Skip to main content

Iterative methods for the split common fixed point problem in Hilbert spaces

Abstract

The split common fixed point problem is an inverse problem that consists in finding an element in a fixed point set such that its image under a bounded linear operator belongs to another fixed point set. Recently Censor and Segal proposed an efficient algorithm for solving such a problem. However, to employ their algorithm, one needs to know prior information on the norm of the bounded linear operator. In this paper we propose a new algorithm that does not need any prior information of the operator norm, and we establish the weak convergence of the proposed algorithm under some mild assumptions.

MSC:47J25, 47J20, 49N45, 65J15.

1 Introduction

There has been growing interest in recent years in the split feasibility problem (SFP) [1]. The SFP is very useful in dealing with problems in signal processing and image reconstruction [2], especially in intensity-modulated radiation therapy [3]. Mathematically, the SFP is an inverse problem that consists in finding x ˆ with the property

x ˆ C,s.t.A x ˆ Q,
(1.1)

where H and K are two Hilbert spaces, C and Q are nonempty closed convex subsets of H and K, respectively, and A:HK is a bounded linear operator. In particular, if C and Q are composed of the fixed point sets of some nonlinear operators, then problem (1.1) is known as the split common fixed point problem (SCFP). More specifically, the SCFP consists in finding

xFix(U),s.t.AxFix(T),
(1.2)

where Fix(U) and Fix(T) stand for, respectively, the fixed point sets of U:HH and T:KK.

One method solving the SFP is Byrne’s CQ algorithm [4], which generates a sequence ( x n ) by the recursive procedure:

x n + 1 = P C ( x n ρ n A ( I P Q ) A x n ) ,
(1.3)

where ρ n is known as the step, and P C , P Q are the orthogonal projections onto C and Q, respectively. When C and Q are simple in the sense that the associated projections are easily calculated, for example the half space, then the CQ algorithm is efficient to solve the problem. However, if C and Q are complex sets, for example the fixed point sets, the efficiency of the CQ algorithm will be affected because the projections onto such convex sets are generally hard to be accurately calculated. Alternatively, Censor and Segal [5] introduced the iterative scheme

x n + 1 =U ( I ρ n A ( I T ) A ) x n
(1.4)

solving problem (1.2) for directed operators. Subsequently, this algorithm was extended to the case of quasi-nonexpansive [6] operators, demicontractive operators [7], and finitely many directed operators [8].

Let us now consider the SCFP (1.2) whenever U and T are directed operators. Then, if the step ( ρ n ) is chosen as

0< ρ n ρ< 2 A 2 ,

algorithm (1.4) converges to a solution to problem (1.2) whenever such a solution exists. However, in order to implement this algorithm, one has first to compute (or, at least, estimate) the norm of A, which is in general not an easy work in practice. A natural question thus arises: Does there exist a way to select the step ρ n in algorithm (1.4) that does not depend on the operator norm A?

It is the purpose of this paper to answer the above question affirmatively. By introducing a new way of selections of the step, we obtain a method in a way that the implementation of algorithm (1.4) does not need any prior information of the operator norm. By using the Fejér monotonicity, we state the weak convergence of the new algorithm for demicontractive operators. Particular cases such as quasi-nonexpansive and directed operators are also considered.

2 Preliminary and notation

Throughout, let I denote the identity operator, Fix(T) denote the set of the fixed points of an operator T, and let ω w ( x n ) denote the set of weak cluster points of the sequence ( x n ). The notation ‘→’ stands for strong convergence and ‘’ stands for weak convergence. Given a nonempty closed convex subset Q in K, let us define

A 1 (Q):={xH:AxQ},

where A:HK is a linear bounded operator.

Definition 2.1 Assume T:HH is a nonlinear operator. Then IT is saide to be demiclosed at zero, if, for any ( x n ) in H, the following implication holds:

x n x ( I T ) x n 0 ] xFix(T).

It is well known that nonexpansive operators are demiclosed at zero (cf. [9]). Recall that an operator T:HH is called nonexpansive if TxTyxy, x,yH.

Definition 2.2 Let T:HH be an operator with Fix(T). Then

  1. (i)

    T:HH is called directed if

    zTx,xTx0,zFix(T),xH;
  2. (ii)

    T:HH is called quasi-nonexpansive if

    Txzxz,zFix(T),xH;
  3. (iii)

    T:HH is called τ-demicontractive with τ<1, if

    T x z 2 x z 2 +τ ( I T ) x 2 ,zFix(T),xH,

or equivalently

xz,Txx τ 1 2 x T x 2 ,zFix(T),xH.
(2.1)

A typical example of a directed operator is an orthogonal projection P C from H onto a nonempty closed convex subset CH defined by

P C x:= arg min y C x y 2 ,xH.
(2.2)

It is well known that the projection P C is characterized by

P C xC,x P C x,z P C x0,zC.
(2.3)

Given a sequence ( x n ) in H, then ( x n ) is called Fejér monotone with respect to C, if

x n + 1 c x n c,n,cC.

The sequence with Fejér monotonicity has the following property.

Lemma 2.3 [10]

If the sequence ( x n ) is Féjer monotone w.r.t. a nonempty closed convex subset C, then { P C x n } converges strongly; moreover,

x n x C ω w ( x n )C.

Lemma 2.4 If U:HH is κ-demicontractive, then

U λ x z 2 x z 2 λ(1κλ) ( I U ) x 2 ,
(2.4)

where xH, zFix(U), and U λ :=(1λ)I+λU (0<λ<1κ).

Proof First we deduce that

U λ x z 2 = ( x z ) + λ ( U x x ) 2 = x z 2 + 2 λ U x x , x z + λ 2 U x x 2 ,

and using inequality (2.1) we have

2λUxx,xzλ(κ1) U x x 2 .

Adding up these two formulas yields

U λ x z 2 x z 2 λ(1κλ) U x x 2 ,

which is the inequality as desired. □

Lemma 2.5 Let A:HK be a bounded linear operator and T:KK a τ-demicontractive operator with τ<1. If A 1 (Fix(T)) is nonempty, then

(IT)Ax=0 A (IT)Ax=0,xH.

Proof It is clear that (IT)Ax=0 A (IT)Ax=0, xH. To see the converse, let xH such that A (IT)Ax=0. Taking z A 1 (Fix(T)),

1 τ 2 ( I T ) A x 2 ( I T ) A x , A x A z = A ( I T ) A x , x z = 0 ,

where the inequality follows from (2.1), so that Ax=T(Ax). Hence the proof is complete. □

Lemma 2.6 Let A:HK be a bounded linear operator and T:KK a τ-demicontractive operator with τ<1. If A 1 (Fix(T)), then

x ρ A ( I T ) A x z 2 x z 2 ( 1 τ ) 2 4 ( I T ) A x 4 A ( I T ) A x 2 ,
(2.5)

where xH, AxT(Ax), z A 1 (Fix(T)) and

ρ:= ( 1 τ ) ( I T ) A x 2 2 A ( I T ) A x 2 .

Proof Take xH, AxT(Ax). Then from the previous lemma ρ is well defined. Since T is τ-demicontractive,

x ρ A ( I T ) A x z 2 = x z 2 2 ρ A ( I T ) A x , x z + ρ 2 A ( I T ) A x 2 = x z 2 2 ρ ( I T ) A x , A x A z + ρ 2 A ( I T ) A x 2 x z 2 ( 1 τ ) ρ ( I T ) A x 2 + ρ 2 A ( I T ) A x 2 = x z 2 ( 1 τ ) 2 4 ( I T ) A x 4 A ( I T ) A x 2 ,

where the inequality follows from (2.1). □

3 A new iterative algorithm

Let us first consider the SCFP (1.2) for demicontractive operators. More specifically, we make use of the following assumptions:

  • U:HH is κ-demicontractive with κ<1;

  • T:KK is τ-demicontractive with τ<1;

  • both IU and IT are demiclosed at zero;

  • it is consistent, i.e., its solution set, denoted by S, is nonempty.

Under these conditions, we propose the following algorithm.

Algorithm 3.1 Choose 0<λ<1τ and an initial guess x 0 H arbitrarily. Assume that the n th iterate x n has been constructed; then calculate the (n+1)th iterate x n + 1 via the formula:

x n + 1 = U λ ( x n ρ n A ( I T ) A x n ) ,

where the step ρ n is chosen in such a way that

ρ n := { ( 1 τ ) ( I T ) A x n 2 2 A ( I T ) A x n 2 , A x n T ( A x n ) ; 0 , otherwise .

Remark 3.2 By Lemma 2.5, we see that A x n =T(A x n ) if and only if A (IT)A x n =0. So Algorithm 3.1 is well defined.

Theorem 3.3 Let ( x n ) be the sequence generated by Algorithm 3.1. Then ( x n ) converges weakly to a solution x S.

Proof First we verify that ( x n ) is Féjer-monotone w.r.t. S. To see this, let y n := x n ρ n A (IT)A x n and fix zS. For the case ρ n =0, we have y n = x n and by (2.4)

x n + 1 z 2 = U λ x n z 2 x n z 2 λ(1κλ) ( I U ) x n 2 ,
(3.1)

which implies x n + 1 z x n z because 0<λ<1κ. For the case ρ n 0, we deduce from (2.4)-(2.5) that

x n + 1 z 2 = U λ y n z 2 y n z 2 λ ( 1 κ λ ) ( I U ) y n 2 = x n ρ n A ( I T ) A x n z 2 λ ( 1 κ λ ) ( I U ) y n 2 x n z 2 ( 1 τ ) 2 4 ( I T ) A x n 4 A ( I T ) A x n 2 λ ( 1 κ λ ) ( I U ) y n 2 .
(3.2)

Hence we have shown in both cases that x n + 1 z x n z. Consequently ( x n ) is Féjer-monotone w.r.t. S and ( x n z 2 ) is therefore a convergent sequence.

We next show the following facts:

( I T ) A x n 0, ( I U ) x n 0,as n.
(3.3)

If ρ n =0, it is clear that (IT)A x n =0, and in view of (3.1)

λ(1κλ) ( I U ) x n 2 ( x n z 2 x n + 1 z 2 ) 0,

because ( x n z 2 ) is convergent. Otherwise, it follows from (3.2) that

λ(1κλ) ( I U ) y n 2 ( x n z 2 x n + 1 z 2 ) 0

and

( 1 τ ) 2 4 ( I T ) A x n 4 A ( I T ) A x n 2 ( x n z 2 x n + 1 z 2 ) 0.

This implies that (IU) y n 0 and

( I T ) A x n 2 A ( I T ) A x n 0,

so that

1 A ( I T ) A x n = ( I T ) A x n ( I T ) A x n A ( I T ) A x n ( I T ) A x n ( I T ) A x n A ( I T ) A x n = ( I T ) A x n 2 A ( I T ) A x n 0 ,

and also that

x n y n = ρ n A ( I T ) A x n = 1 τ 2 ( I T ) A x n 2 A ( I T ) A x n 0.

Having in mind that (IU) y n 0, we conclude that (IU) x n 0. Consequently (3.3) holds in both cases.

Finally, we show that ( x n ) converges weakly to x S. By Lemma 2.3, it remains to show that ω w ( x n )S. To see this let x ˆ ω w ( x n ) and let { x n k } be a subsequence of ( x n ) converging weakly to x ˆ . By noting that (IU) x n k 0, we then make use of the demiclosedness of IU at zero to deduce that x ˆ Fix(U); on the other hand, since, by weak continuity of A, A x n k converges weakly to A x ˆ and (IT)A x n k 0, this, together with the demiclosedness of IT at zero, yields A x ˆ Fix(T). Altogether x ˆ S, and therefore the proof is complete. □

Remark 3.4 By Lemmas 2.3, we see that the weak limit x of the sequence ( x n ) generated by Algorithm 3.1 coincides with the limit of the sequence ( P S x n ), that is, x = lim n P S x n . In fact, let x ˆ be the strong limit of the sequence ( P C x n ). It follows from (2.3) that

x n P C x n , x P C x n 0.
(3.4)

Noting that x n P C x n x x ˆ and x P C x n x x ˆ , we obtain by sending n in (3.4)

x x ˆ 2 = x x ˆ , x x ˆ 0.

Hence, x = x ˆ and therefore x = lim n P S x n .

4 Some special cases

4.1 The case for quasi-nonexpansive operators

Consider now the SCFP (1.2) under the following assumptions:

  • U:HH and T:KK are both quasi-nonexpansive;

  • both IU and IT are demiclosed at zero;

  • it is consistent, i.e., its solution set, denoted by S, is nonempty.

Since every quasi-nonexpansive operator is clearly 0-demicontractive, we can state the following result by using Algorithm 3.1.

Algorithm 4.1 Choose 0<λ<1 and an initial guess x 0 H arbitrarily. Assume that the n th iterate x n has been constructed; then calculate the (n+1)th iterate x n + 1 via the formula:

x n + 1 = U λ ( x n ρ n A ( I T ) A x n ) ,
(4.1)

where the step ρ n is chosen in such a way that

ρ n := { ( I T ) A x n 2 2 A ( I T ) A x n 2 , A x n T ( A x n ) ; 0 , otherwise .
(4.2)

Corollary 4.2 Let ( x n ) be the sequence generated by Algorithm 4.1. Then ( x n ) converges weakly to a solution x S.

4.2 The case for directed operators

Let us consider the SCFP (1.2) under the following assumptions:

  • U:HH and T:KK are both directed;

  • IU and IT are both demiclosed at zero;

  • it is consistent, i.e., its solution set, denoted by S, is nonempty.

A simple calculation shows that every directed operator is −1-demicontractive. Thus we can state the following result by using Algorithm 3.1.

Algorithm 4.3 Choose an initial guess x 0 H arbitrarily. Assume that the n th iterate x n has been constructed; then calculate the (n+1)th iterate x n + 1 via the formula:

x n + 1 =U ( x n ρ n A ( I T ) A x n ) ,

where the step ρ n is chosen in such a way that

ρ n := { ( I T ) A x n 2 A ( I T ) A x n 2 , A x n T ( A x n ) ; 0 , otherwise .

Corollary 4.4 Let ( x n ) be the sequence generated by Algorithm 4.3. Then ( x n ) converges weakly to a solution x S.

Remark 4.5 Algorithm 4.3 covers the algorithm studied in [11] for solving the SFP. One can further apply the above result to the split variational inequality problem [12, 13] and the split common null point problem [14].

References

  1. Censor Y, Elfving T: A multiprojection algorithms using Bregman projection in a product space. Numer. Algorithms 1994, 8: 221–239. 10.1007/BF02142692

    Article  MathSciNet  MATH  Google Scholar 

  2. Byrne C: A unified treatment of some iterative algorithms in signal processing and image reconstruction. Inverse Probl. 2004, 18: 103–120.

    Article  MathSciNet  MATH  Google Scholar 

  3. Censor Y, Bortfeld T, Martin B, Trofimov A: A unified approach for inversion problems in intensity-modulated radiation therapy. Phys. Med. Biol. 2006, 51: 2353–2365. 10.1088/0031-9155/51/10/001

    Article  Google Scholar 

  4. Byrne C: Iterative oblique projection onto convex sets and the split feasibility problem. Inverse Probl. 2002, 18: 441–453. 10.1088/0266-5611/18/2/310

    Article  MathSciNet  MATH  Google Scholar 

  5. Censor Y, Segal A: The split common fixed point problem for directed operators. J. Convex Anal. 2009, 16: 587–600.

    MathSciNet  MATH  Google Scholar 

  6. Moudafi A: A note on the split common fixed-point problem for quasi-nonexpansive operators. Nonlinear Anal. 2011, 74(12):4083–4087. 10.1016/j.na.2011.03.041

    Article  MathSciNet  MATH  Google Scholar 

  7. Moudafi A: The split common fixed point problem for demicontractive mappings. Inverse Probl. 2010., 26: Article ID 055007

    Google Scholar 

  8. Wang F, Xu HK: Cyclic algorithms for split feasibility problems in Hilbert spaces. Nonlinear Anal. 2011, 74: 4105–4111. 10.1016/j.na.2011.03.044

    Article  MathSciNet  MATH  Google Scholar 

  9. Goebel K, Kirk WA 28. In Topics in Metric Fixed Point Theory. Cambridge University Press, Cambridge; 1990.

    Chapter  Google Scholar 

  10. Bauschke HH, Borwein JM: On projection algorithms for solving convex feasibility problems. SIAM Rev. 1996, 38: 367–426. 10.1137/S0036144593251710

    Article  MathSciNet  MATH  Google Scholar 

  11. López G, Martín-Márquez V, Wang F, Xu H-K: Solving the split feasibility problem without prior knowledge of matrix norms. Inverse Probl. 2012., 28: Article ID 085004

    Google Scholar 

  12. Censor Y, Gibali A, Reich S: Algorithms for the split variational inequality problem. Numer. Algorithms 2012, 59(2):301–323. 10.1007/s11075-011-9490-5

    Article  MathSciNet  MATH  Google Scholar 

  13. Moudafi A: Split monotone variational inclusions. J. Optim. Theory Appl. 2011, 150: 275–283. 10.1007/s10957-011-9814-6

    Article  MathSciNet  MATH  Google Scholar 

  14. Byrne C, Censor Y, Gibali A, Reich S: The split common null point problem. J. Nonlinear Convex Anal. 2011, 13: 759–775.

    MathSciNet  Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (Grant Nos. 11301253, 11271112).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fenghui Wang.

Additional information

Competing interests

The authors declare that they have no competing interests.

Authors’ contributions

All authors contributed equally to the writing of this paper. All authors read and approved the final manuscript.

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Cui, H., Wang, F. Iterative methods for the split common fixed point problem in Hilbert spaces. Fixed Point Theory Appl 2014, 78 (2014). https://doi.org/10.1186/1687-1812-2014-78

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1687-1812-2014-78

Keywords