2 U u n u * .
Replacing (11) in (8) we obtain
U v n U u * ( 1 ϱ n ) U u n u * + ϱ n r 2 U u n u * ( 1 ϱ n ( 1 r 2 ) ) U u n u * .
Equation (7) implies
V u n u * r ( 1 ϱ n ( 1 r 2 ) ) U u n u * .
From Equation (6), we obtain
U u n + 1 u * ( 1 ρ n ) r U u n u * + ρ n r ( 1 ϱ n ( 1 r 2 ) ) U u n u * r ( 1 ρ n ( 1 ( 1 ϱ n ( 1 r 2 ) ) ) ) U u n u * r k = 0 n ( 1 ρ k ( 1 ϱ k ( 1 r 2 ) ) ) U u 0 u * e ( 1 ( 1 ϱ k ( 1 r 2 ) ) ) Σ k = 0 ρ k U u 0 u * .
Since 0 r < 1 , ρ k [ 0 , 1 ] and k = 0 ρ k = , therefore,
e ( 1 ( 1 ϱ k ( 1 r 2 ) ) ) k = 0 ρ k 0 as n .
As a result, it follows from (14) that
lim n U u n + 1 u * = 0 .
Consequently, { U u n } u * .
Next, our claim is to show that u * is a unique common fixed point of U and V . We consider that u * * is also a coincidence point. Then, there is v * W such that U v * = V v * = u * * . However, according to (3), we have
0 u * u * * = V v V v * λ ( U v V v ) + r U v U v * = r u * u * * ,
which means that u * = u * * as 0 r < 1 .
Since U and V are weakly compatible with u * = V v = U v (so V u * = VV v = VU v = UV v and hence V u * = U u * ), V u * is a point of coincidence of U and V , which is unique. Then, u * = V u * . Thus, U u * = V u * = u * , and both U and V shared a unique fixed point u * .    □
The next result deals with the stability of the Jungck–DK-type iterative scheme (5).
Theorem 2.
Let U , V , and { u n } satisfy all the hypotheses and requirements of Theorem 1. Then, the Jungck–DK scheme (5) is ( U , V ) -stable.
Proof. 
Suppose there is an arbitrary sequence { j n } W , ε n = U j n + 1 ( 1 ρ n ) U b n ρ n V a n for n = 0 , 1 , 2 , , where U a n = ( 1 ϱ n ) U j n + ϱ n V b n and U b n = V j n . Let lim n ε n = 0 .
Then, from the Jungck–DK iterative scheme (5), we have
U j n + 1 u * U j n + 1 ( 1 ρ n ) U b n ρ n V a n + ( 1 ρ n ) U b n ρ n V a n u * ε n + ( 1 ρ n ) U b n u * + ρ n V a n u * ε n + ( 1 ρ n ) U b n u * + ρ n r U a n u * .
U b n u * = V j n V p λ ( U p V p ) + r U p U j n r U j n u * .
U a n u * = ( 1 ϱ n ) U j n + ϱ n V b n u * ( 1 ϱ n ) U j n u * + ϱ n V b n V p ( 1 ϱ n ) U j n u * + r ϱ n U j n u * ( 1 ϱ n ( 1 r 2 ) ) U j n u * .
Putting (17) & (16) in (15), we obtain
U j n + 1 u * ε n + ( 1 ρ n ) r U j n u * + ρ n r ( 1 ϱ n ( 1 r 2 ) ) | U j n u * ε n + r ( 1 ρ n ( 1 ( 1 ϱ n ( 1 r 2 ) ) ) ) U j n u * .
Using that ρ ρ n and r [ 0 , 1 ) , we have
[ r ( 1 ρ n ( 1 ( 1 ϱ n ( 1 r 2 ) ) ) ) ] < 1 .
Hence, using Lemma 1 implies
lim n U j n + 1 = u * .
Conversely, let us consider that lim n U j n + 1 = u * . Then, using the condition (3) and the triangular inequality, we have
ε n = U j n + 1 ( 1 ρ n ) U b n ρ n V a n U j n + 1 u * + ( 1 ρ n ) U b n u * + ρ n V a n u * .
From (17) & (16), we obtain
ε n U j n + 1 u * + r ( 1 ρ n ( 1 ( 1 ϱ n ( 1 r 2 ) ) ) ) U j n u * .
Hence, lim n ε n = 0 ⇒ the Jungck–DK scheme is ( U , V ) - stable.    □
In the next theorem, we will compare the convergence behaviour of the Jungck–DK-type iterative scheme (5) with the Jungck–CR-type iterative scheme, which converges faster than all Jungck-type (Picard, Mann, Ishikawa, Noor, S, and SP) iterative schemes.
Theorem 3.
Let U , V , and { u n } satisfy all the hypotheses of Theorem 1. For u 0 A , the Jungck–DK scheme (5) converges faster than the Jungck–CR scheme (4) to a fixed point u * .
Proof. 
Let u * = U ( p ) = V ( p ) (say). By using the contractive condition (3), and from the iterative scheme of Jungck–CR [10], we have
U u n + 1 u * r ( 1 ρ n ( 1 r ) ) U u n u * = b n .
Additionally, from Theorem 1 of the Jungck–DK iterative scheme, we have
U u n + 1 u * r ( 1 ρ n ( 1 ( 1 ϱ n ( 1 r 2 ) ) ) ) U u n u * = a n .
Now,
a n b n = i = 0 n r ( 1 ρ i ( 1 ( 1 ϱ i ( 1 r 2 ) ) ) ) r ( 1 ρ i ( 1 r ) ) U u 0 u * a n b n = i = 0 n 1 ρ i ( 1 ( 1 ϱ i ( 1 r 2 ) ) ) ) 1 ρ i ( 1 r ) U u 0 u * .
Since r [ 0 , 1 ) , lim n ρ n = 0 = lim n ϱ n . Hence, from (18), we have
lim n a n b n 0 .
In conclusion, the Jungck–DK iterative scheme converges faster than the Jungck–CR scheme.    □
The previous Theorem 3 can be demonstrated by the following example.
Example 1.
Consider U , V : [ 1 , 4 ] [ 1 , 16 ] such that V u = 2 u + 3 and U u = u 2 . It is not difficult to remark that U and V are two quasi-contractive operators accomplishing the (3) condition, with 9 as their coincidence point. Take u 0 = 2 as the initial approximation; then, with λ ( t ) = 2 a t and ρ n = ϱ n = σ n = 1 2 n + 1 , n 0 , we construct Table 1. Studying the table, we can observe the convergence of the various Jungck0type schemes to the same point u * = 9 = V 3 = U 3 .
Remark 1.
We find that the Jungck–DK iterative scheme converges to the coincidence point in just 8 iterations, while the Jungck–Mann iterative scheme takes 229 iterations to obtain the same results. Similarly, the Jungck–Ishikawa iterative scheme takes 205 iterations, the Jungck–Noor iterative scheme takes 200 iterations, and the Jungck–CR iterative scheme takes 10 iterations. Figure 1 provides a visual representation of our convergence comparisons.
Now, let us give a data dependence result for the Jungck–DK scheme.
Definition 5.
Let A be an arbitrary set of an arbitrary Banach space ( W , | · | ) and let ( U , V ) , ( U 1 , V 1 ) : A W be two non-self-operator pairs such that V ( A ) U ( A ) and V 1 ( A ) U 1 ( A ) . The pair ( U , V ) is called an approximative operator pair of ( U 1 , V 1 ) if, for every u W and some fixed ϵ 1 > 0 and ϵ 2 > 0 , we have
V u V 1 u ϵ 1 , U u U 1 u ϵ 2 .
Theorem 4.
Let ( W , · ) be a Banach space, such that ( U , V ) , ( U 1 , V 1 ) : A W satisfies condition (3), where V ( A ) U ( A ) and V 1 ( A ) U 1 ( A ) . U 1 ( A ) is a complete subset of W . Assume that there exists a p C ( U , V ) and p C ( U 1 , V 1 ) such that U p = V p = u * and U 1 p 1 = V 1 p 1 = u * * . Let { U u n } be an iterative sequence (5) with { ρ n } , { ϱ n } [ 0 , 1 ] satisfying n = 0 ρ n ϱ n = , and let { U 1 a n + 1 } be a sequence defined by   
U 1 a n + 1 = ( 1 ρ n ) U 1 c n + ρ n V 1 b n U 1 b n = ( 1 ϱ n ) U 1 a n + ϱ n V 1 c n U 1 c n = V 1 a n .
Assume that { U u n + 1 } and { U 1 a n + 1 } converge to u * and u * * . Then, we have u * u * * = 4 ϵ 1 r 2 , where ϵ = max { ϵ 1 , ϵ 2 } .
Proof. 
Using the iterative sequence (5), the iterative scheme (19), the condition (3), and Definition 5, we obtain
U u n + 1 U 1 a n + 1 ( 1 ρ n ) U w n U 1 c n + ρ n V v n V 1 b n ,
V v n V 1 b n V v n V b n + V b n V 1 b n V v n V b n + ϵ 1 λ U v n V v n + r U v n U b n + ϵ 1 λ U v n V v n + r { U v n U 1 b n + U 1 b n U b n } + ϵ 1 λ U v n V v n + r U v n U 1 b n + r ϵ 2 + ϵ 1 ,
U v n V y n U v n U p + V p V y n U v n u * + λ ( U p V p ) + r U p U y n ( 1 + r ) U v n u * .
It is easy to show that U v n u * U u n u * , which implies
U v n V y n ( 1 + r ) U u n u * .
U v n U 1 b n ( 1 ϱ n ) U u n + ϱ n V w n ( 1 ϱ n ) U 1 a n ϱ n V c n ( 1 ϱ n U u n U 1 a n + ϱ n V w n V 1 c n ( 1 ϱ n ) U u n U 1 a n + ϱ n { V w n V c n + V c n V 1 c n } ( 1 ϱ n ) U u n U 1 a n + ϱ n { λ U w n V w n + r U w n U c n + ϵ 1 } ( 1 ϱ n ) U u n U 1 a n + ϱ n { λ U w n V w n + r ( U w n U 1 c n + U 1 c n U c n ) + ϵ 1 } ( 1 ϱ n ) U u n U 1 a n + ϱ n λ U w n V w n + ϱ n r U w n U 1 c n + r ϱ n ϵ 2 + ϱ n ϵ 1 } ( 1 ϱ n ) U u n U 1 a n + ϱ n λ U w n V w n + ϱ n r U w n U 1 c n + r ϱ n ( ϵ 1 + r ϵ 2 ) .
Next, we consider the following estimation:
U w n U 1 c n = V u n V 1 a n V u n V a n + V a n V 1 a n λ ( U u n V u n ) + r U u n U a n + ϵ 1 λ ( U u n V u n ) + r U u n U 1 a n + r ϵ 2 + ϵ 1 λ { U u n u * + V p V u n } + r U u n U 1 a n + r ϵ 2 + ϵ 1 λ { U u n u * + V p V u n } + r U u n U 1 a n + r ϵ 2 + ϵ 1 λ { U u n u * + λ U p V p + r U p U u n } + r U u n U 1 a n + r ϵ 2 + ϵ 1 ( λ + r ) U u n u * + r U u n U 1 a n + r ϵ 2 + ϵ 1 ,
U u n V u n U w n U p + V p V w n U w n u * + λ U p V p + r U p U w n ( 1 + r ) U w n u * ( 1 + r ) V u n u * ( 1 + r ) { λ U p V p + r U p U u n } r ( 1 + r ) U u n u * .
From (25) and (24), replacing (23), we obtain
U v n U 1 b n ( 1 ϱ n ( 1 r 2 ) U u n U 1 + ϱ n r ( 1 + r ) ( λ + r ) λ U u n u * + ϱ n ( 1 + r ) ( ϵ 1 + r ϵ 2 ) .
Putting (26) and (22) in (21), we obtain (27), as follows:
V v n V 1 b n λ ( 1 + r ) ϱ n r ( λ + r ) U u n u * + r ( 1 ϱ n ( 1 r 2 ) ) U u n U 1 a n + ( 1 + ϱ n ( 1 + r ) ) ( ϵ 1 + r ϵ 2 ) .
Putting (27) in (20), we obtain
U u n + 1 U 1 a n + 1 ( 1 ρ n ) ( λ + r ) + ρ n λ ( 1 + r ) ( ϱ n r ( λ + r ) U u n u * + r ρ n ( 1 ϱ n ( 1 r 2 ) ) U u n U 1 a n + ρ n ( 1 + ϱ n ( 1 + r ) ) ( ϵ 1 + r ϵ 2 ) .
Here, x n = U u n U 1 a n , p n = r ( 1 ϱ n ( 1 r 2 ) ) ρ n , q n = ( ρ n ( 1 + ϱ n ( 1 + r ) ) ) ( ϵ 1 + r ϵ 2 ) 1 r .
Taking the limit on both sides, it can be seen that lim n U u n u * = 0 . Hence, using Lemma 2, we obtain
u * u * * = 4 ϵ 1 r 2 ,
which completes the proof.    □

4. Escape Criteria for Complex Fractal Generation

The iterative process of a complex function V : C C is a frequently used method for producing fractal patterns on the complex plane
z n + 1 = V ( z n ) ,
where V depends on some constants and a point z 0 C from an area of the complex plane considered [23]. The Mandelbrot and Julia sets are two of the most well-known and extensively studied examples of fractals generated by the iterative processes of a complex function.
Benoit Mandelbrot [24] introduced the Mandelbrot set in the 1970s, while Pierre Fatou [25] and Gaston Julia [25] independently created the Julia set in the early 20th century. The Julia set was initially introduced by [26].
During his time at IBM, Mandelbrot became interested in the iterative process of complex functions and studied the works of other mathematicians in the field. He specifically explored the behavior of the Julia sets generated by the function z 2 + c , and from these studies, he was able to construct the Mandelbrot set. The resulting fractal was so remarkable that Mandelbrot was astonished by its beauty and complexity [27,28].
Since then, a multitude of researchers have investigated various properties of the Mandelbrot and Julia sets and proposed several generalizations. One of the earliest and most apparent generalizations involved replacing Mandelbrot’s quadratic function with the z p + c function [29] therein.
Fixed-point theory has been instrumental in the study of the Mandelbrot and Julia sets, which are two of the most prominent examples of fractals generated by the iterative process of a complex function. Over time, mathematicians have developed several generalizations of these sets, including the use of different iteration methods derived from fixed-point theory. These techniques have been utilized to generalize Julia and Mandelbrot sets [30,31,32,33,34].
In this study, we introduced the Jungck–DK iterative scheme to investigate complex fractals such as Julia sets and Mandelbrot sets. To extend the feedback process utilized in generating these sets, we propose a novel escape criterion for the Jungck–DK iterative scheme applied to p-degree complex polynomial functions. Our proof is also applicable to complex polynomials z p + a z + c , where a , c C .
The following are the basic definitions for this section.
Definition 6 
(Julia Set). Let Q c : C C be a polynomial function that depends on c C . The filled Julia set K Q c of the function Q c is defined as
K Q c = { z C : | Q c n ( z ) | as n } ,
where Q c n ( z ) is the n-th iteration of the function Q c . The Julia set J Q c of the function Q c is defined as the boundary of K Q c , i.e., J Q c = K Q c .
Definition 7
(Mandelbrot Set). For any polynomial function Q c : C C , the Mandelbrot set M is the set of all parameters c for which the Julia set is filled, i.e.,
M = { c C : K Q c is connected } .
The Mandelbrot set can also be described in the ways below:
M = { c C : | Q c n ( z * ) | as n } ,
where z * is any critical point of Q c , i.e., Q c ( z * ) = 0 .
The escape time algorithm is used by most scientists to make pictures of Julia and Mandelbrot sets. In the algorithm, the colour of each point is related to the iterations needed to figure out if the orbit sequence tends to infinity or not. The escape criterion is what we use to decide if the orbit escapes or not. For example, for the classic Mandelbrot and Julia sets, which are defined by Q c ( z ) = z 2 + c , the escape criteria is the following: if there is some k 0 such that
| Q c k ( z ) | > max { | c | , 2 } .
The part of (31) on the right is called the escape threshold (or bailout value). The threshold value used in determining whether an orbit sequence has escaped is a critical factor in the creation of Mandelbrot and Julia sets. This value may vary for each Q c function and plays a significant role in determining the overall appearance of the fractal.
Escape time algorithms are commonly used in the generation of Mandelbrot and Julia sets. Algorithm 1 represents the escape time algorithm for creating the Mandelbrot set, while Algorithm 2 depicts the corresponding method for generating Julia sets. These algorithms rely on the determination of the number of iterations needed for the orbit sequence of each point to escape, which is then used to assign a color value to the corresponding point on the fractal.
In fixed-point theory, there are many theorems and ways to find the fixed points. Iteratively drawing closer to fixed points is the main idea behind this theory. We use iterative processes of the Jungck–DK (5) type, as in the following:
U u n + 1 = ( 1 ρ n ) U w n + ρ n V v n U v n = ( 1 ϱ n ) U u n + ϱ n V w n U w n = V u n
Algorithm 1: Generation of a Mandelbrot set.
Require: A polynomial function Q c : C C , with area A C , K no of iterations, where ρ and ϱ are fixed parameters, and colormap[0.. C 1 ] is a colormap with C colors.
Ensure: Mandelbrot set for the area A
For z 0 A   do
R= Calculate escape threshold
n = 0
z 0 critical point of Q c
While   n K   do
U z n + 1 = ( 1 ρ n ) U w n + ρ n V v n
U v n = ( 1 ϱ n ) U z n + ϱ n V w n
U w n = V z n
If   | z n + 1 | > R
   break
n = n + 1
else if   f ( z n ) = M i n | z | , | z |
i = ( C 1 ) n K
colour z 0 with c o l o u r m a p [ i ]
end for
Algorithm 2: Generation of Julia set.
Require: A polynomial function Q c : C C , with an area A C , where K represents the number of iterations, ρ and ϱ are fixed parameters, and colormap[0.. C 1 ]is a colormap with C colors.
Ensure: Mandelbrot set for area A
For   z 0 A   do
R= Calculate escape threshold
n = 0
z 0 critical point of Q c
While   n K do
U z n + 1 = ( 1 ρ n ) U w n + ρ n V v n
U v n = ( 1 ϱ n ) U z n + ϱ n V w n
U w n = V z n
If   | z n + 1 | > R
   break
n = n + 1
else If   f ( z n ) = M i n | z | , | z |
i = ( C 1 ) n K
colour z 0 with c o l o u r m a p [ i ]
end for
It is worth noting that the Jungck–DK iteration is distinct from the previously mentioned iterations, such as the Picard, Jungck–Mann, Jungck–Ishikawa, Jungck–Noor, or Jungck–CR iterations. As such, applying the Jungck–DK iteration leads to the generation of a completely novel orbit, resulting in the creation of a new fractal set with unique characteristics.
In the case of the Jungck–DK iteration, there are two mappings involved, which means that the number of mappings used in the iteration must be taken into consideration when replacing the Picard orbit with the Jungck–DK orbit. To address this, we follow a specific procedure.
Let Q c : C C be a polynomial function. We can break down Q c into two mappings, U and V , such that Q c = V U and U is an injective function. In addition to this reconstruction, a new escape criterion for the mappings and Equation (32) must also be derived.
The escape criterion for a specific class of polynomials, namely z p a z + c , can be presented as follows.
Let Q c = z p a z + c , where p 2 , 3 , 4 , and a , c C . To reconstruct Q c , we define U ( z ) = a z and V ( z ) = z p + c .
Theorem 5.
Assume that | z | | c | > ( 2 1 + | a | 1 ) 1 p 1 ,   | z | | c | > ( 2 ( 1 + | a | ) ϱ 1 ) 1 p 1 , and | z | | c | > ( 2 ( 1 + | a | ρ 1 ) 1 p 1 , where ρ , ϱ ( 0 , 1 ] . Define { z n } n N as above in (32), where z 0 = z ; then | z n | as n .
Proof. 
Since V ( z ) = z p + c , U ( z ) = a z and z 0 = z , we have
| U w 0 | = V z 0 | z p + c | | z p | | c | | z p | | z | | z | ( | z | p 1 1 ) | a w | | z | ( | z | p 1 1 ) | w | | z | ( | z | p 1 | a | 1 ) | w | | z | , because | z | | c | > ( 2 1 + | a | 1 ) 1 p 1 | z | p 1 | a | 1 > 1 .
Now,
| U v 0 | = | ( 1 ϱ ) U w 0 + ϱ V z 0 | | ( 1 ϱ ) a z + ϱ ( z p + c ) | | ( 1 ϱ ) a z + ϱ z p | | c | .
As 1 ϱ 0 , | z | p ( | z | p 1 | a | 1 ) p | z | p . Hence, | w 0 | p > | z | p ( | z | p 1 | a | 1 ) p | z | p implies that
| a v 0 | | a z + ϱ | | z | p | z | | z | | c | | a | | v 0 | ϱ | z | p | a | | z | | z | | v 0 | | z | ( ϱ | z | p 1 1 + | a | 1 ) 1 + | a | 1 | v | | z | .
Since | z | | c | > ( 2 ( 1 + | a | ) 1 ) 1 p 1 and | z | | c | > ( 2 ( 1 + | a | ) ϱ 1 ) 1 p 1 , therefore, | z | ( 2 ( 1 + | a | ) ϱ 1 ) 1 p 1 . Thus, | y 0 | p | z | p ϱ | z | p 1 1 + | a | 1 p | z | p ϱ | z | p , which implies | y | | z | .
In the third step of iteration, we have
| U z 1 | = | ( 1 ρ ) U w 0 + ρ V v 0 | = | ( 1 ρ ) a w 0 + ρ ( y p + c ) | = | ( 1 ρ ) a w 0 + ρ y p + ρ c | ρ | y 0 | p ( 1 ρ ) | a | | w 0 | ρ | c | ρ | z | p ( 1 ρ ) | a | | z | ρ | z | | y | | z | , | w | | z | | c | | a z 1 | ρ | z | p | a | | z | | z | = | z | ρ | z | p 1 ( 1 + | a | ) | z 1 | | z | ρ | z | p 1 1 + | a | 1 .
As | y 0 | | z | and | z | 2 ( 1 + | a | ) ρ 1 p 1 , thus ρ | z | p 1 1 + | a | > 2 . By consequence, we have | z 1 | | z | ρ ϱ | z | p 1 1 + | a | 1 > 1 . Therefore, there exists λ > 0 such that ρ ϱ | z | p 1 1 + | a | 1 > 1 + λ .
Consequently, | z 1 | > ( 1 + λ ) | z | . In particular, | z 1 | > | z | .
Thus, by applying the same argument repeatedly, | z n | > ( 1 + λ ) n | z | . In this way, the orbit of z tends to infinity. Hence, we obtain | z n | as n . □

4.1. Examples

In this section, we demonstrate the Jungck–DK iterative orbit and the escape criterion from Theorem 5 by generating several examples of images from the Mandelbrot and Julia sets. The pictures were made with M a t h e m a t i c a T M ’s implementation of the escape algorithm.

4.1.1. Examples of Mandelbrot Sets in Jungck–DK Orbit

We start with an example outlining how the Jungck–DK iteration can be used. We will use Q c ( z ) = z p + 1 + 1.5 z + c , at p = 1 , 2 , 3 and 4. In Figure 2, Figure 3, Figure 4 and Figure 5, we fix A = [ 2.5 , 2.5 ] 2 and change the parameters ρ and ϱ of iteration. We can observe that varying ρ and ϱ values in the Jungck–DK method has a substantial effect on the shape of the resulting set.

4.1.2. Examples of Julia Sets in Jungck–DK Orbit

In the following example, a Julia set for Q c ( z ) = z p + 1 + 1.5 z + c , at p = 1 , 2 , 3 and 4, is generated using the Jungck–DK iteration. The images were obtained for A = [ 2.5 , 2.5 ] 2 and c = 1.85 i and for different parameters ρ and ϱ . Changing the parameters of the Jungck–DK iteration allows us to obtain different Julia set shapes, as shown in Figure 6, Figure 7, Figure 8 and Figure 9, for the same generating polynomial.
In the second example, various Julia sets generated using the Jungck–DK iteration are presented. The following parameters were utilised in order to generate the images of Julia sets shown in Figure 10 and Figure 11.
(a)
Q c ( z ) = z 2 + 2.32 z + c , c = 1.85 i , A = [ 3.5 , 3.5 ] × [ 3.2 , 3.2 ] , a Jungck–DK iteration with ρ = 0.2 = ϱ .
(b)
Q c ( z ) = z 3 + 3.167 z + c , c = 5 + 6.3 i , A = [ 3.1 , 3.1 ] × [ 3.5 , 3.5 ] , a Jungck–DK iteration with ρ = 0.5 = ϱ .
(c)
Q c ( z ) = z 4 + 3.75 z + c , c = 3.9 7 i , A = [ 2.5 , 2.5 ] 2 , a Jungck–DK iteration with ρ = 0.6 = ϱ .
(d)
Q c ( z ) = z 5 + 5.25 z + c , c = 0.5 + 7 i , A = [ 4.5 , 4.5 ] 2 , a Jungck–DK iteration with ρ = 0.3 = ϱ .
(e)
Q c ( z ) = z 2 + 4.123 z + c , c = 5.2 3.1 i , A = [ 8.5 , 8.5 ] × [ 5.5 , 5.5 ] , a Jungck–DK iteration with ρ = 0.3 , ϱ = 0.7 .
(f)
Q c ( z ) = z 3 + 6.80 z + c , c = 2.2 6.1 , A = [ 6.5 , 6.5 ] 2 , a Jungck–DK iteration with ρ = 0.4 , ϱ = 0.9 .
Using various combinations of the parameters, such as polynomials, Jungck–DK iteration parameters, etc., we are able to generate artistically applicable fractal patterns with a great deal of diversity.

5. Conclusions

In this paper, we propose and analyze the Jungck–DK iterative scheme for approximating fixed points. Our main contributions are summarized as follows. Firstly, we demonstrate the stability and faster convergence of the Jungck–DK iterative scheme compared to other Jungck-type schemes, such as the Jungck–CR, Jungck–SP, and Jungck–S schemes. Secondly, we provide a numerical example to illustrate the rate of convergence and prove the data dependence result for the Jungck–DK iterative scheme. Lastly, we apply the Jungck–DK iterative scheme to calculate the escape criteria of polynomial functions, generating distinct images of the Mandelbrot and Julia sets.
Therefore, these fractals have become useful in diverse scientific and engineering applications. Through our analysis of Julia sets, we have found that the size of the explored fractals is dependent on the parameters ρ and ϱ , while the shape and symmetry are influenced by the parameters a and c. Furthermore, as we increase the value of n, the area occupied by the fractals decreases.
Concerning new directions of research, Nandal et al. [35] developed a generalized viscosity approximation method in the context of a Hilbert space, which was applied to a range of problems, such as variational inequalities, convex feasibility problems, and fixed-point problems. These applications demonstrated the versatility and usefulness of the proposed iterative method in fixed-point theory. Building on this, it will be very interesting to explore the potential of this method in generating fractals, particularly Julia and Mandelbrot sets. Moreover, using our iterative method, a new type of viscosity approximation method can be found, which can be used as an effective tool for generating fractals with complex structures.

Author Contributions

Conceptualization, K.A. and K.S.; methodology, L.G. and M.-F.B.; software, K.A.; validation, K.S. and M.-F.B.; formal analysis, K.A.; investigation, K.S.; resources, K.A.; data curation, L.G.; writing–original draft preparation, K.A.; writing–review and editing, L.G.; visualization, M.-F.B.; supervision, K.S. and M.-F.B.; project administration, K.S.; funding acquisition, M.-F.B. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

No available.

Acknowledgments

The publication of this article was supported by AGC Grants of the Babeş-Bolyai University of Cluj-Napoca.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Abbas, M.; Jungck, G. Common fixed point results for noncommuting mappings without continuity in cone metric spaces. J. Math. Anal. Appl. 2008, 341, 416–420. [Google Scholar] [CrossRef]
  2. Bouhadjera, H. A unique common fixed point for contractive mappings under a new concept. In Bulletin of the Transilvania University of Brasov; Series III: Mathematics and Computer Science; Transilvania University Press: Brasov, Romania, 2022; pp. 33–46. [Google Scholar]
  3. Kumar, S.; Aron, D. Common fixed-point theorems for non-linear non-self contractive mappings in convex metric spaces. Topol. Algebra Its Appl. 2023, 11, 20220122. [Google Scholar] [CrossRef]
  4. Chandok, S.; Radenović, S. Existence of solution for orthogonal F-contraction mappings via Picard–Jungck sequences. J. Anal. 2022, 30, 677–690. [Google Scholar] [CrossRef]
  5. Fan, H.; Wang, C. Stability and convergence rate of Jungck-type iterations for a pair of strongly demicontractive mappings in Hilbert spaces. Comput. Appl. Math. 2023, 14, 33. [Google Scholar] [CrossRef]
  6. Maldar, S. An examination of data dependence for Jungck-Type iteration method. Erciyes Üniv. Fen Bilim. Enstitüsü Fen Bilim. Derg. 2020, 36, 374–384. [Google Scholar]
  7. Jamil, Z.Z.; Hussein, Z. Common Fixed Point of Jungck Picard Itrative for Two Weakly Compatible Self-Mappings. Iraqi J. Sci. 2021, 62, 1695–1701. [Google Scholar]
  8. Bosede, A.O. Strong convergence results for the Jungck-Ishikawa and Jungck-Mann iteration processes. Bull. Math. Anal. Appl. 2010, 2, 65–73. [Google Scholar]
  9. Chugh, R.; Kumar, V. Strong Convergence and Stability results for Jungck-SP iterative scheme. Int. J. Comput. Appl. 2011, 36, 40–46. [Google Scholar]
  10. Hussain, N.; Kumar, V.; Kutbi, M.A. On rate of convergence of Jungck-type iterative schemes. Abstr. Appl. Anal. 2013, 2013, 132626. [Google Scholar] [CrossRef]
  11. Berinde, V. On the convergence of the Ishikawa iteration in the class of quasi contractive operators. Acta Math. Univ. Comen. New Ser. 2004, 73, 119–126. [Google Scholar]
  12. Singh, S.L.; Bhatnagar, C.; Mishra, S.N. Stability of Jungck-type iterative procedures. Int. J. Math. Math. Sci. 2005, 19, 3035–3043. [Google Scholar] [CrossRef]
  13. Ostrowski, A.M. The Round-off Stability of Iterations. ZAMM-J. Appl. Math. Mech./Z. Angew. Math. Mech. 1967, 47, 77–81. [Google Scholar] [CrossRef]
  14. Harder, A.M. Fixed Point Theory and Stability Results for Fixed Point Iteration Process. Ph.D.Thesis, University of Missouri-Rolla, Rolla, MO, USA, 1987. [Google Scholar]
  15. Jungck, G. Commuting mappings and fixed points. Am. Math. Mon. 1976, 83, 261–263. [Google Scholar] [CrossRef]
  16. Olatinwo, M.O.; Imoru, C.O. Some convergence results for the Jungck–Mann and the Jungck–Ishikawa iteration processes in the class of generalized Zamfirescu operators. Acta Math. Univ. Comen. New Ser. 2008, 27, 299–304. [Google Scholar]
  17. Olatinwo, M.O. A generalization of some convergence results using the Jungck-Noor three step iteration process in arbitrary Banach space. Fasc. Math. 2008, 40, 37–43. [Google Scholar]
  18. Qing, Y.; Rhoades, B.E. Comments on the rate of convergence between Mann and Ishikawa iterations applied to Zamfirescu operators. Fixed Point Theory Appl. 2008, 2018, 387504. [Google Scholar] [CrossRef]
  19. Jungck, G.; Hussain, N. Compatible maps and invariant approximations. J. Math. Anal. Appl. 2007, 325, 1003–1012. [Google Scholar] [CrossRef]
  20. Osilike, M.O.; Udomene, A. Short proofs of stability results for fixed point iteration procedures for a class of contractive-type mappings. Indian J. Pure Appl. Math. 1999, 30, 1229–1234. [Google Scholar]
  21. Berinde, V.; Takens, F. Iterative Approximation of Fixed Points; Springer: Berlin/Heidelberg, Germany, 2007; Volume 1912. [Google Scholar]
  22. Şoltuz, Ş.M.; Grosan, T. Data dependence for Ishikawa iteration when dealing with contractive-like operators. Fixed Point Theory Appl. 2008, 2008, 242916. [Google Scholar] [CrossRef]
  23. Shirriff, K. Fractals from simple polynomial composite functions. Comput. Graph. 1993, 17, 701–703. [Google Scholar] [CrossRef]
  24. Mandelbrot, B.B. The Fractal Geometry of Nature; WH Freeman: New York, NY, USA, 1982. [Google Scholar]
  25. Fatou, P. Sur les équations fonctionnelles. Bull. Soc. Math. Fr. 1919, 47, 161–271. [Google Scholar] [CrossRef]
  26. Julia, G. Mémoire sur l’itération des fonctions rationnelles. J. Math. Pures Appl. 1918, 8, 47–245. [Google Scholar]
  27. Antal, S.; Tomar, A.; Prajapati, D.J.; Sajid, M. Fractals as Julia sets of complex sine function via fixed point iterations. Fractal Fract. 2021, 5, 272. [Google Scholar] [CrossRef]
  28. Tomar, A.; Kumar, V.; Rana, U.S.; Sajid, M. Fractals as Julia and Mandelbrot Sets of Complex Cosine Functions via Fixed Point Iterations. Symmetry 2023, 15, 478. [Google Scholar] [CrossRef]
  29. Dhurandhar, S.V.; Bhavsar, V.C.; Gujar, U.G. Analysis of z-plane fractal images from z+ c for α<0. Comput. Graph. 1993, 17, 89–94. [Google Scholar]
  30. Gdawiec, K. Fractal patterns from the dynamics of combined polynomial root finding methods. Nonlinear Dyn. 2017, 90, 2457–2479. [Google Scholar] [CrossRef]
  31. Hamada, N.; Kharbat, F. Mandelbrot and Julia Sets of Complex Polynomials Involving Sine and Cosine Functions via Picard–Mann Orbit. Complex Anal. Oper. Theory 2023, 17, 13. [Google Scholar] [CrossRef]
  32. Shahid, A.A.; Nazeer, W.; Gdawiec, K. The Picard–Mann iteration with s-convexity in the generation of Mandelbrot and Julia sets. Monatshefte Math. 2021, 195, 565–584. [Google Scholar] [CrossRef]
  33. Antal, S.; Tomar, A.; Prajapati, D.J.; Sajid, M. Variants of Julia and Mandelbrot sets as fractals via Jungck-Ishikawa fixed point iteration system with s-convexity. AIMS Math. 2022, 7, 10939–10957. [Google Scholar] [CrossRef]
  34. Tanveer, M.; Nazeer, W.; Gdawiec, K. On the Mandelbrot set of zp+ logct via the Mann and Picard–Mann iterations. Math. Comput. Simul. 2023, 209, 184–204. [Google Scholar] [CrossRef]
  35. Nandal, A.; Chugh, R.; Postolache, M. Iteration process for fixed point problems and zeros of maximal monotone operators. Symmetry 2019, 11, 655. [Google Scholar] [CrossRef]
Figure 1. Convergence behaviour of Jungck-type iterative schemes.
Figure 1. Convergence behaviour of Jungck-type iterative schemes.
Fractalfract 07 00418 g001
Figure 2. Mandelbrot sets for the parameters ρ = 0.01 and ϱ = 0.2 .
Figure 2. Mandelbrot sets for the parameters ρ = 0.01 and ϱ = 0.2 .
Fractalfract 07 00418 g002
Figure 3. Mandelbrot sets for the parameters ρ = 0.3 and ϱ = 0.6 .
Figure 3. Mandelbrot sets for the parameters ρ = 0.3 and ϱ = 0.6 .
Fractalfract 07 00418 g003
Figure 4. Mandelbrot sets for the parameters ρ = 0.5 and ϱ = 0.4 .
Figure 4. Mandelbrot sets for the parameters ρ = 0.5 and ϱ = 0.4 .
Fractalfract 07 00418 g004
Figure 5. Mandelbrot sets for the parameters ρ = 0.9 and ϱ = 0.09 .
Figure 5. Mandelbrot sets for the parameters ρ = 0.9 and ϱ = 0.09 .
Fractalfract 07 00418 g005
Figure 6. Julia sets for the parameters ρ = 0.01 and ϱ = 0.2 .
Figure 6. Julia sets for the parameters ρ = 0.01 and ϱ = 0.2 .
Fractalfract 07 00418 g006
Figure 7. Julia sets for the parameters ρ = 0.3 and ϱ = 0.6 .
Figure 7. Julia sets for the parameters ρ = 0.3 and ϱ = 0.6 .
Fractalfract 07 00418 g007
Figure 8. Julia sets for the parameters ρ = 0.5 and ϱ = 0.4 .
Figure 8. Julia sets for the parameters ρ = 0.5 and ϱ = 0.4 .
Fractalfract 07 00418 g008
Figure 9. Julia sets for the parameters ρ = 0.9 and ϱ = 0.09 .
Figure 9. Julia sets for the parameters ρ = 0.9 and ϱ = 0.09 .
Fractalfract 07 00418 g009
Figure 10. Julia sets for different parameters, e.g., polynomials, area, and values of c, ρ , and ϱ .
Figure 10. Julia sets for different parameters, e.g., polynomials, area, and values of c, ρ , and ϱ .
Fractalfract 07 00418 g010
Figure 11. Julia sets for different parameters, e.g., polynomials, area, and values of c, ρ , and ϱ .
Figure 11. Julia sets for different parameters, e.g., polynomials, area, and values of c, ρ , and ϱ .
Fractalfract 07 00418 g011
Table 1. Convergence of various Jungck-type schemes to the coincidence point u * = 9 = V 3 = U 3 , u 0 = 2 , ρ n = ϱ n = 1 2 n + 1 .
Table 1. Convergence of various Jungck-type schemes to the coincidence point u * = 9 = V 3 = U 3 , u 0 = 2 , ρ n = ϱ n = 1 2 n + 1 .
nJungck–Mann
Iterative Scheme
Jungck–Ishikawa
Iterative Scheme
Jungck–Noor
Iterative Scheme
Jungck–CR
Iterative Scheme
Jungck–DK
Iterative Scheme
V u n U u n u n + 1 V u n U u n u n + 1 V u n U u n u n + 1 V u n U u n u n + 1 V u n U u n u n + 1
07.000004.000002.394177.000004.000002.487417.000004.000002.508967.000004.000002.834747.000004.000002.95956
17.788345.732052.579087.974826.187202.669468.017916.294862.687228.669498.035782.966288.919128.759002.99051
28.158166.651652.687208.338927.126012.765568.374447.221162.779528.932558.798792.992388.981028.943152.99740
38.374417.221062.757818.531137.648352.824498.559037.725712.835568.984768.954352.998178.994808.984412.99924
48.515627.605512.807128.648987.977742.863848.671118.040392.872768.996348.989032.999548.998488.995442.99976
58.686338.083582.870408.783288.361572.912078.745538.252772.898948.999088.997252.999888.999528.998562.99993
68.740808.239212.891528.824148.480152.927548.797878.403842.918128.999768.999292.999978.999868.999582.99998
78.783038.360862.908228.855098.570512.939548.836248.515412.932618.999948.999812.999998.999968.999883.00000
88.816438.457722.921648.879088.640902.949028.865228.600212.943838.999988.999953.000008.999988.999983.00000
98.843288.535992.932598.898048.696732.956638.887668.666122.952689.000008.999993.000009.000009.000003.00000
108.686338.083582.870408.783288.361572.962078.905368.718312.959779.000009.000003.000009.000009.000003.00000
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Guran, L.; Shabbir, K.; Ahmad, K.; Bota, M.-F. Stability, Data Dependence, and Convergence Results with Computational Engendering of Fractals via Jungck–DK Iterative Scheme. Fractal Fract. 2023, 7, 418. https://doi.org/10.3390/fractalfract7060418

AMA Style

Guran L, Shabbir K, Ahmad K, Bota M-F. Stability, Data Dependence, and Convergence Results with Computational Engendering of Fractals via Jungck–DK Iterative Scheme. Fractal and Fractional. 2023; 7(6):418. https://doi.org/10.3390/fractalfract7060418

Chicago/Turabian Style

Guran, Liliana, Khurram Shabbir, Khushdil Ahmad, and Monica-Felicia Bota. 2023. "Stability, Data Dependence, and Convergence Results with Computational Engendering of Fractals via Jungck–DK Iterative Scheme" Fractal and Fractional 7, no. 6: 418. https://doi.org/10.3390/fractalfract7060418

Article Metrics

Back to TopTop