ARS MATHEMATICA CONTEMPORANEA Volume 11, Number 1, Fall/Winter 2016, Pages 1-229 Covered by: Mathematical Reviews Zentralblatt MATH COBISS SCOPUS Science Citation Index-Expanded (SCIE) Web of Science ISI Alerting Service Current Contents/Physical, Chemical & Earth Sciences (CC/PC & ES) The University of Primorska The Society of Mathematicians, Physicists and Astronomers of Slovenia The Institute of Mathematics, Physics and Mechanics The publication is partially supported by the Slovenian Research Agency from the Call for co-financing of scientific periodical publications. ARS MATHEMATICA CONTEMPORANEA PETRA ŠPARL (1975-2016) Petra Spari passed away on 21st August 2016 after an unfair battle against severe cancer. She fought the cancer with incredible courage for over a year, and those who knew her sincerely hoped that she would be among the few who might overcome the disease. She left two children, Alja and Žiga, aged 14 and 12. Petra studied mathematics at the University of Maribor, where she received her bachelor's degree in 1998, her MASc in 2001, and her PhD degree in 2005. In her thesis, Petra developed an algorithm for multicolouring on a special class of graphs, called hexagonal graphs, and this is still achieving the best approximation bound among 2-local algorithms. During her PhD studies she taught at the Faculty of Civil Engineering, and while she was writing her PhD thesis, she was also involved in renovating the mathematical curricula for civil engineering students, and introducing some fresh topics in discrete mathematics. Soon after completing her PhD, Petra joined the Faculty of Organisational Sciences, where she was immediately asked (with some urgency) to develop the curricula for mathematical subjects. At the same time, she started a successful collaboration with colleagues in the new Faculty, which resulted in several publications on several different topics. Graph theory remained one of her major research interests. For example, in December 2015 she was working on the final version of her last paper, on matching in hexagonal graphs [1]. This year Petra co-authored a paper in Ars Mathematica Contemporanea, which initiated the study of multicolourings of 3D-analogues of planar hexagonal graphs [2]. The motivation for the studying multicolourings of hexagonal graphs is derived from the recently very popular problems of channel assignment, which have appeared in wireless networking. Petra loved to see the successful application of serious mathematics. She also had the necessary energy and skills to bring mathematics closer to engineering students. Petra was at the peak of her potential when she had to start a fight for her life. Who knows what more she would have achieved if she had not left us so young. I am very proud that Petra was my PhD student. Janez Žerovnik References [1] R. Erveš and P. Šparl, Maximum Induced Matching of Hexagonal Graphs, Bull. Malays. Math. Sci. Soc. 39 (2016), 283-295. [2] P. Šparl, R. Witkowski and J. Žerovnik, Multicoloring of cannonball graphs, Ars Math. Contemp. 10 (2016), 31-44. iii ARS MATHEMATICA CONTEMPORANEA 8ECM The Eighth European Congress of Mathematics (8ECM) will take place in Portorož, Slovenia, the week 5-11 July 2020 (see http://www.8ecm.si/). The ECM is the quadrennial congress of the European Mathematical Society. The 8ECM will be not only a great opportunity for Slovenia (and for the University of Primorska in particular) to showcase its mathematical achievements, but also a wonderful chance for authors, referees and editors of our journal to present work at its best. This can be done through posters, contributed talks, mini symposia and satellite conferences. Here is the chronology of the European Congresses of Mathematics: Paris (1992), Budapest (1996), Barcelona (2000), Stockholm (2004), Amsterdam (2008), Krakow (2012), Berlin (2016) ... and now Portorož (2020). The list is impressive, and we are quite honoured to be in such good company. Also we are grateful to everyone who supported our bid to host the 8th ECM. There is only one problem we foresee, namely persuading members of the AMC community to take part in the Congress. Of course many of us prefer to attend more specialised conferences and workshops, where one can enjoy some really good and interesting talks and the company of many mathematicians with similar interests. But the 8ECM offers something special, in terms of a wider programme, plenary lectures by leading and upcoming mathematicians across a range of fields, and a spectacular Adriatic venue! An important task of those of us involved with the organisation of the 8ECM is to make the Congress friendly and welcoming for mathematics communities like that of AMC. We are confident that our experience in organising numerous mathematical conferences and workshops is giving us the necessary skills to perform this task. Even so, it will be a great challenge. Klavdija Kutnar Associate Editor Dragan Marušic and Tomaž Pisanski Editors In Chief v ARS MATHEMATICA CONTEMPORANEA Contents The Cartesian product of graphs with loops Tetiana Boiko, Johannes Cuno, Wilfried Imrich, Florian Lehner, Christiaan E. van de Woestijne.............................. 1 Spectral centrality measures in temporal networks Selena Praprotnik, Vladimir Batagelj..................... 11 Z3-connectivity of Ki,3-free graphs without induced cycle of length at least 5 Xiangwen Li, Jianqing Ma.......................... 35 Finite two-distance-transitive graphs of valency 6 Wei Jin, Li Tan................................49 Spherical folding tessellations by kites and isosceles triangles IV Catarina Avelino, Altino Santos ....................... 59 Distinguishing graphs by total colourings Rafal Kalinowski, Monika Pilsniak, Mariusz WoZniak............79 Accola theorem on hyperelliptic graphs Maxim P. Limonov..............................91 A note on automorphisms of halved Cayley graphs of Coxeter systems MarkPankov.................................101 Involutes of polygons of constant width in Minkowski planes Marcos Craizer, Horst Martini........................107 Two-arc-transitive two-valent digraphs of certain orders Primož Potočnik, Katja BerciC........................127 Testing whether the lifted group splits Rok Požar...................................147 On factorisations of complete graphs into circulant graphs and the Oberwolfach problem Brian Alspach, Darryn Bryant, Daniel Horsley, Barbara Maenhaut, Victor Scharaschkin.................................157 The 2A-Majorana representations of the Harada-Norton group Clara Franchi, Alexander A. Ivanov, Mario Mainardis............175 On colour-preserving automorphisms of Cayley graphs Ademir Hujdurovic, Klavdija Kutnar, Dave Witte Morris, Joy Morris .... 189 Geometric point-circle pentagonal geometries from Moore graphs Klara Stokes, Milagros Izquierdo.......................215 Volume 11, Number 1, Fall/Winter 2016, Pages 1-229 vii ARS MATHEMATICA CONTEMPORANEA Also available at http://amc-journal.eu ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 11 (2016) 1-9 The Cartesian product of graphs with loops Tetiana Boiko * Institut für Mathematische Strukturtheorie, Technische Universität Graz Steyrergasse 30/III, 8010 Graz, Austria Johannes Cuno * Institut fur Mathematische Strukturtheorie, Technische Universitat Graz Steyrergasse 30/III, 8010 Graz, Austria Wilfried Imrich * Department Mathematik und Informationstechnologie Montanuniversitat Leoben, Franz-Josef-Straße 18, 8700 Leoben, Austria Florian Lehner * Institut fur Geometrie, Technische Universitat Graz Kopernikusgasse 24/IV, 8010 Graz, Austria Christiaan E. van de Woestijne f Department Mathematik und Informationstechnologie Montanuniversitat Leoben, Franz-Josef-Straße 18, 8700 Leoben, Austria Received 27 August 2014, accepted 30 October 2014, published online 6 July 2015 We extend the definition of the Cartesian product to graphs with loops and show that the Sabidussi-Vizing unique factorization theorem for connected finite simple graphs still holds in this context for all connected finite graphs with at least one unlooped vertex. We also prove that this factorization can be computed in O(m) time, where m is the number of edges of the given graph. Keywords: Graphs, monoids, factorizations, algorithms. Math. Subj. Class.: 05C70, 13A05, 20M13, 05C85. * Tetiana Boiko, Johannes Cuno, Wilfried Imrich, and Florian Lehner are supported by the Austrian Science Fund (FWF): W1230, Doctoral Program "Discrete Mathematics." t Christiaan E. van de Woestijne is supported by the Austrian Science Fund (FWF): S9611. This project is part of the Austrian National Research Network "Analytic Combinatorics and Probabilistic Number Theory." E-mail ¡addresses: boiko@math.tugraz.at (Tetiana Boiko), cuno@math.tugraz.at (Johannes Cuno), imrich@unileoben.ac.at (Wilfried Imrich), f.lehner@tugraz.at (Florian Lehner), c.vandewoestijne@unileoben.ac.at (Christiaan E. van de Woestijne) Abstract ©® This work is licensed under http://creativecommons.org/licenses/by/3.0/ 2 Ars Math. Contemp. 11 (2016) 11-33 1 Introduction This paper considers finite undirected graphs that may contain loops, or, put differently, symmetric binary relations on finite sets. One may define several binary operations on such graphs; these are explored in the recently revised monograph [1]. The well-known Cartesian product of finite undirected graphs is usually defined only for simple graphs, that is, for graphs that do not contain multiple edges between the same pair of vertices and, more importantly for us, do not contain loops. Here we extend this definition. Before doing so, let us fix the notation. For us, a graph G = (V, E) will always be a finite undirected graph without multiple edges. The edge set E is taken to be a set of ordered pairs of vertices; thus, a loop on the vertex v e V corresponds to the edge (v, v) e E, and as all graphs are undirected, we have (v, w) e E if and only if (w, v) e E. We will occasionally call a loop a 1-edge and an edge that is not a loop a 2-edge. Moreover, given a graph G, we will refer to its vertex set as V (G) and to its edge set as E (G). Definition 1.1. Let Gi,..., Gk be graphs. The Cartesian product G = Gi □ • • • □ Gk is a graph with vertex set V(G) = V(G1) x • • • x V(Gk), and edge set E(G) defined as follows: two vertices (v1,..., vk) e V(G) and (w1,..., wk) e V(G) are adjacent if there exists an index i such that (v^ wj) e E(Gj), and vj = wj for all j = i. Note that this definition extends the classical one for simple graphs. The product graph has a loop on a vertex (v1,..., vk) e V(G) if and only if there is a loop on at least one of the constituents vj e V(Gj). Thus, the distribution of loops (or 1-edges) on the product graph is independent from the distribution of the 2-edges. Definition 1.2. Let G1,..., Gk be graphs, and G = G1 □ • • • □ Gk. The ith projection Pi : V(G) ^ V(Gj) is given by (v1,..., vfc) ^ vj. Using Definition 1.1, we observe the property that the projections pj : V(G) ^ V(Gj) are weak homomorphisms from G to Gj. Recall that a weak homomorphism between graphs G and H is a map ^ : V(G) ^ V(H) such that, whenever (v, w) e E(G), either (y(v), y(w)) e E(H) or <^(v) = y(w). In particular, the presence of loops in G or H does not impose any restriction on a weak homomorphism from G to H. Definition 1.3. Let G1,..., Gk be graphs, and G = G1 □ • • • □ Gk. For every vertex a = (a1,..., ak) e V(G), the Gj-layer through a is the induced subgraph G" = (jx e V (G) | Pj (x) = aj for j = i}> = (j(a1,a2,...,xj,...,ak) | Xj e V(Gj)}>. Note that G" = Gb if and only if pj (a) = pj (b) for each index j = i. With the usual Cartesian product, the restrictions pj|V(G") : V(G") ^ V(Gj) are isomorphisms between G" and Gj [1, Section 4.3]. Under Definition 1.1, we obtain a dichotomy, as follows. Lemma 1.4. Let G1,..., Gk be graphs, and G = G1 □ • • • □ Gk. Then, the following two conditions hold for every vertex a = (a1,..., ak) e V (G) and every i e j1,..., k}: (i) If aj e V (Gj) is unlooped for every j = i, then pj|V (G") : V (G") ^ V (Gj) is an isomorphism between G" and Gj. (ii) Otherwise, G" is isomorphic to Gj with a loop attached to every vertex. Proof. Easy from the definitions. □ T. Boiko et al.: The Cartesian product of graphs with loops 3 2 Matrix and semiring properties From the definition of the Cartesian product we infer that it is commutative and distributive over the disjoint union. Moreover, the trivial graph Ki, that is, a vertex without edges, is a unit. As the Cartesian product is also associative, see below, the set r0 of isomorphism classes of finite undirected graphs with loops is a commutative semiring. To prove associativity we could adapt the proof of [1, Proposition 4.1] for associativity of the Cartesian product of graphs without loops, or we could modify the multiplication table method of [1, Exercise 4.15], which was introduced for the classification of associative products. However, we follow a different path and use the fact that the adjacency matrix A(G □ H) of the Cartesian product of two simple graphs is the Kronecker sum of the adjacency matrices A(G) and A(H) of the factors, see [1, Section 33.3]. Let us first recall that the Kronecker sum A © B of an n x n matrix A by an m x m matrix B is defined as In < B + A < Im. Here, In and Im denote the identity matrices of size n and m, respectively, and P ( Q denotes the Kronecker product. In our situation, the first factor P = (pj) is always an n x n matrix and the Kronecker product is defined by P ( Q PllQ ••• PlnQ PnlQ • • • PnnQ Notice that both the Kronecker sum and the Kronecker product are associative but not commutative. For simple graphs G and H we have A(G □ H) = A(G) © A(H). For graphs with loops we find that the diagonal entries take positive integer values that are not restricted to {0,1}. If we agree on the convention that a positive diagonal entry in the adjacency matrix means a loop, whereas a 0 means no loop, then the product given in Definition 1.1 still corresponds to the Kronecker sum. It follows that, up to isomorphism of graphs, this product is associative. We note in passing that the fact that the Kronecker sum is not commutative does not contradict the commutativity of the Cartesian product: A(G) © A(H) and A(H) © A(G) represent adjacency matrices of G □ H for different vertex numberings. Finally, we briefly call a graph entirely looped if every vertex has a loop. For any graph G, we let N(G) be G with its loops removed. Lemma 2.1. Let G, H, H1, H2 be graphs. Assume that G is entirely looped. Then G □ H is entirely looped as well. Moreover, if N(H1) = N(H2), then G □ H1 = G □ H2. Proof. The first statement follows directly from Definition 1.1. As remarked earlier, the 2-edges of the products G □ H do not depend on the loops of either factor. Thus N(G □ Hi) = N(G) □ N(Hi) = N(G) □ N(H2) = N(G □ H2). Next, we insert the loops on the product; but, as every vertex of G has a loop, it follows that every vertex of either product G □ H has a loop as well, and the two products are obviously isomorphic. □ 4 Ars Math. Contemp. 11 (2016) 11-33 It follows that the subset Too of r0 given by the isomorphism classes of entirely looped graphs constitutes an ideal of the semiring r0. It is obviously closed under the disjoint union and the Cartesian product, and, since the loop K{ is a unit for the Cartesian product inside r00, it is a semiring itself. The loop-removing map N constitutes an isomorphism of semirings between r00 and the set of simple graphs r. 3 Unique factorization One fundamental property of the Cartesian product, proved independently by Sabidussi [5] and Vizing [6] in the 1960s, is the unique factorization of connected simple graphs into irreducibles with respect to this product. We will extend this result to graphs with loops, where we will have to exclude the set of entirely looped graphs (Lemma 2.1 suggests why). Algebraically speaking, we might want to form the quotient semiring r0/r00, so that also any fully looped components in disconnected graphs are annulled. However, since we will only consider connected graphs in what follows, this is not of great consequence. Definition 3.1. A nontrivial, connected graph G with at least one unlooped vertex is called irreducible with respect to the Cartesian product if, for every factorization G = H □ L, either H or L is trivial. Recall that a graph is called trivial if it is a vertex without edges. Consider a nontrivial, connected graph G with at least one unlooped vertex. One can easily check that, if G is not irreducible, it can be expressed as Cartesian product of two factors each of which is, again, a nontrivial, connected graph with at least one unlooped vertex. Iteration of this procedure yields a representation of G as a product of irreducible graphs. It is occasionally called a prime factorization. Another way to prove the existence of a prime factorization is the following: Any factorization of G with a maximum number of nontrivial factors must be a product of irreducible graphs. If G has n vertices, this maximum number is at most log2(n). Our main results are the following. Theorem 3.2. Every nontrivial, connected graph with at least one unlooped vertex has a representation as a product of irreducible graphs with respect to the Cartesian product. The representation is unique up to isomorphisms and the order of the factors. Theorem 3.3. The unique prime factorization with respect to the Cartesian product of a nontrivial, connected graph G with at least one unlooped vertex can be computed in O(m) time, where m is the number of edges of G. To prove Theorem 3.2, we follow the method of [1, Section 6.1], for Theorem 3.3 we extend the ideas of [4]. First, let us define convex subgraphs and boxes. Definition 3.4. A subgraph H of a graph G is convex in G if every shortest path in G that connects two vertices of H is completely contained in H. A subgraph H of a Cartesian product G = Gi □ • • • □ Gk is called a box or subproduct if there are subgraphs H C Gj such that H = Hi □ • • • □ Hk . In order to determine whether a subgraph is convex or not, only the 2-edges need to be concerned. In particular, a subgraph H is convex in G if and only if the subgraph N(H) is convex in N(G). T. Boiko et al.: The Cartesian product of graphs with loops 5 Gi H i < <6 *> > H2 Figure 1: An isomorphism between factored graphs with loops. Lemma 3.5. Let H be a subgraph of a Cartesian product G = G\ □ the following are equivalent: □ Gk. Then (i) H is an induced and convex subgraph of G; (ii) There are induced and convex subgraphs Hi C Gi such that H = Hi □ In other words, H is a box whose factors are induced and convex. □ Hk. Proof. As far as only the 2-edges are concerned, all convex subgraphs are induced and the assertion is Lemma 6.5 of [1]. This means that p1(V(H)) x • • • x pk(V(H)) = V(H). Now, let Hi be the subgraph of Gi induced by pi(V(H)), where i e {1,..., k}. Then the lemma follows by the definition of the Cartesian product. □ As remarked after Definition 3.1 every finite graph has a factorization into irreducibles. Thus we only have to show that it is unique in order to prove Theorem 3.2. The next lemma and its corollary makes this precise; the situation is illustrated in Figure 1. Lemma 3.6. Let < be an isomorphism between nontrivial, connected graphs G and H with at least one unlooped vertex. Assume that G and H are representable as products G = Gi □ • • • □ Gk and H = Hi □ • • • □ H of irreducible graphs. Then k = Í and, for every unlooped vertex a e V (G), there is a permutation n of {1,... ,k} such that <(G?) = H^ for every i e{1,...,k} . Formally, < is a bijection between the vertex sets V(G) and V(H). But since < is a homomorphism of graphs, it induces a well-defined mapping between the edge sets E(G) and E(H). In the above theorem, we slightly abuse notation and denote the image of the subgraph Ga, including vertices and edges, by <(Gf). e V (G), and set (bi, ...,b£) := y>(a). = Hj for every i and j. Every layer G" is Proof. Fix an unlooped vertex a = (ai,... ,ak) By Lemma 1.4 we infer that G" = Gj and Hj(a) = induced and, as a consequence of Lemma 3.5, convex in G. So, its image y(G") is induced and convex in H. Again, as a consequence of Lemma 3.5, f(G") = U\ □ • • • □ Ug, where every Uj is induced and convex in Hj. But y(G") = G" = Gj is irreducible. Since 6 Ars Math. Contemp. 11 (2016) 11-33 (bi,...,be) = ((a) G f(Ga), we conclude that V(Uj) = {bj} for all indices but one, say jip{a) n(i). In other words, f(Ga) C Hri). But then Ga C ) . Because the latter graph is induced and convex, it is a box; and because it is irreducible, it must be contained in Ga. Therefore, f(Ga) = F^. We claim that the map n : {1,..., k} ^ {1,..., 1} is injective. If n(i) = n(j), then ?(Ga) = = HS? = ^(Ga). But ( is an isomorphism, and therefore the above equation implies Ga = Ga. Since every layer contains at least two vertices, we obtain i = j. So, n is injective, and k < I. Repetition of the above argument for yields I < k. So, k = I and n is a permutation. □ Corollary 3.7. Gi = Hn(j) for every i G {1,..., k}. Proof. Since a is unlooped, Gj = Ga and Hj = Hj(a) for every i and j. By Lemma 3.6 the corollary follows. □ Clearly Lemma 3.6 and Corollary 3.7 prove the validity of Theorem 3.2. A remark about automorphisms In Lemma 3.6 the permutation n of {1,..., k} is constructed to a fixed unlooped vertex a G V(G). Actually n is independent of the choice of a, and one can extend Lemma 3.6 to the following description of the automorphisms of G. Theorem 3.8. Suppose ( is an automorphism of a nontrivial, connected graph G with at least one unlooped vertex and prime factorization G = Gi □ • • • □ Gk. Then there are a permutation n of {1,..., k} and isomorphisms (i : Gn(j) ^ Gi for which C(Xl,...,Xfc) = ((i(xn(1)),...,dfc(xn(fc))) . The proof of this theorem can be led on the same lines as that of [1, Theorem 6.10]. Among other consequences this implies that the automorphism group of G is isomorphic to the automorphism group of the disjoint union of the prime factors Gi,..., Gk. 4 Algorithms In this section we present two algorithms for the decomposition of a nontrivial, connected graph G with at least one unlooped vertex into its prime factors. One is straightforward and has complexity O(mn), where m is the number of edges and n the number of vertices of G. The other one is linear in the number of edges of G and depends on the algorithm of Imrich and Peterin [4] for the prime factorization of graphs without loops. Let G = Gi □ • • • □ Gk be the prime factorization of a nontrivial, connected graph G with at least one unlooped vertex. Then also N(G) = N(Gi) □ • • • □ N(Gk). Clearly T. Boiko et al.: The Cartesian product of graphs with loops 7 the graphs N(Gj), i G {1,..., k}, need not be irreducible with respect to the Cartesian product. Let N(Gj) = H^ □ • • • □ H^) be their prime factorizations. Thus k i{i) n (g)=nn Hj,j i=! j = ! is a representation of N(G) as a Cartesian product of irreducible graphs. Because the prime factorization is unique, it is the prime factorization of N(G), up to the order and isomorphisms of the factors. In other words, if Jj J Zj is a prime factorization of N (G), then there is a partition J = J! U • • • U Jk such that N(Gi) = J] j e j Zj. Our task is to find this partition. We begin with a straightforward approach and prove the following lemma. Lemma 4.1. Lei G be a nontrivial, connected graph with at least one unlooped vertex. Then its prime factorization can be found in O(mn) time. Proof. If G has n vertices, then this is also true for N(G), and so the number of factors of N(G), say r, is at most log2(n). This also bounds the size of J and implies that the number s of subsets of J is at most 2log2(n), i. e. s < n. Notice that the factors of N(G) can be found in O(m) time by [4]. Let J!, J2,..., Js be all subsets of J, ordered in such a way that | Ji | < | Jj | whenever 1 < i < j < s. For every i G {1,..., s} set Yj := njeJi Zj and Yj* := njeJ\Ji Zj. Let (Ya)G denote the subgraph of G induced by the layer Yja of Yj through a, and define ((Yj* )a)G analogously. If the partition Jj U (J \ Jj) of J leads to a factorization of G, then (Yja)G is isomorphic to a factor of G. We begin the algorithm by scanning the Jj in the given order. For every Jj and every vertex v G V (G) we consider the projections (v) and (v) into (Yja)G and ((Yj*)a)G. If v = (v!,..., vr), then (v) = (w!,..., wr), where Wj = Vj if j G Jj, and Wj = aj otherwise. Notice that (v) is the vertex of shortest distance from v in (Yja) G. The other projection (v) is defined analogously. Again, (v) is the vertex of shortest distance from v in ((Y*)a)G. Clearly G = (Yja)G □ ((Yj*)a)G if and only if for every vertex v g V(G) the following two conditions are satisfied: 1. If v is unlooped, then both (v) and(v) are unlooped. 2. If v has a loop then at least one of the vertices (v), (v) has a loop. The time necessary to compute (v) and (v) for a given v is proportional to r. As one can check in constant time whether (v) or (v) has a loop, one can check in O(nr) time whether G = (Y/)G □ ((Yj*)a)G'. * Notice that r is the number of factors of N(G), which is also bounded by the minimum degree S of N(G). This is easily seen, since every vertex meets every layer and, in a connected graph, is incident with at least one edge of that layer. Hence the number of factors cannot exceed the degree of any vertex, and nr < nS < m. For a given Jj one can thus check in O(m) time whether (Yja) G is a factor of G. If it is, and if Jj is minimal with respect to inclusion, then it clearly is an irreducible factor. Hence, this is true for the first factor that we encounter, because of having ordered the Jj by size. We now continue the scan, omitting the Jj that are not disjoint from Jj, to find the next factor. Clearly it will also be irreducible. We continue until we have found all irreducible factors. Since there are no more than n subsets of J, we can find them in O(nm) time. □ 8 Ars Math. Contemp. 11 (2016) 11-33 In order to reduce the complexity to O(m), we need some more preparation. So let a be an unlooped vertex of G and L be the levels of a BFS-ordering of the vertices of G with respect to the root a. That is, L consists of all vertices of distance i from a. Furthermore, we enumerate the vertices of G by giving them so-called BFS-numbers that satisfy BFS(v) > BFS(u) if the distance from a to v is larger than the one from a to u. It is important to observe that the projection pYi (v) is a vertex of {Yia)G and always closer to a than v, unless v already is a vertex of {Yia)G, because then pYi (v) = v. Proof of Theorem 3.3. Let f]jeJ Zj be a prime factorization of N(G). We begin with the trivial partition of J and wish to check, whether it already leads to a factorization of G. We scan the vertices v of G in BFS-order and, given v, check the validity of Conditions (i) If v is unlooped, then all pYi (v) are unlooped. (ii) If v has a loop, then at least one of the projections pYi (v) has a loop. If one of these conditions is not satisfied, then the partition of J is obviously inconsistent with the loop structure. In either case we have too many factors and have to make the partition of J coarser. Before we go on, notice that in Li these conditions are trivially satisfied for any partition of J, because all projections pYi (v) are a, except one, which is v. Suppose we arrive at a vertex v where one of the conditions (i) or (ii) is violated for the first time. Assume first that Condition (i) is violated, that is, v is unlooped, but pYi (v) has a loop for an index i. In the end, all projections have to be unlooped. We must combine the set Jj with one or more other sets of the partition. Using the fact that we proceed in BFS-order, it is easy to see that we have to make v a unit layer vertex, that is, we combine all those sets Jj for which pYj (v) = a. Assume now that Condition (ii) is violated, that is, v has a loop, but no pYi (v) does. In the end, at least one of the projections has to have a loop. As above, the only way to achieve this is to make v a unit layer vertex, that is, we combine all factors Jj for which pYj (v) = a. In both cases we arrive at a coarser partition of J than the one we started out with. By associativity of the Cartesian product with loops, we need not recheck the vertices we have already considered and continue in BFS-order. Notice that this process yields a factorization, because both (i) and (ii) are satisfied. For every finer partition of J one of these conditions is violated, hence the factorization is the unique prime factorization we are looking for. Considering the computational cost of these operations, we observe that all projections that we need for the n vertices can be computed, in O(n| J|) time. Since we can check in constant time whether a vertex has a loop or not, the checks for conditions (i) and (ii) can also be done in O(n|J|) time. As |J| < J, we have O(n|J|) = O(nJ) = O(m). Finally, recomputing the partition needs at most O( | J|) time, and this has to be done at most | J| times, so the cost is O(J2). □ 5 Remarks In [2] it was shown that connected set systems, or hypergraphs, as they are called now, also have unique prime factorizations with respect to the Cartesian product if one-element sets, or loops in our terminology, are excluded. Our result also extends to hypergraphs with loops: Connected hypergraphs have unique prime factorization with respect to the Cartesian product, if there is a least one vertex without a loop. Furthermore, the same T. Boiko et al.: The Cartesian product of graphs with loops 9 arguments yield unique prime factorization for connected infinite graphs or hypergraphs with respect to the weak Cartesian product; compare [3]. References [1] R. Hammack, W. Imrich, and S. Klavzar, Handbook of product graphs, Second Edition, Discrete Mathematics and its Applications (Boca Raton), CRC Press, Boca Raton, FL, 2011. [2] W. Imrich, Kartesisches Produkt von Mengensystemen und Graphen, Studia Sci. Math. Hungar. 81 (1967), 285-290. [3] W. Imrich, Über das schwache Kartesische Produkt von Graphen, J. Combinatorial Theory Ser. B 11 (1971), 1-16. [4] W. Imrich and I. Peterin, Recognizing Cartesian products in linear time, Discrete Math. 307 (2007), 472-483. [5] G. Sabidussi, Graph multiplication, Math. Z. 72 (1960), 446-457. [6] V. Vizing, The Cartesian product of graphs (Russian), Vycisl. Sistemy 9 (1963), 30-43. English translation in Comp. El. Syst. 2 (1966), 352-365. ARS MATHEMATICA CONTEMPORANEA Also available at http://amc-journal.eu ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 11 (2016) 11-33 Spectral centrality measures in temporal networks Selena Praprotnik FMF, University of Ljubljana, Jadranska 19, 1000 Ljubljana, Slovenia Vladimir Batagelj * FMF, University of Ljubljana, Jadranska 19, 1000 Ljubljana, Slovenia Received 11 February 2015, accepted 14 April 2015, published online 6 July 2015 In our previous article we defined temporal quantities used for the description of temporal networks with zero latency and we showed that some centrality measures (e.g. degree, betweenness, closeness) can be extended to the case of temporal networks. In this article we broaden the scope of centrality measures in temporal networks to centrality measures derived from the eigenvectors of network matrices, namely the eigenvector in-centrality, the eigenvector out-centrality, the Katz centrality, the Bonacich a and (a, ft)-centrality, the HITS algorithm (also known as Hubs and Authorities) introduced by Kleinberg, and the PageRank algorithm defined by Page and Brin. We extended our Python library TQ (Temporal Quantities) to include the algorithms from our research. The library is available online. The procedures will also be added to the user friendly program called Ianus. We tested the proposed algorithms on Franzosi's violence network and on Corman's Reuter terror news network and show the results. Keywords: Temporal network, semiring, algorithm, network measures, Python library, violence. Math. Subj. Class.: 91D30,16Y60,90B10,68R10. 1 Introduction Many real-life problems can be represented as networks in which the actors are represented with nodes (or vertices) and interactions between the actors are represented with links - arcs or edges, according to the nature of interactions (whether the interactions are directed or *The work was supported in part by the ARRS, Slovenia, grant J5-5537, as well as by a grant within the EURO-CORES Programme EUROGIGA (project GReGAS) of the European Science Foundation. E-mail addresses: selena.praprotnik@fmf.uni-lj.si (Selena Praprotnik), vladimir.batagelj@fmf.uni-lj.si (Vladimir Batagelj) Abstract ©® This work is licensed under http://creativecommons.org/licenses/by/3.0/ 12 Ars Math. Contemp. 11 (2016) 11-33 not). Networks have been widely studied in mathematics, computer science, biology, social sciences and other disciplines. There are many examples of data that have an underlying network structure, such as the Internet, the phone-calls data, the co-authorship graphs, the email graphs, the biological and the chemical networks, the transaction networks, the trade networks, etc. These networks are tipically generated by human activity and often exhibit similar structure. The network analysis has seen an ever increasing research activity in the past years due to the amount of data available and to the global interest in data analysis. See for example [7] and [22]. In the last two decades, there has been an increased interest in temporal network analysis where a time dimension is also considered. The node centrality has been a fundamental tool in the study of social networks since the late 1940s, beginning with the Group Networks Laboratory at MIT directed by Alex Bavelas (see [3], [4], [21]). The node degree is probably the oldest measure of a node's importance in a network. In a network, every node has some measure of influence or importance within the rest of the network and the importance of a node is determined by the structure of the network it belongs to. Centrality measures are designed to rank nodes based on their structural position inside the network and different centrality measures aim to quantitatively measure the importance of a node in the network. Various measures of centrality were employed in different contexts. There is no consensus on what centrality is and there is little agreement on the best way to measure it. It still falls to the network analysts to decide which centrality measure is the most appropriate for the given network and context and to define exactly what the purpose of the computation is. The usual questions that are approximately answered using network centrality measures are - Who are the influential people in a social network? Which roads are most often used? Which web pages are important? In this article, we make a step towards connecting two of the most frequent questions arising in contemporary network analysis: we consider the temporal changes of the cen-tralities of nodes. The paper is organized as follows: in Sections 2 and 3 we review some basic ideas and notations on centrality measures and temporal networks. In Section 4 we present the algorithms for computing the spectral centrality measures, and we give examples on reallife data in Section 5. We conclude with possible directions of future research in Section 6. 2 Centrality Measures and Graph Matrices Let G = (V, L) be a graph with anode set V = {vi, v2,..., vn} and a link set L C V x V. An adjacency matrix A(G) = [auv] of the graph G is a binary n x n matrix with elements 1, (u, v) € L, 0, otherwise. Therefore, the undirected graphs have a symmetric adjacency matrix and the graphs with no loops have adjacency matrices with zero diagonal elements. If the network has an arc without its opposite arc, the adjacency matrix is not symmetric. In directed networks, we have two types of links adjacent to a node - links pointing to the node (incoming) and links pointing away from the node (outgoing). The number of incoming links is the node indegree, the number of outgoing links is the node outdegree. If G has weights on the arcs we let auv be the weight of the arc (u, v). Let A € M"xn be the corresponding matrix. An eigenvector of A is a non-zero vector x such S. Praprotnik and V. Batagelj: Spectral centrality measures in temporal networks 13 that Ax = Ax for some complex A, which is called an eigenvalue of A belonging to the vector x. The eigenvalues of a graph G are defined as the eigenvalues of its adjacency matrix A(G). The set of the eigenvalues of G is called the spectrum of G. There are many connections between the eigenvalues of a graph and its combinatorial properties. These include eigenvalues that are not dominant and are beyond the scope of this article. It is well known that if A is a real symmetric matrix then its eigenvalues are real. Even more is true for nonnegative matrices ([5]). Theorem 2.1. (The Perron-Frobenius Theorem) If an n x n matrix has nonnegative entries then it has a nonnegative real eigenvalue A which has a maximum absolute value among all eigenvalues. This eigenvalue A has a nonnegative real eigenvector. If, in addition, the matrix has no block - triangular decomposition (i.e., it does not contain a k x (n — k) block of zeros disjoint from the diagonal), then A has a multiplicity of 1 and the corresponding eigenvector is positive. If the matrix is positive, A has the strictly largest absolute value. Theorem 2.1 implies that if a graph G is strongly connected (and the link weights are nonnegative in case of weighted graphs), then the strongly largest eigenvalue Amax of A(G) has a multiplicity of 1 and the corresponding eigenvector is positive. If the graph is not strongly connected, the uniqueness of the largest eigenvalue is not guaranteed. All centrality measures are real valued functions on the nodes of the network. Spectral centrality measures are based on the (left) dominant eigenvector of a network adjacency matrix or some other matrix derived from it. Existence and uniqueness of the spectral measures follow from the theory of nonnegative matrices. The rationalization behind using an eigenvector as a centrality measure is that important nodes have many connections, but the nodes with the highest degree are not necessarily the most important. It is not just the number of neighbors that counts, but also the importance of these neighbors. 3 Temporal Quantities in Networks In [2], we proposed a definition of temporal networks with zero latency that is based on temporal quantities. Here, we repeat some of the definitions and describe our approach to the temporal networks which we will use in the rest of the paper. A temporal network = (V, L, T, P, W) is obtained by attaching the time T to an ordinary network of nodes V and links L. The sets P and W represent the node properties and the link properties or weights, respectively. The time T is a set of time points, t eT, and is usually a subset of positive integers, T C N. In a temporal network, nodes v e V and links I e L are not necessarily present or active at all time points. We denote the activity sets of time points for the nodes v with T(v), T eP, and for the links I with T(£), T eW. The activity set T(e) of a node/link e is described as a sequence of time intervals ([sj, fi))'k=1, where si is the starting time and fi is the finishing time of the activity. Besides the presence/absence of nodes and links also their properties can change through time. Let a describe the temporal property of a node/link. The activity set of the corresponding node/link is denoted with Ta. To describe the changes we introduce a notion of a temporal quantity t e Ta t e T\ Ta 14 Ars Math. Contemp. 11 (2016) 11-33 where a(t) is the value of a at an instant t, and 36 denotes the value undefined. In the following we are talking about temporal quantities and we write simply a instead of a. We assume that the values of temporal properties belong to a set A which is a semiring (A, ©, ©, 0,1). We can extend both operations to the set As = A U {88} by requiring that for all a e At it holds a ©i ! © a = a and a © ! ;© a - The structure (At, ©, ©,38,1) is also a semiring. For more about semirings see [1] or [16]. Let As (T) denote the set of all temporal quantities over in the time T. To extend the operations to networks and their matrices we define the sum of temporal quantities (corresponds to parallel links) as s(t) a © b = s a(t) © b(t) t G Ta n Tb a(t) t G T0 \ Tb b(t) t G Tb \ T0 38 otherwise and Ts = Ta U Tb; and the product of temporal quantities (corresponds to sequential links) a © b = p as (t) = , a(t) © b(t) t G Ta n Tb p(V ' « otherwise and Tp = Ta n Tb. This definition of product is restricted to temporal networks with zero latency - the time needed to traverse the link is equal to zero and there is no waiting in nodes for the next transition. We define the temporal quantities 0 and 1 with 0(t) =38 and 1(t) = 1 for all t g T. The structure (As(T), ©, ©, 0,1) is also a semiring, and therefore so is the set of square matrices of order n over it for the addition A © B = S sij aij © bij and multiplication A © B = P n Pij = (J) aik © bkj. k= 1 The operations © and © on the left hand side operate on matrices and on the right hand side in the semiring of temporal quantities. The static network consisting of links and nodes that are present in the temporal network N at the time t g T is denoted by N(t) and is called a time slice of the network N. The addition and the multiplication of temporal quantities operate inside the chosen time slice. They are defined as pointwise operations on functions. The operations in the matrix semiring also operate on the network time slices. Using these operations on a temporal network is equivalent to using the usual operations on a sequence of static networks that represent the time slices of the temporal network and then combining them into one result. S. Praprotnik and V. Batagelj: Spectral centrality measures in temporal networks 15 Using our algebraic approach avoids creating the network time slices and the problem of choosing the time intervals for which the time slices should be computed. The appropriate intervals are chosen by the operations on temporal quantities. The procedures we have developed for the analysis of temporal networks using temporal quantities are available as a Python library TQ (Temporal Quantities) at http: //vladowiki.fmf.uni-lj.si/doku.php?id=tq. In the TQ library the temporal quantities are represented with the sequences of ordered triples [(sj, /¿, vj)]ie/, I C N, where [sj, /¿) is the time interval in which the temporal quantity has the value v G A. Note that this means that the temporal quantities are constant functions on time intervals. The procedures that will be used for the computation of spectral centrality measures use and extend this library. A user friendly program Ianus is also being developed. 4 Algorithms 4.1 Eigenvector Centrality The most intuitive notion of centrality is the degree centrality which says that the most important nodes in the network are the ones with the highest degree. In many applications, the degree centrality is flawed as it measures the exposure (the number of arcs) and not the actual influence of the node. Wasserman and Faust [23] discuss what they call prestige measures of centrality where the centralities of nodes in a network are recursively related to the centralities of the nodes to which they are linked, the idea being "It is better to have less friends who are powerful than to have a lot of non-powerful friends." This measure has the following form. Let A be the (weighted) adjacency matrix of the network in which av„ = 0 implies that there exists an arc I = (v, u) and let x be the in-centrality vector. The form of the prestige measure is xv x1 + a2v x2 + • • • + anv xn ^ ^ xu where we denote "u links to v" with u ^ v. The in-centrality of the node v is a combination of the in-centralities of the in-neighbors of v. This set of equations has a matrix representation At x = x. (4.1) In the equation (4.1), x is an eigenvector of AT corresponding to the eigenvalue of 1. It has no non-zero solutions unless AT has an eigenvalue of 1. One way to solve this problem is to normalize the rows so that each row sums to 1. Then the normalized matrix has an eigenvalue 1 and there is a solution to the equation (4.1). Eigenvector centrality, first proposed in [8], generalizes the equation to the general eigenvector equation for A G Rnxn. The underlying assumption is that the node's in-centrality is proportional to the weighted sum of the in-centralities of its neighbors Axv a1vx1 + a2v x2 + • • • + anv xn ^ ^ xu which (in the matrix notation) is equivalent to At x = Ax. (4.2) This equation always has a non-zero solution. 16 Ars Math. Contemp. 11 (2016) 11-33 In some cases, it is more appropriate to define the out-centrality of the node v as a combination of the centralities of the out-neighbors of v. In this case, with the same reasoning, the eigenvector out-centrality is the solution to the equation Ax = Ax. (4.3) When computing both (in- and out-) eigenvector centralities, we are looking for the dominant eigenvalue and the corresponding eigenvector of the network adjacency matrix A. The simplest numerical method to compute them is the power iteration, see [14] for a more detailed description and for the convergence conditions. 1: function power(A, x0) > x0 is the initial approximation for the eigenvector 2: i = 0 3: while no convergence do 4: yi+1 = Axi 5: Xi+1 = yi+i/||yi+i||2 > Approximate eigenvector. 6: i = i +1 7: A = xTAxi > Approximate eigenvalue. Our implementation of the power iteration algorithm for temporal networks with zero latency as a function eigTemp is described in Algorithm 1. The algorithm returns the approximate eigenvector x, the approximate eigenvalue ev and the parameter convergence, which tells us whether the algorithm ended when the required tolerance was achieved (its value is True) or not (its value is False). The function MatVecRight(A, x) computes the product Ax for a temporal matrix A and a temporal vector x, the function normalize(x) implements the temporal version of x/||x||2. The function test-dif(x,y) finds the maximal value (over time) of ||x - y||2, which we compare to the desired tolerance in line 7. If we achieved the desired tolerance tol, we exit the loop. We compute the approximate eigenvalue after the algorithm exits the loop to avoid numerous matrix multiplications. The function scalProd(x, y) computes the scalar product of two temporal vectors x and y. Line 11 is the temporal version of A = xT Ax. Algorithm 1 Temporal power iteration. 1: function eigTemp(A, x, tol = 10-6, maxIter = 100) 2: i = 0 3: convergence = False 4: while i < maxIter do 5: x_old = x 6: x = normalize(MatVecRight(A, x)) 7: if test-dif(x, x_old) < tol then 8: convergence = True 9: break 10: i = i +1 11: ev = scalProd(x, MatVecRight(A, x)) 12: return (x, ev, convergence) > x is an approximate eigenvector and ev is an approximate eigenvalue Theorem 4.1. The temporal power iteration algorithm converges if and only if the nontemporal power iteration converges for every time slice matrix A(t), t G T. S. Praprotnik and V. Batagelj: Spectral centrality measures in temporal networks 17 Proof. The addition and the multiplication of temporal quantities correspond to pointwise operations with functions a : As ^ ^ as we noted on page 4 after the definition of the operations. For every t e T the values of the temporal quantities describe a static network - the time slice of the temporal network at the time t. Therefore the conditions of convergence for static matrices translate pointwise to temporal matrices. In the algorithm, the function testudif checks the maximum difference over all times. Since the lifetime is a finite set, the pointwise convergence implies that this maximum converges to 0. □ Corollary 4.2. Let Ai (t) and A2 (t) be the eigenvalues with the greatest absolute values of a network time slice matrix A (t). The rate of convergence is ^ = max{|A2(t)/A1(t)|, t e T}. The temporal power iteration algorithm converges for ^ < 1 and the convergence is slower when the value of ^ is near to 1. Proof. The temporal power iteration algorithm converges at the time point t when the quotient |A2(t)/A1(t)| < 1. The proof of convergence for static matrices can be found in [14]. The rate is calculated pointwise and the maximum over a finite set of time points is computed. □ Note that by the proof of Theorem 4.1 the temporal power iteration algorithm can converge for some times t e T and not converge for others. We give two stopping conditions for the loop: The first condition is the desired tolerance tol which has a default value of 10-6 and the second condition is the number of iterations maxIter with a default value of 100. In our implementation we set the convergence parameter to True when convergence of all the time slice matrices is achieved. It could easily be altered to require convergence of at least one of the time slices. We use the temporal power iteration algorithm to compute the eigenvector in-centrality (function inEig) and the eigenvector out-centrality (function outEig). Both algorithms are written in the Algorithm 2. The function MatTrans(A) computes the transpose of a temporal matrix A. The function VecConst(n) creates a temporal vector of the dimension n, which has components equal to 1. The function numInv(a) replaces the value of the temporal quantity with its inverse value, leaving the time component intact. The function numVecProd(a, x) computes the product of a temporal quantity a and a temporal vector x. In line 2 (or 6), we compute the approximate eigenvalue and eigenvector for AT (or A) with an initial vector of (temporal) ones. In line 3 (or 7), we scale the vector according to the eigenvalue. Algorithm 2 Temporal eigenvalue centrality. 1: function inEig(A) 2: (x, ev, conv) = eigTemp(MatTrans(A), VecConst(len(A))) 3: x = numVecProd(numInv(ev), x) 4: return (x, conv) 5: function outEig(A) 6: (x, ev, conv) = eigTemp(A, VecConst(len(A))) 7: x = numVecProd(numInv(ev), x) 8: return (x, conv) 18 Ars Math. Contemp. 11 (2016) 11-33 If the network is not strongly connected, the network matrix (with the right renumera-tion of nodes) has a block form B C 0 D • A In this case, the corresponding dominant eigenvector is not necessarily unique and there is some debate on how to interpret the result. A lot of the times, the right eigenvector has the form [x, 0]T which means that we get no information about a lot of the nodes. When the given network is not connected, the matrix has a block diagonal form. Let A 0.8000 0.7500 0 0 0.2000 0.2500 0 0 0 0 0.4000 0.5455 0 0 0.6000 0.4545 be the matrix of a disconnected network. It has the eigenvalues A1j2 = 1, A3 = -0.1455 and A4 = 0.0500. The dominant eigenvectors (corresponding to the eigenvalues of 1) are v1 = [0.9662,0.2577,0,0] and v2 = [0,0, -0.6727, -0.7399]. Because they correspond to the same eigenvalue, also their sum v1 + v2 = [0.9662,0.2577, -0.6727, -0.7399] or any linear combination of v1 and v2 is also an eigenvector. How do we choose the right one? No definite answer to this question has been given. The first two eigenvectors correspond to the centralities of nodes in each component, which makes sense, but there is no good way to compare the two scores. Another problem with disconnected networks is that the node scores in the largest component do not neccessarily get non-zero values, and the highest scores are often those, that correspond to dyads (strongly connected components with two nodes), which are usually not of high interest. The nodes in the largest strongly connected component (that are of greatest interest most of the time) are not likely to have scores higher than those of the dyadic component. This is usually solved by introducing some normalization factor, which we have not implemented in our algorithms. The problem of finding the strongly / weakly connected components in temporal networks with zero latency and no waiting in nodes has been addressed in our article [2]. If the network is not strongly connected, the user can choose how to proceed - one can either extract the strongly connected components and compute the eigenvector centralities separately for each component, or use one of the other, more elaborate measures that are described in the later sections of this article and have no such limitation to their use. 4.2 Katz Centrality In his article [18] Katz describes the centrality index which computes the centrality of a node v by taking into account the centralities of all the nodes from which the node v is reachable. In the proposed approach a weight a is used to dampen the effects of more distant nodes. The weight a could depend on the group and the context and could also vary through time. We only consider the case when it is constant through time. We assume that it is known or we compute it in a way that guarantees the convergence of the algorithm. The constant a can be viewed as the probability of success of the link: the value a = 0 means that even the neighboring nodes have no impact on the node and the value a = 1 means that the distant nodes are as important as the neighbors. This idea is modelled with powers of the binary adjacency matrix A of the network, as the element avu from Ar equals to the number of walks of length r from the node v to the S. Praprotnik and V. Batagelj: Spectral centrality measures in temporal networks 19 node u through other nodes. The column sums of A give the indegrees of nodes (walks of length 1) and the column sums of Ar give the number of walks of length r from other nodes. The idea is to find the column sums of the matrix T = aA + a2 A2 + • • • + akAk + • • • = (I - aA)-1 - I. It has been shown in [18] that this is equivalent to solving the system of linear equations 11 - AT ) t = d, (4.4) a where d is a vector of indegrees. The vector t has elements tv which are the column sums of the matrix T, i.e. the answers to the original question. This means that for a given network with the binary adjacency matrix A and for a given a we only need to solve the system of linear equations (4.4). In his article, Katz states that reasonable values of 1/a are those between the largest eigenvalue of A and about twice that value. For smaller values of 1/a the effect of distant nodes is greater. The usual centrality indices are normalized - in case of degree, for example, by n - 1, the number of possible choices. Using the same notion, Katz [18] defined the divisor of tv by m = a(n - 1) + a2(n - 1)(2) + a3(n - 1)(3) + .. ., where ( n - 1)(k) = ( n - 1)(n - 2) • • • (n - k). A good approximation for m is m = (n - 1)!an-1e1/a, which improves with increasing n. The Katz centrality vector is given by m t, where t is the solution to the equation (4.4). We used the Jacobi's method (see [14]) to compute the solution to the linear system of equations. It is an iterative method for solving linear systems of the form Ax = b. The idea of the Jacobi's method is to rewrite the original system in the form A = L + D + U, where D = diag(A) and L and U are the lower and upper triangles of A, respectively. Then iterate Dxm+i = -(L + U)xm + b. The impletation of the Jacobi's method for solving a system Ax = b, where A and b have elements that are temporal quantities, is written in the Algorithm 3 as a function jacobi. We give two conditions for exiting the loop: when we reach the desired precision tol of the solution or when we compute a predetermined number of steps maxIter. In line 2, we compute the inverse of the diagonal matrix D, and in line 3, we compute the matrix B = - (L + U), by setting the diagonal of A to undefined (semiring neutral element) and negating the values. Line 8 computes the next approximation to the solution as a temporal version of xn = invD(Bx + b). Lines 9-11 test whether the desired tolerance has been achieved and end the computation if that is the case. Theorem 4.3. The temporal Jacobi iteration algorithm converges if and only if the nontemporal Jacobi iteration converges for all the time slice network matrices A(t), t £ T. 20 Ars Math. Contemp. 11 (2016) 11-33 Proof. The reasoning is the same as in the proof of Theorem 4.1. The addition and the multiplication of temporal quantities correspond to pointwise operations on functions. The operations on temporal matrices can therefore be viewed as if we were operating on sequences of static matrices and the convergence conditions for static matrices translate to temporal matrices. □ Definition 4.4. The static matrix A is strictly diagonally dominant if it holds n \ajj \ laj I' j = 1 2,...,n. Corollary 4.5. If all the time slice matrices are strictly diagonally dominant the temporal Jacobi iteration converges with any temporal vector as the initial aproximation to the solution of the linear system Ax = b Proof. The proof of convergence for static matrices can be found in [14]. □ Similarly to the power iteration, the Jacobi iteration algorithm can converge for some times t e T and not converge for others. We set the convergence parameter to True if it converges in all time points for which the values of temporal quantities are defined. Algorithm 3 Temporal Jacobi iteration. 1: function jacobi(A' b, x, tol = 10-6, maxIter = 100) > x is the initial approximation for the solution 2: invD = MatSetDiagVec(vecInv(diag(A))) 3: B = MatMinus(MatSetDiagZero(A)) 4: i = 0 5: convergence = False 6: while i < maxIter do 7: i = i +1 8: xn = MatVecRight(invD, VecSum(MatVecRight(B, x), b)) 9: if test^difyx, xn) < tol then 10: convergence = True 11: break 12: x = xn 13: return (xn, convergence) The algorithm for computing the Katz centrality for temporal networks is written as Algorithm 4. In the algorithm for computing the Katz centrality, the input parameter a, corresponding to a, can be left out. Corollary 4.6. The Algorithm 4 computes the parameter a in a way that insures that the Jacobi's algorithm converges when a is not given as an input parameter. Proof. In lines 4-9 of the algorithm we compute a from the maximum of all the column sums (indegrees), so that a is a little bigger than this maximum and every time slice matrix in the equation (4.4) is strictly diagonally dominant. Therefore the algorithm converges by the Corollary 4.5. □ S. Praprotnik and V. Batagelj: Spectral centrality measures in temporal networks 21 Lines 10-13 compute B = a I - AT, and line 14 computes the solution to the linear equation Bt = d with the initial approximation equal to the temporal vector with all elements equal to 1. Lines 15-17 normalize the solution with an appropriate m. Note that the algorithm also works for weighted adjacency matrices. In this case, the powers of the adjacency matrix are the weighted sums of the walks and the above explanation is not that straightforward. Algorithm 4 Temporal Katz centrality. 1: function katz(A, a = Null) 2: n = len(A) 3: d = MatVecLeft(A, VecConst(n)) > Column sums - temporal indegrees. 4: if a = Null then > Compute a if it is not given. 5: max = 0 6: for i = 1 : len(d) do 7: if VecMax(d[i]) > max then 8: max = VecMax(d[i]) 9: a = 0.999/max 10: B = n x n temporal matrix 11: for i = 1 : n do 12: B[i][i] = [(1, TO, 1/a)] 13: B = MatDiff(B, MatTrans(A)) 14: (t, conv) = jacobi(B, d, VecConst(n)) 15: m = math.f actorial(n — 1) * (a * *(n — 1)) * math.exp(1 /a) 16: m = [(1, to, 1/m)] 17: return (numVecProd(m, t), conv) 4.3 Bonacich a and (a, ft) Centrality The dominant eigenvector from Section 4.1 is one of the standard measures of network centrality but it also has its flaws. The nodes with zero indegree also have a zero centrality. Nodes pointed at by nodes with zero centrality also have a zero centrality and the effect propagates to other nodes. In many cases the eigenvector centrality gives no information about a lot of nodes. Some solutions to this problem were given, see for example [10], [9] and [22]. We can assign each node v some status sv that is independent of the connections. It is possible for the vector s to reflect the effects of external status but it is often assumed to be a vector of ones. The new equation is x = a(AT x) + s. The parameter a weighs the relative importance of the network sources versus the outside sources. This measure is called a—centrality. It has a matrix solution x = (I — aAT )-1s and is almost identical to the measure proposed by Katz in [18] which we study in Section 4.2. The temporal version of a—centrality is written in Algorithm 5. The parameter a in 22 Ars Math. Contemp. 11 (2016) 11-33 the algorithm corresponds to the parameter a from the definition. If the status vector s is not given, we set it to be a temporal vector of ones in line 3. The solution to the linear system is computed with the temporal version of Jacobi's iteration (Algorithm 3). Algorithm 5 Temporal Bonacich a—centrality. 1: function alpha(A, a, s = None) 2: if s = None then 3: s = VecConst(len(A)) 4: return jacobi(MatSum(MatEye(len(A)), numMatProd([(l, , —a)],MatTrans(A))), s, VecConst(len(A))) Another proposed solution from [9], written in Algorithm 6, is also very similar to Katz's centrality measure. It depends on two parameters a and p. The parameter p affects how much of the node's influence is due to the node's neighborhood. If p is positive the status of the node is increasing with its connections. This would be the case in a communication network, for example, where the amount of information available to the individual is increasing with the amount of information available to its contacts. A positive p is chosen in situations in which the node's status (power, influence) increases with connections to influential nodes. In some situations it is advantageous to have connections to people who have few other options (e.g. in bargaining). In this case power comes with connections to powerless nodes and the node's power reduces with connections to powerful nodes. In such cases a negative p is chosen. The main difference between this measure and Katz's is that we allow p < 0. The magnitude of p affects the influence of more distant nodes. When p = 0, the (a, p)-centrality measure is proportional to the degree. With increasing |p| the distant (reachable) nodes influence the node's centrality in a greater proportion. The (a, p) - centrality of a node v is defined as where e is a column vector of ones. From (4.5) we see that a only affects the length of the solution vector. If a is not given, we normalize the solution in such a way that ||c(a, p)||2 = n. Using this normalization, cv (a, p) = 1 means that the node v has no special standing in the network. Our temporal version of Bonacich (a, p)— centrality is given as a function bonacich and is described in Algorithm 6. The parameters a and b in the algorithm correspond to the parameters a and p from the definition, respectively. We introduce an auxiliary variable normB that tells whether the solution is normalized in a way we described above (we do that in line 10) or not. We compute the temporal version of the statements bi = aAe in line 6 and B = I — bA in line 7. We use Jacobi's iteration with the initial approximation of all (temporal) ones to compute the solution to the equation. u which we write in matrix notation as c(a, p) = a(l - pA)-1 Ae, (4.5) S. Praprotnik and V. Batagelj: Spectral centrality measures in temporal networks 23 Algorithm 6 Temporal Bonacich (a, ft) — centrality. 1: function bonacich(A, b, a = None) 2: normB = False 3: if a = None then 4: a = l 5: normB = True 6: bl = numVecProd([(l, to, a)],MatVecRight(A, VecConst(len(A)))) 7: B = MatSum(MatEye(len(A)), numMatProd([(l, to, —b)], A)) 8: (x, conv) = jacobi(B, bl, VecConst(len(A))) 9: if normB then 10: x = numVecProd([(l, to, \Jlen(A))], normalize(x)) 11: return (x,conv) 4.4 Hubs and Authorities This centrality measure is motivated by the problem of searching the Web but its use is not limitted to text search networks. It is useful in arbitrary networks, especially those that present data with some duality of actor roles (for example, agressors and victims, bidders and recipients, providers and consumers, etc.). At the time when it first appeared, search engines relied on indexing the Web and creating a structured collection of the indexed pages. The problem was the fast growth of the Internet. Because of the enormous size of the network, text-based searching became slow and inefficient. The idea was to use the structure of the hyperlink network to infer the importance of the page from its connections to other pages on the Internet - more relevant pages will be pointed at by many other pages. But the simple indegree measure does not discriminate between the relevant pages for the query and the universally popular pages. Human judgement of relevance is in some way underlying the network structure. The creator of the page v inferred some authority on the page u when he included the link to u on his page. Kleinberg [19] defined two roles of Web pages - hubs and authorities. The idea behind the HITS algorithm for computing hubs and authorities is that inlinks endorse the importance of a page - the page referred to by many other pages is preferred by many (such pages are authorities for a given query). But also, there exist pages that compile lists of relevant resources (these are hubs for a given query). If a page lists a high number of relevant sources it should score high. Good hubs point to good authorities and good authorities are pointed at by good hubs. A page gets authority ranking from the hub rankings of the pages pointing to it, and gets a hub ranking from the authority rankings of the pages it points to. Kleinberg defined the authority update rule and the hub update rule. Both scores are applied iteratively. For an overview, see also [22]. The algorithm operates on focused subnetworks of the Web that are constructed from the output of a text-based search engine. We will not deal with the construction of such a subnetwork and will assume that it is given. We denote its adjacency matrix by A. To each node v of a network (the node represents a Web page) two scores are assigned: the hub score xv and the authority score yv. The scores are stored in two distinct vectors. We get 24 Ars Math. Contemp. 11 (2016) 11-33 coupled relations Ayv ^ ^ xu ^ ^ auv xu (A x)v 7 u:u^v u Mxv ^ ^ yu ^ ] avuyu = (Ay)v7 u:v^u u which can be rewritten in matrix notation as Ay«x = AAt x, Ay«y = AT Ay. This means that the hub and authority scores are just the elements of the dominant eigenvectors of the matrices AAT and AT A, respectively. Our version of the HITS algorithm for temporal networks is given in Algorithm 8. For the computation of the eigensystem of AT A we implemented a more efficient algorithm that computes the eigensystem directly, without computing the product ATA. It is implemented as a function singTemp and is written in Algorithm 7. The algorithm is similar to Algorithm 1, the difference is in lines 6 and 11, where we multiply with AT, using the function MatTransVecRight. Algorithm 7 Power iteration for computing the eigenvalues of AT A. 1: function singTemp(A, x, tol = 10-6, maxIter = 100) 2: i = 0 3: convergence = False 4: while i < maxIter do 5: x-old = x 6: x = normalize(MatTransVecRight(A,MatVecRight(A, x))) 7: if test.dif(x, x_old) < tol then 8: convergence = True 9: break 10: i = i +1 11: ev = scalProd(x,MatTransVecRight(A, MatVecRight(A, x))) 12: return (x, ev, convergence) We compute the hubs and authorities scores in Algorithm 8 by first computing the eigensystem of the matrix AT A in line 2, using the initial approximation of ones, from which we get the authority scores vector y. In line 3, we compute the hub scores vector x from y. In lines 4-6 we scale them according to the eigenvalue. 4.5 PageRank PageRank is the centrality measure used by Google to rank Web pages. Because of the success of Google there is a lot of literature on PageRank, see for example [11], [12], [6], [17], [20] and [22]. Brin and Page first described the calculation of PageRank in their original paper [11]. The PageRank algorithm can be viewed in two different ways - as a random walk on a graph and as an eigenvector of a network matrix. We briefly explain both and compute the S. Praprotnik and V. Batagelj: Spectral centrality measures in temporal networks 25 Algorithm 8 Hubs and authorities (HITS algorithm). 1: function hits(A) 2: (y, evy, conv) = singTemp(A, VecConst(len(A))) 3: x = normalize(MatVecRight(A,y)) 4: evInv = numInv(evy) 5: y = numVecProd(evInv, y) 6: x = numVecProd(evInv, x) 7: return (x, y, conv) > x is the hub scores vector and y is the authority scores vector PageRank using the eigenvector. Due to the size of the Internet, the random walk version is used in practice. A random walk is a stationary process on any undirected graph. The centrality of a node derived from a random walk is defined as the number of times that the walker stops at the node in the random process. In directed graphs, the process may not be stationary as the nodes with zero outdegree (dangling ends) act as sinks for the process. Once we get to a node with a zero outdegree we cannot leave it. To make the process stationary, the random walker is given the opportunity to leave a dangling end. The random walker of PageRank simulates the behaviour of a user browsing the Internet. Most of the time, the user is clicking links on the pages (is surfing), but sometimes he types an URL (jumps). These jumps are added to the random walk in the model. They occur with a probability q and take the simulated user to a random page. The process is described by a simple set of relations pv = q + (1 - q) £ tp\ Vv = 1, 2,..., n, (4.6) n ^ outdeg(u) where n is the number of nodes, pv is the PageRank value of the node v, and outdeg(u) is the outdegree of the node u. The sum runs over all the nodes incoming to v. Typically, the probability of jumps is chosen as q = 0.15. Small values of q preserve the information about the network connections better. When q = 0 the process may not be stationary and PageRank is ill-defined. When q =1 the jumps dominate and all the nodes have the same PageRank value equal to n. For the (equivalent) matrix version of PageRank: Let A be the adjacency matrix of the network and let D be the diagonal matrix of outdegrees so that the scaled matrix S = D-1A has row sums equal to 1. When a page v has no outgoing links the row sum corresponding to v in A is equal to zero and we cannot compute the corresponding row of the matrix S. In this case, we take Svu = n for all u. We construct the matrix M as M = q 1 + (1 - q) S, (4.7) n where 1 is a temporal matrix of all (temporal) ones. This matrix is positive and has a unique normed positive left eigenvector x, so that xM = x. The PageRank of a node v is the value of xv. The version of PageRank for temporal networks is given as Algorithm 9. In line 4 we compute the vector of outdegrees and in lines 5-7 we compute the matrix S. In line 5, we use the function vecInvPR that returns a vector of the inverses of the degrees or, when the 26 Ars Math. Contemp. 11 (2016) 11-33 degree is undefined (zero), the vector with the value [(1, to, p)] and the matrix, which has elements [(1, to, 1)] in the rows that correspond to the nodes with zero outdegree. Line 6 basically changes the original matrix so that the rows corresponding to the nodes with zero outdegree contain all ones. Line 7 scales the matrix according to outdegrees. We do this using a special function DiagMatProd(x, A) instead of full matrix multiplication to make the algorithm more efficient. This function computes the product of a matrix that has the vector x on the diagonal and the matrix A. In line 8 we compute M, creating a matrix with all values equal to [(1, to, p)] using the function constantMat. We compute the left eigenvector of M as a right eigenvector of MT. Finally, we normalize the result. The function norm1 normalizes the vector using the first norm, meaning that the sum of the vector components is equal to 1 at all times. Algorithm 9 The temporal PageRank algorithm. 1: function pageRank(A,q = 0.15) 2: n = len(A) 3: S = n x n temporal matrix 4: s = MatVecRight(A, VecConst(n)) > vector of outdegrees 5: (S, s) = vecInvPR(S, s) 6: S = MatSum(A, S) 7: S = DiagMatProd(s, S) 8: M = MatSum(numMatProd([(1, to, 1 - q)], S), numMatProd([(1, to, q)], constantMat(n, [(1, to, 1/n)]))) 9: (x, ev, conv) = eigTemp(MatTrans(M), VecConst(n)) 10: x = norm1(x) 11: return (x, conv) Corollary 4.7. The temporal pageRank algorithm always converges. Proof. The matrix M from the equation (4.7) is positive and has a unique eigenvalue that has the strictly largest absolute value by the Theorem 2.1. Therefore the temporal power iteration converges by the Theorem 4.1. □ 4.6 A Note on the Time Complexity of the Algorithms We use n for the number of nodes of the given network, m for the number of arcs, and k for the number of iterations of the iterative algorithms (Algorithms 1, 3and 7). Because of the assumption that T C N, the length of the temporal quantities describing the network vectors and matrices is bounded with the lifetime of the network. We denote the lifetime with L. The underlying semiring is plain floating point numbers field so the time complexity of the operations is O(1). We showed in [2], that the addition and the multiplication of temporal quantities have the time complexity of O(L). Therefore the complexity of the multiplication of two temporal vectors is O(nL), the complexity of the multiplication of a temporal matrix with a temporal vector is O(n2L) and the complexity of the multiplication of two temporal matrices is O(n3L). From this, it follows that all the algorithms we proposed have a time complexity of O(kn2L). The time complexity of Algorithm 1 follows from the complexities of the operations in the temporal quantities semiring. The functions of Algorithm 2 have the same S. Praprotnik and V. Batagelj: Spectral centrality measures in temporal networks 27 complexity, as eigTemp is the major part of them. This is also true for Algorithm 9. (Note that the matrix product in line 7 would have the time complexity of O(n3L) if we computed the full matrices.) Algorithm 3 also has a time complexity of O(kn2L), the major part is line 8. We use the function jacobi in line 14 of Algorithm 4, in line 4 of Algorithm 5 and in line 8 of Algorithm 6. It is the major part of the computation in all cases, so these algorithms have the same complexity. The computation of the singular values in Algorithm 7 also has this complexity with our implementation (note that if we were to compute the matrix product and compute its the eigenvalues, the complexity would be O(kn3L)). We use the results as a major part of Algorithm 8, again of the same complexity. 5 Examples of Spectral Centralities in Temporal Networks 5.1 Spectral centrality measures - test case We will test our algorithms on the temporal network from Figure 1. The network changes are outlined with the weights on the arcs and with dotted arcs as follows: The full arcs are present through all of the network lifetime, that is in the time interval [1, 9). In the time intervals [1, 3) U [7, 9) the weight of these arcs is equal to one, on the interval [3,7), the weight is equal to the number written on the arc (note that some of the weights remain 1). The dashed arcs are present only in the time interval [5, 9). In the interval [5, 7) the weight on the arc is equal to the number on the arc in the figure, in the interval [7, 9) all the weights are equal to 1. Figure 1: Test temporal graph. The temporal vectors describing the centrality measures from Section 4 for the test graph are too long to be written in full. The changes in the standings of the nodes that are usually what interests us are written in Table 1. From the Table, we can see that some centrality measures remain undefined for certain nodes in some time intervals. For example, the nodes 2,4,5 in the time interval [1, 3) are missing in the row, corresponding to out-eig. That can also be seen from the Figure, as the nodes 4 and 5 have outdegree equal to zero in 28 Ars Math. Contemp. 11 (2016) 11-33 time 1-3 time 3-5 5-7 7-9 in-eig 4,5,2,1,7,6 5,4,7,1,2,6 4,6,5,1,2,7 6,5,4,2,1,7 out-eig 7,1,3,6 3,1,7,6 6,3,1,4,7,2,5 7,6,1,3,4,5,2 Katz 2,5,1,4,7,6 5,4,7,1,2,6 5,6,4,1,7,2 5,6,2,1,4,7 a = 0.15 Bonacich 1,2,5,4,6,7,3 1,4,5,2,7,6,3 5,1,4,6,2,7,3 5,1,2,6,4,7,3 a = 0.85 Bonacich 7,1,3,6,2 3,1,6,7,2 3,6,1,4,7,2,5 6,7,1,3,4,5,2 P = 0.15 hub 3,6,1,7,2 3,7,6,1,2 3,6,7,1,2,4,5 6,3,7,1,2,4,5 authority 1,2,5,4,6,7 1,5,2,4,7,6 5,1,4,2,7,6 5,1,2,4,6,7 pageRank 4,2,5,1,7,6,3 4,5,7,1,2,6,3 6,4,5,1,7,2,3 6,4,5,2,1,7,3 q = 0.15 Table 1: The order of the nodes of the test graph by their centralities through time. this interval and the node 2 only points to 4, which has zero centrality. The second interesting thing is that all the centrality measures return similar results, if we put them into two groups: One group chooses nodes that are central as the ones that have "more inlinks" (in-eig, Katz, a centrality, authority score), the other group chooses the nodes that have "more outlinks" (out-eig, (a, ft) — centrality, hub score, pageRank). 5.2 Franzosi's violence network We applied our algorithms to compute the centrality scores of the nodes in Franzosi's violence temporal network [15]. From the newspapers in the period from January 1919 to December 1922, Roberto Franzosi collected data about the reported violent actions - interactions between different political groups and other groups of people in Italy. The network nodes represent the involved groups of people (for example, "people", "police", "fascists", "communists", "socialists", "workers") and the arc weights correspond to the number of interactions between two groups (the arc (u, v) with a weight 3 would mean that the group u committed 3 violent actions on the group v). The temporal network contains data about violent activities for each month in the given time period - the temporal quantities corresponding to an arc tell the information about the violent activities for the whole 4 years. We get the clearest results with the hub and authority scores for the nodes, which is expected because of the nature of the network - the underlying duality of the actors. The actors can be seen as the aggressors and as the groups at which the aggression was directed. For the sake of clarity, we created the timeline of changes in the highest scores. The hub scores can be seen in Figure 2. The time points are months and the heights of the symbols correspond to the value of the normalized authority score. From Figure 2 it is clearly seen that at one time the violent actions of police were replaced with that of the fascists. That happens at the time point 23 which corresponds to November 1920. From the Figure on the right, we see that for some time, the police retained some control and was second by the violent activities, but later it dissapeared altogether. The authority scores are outlined in Figure 3. There is no clear trend and it seems that the violent activities were not limited to one particular group through time which is in S. Praprotnik and V. Batagelj: Spectral centrality measures in temporal networks 29 0.7 -0.6 -0.5 -0.4 -0.3 - ' " x Y Woo*00 Y** _ —I-1-1-1-1-1-1-1-1-1 01-1-1-1-1-1-1-1-1-1-1 0 5 10 15 20 25 30 35 40 45 50 0 5 10 15 20 25 30 35 40 45 50 1rO Figure 2: The highest hub score of the Franzosi's network through time (left) and the two highest scores (right). The "fascists" are the black dots, the "police" are circles, others are crosses. accordance with our intuition. With the other centrality scores the results are similar, but the boundary is not that obvious. For eigenvector in-centrality we get 24 counts of "workers," "workers (agricultural)" or "socialists," and 14 counts of"undefined," "people" or "protesters." There are three others (once "police" and two times "fascists"). The eigenvector out-centrality returns a mix of "police" (4), "protesters" (3), "?" (3), "undefined" (2), "workers" (2), "workers (agricultural)" (1) and "republicans" (1). The first appearance of "fascists" is at the time point 23 (November 1920). The fascists have the highest centrality score until the end od the timeline, except for 4 instances ("the right", "?", "workers", "police"). The pageRank centrality for q = 0.15 gives us 18 counts of "fascists", starting from the time point 22 (October 1920), which is then interrupted with "workers" (3), "people" (3), "undefined" (2) and "police." Until that time, we have a mix of "police" (6), "undefined" (5), "people" (4), "socialists" (3), "war affected" and "the right." As it seems that the aggressor is more distinct than the groups that were targeted, we computed the Katz and the a-centrality measure on the transpose of the original matrix. The Bonacich a—centrality for a = 0.9 returns 17 counts of "police" until the time point 23 (others with the maximal centrality score until this time are "thugs," "undefined," and twice "workers"). After the time point 23, we have 23 counts of "fascists," others are "thugs," "police," and twice "workers." The Katz centrality measure has 16 counts of "police," and one appearance of "thugs," "undefined," "protesters" and "?". After the time point 23 the "fascists" are the only ones with the highest centrality score. The Bonacich (a, ß) —centrality returns the same score. 30 Ars Math. Contemp. 11 (2016) 11-33 0.7 -0.6 -0.5 -0.4 -0.3 - O . o O °.°o° o- o o o o o o o .cooo O . o _ o O n °O'.O0B Co o . O •o °6. O ° ' CO 0 5 10 15 20 25 30 35 40 45 50 0 5 10 15 20 25 30 35 40 45 50 1 r ü Figure 3: The highest authority score of the Franzosi's network through time (left) and the two highest scores (right). The "workers," "workers (agricultural)" and "socialists" are the black dots, the "undefined," "people" and "protesters" are circles, and other groups are crosses. These results are summarized in Table 2 in which we have written the count of "police," "fascists," and others with the maximum value of centrality for different centrality measures, divided into two columns - the first for the count before November 1920, the second after that. We only do this for the centrality measures that correspond to the aggressor. From the table, we can see that the fascist aggression was central in the studied news after November 1920 in all cases. Because of the undefined values on some intervals the number of data in the columns varies. group of people hub score pageRank out-eig a a, ß Katz police 15 0 6 1 4 1 17 1 16 0 16 0 fascists 0 26 1 18 0 21 0 23 0 25 0 25 other 5 0 14 8 12 3 4 3 4 0 4 0 Table 2: The summary of the maximum centrality scores before and after November 1920 for the Franzosi's violence network. 5.3 9/11/2001 Reuters terror news network The Reuters terror news network about the 9/11 attack on the United States was obtained from the CRA (Centering Resonance Analysis) networks created by Steve Corman and Kevin Dooley at Arizona State University [13] and was used as a case network for the S. Praprotnik and V. Batagelj: Spectral centrality measures in temporal networks 31 Viszards visualization session on the Sunbelt XXII International Sunbelt Social Network Conference, New Orleans, USA, 13-17. February 2002. The network is based on the September 11 attack news that were released by the news agency Reuters during the 66 consecutive days after the attack. The nodes of the network are words and the edges tell whether the two words appear in the same news sentence. The weight of the edge is the frequency of these common appearances. The network has n = 13332 nodes (different words) and m = 243447 edges, of which 50859 have weights larger than 1. There are no loops in the network. We extracted a subnetwork of the 50 most active nodes as in [2]. We tested our algorithms on this smaller network. The methods inEig and outEig do not converge with the initial approximation vector of all temporal ones. Also, the PageRank ranking of nodes tells almost nothing about the importance of nodes as it jumps around - in value as well as in the node with the highest value of centrality. The other methods are twofold: The first group corresponds to the question "Which words are the news pointing at the most? What's the end-game?" All methods return the terms "attack," "afghanistan," and "anthrax" as the most frequent terms with the highest value of centrality. The methods belonging to this group are the Katz centrality index computed on the transposed adjacency matrix, Kleinberg's hub score, Bonacich a centrality on the transposed matrix, and Bonacich (a, P) -centrality. The value of the maximal centrality is getting smaller as the time increases. The second group answers to the question "From which words do the news spread? What started it all?" and all the centrality measures have the most frequent term "united-states," except for the first week after the attack during which the term with the highest centrality is "world_trade_ctr." The methods belonging to this group are the Katz centrality index, Kleinberg's authority score, Bonacich a centrality, and Bonacich (a, P)-centrality computed on the transposed adjacency matrix. We list the count of the terms with the highest a centrality (for the transposed matrix) through time as an example of the first group: 50 times "attack," 10 times "afghanistan," 4 times "anthrax" and once "leader." As an example of the second group, we list the count of the terms that have the highest Katz centrality measure through time: 49 times "united_states," 7 times "world_trade_ctr," 4 times "washington," 2 times "taliban" and "war," once "world" and "wednesday." 6 Conclusions and Future Work In the article, we show that spectral centrality measures can be extended to the analysis of temporal networks with zero latency described with temporal quantities. In the application we are using only the combinatorial semiring, but the underlying linear algebra could be extended to other semirings in the future, providing some reasonable motivation is found. Also, the meaning of non-dominant eigenvalues and/or eigenvectors could be explored. With the theory of perturbations of eigenvectors, we feel that it would be possible to continue this research to predict the changes in the standing of the nodes in the network for the near future. Algorithms for the efficient computation of eigenvalues and for solving linear systems in other semirings could be developed. The problem is that, in semirings, the inverse is not necessarily available. There has been some research on this topic which we have not approached yet. 32 Ars Math. Contemp. 11 (2016) 11-33 Methods for the visualisation of temporal networks and for the visualisation of the changes in the node importance through time should be developed. Our current representation is based on the network matrix, which means that it is not very efficient for large sparse networks. In the future, data structures for the representation of sparse temporal networks could be studied and implemented. References [1] V. Batagelj, Semirings for social network analysis, Journal of Mathematical Sociology 19(1) (1994), 53-68. [2] V. Batagelj and S. Praprotnik, An algebraic approach to temporal network analysis, Submitted, preprint available at http://arxiv.org/abs/1505.015 69 (2014). [3] A. Bavelas, A mathematical model of group structure, Human Organizations 7 (1948), 16-30. [4] A. Bavelas and D. Barrett, An Experimental Approach to Organizational Communication, Publications: Industrial Relations, American Management Association, 1951. [5] A. Berman and R. J. Plemmons, Nonnegative Matrices in the Mathematical Sciences (Classics in Applied Mathematics), Society for Industrial Mathematics, January 1987. [6] M. Bianchini, M. Gori and F. Scarselli, Inside pagerank, ACM Trans. Internet Technol. 5 (2005), 92-128, doi:10.1145/1052934.1052938. [7] P. Boldi and S. Vigna, Axioms for centrality, Internet Math. 10(3-4) (2014), 222-262. [8] P. Bonacich, Factoring and weighting approaches to status scores and clique identification, Journal of Mathematical Sociology 2 (1972), 113-120. [9] P. Bonacich, Power and centrality: A family of measures, American Journal of Sociology 92 (1987), 1170-1182. [10] P. Bonacich and P. Lloyd, Eigenvector-like measures of centrality for asymmetric relations, Social Networks 23 (2001), 191-201, doi:10.1016/S0378-8733(01)00038-7. [11] S. Brin and L. Page, The anatomy of a large-scale hypertextual web search engine, in: Computer Networks and ISDN Systems, Elsevier Science Publishers B. V., 1998 pp. 107-117. [12] K. Bryan and T. Leise, The $25,000,000,000 eigenvector: the linear algebra behind google, SIAMReview 48 (2006), 569-581. [13] S. R. Corman, T. Kuhn, R. D. McPhee and K. J. Dooley, Studying complex discursive systems, Human communication research 28 (2002), 157-206. [14] J. W. Demmel, Applied Numerical Linear Algebra, Society for Industrial and Applied Mathematics, Philadelphia, PA, USA, 1997. [15] R. Franzosi, Mobilization and counter-mobilization processes: From the "red years"(1919-20) to the "black years" (1921-22) in Italy. A new methodological approach to the study of narrative data., Theory and Society 26 (1997), 275-304. [16] M. Gondran and M. Minoux, Graphs, Dioids and Semirings: New Models and Algorithms (Operations Research/Computer Science Interfaces Series), Springer Publishing Company, Incorporated, 1st edition, 2008. [17] T. Haveliwala and S. Kamvar, The Second Eigenvalue of the Google Matrix, Technical Report 2003-20, Stanford InfoLab, 2003. [18] L. Katz, A new status index derived from sociometric analysis, Psychometrika 18 (1953), 3943. S. Praprotnik and V. Batagelj: Spectral centrality measures in temporal networks 33 [19] J. M. Kleinberg, Authoritative sources in a hyperlinked environment, J. ACM 46 (1999), 604632, doi:10.1145/324133.324140. [20] A. N. Langville and C. D. Meyer, A survey of eigenvector methods for web information retrieval, SIAMRev. 47 (2005), 135-161, doi:10.1137/S0036144503424786. [21] H. J. Leavitt, Some effects of certain communication patterns on group performance, Journal of Abnormal and Social Psychology 46 (1951), 38-50. [22] N. Perra and S. Fortunato, Spectral centrality measures in complex networks, Physical Review E (Statistical, Nonlinear, and Soft Matter Physics) 78 (2008), 036107+, doi:10.1103/physreve. 78.036107. [23] S. Wasserman and K. Faust, Social network analysis: Methods and applications, Cambridge University Press, 1994. /^creative ^commor ARS MATHEMATICA CONTEMPORANEA Also available at http://amc-journal.eu ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 11 (2016) 35-47 ^-connectivity of K 1,3-free graphs without induced cycle of length at least 5 Xiangwen Li, Jianqing Ma Department of Mathematics, Huazhong Normal University, Wuhan 430079, China Received 26 September 2014, accepted 2 June 2015, published online 18 August 2015 Abstract Jaeger et al. conjectured that every 5-edge-connected graph is Z3-connected. In this paper, we prove that every 4-edge-connected K13-free graph without any induced cycle of length at least 5 is Z3-connected, which partially generalizes the earlier results of Lai [Graphs and Combin. 16 (2000) 165-176] and Fukunaga [Graphs and Combin. 27 (2011) 647-659]. Keywords: Z3-connectivity, Kli3-free, nowhere-zero 3-flow. Math. Subj. Class.: 05C40 1 Introduction Graphs in this paper are finite, loopless, and may have multiple edges. Terminology and notations not defined here are from [1]. For a graph G and v e V(G), denote by NG(v) (or shortly N(v)) the set of neighbors of v in G. Let dG(v) = |NG(v)| and N[v] = N(v) U {v}. For A c V(G), let N(A) = UveAN(v) \ A. A graph G is trivial if |V(G)| = 1, and non-trivial otherwise. An n-cycle is a cycle of length n. A path Pn is a path on n vertices. The complete graph on n vertices is denoted by Kn, and K- is obtained from Kn by deleting an edge. For two vertex-disjoint subgraphs H1 and H2 of G, denote by eG(H1, H2) (or simply e(H1; H2)) the number of edges with one end vertex in H1 and the other one in H2. If V(H1) = {a}, we use eG(a, H2)(or simply e(a, H2)) instead of eG(H1? H2). For simplicity, if V1, V2 are two disjoint subsets of V(G), we use eG(V1, V2) for eG(G[V1], G[V2]). Similarly, we define e(V1, V2) and e(a, V2). For graphs H1,..., Hs, a graph G is {H1,..., Hs}-free if for each i e {1,2,..., s}, G has no induced subgraph Hj. E-mail addresses: xwli68@mail.ccnu.edu.cn (Xiangwen Li), binger728@163.com (Jianqing Ma) ©® This work is licensed under http://creativecommons.Org/licenses/by/3.0/ 36 Ars Math. Contemp. 11 (2016) 11-33 Let G be a graph and let D be an orientation of G. If an edge e = uv G E (G) is directed from a vertex u to a vertex v, then u is a tail of e, v is a head of e. For a vertex v G V(G), let E+ (v)={e G E(D): v is a tail of e }, and E-(v)={e G E(D): v is a head of e }. Let A be an abelian group with identity 0 and A* = A - {o}. Define F(G, A) = {f : E(G) ^ A} and F*(G, A) = {f : E(G) ^ A*}. For each f G F(G, A), the boundary of f is a function df : V(G) ^ A given by, where "J2" refers to the addition in A. Afunction b : V (G) ^ A iscalledan A-valued zero-sum function on G if^„eV (G)b(v) = 0. The set of all A-valued zero-sum functions on G is denoted by Z(G, A). A graph G is A-connected if G has an orientation D such that for any b G Z(G, A), there is a function f G F(G, A*) such that df (v) = b. In particular, if df (v) = 0 for each vertex v G V(G), then f is called a nowhere-zero A-flow of G. More specifically, a nowhere-zero k-flow is a nowhere-zero Zk-flow, where Zk is the cyclic group of order k. Tutte [16] proved that G admits a nowhere-zero A-flow with | A | = k if and only if G admits a nowhere-zero k-flow. Integer flow problems were introduced by Tutte in [16]. Group connectivity was introduced by Jaeger et al. in [7] as a generalization of nowhere-zero flows. The following longstanding conjecture is due to Jaeger et al. and is still open. Conjecture 1.1. (Jaeger et al. [7]) Every 5-edge-connected graph is Z3-connected. Conjecture 1.1 was extensively studied over thirty years. For the literature, some results can be seen in [3,4, 10, 13, 17, 18] and so on. Recently, Thomassen [15] proved that every 8-edge-connected graph is Z3-connected, which improved by Lovasz, Thomassen, Wu and Zhang [12] as follows. Theorem 1.2. Every 6-edge-connected graph is Z3-connected. However, Conjectures 1.1 is still open. A graph is chordal if every cycle of length at least 4 has a chord. A graph G is bridged if every cycle C of length at least 4 has two vertices x,y such that dG(x,y) < dC (x, y). A graph is HHD-free if any k-cycle for k > 5 in the graph has at least two chords. Lai [9] characterized Z3-connectivity of 3-edge-connected chordal graphs. Li et al. [11] and Fukunaga [6] generalized this result to bridged graphs and 4-edge-connected HHD-free graphs. Theorem 1.3. (Fukunaga[6]) Every 4-edge-connected HHD-free graph is Z3-connected. df (v)= ^ f (e) f (e), eEE+ (v) eEE-(v) w x -iy - house domino Figure 1: 2 forbidden graphs X. Li and J. Ma: Z3-connectivity of Ki:3-free graphs without induced cycle. 37 On the other hand, it is easy to see that a graph G is HHD-free if and only if G contains no induced subgraph isomorphic to house, domino and k-cycle where k > 5. Note that a domino contains a K13 as a subgraph. One naturally ask whether both house and domino may be replaced by a K1j3. On the other hand, Xu [14] proved that Conjecture 1.1 is true if and only if every 5-edge-connected K1j3-free graph is Z3-connected. Thus, we consider Z3-connectivity of K1j3-free graphs without induced cycle of length at least 5 and prove the following theorem in this paper. Theorem 1.4. Let G be a 4-edge-connected, K13-free simple graph. If G does not contain any induced cycle of length at least 5, then G is Z3-connected. Theorem 1.4 cannot be implied by Theorem 1.2 in the sense that there are infinite graphs which is Z3-connected by Theorem 1.4 but not by Theorem 1.2 as follows. Let H1 be a copy of K5 and H2 be a copy of Km where m > 5. Pick a vertex u of H1 and a vertex v of H2. Define Gm to be the graph obtained from H1 and H2 by identifying u and v. It is easy to see that for each m > 5, Gm is a 4-edge-connected K1j3-free graph without any induced cycle of length at least 5. Thus, Gm is Z3-connected by Theorem 1.4. Clearly, Gm has an edge cut of size 4 which implies Theorem 1.2 does not show that Gm is Z3-connected. Theorem 1.3 cannot imply Theorem 1.4 in the sense that there are infinite graphs which is Z3-connected by Theorem 1.4 but not by Theorem 1.3 as follows. Let Hj be a copy of Kni where 1 < i < 4 and nj > 5 for i e {1,2,3,4}. Pick two distinct vertices uj and vj of Hj. Denote by rn the graph obtained from H1, H2, H3, H4 by identifying vj with uj+1 for i = 1, 2, 3, and v4 with u1. It is easy to verify that rn contains a house and so Theorem 1.3 cannot guarantee that rn is Z3-connected but Theorem 1.4 does. The paper is organized as follows: In Section 2, the former related results are presented, and some lemmas are established. In Section 3, the main theorem is proved. 2 Lemmas For a subset X C E(G), the contraction G/X denotes the graph obtained from G by identifying the two ends of each edge in X and then deleting all the resulting loops. Note that even if G is simple, G/X may have multiple edges. For convenience, we write G/e for G/{e}, where e e E(G). If H is a subgraph of G, then we write G/H for G/E(H). For k > 2, a wheel Wk is the graph obtained from a k-cycle by adding a new vertex, called the center of the wheel, which is adjacent to every vertex of the k-cycle. A wheel Wk is odd (even) if k is odd (or even). For technical reasons, we refer the wheel W1 to a 3-cycle. In order to prove Theorem 1.4, we need some lemmas. Some results [2, 5, 7, 8, 9, 10] on group connectivity are summarized as follows. Lemma 2.1. Let A be an abelian group and G a simple graph. Then each of the following holds: (1) K1 is Z3-connected. (2) If e e E(G) and if G is A-connected, then G/e is A-connected. (3) If H is a subgraph of G and if both H and G/H are A-connected, then G is A-connected. (4) For n > 5, K- and Kn are Z3-connected; (5) An n-cycle is A-connected if and only if | A| > n +1; 38 Ars Math. Contemp. 11 (2016) 11-33 (6) For every positive integer k, W2k is Z3-connected and W2k+1 is not Z3-connected. (7) Let H be a Z3-connected subgraph of G. If e(v, V(H)) > 2 for v G V(G — H), then the subgraph induced by V(H) U {v} is Z3-connected. (8) Let H1, H2 be subgraphs of G such that H1 and H2 are A-connected, If V(H1) n V(H2) = 0, then H1 U H2 is A-connected. For a graph G with u, v, w G V(G) such that uv, uw G E(G), let G[„v,„w] denote the graph obtained from G by deleting two edges uv and uw, and then adding a new edge vw, that is, G[„v „w] = G U {vw} — {uv, uw}. Lemma 2.2. (Chen et al. and Lai, [2, 9]) Let A be an abelian group, let G be a graph and u, v, w be three vertices of G such that d(u) > 4 and v, w G N(u). If G[„v,„w] is A-connected, then so is G. A graph G satisfies the Ore-condition if dG(w) + dG(v) > n for every pair of nonadja-cent vertices u and v of G. Theorem 2.3. (Luo et al. [13]) Let G be a simple graph on n vertices, where n > 3. If G satisfies the Ore-condition, then G is not Z3-connected if and only if G is one of {G1, G2,..., G12} shown in Figure 2. G2 G8 G9 Xi G 10 G11 Xi G i2 G13 G14 Figure 2: 14 specified graphs Lemma 2.4. Suppose that H is one graph of {G7, G13, G14}. Denote by G the graph obtained from H by adding an edge e = xy which is neither of H nor parallel to any existing edge of H. Then G is Z3-connected. X. Li and J. Ma: Z3-connectivity of Ki:3-free graphs without induced cycle. 39 Proof. We use the same notation of G13, G14 shown in Figure 2. Let H = G7, then G satisfies the Ore-condition. By Theorem 2.3, G is Z3-connected. Let H = G13. If x2 G {x, y}, then G satisfies the Ore-condition. By Theorem 2.3, G is Z3-connected. Thus, assume that x2 G {x, y}. By symmetry, let e = x1x5. Contracting 2-cycle in G[XlX2,XlX3] and contracting all 2-cycles generated in the process, we get an even wheel W4 with the center at x5, which is Z3-connected by Lemma 2.1 (6) and so G is Z3-connected by Lemma 2.2. Let H = G14. If e = x2x8, then G satisfies the Ore-condition. Since |V(H)| = 8, by Lemma 2.3, G is Z3-connected. Thus, assume that e = x2x8. By symmetry, assume that e = x1x5 or e = x2x6. In the former case, contracting 2-cycle in G[XlX2,XlX3] and contracting all 2-cycles generated in the process, we obtain an even wheel W4 induced by {x1, x4, x5, x6,x7} with the center at x5. Contracting this W4 into one vertex and contracting 2-cycle generated in the process, finally we get a K1 which is Z3-connected. By Lemmas 2.1 (7) and 2.2, G is Z3-connected. In the latter case, contracting 2-cycle in G[XlX2,XlX3] and contracting all 2-cycles generated in the process, we obtain an even wheel W4 induced by {x4, x5, x6, x7, x8} with the center at x5, which is Z3-connected by Lemma 2.1. Note that x1 has two neighbors in this even wheel. By Lemma 2.1(7), G[XlX2,XlX3] is Z3-connected. By Lemma 2.2, G is Z3-connected. □ 3 Proof of Theorem 1.4 Throughout this section, we assume that k'(G) > 4, K1j3-free simple graph and G does not contain any induced cycle of length at least 5. We argue our proof by contradiction, assume that G is a counterexample to Theorem 1.4 with | V(G) | minimized. Lemma 3.1. Suppose that H is amaximal Z3-connected subgraph of G and Hi is a component of G - V(H). Let x1 G V(H) such that x1y1,..., x1yk, where y1,..., yk G V(Hi) and 2 < k < 3. Then each of y1,..., yk is not a cut vertex of Hi. Proof. We only prove the case that k = 3. The proof for that k = 2 is similar. Without loss of generality, we will prove that y3 is a cut vertex of Hi. Suppose otherwise that y3 is not a cut vertex of Hi. Since the maximality of H, e(yi, H) = 1 by Lemma 2.1 (7). Since G is K1,3-free, y1y2, y1y3, y2y3 G E(G). Since k'(G) > 4, let x4 g V(H) and y4 G V(Hi) such that x4y4 G E(G), and y4 is not in the component of Hi - y3 containing y1 and y2. Consider the neighbors of y1 and y2. Let N(y1) \ {x1, y2, y3} = {u1, u2,...,ua} and N(y2) \ {x1,y1,y3} = {v1,v2,... , vb}. Since G is K1j3-free, both subgraphs induced by {u1,..., ua} and by {v1,..., vb} are complete graphs. We assume, without loss of generality, that a > b. Since G is 4-edge-connected, a > 1 and b > 1. Note that y3 is a cut vertex of Hi and G is K13-free. The following claim is straightforward. Claim. All neighbors of y3 are y1, y2 in the component of Hi - y3 containing {y1, y2}. Case 1. {«1,..., ua} n {v1, V2,..., v6} = 0. If a > 4, then the subgraph induced by {y1, u1, u2,..., ua} is a complete graph Ka+1, which is Z3-connected by Lemma 2.1 (4). By Lemma 2.1 (7), G contains a Z3-connected subgraph induced by V(H) U {y1, y2, y3, u1, u2,..., ua}, contrary to the maximality of H. Thus, a < 3. 40 Ars Math. Contemp. 11 (2016) 11-33 Assume that a = 3. If |{«i, w2,..., ua} n jvi, v2,..., vb}| > 2, then the subgraph induced by {y1, y2, u1,..., ua} is K5 or K—, which is Z3-connected by Lemma 2.1 (4). By Lemma 2.1 (7), G contains a Z3-connected subgraph induced by V(H)U{y1, y2, y3, u1, w2, ..., ua} which is larger than H, contrary to the choice of H. Thus, |{u1, w2,..., ua} n {v1, v2,..., vb}| = 1 and let u1 = v1. Assume that 3 > b > 2. Since k'(G) > 4, there is a path from {w2, w3} to v2 avoiding each vertex of {y1, y2, u1}. Since G contains no induced cycle of length at least 5, ujv2 G E(G) where i G {2, 3}. In this case, G contains an even wheel W4 induced by {y1, y2, u1, Wj, v2} with the center at u1, which is Z3-connected by Lemma 2.1 (6). By Lemma 2.1 (7), G contains a Z3-connected subgraph induced by V(H) U {y1, y2, y3, u1, u2,..., ua}, contrary to the maximality of H. Thus, b = 1. In this case, since k'(G) > 4, let u2p1, u3q1 G E(G) where p1 G {u1,u3,y1} and q1 G {u1,u2,y1}. Since k'(G) > 4 and G contains no cycle of length at least 5, p1q1,p1u3, q1u2 G E(G). We replace p1 with w2 and replace q1 with w3. By argument above, we obtain p2, q2 such that p2q2,p2p1, q2q1,p2q1, q2p1 G E(G). Repeating such a way, we can obtain two infinite sequences of p1,p2,... and q - 1, q2... such that PiPi+1, qiqi+1,Piqi,Piqi+1,qi, qi+1 G E(G) for i = 1,2,.... This contradicts that G is finite. We are left to consider that a < 2. In this case, since G is 4-edge-connected, a = b = 2 and {u1, w2} = {v1, v2}. As the proof above, we also obtain a contradiction. Case 2. {«1,..., wa} n {v1, v2,..., v6} = 0. We claim that a + b > 4. Suppose otherwise that a + b < 3. It follows that either a = 2, b =1 or a = b =1. We only prove the case when a = 2 and b = 1. The proof is similar for the case that a = b =1. Since a = 2 and b =1, y1u1, y1u2, y2v1 G E(G). By the Claim, y3 is not adjacent to one of u1, w2 and v1. Thus, {y1u1, y1u2, y2v1} is an edge cut of size 3, contrary to that k'(G) > 4. Assume that a > 4. If b > 4, then G contains a path from {u1,..., ua} to {v1,..., vb}. Note that k'(G) > 4 and G has no cycle of length at least 5. If 2 < b < 3, then each vertex of {v1, v2..., vb} has a neighbor in {u1, w2, ..., ua}. If b = 1, then v1 has three neighbors in {u1,..., ua}. By Lemma 2.1 (4), G contains a Z3-connected subgraph Ka+1. By Lemma 2.1 (7), G contains a Z3-connected subgraph induced by V(H) U {y1, y2, y3, u1,..., ua, v1,..., vb}, contrary to the maximality of H. Assume that a = 3. If b = 3, denote by F the subgraph induced by {u1, w2, w3, v1, v2, v3, y1, y2}. Since k'(G) > 4 and G contains no cycle of length at least 5, each vertex of {u1, u2, u3} is adjacent to one of {v1, v2, v3} and each vertex of {v1, v2, v3} is adjacent to each vertex of {u1,u2,u3}. Since k'(G) > 4, e({«1, w2, w3}, {v1,v2,v3}) > 3 and each vertex of F is of degree 4 and this subgraph satisfies the Ore-condition. By Theorem 2.3, F is Z3-connected. By Lemma 2.1 (7), G contains a Z3-connected subgraph induced by V (H) U V (F), contrary to the maximality of H. Let b = 2. Since k'(G) > 4 and G contains no cycle of length at least 5, each vertex of {u1, w2, w3} is adjacent to one of {v1, v2} and each vertex of {v1, v2} is adjacent to two vertices of {u1, w2, w3}. It follows that one, say w3, of {u1, w2, w3} has two neighbors in {v1, v2}. It implies that the subgraph induced by {u1, u2, u3, v1, v2} is an even wheel W4 with the center at w3, which is Z3-connected by Lemma 2.1 (6). By Lemma 2.1 (7), G contains a Z3-connected subgraph induced by V(H) U {y1, y2, y3, u1, w2, w3, v1, v2}, contrary to the maximality of H. Let b = 1. Since k'(G) > 4 and G contains no cycle of length at least 5, v1 is adja- X. Li and J. Ma: Z3-connectivity of Ki:3-free graphs without induced cycle. 41 cent to each vertex of {wi, w2, w3}. The subgraph induced by {ui, u2, w3, v1, yi} is K—, which is Z3-connected by Lemma 2.1 (4). By Lemma 2.1 (7), G contains a Z3-connected subgraph induced by V(H) U {y1, y2, y3, u1, w2, w3, v1}, contrary to the maximality of H. Next, assume that a = 2. Let b = 2. Since k'(G) > 4 and G contains no cycle of length at least 5, each vertex of {u1, w2} is adjacent to two of {v1, v2} and each vertex of {v1, v2} is adjacent to two vertices of {u1, u2}. Denote by F the subgraph induced by {y1,y2,u1,u2, v1, v2}. It follows that F satisfies the Ore-condition and each of 4 vertices of F is of degree 4. By Theorem 2.3, F is Z3-connected. By Lemma 2.1 (7), G contains a Z3-connected subgraph induced by V(H) U V(F), contrary to the maximality of H. □ Lemma 3.2. G does not contain a nontrivial Z3-connected subgraph H. Proof. Suppose that our lemma fails and H is a maximal Z3-connected subgraph of G. Supposethat H1,H2,...,Hk are components of G - V(H), where k > 1. Let G = G/H and v be the vertex into which H is contracted. Observe H,, where i G {1,2,..., k}. Let E(H, H,) = {x1y1, x2y2,..., xtyt}, where xj G V(H) and yj G V(H,) for i, j G {1, 2,..., t}. Since G is 4-edge-connected, t > 4. By the maximality and by Lemma 2.1 (7), y1,..., yt are distinct t vertices of H,. Let e, = xjy, for i G {1, 2,... ,t}. Claim 1. E(H, H,) does not contain 4 edges having a common end-vertex. Proof of Claim 1. Suppose otherwise that without loss of generality, that e1, e2, e3, e4 have a common vertex x1, that is, x1 = x2 = ... = x4. Then the subgraph induced by {x1, y1,..., y4} is a complete graph K5 since G is K1j3-free. By Lemma 2.1 (4), K5 is Z3-connected. By Lemma 2.1 (8), G contains a Z3-connected subgraph induced by V(H) U {x1, y1,..., y4}, contrary to the choice of H. Thus, E(H, H,) contains at most three edges having a common vertex. This proves Claim 1. Claim 2. E(H, Hj) does not contain 4 independent edges. Proof of Claim 2. Suppose otherwise that E (H, H,) contains 4 independent edges. We assume,without loss of generality, that e1, e2, e3, e4 are independent edges. Since G has no induced cycle of length at least 5, as the argument above, y,yj G E(G) for 1 < i < j < 4. This means that the subgraph the subgraph induced by {y1, y2,y3, y4} is a K4. In the graph G', the subgraph induced by {v', y1, y2, y3, y4} is a K5 which is Z3-connected by Lemma 2.1 (4). By Lemma 2.1 (3), the subgraph induced by V(H) U {y1, y2, y3, y4} is Z3-connected, contrary the maximality of H. This proves Claim 2. Claim 3. E(H, H,) does not contain 2 edges having a common end-vertex. Proof of Claim 3. By Claim 2, we assume that t = 4 and e1, e2, e3, e4 have at least a pair of two edges sharing a vertex in H. Suppose otherwise that we assume, without loss of generality, that e1, e2 have a common vertex x1, that is, x1 = x2. Since t = 4, we need to consider e3 and e4 do not share a common end-vertex or e3 and e4 share a common end-vertex. In the former case, the subgraph induced by {x1, y1, y2} is a K3 since G is K1j3-free. Since G has no induced cycle of length at least 5, y3y4 G E(G), y3yj,y4yj G E(G) where i, j G {1,2}. By Lemma 3.1, the subgraph induced by {y1, y2, y3, y4} is a K4 since G has no induced cycle of length at least 5. In the graph G', the subgraph induced by {v', y1, y2, y3, y4} is a K5 which is Z3-connected by Lemma 2.1 (4). By Lemma 2.1 (3), 42 Ars Math. Contemp. 11 (2016) 11-33 the subgraph induced by V(H) U {y^ y2, y3, y4} is Z3-connected, contrary the choice of H. In the latter case, we assume, without loss of generality, that e3 and e4 share a common end-vertex x3. Since G is Kij3-free, the subgraph induced by {xi, yi, y2} is a complete graph and so is the subgraph induced by {x3, y3, y4}. Since G has no induced cycle of length at least 5, as the argument above, y^ G E(G) for some i G {1,2} and some j G {3,4}. We assume, without loss of generality, that i = 2, j = 3. By Lemma 3.1, each vertex of {yi, y2, y3, y4} is not a cut vertex. Since G has no induced cycle of length at least 5 and G is 4-edge-connected, y2 is adjacent to y4, and y3 is adjacent to yi. In the graph G', the subgraph induced by {v', yi, y2, y3, y4} is a K- which is Z3-connected by Lemma 2.1 (4). By Lemma 2.1 (3), the subgraph induced by V(H) U {yi, y2, y3, y4} is Z3-connected, contrary the maximality of H. This proves Claim 3. By Claims 1, 2, and 3, we assume, without loss of generality, that ei, e2, e3 have a common vertex xi, that is, xi = x2 = x3. Thus, t = 4 and x4 = xi. It follows that the subgraph induced by {xi, yi, y2, y3} is a complete graph K4. Consider the cycle xiPx4y4Qyj, where V(P) c V(H), V(Q) c V(Hi) and j G {1,2, 3}. Since G contains no any induced cycle of length at least 5, V(P) = V(Q) = 0 and xix4, y4yj G E(G). We assume, without loss of generality, that j = 3, that is, y3y4 G E(G). By Lemma 3.1, each of {yi, y2, y3} is not cut vertex. Since G contains no any induced cycle of length at least 5 and k'(G) > 4, yiy4, y2y4 G E(G). This, in the graph G', the subgraph induced by {v', yi, y2, y3, y5} is a K5, which is Z3-connected by Lemma 2.1 (4). By Lemma 2.1 (3), the subgraph induced by V(H) U {yi, y2, y3, y4} is Z3-connected, contrary the maximality of H. □ Proof of Theorem 1.4 Since domino contains an induced Ki 3 and G contains no induced Ki 3, G contains no induced domino. By Theorem 1.3 and the choice of G, G contains an induced house. We use the same notations depicted in Figure 2. By symmetry, assume that d(u) < d(v). Claim 1. |N(u) n N(v) \ {w}| < 1. Proof of Claim 1. Suppose otherwise that |N(u) n N(v) \ {w}| > 2. Let ui, vi G N(u) n N(v) \ {w}. Denote by F the subgraph induced by {ui, vi, w}. Since G is Kij3-free, F contains at least one edge. If F contains two edges, then the subgraph induced by {ui, vi, w, u, v} contains an even wheel W4, which is Z3-connected by Lemma 2.1 (6), contrary to Lemma 3.2. Thus, F contains only one edge e. By symmetry, assume that e = wui or e = uivi. In each case, since G is Kij3-free, xvi, yvi G E(G). This means that the subgraph induced by {vi, u, v, x, y} is an even wheel W4 with the center at vi, which is Z3-connected by Lemma 2.1 (6), contrary to Lemma 3.2. This proves Claim 1. Claim 2. |N(u) n N(v) \ {w}| = 0. Proof of Claim 2. Suppose otherwise that |N (u) n N (v) \ {w}| = 0. Since k' (G) > 4, ¿(G) > 4. First, we claim that max{d(u), d(v)} < 5. Suppose otherwise that d(u) > 6. Let ui,u2,u3 G N(u) \ {w, v, x}. Since G is Kij3-free, either G[{u, x, ui, u2, u3}] or G[{u, w, ui, u2, u3}] is a complete subgraph K5 which is Z3-connected by Lemma 2.1, contrary to Lemma 3.2. Thus, 4 < d(u), d(v) < 5. Assume first that d(u) = d(v) = 4. Let N(u) \ {w,v,x} = {ui} and N(v) \ {w,u,y} = {vi}. Since G is Ki 3-free and uiv,viu G E(G)), uix, viy G E(G). X. Li and J. Ma: Z3-connectivity of Ki:3-free graphs without induced cycle. 43 Since G contains no induced cycle of length at least 5 and k'(G) > 4, uivi G E(G). If u1y G E(G) or xv1 G E(G), then G[{u, v,u1, v1,x, y}] contains a subgraph isomorphic to G7 + e which is Z3-connected by Lemma 2.4, contrary to Lemma 3.2. Thus, assume that u1 y, xv1 G E(G). Since G contains no induced cycle of length at least 5, wv1,wu1 G E(G). Since k'(G) > 4, there exists a shortest (u1 , w)-path P such that NP(u1) G {u, x, v1}. Since wu1 G E(G), u2 G V(P) such that u^2,u2w g E(G) since G contains no induced cycle of length at least 5. Consider the cycle wu2u1xyvw. Since G contains no induced cycle of length at least 5, u2y, u2x G E(G). Since |N(u) n N(v) \ {w}| = 0, u2v G E(G). This implies that G contains a K1j3 induced by {u2, u1, w, y}, a contradiction. Next, assume that d(u) = 4 and d(v) = 5. Let N(u) \ {w, v,x} = {u1} and N(v) \ {w,v,y} = {v1, v2}. Since G is K1j3-free and |N(u) n N(v) \ {w}| = 0, u1x, v1y, v2y, v1v2 G E(G). If wv1,wv2 G E(G), then G contains a induced by {w, v, v1, v2, y} which is Z3-connected by Lemma 2.1 (4), contrary to Lemma 3.2. Thus, assume that wv1 G E(G). Since G contains no induced cycle of length at least 5 and k'(G) > 4, u1 v1 G E(G). If u1y G E(G) or u1v2 G E(G), then G[{u, v, x, y, u1, v1, v2}] contains a subgraph isomorphic to G13 + e which is Z3-connected by Lemma 2.4, contrary to Lemma 3.2. Thus, assume that u1 y, u1v2 G E(G). As the proof above, there is u2 such that such that u1u2, u2w G E(G) and u2y, u2x G E(G). It follows that G contains a K1j3 induced by {u2, u1, w, y}, a contradiction. Finally, assume that d(u) = d(v) = 5. Let N(u) \ {w, v,x} = {u1,u2} and N(v) \ {w,u,y} = {v1 ,v2}. SinceGis K13-freeand |N(u)nN(v)\{w}| = 0,u1x,u2x,u1u2, v1y, v2y, v1v2, u1v1 G E(G). If {u2y, u2v2, u2v1}nE(G) = 0, then G[{u, v, x, y, u1, u2, v1, v2}] contains a subgraph isomorphic to G14 + e which is Z3-connected by Lemma 2.4, contrary to Lemma 3.2. Thus, assume that u2y, u2v2, u2v1 G E(G). Since G contains no induced cycle of length at least 5, u2w G E(G). Since k'(G) > 4, as the proof above, there exists a vertex u3 g V(P) such that u2u3, u3w G E(G) and u3x, u3y G E(G). In this case, G contains a K13 induced by {u3, u2, y, w}, a contradiction. This proves Claim 2. By Claims 1 and 2, assume that N(u) n N(v) \ {w} = {z}. If xz,yz G E(G), then G[{u, v, x, y, z}] is a Z3-connected subgraph W4, contrary to Lemma 3.2. Thus, xz G E(G) or yz G E(G). Recall that d(u) < d(v). We claim that d(v) < 6. Otherwise, since G is K1j3-free, G[N[v] \ {w, u, z}] contains a complete subgraph Km, where m > 5, which is Z3-connected by Lemma 2.1, contrary to Lemma 3.2. Thus, 4 < d(u), d(v) < 6. Case 1. xz, yz G E(G). Since G[{u, w, x, z}] is not an induced K13, wz G E(G). We first establish a claim. Claim 3. If d(u) = 4, then d(x) = 4; if d(v) = 4, then d(y) = 4. Proof of Claim 3. Suppose otherwise that d(x) > 5. Since d(u) = 4, each s G N(x) \ {u} is not adjacent to u. Thus, G[N[x] \ {u}] is a Z3-connected Km, where m > 5, since G is K1j3-free, contrary to Lemma 3.2. Since G is 4-edge-connected, d(x) > 4. Thus, d(x) = 4. The proof for the case that d(y) = 4 is similar. This proves Claim 3. Assume that d(u) = d(v) = 4. By Claim 3, d(x) = 4. Let N(x) \ {u, y} = {x1, x2}. Since G is K1j3-free, yx1,yx2,x1x2 G E(G). Since k'(G) > 4, G contains a path from x1 to w which does not contains any vertex of {x2, x, y, u, v}. Since G contains no induced cycle of length at least 5, this path is an edge, that is, x1w g E(G) or x1z g E(G). Similarly, we can prove that x2z G E(G) or x2w G E(G). In each case, H = 44 Ars Math. Contemp. 11 (2016) 11-33 G[{u, v, x, y, xi, x2, w, z}] satisfies the Ore-condition. By Lemma 2.3, H is Z3-connected, contrary to Lemma 3.2. Assume that d(u) = 4 and d(v) = 5. Let N(v) \ {u, w, z,y} = {vi}. Since G is K^-free, yvi G E(G). By the Claim, d(x) = 4. Assume that xvi G E(G). Let xxi G E(G). Since G is K^-free, xiy, xivi G E(G). Let H = G[{u, v, x, y, xi, vi, w, z}]. If wvi G E(G), contract the 2-cycle (v, vi) in H[wv,wvi,] and repeatedly contact the 2-cycles generated in the process, eventually, we get a Ki which is Z3-connected. By Lemmas 2.1 and 2.2, H is Z3-connected, contrary to Lemma 3.2. Thus, wvi G E(G). Since k'(G) > 4 and G contains no induced cycle of length at least 5, xiw g E(G). As the proof above, we can get H[xiy,xivi] is Z3-connected. By Lemma 2.2, H is Z3-connected, contrary to Lemma 3.2. Thus, xvi G E(G). Let xxi,xx2 G E(G). Since G is Ki3-free, yxi,yx2,xix2 G E(G). Since G contains no induced cycle of length at least 5, xivi, x2vi, wvi, zvi G E(G). Since G contains no induced cycle of length at least 5 and k'(G) > 4, xiw, x2z G E(G) or xiz, x2w G E(G). In each case, L = G[{u, v,x, y, xi,x2, w, z}] satisfies the Ore-condition. By Lemma 2.3, L is Z3-connected, contrary to Lemma 3.2. If d(u) = 4 and d(v) = 6, let N(v) \ {u, w, z, y} = {vi, v2}. Since G is Ki3-free, viy,v2y,viv2 G E(G). By the Claim, d(x) = 4. First assume that xvi,xv2 G E(G). In this case, G contains a Z3-connected subgraph K- induced by {x, y, v, vi, v2}, contrary to Lemma 3.2. Next, assume that xvi G E(G) and xv2 G E(G). Let xxi G E(G). Since G is Ki,3-free, xiy, xivi G E(G). Let H = G[{w, u, v,x, y, xi, vi, v2}]. If wvi G E(G) or wv2 G E(G) or xiz G E(G), we can prove that H[wv,wvi] or H[wv,wv2] or H[xiy,xivi] is Z3-connected. By Lemma 2.2, H is Z3-connected, contrary to Lemma 3.2. If xiv2 G E(G), then G contains a Z3-connected subgraph K- induced by {xi, y, v, vi, v2}, a contradiction. Thus, wvi, wv2, xiz, xiv2 G E(G). Since k'(G) > 4 and G contains no induced cycle of length at least 5, wxi G E(G). As the argument above, H[xiy,xivi] is Z3-connected. By Lemma 2.2, H is Z3-connected, contrary to Lemma 3.2. Finally, assume that xvi, xv2 G E(G). Let xxi, xx2 G E(G). Since G is Ki,3-free, xix2, yxi, yx2 G E(G). Since G contains no induced cycle of length at least 5, wvi, wv2, zvi, zv2 G E(G) and e({xi,x2}, {vi,v2}) = 0. Since k'(G) > 4 and G contains no induced cycle of length at least 5, wxi, zx2 G E(G) or wx2, zxi G E(G). In each case, L = G[{w, u, v, x, y, xi, x2, z}] satisfies the Ore-condition, by Lemma 2.3, L is Z3-connected, contrary to Lemma 3.2. If d(u) = 5 and d(v) = 5, let N(u) \ {v, w, z, x} = {ui} and N(v) \ {u, w, z, y} = {vi}. Since G is Ki,3-free, uix, viy G E(G). Since k'(G) > 4 and G contains no induced cycle of length at least 5, uivi G E(G). If uiy G E(G) or vix G E(G), then G[{u,v,x,y,ui,vi}] contains a subgraph isomorphic to G7 + e which is Z3-connected by Lemma 2.4, contrary to Lemma 3.2. Thus, uiy, vix G E(G). Assume that uiz G E(G). Since G is Ki,3-free, viz G E(G). It follows that G contains a Z3-connected subgraph W4 induced by {u, v, ui, vi, z} with the center at z, contrary to Lemma 3.2. Thus, by symmetry, we assume that uiz, viz G E(G) and wui, wvi G E(G). As k'(G) > 4, there is wi such that uiwi, wiw G E(G). Observe cycle wwiuixyvw. Since G contains no induced cycle of length at least 5, wiy G E(G). It follows that G contains a Ki 3 induced by {wi, ui, w, y}, a contradiction. If d(u) = 5 and d(v) = 6, let N(u) \ {v, w, z, x} = {ui} and N(v) \ {u, w, z, y} = {vi, v2}. Since G is Ki,3-free, uix, viy, v2y, viv2 G E(G). Since G contains no induced cycle of length at least 5, wvi, wv2, zvi, zv2 G E(G). Since k'(G) > 4 and G contains X. Li and J. Ma: Z3-connectivity of Ki:3-free graphs without induced cycle. 45 no induced cycle of length at least 5, by symmetry, we assume that uivi G E(G). If {uiy, «1^2, vix, v2x} n E(G) = 0, then G[{u, v, x, y, u1, v1 , v2}] contains a subgraph isomorphic to G13 + e which is Z3-connected by Lemma 2.4, contrary to Lemma 3.2. Thus, assume that u1y, u1v2, v1x, v2x G E(G). Since G has no induced cycle of length at least 5, u1z, wu1 G E(G). Since k'(G) > 4 and G contains no induced cycle of length at least 5, there is w1 such that such that u1w1, w1w G E(G). Since G is K1j3-free, w1y,w1x G E(G). This implies that G[{w1, u1, w, y}] is an induced K1j3, a contradiction. If d(u) = 6 and d(v) = 6, let N(u) \{v, w, z, x} = {u1, u2} and N(v) \{u, w, z, y} = {v1,v2}. since G is K13-free, u1x, u2x, m1m2, v1y, v2y, v1v2 G E(G). If either e({«1, «2}, {v1, V2}) > 2 or e({«1, «2}, {v1, V2 }) = 1 and {«1y, M1V2, «2y, U2V2, «2 V1}n E(G) = 0, then G[{u, v, x, y, u1, u2, v1, v2}] contains a subgraph isomorphic to G14 + e which is Z3-connected by Lemma 2.4, contrary to Lemma 3.2. Thus, e({«1, u2}, {v1, v2}) < 1. Moreover, if e({«1, u2}, {v1, v2} = 1 and u1y, u1v2, u2y, u2v2, u2v1 G E(G). In this case, let u1v1 G E(G). Since G contains no induced cycle of length at least 5, wu1, wu2, wv1, wv2, u2z G E(G). Consider the case that e({u1,u2}, {v1,v2}) =0. By Lemmas 2.4 and 3.2, e(x, {v1,v2}) < 1 and e(y, {u1, u2}) < 1. Since G contains no induced cycle of length at least 5, wu2, u2z G E(G). In each case, since k'(G) > 4 and G contains no induced cycle of length at least 5, there is w1 such that such that u2w1, w1w G E(G) and w1y, w1 x G E(G). In this case, G contains a K1j3 induced by {w1, u2, w, y}, a contradiction. Case 2. one edge of {xz, yz} is not in E(G). We assume, without loss of generality, that xz G E(G) and yz G E(G). Since G is K1j3-free, wz G E(G). Consider that d(u) = d(v) = 4. Since ¿(G) > 4 and G is K1j3-free, d(y) = 4. Let {y1,y2} C N(y) \ {x, v}. Assume that one edge of y1z, y2z is in G, without loss of generality, assume that y1z G E (G). Since G is K13-free, y1x, y2x, y1y2 G E(G). Let H = G[{u, v, w, x, y, z, y1, y2}]. Contracting the 2-cycle (y1, y2) in H[yyi ,yy2] and repeatedly contacting the 2-cycles generated in the process, eventually, we get a K1 which is Z3-connected. By Lemmas 2.1 and 2.2, H is Z3-connected, contrary to Lemma 3.2. Thus, y1z,y2z G E(G). Since k'(G) > 4 and G contains no induced cycle of length at least 5, wy1 G E(G) or wy2 G E(G). In each case, Contracting 2-cycle (u, w) and contracting all 2-cycle generated in the process in H[wu wz], we obtain a K- which is Z3-connected by Lemma 2.1 (1). By Lemma 2.2, H is Z3-connected, contrary to Lemma 3.2. If d(u) = 4 and d(v) = 5, let v1 G N(v) \ {w, u,y, z}. Since G is K1j3-free, v1y G E(G). Since k'(G) > 4, let yy1 G E(G). Let H be the subgraph induced by {«, v, x, y, w, z, y1, v1}. Since G is K13-free, xy1 G E(G). Since G contains no induced cycle of length at least 5, v1w G E(G). We claim that v1x G E(G) for otherwise, assume that v1x G E(G). Since G is K1j3-free, y1v1 G E(G). Contracting 2-cycle (y1, v1) and contracting all 2-cycles generated in the process in H[xyi ,xvi], we get a K- which is Z3-connected by Lemma 2.1 (4). By Lemma 2.2, H is Z3-connected, contrary to Lemma 3.2. If v1z G E(G), by Lemma 3.2, v1u, v1w G E(G). In this case, the subgraph induced by {z, x, w, v1} is a K1j3, a contradiction. Thus, v1 z G E(G). If wy1 G E(G), then H[wu wz] contains a 2-cycle (u, z). Contracting this 2-cycle and contracting all 2-cycles generated in the process, finally we obtain a K1. By Lemma 2.1 (1) (3) (5), and by Lemma 2.2, H is Z3-connected, contrary to Lemma 3.2. Thus, wy1 G E(G). Recall that wx G E(G). Since k'(G) > 4, there is a vertex w1 such that ww1, w1v1 G E(G). Since d(u) = 4 46 Ars Math. Contemp. 11 (2016) 11-33 and d(v) = 5, wiu, wiv € E(G). Since G has no induced cycle of length at least 5, wix € E(G). In this case, the subgraph induced by {w, w1, x, v1} is a K1j3, a contradiction. If d(u) = 4 and d(v) = 6, let N(v) \ {w, u, x, z} = {v1, v2}. Since G is K1j3-free, yv1, yv2.v1v2 € E(G). Assume that v1z € E(G). Observe the subgraph G[{z, x, w, v1}]. Since G is K13-free, xv1 € E(G) or wv1 € E(G). In the former case, G contains a Z3-connected subgraph W4 induced by {z, u, x, v1,v} with the center at z, contrary to Lemma 3.2. In the latter case, G contains a Z3-connected subgraph W4 induced by {w, u, z, v1, v} with the center at v, contrary to Lemma 3.2. Thus, v1z € E(G). Similarly, v2z € E(G). If v1x, v2x € E(G), then G contains a Z3-connected subgraph K- induced by {y, x, v1, v, v2}, contrary to Lemma 3.2. Thus,|{v1x, v2x} n E(G)| < 1. Assume that v1x € E(G). Since G contains no induced cycle of length at least 5, wv1, wv2 € E(G). Since k'(G) > 4 and G contains no induced cycle of length at least 5, there exists a vertex w1 such that ww1,w1v1 € E(G) and w1x € E(G). In this case, G contains a K1j3 induced by {w1, w, x, v1}, a contradiction. If d(u) = d(v) = 5, let N(u) \ {w, v, x, z} = {u1} and N(v) \ {w, u, y, z} = {v1}. Since G is K1j3-free, u1x, v1y € E(G). Since G is K1j3-free, zu1 € E(G). Since G has no induced cycle of length at least 5, wv1 € E(G). We claim that zv1 € E(G). To the contrary, assume that zv1 € E(G). Since G is K1j3-free, u1v1,xv1 € E(G). Let H = G[{u, v, w, x, y, z, u1, v1}]. Contracting the 2-cycle (u,x) in H[M1„ „1X] and repeatedly contacting the all 2-cycles generated in the process, eventually, we get a K1 which is Z3-connected. By Lemmas 2.1 and 2.2, H is Z3-connected, contrary to Lemma 3.2. Thus, v1z € E(G). In this case, since k'(G) > 4, there is a path Q from u1 to v1 avoiding any vertex in {z, w, u, v}. Since G has no induced cycle of length at least 5, |E(Q) | = 1, that is, v1u1 € E(G). If u1y € E(G) or v1x € E(G), then G[{u, v, x, y, u1, v1}] contains a subgraph isomorphic to G7 + e which is Z3-connected by Lemma 2.4, contrary to Lemma 3.2. Thus, u1y, v1x € E(G). Since G has no induced cycle of length at least 5, wu1 € E(G). As k'(G) > 4, there is a path P from w to v1. Since wv1 € E(G), there is w1 € V(G) such that w1w, w1 v1 € E(G). Since G has no induced cycle of length at least 5, w1x, w1y € E(G). Since G is K1j3-free, xv1 € E(G). This is a contradiction, as we have proved xv1 € E(G). If d(u) = 5 and d(v) = 6, let N(u) \ {w, v, x, z} = {u1} and N(v) \ {w, u, y, z} = {v1, v2}. Since G is K1j3-free, u1x, v1y, v2y, v1v2, zu1 € E(G). Since G has no induced cycle of length at least 5, wv1, wv2 € E(G). We claim that none of {zv1, zv2} is in E(G). Suppose otherwise that assume that zv1 € E(G). Since G is K1j3-free, u1v1,xv1 € E(G). Let H = G[{u, v, w, x, y, z, u1, v1, v2}]. Then H is isomorphic to G14 + e, which is Z3-connected by Lemma 2.4, contrary to Lemma 3.2. Thus, zv1,zv2 € E(G). As k'(G) > 4, there is a path P from u1 to v1 avoiding any vertex in {z, w, u, v, x, y}. Since G has no induced cycle of length at least 5, u1v1 € E(G). In this case, the subgraph induced by {u, v, x, y, z, u1, v1, v2} is also isomorphic to G14 + e, which is Z3-connected by Lemma 2.4, contrary to Lemma 3.2. If d(u) = d(v) = 6, let N(u) \ {w, v, x, z} = {u1, u2} and N(v) \ {w, u, y, z} = {v1, v2}. Since G is K^-free, u1x, u2x, u1u2, v1y, v2y, v1v2, zu1, zu2 € E(G). This means that the subgraph induced by {z, u, u1, u2, x} is a K5, which is Z3-connected by Lemma 2.1, contrary to Lemma 3.2. Acknowledgements The first author was supported by the Science Foundation of China (11171129) and by Doctoral Fund of Ministry of Education of China (20130144110001). X. Li and J. Ma: Z3-connectivity of Ki:3-free graphs without induced cycle. 47 References [1] J. A. Bondy and U. S. R Murty, Graph Theory with Application, North-Holland, New York, 1976. [2] J. J. Chen, E. Eschen and H. J. Lai, Group connectivity of certain graphs, Ars Combin. 89 (2008), 141-158. [3] G. Fan and C. Zhou, Degree sum and Nowhere-zero 3-flows, Discrete Math. 308 (2008), 6233-6240. [4] G. Fan and C. Zhou, Ore condition and Nowhere-zero 3-flows, SIAM J. Discrete Math. 22 (2008), 288-294. [5] G. Fan, H. -J. Lai, R. Xu, C. Q. Zhang and C. Zhou, Nowhere-zero 3-flows in triangularly connected graphs, J. Combin. Theory, SerB 98 (2008), 1325-1336. [6] T. Fukunaga, All 4-edge-connected HHD-Free graphs are Z3 -connected, Graphs and Combin. 27 (2011), 647-659. [7] F. Jaeger, N. Linial, C. Payan and M. Tarsi, Group connectivity of graphs-a nonhomogeneous analogue of Nowhere-zero flow properties, J. Combin. Theory, Ser B 56 (1992), 165-182. [8] H. -J. Lai, Nowhere-zero 3-flows in locally connected graphs, J. Graph Theory. 4 (2003), 211-219. [9] H. -J. Lai, Group connectivity of 3-edge-connected chordal graphs, Graphs and Combin. 16 (2000), 165-176. [10] X. Li, H. -J. Lai and Y. Shao, Degree condition and Z3-connectivity, Discrete Math. 312 (2012), 1658-1669. [11] L. Li, X. Li and C. Shu, Group connectivity of bridged graphs, Graphs and Combin. 29 (2013), 1059-1066. [12] L. M. Lovasz, C. Thomassen, Y. Wu and C. -Q. Zhang, Nowhere-zero 3-flows and modulo k-orientations, J. Combin. Theory, Ser. B 103 (2013), 587-598. [13] R. Luo, R. Xu, J. Yin and G. Yu, Ore-condition and Z3-connectivity, European J. Combin. 29 (2008), 1587-1595. [14] J. Ma and X. Li, Nowhere-zero 3-flows of claw-fre graphs, Discrete Math. 336 (2014), 57-68. [15] C. Thomassen, The weak 3-flow conjecture and the weak circular flow conjecture, J. Combin. Theory, Ser. B 102 (2012), 521-529. [16] W. T. Tutte, A contribution on the theory of chromatic polynomial, Canad. J. Math. 6 (1954), 80-91. [17] J. Yin and Y. Zhang, Posa-condition and nowhere-zero 3-flows, Discrete Math. 311 (2011), 897-907. [18] X. Zhang, M. Zhan, R. Xu, Y. Shao, X. Li and H. -J. Lai, Degree sum condition for Z3-connectivity, Discrete Math. 310 (2010), 3390-3397. ARS MATHEMATICA CONTEMPORANEA Also available at http://amc-journal.eu ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 11 (2016) 49-58 Finite two-distance-transitive graphs of valency 6 Wei Jin *, Li Tan School of Statistics, Jiangxi University of Finance and Economics, Nanchang, Jiangxi, 330013, P.R.China Research Center ofApplied Statistics, Jiangxi University ofFinance and Economics, Nanchang, Jiangxi, 330013, P.R.China Received 20 December 2014, accepted 8 April 2015, published online 18 August 2015 A non-complete graph r is said to be (G, 2) -distance-transitive if, for i = 1, 2 and for any two vertex pairs (ui, vi) and (u2, v2) with dr(ui, vi) = dr(u2, v2) = i, there exists g G G such that (u1, v1)g = (u2, v2). This paper classifies the family of (G, 2)-distance-transitive graphs of valency 6 which are not (G, 2)-arc-transitive. Keywords: 2-Distance-transitive graph, 2-arc-transitive graph, permutation group. Math. Subj. Class.: 05E18, 05B25 1 Introduction In this paper, all graphs are finite, simple, connected and undirected. For a graph r, we use V(r) and Aut(r) to denote its vertex set and automorphism group, respectively. For the group theoretic terminology not defined here we refer the reader to [4, 8, 26]. Let u, v G V(r). Then the distance between u, v in r is denoted by dr (u, v). A non-complete graph r is said to be (G, 2)-distance-transitive, if for i = 1,2 and for any two vertex pairs (ui, vi) and (u2,v2) with dr(ui,vi) = dr(u2,v2) = i, there exists g G G such that (u1, v1)g = (u2, v2). An arc is an ordered pair of adjacent vertices. A vertex triple (u, v, w) with v adjacent to both u and w is called a 2-arc if u = w. The graph r is said to be (G, 2)-arc-transitive if G is transitive on both the set of arcs and the set of 2-arcs. The first remarkable result about (G, 2)-arc-transitive graphs comes from Tutte [20,21], and since then, this family of graphs has been studied extensively, see [1, 12, 15, 16, 17, 23, 24]. By definition, every non-complete (G, 2)-arc-transitive graph is (G, 2)-distance-transitive. The converse is not necessarily true. If a (G, 2)-distance-transitive graph has * Supported by the NNSF of China (11301230), NSF of Jiangxi (20142BAB211008) and Jiangxi Education Department Grant (GJJ14351). E-mail addresses: jinwei@jxufe.edu.cn (Wei Jin), tltanli@126.com (Li Tan) Abstract ©® This work is licensed under http://creativecommons.Org/licenses/by/3.0/ 50 Ars Math. Contemp. 11 (2016) 11-33 girth 3 (length of the shortest cycle is 3), then this graph is not (G, 2)-arc-transitive. Thus, the family of non-complete (G, 2)-arc-transitive graphs is properly contained in the family of (G, 2)-distance-transitive graphs. The graph in Figure 1 is the Kneser graph KG6,2 which is (G, 2)-distance-transitive but not (G, 2)-arc-transitive of valency 6 for G = Aut(KG6,2). Therefore the following problem naturally arises: characterize the family of (G, 2)-distance-transitive graphs. At the moment, Corr, Schneider and the first author are investigating such graphs, and they classified the family of (G, 2)-distance-transitive but not (G, 2)-arc-transitive graphs of valency at most 5 in [6]. Hence 6 is the next smallest valency for (G, 2)-distance-transitive graphs to investigate. Our main theorem gives a classification of such graphs. Figure 1: Kneser graph KG6 2 Remark 1.1. Let r be a connected (G, 2)-distance-transitive graph. If r has girth at least 5, then for any two vertices u, v with dr (u, v) = 2, there exists a unique 2-arc between u and v. Hence r is (G, 2)-distance-transitive implies that it is (G, 2)-arc-transitive. If r has girth 4, then r can be (G, 2)-distance-transitive but not (G, 2)-arc-transitive. There are infinitely many such graphs. For instance, let r be the complement of the (2 x pk) - grid where p is a prime, and let M = Zk : Zpk-1, G = Z2 x M. Then r is (G, 2)-distance-transitive but not (G, 2)-arc-transitive of valency pk - 1 and girth 4. There are also infinitely many (G, 2)-distance-transitive graphs of girth 4 that are (G, 2)-arc-transitive, for example the complete bipartite graphs Km,m. If r has girth 3, then since r is non-complete, it follows that Gu is not 2-transitive on r(u), hence it is not (G, 2)-arc-transitive. The line graph L(r) of a graph r has the set of edges of r as its vertex set, and two edges are adjacent in L(r) if and only if they have a common vertex in r. The line graph of a complete bipartite graph Km,n is called an (m x n) -grid. Let r be a connected graph. The complement graph r of r, is the graph with vertex V(r), and two vertices are adjacent in r if and only if they are not adjacent in r. The Hamming graph H(d, n) has vertex set Zn = Zn x Zn x • • • x Zn, and two vertices are adjacent if and only if they have exactly one different coordinate. We denote by Km[b] the complete multipartite graph with m parts, and each part has b vertices where m > 3, b > 2. Let p be a prime such that p = 1 (mod 4). Then, the Paley graph P(p) is the Cayley graph Cay(T, S) for the additive group T = Fp+ with S = {w2,w4,...,wp-1 = 1} and r2(1) = {w, w3,..., wp-2}, where w is a primitive element of Fp, and Aut(r) = Zp : Zp-i. In particular, Hamming graphs and Paley graphs are (G, 2)-distance-transitive for G = Aut(r), see [3, 13]. W. Jin and L. Tan: Finite two-distance-transitive graphs of valency 6 51 The diameter diam(T) of a graph r is the maximum distance occurring over all pairs of vertices. Let u G V(T) and i = 1,2,..., diam(T). We use r¿(u) to denote the set of vertices at distance i with vertex w in r. Sometimes, r^u) is also denoted by r(w). Let Q be a set of cardinality n. Then the Kneser graph KG„jk is the graph with vertex set all k-subsets of Q, and two k-subsets are adjacent if and only if they are disjoint. The triangular graph T(n) is the graph with vertex set all 2-subsets of Q, and two 2-subsets are adjacent if and only if they share one common element. Thus KGn,2 = T(n). A subgraph X of r is an induced subgraph if two vertices of X are adjacent in X if and only if they are adjacent in r. When U C V(r), we use [U] to denote the subgraph of r induced by U. Since complete graphs have diameter 1, they do not provide interesting examples. Our main theorem determines the family of non-complete (G, 2)-distance-transitive graphs of valency 6 which are not (G, 2)-arc-transitive. Theorem 1.2. Let r be a connected non-complete (G, 2)-distance-transitive but not (G, 2)-arc-transitive graph of valency 6. Let u G V (r). Then one of the following holds. (1) r has girth 4, and (r, G) = ((2 x 7)-grid, S2 x M) where M is a 2-transitive but not 3-transitive subgroup of S7. (2) [r(w)] is connected, and r is isomorphic to one of: T(5), Paley graph P(13), K3[3] or K4[2]. (3) [r(u)] is disconnected, and either (3.1) [r(u)] = 2K3, r = H(2,4), or |F(u)| = 18 and r is a line graph; or (3.2) [r(u)] = 3K2, r = KG6,2, or |F(u)| = 12, 24. Remark 1.3. (1) There exist graphs r in Theorem 1.2 (3.1) such that |r2(u)| = 18. For instance the generalized hexagon of order (3,1) and the generalized dodecagon of order (3,1). These two graphs are locally isomorphic to 2K3 and |r2(u)| = 18. By [3, p.223], they are (G, 2)-distance-transitive for G = Aut(r), since they are non-complete and have girth 3, they are not (G, 2)-arc-transitive. (2) There exist graphs r in Theorem 1.2 (3.2) such that |r2 (u)| = 12 and also exist graphs such that |r2(u)| = 24. For instance H(3,3) has valency 6, [r(u)] = 3K2 and |r2(u)| = 12; the halved foster graph has valency 6, [T(u)] ^ 3K2 and |r2(u)| = 24. By [3, p.223], these two graphs are (G, 2)-distance-transitive for G = Aut(r), since they are non-complete and have girth 3, they are not (G, 2)-arc-transitive. 2 Proof of Theorem 1.2 In this section, we will prove our main theorem by a series of lemmas. All graphs are non-complete graphs. A graph r is said to be G-distance-transitive if G is transitive on the ordered pairs of vertices at any given distance. The study of finite G-distance-transitive graphs goes back to Higman's paper [10] in which "groups of maximal diameter" were introduced. These are permutation groups G which act distance-transitively on some graph. Then G-distance-transitive graphs have been studied extensively and a classification is almost done, see [2, 9, 11, 18, 19, 22, 25]. By definition, every non-complete G-distance-transitive graph is (G, 2)-distance-transitive. The following remark gives an useful observation. Remark 2.1. Let r be a (G, 2)-distance-transitive graph. Let u, w be two vertices such that dr(u, w) = 2. 52 Ars Math. Contemp. 11 (2016)49-58 Suppose that |r3(u) n r(w)| = 0. Then since r is (G, 2)-distance-transitive, r has diameter 2 and so it is G-distance-transitive. Suppose that |r3(u) n r(w)| = 1. Let (u0,... ,ui) be a path with dr(uo,Uj) = i where i = diam(r). Then for each j < diam(r) — 2, |r3(uj) n r(uj+2)| = 1. Note that, rj+3(wo) n r(uj+2) C r3(uj) n r(uj+2), and so |r,-+3(uo) n r(uj+2)| = 1, hence r is also G-distance-transitive. We use GU1] to denote the kernel of the Gu-action on r(u). Lemma 2.2. Let r be a (G, 2)-distance-transitive graph. Let u, w G V(r) be such that dr(u, w) = 2. Let g G gU1] be with order a prime p. Suppose that |r3(u) n r(w)| < p. Then g is not trivial on r2 (u). Proof. Suppose that g is trivial on r2(u). Let wi G r2(u). Since g G gU1] and g is trivial on r2(u), g fixes all the vertices in (r(u) U r2(u)) n r(wi) and g G Gwi. In particular, g fixes r3(u) n r(wi) setwise. Since r is (G, 2)-distance-transitive and |r3(u) n r(w)| < p, |r3(u) n r(wi)| < p. Since the order of g is prime p and g fixes r3(u) n r(wi) setwise, it follows that g fixes all the vertices in r3(u) n r(wi). Thus g G gW!. Since wi is any vertex of r2(u), g fixes all the vertices of r3(u). For any v G r(u), r2(v) C r(u) U r2(u) U r3(u). Thus g G gV1] and fixes all the vertices of r2 (v). Since r is (G, 2)-distance-transitive, for any z G r2(v), |r3(v) n r(z)| < p. Since g fixes all the vertices in (r(v) U r2(v)) n r(z), g fixes all the vertices in r3(v) n r(z). Thus g G Gi1]. In particular, g fixes all the vertices of r4 (u). Since r is connected, by induction, g fixes all the vertices of r, so g = 1, which is a contradiction. Thus g is not trivial on r2 (u). □ Lemma 2.3. Let r be a (G, 2) -distance-transitive graph of valency 6. Let u, w G V(r) be such that dr(u, w) = 2. If r has girth 4 and |r(u) n r(w)| = 3, then r is (G, 2)-arc-transitive. Proof. Suppose that r has girth 4 and |r(u) n r(w)| = 3. Let (u, v, w) be a 2-arc. Then dr(u, w) = 2 and |r2(u) n r(v)| = 5. Since r is (G, 2)-distance-transitive, there are 30 edges between r(u) andr2(u). Since |r(u)nr(w)| = 3 and |r(u)nr(w)| • |r2(u)| = 30, it follows that |r2(u)| = 10. Again since r is (G, 2)-distance-transitive, Gu is transitive on both r(u) and r2(u), so both |r(u)| and |r2(u)| divide |GU|, hence 30 divides |GU|. Thus 5 divides |Gu,v |, so Gu,v has an element g of order 5. Therefore either (g) is regular on r(u) \ {v} or is trivial on r(u) \ {v}. If (g) is regular on r(u) \ {v}, then Gu,v is transitive on r(u) \ {v}, so Gu is 2-transitive on r(u). Thus r is (G, 2)-arc-transitive. Now suppose that g is trivial on r(u)\{v}. Then g G gU1]. Since |r(u) nr(w)| = 3, it follows that |r3(u) nr(w)| < 3 < 5. Thus by Lemma 2.2, g is not trivial on r2(u). Hence (g) has orbits of size 5 on r2(u). Since g fixes r2(u) nr(vi) setwise and |r2(u) nr(vi)| = 5, it follows that (g) is transitive on r2(u)nr(vi). Thus Gu,vi is transitive on r2(u)nr(vi), so r is (G, 2)-arc-transitive. □ Lemma 2.4. ([6]) Let r = Km,m with m > 2. Then r is (G, 2)-distance-transitive if and only if it is (G, 2)-arc-transitive. A permutation group G on a set Q is said to be 2-homogeneous, if G is transitive on the set of 2-subsets of Q. W. Jin and L. Tan: Finite two-distance-transitive graphs of valency 6 53 Lemma 2.5. ([8, Theorem 9.4B]) Let G be a 2-homogeneous permutation group which is not 2-transitive of degree n. Then n = pe = 3 (mod 4) where p is a prime. Lemma 2.6. Let r be a (G, 2)-distance-transitive but not (G, 2)-arc-transitive graph of valency 6. If r has girth 4, then (r, G) = ((2 x 7)-grid, S2 x M) where M is a 2-transitive but not 3-transitive subgroup of S7. Proof. Suppose that r has girth 4. Let (u, v, w) be a 2-arc. Then dr(u, w) = 2, |r2(u) n r(v)| =5 and |r(u) n r(w)| > 2. Further there are 30 edges between r(u) and ^(u). Since r is (G, 2)-distance-transitive, |r(u) n r(w)| divides 30. Since 2 < |r(u) nr(w)| < 6, we have |r(u) n r(w) | = 2, 3, 5 or 6. Suppose first that |r(u) n r(w)| = 2. Then since r has girth 4, each 2-arc of r lies in a unique 4-cycle. Thus, there is a 1-1 mapping between the unordered vertex pairs in r(u) and vertices in r2(u). Since Gu is transitive on r2(u), it follows that Gu is transitive on the set of unordered vertex pairs in r(u). Hence Gr(u) is 2-homogeneous on r(u). Further, since r is not (G, 2)-arc-transitive, Gr(u) is not 2-transitive on r(u). Thus by Lemma 2.5, the valency of r is pe = 3 (mod 4) where p is a prime, contradicting the fact that r has valency 6. Next, if |r(u) n r(w)| = 3, then by Lemma 2.3, r is (G, 2)-arc-transitive, which is a contradiction. Thirdly, suppose that |r(u) n r(w)| = 5. Then ^(u) n r(w)| < 1. It follows from Remark 2.1 that r is G-distance-transitive. By inspecting the graphs in [3, p. 222-223], r is isomorphic to (2 x 7)-grid. Noting that (2 x 7)-grid is (Aut(r), 2)-arc-transitive. Thus S2 < G < Aut(r) = S2 x S7. Let G = S2 x M where M < S7. Then Gu = Mu. Since r is (G, 2)-distance-transitive but not (G, 2)-arc-transitive, Mu is transitive but not 2-transitive on r(u). Thus M is a 2-transitive but not 3-transitive subgroup of S7. Finally, if |r(u) n r(w) | = 6, then r = Ke,e, and by Lemma 2.4, r is (G, 2)-distance-transitive implies that it is (G, 2)-arc-transitive, which is a contradiction. □ In a non-complete graph r, a 2-geodesic of r is a 2-arc (u0,u1, u2) such that dr (u0, u2) = 2. The graph r is said to be (G, 2)-geodesic-transitive, if G is transitive on both the set of arcs and the set of 2-geodesics. Hence, a non-complete G-arc-transitive graph is (G, 2)-geodesic-transitive if, for any arc (u, v), Gu,v is transitive on r2(w) n r(v). By definition, every (G, 2)-geodesic-transitive graph is (G, 2)-distance-transitive. Suppose that r is a G-distance-transitive graph of valency k and diameter d. Then the cells of the distance partition with respect to vertex w are orbits of Gu, every vertex in r¿ (u) is adjacent to the same number of other vertices in ri_1 (u), say c¿. Similarly, every vertex in Fj(u) is adjacent to the same number of other vertices in ri+1(u), say 6¿. The notation (k, b1,..., bd_1; 1, c2,..., cd) is called the intersection array of r. Lemma 2.7. Let r be a (G, 2)-distance-transitive but not (G, 2)-arc-transitive graph of valency 6. Let u G V(r). If [r(u)] is connected, then r is isomorphic to one of: T(5), Paley graph P(13), K3[3] or K^j. Proof. Suppose that [T(u)] is connected. Let (u, v, w) be a 2-arc such that dr(u,w) = 2. Since r is (G, 2)-distance-transitive, Gu is transitive on r(u), so [r(u)] is a vertex-transitive graph. Let k be the valency of [r(u)]. Since [r(u)] is connected and |r(u) | = 6, it follows that k = 2,3,4, 5. Let r(u) = {v1, v2, v3, v4, v5, v6}. If k = 5, then [r(u)] = K6, and so r = K7, contradicting the fact that r is non-complete. 54 ArsMath. Contemp. 11 (2016)49-58 Suppose that k = 4. Then |r(u) n r(vi)| = 4, say r(u) n r(vi) = {v2, v3, v4, v5}. Since |r(u) n r(v6)| = 4 and v1,v6 are non-adjacent, it follows that r(u) n r(v6) = {v2, v3,v4,v5}. Thus [r(u)] has diameter 2, and {v1,v6} is a block. Since [r(u)] is vertex-transitive, [r(u)] = K3[2], and by [3, p.5] or [5], r = K4[2]. Suppose that k = 3. Then |r(u)nr(v1)| = 3, say r(u)nr(v1) = {v2, v3, v4}. Assume first that [r(u)] does not have triangles. Then every vertex of {v2, v3, v4} is adjacent to both v5 and v6. Thus [r(u)] = K3,3. Then by [3, p.5] or [5], r = K3[3]. Next, assume that [r(u)] has a triangle. Since [r(u)] is vertex-transitive, every vertex of r(u) lies in a triangle. Let (v1, v2, v3) be a triangle. Since [r(u)] is connected, v4 is adjacent to neither v2 nor v3. Thus v4 is adjacent to both v5 and v6. Since v4 lies in a triangle and {v5, v6} c r2(v1), it follows that v5, v6 are adjacent. Further, v2 is adjacent to one of {v5, v6}, say v5, and v3 is adjacent to the remaining vertex v6. Thus [r(u)] is isomorphic to the 3-prism, (v1, v2,v3) and (v4, v5, v6) are the two triangles, and {v1, v4}, {v2, v5} and {v3, v6} are edges. Since k = 3, it follows that |^(u) n r(v1)| = 2. Set ^(u) n r(v1) = {W1 ,W2}. Then r(v1) = {u, v2,v3, v4, w1, w2}. Since [r(v1)] is isomorphic to the 3-prism, it follows that v4 is adjacent to both w1 and w2, v2 is adjacent to one of {w1,w2}, say w1, and v3 is adjacent to w2. Thus r(v4) = {u, v1, v5, v6, w1, w2}. Since [r(v4)] is isomorphic to the 3-prism, it follows that w1 is adjacent to one of {v5, v6}, say v5. Thus {v1, v2, v4, v5} C r(u) n r(w1). Since w2 G r(w1), it follows that |r3(u) n r(w1)| < 1. Thus by Remark 2.1, r is G-distance-transitive. Since {v1, v2, v4, v5} C r(u) n r(w1) and {w1} C r2(u) n r(w1), it follows that |r(u) n r(w1)| =4 or 5. Since r is (G, 2)-distance-transitive and |r2(u) n r(v1)| = 2, there are 12 edges between r(u) and r2(u). Thus |r(u) n r(w1)| divides 12, so |r(u) n r(w1)| = 4. Hence |r2(u)| = 3. Since Gu is transitive on r2(u), [r2(u)] is a vertex-transitive regular graph. Since w1,w2 are adjacent, [r2(u)] = C3. Therefore, |r3(u) n r(w1)| =0, r has diameter 2 and has 10 vertices. In particular, the intersection array of r is (6,2; 1,4). By inspecting the graphs in [3, p.222-223], r is T(5) (also known as the Johnson graph J(5, 2)). If k = 2, then [r(u)] = C6. Let (v1,... ,v6) bea6-cycle. Then |r2(u) n r(v1)| = 3, and set r2(u) n r(v1) = {w1,w2,w3}. Then r(v1) = {u, v2, v5, w1, w2, w3}. Since [r(v1)] = C6 and (v2, u, v6) is a2-arc, it follows that v2 is adjacent to one of {w1, w2, w3}, say w1; v6 is adjacent to one of {w2, w3}, say w3; and w2 is adjacent to both w1 and w3. In particular, v2 is not adjacent to any of {w2, w3}, and v6 is not adjacent to any of {w1, w2}. Since |r2(u) n r(v2)| = 3, there exist w4, w5 in r2(u) that are adjacent to v2, and so r(v2) = {u, v1, v3, w1, w4, w5}. Noting that [r(v2)] = C6 and (w1, v1, u, v3) is a 3-arc, so v3 is adjacent to one of {w4, w5}, say w5, w1 is adjacent to w4, and w4, w5 are adjacent. Thus, {v1,v2,w2,w4} C (r(u) U r2(u)) n r(w1). Hence 2 < |r(u) n r(w1)| < 4 and |r2(u) n r(w1)| > 2. Since r is (G, 2)-distance-transitiveand |r2(u) n r(v1)| = 3, there are 18 edges between r(u) andr2(u). Since |r(u)nr(w1)| divides 18, |r(u)nr(w1)| = 2 or 3. Suppose that |r(u) n r(w )| = 2. Then |^(u)| = 9. Since |r (u) n r(w1)| > 2, |r3(u) n r(w1)| < 2. If |r3(u) n r(w1)| < 1, then by Remark 2.1, r is G-distance-transitive. Inspecting the graphs in [3, p. 222-223], such a r does not exist. Hence |r3 (u) n r(w1)| = 2. Since r is (G, 2)-distance-transitive, both |r(u)| and |r2(u)| divide |Gu|, hence 18 divides |Gu|. Thus 3 divides |Gu,v |. Therefore Gu,v has an element g of order 3. Since |r(u) \ {v}| = 5, it follows that g is trivial on r(u) \ {v}, so g G G^]. Hence g fixes r2(u) n r(vj) setwise. By Lemma 2.2, g is not trivial on r2(u). Hence (g) has orbits of W. Jin and L. Tan: Finite two-distance-transitive graphs of valency 6 55 size 3 on r2(u). Since g fixes r2(u) nr(vj) setwise and |r2 (u) nr(vj)| = 3, it follows that (g) is transitive on r2(u) n r(vj). Thus Gu,vi is transitive on r2(u) n r(vj). Therefore r is (G, 2)-geodesic-transitive. Then by [7, Corollary 1.4], r is either the Octahedron or the Icosahedron. However, these two graphs do not have valency 6, which is a contradiction. Finally, suppose that |r(u) n r(wi)| = 3. Since there are 18 edges between r(u) and ^(u), and |^(u)| • |r(u) n r(wi)| = 18, |^(u)| = 6. Since |^(u) n r(wi)| > 2, |r3(u) n r(w1)| < 1. Thus by Remark 2.1, r is G-distance-transitive. Inspecting the graphs in [3, p. 222-223], r is the Paley graph P(13). □ Lemma 2.8. Let r be a (G, 2)-distance-transitive graph of valency 6. Let u be a vertex of r. If [r(u)] = 2K3, then |r2 (u)| =9 or 18. Proof. Suppose that [r(u)] = 2K3. Then each arc lies in a unique K4. Let r(u) = {v1,v2, v3, v4, v5, v6} such that (v1,v2,v3) and (v4,v5,v6) are two triangles. Then for each Vi, |r2(u)nr(v,)| = 3. Since [r(v1)] ^ 2K3, it follows that r2(u)nr(vi)nr(vj) = 0 for i, j € {1, 2, 3}. Thus |r2(u)| > 9. On the other hand, since r is (G, 2)-distance-transitive and |r2(u) n r(v1)| = 3, there are 18 edges between r(u) and r2(u). Thus |r2(u)| divides 18, and so |r2(u)| = 9 or 18. □ If further |r2 (u) | = 9, then such a graph is unique. Lemma 2.9. Let r be a (G, 2)-distance-transitive graph of valency 6. Let u be a vertex of r. Suppose that [r(u)] = 2K3 and |r2(u)| = 9. Then r = H(2,4) Proof. Since [r(u)] = 2K3, each arc lies in a unique K4. Let r(u) = {v1, v2, v3, v4, v5, v6}. Let (v1,v2,v3) and (v4,v5,v6) be the two triangles of [r(u)]. Then for each Vj, |r2(u) n r(v,)| = 3. Since [r(v1)] = 2K3, it follows that r2(u) n r(v,) n r(vj) = 0 for i = j € {1, 2,3}. Since |^(u)| =9, r2(u) = (^(u) n r(v1)) U (r2(u) n r(v2)) u (r2(u) n r(v3)). Setr2(u) nr(v1) = {w1,w2,w3}, r2(u) n r(v2) = {w4, w5,w6}, and r2(u) n r(v3) = {w7,w8,wg}. Since [r(v1)] = [r(v2)] = [r(v3)] = 2K3, it follows that (w1, w2, w3), (w4, w5, w6) and (w7, w8, w9) are three triangles. Since r is (G, 2)-distance-transitive and |r2(u) n r(v1)| = 3, there are 18 edges between r(u) and r2(u). Since |r2(u)| = 9, it follows that for each wj, |r(u) n r(wj)| = 2. By the previous argument, w1 is not adjacent to any of {v2, v3}, so w1 is adjacent to one of {v4,v5,v6}, say v4. Then r(u) n r(w1) = {v1,v4}. As each arc lies in a unique K4 and (v1,w1 ,w2,w3) is a K4, it follows that v4 is not adjacent to any of {w2,w3}. Since |r(u) n r(v4)| = 3 and |r(vj) n r(v4)| = 2 for i = 1,2,3, V4 is adjacent to one of {w4,w5, w6}, say w4, and is adjacent to one of {w7, w8,w9}, say w7. Then r(v4) = {u,v5,v6,w1,w4,w7}. Since [r(v4)] = 2K3 and (u, v5,v6) is a triangle, it follows that (w1,w4,w7) is a triangle. Thus, r(w1) = {v1, v4, w2, w3, w4, w7}, and so r3(u) n r(w1) = 0. Since r is (G, 2)-distance-transitive, it follows that r is G-distance-transitive with diameter 2 and has 16 vertices. Thus by inspecting the graphs in [3, p. 222-223], r = H(2, 4). □ Lemma 2.10. Let r be a (G, 2)-distance-transitive graph of valency 6. Let u be a vertex of r. If [r(u)] = 3K2, then |^(u)| = 8,12, or 24. Proof. Suppose that [T(u)] = 3K2. Then each arc lies in a unique triangle. Let r(u) = {v1, v2, v3, v4, v5, v6} be such that (v1, v2), (v3, v4), and (v5, v6) are three arcs. Then for 56 ArsMath. Contemp. 11 (2016)49-58 each Vi, |r (u) nr(vi)| = 4. Since [r(vi)] = 3K2, it follows that ^(u) nr(vi) nr(v2) = 0. Thus |r2(u)| > 8. Since r is (G, 2)-distance-transitive and |r2(u) n r(v1)| = 4, there are 24 edges between r(u) and r2 (u). Since |r2 (u) | divides 24, it follows that |r2 (u) | = 8, 12, or 24. □ If further |r2 (u) | = 8, then r is known. Lemma 2.11. Let r be a (G, 2)-distance-transitive graph of valency 6. Let u be a vertex of r. Suppose that [T(u)] = 3K2 and |r2(u)| = 8. Then r = KG6,2 Proof. Since r is symmetric and [r(u)] = 3K2, each arc lies in a unique triangle. Set r(u) = {v1, v2, v3, v4, v5,v6}. Let (v1,v2), (v3,v4) and (v5,v6) be three arcs. Then for each vi, |r2 (u) nr(vi)| = 4. Since [r(vi)] = 3K2, it follows that r2(u) nr(vi) nr(v2) = 0. Since |r2(u)| = 8, r2(u) = (r2(u) n r(vi)) u (r2(u) n r(v2)). Setr2(u) n r(vi) = {w1, w2, w3, w4}, and r2(u) n r(v2) = {w5, w6, w7, w8}. Since [r(vi)] = [r(v2)] = 3K2, it follows that (w1, w2), (w3, w4), (w5, w6) and (w7, w8) are arcs. Since r is (G, 2)-distance-transitive and |r2(u) n r(v1)| = 4, there are 24 edges between r(u) and r2(u). As |r2(u)| = 8, it follows that for each wi, |r(u) n r(wi)| = 3. By the previous argument, w1 is not adjacent to v2. Noting that r2(u) n r(vi) n r(v¿) = 0 for (i, j) = (1,2), (3,4), (5,6). Thus w1 is adjacent to one of {v3, v4}, say v3, and is also adjacent to one of {v5, v6}, say v5. Then r(u) n r(w1) = {v1, v3, v5}. Since each arc lies in a unique triangle and (v1, w1, w2) is a triangle, it follows that v3 is not adjacent to w2. By |r2(u) n r(v3)| =4 and |r(vi) n r(v3)| = 3 for i = 1,2, v3 is adjacent to one of {w3, w4}, say w3, and is also adjacent to two vertices of {w5, w6, w7, w8}, say w5, w7. Then r(v3) = {u, v4, w1, w3, w5, w7}. Since [r(v3)] = 3K2 and (u,v4) is an arc, it follows that (w1,w5) and (w3,w7) are two arcs. Thus, {v1,v3,v5} U {w2,w5} C r(w1), and so |r3(u) n r(w1)| < 1. Since r is (G, 2)-distance-transitive, it follows from Remark 2.1 that r is G-distance-transitive. One part of the intersection array of r is (6,4,...; 1, 3,...). By inspecting the graphs in [3, p.221], r = KG6,2. □ Lemma 2.12. Let r be an arc-transitive graph and let u be a vertex of r. Suppose that r(u) = U U W, where |U | = |W | = n and U n W = 0. Assume further that [U ] = [W ] = Kn. Let v1 € U. If |r(u) n r(v1) n W| < n - 2, then r is a line graph. Proof. Suppose that |r(u) n r(v1) n W| < n - 2. Then [U] and [W] are the only two n-cliques of r(u). It follows from [14, Proposition 2.1] that r is a line graph. □ Proof of Theorem 1.2. Let r be a connected non-complete (G, 2)-distance-transitive but not (G, 2)-arc-transitive graph of valency 6. If r has girth at least 5, then for any two vertices with distance 2, there exists a unique 2-arc between these two vertices. Thus r is (G, 2)-arc-transitive, which is a contradiction. Hence r has girth 3 or 4. If r has girth 4, then it follows from Lemma 2.6 that (r, G) = ((2 x 7)-grid, S2 x M) where M is a 2-transitive but not 3-transitive subgroup of S7, so that (1) holds. Suppose that r has girth 3. Let (u, v, w) be a 2-arc such that dr (u, w) = 2. If [r(u)] is connected, then by Lemma 2.7, r is isomorphic to one of: T(5), Paley graph P(13), K3[3] or K4[2], (2) holds. If [r(u)] is disconnected, then Gu has blocks in r(u), and each block has cardinality 2 or 3. If each block has cardinality 3, then [r(u)] = 2K3; if each block has cardinality 2, then [r(u)] = 3K2. Suppose that [r(u)] = 2K3. Then by Lemma 2.8, |r2(u)| = 9 or 18. If |r2(u)| = 9, then by Lemma 2.9, r = H(2,4). If |r2(u)| = 18, then by Lemma 2.12, r is a line graph, (3.1) holds. W. Jin and L. Tan: Finite two-distance-transitive graphs of valency 6 57 Finally, if [T(u)] ^ 3K2, then by Lemma 2.10, |r2(u)| = 8,12, or 24. In particular, if |r2(u)| = 8, then by Lemma 2.11, r = KGe,2, so that (3.2) holds. □ References [1] B. Alspach, M. Conder, D. MaruSic and M. Y. Xu, A classification of 2-arc-transitive circulants, J. Algebraic Combin. 5 (1996), 83-86. [2] E. Bannai and T. Ito, On distance regular graphs with fixed valency, Graphs and Combin. 3 (1987), 95-109. [3] A. E. Brouwer, A. M. Cohen and A. Neumaier, Distance-Regular Graphs, Springer Verlag, Berlin, Heidelberg, New York, 1989. [4] P. J. Cameron, Permutation Groups, volume 45 of London Mathematical Society Student Texts, Cambridge University Press, Cambridge, 1999. [5] A. M. Cohen, Local recognition of graphs, buildings, and related geometries, edited by W. M. Kantor, R. A. Liebler, S. E. Payne and E. E. Shult, In Finite Geometries, Buildings, and related Topics, Oxford Sci. Publ., New York, 1990, 85-94. [6] B. Corr, W. Jin and C. Schneider, Two-distance-transitive but not two-arc-transitive graphs, in preparation. [7] A. Devillers, W. Jin, C. H. Li and C. E. Praeger, Line graphs and geodesic transitivity, Ars Math. Contemp. 6 (2013), 13-20. [8] J. D. Dixon and B. Mortimer, Permutation groups, Springer, New York, 1996. [9] A. Gardiner and C. E. Praeger, Distance transitive graphs of valency six, Ars Combin. A 21 (1986), 195-210. [10] D. G. Higman, Intersection matrices for finite permutation groups, J. Algebra 6 (1967), 22-42. [11] A. A. Ivanov and A. V. Ivanov, Distance transitive graphs of valency k, 8 < k < 13, in Algebraic, Extremal and Metric Combinatorics, in 1986, Cambridge Univ. Press, Cambridge, (1988), 112-145. [12] A. A. Ivanov and C. E. Praeger, On finite affine 2-arc transitive graphs. European J. Combin. 14 (1993), 421-444. [13] W. Jin, A. Devillers, C. H. Li and C. E. Praeger, On geodesic transitive graphs, Discrete Math., 338 (2015), 168-173. [14] W. Jin, W. J. Liu and S. J. Xu, Line graphs and 2-geodesic transitive graphs, submitted. [15] C. H. Li and J. M. Pan, Finite 2-arc-transitive abelian Cayley graphs, European J. Combin. 29 (2008), 148-158. [16] D. MaruSic, On 2-arc-transitivity of Cayley graphs, J. Combin. Theory Ser. B 87 (2003), 162196. [17] C. E. Praeger, On a reduction theorem for finite, bipartite, 2-arc transitive graphs, Australas. J. Combin. 7 (1993) 21-36. [18] C. E. Praeger, J. Saxl and K. Yokohama, Distance transitive graphs and finite simple groups, Proc. London Math. Soc. (3)55 (1987), 1-21. [19] D. H. Smith, Distance transitive graphs of valency four, J. London Math. Soc. (2)8 (1974), 377-384. [20] W. T. Tutte, A family of cubical graphs, Proc. Cambridge Philos. Soc. 43 (1947), 459-474. [21] W. T. Tutte, On the symmetry of cubic graphs, Canad. J. Math. 11 (1959), 621-624. 58 Ars Math. Contemp. 11 (2016)49-58 [22] J. Van Bon, Affine distance transitive groups, Proc. London Math. Soc., (3)67 (1993), 1-52. [23] R. Weiss, s-Arc transitive graphs, Algebraic Metheods in Graph Theory I, II, (Szeged, 1978), Colloq. Math. Soc. Janos. Bolyai vol.25, North Holland, Amsterdam, 1978, 827-847. [24] R. Weiss, The non-existence of 8-transitive graphs, Combinatorica 1 (1981), 309-311. [25] R. Weiss, Distance transitive graphs and generalized polygons, Arch. Math. 45 (1985), 186192. [26] H. Wielandt, Finite Permutation Groups, New York: Academic Press, 1964. ARS MATHEMATICA CONTEMPORANEA Also available at http://amc-journal.eu ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 11 (2016) 59-78 Spherical folding tessellations by kites and isosceles triangles IV Catarina P. Avelino , Altino F. Santos Pólo CMAT-UTAD, Centro de Matemática da Universidade do Minho Universidade de Tras-os-Montes e Alto Douro, UTAD, Quinta de Prados, 5000-801 Vila Real, Portugal Received 13 July 2014, accepted 28 September 2014, published online 18 September 2015 The classification of the dihedral folding tessellations of the sphere and the plane whose prototiles are a kite and an equilateral triangle were obtained in [1]. Recently, this classification was extended to isosceles triangles so that the classification of spherical folding tesselations by kites and isosceles triangles in three cases of adjacency was presented in [2, 3, 4]. In this paper we finalize this classification presenting all the dihedral folding tessellations of the sphere by kites and isosceles triangles in the remaining three cases of adjacency, that consists of five sporadic isolated tilings. A list containing these tilings including its combinatorial structure is presented in Table 1. Keywords: Dihedral f-tilings, combinatorial properties, spherical trigonometry, symmetry groups. Math. Subj. Class.: 52C20, 05B45, 52B05 1 Introduction By a folding tessellation or folding tiling of the Euclidean sphere S2 we mean an edge-to-edge pattern of spherical geodesic polygons that fills the whole sphere with no gaps and no overlaps, and such that the "underlying graph" has even valency at any vertex and the sums of alternate angles around each vertex are n. Folding tilings (f-tiling, for short) are strongly related to the theory of isometric foldings on Riemannian manifolds. In fact, the set of singularities of any isometric folding corresponds to a folding tiling, see [13] for the foundations of this subject. The study of this special class of tessellations was initiated in [5] with a complete classification of all spherical monohedral folding tilings. Ten years latter Ueno and Agaoka E-mail addresses: cavelino@utad.pt (Catarina P. Avelino), afolgado@utad.pt (Altino F. Santos) Abstract ©® This work is licensed under http://creativecommons.Org/licenses/by/3.0/ 60 Ars Math. Contemp. 11 (2016) 11-33 [14] have established the complete classification of all triangular spherical monohedral tilings (without any restriction on angles). Dawson has also been interested in special classes of spherical tilings, see [10], [11] and [12], for instance. The complete classification of all spherical folding tilings by rhombi and triangles was obtained in 2005 [8]. A detailed study of the triangular spherical folding tilings by equilateral and isosceles triangles is presented in [9]. Spherical f-filings by two noncongruent classes of isosceles triangles in a particular case of adjacency were recently obtained [6]. Here we discuss dihedral folding tessellations by spherical kites and isosceles spherical triangles. A spherical kite K (Figure 1(a)) is a spherical quadrangle with two congruent pairs of adjacent sides, but distinct from each other. Let us denote by (a1,a2,a1, a3), a2 > a3, the internal angles of K in cyclic order. The length sides are denoted by a and b, with a < b. From now on T denotes a spherical isosceles triangle with internal angles ft and y (Y = ft), and length sides c and d, see Figure 1(b). We shall denote by Q(K, T) the set, up to isomorphism, of all dihedral folding tilings of S2 whose prototiles are K and T. (a) (b) d Figure 1: A spherical kite and a spherical isosceles triangle Taking into account the area of the prototiles K and T we have 2«i + a2 + a3 > 2n and ft + 27 > n. As a2 > a3 we also have ai + a2 > n. We begin by pointing out that any element of Q (K, T) has at least two cells congruent to K and T, respectively, such that they are in adjacent positions and in one and only one of the situations illustrated in Figure 2. After certain initial assumptions are made, it is usually possible to deduce sequentially the nature and orientation of most of the other tiles. Eventually, either a complete tiling or an impossible configuration proving that the hypothetical tiling fails to exist is reached. In the diagrams that follow, the order in which these deductions can be made is indicated by the numbering of the tiles. For j > 2, the location of tiling j can be deduced directly from the configurations of tiles (1, 2,... ,j - 1) and from the hypothesis that the configuration is part of a complete tiling, except where otherwise indicated. C. P. Avelino and A. F. Santos: Spherical folding tessellations by kites and isosceles triangles IV 61 The cases of adjacency I, II and III have already been analyzed in [2, 3, 4]. In this paper we consider the remaining cases of adjacency IV, V and VI. 2 Case of Adjacency IV Suppose that any element of Q (K, T) has at least two cells congruent, respectively, to K and T, such that they are in adjacent positions as illustrated in Figure 2-IV. As b = d, using trigonometric formulas, we obtain cos y(1 + cos 8) cos a +cos ai cos 03 -^-:—ô— =--■-—a—-. (2.1) sin y sin p sin ai sin Concerning the angles of the triangle T we have necessarily one of the following situations: Y > 8 or y < 8. In the following subsections we consider separately each one of these cases. 2.1 Y > fl In this case we have y > f and a,c a2 > a3. In fact, if a2 > a1 and (a) (b) Figure 3: Local configurations (i) a1 + y = n (Figure 3(b)), we reach a contradiction at vertex v2, as a2 + p > n, for all p G {ai, «2}; (ii) a1 + y < n (Figure 4(a)), at vertex v1 we have necessarily a2 + y + ka3 = n, k > 1. But (a1 + a1 + y) + (a2 + y + a3) > (2a1 + a2 + a3) > 2n, which is impossible. At vertex v1 we have ai + y = n or ai + 7 < n. 1. Suppose firstly that a1 + 7 = n (Figure 4(b)). At vertex v3 we have ka2 = n, with k > 2. As (a1 y) + (a2 + a2 + a2) > (a1 + a2) + (y + ft + > 2n, it follows that k = 2 (a2 = 2). With the labeling of Figure 4(b), if (i) = a3 (Figure 5(a)), then at vertex v3 we have necessarily a1 + kft = n, k > 2, and so a1 > t2 = a2 > y > a3 > ft (note that a1 + ft + a3 > n). But then tile 9 must be a triangle, which is impossible; (ii) = ft (Figure 5(b)), then at vertex v2 it follows that a1 + kft = n, k > 2 (note that we must have a3 > ft). But at vertex v3 we have y + Y < n and y + Y + p > n, for all p. (iii) = y, we get the configuration illustrated in Figure 6(a). Now, if C. P. Avelino and A. F. Santos: Spherical folding tessellations by kites and isosceles triangles IV 63 «3 «1 «1 «2 5 «3 «1 «2 «1 1 «1 «3 V2 e «3 «1 7 «1 «2 «2 y p (a) case 1(i) «1 «1 «1 «2 «2 «1 «2 5 «3 «1 «2 «1 «2 «1 «3 9 8 "to -Y "to 61 p Y p 11 10 Y YY 12 p (b) case 1 (ii) 4 6 3 2 Figure 5: Local configurations Figure 6: Local configurations (a) 02 = «1 (Figure 6(b)), we have necessarily « + ka3 = n, with k > 2, and ai > f- = a2 > 7 > fi > «3 (a1 + fi + > n). But then, the other sum of alternate angles at vertex v3 must be greater or equal than a1 + fi + fi > n, which is a contradiction (3n > (a1 + 7) + (a2 + a2) + (a1 + fi + fi) > (2«i + «2 + «3) + (fi + 7 + 7) > 3n). (b) 02 = fi (Figure 7(a)), at vertex v3 we have 7 + 7 + ka3 = n, k > 1, and a contradiction arises at vertex v4 as a1 + p > n, for all p G {a1, a2}. (c) 02 = 7, at vertex v3 we have 03 G {fi, a3}. In the first case, illustrated in Figure 7(b), we reach a contradiction at vertex v5. On the other hand, if 03 = a3, due to the angles involved in the sums of alternate angles at vertex v3, we must have a3 = fi. Taking into account the triangle and the kite's areas, it follows that 7 + fi + fi = 7 + a3 + a3 = n (Figure 8). At vertex v6 we have a1 + fi < n and a1 + fi + p > n, for all p G {a1, a2, a3, fi, 7}. (d) 02 = a3, taking into account the analysis of the previous cases, at vertex v3 we have ka3 = kfi = n, k > 3. Due to the kite's area, it follows that 7 -4 < f and consequently cos f < cos (7 - 4). Using equation (2.1), we conclude that fi > f, and so k = 3. The last configuration is then extended to the one illustrated in Figure 9(a). We shall denote this f-tiling by L. Its 3D 64 Ars Math. Contemp. 11 (2016) 11-33 Figure 7: Local configurations representation is given in Figure 9(b). 2. Suppose now that a1 + 7 < n (Figure 3(a)). Again, due to the analysis made in [4] (case 2.1), we use the fact that a side of length c of each triangle must be adjacent to a side of length c of other triangle. At vertex v1 we must have a1 + 7 + ka3 = n, with k > 1. Nevertheless, we reach a contradiction at vertex v2 (Figure 10) since there is no way to satisfy the angle-folding relation around this vertex. □ 2.2 7 < fl In this case we have P > f and a < b = d < c. Proposition 2.2. Under the conditions assumed in this section, there is a single folding tiling, J, such that a2 = |, a1 + 7 = n, 7 = 3 and P + P + a3 = n. Planar and 3D representations of J are given in Figure 12. C. P. Avelino and A. F. Santos: Spherical folding tessellations by kites and isosceles triangles IV 65 r/x ^ \ \ t\ 1 V\ // (a) planar representation (b) 3D representation Figure 9: f-tiling L Figure 10: Local configuration occurring in case 2 Proof. Suppose that any element of Q(K, T) has at least two cells congruent, respectively, to K and T, such that they are in adjacent positions as illustrated in Figure 2—IV. As a = c, we get the configuration illustrated in Figure 11(a), and, at vertex v\, we have a, a. 1 y 1 +2 y P a a3 (a) (b) case 1 Figure 11: Local configurations 66 Ars Math. Contemp. 11 (2016) 11-33 ai + y = n or ai + 7 < n. 1. Suppose firstly that ai + 7 = n (Figure 11(b)). Note that the conditions a2 > ai > a3 and a2 > a3 > ai lead to a contradiction at vertex v2, as a2 + p > n, for all p G {ai, a2}. Therefore ai > a2 > a3. Now, if (i) a2 + a2 = n, then P + P + ka3 = n, k > 1, and so ai > a2 = ^ > P > 7 > a3. Consequently, 7 = f (as P < 2, we have 7 > 4 ). Then, the last configuration is extended to the one illustrated in Figure 12(a). We shall denote this f-tiling by J. Its 3D representation is given in Figure 12(b). (a) planar representation (b) 3D representation 70 30 71 45 61 Figure 12: f-tiling J (ii) a2 + a2 < n, then ka2 = n, k > 3, P + P + ka3 = n, k > 1, and so « > ^ > P > a2 > 7 > a3. As 7 > 4, we have necessarily k = 3 (Figure 13(a)). Now, if at vertex v2 we have k > 1 (Figure 13(b)), one of the angles 02, 03 or 04 must be a3. But then we reach a contradiction at vertex v3, v4 or v5, respectively, as a1 + p > n, for all p G { a 1, a2}. On the other hand, if k = 1, we get the configuration illustrated in Figure 14(a) (note that at vertex v3 we cannot have 7+7+7 = n, as 3 = a2 > 7). At vertex v4 we reach a similar contradiction as in the case k > 1. 2. Suppose now that a1 + 7 < n (Figure 11(a)). If a2 > a1 > a3 or a2 > a3 > a1, at vertex v1 we must have a2 + k7 = n, with k > 2, and consequently at vertex v2 it follows that a1 + a1 < n, and so a1 < f and a2 + a3 > n. But then an incompatibility on the sides arises at vertex v1. If «1 > «2 > «3, and (i) = a3 (Figure 14(b)), then 02 must be P, otherwise we get, at vertex v3, 03 = a1 and a1 + p > n, for all p G {a1, a2}. Nevertheless, an impossibility cannot be avoided at vertex v1 since we obtain P + 7 + p > n, for all p G {a1, a2}. C. P. Avelino and A. F. Santos: Spherical folding tessellations by kites and isosceles triangles IV 67 Figure 14: Local configurations (ii) 01 = 7 and (a) 02 = ft (Figure 15(a)), then 7 < 4 and ft > |. At vertex v4 we must have ft+a2 < n, however 2n > (ai+7+Y) + (ft+a2) = (ft+7+Y) + (ai + a2) > 2n is impossible. (b) 02 = 7, it follows that a1 + k7 = n, k > 2, as illustrated in Figure 15(b). But any choices for d3 and 94 lead to a contradiction. 3 Case of Adjacency V Proposition 3.1. Q(K, T) is composed by a single folding tiling, M, such that a2 = 2, ai + ft = n and 7 = a3 = |. For a planar representation see Figure 20(b). Its 3D representation is given in Figure 21. 68 Ars Math. Contemp. 11 (2016) 11-33 Figure 15: Local configurations occurring in case 2(ii) Proof. Suppose that any element of Q (K, T) has at least two cells congruent, respectively, to K and T, such that they are in adjacent positions as illustrated in Figure 2-V. The case analyzed in [4] (case 2.1) give rise to no f-tilings including two cells in these adjacent positions, and so a side of length c of each triangle must be adjacent to a side of length c of another triangle. 1. If a2 > «1, then a2 > f and we get the configuration of Figure 16(a). If a2 + fi = n (Figure 16(b)), we have a1 = 2 (vertex v1), and so a2 + a3 > n, justifying the choice for 01. But at vertex v2 we obtain a contradiction as «3 + 7 + 7 > n ((ai + «1) + («2 + fi) + («3 + Y + 7) = (2«1 + «2 + «3) + (fi + Y + y) > 3n). Figure 16: Local configurations occurring in case 1 If a2 + p < n, then a2 + kp = n, with k > 2 (note that a2 + a3 > n). Consequently, Y > p and a3 > p. Observing Figure 17(a), we conclude that there is no way to satisfy the angle-folding relation around vertex v2 (a2 + a2 > a2 + a > n, a2 + a3 > n, a2 + y + P > n, for all p, and = p implies 02 = y and y + Y + p > n, for all p). 2. Suppose now that a1 > a2 (Figure 17(b)). It follows that a1 > f > a2 > p and y > n. 2.1 If p > y, then at vertex v1 we must have a1 + p + ka3 = n, with k > 1, or a1 + p = n. In the first case we have a1 > 2 > a2 > p > y > a3 (Figure 18(a)). As or 02 must be a3, we get an impossibility at vertex v2 or v3, respectively. C. P. Avelino and A. F. Santos: Spherical folding tessellations by kites and isosceles triangles IV 69 (a) case 1 (b) case 2 Figure 17: Local configurations (a) (b) Figure 18: Local configurations occurring in case 2.1 Therefore a1 +3 = n. At vertex v1 we cannot have a1 +¡3 = n = a1+a3, as illustrated in Figure 18(b), otherwise at vertex v2 we get ai + 7 + ka3 = n, k > 1, and a contradiction arises at vertex v3. Consequently, we get the configuration illustrated in Figure 19(a). Note Figure 19: Local configurations occurring in case 2.1 that at vertex v2 we cannot have 7 + 7 + ka3 = n, k > 1, nor 7 + 7 + 7 + ka3 = n, k > 1, 70 Ars Math. Contemp. 11 (2016) 11-33 otherwise we obtain a similar contradiction as before (in fact we cannot have two angles a3 adjacent). Observe also that we have necessarily a2 + a2 = n, as a2 + a2 + a2 > n. Now, 9\ = a3, 6\ = 7 or 6\ = ft. 2.1.1 If 6\ = a3 (Figure 19(b)), at vertex v3 we must have ai + a3 = n, which implies a3 = ft. Nevertheless, a contradiction arises at vertex v4 since we get a1 + 7 + ka3 > n, for all k > 1. 2.1.2 If 61 = 7 (Figure 20(a)), at vertex v4 we obtain ft + 7 + ka3 = n. But at vertex v3 we get a1+7+ka3 = n, which is not possible as 3n > (a1 +7+a3) + (a1+ft) + (a2 + a2) > (2ai + a2 + a3) + (ft + 7 + 7) > 3n. (a) (b) f-tiling M Figure 20: Local configurations occurring in case 2.1 2.1.3 If = ft, the last configuration is extended to the one illustrated in Figure 20(b). We shall denote this f-tiling by M. Its 3D representation is given in Figure 21. Figure 21: f-tiling M C. P. Avelino and A. F. Santos: Spherical folding tessellations by kites and isosceles triangles IV 71 2.2 Suppose now that ft < 7 (Figure 22(a)). In this case we have 7 > 3 and 91 = ft or 0\ = «3. a, 03 4 02 a, a, 02 5 a2 a, 1 as (a) (b) Figure 22: Local configurations occurring in case 2.2 If 61 = fi (ai + fi < n, see Figure 22(b)), then at vertex we must have 7 + 7 + ka3 = n, with k > 0. As we seen before, as two angles a3 in adjacent positions lead to a contradiction, we must have 7 + 7 = n. Moreover, 62 cannot be a3, otherwise we would obtain 63 = a1 and, at vertex v3, a1 + 7 > n. The case 62 = fi also leads to a contradiction as 7 + 7 = n and vertex v3 cannot have valency four. Finally, if 61 = a3, we obtain the configuration illustrated in Figure 23. At vertex v1 we reach a contradiction as (a1 + fi + a3) + (a1 + 7) + (a2 + a2) > (2a1 + a2 + a3) + (fi + Y + Y) > 3n. □ Figure 23: Local configuration occurring in case 2.2 7 4 2 2 5 4 Case of Adjacency VI Suppose that any element of Q (K, T) has at least two cells congruent, respectively, to K and T, such that they are in adjacent positions as illustrated in Figure 2-VI. As b = c, using trigonometric formulas, we obtain cos ft + cos2 Y cos Or + cos ai cos Or -~2-- = —^-—a—-. (4.1) sin2 7 sin ai sin a- 72 Ars Math. Contemp. 11 (2016) 11-33 Remark 4.1. The cases analyzed in [2] and [3] give rise to no f-tilings including two cells in these adjacent positions, and so a side of length c of each triangle must be adjacent to a side of length c of another triangle. Proposition 4.2. T) = 0 iff (i) ai + y = n, a2 = f, y + 7 + a3 = n and ft = |, or (ii) ai + y = n, a2 = ft = f and 7 + 7 + a3 = n. In the first case, there is a single f-tiling denoted by N. A planar representation is given in Figure 26(b) and a 3D representation is given in Figure 27. In the second case, there is a single f-tiling, P. The corresponding planar and 3D representations are given in Figure 29(b) and Figure 30, respectively. Proof. Concerning the angles of the triangle T we have necessarily one of the following situations: 7 > ft or y < ft. We consider separately each one of these cases. 1. Suppose firstly that 7 > ft. If a2 > ai, then a2 > | and we get the configuration of Figure 24(a). Due to the edge Figure 24: Local configurations occurring in case 1 lengths and also Remark 4.1, v1 cannot have valency four and so a2 + 7 + ka3 = n, k > 1. Therefore, analyzing vertices v1 and v2 we conclude that a2 + a3 < n and a1 < 2, which is impossible taking into account the kite's area. Thus, a1 > a2 > a3 (Figure 24(b)) and = ft or = 7. In the first case, v1 cannot have valency four and there is no way to satisfy the angle-folding relation around this vertex. Consequently, = 7 and (i) if a1 + 7 < n, then a1 + 7 + ka3 = n, k > 1 (Figure 25(a)). At vertex v2 we reach a contradiction as a1 + p > n, for all p G {a1, a2}. (ii) if a1 + 7 = n, then the last configuration extends to the one illustrated in Figure 25(b). Now, if 02 = ft (Figure 26(a)), we obtain a contradiction at vertex v2. On the other hand, if 02 = 7 a global planar representation is achieved as illustrated in Figure 26(b). We denote such f-tiling by N. The corresponding 3D representation is given in Figure 27. C. P. Avelino and A. F. Santos: Spherical folding tessellations by kites and isosceles triangles IV 73 ai "3 a a2 3 6 V2 y-h— "1" "3 "3 7 ai "2 a2 a1 e, y y 5 4 a3 a. 1 "3 2 y P P a2 ai y a a2 13 (a) case 1(i) (b) case 1(ii) Figure 25: Local configurations occurring in case 1 22 a, a3 y ee 24 y 16 y y e e y 15 12 y y y y a1 a2 13 . y y y 23 e 21 e y a3 a1 11 4 a2 a1 \y " y y 14 3 e 0 y e e y P 17 19 y yy a1 a2 a2 a1 y ee 2 10 y y y al a3 18 \y y y 7 20 p y P p y 11 y / yy 6 e9 ey 8 a1 a2 y 0 e 25 y 26 (a) (b) f-tiling N Figure 26: Local configurations occurring in case 1(ii) 8 1 2. Suppose now that y < ft. If a2 > ai, then a2 > f and we get the configuration of Figure 28(a). Due to the edge lengths and also Remark 4.1, vi cannot have valency four and so ai + ai + = n, k > 1. But then the other sum of alternate angles must contain a2 + a3 > n, which is not possible. 74 Ars Math. Contemp. 11 (2016) 11-33 Figure 27: f-tiling N a2 > a3 and ka2 = n, k > 2, and we have a\ +7 = n or a\ +7 < n. 2.1 If a1 + y = n, with the labeling of Figure 28(b), we have 6\ = 7 or 6\ = p. 2.1.1 If 61 = 7, the last configuration is extended to the one illustrated in Figure 29(a). a a3 Y Y 3 4 7 a2 a1 Y P v a1 a2 a2 a1 Y 2 P P 5 1 6 a3 a a1 a3 Y Y Y Y Y Y Y V2 9 8 e2 \ P P (a) (b) f-tiling P Figure 29: Local configurations occurring in case 2.1 5 v C. P. Avelino and A. F. Santos: Spherical folding tessellations by kites and isosceles triangles IV 75 2.1.1.1 If Q2 = 7, at vertex v2 we have a3 + 7 + 7 = n or a3 + 7 + 7 + 7 = n. Note that we cannot have more angles a3 around v2, as two angles of this type in adjacent positions lead to an impossibility, as seen before. The condition a3 + 7 + 7 = n implies a2 + a2 = 2, and we get the configuration illustrated in Figure 29(b). We denote this f-tiling by P, whose 3D representation is given in Figure 30. ( / / v \ \ v \ 1 \ \ \ v a // ' J Figure 30: f-tiling P On the other hand, if a3 + 7 + 7 + 7 = n (Figure 31(a)), the angles 63 and 94 cannot be a3 otherwise we reach a contradiction at vertices v3 and v4, respectively. But this implies that at vertex v5 we have two angles a3 in adjacent positions, which is not also possible. Figure 31: Local configurations occurring in case 2.1 2.1.1.2 If Q2 = P, then at vertex v3 we have P + 7 + ka3 = n, k > 1, which leads to a contradiction as illustrated in Figure 31(b) (see vertex v4). 2.1.2 If 61 = P, we obtain a similar impossibility as in the previous case. 2.2 If a1 + 7 1. It follows that the other sum of alternate angles at vertex v1 must be greater or equal to a1 + 7 + 7 > n, which is an impossibility. If = 7 and (i) = 7 (Figure 33(a)), then ft > a1 > 77, which implies tile 6. At vertex v2 we obtain ft + 7 + ka3 = n, k > 1, giving rise to two angles a3 in adjacent positions, which leads to a contradiction, as seen previously. Figure 33: Local configurations occurring in case 2.2 (ii) = «3 (Figure 33(b)), vertex v1 has valency six or greater than six. In the first case, we obtain two angles a3 in adjacent positions, which is not possible. In the last case, we have necessarily 03 = 7, and so ft > a1 > 2. Consequently, a contradiction arises at vertex v2 or v3. C. P. Avelino and A. F. Santos: Spherical folding tessellations by kites and isosceles triangles IV 77 Concerning to the combinatorial structure of each tiling obtained, we have that (i) the symmetries of the f-tilings L, J, M and N that fix a vertex v of valency four and surrounded by (a2,a2, a2,a2) are generated by a reflection and by the rotation through an angle 2 around the axis by ±v. On the other hand, for any vertices vi and v2 of this type, there is a symmetry sending v1 into v2. It follows that the symmetry group has exactly 48 = 6 x 8 elements and it forms the group of all symmetries of the cube - the octahedral group, sometimes referred as C2 x S4. (ii) the f-tiling P has only two vertices surrounded by (a2, a2, a2, a2), say the north and south poles. The symmetries of P that fix the north pole are generated by a reflection and by the rotation through an angle | around the zz axis, giving rise to a subgroup isomorphic to D4 (the dihedral group of order 8). Now, the reflection on the equator is also a symmetry of P, and so it follows that the symmetry group of P is isomorphic to C2 x D4. 5 Summary In Table 1 is shown a list of the spherical dihedral f-tilings whose prototiles are a spherical kite and an isosceles spherical triangle, K and T, of internal angles (a1, a2,a1, a3), and (ft, y, y), respectively, in cases of adjacency IV, V and VI. Our notation is as follows: Yi is the solution of equation (2.1), with a2 = n, a1 = n - yi and a3 = ft = n; ft1 is the solution of equation (2.1), with a2 = |, a1 = n - y and a3 = n - ft2 is the solution of equation (2.1), with a2 = n, a1 = n - ft2 and a3 = y = f ; Y2 is the solution of equation (4.1), with a2 = n, ft = |, a1 = n - y2 and a3 = n - 2y2; Y3 is the solution of equation (4.1), with a2 = ft = n, a1 = n-Y3 and a3 = n - 2y3. | V | is the number of distinct classes of congruent vertices; N1 is the number of triangles congruent T and N2 is the number of kites congruent to K (used in the dihedral f-tilings); G(t) is the symmetry group of each tiling t g Q (K, T). f-tiling ai a2 a3 P Y |V | Ni N2 G(T ) L n - Yi n n ~2 Yi 3 24 24 C2 x S4 J 2n 3 2 n - 2 [3 [i 3 4 48 24 C2 X S4 M n - ft 2 3 [2 3 4 48 24 C2 X S4 N n - Y2 2 n - 2Y2 3 Y2 3 48 24 C2 X S4 P n - Y3 2 n - 2y3 2 Y3 3 16 8 C2 X D4 Table 1: Combinatorial structure of dihedral f-tilings of S2 by spherical kites and isosceles triangles in cases of adjacency IV, V and VI References [1] C. Avelino and A. Santos, Spherical and planar folding tessellations by kites and equilateral triangles, Australasian Journal of Combinatorics, 53 (2012), 109-125. 78 Ars Math. Contemp. 11 (2016) 11-33 [2] C. Avelino and A. Santos, Spherical Folding Tessellations by Kites and Isosceles Triangles: a case of adjacency, Mathematical Communications, 19 (2014), 1-28. [3] C. Avelino and A. Santos, Spherical Folding Tessellations by Kites and Isosceles Triangles II, International Journal of Pure and Applied Mathematics, 85 (2013), 45-67. [4] C. Avelino and A. Santos, Spherical Folding Tessellations by Kites and Isosceles Triangles III, submitted. [5] A. Breda, A class of tilings of S2, Geometriae Dedicata, 44 (1992), 241-253. [6] A. Breda and P. Ribeiro, Spherical f-tilings by two non congruent classes of isosceles triangles-I, Mathematical Communications, 17 (2012), 127-149. [7] A. Breda and A. Santos, Dihedral f-tilings of the sphere by spherical triangles and equiangular well centered quadrangles, Beitrage zur Algebra und Geometrie, 45 (2004), 447-461. [8] A. Breda and A. Santos, Dihedral f-tilings of the sphere by rhombi and triangles, Discrete Mathematics and Theoretical Computer Science, 7 (2005), 123-140. [9] A. Breda, P. Ribeiro and A. Santos, A Class of Spherical Dihedral F-Tilings, European Journal of Combinatorics, 30 (2009), 119-132. [10] R. Dawson, Tilings of the sphere with isosceles triangles, Discrete and Computational Geometry, 30 (2003), 467-487. [11] R. Dawson and B. Doyle, Tilings of the sphere with right triangles I: the asymptotically right families, Electronic Journal of Combinatorics, 13 (2006), #R48. [12] R. Dawson and B. Doyle, Tilings of the sphere with right triangles II: the (1, 3, 2), (0, 2,n) family, Electronic Journal of Combinatorics, 13 (2006), #R49. [13] S. Robertson, Isometric folding of riemannian manifolds, Proc. Royal Soc. Edinb. Sect. A, 79 (1977), 275-284. [14] Y. Ueno and Y. Agaoka, Classification of tilings of the 2-dimensional sphere by congruent triangles, Hiroshima Mathematical Journal, 32 (2002), 463-540. /^creative ^commor ARS MATHEMATICA CONTEMPORANEA Also available at http://amc-journal.eu ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 11 (2016) 79-89 Distinguishing graphs by total colourings* Rafal Kalinowski, Monika Pilsniak, Mariusz WoZniak t Department of Discrete Mathematics, AGH University, Krakow, Poland Received 26 October 2014, accepted 22 July 2015, published online 24 September 2015 Abstract We introduce the total distinguishing number D"(G) of a graph G as the least number d such that G has a total colouring (not necessarily proper) with d colours that is only preserved by the trivial automorphism. This is an analog to the notion of the distinguishing number D(G), and the distinguishing index D'(G), which are defined for colourings of vertices and edges, respectively. We obtain a general sharp upper bound: D" (G) for every connected graph G. We also introduce the total distinguishing chromatic number x'D (G) similarly defined for proper total colourings of a graph G. We prove that x'D (G) < x""(G) + 1 for every connected graph G with the total chromatic number x""(G). Moreover, if x""(G) > A(G) + 2, then x'D (G) = x "(G). We prove these results by setting sharp upper bounds for the minimal number of colours in a proper total colouring such that each vertex has a distinct set of colour walks emanating from it. Keywords: Total colourings of graphs, symmetry breaking in graphs, total distinguishing number, total distinguishing chromatic number Math. Subj. Class.: 05C15, 05E18 1 Introduction and definitions In 1996, Albertson and Collins [1] introduced the distinguishing number D(G) of a graph G as the least number d such that G admits a vertex colouring with d colours that is only preserved by the trivial automorphism of G. Ten years later Collins and Trenk [3] defined the distinguishing chromatic number xd (G) of a graph G for proper vertex colourings, so xD (G) is the least number d such that G has a proper colouring with d colours that is *The research was partially supported by the Polish Ministry of Science and Higher Education. t Supported by the NCN grant DEC-2013/09/B/ST1/01772; research was done during his visit at the Institut Mittag-Leffler (Djursholm, Sweden) E-mail addresses: kalinows@agh.edu.pl (Rafal Kalinowski), pilsniak@agh.edu.pl (Monika Pilsniak), mwozniak@agh.edu.pl (Mariusz Wozniak) ©® This work is licensed under http://creativecommons.Org/licenses/by/3.0/ 80 Ars Math. Contemp. 11 (2016) 11-33 only preserved by the trivial automorphism. These concepts have already spawned tens of papers. For endomorphisms instead of automorphisms this approach was investigated in [4]. Obviously, D(G) = 1 for all asymmetric graphs. On the other hand, for a complete graph Kn and a complete bipartite graph Kp,p we have D(Kn) = n, and D(Kp,p) = p +1. The distinguishing number of cycles C3,C4, C5 equals three, while cycles Cn of length n > 6 have distinguishing number two. This compares with a more general result of Collins and Trenk [3], and of Klavzar, Wong and Zhu [7]. Theorem 1.1. [3],[7] If G is a connected graph with maximum degree A, then D(G) < A + 1. Furthermore, equality holds if and only if G is a Kn, Kp,p or C5. In the same paper [3], Collins and Trenk obtained a general bound for the distinguishing chromatic number. Theorem 1.2. [3] If G is a connected graph with maximum degree A, then xd (G) < 2A. Furthermore, equality is achieved if and only if G is a Kp,p or C6. Edge colourings breaking automorphisms were investigated by the first two authors in [5]. If a graph G does not contain K2 as a connected component, then the distinguishing index D'(G) of a graph G as the least number d such that G admits an edge colouring with d colours that is only preserved by the trivial automorphism. And the distinguishing chromatic index xDd (G) of a graph G is the least number d such that G has a proper edge colouring with d colours that is not preserved by any nontrivial automorphism of G. A general upper bound for the distinguishing index was proved therin. Theorem 1.3. [5] If G is a connected graph of order n > 3 with maximum degree A, then D'(G) < A unless G is C3, C4 or C5. It was also proved in [5] that D'(G) < D(G) + 1 for any connected graph of order n > 3, and this bound is sharp for each n. Actually, quite frequently D'(G) < D(G). For a complete graph D'(Kn) = 2 for any n > 6, and also for a complete bipartite graph D'(Kp,p) = 2 forp > 4, whereas D(Kn) and D(Kpp) are equal to A + 1. The following theorem gives a sharp upper bound for the distinguishing chromatic index of connected graphs. Theorem 1.4. [5] If G is a connected graph of order n > 3, then x'd(G) < A(G) + 1 except for four graphs of small order C4, K4, C6, K3,3. This theorem immediately implies the following interesting fact. Corollary 1.5. [5] Every connected Class 2 graph G admits an edge colouring with x'(G) colours that is not preserved by any nontrivial automorphism of G. It has to be noted that Theorem 1.4 was a consequence of Theorem 1.6, the main result of [6]. To formulate it we need some definitions. R. Kalinowski, M.Pilsniak, and M. Wozniak: Distinguishing graphs by total colourings 81 Let f : E ^ K be a proper edge colouring of a graph G = (V, E). For a given vertex x e V, each walk emanating from x defines a sequence of colors (oj). We then say that the sequence (oj) is realizable at a vertex x. The set of all sequences realizable at x is denoted by W(x). We say that two vertices x and y of a graph G are similar if W(x) = W(y), and the coloring f personalizes the vertices of G if no two vertices are similar. The minimum number of colours we need to obtain this property is denoted by p(G) and called the vertex distinguishing index by colour walks of a graph G. Theorem 1.6. Let G be a connected graph of order n > 3. Then M(G) < A(G) + 1 except for four graphs of small orders: C4, K4, C6 and K3,3. The aim of this paper is to present analogous results for total colourings. We give general bounds, and an interesting relationship between the total distinguishing chromatic number and the total chromatic number. Definition 1.7. The total distinguishing number D"(G) of a graph G is the least number d such that G has a total colouring with d colours that is preserved only by the identity automorphism of G. Observe that D"(G) < min{D(G), D'(G)}. Clearly the equality holds for asymmetric graphs. And also for graphs with min{D(G), D'(G)} = 2. The following observation can easily be verified. Proposition 1.8. D"(Pn) = D"(Cn) = D"(K„) = 2 for n > 3. D"(KP}P) = 2 for p > 1. However, quite frequently D"(G) < min{D(G), D'(G)}. For instance, for a star Ki n of size n > 3, we shall show in the next section that D"(K\ n) = while D(Ki,n) = D'(Ki,n)= n. We shall also investigate this concept for proper total colourings. A proper total colouring f of a graph G is an assignment of colours to the vertices and edges of G such that no two adjacent edges, no two adjacent vertices and no incident edges and vertices are assigned the same colour. The least number of colours among all such colourings is called the total chromatic number denoted by x"(G). Definition 1.9. The total distinguishing chromatic number xD (G) of a graph G is the least number d such that G has a proper total colouring with d colours that is preserved only by the identity automorphism of G. The total chromatic number of some simple classes of graphs was investigated first by Rosenfeld in [11]. He showed that A(G) + 2 colours are enough for cliques, for complete bipartite and tripartite graphs, for balanced complete k-partite graphs and for graphs with maximum degree at most three. Next Kostochka proved the same bound for graphs with maximum degree at most four and five (see [8] and [9]). In the general case the following famous Behzad-Vizing conjecture is still open. Conjecture 1.10. [2] For every graph G, the total chromatic number satisfies the inequality x"(G) < A(G) + 2. 82 Ars Math. Contemp. 11 (2016) 11-33 So far, the best result in this direction was proved by Molloy and Reed in 1998. Theorem 1.11. [10] For every graph G = (V, E), the total chromatic number satisfies the inequality x"(G) < A(G) + 1026. In the next section we investigate total colourings, not necessarily proper. We prove a sharp upper bound D"(G) < A(G)] for all connected graphs. In Section 3 we investigate total proper colourings. We show how one can personalize vertices of a graph by colour walks in total colourings. This approach is analogous to that of [6] for edge colourings. In the last section we show that x" (G)+1 colours suffice to find a total proper colouring preserved only by the trivial automorphism. We shall infer this from the results of Section 3. However, it can also be easily shown using another argument. Namely, given a proper edge colouring of a graph G, the subgroup of Aut(G) preserving the colouring acts freely on vertices, i.e., the only element fixing a vertex is the identity. This follows since all paths beginning at a given vertex v are uniquely determined by the sequence of edge colours (which in effect give directions of where to go next at each vertex in the path). Thus any color preserving automorphism fixing v must fix all vertices. This immediately implies that xDD (G) < x"(G) + 1 (just colour one vertex by an additional extra colour in a total colouring of G). A much more intricate result of Section 4 states that xDD (G) = x"(G) whenever x"(G) > A(G) + 2 (recall that if the Behzad-Vizing conjecture is true, then every graph has a total colouring with A(G) + 1 or A(G) + 2 colours). This will be proved using the main result of Section 3 concerning personalizing vertices by colour walks in proper total colorings. 2 Total distinguishing number Every finite tree T has either a central vertex or a central edge which is fixed by every automorphism of T. For k > 0, let Sk (x) denote a sphere of radius k with a center x, i.e., the set of all vertices at distance k from x. Theorem 2.1. If T is a tree of order n > 3, then D"(T) < \^A(T)]. Proof. If T has a central vertex v0, then the colour of v0 can be arbitrary. Having A(T)] colours, we have at least A(T) different pairs (c1, c2) of colours, as the colouring need not be proper. Every edge incident to v0 and its end vertex in the first sphere Si(v0) obtain a distinct pair of colours (c1; c2). Hence, all vertices adjacent to v0 are fixed by every automorphism of T preserving this colouring. Next, we colour edges going to subsequent spheres of T by pairs of colours in the same way as for the first sphere. By induction on the distance from v0, all vertices of T are fixed. If T has a central edge e0, let T1, T2 be subtrees obtained by deleting the edge e0. If we put distinct colours on the end vertices of e0, then these verices are fixed by every automorphism. Next, for i = 1,2, we colour the tree T using the same method as in the previous case. □ To see that the bound in Theorem 2.1 is sharp, observe that for any star K1n we have D"(K1jn) = \y/A(K1jn)] = \Vn~|. Indeed, if we used less than \^n\ colours then we R. Kalinowski, M.Pilsniak, and M. Wozniak: Distinguishing graphs by total colourings 83 have less than n pairs of colours, so there would exist at least two edges coloured identically (together with their end vertices), thus a transposition of them would be a nontrivial automorphism preserving such a colouring. Theorem 2.2. If G is a connected graph of order n > 3, then D" (G) Proof. Denote A = A(G). Clearly, A > 2 and we have at least two colours. If G is a tree then the claim is true by Theorem 2.1. Suppose that G contains a cycle. If G is just a cycle or a complete graph, then the claim follows from Proposition 1.8. Otherwise, we can always choose a vertex v0 lying on a cycle such that the sphere S2 (v0) is nonempty. We colour v0 with 2 and consider a BFS tree T of G rooted at v0. We will first colour the tree T. For a given vertex v, denote Nt(v) = {(vu,u) : vu € E(G)}. Let Si(vo) = {vi, v2,..., vp}. Without loss of generality we can assume that vi has a neighbour in S2(v0). We colour both pairs (v0v1; v1) and (v0v2, v2) with a pair (1,1). Then we colour each pair of Nt (v0) \ {(v0 v1, v1), (v0v1, v2)} with a distinct pair of colours different from (1, 1). Thus (1, 1) appears twice as a pair of colours in Nt (v0). We will then colour the graph G in such a way that v0 will be the only vertex of G coloured with 2 such that the pair (1,1) appears twice in the neighbourhood Nt(v0). Hence v0 will be fixed by every automorphism preserving the colouring. Therefore all vertices in S1(v0) will also be fixed, except, possibly v1 and v2. To distinguish v1 and v2, we colour the sets {(v1u,u) € Nt(v1) : u € £2^0)} and {(v2u,u) € Nt(v2) : v2u € E(T),u € S2(v0)} with two distinct sets of pairs of colours (this is possible since each of these sets contains at most A - 1 elements, and we have A distinct pairs of colours). Therefore, every vertex adjacent to v0, v1 or v2 will be fixed by every automorphism preserving our colouring. For each i = 3,... ,p, we then colour all elements of {(vju, u) : v4u € E(T),u € S2(v0)} with distinct pairs of colours different from the pair (1,1). This is again possible. Thus, all other vertices in S2(v0) will be also fixed. Then we proceed recursively with respect to the radius k of subsequent spheres Sk (v0) according to the ordering of vertices of the BFS tree T. Suppose all vertices of Sj(v0) = {u1,..., ui.}, i = 0,..., k, are fixed by every automorphism preserving colours. For each 84 Ars Math. Contemp. 11 (2016) 11-33 subsequent vertex uj , j = 1,..., lk, we colour every pair (uju, u), where u is a descendent of uj in T, with a distinct pair of colours except for (1,1). This is again possible since the number of pairs to be coloured is not greater than the number of admissible pairs of colours. Thus all neighbours of uj in Sfc+1(v0) will be also fixed. Finally, we colour all remaining edges in E(G) \ E(T) with 2. It is easily seen that if v is a vertex coloured with 2 such that the pair of colours (1,1) appears twice in Nt(v), then v = v0. Hence, all vertices of G are fixed by any automorphism preserving this colouring. □ Theorem 2.2 does not hold for disconnected graphs. For instance, consider a graph G of order n being the sum of r pairwise disjoint copies of K2, i.e., G = rK2 with n = 2r. It is easy to see that D"(rK2) = min{k : k2(k - 1) > r}. Hence, D"(rK2) > {fn while A(rK2) = 1. 3 Personalizing vertices by total colour walks 3.1 Total colour walks In this section, we consider only proper colourings. Let f be a proper total colouring of a graph G = (V, E). The total palette of a vertex v is the set S(v) = {f (u)} U {(f (vu),f (u)) : uv e E}. For a given vertex x e V, each walk emanating from x, say xe1x1e2x2 ...epxp, where ej — xj_ixi is an edge of G, i = 1,2,... ,p, defines a sequence of colours (f (x), f (ei), f (xi), f (e2), f (x2),..., f (ep), f (xp)). We then say that this sequence of colours is realizable at the vertex x. The set of all sequences realizable at x is denoted by W (x). We say that two vertices x and y of a graph G are similar with respect to f if W(x) = W(y), and the colouring f personalizes the vertices of G if no two vertices are similar. The minimum number of colours we need to obtain this property is denoted by t(G), and called the vertex distinguishing index by total colour walks of a graph G. Denote by Wk (x) all sequences of W(x) of length 2k + 1, i.e., generated by all walks of length k. We see that the total palette of a vertex v can be identified with W1 (v). For a given («j) e W(x), denote by m(x, (a)) the last vertex on a walk emanating from x and defining the sequence (oj). The following observation will be used several times in the proof of our main result. Proposition 3.1. Two vertices x and y of G are similar if and only if for each («j) e W (x), we have («j) e W (y) and the vertices m(x, («,)), m(y, (oj)) have the same total palettes. An analogous notion for edge colouring has been introduced in [6]. The corresponding parameter was denoted by ^(G). The main result of [6] was Theorem 1.6. In particular it follows that m(G) = x'(G) if X'(G) = A(G) + 1. The aim of this section is to prove an analogous result for total colourings. More precisely we shall prove the following theorem. Theorem 3.2. Let G be a connected graph. Then t(G) < x"(G) + 1. R. Kalinowski, M.Pilsniak, and M. Wozniak: Distinguishing graphs by total colourings 85 Moreover, if x''(G) > A(G) + 2 then t(G) = x''(G). The proof of this theorem is divided into two parts. First, in the subsection below, we prove that t(G) < x''(G) + 1. In the next subsection, we prove the second part of the theorem for graphs with x"(G) > A(G) + 2. The above inequalities concerning t(G) need not be true for disconnected graphs. For instance, consider again a graph G = rK2 with n = 2k. It is easy to see that t(rK2) = min{k : 3(3) > r}. Hence, t(rK2) > ffi while A(rK2) = 1 and x''(rK2) = 3. 3.2 Graphs with x"(G) = A(G) + 1 In this subsection we prove Theorem 3.2 in case x"(G) = A(G)+1. Let f : VUE ^ K be a colouring of G with x''(G) colours. Let x be a vertex of G. We define a new colouring f' of G by replacing f (x) with a new colour 0 G K. We show that this colouring personalizes the vertices of G. For, suppose that there are two similar vertices u and v. Denote by Q a shortest path from u to the vertex x. Consider now the walk Q' starting at v and inducing the same colour sequence as Q. Evidently, the walk Q' should also finish in x. The crucial observation is that since the last edges of Q and Q' are of the same colour, they cannot arrive to the same vertex and, since x is the only vertex of colour 0, we get a contradiction. 3.3 Graphs with x''(G) > A(G) + 2 Now, we shall prove Theorem 3.2 in case x''(G) > A(G) + 2. Let f : V U E ^ K be a proper total colouring of a graph G = (V, E) with x' (G) colours, and let x' (G) > A(G) + 2. Assume for the rest of this subsection that there is no proper total colouring of G using x' (G) colours which personalizes the vertices of G. For convenience, we will formulate stages of the proof as observations. Denote by N(x) and E(x) the set of vertices adjacent to x and the set of edges incident to x, respectively, and let NV(x) = f (N(x)) and E(x) = f (E(x)). Observation 3.3. For each vertex x g V, the set {f (x)}UNV(x)UE(x) contains all colours of K. Proof. Suppose that there is a vertex x andacolour a such that a g K \ ({f (x)}U NV(x) U E(x)). We shall show that then f could be modified in such a way that the obtained colouring would personalize the vertices of G. Denote by Y the set of all vertices y with Wfty) = Wi(x). If Y contains only the vertex x, we are done. For, we can repeat the reasoning from the previous subsection by considering the walks ending with x. If Y contains more vertices, we replace f (y) by a in each vertex y g Y, y = x. In this way, x becomes the only vertex of G with the palette W1(x). Again, we can repeat the reasoning from the previous subsection by considering the walks ending with x. □ Observation 3.4. For each edge xy g E the set {f (x)} U {f (y)} U E(x) U E(y) contains all colours of K. Proof. Let us suppose that there is an edge xy and a colour a such that a g K \ ({f (x)} U {f (y)}U E(x) U E(y)). Consider now the set F of all edges x'y' such that f (x'y') = f (xy) and W1(x) = W1(x') and W1(y) = W1(y'). Assume first that there exists only one such edge, namely 86 Ars Math. Contemp. 11 (2016) 11-33 xy. Then, our colouring personalizes the vertices of G. For, suppose that there are two similar vertices u and v. Denote by Q a shortest path joining u with the edge xy. Consider now the walk Q' starting at v and inducing the same colour sequence as Q. Evidently, the walk Q' should also attain the edge xy. Since the last edges of Q and Q' are of the same colour, they cannot arrive at the same vertex. So, one of the walks Q and Q' finishes at x and the other one at y. Since the palettes at x and y are distinct, we are done by Proposition 3.1. If F contains more edges, we replace f (x'y') by a for all edges of F exept for the edge xy. In this way, xy becomes the only edge of G coloured with f (xy) and having the palettes Wi(x) and Wi(y) on its ends. Therefore, we can repeat the reasoning from above. □ A vertex x is a-free if a G {f (x)} U E(x). Observation 3.5. For each vertex x, there is a colour, say a, such that x is a-free. Proof. It suffices to observe that the set {f (x)} U E(x) contains exactly d(x) +1 elements while the number of colours is greater than A(G) + 1. □ We say that a set of edges incident to a vertex x of G forms a cyclic structure of size p > 2 (with respect to the colouring f) if these edges can be ordered as xyj, i = 1,..., p, such that the vertex is f (xyi+1)-free, for i = 1,... ,p, where the indexes are taken modulo p. Then the vertex x is called central while the vertices are leaves of the cyclic structure. The significance of a cyclic structure is shown by the next two observations. The proof of the first one follows immediately from the definition of the cyclic structure. Observation 3.6. If the edges xyj, i = 1,... ,p, form a cyclic structure, then we can rotate the colours of edges, i.e., replace the colour f (xyj) on the edge xyj by the colour f (xyi+1), and the obtained colouring of G remains proper. Observation 3.7. For each vertex x, the set E(x) contains a cyclic structure. Proof. Let x be a vertex of G and denote f (x) by 0. Since the set {x} U N(x) has at most A(G) + 1 < x''(G) elements, there is a colour, say a, which does not belong to the set {f (x)} U NV(x). Then, by Observation 3.3, a G E(x). Denote by yo the second end of the edge incident to x and coloured by a. By Observation 3.5, there is a colour, say y1, such that the vertex y0 is Y1-free. If y1 =0 we can put the colour 0 on the edge xy0 and the colour a on the vertex x. In consequence, we are able to reduce the number of vertices having the same palette as x by one, and then eventually get only one such vertex. This would provide a proper total colouring personalizing the vertices of G. So, we may assume that y1 = 0. Then, by Observation 3.4, y1 G E(x). Let xy1 be the edge coloured with y1. Again, by Observation 3.5, there is a colour, say 72, such that the vertex y1 is Y2-free. If y2 =0 we can put the colour 0 on the edge xy1, the colour y1 on the edge xy0 and the colour a on the vertex x (see Figure 2). In consequence, we are able to reduce the number of vertices having the same palette as x to obtain eventally only one such vertex. This would provide a colouring personalizing vertices of G. If y2 = a, the edges xy1, xy2 form a cyclic structure of size two. R. Kalinowski, M.Pilsniak, and M. Wozniak: Distinguishing graphs by total colourings 87 Figure 2: Before and after the change described in the proof of Observation 3.7 If 72 = 0 and y2 = a, we continue the procedure of choosing at each step, as the missing colour, the first possible colour from the sequence 0, a, 71, y2 ,.... If such a choice is possible, we can either exchange the colours and get a situation where x has a unique total palette, or we obtain a cyclic structure. If the procedure finishes without finding 0 as a missing colour and without finding a cyclic structure, then the last vertex yd-1, where d = d(x), is Yd-free for some Yd £ {0, a, Y1,..., Yd-1}. It means, in particular, that also the vertex x is Yd-free, a contradiction with Observation 3.4. □ Let the set Cyc1 of edges xyj, i = 1,... incident to a vertex x of G, be a cyclic structure of size p (with respect to the colouring f). If all the vertices yj, i = 1,... ,p, have the same colour, say then the palette at x remains unchanged after the rotation described in Observation 3.6. Therefore, we need a somewhat more complicated structure. Suppose that a set Cyc2 is another cyclic structure of size q with a central vertex x distinct from x. If Cyc1 and Cyc2 have a leave in common then we say that the sets Cyc1 and Cyc2 form a double cyclic structure. Observation 3.8. If G has at least one double cyclic structure with respect to the colouring f then this colouring can be modified such that a new colouring personalizes the vertices of G. Proof. Suppose that two sets of edges Cyc1 = {xyj : i = 1,... ,p} and Cyc2 = {xzj : j = 1,..., q} form a double cyclic structure. Without loss of generality we may assume that y1 = z1. Denote f (y1) = f (z1) = ft and f (z1x) = J1. Let Y be the set of all vertices y with W2 (x) = W2 (y). If Y contains only the vertex x, we are done by repeating the reasoning from the previous subsection with the walks ending at x. If Y contains more than one vertex, then each vertex y belonging to Y and different from x, is a central vertex of a cyclic structure of size p which is a part of a double cyclic structure with the second part being of size q. Now, for each vertex y £ Y \{x}, we rotate the colours of edges of the cyclic structure of size q forming the second part of a double cyclic structure. In this new colouring f' the set W2(y) does not contain the sequence (f (x), y1; f (x)) which was and still is present in W2' (x). In consequence, f' is a colouring such that W2' (x) = W2' (y) for every vertex y distinct from x. It follows that f' personalizes the vertices of G. □ 88 Ars Math. Contemp. 11 (2016) 11-33 The next observation finishes the proof of Theorem 3.2. Observation 3.9. Each graph G has at least one double cyclic structure. Proof. For each vertex x we choose one cyclic structure Cyc(x) having x as a central vertex. The existence of such a structure is assured by Observation 3.7. Consider now an auxiliary digraph r defined in the following way. The vertex set V(r) coincides with the vertex set V (G) and the arcs of r are the edges of G belonging to all sets Cyc(x) oriented from a central vertex of a structure towards the leaves of it. By definition of a cyclic structure we have d+(x) > 2 for each x. This implies, in particular, that there exists at least one vertex, say u, with d-(u) > 2. Denote by z and z two of its in-neighbours in r. Then, the set Cyc(z) U Cyc(z) forms a double cyclic structure. □ 4 Total distinguishing chromatic number The following lemma exhibits a relationship between t(G) and xD (G). Lemma 4.1. Every connected graph G of order n > 3 fulfils the inequality Xd (G) < t(G). Proof. Let f be a proper total colouring personalizing the vertices of G by colour walks, i.e., W(x) = W(y) if x = y. Suppose ^ is a nontrivial automorphism of G preserving f. Then there exists a vertex x such that x = y(x). An automorphism ^ preserves the colouring, so every sequence (oj) G W(x) belongs also to W(y(x)). And every sequence starting at y(x), starts also at ^>-1(^>(x)) = x. Hence, x and y(x) are not distinguished by colour walks in this colouring. □ □ As a consequence of Lemma 4.1 and Theorem 3.2 we obtain a sharp upper bound for the distinguishing chromatic number of connected graphs. Theorem 4.2. Every connected graph G fulfils the inequality Xd (G) < x"(g) + 1. Moreover, xD(G) = x"(G) if x"(G) > A(G) + 2. A total proper colouring of G with x"(G) colours is called minimal. This theorem immediately implies the following interesting result. Corollary 4.3. Every connected graph G with x"(G) > A(G) + 2 admits a minimal total colouring that is not preserved by any nontrivial automorphism. For graphs with x"(G) = A(G) + 1, we sometimes need one colour more for xD (G) than x"(G). For instance, cycles of order 6k, for all k > 1, have a unique (up to a permutation of colours) colouring with three colours and this colouring is preserved by some rotations. Thus xD(Cefc) = x"(Cefc) + 1, by Theorem 4.2. R. Kalinowski, M.Pilsniak, and M. Wozniak: Distinguishing graphs by total colourings 89 Figure 3: A minimal proper total colouring of C6 with three colours. References [1] M. O. Albertson and K. L. Collins, Symmetry breaking in graphs, Electron. J. Combin. 3 (1996), R18. [2] M. Behzad, Graphs and their chromatic numbers, Ph.D. Thesis, Michigan State University, 1965. [3] K. L. Collins and A. N. Trenk, The distinguishing chromatic number, Electron. J. Combin. 13 (2006), R16. [4] W. Imrich, R. Kalinowski, F. Lehner and M. Pilsniak, Endomorphism Breaking in Graphs, Electron. J. Combin. 21 (2014), P1.16. [5] R. Kalinowski and M. Pilsniak, Distinguishing graphs by edge-colourings, European J. Combin. 45 (2015), 124-131. [6] R. Kalinowski, M. Pilsniak, J.Przybylo, M. WoZniak, How to personalize the vertices of a graph?, European J. Combin. 40 (2014), 116-123. [7] S. KlavZar, T.-L. Wong and X. Zhu, Distinguishing labelings of group action on vector spaces and graphs, J. Algebra 303 (2006), 626-641. [8] A. V. Kostochka, The total coloring of a multigraph with maximal degree 4, Discrete Mathematics 17 (1977), 161-163. [9] A. V. Kostochka, Upper bounds of chromatic functions of graph (in Russian), Ph.D. Thesis, Novosibirsk, 1978. [10] M. Molloy, B. Reed, A bound on the total chromatic number, Combinatorica 18 (1998), 241280. [11] M. Rosenfeld, On the total coloring of certain graphs, Israel Journal of Mathematics 9 (1970), 396-402. ARS MATHEMATICA CONTEMPORANEA Also available at http://amc-journal.eu ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 11 (2016) 91-99 Accola theorem on hyperelliptic graphs Maxim P. Limonov * Sobolev Institute of Mathematics, 630090, Koptyuga 4, Novosibirsk, Russia Novosibirsk State University, 630090, Pirogova st. 2, Novosibirsk, Russia Laboratory ofQuantum Topology, Chelyabinsk State University, Br. Kashirinykh str., 129, room 419, 430, 454001, Chelyabinsk, Russia Received 3 January 2015, accepted 27 May 2015, published online 24 September 2015 In this paper, we prove the following theorem: If a graph X is a degree 2 (unramified) covering of a hyperelliptic graph of genus g > 2, then X is 7-hyperelliptic for some Y < . This is a discrete analogue of the corresponding theorem for Riemann surfaces. The Bass-Serre theory of coverings of graphs of groups is employed to get the main result. Keywords: Riemann surface, graph, hyperelliptic graph, fundamental group, automorphism group, harmonic map, branched covering, graph of groups. Math. Subj. Class.: 05C10, 20E08, 57M12 1 Introduction Let M be a compact Riemann surface and let G be its finite group of conformal automorphisms, admitting a partition. That is, G can be expressed as a set-theoretic union of its certain subgroups with trivial pairwise intersections. In [2], R. D. M. Accola proved a formula which relates the genera of M, M/G and M/Gj where subgroups Gj, i = 1,2,..., s, form a partition. This formula is as follows: Demonstrating the applications of the formula, in the same paper Accola proved the following theorem, first proved by H. M. Farkas [7] using theta functions: If M is a compact *The work was partially supported by Laboratory of Quantum Topology of Chelyabinsk State University (Russian Federation government grant 14.Z50.31.0020), Russian Foundation for Basic Research (grant 15-0107906), Leading Scientific Schools Support Program (grant SS-2263.2014.1) and by the Slovenian-Russian grant (2014-2015). E-mail address: volsterm@gmail.com (Maxim P. Limonov) Abstract s (s - 1 )g(M) + |G|g(M/G) = ]T |G|g(M/G¿). (1.1) i=1 ©® This work is licensed under http://creativecommons.Org/licenses/by/3.0/ 92 Ars Math. Contemp. 11 (2016) 101-106 Riemann surface of genus three which is a two-fold unramified covering of a genus g = 2 hyperelliptic Riemann surface, then M is hyperelliptic. The case g > 2 was considered in papers [1], [5]. For example, in the case of g = 3 it turns out that M is hyperelliptic or 1-hyperelliptic (M is a two-fold covering of a torus). In this paper, we find a discrete version of results obtained in [1] and [5]. Finite connected graphs here play the role of Riemann surfaces, and harmonic maps between graphs play the role of holomorphic maps between Riemann surfaces. It turns out that the category of graphs, together with harmonic maps between them, closely mirrors the category of Riemann surfaces, together with the holomorphic maps between them. Namely, we prove that ifa graph X is a degree 2 (unramified) covering of a hyperelliptic graph Y of genus g > 2, then X is 7-hyperelliptic for some 7 < f2--1]. Graph X, from the statement above, has the property that its automorphism group contains the Klein four-subgroup. In the proof, we use the fact that the Klein four-group admits a partition, and apply an analogue of (1.1) from [14]. Also we employ the theory of graphs of groups (or the Bass-Serre theory) to uniformize the coverings of a graph just as it works for Riemann surfaces. This approach was proposed by A. Mednykh and I. Mednykh [12]. In his dissertation [8], M. T. Green generalized the Bass-Serre theory and for coverings of graphs of groups obtained results similar to those in the topological theory of coverings. We use some results from this Ph.D. thesis. 2 Preliminaries 2.1 Graphs In the present paper, a graph is a finite connected multigraph. We allow a graph to have loops. Denote by V(X) the set of vertices of X and by E(X) the set of directed edges of X. Following J.-P. Serre [13], we introduce two maps d0, d1 : E(X) ^ V(X) (endpoints) and a fixed point free involution e ^ e of E(X) (reversal of orientation) such that dje = d1_ie. We put St(a) = StX(a) = d-1(a) = {e G E(X) | d0e = a}, the star of a, and call deg(a) = |St(a) | the degree (or valency) of a. A morphism of graphs y : X ^ Y carries vertices to vertices, edges to edges, and, for e G E(X), y(de) = djy(e) (i = 0,1) and y(e) = y(e). Note that a morphism of graphs carries loops to loops. Working with loops in a graph, one may encounter some problems. On those occasions, one can use the approach with semiedges being developed in [9]. For a G X we have the local map : stX (a) ^ StY (y(a)). A map y is locally bijective if ya is bijective for all a G X. We call y a covering if y is surjective and locally bijective. A bijective morphism is called an isomorphism, and an isomorphism y : X ^ X is called an automorphism. Remark 2.1. Note that the definition of a morphism of graphs given by M. Baker and S. Norine in [3] and our definition differ in the following sense. Let y : X ^ Y be morphism of graphs and for some edge e G E(X) let y(d0e) = y(d1e) = b G V(Y). Then morphism y, in the sense of [3], sends edge e to vertex b. In our case, morphism y must send edge e to a loop based at vertex b. M. P. Limonov: Accola theorem on hyperelliptic graphs 93 2.2 Harmonic maps and harmonic actions In this paragraph, we specify the class of morphisms of graphs, called harmonic maps, that share most properties with holomorphic maps between Riemann surfaces. The notion of harmonic maps between graphs was introduced by H. Urakawa [15] for simple graphs and was generalized by M. Baker and S. Norine [3] for multigraphs. Definition 2.2. A morphism ^ : X ^ Y of graphs is said to be a harmonic map or branched covering if, for all x G V(X), y G V(Y) such that y = y(x), the quantity |e G E(X) : x = d0e, y>(e) = e'| is the same for all edges e' G E(Y) such that y = d0e'. One can check directly from the definition that the composition of two harmonic mor-phisms is again harmonic. Therefore the class of all graphs, together with the harmonic morphisms between them, forms a category. We note also that an arbitrary covering of graphs is a harmonic map. Let ^ : X ^ Y be harmonic and x G V(X). We define the multiplicity of ^ at x by mv(x) = |e G E(X) : x = doe, y(e) = e'| for any edge e' G E(X) such that <^(x) = d0e'. By the definition of a harmonic morphism, mv(x) is independent of the choice of e'. If mv(x) > 1 for some vertex x G V(X), such a vertex is called a ramification point of The image y(x) of a ramification point is called a branch point. We define the degree of a harmonic map ^ : X ^ Y by the formula deg(^) := |e G E(X) : ^(e) = e'| (2.1) for any edge e' G E (Y). From the definition of a harmonic map of graphs and connectivity of the graphs, it follows that the right-hand side of (2.1) does not depend on the choice of e' and therefore deg(^) is well defined. Let G < Aut(X) be a group of automorphisms of a graph X. An edge e G E(X) is called invertible if there is h G G such that h(e) = e. Let G act without invertible edges. Define the quotient graph X/G so that its vertices and edges are G-orbits of the vertices and edges of X. Note that if the endpoints of an edge e g E(X) lie in the same G-orbit then the G-orbit of e is a loop in the quotient graph X/G. Following S. Corry [6], we say that the group G acts harmonically on a graph X if for all subgroups H < G, the canonical projection : X ^ X/H is harmonic. If G acts harmonically and without invertible edges, we say that G acts purely harmonically on X. The genus of a graph is defined as the rank of the first homology group of the graph (that is, its cyclomatic number). Let X be a graph of genus g' and let a group G < Aut(X) act purely harmonically on X. Denote by g the genus of the quotient graph X/G. There is an analogue of the Riemann-Hurwitz relation for graphs introduced in [3]. For the graph morphism under consideration, the relation is proved in [11], and has the following form: g' - 1 = |G|(g - 1)+ £ (|Ga|- 1), (2.2) aev (X) where Ga stands for the stabilizer of a G V(X). Here |G| coincides with the degree of the harmonic map ^ : X ^ X/G and |Ga| coincides with the multiplicity mv(a) of ^ at a. 94 Ars Math. Contemp. 11 (2016) 101-106 Remark 2.3. A graph X of genus g' > 2 is said to be hyperelliptic, if there is a degree 2 harmonic map F : X ^ Y, where graph Y is a tree (that is, a graph of genus 0). Since at every ramification point x G V(X) the multiplicity mF(x) = 2, by (2.2) the number of ramification points of F is equal to g' + 1. A finite group G is said to admit a partition {Gi,..., Gs}, where Gi < G and s > 2, if G = U¿=1 Gi and Gi n Gj = {1}, i, j = 1,2,..., s, i = j. Let G < Aut(X) act purely harmonically on a graph X and admit a partition {G1, • • • , Gs}. Recall that the Euler characteristic x(X) of a graph X is related to the genus g(X) of X via x(X) = 1 - g(X). By Corollary 1 in [14], we have 2.3 Graphs of groups The theory of graphs of groups is employed in this paper to uniformize harmonic maps between graphs. Following [4], we give the definition. Definition 2.4. A graph of groups X = (X, A) consists of (i) a connected graph X; (ii) an assignment A to every vertex a G V(X) a group Aa, and to every edge e G E(X) a group Ae = Ag; (iii) monomorphisms ae : Ae ^ Aa, where a = d0e. In this paper we restrict ourselves to a class of graphs of groups having trivial groups Ae = {1} for all edges e G E(X) and finite groups Aa for all vertices a G V(X). It will be enough for application to the theory of harmonic maps between graphs. There are two equivalent definitions of the notion of a fundamental group of a graph of groups: the first is a direct algebraic definition via an explicit group presentation, and the second one using the language of groupoids. The algebraic definition is easier to state. Choose a spanning tree T in X. The fundamental group of X with respect to T, denoted n^X, T), is defined as the quotient of the free product where F (E (X )) denotes the free group with basis E (X ) and R is the following set of relations: (i) e = e-1 for every e in E(X); (ii) e = 1 for every e in E (T ). There is also a notion of the fundamental group of X with respect to a base-vertex a in X, denoted n^X, a), which is defined using the formalism of groupoids (see [8] and [4] for details). It turns out that for every choice of a base-vertex a and every spanning tree T in X, the groups n^X, T) and n^X, a) are naturally isomorphic. We note also ([4], s (s - 1) g(X) + |G| g(X/G) = Y, |Gi| g(X/Gi). (2.3) i=1 M. P. Limonov: Accola theorem on hyperelliptic graphs 95 section 1.22) that for given a, b e X the groups ni (X, a) and n (X, b) are conjugate in the fundamental groupoid of X. In what follows we will use notation n1 (X), ignoring the way the fundamental group was constructed. It follows from the above definition that if X is a graph of genus g then F(E(X))/R = Fg is the free group of rank g. Then ni(X)=f * Aa) * Fg. \aev(x) J g To every graph of groups X, with a specified choice of a base-vertex a e X, one can associate a Bass-Serre universal covering tree X = (X, a), which is a tree admitting a natural group action of the fundamental group n1 (X) = n1 (X, a) without edge-inversions. Moreover, the quotient graph of groups X/^(X) is naturally isomorphic to X. 2.4 Coverings of graphs of groups and harmonic maps Let us take graph morphisms in the definition of a covering of graphs of groups, given in [8] or [4], to be the class of all harmonic maps. Taking into consideration the fact that a trivial group is assigned to any edge, the definition of a covering of graphs of groups can be formulated as follows. Definition 2.5. Let X = (X, A) and Y = (Y, B) be graphs of groups with trivial edge groups. A covering F = (F, $) : X ^ Y of graphs of groups consists of (i) a harmonic morphism F : X ^ Y; (ii) a set $ of monomorphisms Fa : Aa ^ BF(a), a e V(X), such that mF(a)|Aa| = |Bf(a)|, where mF(a) is the multiplicity of F at the point a. This definition was introduced in [12]. To illustrate the notion of a covering in the category of graphs of groups, we provide a basic example. Example 2.6. Let G be a group of automorphisms of a finite connected graph X. Suppose that G acts on the set E(X) of directed edges of X freely and without edge inversions. Consider the canonical map F : X ^ Y = X/G. Denote by StG(a) the stabilizer of a vertex a in group G. Then F is a harmonic map with mF(a) = | StG(a)|, a e V(X). Denote by the graph of groups obtained from X by prescribing a trivial group to each vertex and each edge of X. Graph of groups is defined by prescribing to each vertex b = F(a) of Y a group BF(a) isomorphic to StG(a) and assign a trivial group to each edge of Y. Since G acts transitively on each fibre of F, the group BF(a) is well defined. Let $ be the set of trivial monomorphisms Fa : Aa ^ BF(a), a e V(X). We have mF (a)|Aa| = |Bf(a) |. Then F = (F, $) : X ^ Y = X/G is the covering of graphs of groups. 96 Ars Math. Contemp. 11 (2016) 101-106 3 Main result A graph X of genus g' > 2 is said to be 7-hyperelliptic if there is a degree 2 harmonic map F : X ^ Y onto a graph Y of genus 7. Each edge of Y has two pre-images under F and there is an order 2 automorphism t of X, which swaps these pre-images. This automorphism is called 7-hyperelliptic involution. Note that 7-hyperelliptic involution acts on X purely harmonically. The case 7 = 0 coincides with the definition of a hyperelliptic graph. The main result is stated in the following theorem. Theorem 3.1. Let X be a degree 2 (unramified) covering of a hyperelliptic graph Y of genus g > 2. Then X is 7-hyperelliptic for some 7 < f2-1]. In the proof of Theorem 3.1 we use the following algebraic result. Lemma 3.2. Let r be a free product of n > 1 copies of Z2. If F < r is a torsion-free subgroup of index 4, then F < r and r/F is isomorphic to the Klein four-group. Proof. The given group r has the presentation r = (xi, X2,..., xn | x2, x2,..., x2n) . (3.1) Let F < r be any torsion-free subgroup of index 4. The action of r on the right cosets {F, Fy1, Fy2, Fy3} of F in r gives a transitive representation 0 : r ^ S4. If some xj in the presentation (3.1) of r has a fixed point, then for some y G r we have y xj y-1 G F and F is not torsion-free, because (y xj y-1) = 1. Hence xj has no fixed points, so it is represented in S4 by a double transposition (that is, by a permutation of cyclic type (2 2)). So long as we deal with the transitive representation, we get an epimorphism 0 : r ^ V4, where V4 is the Klein four-group. Let us show that F < ker 0. Take any w G F. Since w fixes the coset F, and there are only double transposition actions and the trivial action, w must fix the remaining cosets. So, w G ker 0. The reverse inclusion ker 0 < F is obvious. Thus, we get F = ker 0 < r. □ Proof of Theorem 3.1. Let ^ : X ^ Y denote the covering from the theorem. The graph Y is hyperelliptic, that is, there is an order two harmonic automorphism t g Aut(Y), such that the factor graph T = Y/ (t} is a tree. Let ^ : Y ^ T be the corresponding harmonic map. Let F stand for the composite harmonic map ^ o Now we are going to find a group G0 of deck transformations of the harmonic map F : X ^ T. To do that, we apply the Bass-Serre theory. Turn graphs X and T into graphs of groups as follows. Let X = (X, A) be a graph of groups based on graph X, and where A assigns a trivial group Az = {1} to each vertex and each edge z of X. Let T = (T, B) be a graph of groups based on tree T, and where B assigns the group Bz = Z2 to each of g +1 branch points z of map and a trivial group Bz = {1} to every other vertex and edge z of T. Let us show that the map F : X ^ T can be extended to the covering F : X ^ T of graph of groups. Since F is harmonic, it remains to check that, for any a G V(X), the trivialmonomorphism Aa ^ BF(a) satisfies the condition mF(a)|Aa| = |BF(a)| or, since all Aa = {1}, the condition mF (a) = |BF(a)|. (3.2) M. P. Limonov: Accola theorem on hyperelliptic graphs 97 The map ft is a covering, and so locally bijective. Hence, for any a e V(X), mF(a) = m^(ft(a)). If ft(a) is a ramification point of ft, then m^(ft(a)) = 2, BF(a) = Z2, and so (3.2) is correct. If ft(a) is not a ramification point of ft, then m^(ft(a)) = 1, BF(a) is trivial, hence (3.2) is correct as well. _ _ Let H = nftX) and r = nftT) be fundamental groups, and X and T be universal covering trees of graphs of groups X and T respectively. Note that since ft has no ramification points, by the Riemann-Hurwitz relation (2.2), X has genus 2g - 1 and so H is a free group on 2g - 1 generators; group r is a free product of g + 1 copies of Z2. By the Bass uniformization theorem ([3], Proposition 2.4) there exists a lift of F to an isomorphism F : X ^ T between the covering trees equivariant under the action of H and r on F and F respectively. Note that X ^ F/H an« ^ F/r. Identifying F and F via F we replace the covering F : X ^ T by the covering F' : X/H ^ X/r induced by the group inclusion H < r, where H is of index 4 in r. By Lemma 3.2, since any free group is a torsion-free group, H is a normal subgroup in r. Therefore, by Theorem 8.1 in [8], covering F' is regular and its covering transformation group is G0 = r/H. Returning to the category of graphs, we get the underlying harmonic map of graphs X ^ X/G0 coinciding with F : X ^ T where X/G0 = T. Group G0 is isomorphic to the Klein four-group. So it admits a partition {G1, G2, G3} into three subgroups of order two. Note that every subgroup Gj < G0 corresponds to a harmonic map X ^ X/Gj and one of X/Gj is isomorphic to Y. Let g' and gj be the genera of X and X/Gj, i e {0,1, 2,3}, respectively. By (2.3) we have g' + 2go = gi + g2 + g3. Here g0 = 0, g' = 2g - 1 and one of gj must be g, so we get g - 1 = gi + g2. The possible cases for gi and g2 (up to a symmetry) are g1 g2 0 g - 1 1 g-2 2 g-3 r g -11 2 \g - 1 2 (+1, if g is even). Taking 7 to be the minimum of g1 and g2 in each case, we get that X is 7-hyperelliptic for some 7 < f2-. Finally, we show that the bound is sharp. That is, for any g > 2 there exists a graph X of genus 2g - 1, and the smallest genus of graphs Y, such that X ^ Y is a degree 2 harmonic morphism, is equal to f2-1]. Let g be odd. Consider graph X1 of genus 2g - 1, depicted on Figure 1 in the case g = 5. Its automorphism group contains five involutions. Their actions on X1 are horizontal and vertical flips, h, v, two diagonal flips, d1, d2, and the rotation r on n around the center of the graph. The corresponding factor-graphs have genera , , g - 1, g - 1 and g respectively. 98 Ars Math. Contemp. 11 (2016) 101-106 Now let g be even. Consider graph X2 of genus 2g - 1, depicted on Figure 2 in the case g = 6. Its automorphism group contains three involutions. They act on X2 as horizontal and vertical flips, h, v, and the rotation r on n around the center of the graph. X, Figure 1: Graph Xi in the case g = 5 and its factor-graphs. The corresponding factor-graphs have genera f2-1], f2-1] + 1 and g respectively. Hence, the bound in the theorem is sharp. □ V Figure 2: Graph X2 in the case g = 6 and its factor-graphs. The immediate consequences of the theorem are the assertions below. The first one has been proved by I. Mednykh [10] by exhaustive search. h v Corollary 3.3. Suppose X is a graph of genus 3 which is a degree 2 (unramified) covering of a hyperelliptic graph Y of genus 2. Then X is hyperelliptic. M. P. Limonov: Accola theorem on hyperelliptic graphs 99 Corollary 3.4. If X is a graph of genus 5 which is a degree 2 (unramified) covering of a hyperelliptic graph of genus 3, then X is hyperelliptic or l-hyperelliptic. Remark 3.5. In both corollaries, the genus of X is not an extra hypothesis, but a necessary consequence of the degree 2 cover due to Riemann-Hurwitz relation (2.2). 4 Acknowledgements The author is very grateful to his supervisor, Alexander Mednykh, and Gareth Jones for discussion of the ideas of the paper. Also the author is very grateful to an anonymous referee for fruitful remarks and suggestions. References [1] R. D. M. Accola, On lifting the hyperelliptic involution, Proc. Amer. Math. Soc. 122:2 (1994), 341-347. [2] R. D. M. Accola, Riemann Surfaces with Automorphism Groups Admitting Partitions, Proc. Amer. Math Soc. 21:2 (1969), 477-482. [3] M. Baker, S. Norine, Harmonic morphisms and hyperelliptic graphs, Int. Math. Res. Notes 15 (2009), 2914-2955. [4] H. Bass, Covering theory for graphs of groups, Journal of Pure and Applied Algebra 89 (1993), 3-47. [5] E. Bujalance, A classification of unramified double coverings of hyperelliptic Riemann surfaces, Arch. Math., 47 (1986), 93-96. [6] S. Corry, Genus bounds for harmonic group actions on finite graphs, Int. Math. Res. Notices 19 (2011), 4515-4533. [7] H.M. Farkas, Automorphisms of compact Riemann surfaces and the vanishing of theta constants, Bull. Amer. Math. Soc. 73 (1967), 231-232. [8] M. T. Green, Graphs of groups, Ph. D. Thesis, Department of Mathematics in the Graduate School of The University of Alabama, Tuscaloosa, 2012. [9] A. Malnic, R. Nedela, M. Skoviera, Lifting graph automorphisms by voltage assignments, European Journal of Combinatorics, 21:7 (2000), 927-947. [10] I. A. Mednykh, On the Farkas and Accola Theorems for Graphs, Doklady Mathematics, 87:1 (2013), 65-68. [11] A.D. Mednykh, On the Riemann-Hurwitz formula for graph coverings, (2015), preprint arXiv:1505.00321v1 [math.AT] [12] A. Mednykh, I. Mednykh, On Wiman's theorem for graphs, Discrete Mathematics (to be published). [13] J.-P. Serre, Trees, Springer-Verlag, New York, 1980. [14] T. Taniguchi, On the Euler-characteristic and the signature of G-manifolds, Proc. Japan Acad. 49:2 (1973), 130-133. [15] H. Urakawa, A discrete analogue of the harmonic morphism and Green kernel comparison theorems, Glasg. Math. J., 42:3 (2000), 319-334. ARS MATHEMATICA CONTEMPORANEA Also available at http://amc-journal.eu ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 11 (2016) 101-106 A note on automorphisms of halved Cayley graphs of Coxeter systems Mark Pankov Department of Mathematics and Computer Science, University ofWarmia and Mazury, Sloneczna 54, Olsztyn, Poland Received 10 February 2015, accepted 12 June 2015, published online 24 September 2015 We consider the halved Cayley graphs of Coxeter systems and show that every automorphism of such a graph can be uniquely extended to an automorphism of the corresponding Cayley graph. Keywords: Coxeter system, Cayley graph. Math. Subj. Class.: 20F55, 05C12 1 Introduction Let W be a group generated by a finite set S whose elements are involutions. For distinct s, s' G S we denote by m(s, s') the order of the element ss'. Then m(s, s') = m(s', s) and the condition m(s, s') = 2 is equivalent to the commuting of s and s'. Suppose that (W, S) is a Coxeter system, i.e W is the quotient of the free group over S by the normal subgroup generated by all (ss')m(s,s ) with m(s, s') < to. The Cayley graph C(W, S) is the graph whose vertex set is W and w, v G W are adjacent vertices of the graph if v = sw for a certain s G S (since S consists of involutions, the adjacency relation is symmetric). For the dihedral Coxeter system I2(n) this graph is the (2n)-cycle and we get an infinite path if n = to. The Cayley graph of An is the permutohedron [6]. See [1, Figures 3.3] for the Cayley graph of H3. Also, C(W, S) can be identified with the graph whose vertices are maximal simplices of the Coxeter complex £(W, S) and two maximal simplices are adjacent vertices if their intersection consists of |S| — 1 elements [5]. In almost all cases, the automorphism group of C(W, S) is known. For every w G W the right multiplication Rw : v ^ vw is an automorphism of the graph. If the diagram of our Coxeter system does not contain adjacent edges labeled by to then the automorphism E-mail address: pankov@matman.uwm.edu.pl (Mark Pankov) Abstract charchar This work is licensed under http://creativecommons.Org/licenses/by/3.0/ 102 Ars Math. Contemp. 11 (2016) 101-106 group of C(W, S) is the semidirect product of W and the automorphism group of the diagram [1, Corollary 3.2.6]. The length l(w) of an element w e W is the smallest number m such that w has an expression w = S1 ...sm, si,...,sm e S. (1.1) It is clear that l(w) is the distance between 1 and w in the Cayley graph. Since every right multiplication is an automorphism of the graph, the distance d(w, v) between w,v e W is equal to l(wv-1) = l(vw-1). Recall the following remarkable property of Coxeter systems called the exchange condition: if (1.1) is a reduced expression, i.e. l(w) = m, then for every s e S satisfying l(sw) < m there exists k e {1,..., m} such that sw = Si . . . Sk . . . Sm (the symbol * means that the corresponding term is omitted). The group W can be presented as the disjoint union of the following subsets W1 := { w e W : l(w) is odd } and W2 := { w e W : l(w) is even }. Using the exchange condition we establish the following: • the distance between any two elements of Wj, i e {1, 2} is even, • the distance between every element of W1 and every element of W2 is odd. Note that W2 is a subgroup of W. Consider the graph Rj, i e {1, 2} whose vertex set is Wj and two elements of Wj are adjacent vertices if the distance between them (in the Cayley graph) is equal to 2. The right multiplication Rw preserves both Wj in the case when w e W2. If w e W1 then Rw transfers W1 to W2 and conversely. The latter implies that r1 and r2 are isomorphic. The main result of the note is the following. Theorem 1.1. If |S| > 5 then every isomorphism between rj and Tj i, j e {1, 2} can be uniquely extended to an automorphism of the Cayley graph. The same fails if |S| e {3,4} (Remark 3.2), but the statement holds for |S| = 2 (the Cayley graph is a cycle or an infinite path) and the case |S| = 1 is trivial. Theorem 1.1 easily follows from the description of maximal 2-cliques of Cayley graph, 1.e. maximal cliques of the halved Cayley graph, given in Lemma 2.5. If S consists of n mutually commuting involutions then C(W, S) is the n-dimensional hypercube graph Hn and every rj is the half-cube graph 2 Hn. So, it is natural to ask which properties of the hypercube and half-cube graphs can be extended to C(W, S) and rj, respectively? 2 Maximal 2-cliques Two vertices in a graph are said to be 2-adjacent if the distance between them is equal to 2. Recall that a clique is a subset of the vertex set, where any two distinct vertices are adjacent. We say that a subset in the vertex set is a 2-clique if any two distinct elements of this subset are 2-adjacent vertices. Consider examples of 2-cliques in C(W, S). M. Pankov: A note on automorphisms of halved Cayley graphs ofCoxeter systems 103 Example 2.1 (First type). Any two distinct elements of S are 2-adjacent and S is a 2-clique. Since the right multiplication Rw is an automorphism of the Cayley graph, Sw is a 2-clique for every w G W. Remark 2.2. Suppose that S = Sw. Then for any si, s2 G S there exist si, s2 G S such that si = siw and s2 = s2w. If w = 1 then s1 = si and s2 = s2. We have s'isi = w = s2s2 and s2sisi = S2 Since W cannot be generated by a proper subset of S, the latter means that s2 = si. Therefore, S = {si,s2} and sis2 = s2si. So, the equality Sw = Sw' implies that w = w' except the case when our Coxeter system is I2 (2). Example 2.3 (Second type). Let s, s', s'' be three distinct mutually commuting elements of S. Then ss's'' is 2-adjacent to s, s', s'' and {sw, s'w, s''w, ss's''w} is a 2-clique for every w G W. Example 2.4 (Third type). Suppose that s, s' G S and m(s, s') = 3. Then ss's = s'ss' and we denote this element by w(s, s'). It is 2-adjacent to s, s' and for every w G W the set {sw, s'w, w(s, s')w} is a 2-clique. Lemma 2.5. Every maximal 2-clique of C(W, S) is one of the 2-cliques described above. Remark 2.6. The n-dimensional hypercube graph contains only maximal 2-cliques of the first and second types if n > 4 [3]. In the case when n = 3, there are precisely two maximal 2-cliques of the second type and 2-cliques of the first type are not maximal. To prove Lemma 2.5 we use the following properties of Coxeter systems: (P1) for every w G W there is a subset Sw c S such that every reduced expression of w is formed by all elements of Sw, (P2) the group W cannot be generated by a proper subset of S. Lemma 2.7. If u G W \ S is 2-adjacent to three distinct s, s', s'' G S then s, s', s'' are mutually commuting and u = ss's''. Proof. Since u is 2-adjacent to s, s', s'' and u G S, there are three reduced expressions u = sis2s, u = sis2s', u = si's2's'', where si, s2, si, s2, si', s2' G S. By (P1), we have Su = {s, s', s''} and {si, s2} = {s', s''}, {si, s2} = {s, s''}, {si', s2'} = {s, s'}. Thus there are the following possibilities for the first and second expressions: (1) u = s''s's = s''ss', (2) u = s''s's = ss''s', (3) u = s's''s = s''ss', (4) u = s's''s = ss''s'. 104 Ars Math. Contemp. 11 (2016) 101-106 Case (1). The involutions s, s' are commuting and the third expression is (2.1) Then s''s's = u = s'ss'' and s's''s's = ss''. We apply the exchange condition to w = s"s's and get the following three possibilities: • s's = ss", • s" s = ss", ss". The first and third contradict (P2). So, s and s" are commuting. Similarly, the equality s"s's = u = ss's" shows that ss"s's = s's". Using the above arguments we establish that s' and s'' are commuting. Case (2). The equality s''s's = ss''s' implies that s's = s''ss''s'. As in the previous case, we show that s and s' are commuting. Then the third expression is (2.1) which implies that ss''s' = u = ss's'' and s', s'' are commuting. The equality guarantees that s and s'' are commuting. Case (3). We have s's''s = s''ss' and s''s's''s = ss'. As above, this means that s, s' are commuting and the third expression is (2.1). Then s's''s = u = s'ss'' and s, s'' are commuting. The equality shows that s' and s'' are commuting. Case (4). Since s's''s = ss''s', we have s''s = s'ss''s' and ss's''s = s''s'. By the standard arguments, s'' is commuting with both s and s'. Then which implies that s and s' are commuting. □ Remark 2.8. If s, s', s'' are distinct elements of S then each of the equalities implies that s and s' are commuting; moreover, the third equality guarantees that s, s', s'' are mutually commuting. See the cases (2)-(4) in the proof of Lemma 2.7. Lemma 2.7 shows that for any three distinct mutually commuting s, s', s'' G S the 2-clique formed by s, s', s'' and ss's'' is maximal. Therefore, every 2-clique of the second type is maximal. Lemma 2.9. If u G W \ S is 2-adjacent to distinct s, s' G S then one of the following possibilities is realized: ss's'' u s ss s''s' s''ss' = s''s's = u = ss''s' s's''s = u = s''ss' = s''s' s s''ss' ss''s' u = ss s = s ss s''s' s = ss''s', s's''s = s''ss', s' s''s = ss''s' M. Pankov: A note on automorphisms of halved Cayley graphs ofCoxeter systems 105 • m(s, s') = 3 and u = w(s, s'), • s, s' are commuting and u = s''s's for a certain s'' G S. Proof. Since u is 2-adjacent to s, s' and u G S, there are two reduced expressions u = sis2s and u = s^s^s', where si, s2, s1, s'2 G S. By (P1), we have {s, si, s2} = Su = {s', s1, s2}. If |Su| = 2 then Su = {s, s'} and u = ss's = s'ss' which implies that m(s, s') = 3, i.e. the first possibility is realized. If |Su| = 3 then Su = {s, s', s''} and, as in the proof of Lemma 2.7, we have the following possibilities for the above expressions: (1) u = s''s's = s''ss', (2) u = s''s's = ss''s', (3) u = s's''s = s''ss', (4) u = s's''s = ss''s'. It is clear that s and s' are commuting in the case (1). By Remark 2.8, the same holds for the cases (2) - (4) and s, s', s'' are mutually commuting in the case (4). So, we get the second possibility. □ By Lemma 2.9, for any s, s' G S satisfying m(s, s') = 3 the 2-clique formed by s, s' and w(s, s') is maximal. Thus every 2-clique of the third type is maximal. Proof of Lemma 2.5. Let C be a maximal 2-clique. For any distinct u, u' G C there exist w G W and s, s' G S such that u = sw and u' = s'w. The maximal 2-clique Cw-1 contains s and s'. Thus we can suppose that C contains at least two distinct elements of S. Let s and s' be elements of S belonging to C. Suppose that C = S, i.e. there is u g C \ S. If there is a third element s'' G S contained in C then, by Lemma 2.7, s, s', s'' are mutually commuting and C is the 2-clique of the second type formed by s, s', s'' and u = ss's''. In the case when C contains precisely two elements of S, Lemma 2.9 shows that m(s, s') = 3 and C = {s, s', w(s, s')} or s, s' are commuting and u = s''s's for a certain s'' G S. The latter means that the maximal 2-clique Cs's contains s, s', s'', i.e. it coincides with S or {s, s', s'', ss's''}. Then C is a 2-clique of the first type or the second type. □ 3 Proof of Theorem 1.1 We consider the case when i = j = 1. Let f : W1 ^ W1 be an automorphism of r1. Then f preserves the family of maximal cliques of r1. Every maximal clique of r1 is a maximal 2-clique of C(W, S) contained in W1. By Lemma 2.5, there are precisely three types of such subsets. They contain |S| vertices, 4 vertices and 3 vertices, respectively. The condition |S| > 5 guarantees that f preserves the types of maximal cliques. If w G W2 then Sw is a maximal clique of r1 and f (Sw) = Sw' foracertain w' G W2. We set f (w) := w' and get a bijective transformation of W. If w, v g W are adjacent vertices of the Cayley graph then one of these vertices belongs to W1 and the other is an element of W2. Suppose that v G W1 and w g W2. Then v G Sw 106 Ars Math. Contemp. 11 (2016) 101-106 and f (v) e f (Sw) = Sf (w) which implies that f (v) and f (w) are adjacent vertices of the Cayley graph. The apply the same arguments to f-1 and establish that f is an automorphism of C(W,S). The uniqueness of such extension follows from the fact that w is the unique vertex of the Cayley graph adjacent to all vertices from Sw (Remark 2.2). Remark 3.1. A similar idea was exploited in [4, Section 4.8] for an alternative proof of Cooperstein-Kasikova-Shult's characterization of apartments in half-spin Grassmannians [2]. Remark 3.2. If C(W, S) is H4 then there are automorphisms of r = 1H4 which change the types of 2-cliques contained in Wj. Such automorphisms are not extendable to automorphisms of H4. Similarly, if (W, S) is the direct product of I2 (3) and the group spanned by an involution then every maximal 2-clique of C(W, S) is of the first or of the third type and there are automorphisms of r changing the types of 2-cliques contained in Wj. References [1] A. Bjorner and F. Brenti, Combinatorics of Coxeter groups, Graduate Texts in Mathematics 231, Springer, 2005. [2] B.N. Cooperstein , A. Kasikova and E.E. Shult Witt-type Theorems for Grassmannians and Lie Incidence Geometries, Adv. Geom. 5 (2005), 15-36. [3] W. Imrich, S. KlavZar and A. Vesel, A characterization of halved cubes, Ars Combin. 48 (1998), 27-32 [4] M. Pankov, Grassmannians of classical buildings, Algebra and Discrete Math. Series 2, World Scientific, Singapore, 2010. [5] J. Tits, Buildings of spherical type and finite BN-pairs, Lecture Notes in Mathematics 386, Springer, 1974. [6] G. M. Ziegler, Lectures on Polytopes, Graduate Texts in Mathematics 152, Springer, 1995. ARS MATHEMATICA CONTEMPORANEA Also available at http://amc-journal.eu ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 11 (2016) 107-125 Involutes of polygons of constant width in Minkowski planes Marcos Craizer * Departamento de Matemática- PUC-Rio, Rio de Janeiro, Brazil Horst Martini Faculty of Mathematics, University of Technology, 09107 Chemnitz, Germany Received 2 July 2015, accepted 21 August 2015, published online 24 September 2015 Consider a convex polygon P in the plane, and denote by U a homothetical copy of the vector sum of P and -P. Then the polygon U, as unit ball, induces a norm such that, with respect to this norm, P has constant Minkowskian width. We define notions like Minkowskian curvature, evolutes and involutes for polygons of constant U-width, and we prove that many properties of the smooth case, which is already completely studied, are preserved. The iteration of involutes generates a pair of sequences of polygons of constant width with respect to the Minkowski norm and its dual norm, respectively. We prove that these sequences are converging to symmetric polygons with the same center, which can be regarded as a central point of the polygon P. Keywords: Area evolute, Barbier's theorem, center symmetry set, curvature, curves of constant width, discrete differential geometry, evolutes, Minkowski geometry, normed plane, equidistants, involutes, support function, width function. Math. Subj. Class.: 52A10, 52A21, 53A15, 53A40 1 Introduction A Minkowski or normed plane is a 2-dimensional vector space with a norm. This norm is induced by its unit ball U, which is a compact, convex set centered at the origin (or, shortly, centered). Thus, we write (R2, U) for a Minkowski plane with unit ball U, whose boundary is the unit circle of (R2, U). The geometry of normed planes and spaces, usually * The first named author wants to thank CNPq for financial support during the preparation of this manuscript. E-mail addresses: craizer@puc-rio.br (Marcos Craizer), martini@mathematik.tu-chemnitz.de (Horst Martini) Abstract charchar This work is licensed under http://creativecommons.Org/licenses/by/3.0/ 108 Ars Math. Contemp. 11 (2016) 101-106 called Minkowski Geometry (see [21], [14], and [13]), is strongly related to and influenced by the fields of Convexity, Banach Space Theory, Finsler Geometry and, more recently, Discrete and Computational Geometry. The present paper can be considered as one of the possibly first contributions to Discrete Differential Geometry in the spirit of Minkowski Geometry. The study of special types of curves in Minkowski planes is a promising subject (see the survey [15]), and the particular case of curves of constant Minkowskian width has been studied for a long time (see [3], [4], [11], and § 2 of [13]). A curve 7 has constant Minkowskian width with respect to the unit ball U or, shortly, constant U-width, if h(7) + h(-7) is constant with respect to the norm induced by U, where h(j) denotes the support function of 7. Another concept from the classical theory of planar curves important for our paper is that of involutes and evolutes; see, e.g., Chapter 5 of [8] and, respectively, [9]. For natural generalizations of involutes, which also might be extended from the Euclidean case to normed planes, we refer to [18] and [2]. And in [20] it is shown how the concept of evolutes and involutes can help to construct curves of constant width in the Euclidean plane. In this paper, we consider convex polygons P of constant Minkowskian width in a normed plane, for short calling them CW-polygons. If P is a CW polygon, then the unit ball U is necessarily a centered polygon whose sides and diagonals are suitably parallel to corresponding sides and diagonals of P (sometimes with diagonals suitably meaning also sides; see §§ 2.1 below). If, in particular, U is homothetic to P + (-P), then, and only then, P is of constant U-width in the Minkowski plane induced by U. There are many results concerning smooth CW curves in normed planes: Barbier's theorem fixing their circumference only by the diameter of the curve (cf. [16] and [12]); relations between curvature, evolutes, involutes, and equidistants (see [19] and, for applications of Minkowskian evolutes in computer graphics, [1]); mixed areas, and the relation between the area and length of a CW curve cut off along a diameter (see [3], (2.1)). In this paper we prove corresponding results for CW polygons. We note that our results are direct discretizations of the corresponding results for the smooth case, where the derivatives and integrals are replaced by differences and sums. It is meant in this sense that the results of this paper can be considered as one of the first contributions to Discrete Differential Geometry in the framework of normed planes. Among the U-equidistants of a smooth CW curve 7, there is a particular one called central equidistant. The central equidistant of 7 coincides with its area evolute, while the evolute of 7 coincides with its center symmetry set (see [6] and [7]). We show that for a CW polygon P the same results hold: The central equidistant M coincides with the area evolute, and the evolute E coincides with the central symmetry set (see [5]). Since the equidistants of P are the involutes of E, we shall choose the central equidistant as a representative of them, and we write M = Inv(E). For a Minkowski plane whose unit ball U is a centered convex (2n)-gon, the dual unit ball V is also a centered convex (2n)-gon with diagonals parallel to the sides of U, and the sides parallel to diagonals of U. As in the smooth case (cf. [6]), the involutes of the central equidistant of P form a one-parameter family of polygons having constant V-width. This one-parameter family consists of the V-equidistants of any of its members, and we shall choose the central equidistant N as its representative. Thus we write N = Inv(M). In [6] it is proved that, for smooth curves, the analogous involute N is contained in the region bounded by M and has smaller or equal signed area. In this paper we prove the corresponding fact for polygons, namely, that N is contained in the region bounded by M M. Craizer and H. Martini: Involutes of polygons of constant width in Minkowski planes 109 and the signed area of N is not larger than the signed area of M. What happens if we iterate the involutes? Let N(0) = E, M(0) = M, N(1) = N and define M(k) = Inv(N(k)), N(k + 1) = Inv(M(k)). Then we obtain two sequences M(k) and N(k), the first being of constant U-width and the second of constant V-width. Moreover, we have _ _ _ _ N(0) D M(0) D N(1) D M(1) D ..., where R denotes the closure of the region bounded by R. Denoting by O = O(P) the intersection of all these sets, we shall prove that O is in fact a single point. Another form of describing the convergence of M(k) and N(k) to O is as follows: For fixed c and d, consider the sequences M(k) + cU of polygons of constant U-width, and the sequences N(k) + dV of polygons of constant V-width. Then these sequences are converging to 0 + cU and O + dV, respectively, which are U- and V-balls centered at O. For smooth curves the analogous results were proved in [6]. Our paper is organized as follows: In Section 2 we describe geometrically the unit ball of a Minkowski plane for which a given convex polygon has constant Minkowskian width. In Section 3, we define Minkowskian curvature, evolutes and involutes for CW polygons and prove many properties of them. In Section 4 we consider the involute of the central equidistant, and in Section 5 we prove that the involutes iterates are converging to a single point. 2 Polygonal Minkowskian balls, their duals, and constant Minkowski-an width Since faces and also width functions of convex sets behave additively under (vector or) Minkowski addition, it is clear that a polygon P is of constant Minkowskian width if and only if P + (-P) is a homothetical copy of the unit ball U of the respective normed plane; see, e.g., §§ 2.3 of [13]. If, moreover, the homothety of U and P + (-P) is only possible when P itself is already centrally symmetric, then the only sets of constant U-width are the balls of that norm; cf., e.g., [22]. In the following we will have a closer look at various geometric relations between polygons P of constant U-width and the unit ball U, since we need them later. Thus, let P be an arbitrary planar convex polygon. By an abuse of notation, we shall denote by the same letter P also the set of vertices of the polygon, the closed polygonal arc formed by the union of its sides, and the convex region bounded by P. 2.1 A centered polygon with parallel sides and diagonals Assume that P = {Pi,..., P2n} is a planar convex polygon with parallel opposite sides, i.e., the segments PiPi+1 and Pi+nPi+n+1, 1 < i < n, are parallel. Lemma 2.1. Fix an origin Z and take U1 such that U1 — Z = 2a (P1 — P1+n),for some a > 0. Consider the polygon U whose vertices are Ui = Z +71(Pi — Pi+n) , (2.1) 2a 1 < i < 2n. Then U is convex, symmetric with respect to Z, Ui+1 — Ui || Pi+1 — Pi and Ui — Z || Pi — Pi+n for 1 < i < n (see Figure 1). Moreover, U is the unique polygon with these properties. 110 Ars Math. Contemp. 11 (2016) 101-106 Figure 1: A hexagon P with parallel opposite sides and the corresponding homothet U of P + (-P). Proof. It is clear that U is symmetric with respect to Z, Uj+1 - U || Pj+1 - Pj and U - Z || Pj - Pj+n for 1 < i < n. Moreover Uj+1 - U has the same orientation as Pj+1 - Pj, which implies that U is convex. To prove the uniqueness of U, observe that the point U2 is obtained as the intersection of the lines parallel to P1P2 through U1 and parallel to P2P2+n through Z. The points U3,..., Un are obtained inductively in a similar way, while Un+1,.., U2n are reflections of U1, ...Un with respect to Z. □ Consider now a convex polygon P = {P^ ..., Pf} that has not necessarily all opposite sides parallel. Suppose that exactly 0 < j < f pairs are parallel. Our next lemma shows that the list of vertices of this polygon can be re-written as P = {P1, P2,.., P2n }, n = k - j, with "parallel opposite sides" in a broader sense. Lemma 2.2. We may re-write the list of vertices of P as {P^ P2,.., P2n} such that, for each 1 < i < n, PjPj+1 is parallel to Pj+nPj+n+1 or else one of these sides, say Pj+nPj+n+1, degenerates to a point, in which case the other side PjPj+1 is not degenerated and the line through Pj+n = Pj+n+1 parallel to PjPj+1 is outside P (see Figure 2). Proof. The polygon P = {P^ ...,Pf} defines exactly n = k - j directions 01,..., 0n, in increasing order, in the plane. We may assume that P1P2 is in direction and define P1 = P^ P2 = P2. For the induction step write Pj = P;. If PjP;+1 is in direction 0j, define Pj+1 = P;+1, otherwise define Pj+1 = i'; .It is now easy to verify that the polygon P = {P1, P2,.., P2n} satisfies the properties of the lemma. □ The construction of Lemma 2.1 can be applied to the polygon P obtained in Lemma 2.2 (see Figure 2). If, for example, P is a triangle, then P + (-P) is an affinely regular hexagon (see Figure 3). From now on, we shall assume that Z coincides with the origin of R2 and that P = {P1,..., P2n}, with PjPj+1 parallel to UjUj+1. M. Craizer and H. Martini: Involutes of polygons of constant width in Minkowski planes 111 /l\j u4 \U3 ---------y--------------------- p7y J''" U8 ! "2 P2=Pi=P4 Figure 2: A quadrangle and the corresponding symmetric octagon. Figure 3: When P is a triangle of constant U-width, then U is an affinely regular hexagon. 2.2 The dual Minkowskian ball Now we introduce the type of duality which is very useful for our investigations. Let (R2)* denote the space of linear functionals in R2. The dual norm in (R2)* is defined as ||f|| = sup{f(u),u e U}. We shall identify (R2)* with R2 by f (•) = [•, v], where [•, •] denotes the determinant of a pair of planar vectors. Under this identification, the dual norm in R2 is given by ||v|| = sup{[u, v], u e U}. We shall construct below a centered polygon V such that, for v in any side of V, we have ||v|| = 1. Such a polygon defines a Minkowski norm equivalent to the dual norm of U. Now assume that the unit ball U is a centered polygon with vertices {Ui,..., U2n}, Ui+n = -Ui, 1 < i < n. Define the polygon V with vertices Ui+i - Ui V i 1 = -. i+ 2 [Ui, Ui+i] 112 Ars Math. Contemp. 11 (2016) 101-106 Observe that Vi+n+1 = - Vi+1, i.e., V is centered. Now [Vi+1 - Vi-1, Uj] = 0, which implies that Vi+1 - Vi-1 = -aUi. Multiplying both sides by Vi+1 we obtain for 1 < i < 2n. Vi+1 - Vi_ U = __ i+ 2 i Vi-1 ,Vi+1 ] 2 Figure 4: The centered hexagon U and its dual V. Lemma 2.3. The polygon V is the dual unit ball. Proof. We have that, for 1 < i < 2n, [tUi + (1 - t)Ui+1 ,Vi+1 ] = 1, (2.2) for any t G R and for j G {i, i + 1}, [Uj, Vi+1 ] < 1. This implies that the vertex Vi+1 is from the dual unit circle. Moreover, 2 2 [Ui,tVi_ 1 +(1 - t)Vi+1 ] = 1, (2.3) and for j = i we have [Uj ,tVi-1 + (1 - t)Vi+1 ] < 1, which implies that also the side tVi-1 + (1 -1) Vi+1 is from the dual unit circle. □ 2.3 Polygons of constant Minkowskian width Consider a Minkowski plane (R2, U), and let P be a convex curve. For f in the dual unit ball, the support function h(P )(f) of P at f is defined as h(P)(f)=sup{f (p),p G P}. (2.4) M. Craizer and H. Martini: Involutes of polygons of constant width in Minkowski planes 113 The width of P in the direction f is defined as w(P)(/) = h(P)(/) + h(P)(-/). We say that P is of constant Minkowskian width if w(P)(/) does not depend on f. Consider now a Minkowski plane whose unit ball U is a centered polygon, and let P be a polygon with parallel corresponding sides and diagonals. Lemma 2.4. In the Minkowski plane (R2, U), P has constant U-width. Proof. By Lemma 2.1, we have that Pi - Pi+n = a(Ui - Ui+n), for some constant a. Since w(P )(Vi+1 ) = h(P )(Vi+1 ) + h(P)(-V+1) = [Pi - Pi+n,Vi+ 2 ], we obtain w(P )(Vi+ 2 ) = 2a, 1 < i < 2n, thus proving the lemma. □ Our next corollary says that in fact U is homothetic to the Minkowski sum P + (-P) (see [21], Th. 4.2.3). Corollary 2.5. Let P be a convex planar polygon and let U be as in Lemma 2.1. Then U is homothetic to P + (-P). Proof. We have that 2a = h(P) + h(-P) = h(P + (-P)) = h(2aU), which implies that P + (-P) is homothetic to U. □ Corollary 2.6. Consider a centered polygon U and a polygon P whose sides are parallel to the corresponding sides of U. The following statements are equivalent: 1. P has constant U-width. 2. P + (-P) is homothetic to U. 3. The corresponding diagonals of U and P are parallel to each other. 4. Pi - Pi+n = 2a(Ui - Ui+n), 1 < i < n,for some constant a. 3 Geometric properties of polygons of constant Minkowskian width Consider a convex polygon P = {P1,..., P2n} with parallel opposite sides and let U = {Ui,..., U2n} be the symmetric polygon obtained from P by the construction of Lemma 2.1. 3.1 Central Equidistant, V-length, and Barbier's theorem Central equidistant Any equidistant can be written as Pi(c) = Pi + cUi, 1 < i < 2n. If we take c = -a, we obtain c1 Mi = Pi + — (Pi - Pi+n) = 1 (Pi + Pi+n), 1 < i < 2n, (3.1) 2a 2 called the central equidistant of P. It is characterized by the condition Mi = Mi+n (see Figure 5). If we re-scale the one-parameter family of equidistants as Pi(c) = Mi + cUi, 1 < i < 2n, (3.2) 114 Ars Math. Contemp. 11 (2016) 101-106 we get that the 0-equidistant is exactly the central equidistant. A vertex Mi of the central equidistant is called a cusp if Mj_i and Mi+1 are in the same half-plane defined by the diagonal at Pi. The central equidistant coincides with the area evolute of polygons defined in [5]. There it is proved that it has an odd number of cusps, at least three (see Figures 5 and 7). Figure 5: The two traced octagons are ordinary equidistants. The thick quadrangle is the central equidistant. V-Length Let P be a polygonal arc whose sides are parallel to the corresponding ones of U. More precisely, we shall denote by {Ps,..., Pt} the vertices of P and assume that Pi+1 - Pi is parallel to Vi+1. We can write Pi+i - Pi = Ai+1 Vi+1 (3.3) for some Ai+1 > 0. Then the V-length of the edge PiPi+1 is exactly Ai+1, and we write t_i Lv (P ) = E Ai+1. (3.4) i=s Barbier's theorem The classical Theorem of Barbier on curves of constant width in the Euclidean plane says that any such curve of diameter d has circumference dn. For Minkowski planes, it appears in [16], Th. 6.14(a), and in [12]. We prove here the version of this theorem for polygons. Define ai+1, 1 < i < 2n, by the equation Mi+i - Mi = «i+1 (Ui+i - Ui) = «i+1 [Ui, Ui+i]Vi+1. (3.5) Proposition 3.1. Let P(c) be defined by equation (3.2). Then the V-length of P(c) is Lv (P) = 2cA(U), (3.6) where A(U) denotes the area of the polygon U. M. Craizer and H. Martini: Involutes of polygons of constant width in Minkowski planes 115 Proof. The V-length of the polygon P (c) is given by 2n Lv (P (c))= 2 + c)[Ui,Ui+ij. i=i Since ai+n+1 = — 1, we obtain 2n Lv (P (c)) = c ^[Ui.Ui+i], i=i which proves the proposition. □ If we admit signed lengths, equation (3.6) holds even for equidistants with cusps. In particular, for c = 0 we obtain Lv (M )=0. (3.7) For smooth closed curves this result was obtained in [19] . 3.2 Curvature and evolutes Minkowskian normals and evolutes In the smooth case, the Minkowskian normal at a point P is the line P + sU, where P and U have parallel tangents (see [19]). The evolute is the envelope of Minkowskian normals. For a polygon P, define the Minkowskian normal at a vertex Pj as the line Pj + sUj, 1 < i < 2n, and the evolute as the polygonal arc whose vertices are the intersections of Pj + sU and Pj+1 + sUj+1. These intersections are given by 1 = Pi — "j+ 1 Ui = Pi+i — "j+1 Ui+i, (3.8) where "¿+1, 1 < i < 2n, is defined by Pi+i — Pj = 2 (Uj+i — Uj). (3.9) Curvature center and radius In [16], three different notions of Minkowskian curvature are defined, where the circular curvature is directly related to evolutes. The circular center E and the corresponding radius of curvature ^ are defined by the condition that E + ^U has a 3-order contact with the curve at a given point (see [19]). For polygons, we define the center of curvature Ej+1 and the curvature radius 1 of the side PjPj+i by the condition that the (i + i)-side of Ej+1 + 1 U matches exactly PjPj+i (see Figure 6). Thus we get equations (3.8) and (3.9). From equations (3.3) and (3.9) we obtain that the curvature radius of the side PjPj+i is also given by 1 "•+1 = m. <3-10) A vertex Ej+1 is a cusp of the evolute if the vertices Ej-1 and Ej+ 3 are in the same half-plane defined by the parallel to PjPj+i through Ej+1. Tlie evolute of a CW polygon coincides with its center symmetry set as defined in [5], where it is proved that it coincides with the union of cusps of all equidistants of P. It is also proved in [5] that the number of cusps of the evolute is odd and at least the number of cusps of the central equidistant (see Figure 7). 116 Ars Math. Contemp. 11 (2016) 101-106 Figure 6: The center of curvature of the side P3P4. 'p. Figure 7: The inner polygonal arc is the central equidistant M of P, and the outer polygonal arc is its evolute E. Sum of curvature radii Consider equation (3.9) for two opposite sides, and sum up to obtain, for 1 < i < n, Pi+1 - Pi+n+1 + Pi+n - Pi = (Mi+ i + Mi+n+1 )(Ui+1 - Ui). Since P has constant Minkowskian width, We conclude that 2c(Ui+i - Ui) = l + n+ 1 )(Ui+1 - Ui). Mi+ i + Mi+n+1 = 2c. (3.11) The corresponding result for smooth curves is given in [16], Th. 6.14.(c). Involutes and equidistants Consider the one-parameter family of equidistants given by equation (3.2). The radius of curvature of Pi(c)Pi+1(c) is the radius of curvature of M. Craizer and H. Martini: Involutes of polygons of constant width in Minkowski planes 117 MiMi+i plus c. Thus, for 1 < i < 2n, Ei+1 (c) = Mi + cUi - (Mi+ 2 + c) U = Ei+1. (3.12) We conclude that the evolute of any equidistant of P is equal to the evolute of P. Reciprocally, any polygonal arc whose evolute is equal to E(P) is an equidistant of P. We define an involute of E as any polygonal arc whose evolute is E. Thus the involutes of E are the equidistants of P. 3.3 The signed area of the central equidistant For a simple closed curve P, denote by A(P) the area of the region bounded by P. Given two closed curves P and Q, their mixed area is defined by the equation A(P + tQ) = A(P) + 2tA(P, Q) + t2A(Q), (see [17, §§ 5.1]). The Minkowski inequality says that A(P, Q)2 > A(P)A(Q). The next lemma is well-known, see [10, §§ 6.3]. Lemma 3.2. Take P and Q as convex polygons with k parallel corresponding sides. The mixed area of P and Q is given by a(p, Q) = 2 E[Qi, Pi+i - Pi] = 2 E[Pi+i, Qi+i - Qi]. i=i i=i Assume that P is a closed convex polygon whose sides are parallel to the sides of the centered polygon U, and take Q = U in Lemma 3.2. We obtain 2n 2n A(P, U) = 1 E[Ui, Pi+i - Pi] = 1 E Ai+1 = 1 Lv(P), i=i i=i where we have used (3.3) and (3.4). Moreover, the Minkowski inequality becomes LV(P) > 4A(U)A(P). (3.13) Lemma 3.3. Let M be the central equidistant of a CW-polygon P. Then the mixed area A(M, M) is non-positive. Proof. Let P(c) be defined by equation (3.2). Then A(P(c), P(c)) = A(M, M) + 2cA(M, U) + c2A(U, U). Now equation (3.7) says that A(M, U) = 0. Moreover, the isoperimetric inequality (3.13) for curves of constant width says that A(P) < c2A(U). We conclude that A(M,M) < 0. □ Define the signed area of M as SA(M) = -A(M, M). In general, the signed area is a sum of positive and negative areas, but when M is a simple curve, it coincides with the area bounded by M. 118 Ars Math. Contemp. 11 (2016) 101-106 3.4 Relation between length and area of a half polygon Define ftj by 1 n+i-1 A = 2 E j1 [Uj,Uj+i]. (3.14) 2 Observe that = —1 < i < n, and fti+i — A = —ai+1 [Ui,Ui+i]. (3.15) Denote by A1(i, c) and A2(i, c) the areas of the polygons with vertices {Pj, Pi+1,..., Pj+n} and {Pj+n, Pj+n+1,..., Pj}. Observe that these polygons are bounded by P and the diagonal PjPj+n. Proposition 3.4. We have that Ai(i,c) — A2(i,c) = 4cAj, for 1 < i < 2n. Proof. Lemma 4.1. of [5] says that j+n-1 Ai(i, c) — A (i, c) = —2 £ [Mj+1 — Mj, cUj] j = j j+n-1 = —2c £ j 2 [Uj,Uj+1]Vj+ 2 ,Uj]. 2 1 j = i Thus i+n-1 Ai(i,c) - c) = 2c ^ ji [Uj, Uj+i] = 4cß. 2 j=i □ Denote by LV (i, c) the V-length of the polygonal arc whose vertices are {Pi(c), Pi+1(c),..., Pi+n(c)}. Then i+n-1 Lv(i, c) = ^ («i+1 + c)[Uj, Uj+i] = 2cA(U) + 2ßi. (3.16) j=i Corollary 3.5. For 1 < i < 2n, the expression A1(i, c) — cLV(i, c) is independent of i. Proof. By equation (3.16) and Proposition 3.4, we get 2cLV(i, c) — 2A1(i, c) = 4c2A(U) + 4cßi — 2A1(i, c) = 4c2A(U) — A(P), which proves the corollary. □ The above corollary presents the "polygonal analogue" of a known theorem holding for strictly convex curves (see [4], eq. (2.1)). M. Craizer and H. Martini: Involutes of polygons of constant width in Minkowski planes 119 4 The involute of the central equidistant Recall that P = [Pi,..., P2n} is a convex polygon with parallel opposite sides and U = [Ui,..., U2n} is the Minkowski ball obtained from P by the construction of Lemma 2.1. The polygon V = [Vi,..., V2n} represents the dual Minkowski ball (see Lemma 2.3) and M = [Mi,..., Mn} is the central equidistant of P (see equation (3.1)). 4.1 Basic properties of the involute N of M Define the polygon N by Ni+1 = Mi + AVi+1, (4.1) 1 < i < 2n. Observe that Ni+1 = Ni+n+1. Due to equations (3.5) and (3.15), we can also write 2 2 Ni+1 = Mi+i + A+iVi+ 2. (4.2) Lemma 4.1. The polygon N has constant V-width, and the evolute of N is M. Proof. Since Ni+2 - Ni-1 = ß (Vi+1 - i) (4.3) 1 < i < n, the sides of N are parallel to the sides of V. Moreover, the diagonals of N are zero, so they are multiples of the diagonals of V. We conclude from Corollary 2.6 that N has constant V-width. Finally, from equation (4.1) we conclude that the evolute of N is M. □ The equidistants of N, which are the involutes of M, are curves of constant V-width (see Figure 8). In [5], these polygons were called the Parallel Diagonal Transforms of P. Figure 8: The central equidistant M together with two involutes of M: The inner curve is the central equidistant N, and the traced curve is an ordinary involute. 120 Ars Math. Contemp. 11 (2016) 101-106 4.2 The signed area of the involute of the central equidistant For smooth convex curves of constant Minkowskian width, the signed area of N is not larger than the signed area of M (see [6]). We prove here the corresponding result for polygons. Proposition 4.2. Denoting by SA(M) and SA(N) the signed areas of M and N, we have SA(M) - SA(N) = E A2 i=i i 2 7 2 Proof. Observe that [Mi,Mi+i]= Ni+1 - AiVi+1 ,«i+1 (Ui+i - Ui) = ai+1 [Ni+1 ,Ui+i - Ui] -(Ai+i - Ai)[Ni+1 ,V+1 ], and so Thus = Ai Ni+ 2 7 Vi+ 2 Vi 2 - [Mi,Mi+i]+ Ni_i,Ni+1 =[Ni+1 ,Ai+iVi+1 - AiVi_i]. SA(M) - SA(N) = E - [Mi, Mi+i] + i=i Ni-1 ,Ni+1 - E K1 - Ni-2 ^ v-21 = E A i=i where we have used that the difference i=i 1 ,Vi+2 22 [Ni+1 ,Ai+iVi+1 ] - [Ni_ 1, AiVi_ 1 ] is equal to [Ni+1 - Ni_ 1, AiVi_ 1 ] + [Ni+1 ,Ai+iVi+1 - AiVi_ 1 ] the discrete version of "integration by parts". □ 4.3 The involute is contained in the interior of the central equidistant We prove now that the region bounded by the central equidistant M contains its involute N. For smooth convex curves, this result was proved in [6]. The exterior of the curve M is defined as the set of points of the plane that can be reached from a point of P by a path that does not cross M. The region M bounded by M is the complement of its exterior. It is well known that a point in the exterior of M is the center of exactly one chord of P (see [5]). Proposition 4.3. The involute N is contained in the region M bounded by M. The proof is based on two lemmas. For a fixed index i, denote by l(i) the line parallel to Pj+n - Pj through 1 and Ni+1. Then l(i) divides the interior of P into two regions of areas B = Bi(i) and B2 = B2(i), where the second one contains Pj and Pj+n. 2 M. Craizer and H. Martini: Involutes of polygons of constant width in Minkowski planes 121 Lemma 4.4. We have that Bi(i) > B2(i), 1 < i < n. Proof. We have that Bi(i) = Ai(i) - (2c& - Si - ni), B2(i) = A2(i) + (2c& - Si - ni), where Si is the area of the regions outside P and between l(i), PiPi+n and the support lines of PiPi+1 and Pi+n_1Pi+n, and ni is the area of the triangle MiNi+1 Ni-1 (see Figure 9). Since, by Proposition 3.4, 4cfti = A1 - A2, we conclude that Bi(i) = + Si + ni, B2(i) = Ap - Si - ni, which proves the lemma. □ Lemma 4.5. Choose C in the segment Ni-1 Ni+1. Then C is in the region bounded by M. 2 2 Proof. By an affine transformation of the plane, we may assume that l(i) and MiC are orthogonal. Consider polar coordinates (r, with center C and describe P by r(^). Assume that ^ = 0 at the line l(i) and that ^ = at Pi. Denote the area of the sector bounded by P and the rays , by i r 02 ¿J 0i ^ 0! Consider a line parallel to MjC and passing through the point Qo of P corresponding to ^ = 0, and denote by Q1 and Q2 its intersection with the rays ^ = —and ^ = respectively (see Figure 10). By convexity, we have that A(0, ^o) < A(CQoQi) = A(CQoQ2) < A(—¿o, 0). A similar reasoning shows that A(n — ^o,n) < A(n,n + ^o). Observe also that, by convexity, r(^o) < r(^o + n) and r(n — ^>o) < r(—^o). 122 Ars Math. Contemp. 11 (2016) 101-106 Now, if + n) > r(^) for any < ^ < n - ^>0, we would have Bi(C) < B2(C), contradicting the previous lemma. We conclude that + n) = r(^) for at least two values of < ^ < n - Since equality holds also for some n - < ^ < n + there are at least three chords of y having C as midpoint. Thus C is contained in the region bounded by M. □ Figure 10: The line parallel to MiC through Q0 determines the points Q1 and Q2. We can now complete the proof of Proposition 4.3. In fact, from Lemma 4.5 we have that each side N^ 1 Ni+1 is contained in the region M bounded by M. Therefore, no point on the boundary of N can be connected with the boundary of P by a curve that does not intersect M. This implies that the region N bounded by N is contained in M. 5 Iterating involutes Starting with the central equidistant M = M(0) and its involute N = N(1), we can iterate the involute operation. We obtain two sequences of n-gons M(k) and N(k) defined by M(k) = Inv(N(k)) and N(k + 1) = Inv(M(k)). For smooth curves of constant Minkowskian width, it is proved in [6] that these sequences converge to a constant. We prove here the corresponding result for polygons. From Proposition 4.3, we have M(0) D N(1) D M(1) D ..., and we denote by O = O(P) the intersection of all these sets. If we represent a polygon by its vertices, we can embed the space Pn of all n-gons in \ In Pn we consider the topology induced by R2n. Theorem 5.1. The set O = O(P ) consists of a unique point, and the polygons M (k) and N(k) are converging to O in Pn. We shall call O = O(P) the central point of P. A natural question that arises is the following. Question Is there a direct method to obtain the central point O from the polygon P? M. Craizer and H. Martini: Involutes of polygons of constant width in Minkowski planes 123 For fixed c and d construct the sequences of convex polygons P(k, c) and Q(k, d) whose vertices are Pi(k) = Mi(k) + cUi(k), Qi+ 2 (k) = Ni+1 (k) + dVi+1 (k), respectively. The polygons P(k, c) are of constant U-width, while the polygons Qi+1 (k, d) are of constant V-width. We can re-state Theorem 5.1 as follows: Theorem 5.2. The sequences of polygons P (k, c) and Q(k, d) are converging in P2n to O + cdU and O + ddV, respectively. Figure 11: The inner curves are M = M(0), N = N(1) and M(1). One traced curve is an ordinary V-equidistant of N, and the other one is an ordinary U-equidistant of M(1). We shall prove now Theorem 5.1. Proof. Denote the signed areas of M(k) and N(k) by SA(M(k)) and SA(N(k)), respectively. By Section 3.3, SA(M(k)) > 0, SA(N(k)) > 0, and Proposition 4.2 implies that SA(M(k)) - SA(N(k + 1)) = ^ß2(k)[Ui, Ui+i] i SA(N(k)) - SA(M(k)) = £ «2+1(k)[Vi-1, Vi+1], where «j+1 (k) and ßi(k) are defined by 2 i+1 i Mi+i(k) - Mi(k) = «i+1 (k)(Ui+i - Ui), Ni+ i (k) - Ni_i(k) = ßi(k)(Vi+ 2 - Vi-2). 124 Ars Math. Contemp. 11 (2016) 101-106 We conclude that w n w n ^^ft{k)[Ui,Ui+i]+ ^^«2+1 (k)[Vi-1 ,Vi+ 2] < SA(M(0)). (5.1) k=1i=1 k=0i=1 From the above equation, we obtain that the sequences ai+1 (k) and ^i(k) are converging to 0 in Rn. So the diameters of M(k) and N(k) are converging to zero, and thus O is in fact a set consisting of a unique point. □ References [1] R. Ait-Haddou, L. Biard and M.A. Slawinski, Minkowski isoperimetric-hodograph curves, Computer Aided Geometric Design 17 (2000), 835-861. [2] T.M. Apostol and M.A. Mnatsakanian, Tanvolutes: generalized involutes, Amer. Math. Monthly 117 (2010), 701-713. [3] G.D. Chakerian, Sets of constant width, Pacific J. Math. 19(1) (1966), 13-21. [4] G.D. Chakerian and H. Groemer, Convex bodies of constant width, in: P.M. Gruber and J.M. Wills (eds.), Convexity and its Applications, Birkhauser, Basel, 1983, 49-96. [5] M. Craizer, R.C. Teixeira and M.A.H.B da Silva, Polygons with parallel opposite sides, Discrete and Computational Geometry 50(2) (2013), 474-490. [6] M. Craizer, Iteration of involutes of constant width curves in the Minkowski plane, Beitr. Algebra Geom. 55 (2014), 479-496. [7] P.J. Giblin, Affinely invariant symmetry sets, Geometry and Topology of Caustics (Caustics 06), Banach Center Publications 82 (2008), 71-84. [8] A. Gray, Modern Differential Geometry of Curves and Surfaces, Studies in Advanced Mathematics, CRC Press, Boca Raton, 1993. [9] A. Gray, E. Abbena and S. Salamon, Modern Differential Geometry of Curves and Surfaces with Mathematica, Studies in Advanced Mathematics, Chapman & Hall/CRC, Boca Raton, 2006. [10] P.M. Gruber, Convex and Discrete Geometry, Springer, Berlin and Heidelberg, 2007. [11] E. Heil and H. Martini, Special convex bodies, in: P.M. Gruber, J.M. Wills (eds.), Handbook for Convex Geometry, North-Holland, Amsterdam, 1993, 347-385. [12] H. Martini and Z. Mustafaev, On Reuleaux triangles in Minkowski planes, Beitr. Algebra Geom. 48 (2007), 225-235. [13] H. Martini and K.J. Swanepoel, The geometry of Minkowski spaces - a survey. Part II, Expo-sitiones Math. 22 (2004), 93-144. [14] H. Martini, K.J. Swanepoel and G. Weiss, The geometry of Minkowski spaces - a survey. Part I, Expositiones Math. 19 (2001), 97-142. [15] H. Martini and Senlin Wu, Classical curve theory in normed planes, Computer Aided Geometric Design 31 (2014), 373-397. [16] C.M. Petty, On the geometry of the Minkowski plane, Riv. Mat. Univ. Parma 6 (1955), 269292. [17] R. Schneider, Convex Bodies:The Brunn-Minkowski Theory, Encyclopedia of Mathematics and its Applications, 44, Cambridge University Press, (1993). [18] P.A. Solov'ev: Maximum length of the closed involute of a class of curves (Russian), Ukrain. Geom. Sb. 3 (1966), 112-122. M. Craizer and H. Martini: Involutes of polygons of constant width in Minkowski planes 125 [19] S. Tabachnikov: Parameterized plane curves, Minkowski caustics, Minkowski vertices and conservative line fields, L'Enseign. Math. 43 (1997), 3-26. [20] S. Tanno: C-approximation of continuous ovals of constant width, J. Math. Soc. Japan 28 (1976), 384-395. [21] A.C. Thompson: Minkowski Geometry, Encyclopedia of Mathematics and its Applications, 63, Cambridge University Press, 1996. [22] D. Yost: Irreducible convex sets, Mathematika 38 (1991), 134-155. ARS MATHEMATICA CONTEMPORANEA Also available at http://amc-journal.eu ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 11 (2016) 127-146 Two-arc-transitive two-valent digraphs of certain orders Katja Berčič IAM, University of Primorska, Muzejski trg 2, SI-6000 Koper, Slovenia Primož Potočnik * Faculty ofMathematics and Physics, University ofLjubljana, Jadranska 19, SI-1000 Ljubljana, Slovenia, IAM, University of Primorska, Muzejski trg 2, SI-6000 Koper, Slovenia IMFM, Jadranska 19, SI-1000 Ljubljana, Slovenia Received 17 October 2014, accepted 15 December 2014, published online 1 October 2015 The topic of this paper is digraphs of in-valence and out-valence 2 that admit a 2-arc-transitive group of automorphisms. We classify such digraphs that satisfy certain additional conditions on their order. In particular, a classification of those with order kp or kp2 where k < 14 and p is a prime can be deduced from the results of this paper. Keywords: Graph, digraph, arc-transitive, order. Math. Subj. Class.: 05E18, 20B25 1 Introduction This paper is about finite connected arc-transitive digraphs of in- and out-valence 2 the order of which has a specific prime factorisation. We refer the reader to Section 2.1 for exact definitions of notions such as digraph, arc-transitive, valence etc. To simplify exposition, we tacitly assume throughout the paper (even where not stated explicitly) that all digraphs are finite and connected. Studying arc-transitive graphs and digraphs of orders with a specific prime factorisation has a long history and has become increasingly popular in the last decade or two. For example, arc-transitive graphs and digraphs of order p or 2p, where p is a prime, were classified in [3] and [4], respectively; later, using the classification of finite simple groups, all arc-transitive graphs and digraphs of order a product of two distinct primes were characterised * Supported in part by Slovenian Research Agency, projects L1-4292, J1-5433, J1-6720, and P1-0294. E-mail addresses: katja.bercic@upr.si (Katja Bercic), primoz.potocnik@fmf.uni-lj.si (Primož Potočnik) Abstract charchar This work is licensed under http://creativecommons.Org/licenses/by/3.0/ 128 Ars Math. Contemp. 11 (2016) 101-106 in [36], and independently in [26], and those that are 2-arc-transitive were determined in [23]. Once the prime factorisation of the order becomes more complex, results of this type become considerably more complicated (see [38] for an illustration of the difficulties that can arise when the order is a product of three distinct primes). However, when one fixes the valence (and perhaps imposes some further restrictions), further analysis becomes possible (see for example [5, 8, 10]). Since every connected digraph of valence 1 is isomorphic to a directed cycle, valence 2 is the smallest interesting valence in the context of arc-transitive digraphs. In the literature, arc-transitive 2-valent digraphs often arise in disguise as undirected 4-valent graphs admitting a group of automorphisms acting transitively on the edges, vertices, but not on the arcs of the graph; such group actions are usually called 2-arc-transitive. Namely, if r is a G-arc-transitive 2-valent digraph, then its underlying (undirected) graph r' admits a 2 -arc-transitive action of the group G; and conversely, if the automorphism group of an undirected 4-valent graph r' contains a subgroup G acting 2-arc-transitively on r', then there exists an orientation of the edges of r' that gives rise to a G-arc-transitive 2-valent digraph whose underlying graph is r' (in fact, there are precisely two such orientations giving rise to a pair of opposite digraphs). In this sense, the study of G-arc-transitive 2-valent digraphs is equivalent to the study of (G, 1)-arc-transitive graphs of valence 4. There is a substantial literature about the latter class of graphs (see for example [6, 18, 19, 20, 21, 25, 39, 40]). If r is an arc-transitive 2-valent digraph, then, for some positive integer s, the automorphism group Aut(r) acts regularly on the set of all s-arcs of the digraph. If s = 1, then the automorphism group acts regularly on the arc-set, and if the order of the digraph has a simple prime factorisation, one is usually able to classify all possible automorphism groups and use this information to determine all digraphs upon which such groups can act. An instructive example of how this can be done (in the case of undirected 4-valent graphs) can be found in [10]. Here, we will avoid this case and restrict ourselves to the case s > 2; that is, we will assume that our digraphs are all 2-arc-transitive. The two main results of the paper are Theorems 1.1 and 1.2, stated below and proved in Section 3. The digraphs P)X(M) appearing in the statements are defined in Section 2.5. Theorem 1.1. Let p and q be distinct odd primes, and let a, b, c be integers satisfying a e {0,1,2,3}, b, c € {0,1,2}, and (b,c) = (2,2). If r is a connected (G, 2)-arc-transitive 2-valent digraph of order 2aqbpc and G is non-solvable, then the order of r is at most 1224 and r is isomorphic to one of the sixty-seven digraphs in Table 1. Remark. Exact descriptions of the sixty-seven exceptional digraphs of Theorem 1.1 are available in [29] (for the digraphs of order up to 1000) and [1] (for digraphs of larger order). The digraphs are given there in a form readable by Magma [2]. Theorem 1.2. Let r be a connected (G, 2)-arc-transitive 2-valent digraph and suppose that G is solvable. Let n be the order of r, and suppose that one of the following holds: (i) n is odd and cube-free; (ii) n = 2am, where a € {1, 2, 3} and m is an odd, square-free integer; (iii) n = 2aqbp2, where a € {1, 2,3}, b e {0,1} and p, q are distinct odd primes. Then one of the following conclusions holds: K. Berčič and P. Potočnik: Two-arc-transitive two-valent digraphs of certain orders 129 Order | Name | | Autv | | |S| | soc(Aut) 2 - 3 - 5 ATD[30;6] 4 1 Alt(5) 2 - 3 - 7 ATD[42;3] 8 1 PSL(2, 7) 22 - 3 - 5 ATD[60;16] 4 1 Alt(5) X C2 22 - 3 - 7 ATD[84;20] 8 1 PSL(2, 7) X C2 22 - 3 - 7 ATD[84;23] 4 1 PSL(2, 7) 22 - 3 - 7 ATD[84;24] 4 1 PSL(2, 7) 2 - 32 - 5 ATD[90;12] 4 1 Alt(5) X C 3 2 - 32 - 5 ATD[90;13] 16 Alt(6) 23 - 3 - 5 ATD[120;11] 4 1 Alt(5) X C2 23 - 3 - 5 ATD[120;54] 4 1 Alt(5) X C2 23 - 3 - 5 ATD[120;56] 4 1 Alt(5) X C2 2 - 32 - 7 ATD[126;15] 8 1 PSL(2, 7) X C3 2 - 3 - 52 ATD[150;16] 4 1 Alt(5) X C 5 23 - 3 - 7 ATD[168;53] 8 1 PSL(2, 7) X C2 23 - 3 - 7 ATD[168;64] 4 1 PSL(2, 7) X C2 23 - 3 - 7 ATD[168;65] 4 1 PSL(2, 7) X C2 23 - 3 - 7 ATD[168;81] 4 1 PSL(2, 7) X C2 23 - 3 - 7 ATD[168;82] 4 1 PSL(2, 7) X C2 22 - 32 - 5 ATD[180;42] 4 1 Alt(6) 22 - 32 - 5 ATD[180;45] 4 1 Alt(5) X C2 X C3 22 ATD[180;57] 8 3 Alt(6) 22 ATD[180;58] 16 3 Alt(6) X C2 22 - 32 - 7 ATD[252;59] 8 1 PSL(2, 7) X C2 X C3 22 - 32 - 7 ATD[252;69] 4 1 PSL(2, 7) X C3 22 - 32 - 7 ATD[252;70] 4 1 PSL(2, 7) X C3 2 - 3 - 72 ATD[294;19] 8 1 PSL(2, 7) X C7 22 - 3 - 52 ATD[300;66] 4 1 Alt(5) X C2 X C5 2 - 32 - 17 ATD[306;11] 8 1 PSL(2, 17) 23 - 32 - 5 ATD[360;146] 4 1 Alt(6) X C2 23 - 32 - 5 ATD[360;148] 4 1 Alt(6) 23 - 32 - 5 ATD[360;150] 8 3 Alt(6) X C2 23 - 32 - 5 ATD[360;153] 8 3 Alt(6) X C2 23 - 32 - 5 ATD[360;154] 4 1 Alt(6) 23 - 32 - 5 ATD[360;158] 4 1 Alt(5) X C2 23 - 32 - 5 ATD[360;163] 4 1 Alt(5) X C2 X C3 23 - 32 - 5 ATD[360;172] 4 1 Alt(5) X C2 X C3 23 - 32 - 5 ATD[360;174] 4 1 Alt(5) X C2 X C3 23 - 32 - 5 ATD[360;201] 8 3 Alt(6) X C2 23 - 32 - 5 ATD[360;202] 16 3 Alt(6) X C2 23 - 32 - 7 ATD[504;162] 8 1 PSL(2, 7) X C2 X C3 23 - 32 - 7 ATD[504;180] 4 1 PSL(2, 7) X C2 X C3 23 - 32 - 7 ATD[504;182] 4 1 PSL(2, 7) X C2 X C3 23 - 32 - 7 ATD[504;232] 4 1 PSL(2, 7) X C2 X C3 23 - 32 - 7 ATD[504;233] 4 1 PSL(2, 7) X C2 X C3 22 - 3 - 72 ATD[588;87] 8 1 PSL(2, 7) X C2 X C7 22 - 3 - 72 ATD[588;90] 4 1 PSL(2, 7) X C7 22 - 3 - 72 ATD[588;91] 4 1 PSL(2, 7) X C7 23 - 3 - 52 ATD[600;199] 4 1 Alt(5) X C2 X C5 23 - 3 - 52 ATD[600;201] 4 1 Alt(5) X C2 X C5 23 - 3 - 52 ATD[600;204] 4 1 Alt(5) X C2 X C5 22 - 32 - 17 ATD[612;48] 4 1 PSL(2, 17) 22 - 32 - 17 ATD[612;49] 8 1 PSL(2, 17) 23 - 3 - 72 X1 4 1 PSL(2, 7) X C2 X C7 23 - 3 - 72 X2 4 1 PSL(2, 7) X C2 X C7 23 - 3 - 72 X3 4 1 PSL(2, 7) X C2 X C7 23 - 3 - 72 X4 4 1 PSL(2, 7) X C2 X C7 23 - 3 - 72 X5 8 1 PSL(2, 7) X C2 X C7 23 - 32 - 17 X6 4 1 PSL(2, 17) X C2 23 - 32 - 17 X7 8 1 PSL(2, 17) X C2 23 - 32 - 17 X8 4 1 PSL(2, 17) X C2 23 - 32 - 17 X9 4 1 PSL(2, 17) X C2 22 - 32 - 17 X10 4 1 PSL(2, 17) 22 - 32 - 17 X11 4 1 PSL(2, 17) 22 - 32 - 17 X12 4 1 PSL(2, 17) 22 - 32 - 17 X13 4 1 PSL(2, 17) 22 - 32 - 17 X14 4 1 PSL(2, 17) 22 - 32 - 17 X15 4 1 PSL(2, 17) Table 1: Exceptional digraphs for Theorem 1.1. The column "Name" refers to the digraph names as given in [28] (up to order 1000) or [1] (for orders greater than 1000). The number of non-solvable 2-arc-transitive subgroups of Aut(r) (up to conjugacy) is given in the column called |S |. 130 Ars Math. Contemp. 11 (2016) 101-106 (a) r = pt( t, s) for some t > 1 and s > 0; (b) condition (iii) holds, G has a normal Sylow p-subgroup P, which is elementary abelian of order p2, and r/p = pX( t, s) for some t > 1 and s > 0. Remark. Let us spend a few words on the seemingly unfinished case (b) of Theorem 1.2. The digraphs appearing in this case arise from regular covering projections onto the digraphs PX(t, s) of order 2aqb where the groups of covering transformations are elementary abelian of order p2, along which a 2-arc-transitive group of automorphisms of pX(t, s) lifts. The theory of lifting groups along elementary abelian covering projections was developed in [14] and illustrated in several papers (see for example [15, 31]). If desired, one could use this theory to determine all the resulting covering digraphs for fixed (a, q, b). In particular, we could easily obtain a complete classification in the case of order kp or kp2 for every k < 14 and prime p. Recently, numerous papers have been written in which authors classified arc-transitive graphs and digraphs of fixed valence and orders with a simple prime factorisation (usually kp or kp2 for a fixed small k and variable prime p). Unlike in many of the above mentioned papers, we have tried to prove our results in as general a form as our approach allowed. Slight improvements are certainly possible (for example, using the classification of finite simple groups whose order is divisible by four primes only [13], one could extend Theorem 1.1 to orders divisible by a third odd prime). However, it seems that major improvements would require new ideas. Finally, we would like to thank Pablo Spiga for pointing out an oversight in a draft version of the paper, to Rok Pozar for independent computer-based confirmation of Theorem 1.1 in the range on up to 1500 vertices, and to the anonymous referees for their most helpful remarks and for prompt and careful reading of the paper. 2 Preliminaries 2.1 On graphs and digraphs Even though we are mainly interested in simple digraphs, it will be convenient in the proofs to allow digraphs to be non-simple. We therefore define a digraph r as a quadruple (V, A, head, tail) where V and A are finite non-empty sets and head and tail are functions mapping from A to V; we call the sets V and A the vertex-set and the arc-set of r and denote them by V(r) and A(r), respectively. We then think of an arc to point from its tail to its head. The cardinality of V(r) is called the order of r. Similarly, a graph r is determined by a vertex-set V(r), edge-set E(r) and a function end: E(r) ^ {X C V(r) : |X| € {1, 2}}, assigning a pair of endvertices to each edge of r. An edge e of a graph r is a loop provided that | end(e) | = 1, and two edges y and x are parallel if end(x) = end(y). A graph r without loops and parallel edges is simple and is uniquely determined by V(r) and the set {end(e) : e € E(r)}. If r is a digraph, then the underlying graph of r is the graph with vertex-set V(r), edge-set A(r) and the end-function defined by end(x) = {tail(x), head(x)}. A digraph is simple provided that its underlying graph is simple. A sequence (xi,..., xs) of arcs of a digraph r is called an s-arc of r provided that head(xj) = tail(xi+1) for every i € {1,..., s - 1}. The set of all s-arcs of r is denoted by As(r). K. Berčič and P. Potočnik: Two-arc-transitive two-valent digraphs of certain orders 131 An automorphism of a digraph r is a permutation of V(T) U A(T) that preserves V(T) set-wise and commutes with the functions head and tail. If G is a subgroup of the automorphism group Aut(r), then r is said to be G-arc-transitive (or (G, s)-arc-transitive) provided that G acts transitively on A(r) (or As(r), respectively). When G = Aut(r), the symbol G can be omitted from this notation. If v is the tail and u the head of some arc x, then we say that u is an out-neighbour of v and v an in-neighbour of u. For a vertex v G V(r), we let r+(v) = {x G A(r) : tail(x) = v} and r- (v) = {x G A(r) : head(x) = v}, and call the sizes of these two sets the out-valence and the in-valence of v in r, respectively. (Note that when the digraph is not simple the out-valence does not necessarily equal the number of out-neighbours of v, and similarly for the in-valence). If for some integer k, the in-valence (out-valence) of every vertex equals k, then we say that the digraph has in-valence (out-valence, respectively) k. A digraph is called k-valent if it is of out-valence and in-valence k. Observe that every arc-transitive digraph without vertices of out-valence 0 (in particular, every connected arc-transitive digraph) is vertex-transitive. 2.2 Non-simple arc-transitive 2-valent digraphs In this section, we characterise arc-transitive 2-valent digraphs that are not simple. To formulate the characterisation (Lemma 2.1), we first need to introduce the digraphs 3 and tC?n for n > 1. Both digraphs arise from an undirected cycle with each edge doubled, and their vertex-sets and arc-sets can be taken to be Zn and Zn x Z2, respectively. In 3n ) the functions head and tail are defined with tail(i, e) = i and head(i, e) = i + 1 for every arc (i, e) G Zn x Z2. Similarly, in 3n, the functions head and tail are defined with tail(i, 0) = i, head(i, 0) = i +1, tail(i, 1) = i + 1, and head(i, 1) = i. Note that 312) and 3 1 are both isomorphic to a digraph with a single vertex and two directed loops attached to it, while 322) and tc?2 consist of two vertices and four arcs between them, two pointing in each of the two possible directions. The proof of the following lemma is straightforward and is left to the reader. Lemma 2.1. If r is a connected non-simple arc-transitive 2-valent digraph of order n, then r = 3n2) or r = 3n, and if in addition r is 2-arc-transitive, then r = 3n2) for some n > 2. The following result will be needed in the proof of Theorem 1.2. Lemma 2.2. Let G be a subgroup of Aut(3 n2) ) acting transitively on the s-arcs but not on the (s + 1)-arcs of3n2) and let v be a vertex of3n2). Then Gv is an elementary abelian 2-group of order 2s and is normal in G. If Gv has order 4 and contains a non-trivial central element of G, then n is even. Proof. Observe that every automorphism of 3n2) that fixes v fixes every vertex of 3n2), implying that Gv is the kernel of the action of G on the vertex-set of 3n , and is therefore normal in G. Furthermore, Gv preserves set-wise each pair of arcs with the same tail (and thus the same head). In particular, Gv is an elementary abelian 2-group. Since G is transitive on the s-arcs but not on the (s + 1)-arcs, it is an easy exercise to show that Gv acts regularly on the s-arcs starting at v, and since there are 2s of them, it follows that |Gv | = 2s. 132 Ars Math. Contemp. 11 (2016) 101-106 Suppose now that n is odd, that |Gv | = 4, and that t is a non-trivial central element of G contained in Gv. Without loss of generality, we may assume that t acts non-trivially on the pair of arcs pointing out of v. Furthermore, since the index of Gv in G is n, it follows that Gv is the unique Sylow 2-subgroup of G, and thus G = Gv x H, where H is a group of order n. Moreover, since Gv is the kernel of the action of G on the vertices of (ti2), it follows that H acts regularly on the vertices of (ti2); in particular, H = (g) where g is an automorphism of order n that maps every vertex to its unique out-neighbour. Since t = tg, the element t acts non-trivially on every pair of arcs sharing the same tail. In particular, t is the unique non-trivial central element of G contained in Gv. Since G = Gv H and since Gv is abelian, this shows that H centralises no element of Gv \ {1, t }. However, this is impossible since H has odd order and | Gv \{ 1, t}| = 2. This contradiction completes the proof of the lemma. □ 2.3 Alter-relations, alter-exponent, radius and perimeter In this section, we present a very useful tool for studying digraphs, based on the orientation of arcs in the walks of a digraph. The concepts presented in this section were first introduced in [24] (for a generalisation to infinite digraphs, see [16]). All the facts stated below were proved in [24] for simple digraphs and extend without any change to digraphs with loops and multiple arcs. A walk from a vertex v0 to a vertex vs of length s in a digraph r is a sequence (vo,xi, vi,..., vs_i, xs, vs) of arcs xj G A(r) and vertices v j G V(r) such that for any i G {1,..., s} the pair (tail(xj), head(xj)) equals either (vi_1, vj) or (vj, vi_1). In the former case, we say that xj is positively oriented, while in the latter case we say that xj is negatively oriented in the walk. A walk is directed if all of its arcs are positively oriented and is alternating if the orientation of the arcs in the walk alternates. A digraph r is (strongly) connected provided that for any two vertices u, v G r there exists a (directed) walk from u to v. A vertex-transitive digraph is strongly connected if and only if it is connected (see, for example, [27, Lemma 2]). A walk is closed provided that it begins and ends in the same vertex. Let W = (v0, x1, v1, x2,..., xn, vn) be a walk in a digraph r. The sum s(W) is the difference between the number of positively oriented arcs in W and the number of negatively oriented arcs in W. The k-th partial sum sk (W) is defined as the sum of the initial walk (v0, x1, v1,..., vk) of length k. The set {sk (W), 0 < k < n} is the tolerance of W and vertices u and v are alter-equivalent with tolerance J (written uAjv) if there exists a walk from u to v with sum 0 and tolerance contained in J. It transpires that A j is an equivalence relation (called an alter-relation) for every interval J containing 0 and that it is invariant under every automorphism of r. We will denote the equivalence class containing a vertex v with Aj(v) and use the shorthand Aj(v) to mean A[0 j](v) (when i > 0) or A[j 0](v) (when i < 0). Note that since r is a finite digraph, there exists a non-negative integer e such that Ae = Ae+1 and (by induction) Ae = ATO. The smallest such integer e is called the alter-exponent of r and denoted exp(r). It can be shown that exp(r) also equals the smallest non-negative integer i for which A_j = A_j_1 as well as the smallest i such that A[_j j] = A[_j_1j+1]. When we consider alter-relations in several different digraphs, we shall use the symbol AJ (instead of A j ) to denote the one in the digraph r. The number of equivalence classes of the alter-relation is called the perimeter of K. Berčič and P. Potočnik: Two-arc-transitive two-valent digraphs of certain orders 133 r and denoted perim(r). If the in-valence and the out-valence of each vertex is positive, then the equivalence classes Bj of can be indexed by Zp (where p = perim(r)) in such a way that every arc of r having its tail in Bj, has its head in Bi+1. We will be particularly interested in the sets A1(v) and A_1(v). Note that these sets consists of precisely those vertices that can be reached from v by alternating walks of even length starting with a positively (negatively, respectively) oriented arc. The intersection A1(v) n A_1(v) will be denoted Att(v) and called the attachment set (at vertex v). Suppose henceforth that r is a G-arc-transitive digraph. Then the sets Aj (v) (as well as Att(v)) are all blocks for the action of G on V(r) and their size depends only on J (but not on v). One can thus define the radius of r (denoted rad(r)) to be the cardinality of |A1(v)| for any v G r, and the attachment number of r (denoted att(r)) to be the cardinality of Att(v) for any v G V(r). Since Att(v) C A1(v) C A2(v) C ..., we see that att(r) divides rad(r), and that |Aj(v)| divides |Aj+1(v)| for every i > 1. Suppose now that r is a 2-valent arc-transitive digraph. Then the sub-digraph of r induced by a closed alternating walk of sum 0 that traverses every arc of r at most once is called an alternating cycle. The length of an alternating cycle is defined to be the length of the closed alternating walk that induces it. (Alternating cycles were introduced in [19] in the context of simple (G, 1 )-arc-transitive 4-valent graphs.) Note that an alternating cycle is uniquely determined by any of its arcs, implying that the set of alternating cycles induces a decomposition of the arc-set of r. Furthermore, this decomposition is preserved by every automorphism of r, implying that all alternating cycles in r have the same length. In addition to the assumption that r is a 2-valent arc-transitive digraph, assume for the rest of the section that r is not isomorphic to any tC?n with n odd. Then an alternating cycle is indeed a cycle (in the sense that the walk that generates it traverses every vertex of the digraph at most once), and r contains at least two alternating cycles. Furthermore, observe that A1 (v) consists of every second vertex of an alternating cycle starting with a positively oriented arc with its tail in v, and similarly, A_1(v) consist of every second vertex of an alternating cycle starting with a negatively oriented arc with its head in v. In particular, |A1(v)| = |A_1(v)| and the length of each alternating cycle is twice the radius of r. Note also that there are precisely two alternating cycles meeting in a given vertex v and the set of vertices that are contained in both of these alternating cycles is precisely Att(v). Two alternating cycles therefore meet in either 0 or att(r) vertices. Suppose now that att(r) > 3 and let g G Aut(r) fix an arc x of r. Then g fixes point-wise the alternating cycle C containing x. Since att(r) > 3, g fixes also at least three vertices of each alternating cycle intersecting C, and therefore fixes each of these cycles point-wise. But then by connectivity, g fixes each alternating cycles of r point-wise. In particular, g is trivial. This proves the following easy, but very useful result. Lemma 2.3. If r is a connected 2-valent 2-arc-transitive digraph, then att(r) < 2. We finish this section with another useful result. Lemma 2.4. If r is a connected 2-valent 2-arc-transitive digraph and exp(r) = 1, then r = rX( m, 1) for some integer m. Proof. If r is not simple, then by Lemma 2.1, r = cCn2) for some n > 2, implying that exp(r) = 0; a contradiction. Hence r is simple, and we can apply [30, Theorem 7.1] to 134 Ars Math. Contemp. 11 (2016) 101-106 conclude that rad(T) = 2. Since exp(T) = 1, it is then easy to see that att(T) = 2, and also that r m, 1) for some m (see, for example, [19, Proposition 3.1]). □ 2.4 Covers and quotients The second tool that we will use extensively is the concept of (di)graph coverings. This tool is usually defined in the setting of undirected graphs, but extends naturally to digraphs. In this section, we present a few basic facts and results and refer the reader to [14, 17] for more details. Let r and A be two digraphs. A morphism from r onto A is a function f : V(r) U A(A) ^ V(A) U A(A) mapping V(r) to V(A) and A(r) to A(A) such that f (tail(x)) = tail(f (x)) and f (head(x)) = head(f (x)) for every x G A(r). A morphism is an epimorphism or isomorphism if it is surjective or bijective, respectively. (Note that an automorphism of a digraph is precisely an isomorphism from the digraph onto itself.) An epimorphism p: r ^ A is a covering projection provided that for every v G V(r) the restrictions p+ : r+(v) ^ A+(p(v)) and p- : r-(v) ^ A-(p(v)) of p to the out-and in-neighbourhoods of v are bijective. For simplicity, we shall also require both r and A to be connected. The preimage p-1 (x) of a vertex or an arc x of A is called a fibre of the covering projection p and the group of all automorphisms of r that preserve each fibre set-wise is called the group of covering transformations. If the latter is transitive on each fibre, then the covering projection is regular. Normal quotients of simple graphs were introduced in [33, 34] and have now become a standard tool in studying symmetric graphs. Here we adapt this concept slightly to fit into the setting of digraphs admitting loops and multiple arcs. This adaptation will prove most useful in the proofs of our main results. Let r be a digraph and let N < Aut(r). Let AN = {xN : x G A(r)} and VN = {vN : v G V(r)} denote the sets of N-orbits on the arcs and vertices of r, respectively. Further, let tailN: AN ^ VN and headN: AN ^ VN be defined by tailN(xN) = tail(x)N and headN(xN) = head(x)N. This defines the quotient digraph r/N = (VN, An, headN, tailN), together with the obvious epimorphism pN: r ^ r/N satisfying pN (x) = xN for every x G V(r) U A(r), called the normal quotient projection relative to N .If N G < Aut(r), then there is an obvious, but not necessarily faithful action of the quotient group g/n on the digraph r/N. Note also that if G acts transitively on vertices, arcs or s-arcs of r, then so does g/n on r/N. If the quotient projection pN is a covering projection, then the situation is particularly nice; for example: Lemma 2.5. Let r be a digraph, let G < Aut(r) and let N be a normal subgroup of G. If the quotient projection p: r ^ r/N is a covering projection, then the action of g/n on V(f/n) U A(r/N) is faithful, and moreover, the stabilisers Gv and (g/n)vn are isomorphic for every v G V(r). We say in this case that the group g/n lifts along p. More precisely, a group H < Aut(r/N) lifts along p if there exists some G < Aut(r), containing N as a normal subgroup, such that g/n = H. We now state two very useful sufficient and necessary conditions for a normal quotient projection to be a regular covering projection. (We shall call a group N of automorphisms of r semiregular provided that the stabiliser Nv is trivial for every v G V(r).) K. Berčič and P. Potočnik: Two-arc-transitive two-valent digraphs of certain orders 135 Lemma 2.6. Let r be a connected digraph, let N < Aut(T) and let p: r ^ r/N be the corresponding quotient projection. Then the following statements are equivalent: (a) N is semiregular; (b) the in-valence as well as the out-valence of v and p(v) coincide for every v G V (T); (c) p is a regular covering projection. The rest of the section is devoted to the interplay between the concepts of alter-relations and covering projections. Lemma 2.7. Let p: r ^ A be a covering projection, let v be a vertex of r and let J be an interval of integers containing 0. Then p(A^ (v)) = Aj- (p(v)). Proof. Suppose that u G p(AJ(v)). Then there exists u G V(r) such that p(u) = u and a walk (v, xi, vi,..., xn, u) in r of sum 0 and tolerance within J. But then the projected walk (p(v), p(x1), p(v1), ..., p(xn), u) is also a walk of sum 0 and tolerance within J, implying that u G Aj-(p(v)). Conversely, suppose that u G Aj-(p(v)). Then there exists a walk (p(v), X1, -y1, ..., Xn, u) of sum 0 and tolerance within J. Since p is a local bijection, one can then construct a lift (v, x1, v1, ..., xn, u) such that p(xj) = Xj, p(vj) = v4, and p(u) = u. Note that this lift will also have sum 0 and tolerance within J, implying that u G A J (v), and therefore u G p(Aj(v)). □ Lemma 2.8. Let r be a G-vertex-transitive digraph, let N be a semiregular normal subgroup of G, let A = r/w and let p: r ^ A be the corresponding covering projection. Further, let v be a vertex of r, and let J be an interval of integers containing 0. Then |AJ(v)| divides |N||AJ(p(v))|. Proof. In view of Lemma 2.7, we see that AJ (v) C p-1(p(Aj (v))) = p-1(A^ (p(v))). Since Aj- (p(v)) is a block for the action of g/n on A, it follows easily that p-1(Aj (p(v))) is a block for the action of G on r. Since A J (v) is also a block for G, it follows that |AJ(v)| divides |p-1(A^(p(v)))|. However, since the p-preimage of a vertex in A is an N-orbit on r, it follows that the latter equals |N || A J (p(v)) |. □ Lemma 2.9. Let r be a connected, (G, 2)-arc-transitive 2-valent digraph and let N be a normal subgroup of G. If N has odd prime order, then rad(r/N) = rad(r). Proof. Let q be the order of N, let A = r/N and let p: r ^ A be the corresponding quotient projection. Suppose that the conclusion of the lemma is false, that is, rad(r/N) = rad(r). Since Gv is a 2-group (see Lemma 3.1) and N is of odd order, N acts semiregularly on V(r). By Lemma 2.6, the quotient projection p is then a regular covering projection. Choose a vertex v of r and e G {-1,1}, and consider the set T = A^(v). Recall that |T| = rad(r). By Lemma 2.7, p(T) = A^(p(v)). Since the size of the latter is rad(A), it follows by our initial assumption that | p(T) | = |T|, implying that T contains at least two elements of the orbit vN. Since both T and vN are blocks for the action of G on V(r), so is their intersection. However, vN is of prime size, implying that vN = vN n T, and thus vN C T. Since this is true for any choice of e, it follows that vN C Ar(v) n Ar1(v) = Att(v). But then by Lemma 2.3 it follows that r is not 2-arc-transitive, a contradiction. □ 136 Ars Math. Contemp. 11 (2016) 101-106 2.5 Partial line graphs and digraphs of Praeger and Xu In this section, we give a brief overview of the very useful concept of partial line graph construction, which was invented in [21] to analyse G-arc-transitive 2-valent digraphs of radius 2, and was further developed in [30]. For a digraph r and a positive integer s, the s-th partial line graph Pls(r) of r is the digraph with vertex-set being the set of s-arcs As(r), the arc-set being As+1(r), and the functions tail and head defined by the rules tail(x1,..., xs+1) = (x1,..., xs) and head(x1,..., xs+1) = (x2,..., xs+1) for every (s + 1)-arc (x1,..., xs+1) of r. Moreover, we let Plo(r) = r and write Pl instead of Pl1. Note that if r is a 2-valent digraph, then so is Pls(r) for every s > 0. The following formula (which appeared as [30, Lemma 3.2(i)] in the context of simple digraphs), provides an alternative, recursive definition of the Pls operator: Pls(r) = Pl(Pls_1(r)) for s > 1. (2.1) The lemma below follows from [30, Lemma 3.1(iv)] and [30, Lemma 3.2(ii)] in the context of simple digraphs. The proof remains unchanged in the case of non-simple digraphs. Lemma 2.10. If r is a vertex-transitive digraph, then exp(Pl(r)) = exp(r) + 1. The following result appeared as [30, Lemma 5.1] in the context of simple digraphs, and extends to general digraphs via Lemma 2.1. Lemma 2.11. If r is a 2-valent (G, 2)-arc-transitive digraph such that rad(r) = 2, then r = Pl(A), where A is a 2-valent (G, 3)-arc-transitive digraph of order half that of r. The Pl operator can be used to define a very important class of digraphs, first studied by Praeger and Xu [37] in the context of simple graphs, and by Praeger [35] in the context of simple digraphs. For integers n and s, n > 1, s > 0, let -3(ns) ( 3 n2) if s=o (n,s) \ Pl(P}X(n,s - 1)) if s > 1 (.) We shall call a graph isomorphic to some —)X(n, s) simply a -digraph. Note that, in view of (2.1), we have -)X(n,s) = Pls(3 n2)). (2.3) The automorphism group of 3i2) acts naturally as a group of automorphisms on each -3(n, s) for s > 1. The following surprising characterisation of -3 -digraphs was proved in [35, Theorem 2.9] in the context of simple digraphs. In view of Lemma 2.1, the result extends to non-simple digraphs. Lemma 2.12. Let r be a connected 2-valent G-arc-transitive digraph and let v e V(r). If G contains an abelian normal subgroup N that is not semiregular, then r is a -digraph. The following lemma is an analogue of a similar result for the undirected graphs (see [9, Lemma 3.1]). Our proof is just a slight modification of the proof given there. K. Berčič and P. Potočnik: Two-arc-transitive two-valent digraphs of certain orders 137 Lemma 2.13. Let r be a connected 2-valent, G-arc-transitive digraph and let N be a minimal normal subgroup of G. Suppose that N is a 2-group and that r/N = cCi2) for some n > 1. Then r is a -digraph. Proof. Since N is a minimal normal subgroup of G and a 2-group, it is elementary abelian. Let K be the kernel of the action of G on the set of N-orbits on V(r), and observe that G/K acts faithfully on V(r/N). Let C be the centraliser of N in K. Then N < C < K. Since N and K are normal in G, so is C. Since N and K have the same orbits on V(r), so does C, implying that K = NKv and C = NCv for any vertex v. Since the quotient r/N is 2-valent, Lemma 2.6 implies that the quotient projection r ^ r/N is a covering projection, and also that N is semiregular (for otherwise the valence of the quotient r/N would be less than that of r). Therefore, N n Cv < Nv = 1, and since Cv centralises N, we see that C = N x Cv. Since the quotient projection r ^ r/N is a covering projection, Lemma 2.5 implies that Gv embeds into a vertex-stabiliser in Aut( cC n2) ). In particular, Gv (and thus Cv) is an elementary abelian 2-group, implying that C is an abelian normal subgroup of G. Let us now show that Cv = 1. By way of contradiction, assume that Cv = 1, and thus that C = NCv = N. Now recall that K = NKv and N n Kv = 1. Since both N and Kv are 2-groups, so is K. In particular, the centre Z(K) is non-trivial. On the other hand, since Z(K) < C and since C = N, we see that Z(K) < N. Since N is a minimal normal subgroup of G, this implies that N = Z(K). But then K = NKv = N x Kv, and thus K is an elementary abelian 2-group. In particular, N, being the centre of K, equals K. Now recall that g/k acts faithfully on V(r/N). On the other hand, g/k equals g/n, which is clearly unfaithful on V(r/N). This contradiction shows that Cv = 1, and by Lemma 2.12, r is a -digraph, as claimed. □ Lemma 2.14. Let n and s be integers, n > 1, s > 0, let A = pX(n, s) and let v be a vertex of A. Then exp(A) = s, |A^(v)| = 2s and perim(A) = n. Suppose G is a group acting transitively on the arcs of A and let K = (Gu : u G V(A)), that is, the group generated by all the vertex-stabilisers in G. Then K is the kernel of the action of G on the partition |A^(u) : u G V(A)} and vK = A^(v); in particular, K is normal in G. Furthermore, the group K is elementary abelian of order 2s |Gv |, the quotient digraph a/k is isomorphic to a directed cycle of length n, and g/k is a cyclic group of order n. Proof. Observe first that exp(p)X(n, 0)) = exp( cC i2) ) = 0. On the other hand, by formula (2.2), A = Pl(p}X( n, s — 1)), and thus by induction and Lemma 2.10, exp(A) = s, as claimed. By formula (2.3), a vertex of A is an s-arc of cCi2). Now recall that V(cCi2)) = Zn and that there is an arc pointing from i to j if and only if j — i = 1. It is now clear that if v is an s-arc of cC!2) starting in a vertex i of cC!2), and W is a walk in A of sum k starting in v, then the end-point of W will be an s-arc of cC!2) starting in i + k; in particular, every member of A^(v) is one of the 2s s-arcs of cCi2) starting in i. On the other hand, if w and u are arbitrary s-arcs of cC!2) starting in i and i + s, respectively, then there clearly exists a directed walk in A of length s from v to u. By combining two such walks from v to u and from an arbitrary w to u, one gets a walk from v to w of sum 0. This shows that Aa (v) is precisely the set of all s-arcs of cC!2) starting in i. In particular, |Aa (v)| = 2s, 138 Ars Math. Contemp. 11 (2016) 101-106 as claimed. Since | V(A)| = 2sn and since perim(A) = | V(A)|/|A^(v)|, it follows that perim(A) = n. The equality vK = A^(v) follows directly from [30, Lemma 4.1] and [30, Corollary 4.2]. In particular, K fixes every class A^(u), u G A, set-wise, implying that K is contained in the kernel (call it M) of the action of G on the partition |A^(u) : u G V(A)}. Moreover, vK = vM, and since Kv = Gv = Mv, it follows that K = M .In particular, |K| = |vK| |Kv | = 2s|Gv |, as claimed. The fact that a/k is isomorphic to the directed cycle of length perim(A) and that g/k is a cyclic group of order perim(A) is now a direct consequence of either [24, Propositions 3.2 and 3.5] or [35, Proposition 2.1]. Finally, to see that K is elementary abelian, recall that a vertex of A is an s-arc in "J2), and thus the stabiliser of a vertex in Aut(A) equals the stabiliser of an s-arc in Aut( "ctJ2)). However, each stabiliser of an s-arc in Aut( "C J2)) is contained in the kernel of the action of Aut( 1000. Suppose that G acts transitively on the s-arcs but not on the (s + 1)-arcs of r. Then |Gv | = 2s (see Lemma 3.1) and therefore |G| = 2a+sqbpc. Now consider a composition series 1 = G0 Gi ... Gk = G of G, and the corresponding set of composition factors Fi = Gi/Gi-i for i e {1,..., k}. Recall that F are simple groups. Since G is non-solvable, there exists j e {1,..., k} such that Fj is non-abelian. Let T = Fj and note that |T| divides |G|, which equals 2a+sqbpc. It is known that there are precisely eight non-abelian simple groups whose orders are divisible by at most three distinct primes (see, for example, [12]); these are Alt(5), PSL(2,7), Alt(6), PSL(2, 8), PSL(2,17), PSL(3, 3), PSU(3,3), and PSU(4, 2). Out of these, only the first five are such that the odd primes appear with multiplicity at most 2; these five groups, together with their orders and the orders of their automorphism groups are listed in Table 2. 140 Ars Math. Contemp. 11 (2016) 101-106 T |T | | Aut(T)| Alt(5) 22 • 3 5 22 3 5 = 120 PSL(2, 7) 23 • 3 7 24 3 7 = 336 Alt(6) 23 • 32 5 25 32 5 = 1440 PSL(2, 8) 23 • 32 7 23 33 7 = 1512 PSL(2, 17) 24 • 32 17 25 • 32 • 17 = 4896 Table 2: Simple groups of orders divisible by three primes only, with odd part cube-free Observe that the order of each of these groups is divisible by 3 and that the other odd prime divisor is 5,7, or 17. We may thus assume without loss of generality that q = 3 and p e {5, 7,17}. If p = 5, then | V(T)| < 8 • 3 • 52 = 600, contradicting our initial assumption. This rules out the groups Alt(5) and Alt(6) as possibilities for T. If p = 7, then the order 2a3b7c of r is larger than 1000 only when a = 3, b = 1 and c =2. Since 9 divides the order of PSL(2,8), this implies that T ^ PSL(2,8), and therefore T = PSL(2,7) and |V(r)| = 8 • 3 • 72 = 1176. Finally, if p = 17, then T = PSL(2,17), and since 32 divides the order of PSL(2,17), it follows that the order of r is 8 • 32 • 17 = 1224. We shall now distinguish two cases, depending on whether G contains a non-trivial abelian normal subgroup or not. Case I. Suppose that G contains a non-trivial abelian normal subgroup. Then G contains a minimal normal subgroup N that is abelian. Since G is non-solvable, r is not isomorphic to a -digraph. In view of Lemma 2.12, N is then semiregular, and thus p: r X r/N is a regular covering projection. If N is a 2-group, then, since the 2-part of | V(r)| is 8, we see that |N| e {2,4,8}. The possible orders of r/N are then 147 and 153 (when |N| = 8, and T = PSL(2, 7) and PSL(2,17), respectively), 294 and 306 (when |N| = 4), and 588 and 612 (when |N| = 2). Now suppose that N is of odd order. Since N is solvable, T is a composition factor of g/n and thus |T| divides |G|/|N| = 2a+sqbpc/|N|. Since |N| is odd and b + c < 3, it follows that the odd part of |T | is of the form qb pc where b' + c' < 2; in particular, T ^ PSL(2,17), and therefore T = PSL(2, 7), |N| = 3 or |N| = 7, and | V(r/N)| = 2a • 3 • 7 < 168. In fact, since we have already established that | V(r) | = 8 • 3 • 72 when T ^ PSL(2,7), it follows that |N| = 7 and | V(f/n) | = 168. We have thus shown that in Case I, we have | V(f/n) | e {147,153,168, 294,306,588, 612} and therefore the quotient digraph r/N appears in the census [28]. By searching the census for 2-arc-transitive digraphs of these orders with a non-solvable automorphism group, one sees that the triple (T, |N|, r/N) is as one given in Table 3 (here the data in the last column corresponds to the names of digraphs as given in [28]). Using the methods described in, say, [14, 32], for each of the digraphs r/N from Table 3, all the corresponding N-regular covers were computed for which a 2-arc-transitive subgroup of Aut(r/N) lifts, and the resulting nine covering digraphs were included in Table 1 under the names Xi, X2,..., X9. Case II. Suppose now that G contains no non-trivial abelian normal subgroups. Let us now consider the group generated by all minimal normal subgroups of G, called the socle of G and denoted soc(G). Since G contains no non-trivial abelian normal subgroups, it K. Berčič and P. Potočnik: Two-arc-transitive two-valent digraphs of certain orders 141 T | N | r/n PSL(2, 7) 2 ATD[588;87], ATD[588;90], ATD[588;91] PSL(2, 7) 4 ATD[294;19] PSL(2, 7) 8 order 147; none PSL(2, 7) 7 ATD[168;53], ATD[168;64], ATD[168;65], ATD[168;81], ATD[168;82] PSL(2,17) 2 ATD[612;48], ATD[612;49] PSL(2,17) 4 ATD[306;11] PSL(2,17) 8 order 153; none Table 3: Possible quotients of r by a minimal abelian normal subgroup follows that soc(G) is a direct product of non-abelian simple groups (see, for example, [7, Theorem 4.3A]). Since the order of every non-abelian simple group is divisible by at least three distinct primes, and since not both b and c are 2, soc(G) is a simple normal subgroup of G and is therefore isomorphic to the non-abelian composition factor T of G. Moreover, G acts faithfully by conjugation on soc(G) and thus embeds into its automorphism group. Since soc(G) is isomorphic to either PSL(2,7) or PSL(2,17), we see that G is isomorphic to one of PSL(2, 7), PGL(2,7), PSL(2,17) or PGL(2,17). On the other hand, recall that |G| = 2a+sq6pa and that a = 3 and s > 2, implying that |G| is divisible by 25. This rules out all but the last possibility, that is G = PGL(2,17). Since, in this case, | V(r)| = 23 • 32 • 17 and |G| = 25 • 32 • 17, it follows that |Gv | = 4. By Lemma 3.1, Gv is elementary abelian. In particular, r is a coset digraph of G with respect to an elementary abelian subgroup of order 4 and a non-self-paired suborbit of length 2. A direct inspection of the appropriate subgroups of PGL(2,17) and their coset digraphs reveals that there are six pairwise non-isomorphic digraphs arising in this way. They are listed in Table 1 as digraphs Xio, Xn,..., Xi5. This concludes the proof of Theorem 1.1. 3.3 Proof of Theorem 1.2 We shall say that a positive integer n satisfies condition (i), (ii) or (iii), respectively, if the following holds: (i) n is odd and cube-free; (ii) n = 2°m, where a G {1,2, 3} and m is an odd, square-free integer; (iii) n = 2°q6p2, where a G {1,2,3}, b G {0,1} andp, q are distinct odd primes. As in the statement of Theorem 1.2, we assume that r is a connected 2-valent (G, 2)-arc-transitive digraph with G solvable, and that one of the conditions (i), (ii) or (iii) holds for n = | V(r) |. We need to show that either: (a) r is a -X -digraph; or that (b) n satisfies the condition (iii) and G contains a normal Sylow p-subgroup P, which is elementary abelian of order p2 and such that r/p is a -X -digraph. Suppose that the theorem is false and let r be a minimal counter-example (in terms of n). In particular, r is not a P-XX -digraph. By Lemma 2.1, r is then simple. Since G acts transitively on the vertex-set of r and since the vertex-stabiliser Gv is of order 2s for some s > 2 (see Lemma 3.1), it follows that |G| = |Gv |n = 2sn. 142 Ars Math. Contemp. 11 (2016) 101-106 We shall now prove a few facts about r and G, finally resulting in a contradiction. Fact 0: If N is a semiregular normal subgroup of G, then r/N is a -X -digraph, or n/|N | (and thus also n) satisfies the condition (iii) and the Sylow p-subgroup of g/n is elementary abelian of order p2 and normal in g/n. Proof: Since N is semiregular, by Lemma 2.6, r X r/N is a covering projection, and by Lemma 2.5, r/N is a connected 2-valent (g/n, 2)-arc-transitive digraph. Moreover, since every divisor of an integer satisfying one of the conditions (i), (ii), or (iii) also satisfies one of these conditions, the minimality of the counterexample r implies that either r/N is a -X -digraph or that n/|N| satisfies the condition (iii) and the Sylow p-subgroup of g/n is indeed as claimed. Fact 1: n does not satisfy the condition (i); in particular, n is even. Proof: Assume the contrary (that is, n is odd and cube-free). Since n is odd, the vertex-stabiliser in G is a Sylow 2-subgroup of G, and every 2-subgroup of G is contained in some vertex-stabiliser in G. Let N be a minimal normal subgroup of G. Since G is solvable, N is elementary abelian. If N is a 2-group, then N < Gv for some vertex v, and thus the action of G on the vertices of r is not faithful, implying that r is not simple, a contradiction. Hence N is an elementary abelian group of odd order, and thus acts semiregularly on the vertices of r. By Fact 0, r/N is a -X -digraph, and since its order is odd, it must be isomorphic to n', 0) where n' = n/|N|. Further, by Lemma 2.9 (note that rad(r/N) = 1 = rad(r)), we see that N is not of prime order. Since the order of r is cube-free, it follows that N is elementary abelian of order p2 for some odd prime p. Let us now consider the group g/n acting on r/N. Since r/N = n', 0), by Lemma 2.2, the stabiliser (g/n)vn of a vertex vN of r/N is elementary abelian and normal in g/n. Note also that (g/n)vn = Gvn/n, implying that GvN is normal in G. Let C be the centraliser of N in GvN. If we apply Lemma 3.3 with X = N, Y = Gv N and Z = G, we see that C = N x T for some normal subgroup T of G, isomorphic to a subgroup of Y/N = Gv. In particular, T is a 2-group. Since the order of r is odd and T is a 2-group, T fixes a vertex of r, and being normal in G, it acts trivially on the vertex-set of r. Since r is a simple digraph, it follows that T =1, and thus C = N. Since GvN is normal in G and contains Gv, it contains Gu for every vertex u G V(r). In particular, Gv N contains every involution of G. Together with the fact that N is self-centralising in Gv N this implies that no involution of G centralises N. Now consider the centraliser D of N in G. We have just shown that D has odd order, implying that D is semiregular, and thus, r/D = n'', 0) for some odd integer n''. Moreover, since g/d acts 2-arc-transitively on r/D, the Sylow 2-subgroup S of g/d is the vertex-stabiliser of every vertex of r/D, and is thus normal in r/D, elementary abelian, and of order at least 4. On the other hand g/d embeds into Aut(N) = GL(2,p). By Lemma 3.2, it follows that S is of order 4 and contains an involution that is central in g/d. However, by Lemma 2.2, this implies that n'' is even. This contradiction concludes the proof of Fact 1. Fact 2: The group G does not contain a normal elementary abelian subgroup of order p2 for any odd prime p. Proof: Assume the contrary and note that in view of Fact 1, n then satisfies the condition (iii); that is, n = 2aqbp2 for some a < 3 and b < 1. Moreover, G contains a normal K. Berčič and P. Potočnik: Two-arc-transitive two-valent digraphs of certain orders 143 elementary abelian subgroup P of order p2. Since p is odd, P is semiregular, and by Fact 0, either r/p is a Pi -digraph, or n/|P| = 2aqb satisfies the condition (iii). The latter is clearly false, while the former implies that the conclusion (b) of Theorem 1.2 holds for r, a contradiction. Fact 3: rad(r) > 3; that is, the alternating cycles of r are of length at least 6. Proof: Assume the contrary; that is, rad(r) < 3. Since r is simple, we have rad(r) = 1. Hence rad(r) = 2, and by Lemma 2.11, it follows that r = Pl(A) for some connected 2-valent (G, 3)-arc-transitive digraph A of order 2n. If A is a Pi -digraph, then by formula (2.2), so is r, a contradiction. By the minimality of the counterexample r, this implies that conclusion (b) holds for the pair (A, G) in place of (r, G), and in particular, that G contains a normal elementary abelian subgroup of order p2 for some odd prime p. However, the latter contradicts Fact 2. Fact 4: The group G contains no normal subgroup of odd prime order. Proof: Suppose the contrary and let N be a normal subgroup of G of odd prime order q. Since Gv is a 2-group, N is semiregular. By Fact 3 and Lemma 2.9, r/N is not a Pi-digraph. But then Fact 0 implies that n = 2aqp2 and the Sylow p-subgroup P of g/n is normal in g/n and isomorphic to Zp. Let Q be the preimage of P with respect to the quotient projection G i g/n. Then Q is a normal subgroup of G of order qp2, containing the normal subgroup N of order q. Let C be the centraliser of N in Q. Since N is abelian and since N has order coprime to its index in Q, we may apply Lemma 3.3 with Z = G, Y = Q and Z = N, to conclude that C = N x P for some normal subgroup P of G, isomorphic to a normal subgroup of q/n. Since the latter is isomorphic to P, we see that P is either trivial, cyclic of order p, or isomorphic to Zp. If P is trivial, then C = N, and q/n embeds into Aut(N), implying that q/n is cyclic. However, q/n is isomorphic to P, which is isomorphic to Zp, a contradiction. Further, by Fact 2, the order of P is not p2. This leaves us with the possibility that | P| = p. Now consider the quotient r/p. Since the order of r/p is 2aqp, Fact 0 implies that r/p is a RxX-digraph. But then, by Lemma 2.9, rad(r) = rad(r/p), which is at most 2, since r/p is a RX-digraph, contradicting Fact 3. Fact 5: If N is a minimal normal subgroup of G, then N is semiregular and of order 2 or 4. If |N| = 2, then r/N = P)X(m, 2), and if |N| = 4, then r/N = Pl(m, 1) for some odd integer m. Moreover, exp(r) = 2. Proof: Let m be the odd part of n. By Fact 1, n = 2am where a > 1 and m is cube-free. Let N be a minimal normal subgroup of G. Since G is solvable, N is elementary abelian, and since |G| = 2a+sm, Facts 2 and 4 imply that N is a 2-group. If N is not semiregular, then by Lemma 2.12, r is a Pi -digraph, contradicting our assumptions. Hence N is semiregular, and thus |N | divides n, and therefore |N | = 2t for some integer t satisfying 1 < t < a. By Fact 0, either r/N is a Pi -digraph, or n/|N | satisfies the condition (iii) and the group g/n contains a normal elementary abelian subgroup P of order p2. Suppose first that the latter case occurs. Then n/|N| = 2a-tqbp2 where a ~ t > 1. Since a < 3, this implies that t e {1, 2}. As in the proof of Fact 4, let Q be the preimage 144 Ars Math. Contemp. 11 (2016) 101-106 of P with respect to the quotient projection G i g/n. Then Q is a normal subgroup of G of order 2*p2, containing the normal subgroup N of order 24. Now consider the centraliser C of N in Q, apply Lemma 3.3 with Z = G, Y = Q and X = N, and conclude that C = N x P for some (possibly trivial) p-group P which is normal in G. If P is trivial, then q/n = P = Z2 embeds into Aut(N) = GL(t, 2). Since t < 2, this is clearly not the case. Hence P is non-trivial, contradicting either Fact 2 or Fact 4. This contradiction shows that the former case occurs, that is r/N = P)X(2a-i-rm, r) for some integer r such that 0 < r < a — t. Let A = r/N and let p : r i A be the corresponding quotient projection. Since a < 3 and t > 1, we see that r < 2. If r = 0, then Lemma 2.13 implies that r is a Pi -digraph, a contradiction. If r = 1, either a = 2 and t = 1, or a = 3 and t G {1,2}. Let v G V(r) and let v' = p(v). Observe that exp(A) = 1 (see Lemma 2.14) and (v')| = 2 for every i > 1. By Lemma 2.8, it follows that |A[(v)| divides 2È|Af (v')| = 2i+1 < 8 for every i > 1. Since |A[(v)| = rad(r) > 3, it follows that |A[ (v)| G {4,8}. If |A[(v)| = |A£(v)|, then exp(r) = 1, and by Lemma 2.4, r is a Pi -digraph, a contradiction. Hence |A[(v)| < |Ar(v)|, implying that |A[(v)| =4 and |A[(v)| = 8 for every i > 2 (hence exp(r) = 2). Moreover, since 8 = |Ar (v) | divides 2t+1, we see that t = 2 and a = 3, implying that A = pi( m, 1), as claimed. Similarly, if r = 2, then a = 3, t = 1 and A = K^m, 2). Hence exp(A) = 2, |A^(v')| = 2 and |Af(v')| = 4 for every i > 2. Moreover, as above, |A[(v)| > 3 and Uï(v)| < |Ar (v)|. In view of Lemma 2.8, it thus follows that |A[(v)| = 2A(v')| = 4, and (v)| = |A^(v)| = 8. In particular, exp(r) = 2, as claimed. This concludes the proof of Fact 5. Fact 6: The order n of r is at most 744. Proof: Let N be a minimal normal subgroup of r and recall Fact 5. Since exp(r) = 2, [30, Theorem 7.1] implies that |Gv | < 24. By Lemma 2.5, also the stabiliser (g/n)vn has order at most 24. By Lemma 3.4, this implies that g/n contains a normal cyclic group y whose order is I for some odd integer I satisfying I > m/(2a+4 - 1), (*) where a is either 1 or 2, depending on whether |N | =4 or |N | =2, respectively. Let Y < G be the preimage of YP with respect to the quotient projection G i g/n, let C be the centraliser of N in Y, and apply Lemma 3.3 to deduce that C = N x T for some cyclic group T G of order dividing £ Since T is cyclic, every subgroup of T is characteristic in T and thus normal in G. If T is non-trivial, this implies that G contains a normal subgroup of odd prime order, contradicting Fact 4. Hence T = 1 , and C = N. If |N| = 2, then a = 2, N is central in Y, and Y = C = N. However, £ = |Y|/|N|, and thus £ = 1. In view of (*), we see that m < 22+4 — 1 < 63, and therefore n = |N|| V(r/N)| = 2| V(-X(m, 2))| = 8m < 504. If |N | =4, then a = 1, and by (*), we see that m < 31£, and thus n = 4|V(—X(m, 1))| = 8m < 248£. On the other hand, since C = N, the cyclic group Y/N of order £ embeds into Aut(N) = GL(2, 2) = Sym(3), and thus £ < 3. But then n < 3 • 248 = 744. This concludes the proof of Fact 6. Since a census of all simple arc-transitive digraphs of valence 2 is available in [28], we can easily see that no counter-example to the theorem of order at most 1000 exists. This, K. Berčič and P. Potočnik: Two-arc-transitive two-valent digraphs of certain orders 145 however, contradicts Fact 6, and thus proves the theorem. References [1] K. Bercic and P. Potocnik, The magma code for the twenty exceptional digraphs, http:// www.fmf.uni-lj.si/~potocnik/Katja/ATD.htm, accessed 10th October 2014. [2] W. Bosma, J. Cannon and C. Playoust, The Magma algebra system. I: The user language, J. Symbolic Comput. 24 (1997), 235-265. [3] C.-Y. Chao, On the classification of symmetric graphs with a prime number of vertices, Trans. Amer. Math. Soc. 158 (1971), 247-256. [4] Y. Cheng and J. Oxley, On weakly symmetric graphs of order twice a prime, J. Combin. Theory Ser.B 42 (1987), 196-211. [5] M. Conder, C.-H. Li and P. Potocnik, On the orders of arc-transitive graphs, J. Algebra 421 (2015), 167-186. [6] M. Conder, P. Potocnik and P. Sparl, Some recent discoveries about half-arc-transitive graphs, ArsMath. Contemp. 8 (2015), 149-162. [7] J. D. Dixon and B. Mortimer, Permutation Groups, Graduate Texts in Mathematics 163, Springer-Verlag, New York (1996). [8] Y.Q. Feng, K. Kutnar, D. Marusic and C. Zhang, Tetravalent one-regular graphs of order 4p2, Filomat 28 (2014), 285-303. [9] A. Gardiner and C. E. Praeger, A Characterization of Certain Families of 4-Valent Symmetric Graphs, European J. Combin. 15 (1994), 383-397. [10] M. Ghasemi and P. Spiga, 4-Valent one-regular graphs of order 6p2, Ars Math. Contemp. 9 (2015), 1-18. [11] S. Guest, J. Morris, C. E. Praeger and P. Spiga, On the maximum orders of elements of finite almost simple groups and primitive permutation groups, Trans. Amer. Math. Soc. 367 (2015), 7665-7694. [12] M. Herzog, On finite simple groups of order divisible by three primes only, J. Algebra 10 (1968), 383-388. [13] B. Huppert and W. Lempken, Simple groups of order divisible by at most four primes, Proc. of the F. Scorina Gomel State Univ. 16 (2000), 64-75. [14] A. Malnic, D. Marusic and P. Potocnik, Elementary abelian covers of graphs, J. Algebraic Comb. 20 (2004), 71-97. [15] A. Malnic, D. Marusic, S. Miklavic and P. Potocnik, Semisymmetric elementary abelian covers of the Mobius-Kantor graph, Discrete Math. 307 (2007), 2156-2175. [16] A. Malnic, P. Potocnik, N. Seifter and P. Sparl, Reachability relations, transitive digraphs and groups, to appear in Ars Math. Contemp. 8 (2015), 83-94. [17] A. Malnic, T. Pisanski and A. Zitnik, The clone cover, to appear in Ars Math. Contemp. 8 (2015), 95-113. [18] D. Marusic, Recent developments in half-transitive graphs, Discrete Math. 182 (1998), 219231. [19] D. Marussics, Half-transitive group actions on finite graphs of valency 4, J. Combin. Theory Ser.B 73 (1998), 41-76. [20] D. Marusic and R. Nedela, Finite graphs of valency 4 and girth 4 admitting half-transitive group actions J. Aust. Math. Soc. 73 (2002), 155-170. 146 Ars Math. Contemp. 11 (2016) 101-106 [21] D. Marusic, R. Nedela, Partial line graph operator and half-arc-transitive group actions, Math. Slovaca 51 (2001), 241-257. [22] D. Marusic, R. Nedela, On the point stabilizers of transitive groups with non-self-paired suborbits of length 2, J. Group Theory 4 (2001), 19-43. [23] D. Marusic and P. Potocnik, Classifying 2-arc-transitive graphs of order a product of two primes, Discrete Math. 244 (2002), 331-338. [24] D. Marusic and P. Potocnik, Bridging semisymmetric and half-arc-transitive actions on graphs, European J. Combin. 23 (2002), 719-732. [25] D. Marusic and C. E. Praeger, Tetravalent graphs admitting half-transitive group actions: alternating cycles, J. Combin. Theory Ser. B 75 (1999), 188-205. [26] D. Marusic and R. Scapellato, Classifying vertex-transitive graphs whose order is a product of two primes, Combinatorica 14 (1994), 187-201. [27] P. M. Neumann, Finite Permutation Groups, edge-coloured graphs and matrices, in Topics in groups theory and computations (ed. M. P. J. Curran), Academic Press, London (1977). [28] P. Potocnik, P. Spiga and G. Verret, A census of 4-valent half-arc-transitive graphs and arc-transitive digraphs of valence two, Ars Math. Contemp. 8 (2015), 133-148. [29] P. Potocnik, P. Spiga and G. Verret, A census of 2-valent arc-transitive digraphs, http:// www.fmf.uni-lj.si/~potocnik/work.htm [30] P. Potocnik and G. Verret, On the vertex-stabiliser in arc-transitive digraphs, J. Combin. Theory Ser. B. 100 (2010), 497-509. [31] R. PoZar, Sectional split extensions arising from lifts of groups, Ars. Math. Contemp. 6 (2013), 393-408. [32] R. PoZar, Some computational aspects of solvable regular covers of graphs, J. Symbolic Comp., 70 (2015), 1-13. [33] C. E. Praeger, Imprimitive symmetric graphs, Ars Combin. 19 (1985), 149-163. [34] C. E. Praeger, An O'Nan-Scott Theorem for finite quasiprimitive permutation groups, and an application to 2-arc transitive graphs, J. London Math. Soc.(2) 47 (1993), 227-239. [35] C. E. Praeger, Highly arc transitive digraphs, European J. Combin. 10 (1989), 281-292. [36] C. E. Praeger, R. J. Wang and M. Y. Xu, Symmetric graphs of order a product of two distinct primes J. Combin. Theory Ser B 58 (1993), 299-318. [37] C. E. Praeger and M. Y. Xu, A characterization of a class of symmetric graphs of twice prime valency, European J. Combin. 10 (1989), 91-102. [38] A. Seress, On vertex-transitive, non-Cayley graphs of order pqr, Discrete Math. 182 (1998), 279-292. [39] P. Sparl, A classification of tightly attached half-arc-transitive graphs of valency 4, J. Combin. Theory Ser. B 98 (2008), 1076-1108. [40] P. Sparl, On the classification of quartic half-arc-transitive metacirculants, Discrete Math. 309 (2009), 2271-2283. ARS MATHEMATICA CONTEMPORANEA Also available at http://amc-journal.eu ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 11 (2016) 147-156 Testing whether the lifted group splits Rok PoZar * Faculty of Mathematics, Natural Sciences and Information Technologies, University of Primorska, Glagoljaska 8, 6000 Koper, Slovenia Received 8 July 2014, accepted 22 June 2015, published online 1 October 2015 Abstract Let a group of automorphisms lift along a regular covering projection of connected graphs given combinatorially by means of voltages. The data that determine the lifted group and its action are then conveniently encoded in terms of voltages as well. Along these lines, an algorithm for testing whether the lifted group is a split extension of the group of covering transformations has recently been proposed in the case when the group of covering transformations is solvable. It consists of decomposing the covering into a series of coverings with elementary abelian groups of covering transformations, and inductively solving the problem at every elementary abelian step. Although the explicit construction of the lifted group is not needed, it still involves time and space consuming constructions of certain subgroups in the lifted group at every step except at the final one. In this paper, an improved version that completely avoids such constructions is presented. From voltage distribution we first compute the weak action and the factor set that determine the lifted group, and we then carry out the test by extracting the necessary information only from the corresponding weak actions and factor sets at every step. An experimental comparison is made against the previous version. Keywords: Algorithm, graph, group extension, lifting automorphisms, regular covering projection, voltages. Math. Subj. Class.: 05C50, 05E18, 20B40, 20B25, 20K35, 57M10 1 Introduction Group extensions arising from lifting groups of automorphisms along regular graph coverings play a significant role in analyzing symmetry properties of graphs; see, for example, [5, 6, 9, 10, 13, 16, 19]. One therefore frequently needs to answer questions regarding structural properties of such extensions. *This work is supported in part by the Slovenian Research Agency (research program P1-0285). E-mail address: pozar.rok@gmail.com (Rok PoZar) charchar This work is licensed under http://creativecommons.Org/licenses/by/3.0/ 148 Ars Math. Contemp. 11 (2016) 101-106 Specifically, let a group G of automorphisms of a graph X lift along a regular covering projection p: X ^ X to a group G of automorphisms of the covering graph X. Then the lifted group G is an extension of the group of covering transformations CT(p) by G. Often, all of the data about the lifted group and its action are conveniently encoded on X by means of voltages that determine p. In such a situation we can always reconstruct G as a permutation group acting on X, and then apply the known algorithms for permutation groups in order to investigate its structure. However, taking into account complexity issues, this reconstruction is expensive whenever CT(p) is large. Instead, we wish to reduce the investigation of structural properties of G to the study of voltage distribution on X. A natural question of interest is then the following: for a group G that lifts along p given by means of voltages, is the lifted group G a split extension of CT(p) by G? There are efficient algorithms in computational group theory for testing whether a given group extension splits (see, for example, [3] and [8, Chapters 7 and 8]), and these functions have also been implemented in Magma [1]. Unfortunately, the algorithms as well as the implementations address the case when extensions are input as permutation groups. In [15], an algorithm for testing whether the lifted group G splits is described in the case when CT(p) is (elementary) abelian. It is based on extracting all the necessary information about G from voltage distribution, rather then explicitly constructing G as a permutation group. This idea is taken further in [17] to deal with the case of a solvable CT(p). The algorithm consists of decomposing p into a series of regular covering projections with elementary abelian groups of covering transformations, and inductively applying the algorithm from [15] at every elementary abelian step. Although the explicit construction of G is not needed, the algorithm still involves time and space consuming constructions of certain subgroups isomorphic to G in the lifted group at (possibly) every step except at the finale one. In this paper, we improve the algorithm from [17] by avoiding such constructions entirely. The approach is based on the fact that a group extension can be recaptured by have it written as a crossed product extension in terms of the corresponding weak action and a factor set. As a first step we compute the weak action and the factor set corresponding to G from voltage distribution. At each step, we then carry out our test by extracting all the necessary information only from the corresponding weak actions and the factor sets. The paper is organized as follows. In Section 2 we review some preliminary concepts about regular graph coverings and lifting automorphisms as well as group extensions. In Section 3 we discuss the problem of testing whether an extension splits in terms of weak actions and factor sets. In Section 4 we then propose an improved algorithm for testing whether the lifted group splits. Finally, we evaluate the performance of our algorithm in comparison with the previous version [17] in Section 5. Experimental results confirm the effectiveness of the improvements made. 2 Preliminaries We begin with a review of some basic concepts in order to fix the notation and terminology. 2.1 Regular graph covers and lifts of automorphism Throughout the paper, graphs are finite, simple and undirected. For a graph X we denote by V(X), A(X) its vertex and arc set, respectively. The full automorphism group of X is R. Pozar: Testing whether the lifted group splits 149 denoted by Aut(X). For a detailed treatment of graph coverings and lifting automorphism we refer the reader to [7, 12, 14]. A surjective graph homomorphism p: X ^ X is called a regular covering projection if there exists a semiregular subgroup Sp of Aut(X) such that its vertex orbits coincide with the vertex fibres p-1(v), v e V (X). In this setting we call X a base graph, and X a covering graph (or a cover). Regular covering projections p: X ^ X and p': X' ^ X are equivalent if there exists a graph isomorphism g: X ^ X' such that p = gp'. An automorphism g e Aut(X) lifts along p: X ^ X if there exists an automorphism g e Aut(X), called a lift of g, such that gp = pg. A group G < Aut(X) lifts if each g e G lifts. The collection of all lifts of all elements in G forms a subgroup G < Aut(X), called the lift of G or the lifted group. In particular, the lift of the trivial group, denoted by CT(p), is known as the group of covering transformations. If CT(p) is an elementary abelian or a solvable group, the regular covering projection p is called elementary abelian or solvable, respectively. Observe that CT(p) is a normal subgroup of G and that G/CT(p) = G, so G is an extension of CT(p) by G. Regular covering projections can be grasped combinatorially as follows. Let N be a (finite) group. Define a voltage function Z: A(X) ^ N such that Z (v2, v1) = (Z (v1, v2))-1 for each (v1, v2) e A(X); that is, a function assigning mutually inverse elements in N to mutually inverse arcs in X. We call N the voltage group, while the values of Z are called voltages. Further, construct the derived graph X xz N with vertex set V(X) x N and adjacency relation (v1, n) ~ (v2, nZ(v1, v2)) whenever v1 ~ v2. The projection pZ : X xz N ^ X, (v, n) ^ v, is then the derived regular covering projection, where the required semiregular subgroup SP( of Aut(X xz N) arises from the action of N on the second coordinate by left multiplication on itself. Conversely, with any regular covering projection p: X ^ X there is an associated voltage function Z on X such that the derived covering projection pz is equivalent to p. Since both graphs Xg and X are connected, the voltage function Z associated with the projection p is valued in N = CT(p) (viewed as an abstract group). The fact that an automorphism lifts along a projection p if and only if it lifts along along any covering projection equivalent to p allows us to study lifts of automorphisms combinatorially in terms of voltage functions. Let Z: A(X) ^ N be a voltage function associated with a regular covering projection p: X ^ X of connected graphs. We note that Z can be naturally extended to walks: if W = v1v2 • • • vn-1vn is a walk in X, then ZW = Z(v1,v2) • • • Z(vn-1,vn). By the basic lifting lemma, see [12, 14], g e Aut(X) lifts along p if and only if there exists an automorphism g#v of N such that g#v (zw ) = Zg(w) for all closed walks W in X rooted at a fixed vertex v. Of course, if g lifts, g#v is uniquely determined by a map ZW * ^ Zg(W *), where W * ranges over all fundamental closed walks in X rooted at v. 2.2 Group extensions A group E is called a (group) extension of a group N by a group G if there is a short exact sequence 1 N 4 E 4 G -)• 1. 150 Ars Math. Contemp. 11 (2016) 101-106 It is called a split extension if there is a homomorphism j: G ^ E with qj = id. In particular, the group E having a normal subgroup N is an extension of N by E/N, and it is a split extension if there is a transversal of N in E - a system of representatives in E of cosets of N in E - that forms a group. Such a group is called a complement of N in E. Group extensions E and E' of N by G are equivalent if there exists an isomorphism a: E ^ E' such that the diagram N-- -> E -> G 4 4 I'd N E' G is commutative. Of course, if E and E' are equivalent extensions, then E is split if and only if E' is split. Suppose that the group E has a normal subgroup N. All of the data that determine the group operation in E can be, up to equivalence of extensions, given in terms of N and G = E/N. The approach is known and goes back to Schreier [11]. For each g e G fix a coset representative g in E such that gN = g. Since N is normal, the element g gives rise to an automorphism g# of N defined by g# (n) = g n g -1. Clearly, this definition depends on the choice of g, and hence the function #: G ^ Aut(N), g ^ g#, called a weak action, is not a group homomorphism in general. Further, the fact that the elements {g | g e G} form a transversal of N in E implies that for any g1; g2 e G we have g! g2 = F(gi, g2)gig2 for some unique F(gi, g2) e N. The function F: G x G ^ N, (gi,g2) ^ g! g2 gig2-1, for this choice of coset representatives is called a factor set. It is natural to choose 1 = 1. Then F(1,1) = 1, and such a factor set is called normalized. This will be our standard assumption without loss of generality. The weak action # and the factor set F defined above determine a group operation on the set N x G; namely, N x G becomes a group, denoted by N ext#, F G, under the multiplication (ni, gi) * (n2, g2) = (ni g#(n2) F(gi, g2), gig2). (2.1) In fact, N ext#, F G is an extension of N by G, called the crossed product extension, and is equivalent to E. More precisely, there exists an isomorphism N ext#, F G ^ E, (n, g) ^ ng, (2.2) mapping N x 1 onto N and 1 x G onto the transversal {g | g e G}. 3 Testing whether an extension splits Let N be a normal subgroup of a finite group E, and let G = E/N. We first briefly describe a general strategy for testing whether E is a split extension of N by G. In principal we follow [3] and [8, Chapters 7 and 8], however, for reasons that will become apparent in Section 4, we extract the necessary information from the crossed product extension N ext#, f G that reconstructs E. R. Pozar: Testing whether the lifted group splits 151 Let G = (S | R) be a finite presentation of G, where S = {g1,... ,gn} is a set of generators and R = {n(gi,..., gn),..., rm(gi,..., gn)} is a set of relators - that is, a set of words in generators representing the identity element in G. We note that neither # is determined uniquely by its values gf for g4 e S, nor F is determined uniquely by its values F(gj, gj) for gj, gj e S. But this is not a problem; as we shall see in (3.2) and (3.3) below, it is enough to only know the images gf of the generators gj e S under #, along with some particular images under F. A general transversal of N x 1 in Next#, F G has the form {(6(g), g) | g e G} for a function 6: G ^ N. The same function also determines a transversal of N in E, namely {6(g)g | g e G}, where {g | g e G} is a transversal of N in E giving rise to the isomorphism N extf, f G ^ E, (n, g) ^ ng, see (2.2). As it is known, E splits if and only if there exist coset representatives in E of the generators of G satisfying the defining relators of G. More precisely, if and only if, for each gj in S, there exists an element gj in E such that gjN = gj and that, for each relator r j in R, the word r j (g1,..., gn) obtained from r j by replacing each g» by gj whenever it appears is a relator of E. In the context of a crossed product extension, N ext#, F G splits if and only if there exists a function 6: S ^ N such that, for all r j e R, rj((6(gi), gi),..., (6(gn), gn)) = (1,1) (3.1) in N extf, f G. Then the function 6 defined on the generators extends to 6: G ^ N, and a complement is generated by the set {(6(g1), g1),..., (6(gn), gn)}. Let us now rewrite (3.1) explicitly in terms of the weak action and the factor set. Suppose rj = gj1 ■ ■ ■ gjt e R. Taking into account the multiplication rule (2.1) in N ext#, F G, denoted by *, and considering (6(g), g) as (6(g), 1) * (1, g), the condition (3.1) becomes t (¿te) n • • • gJL (¿te)),i) * rj((!, gi),..., (1, g«)) = (1,1). (3-2> k=2 In this expression we can explicitly compute rj((1, g1),..., (1, gn)) as ti (II g# • • • g#-fc(F (gjt-k+i, gjt-fc+2 • • • g¿t)) •F (g¿i, gj2 • • • gjt ^1). (3-3) k=2 Think of values 6(gj) as being variables for the moment. Then each relation (3.2) gives rise to an equation in N. It is important to stress out that for the construction of such an equation we only need to know the values F(gjfc, gjfc+1 ■ ■ ■ gjt) and the automorphisms gf for k = 1,... ,t - 1. Considering all relators rj e R thus yields a system of equations, whose solutions correspond to complements. However, solving such a system is rather hopeless in general. 3.1 Elementary abelian case Let us therefore assume that N is an elementary abelian p-group of rank d. In this case, N can be identify with d-dimensional vector space Z^, the function # is a homomorphism that defines an action of G on N, and the automorphisms gf of N are invertible d x d matrices. We search for a complement by considering each 6(gj) in N as a vector with variable entries xj,1,..., xjjd. Then each relation gives rise to d linear equations in the variables xj,1,..., xj d. Putting all together we obtain a non-homogeneous system of md equations, whose set of all solutions is in bijective correspondence with all the complements. 152 Ars Math. Contemp. 11 (2016) 101-106 3.2 Solvable case The case when N is solvable can be dealt with by choosing a characteristic series N = N0 > N1 > • • • > Nr = 1 such that each factor Nj-i/Nj is elementary abelian. The problem reduces into the same problem on Nj-i/Nj and Nj inductively down the series. The following theorem is a first step towards this reduction when the extension E is reconstructed as a crossed product extension N ext#, f G. Theorem 3.1. Let M, N be normal subgroups of a finite group E with M < N, and let G = E/N. (i) IfN ext#, f G reconstructs E, then N/M ext#N/M, fn/m G reconstructs E/M with g#N/M (nM) = g#(n)M Fn/m (gi ,g2) = F (gi,g2)M. (ii) In particular, suppose that E/M splits, and let L/M be a complement of N/M in E/M determined by a function S: G ^ N/M. Let T be a transversal of M in N and, for each S(g), let S(g) be the representative in T such that S(g)M = S(g). Then M ext#s, f G reconstructs L with g*s (m) = S(g) g#(m) S(g) 1 Fs(gi,g2) = S(gi) g#(S(g2)) F(gi,g2) S(gig2) . Proof. Let M,N < E with M < N, and suppose that E is reconstructed in a form of a crossed product extension N ext#, F G by taking a transversal [g | g e G}. Then (E/M)/(N/M) = E/N = G and [gM | g e G} is a transversal of N/M in E/M. For each g e G we have the automorphism g#N/M of N/M defined by g#N/M (nM) = gMnMg-iM = gng-iM = g#(n)M, and hence the weak action #N/M : G ^ Aut(N/M) is given by #N/M: g ^ g#N/M. Furthermore, giMg^Mgigi-iM = gi g2 gig2-iM = F(gi,g2)M shows that the factor set FN/M: G x G ^ N/M is given by Fn/m : (gi,g2) ^ F(gi,g2)M. This proves (i). As for (ii), let L/M be a complement of N/M in E/M determined by S: G ^ N/M; that is, L/M has the form [S(g)gM, | g e G}. Fix a transversal T of M in N. For each S(g) in N/M choose the representative S(g) in T such that S(g)M = S(g). Then [S(g) g | g e G} is a transversal of M in L. For g e G the corresponding automorphism g#s of M is defined by g#s (m) = S(g) g mg-i S(g) i = S(g) g#(m) S(g) \ R. Pozar: Testing whether the lifted group splits 153 Hence the weak action #g: G ^ Aut(M) is given by #g: 0 ^ 0#. It remains to compute the corresponding factor set. We have ¿(gl) 01 ¿(02 ) 02 (¿(0102 ) 0102)-1 = ¿(01) 01 ¿(02) 02 0102 ¿(0102) 1 = ¿(01) 01 ¿(02) 01 -1 0l02 0102 -1 ¿(0102) = ¿(01) 0#(^(02)) F(01,02) ¿(0102) , and so Fg: G x G ^ M is given by Fg : (01,02) ^ ¿(01) 0#(^(02)) F(01,02) ¿(0102) 1. This completes the proof. □ To start the reduction we first need to test whether E/N1 is a split extension of N/N by G. By Theorem 3.1(i) we reconstruct E/N1 in a form of a crossed product extension N/N ext#N/N , yN/N G, and test whether it is a split extension of N/N by G. Since N/N is elementary abelian, this is done by solving a non-homogeneous system of linear equations described in Subsection 3.1. If the system has no solution, then E does not split. Otherwise, each solution ¿ uniquely determines a complement L/N of N/N in E/N1. We further need to test each L (corresponding to each ¿) for being a split extension of N by G. Using Theorem 3.1(ii) we reconstruct each such L in a form of a crossed product extension N ext#, y G, and continue down the series. Suppose inductively that, for some j < r, we have complements L/Nj of N/Nj in E/Nj, and that each L is reconstructed as a crossed product Nj ext# y G. In order to test whether each such L/Nj+1 is a split extension of Nj /Nj+1 by G we reconstruct L/Nj+1 in a form Nj /Nj+1 ext# T G, and test whether the latter is a split extension of Nj/Nj+1 by G. Again, Nj /Nj+1 is elementary abelian, so we need to solve an appropriate linear system. If none of L/Nj+1 are split extensions, then neither is E. Otherwise, for each L/Nj+1 that splits, solutions ¿* uniquely determine complements L*/Nj+1 of Nj/Nj+1 in L/Nj+1. Clearly, each L*/Nj+1 is also a complement of N/Nj+1 in E/Nj+1. Finally, we reconstruct each L* in a form Nj+1 ext# t y t G, and proceed to the next step. Observe that at each step it is enough to consider complements only up to conjugacy. Reduction up to conjugacy can be described by an action on the set of solutions ¿* that determine complements, see [3] and [8, Chapter 8] for more details. 4 An improved algorithm for testing whether the lifted group splits The general method described in Section 3 will be now applied in the context of lifting automorphisms along regular covering projections. Let Z: A(X) ^ N be a voltage function associated with a solvable regular covering projection p: X ^ X of connected graphs, and let G < Aut(X) lift to G. We derive an algorithm for testing whether the lifted group G is a split extension of CT(p) by G. In contrast with [17] we avoid the combinatorial reconstruction not only of the covering 154 Ars Math. Contemp. 11 (2016) 101-106 graph X and the lifted group G, but also of the all intermediate elementary abelian regular covering projections pj : Xj ^ Xj_ 1 in the decomposition X = X„ X„_i ^ • • • ^ Xi ^ Xo = X of p arising from a characteristic series N = N0 > Ni > • • • > Nr = 1 with elementary abelian factors Nj_1/Nj. Consequently, we neither reconstruct the graphs Xj nor the intermediate complements acting on Xj. Instead, we first reconstruct G in a form of a crossed product extension N ext#,F G derived from the voltage function Z: A(X) ^ N. Recall from Preliminaries that, since G lifts, for each g g G, there exists an automorphism g#v of N uniquely determined by a map ZW* ^ Zg(W*), where W* ranges over all fundamental closed walks in X rooted at v. As it is proved in [15], choosing a base vertex v, the function #: G ^ Aut(N), given by #: g^g#v, is in fact the weak action, while the factor set F: G x G ^ N is given by F: (gi, g2) ^ g#v (ZQ)(Zgi(Q))-1, for a walk Q from g2(v) to v. In view of the approach in Section 3, if G has a presentation (S | R) we actually only need to know the automorphisms g#v for all gj g S and, for each rj = gj • • • gjt g R, the values F(gjk, gjfc+1 • • • gjt) for k = 1,..., t - 1. As each g#v is uniquely determined by ZW* ^ Zgj(W*), we only store the voltages ZW* of the fundamental closed walks W* at v together with the voltages Zg»(W*) of the mapped walks. All these data can be efficiently computed, for instance, by using breadth first search on X that starts at root v. Finally, with these data in hand we simply follow the approach described in Subsection 3.2. 5 Performance In order to verify the effectiveness of the proposed algorithm we compare its performance with the previous version (called ISA, see [17]). The new version, called ISAI from now on, has been implemented in Magma. The source code of both versions is available online [18]. A test has been performed on a subset of the database described in [17]. In particular, we have selected solvable regular covering projections for the complete graph K5, the Petersen graph GP(5, 2), the Ljubljana graph L [4], and the graph F258A [2] along which the full automorphism group lifts. Elementary abelian coverings have been eliminated since ISAI actually coincides with ISA on such coverings. Both algorithms were run on an 2.93 GHz Quad-Core Intel® Xeon® processor X7350 at the Faculty of Mathematics and Physics, University of Ljubljana. Results are gathered in Tables 1-4. The first column shows the order of the covering graph, while the second one describes the type of the voltage group: solvable, but not abelian; or, abelian, but not elementary abelian. Further, the notation used in the third column for identifying the voltage group is the library number in the database of small groups in MAGMA. Execution times given in seconds (CPU time) are displayed in the fourth and the fifth column (for ISA and ISAI, respectively). The last column indicates whether the corresponding lift of the full automorphism group splits. As can be seen from results, ISAI is clear winner of the comparison. R. Pozar: Testing whether the lifted group splits 155 Table 1: Performance comparison for the complete graph K5 Order of covering Type of voltage Library number of graph group voltage group tISA (s) tISAI(s) Split? 30 Solvable <6, 1> 0.010 0.010 true 120 Solvable (24, 12> 0.050 0.040 true 240 Solvable <48, 28> 0.520 0.090 false 480 Solvable <96, 230> 0.350 0.040 true 640 Solvable <128, 2326> 1.530 0.050 true 960 Solvable <192, 1542> 1.530 0.060 true 1250 Abelian <250,15> 0.020 0.050 false 1280 Solvable <256, 55642> 1.670 0.070 true Table 2: Performance comparison for the Petersen graph Order of covering Type of voltage Library number of graph group voltage group tISA (s) tISAI(s) Split? 80 Solvable <8, 4> 0.020 0.060 false 360 Solvable <36, 10> 0.020 0.020 true 720 Solvable <72, 24> 0.020 0.020 false 1080 Solvable <108, 17> 0.610 0.040 true 1280 Solvable <128, 2321> 1.770 0.020 false 1620 Solvable <162, 54> 0.020 0.020 true 2160 Solvable <216, 33> 0.030 0.030 false 2500 Abelian <250, 15> 0.030 0.030 false 2560 Solvable <256, 55628> 1.810 0.030 false Table 3: Performance comparison for the Ljubljana graph L Order of covering Type of voltage Library number of graph group voltage group tISA (s) tISAI(s) Split? 896 Solvable <8, 4> 0.650 0.030 true 1344 Solvable <12, 3> 0.560 0.040 true 1792 Abelian <16, 2> 0.630 0.030 true 2352 Solvable <21, 1> 0.600 0.030 true 2688 Solvable <24, 11> 3.090 0.040 true Table 4: Performance comparison for the graph F258A Order of covering Type of voltage Library number of graph group voltage group tISA (s) tISAI(s) Split? 2064 Solvable <8, 4> 2.660 0.120 true 3096 Abelian <12, 5> 2.720 0.150 false 4128 Abelian <16, 2> 2.670 0.130 true Acknowledgement. The author would like to thank Aleksander Malnic for enlightening discussions. 156 Ars Math. Contemp. 11 (2016) 101-106 References [1] W. Bosma, J. Cannon, C. Playoust, The Magma algebra system I: The user language, J. Symb. Comput. 24 (1997), 235-265. [2] I. Z. Bouwer (ed.), The Foster Census, Charles Babbage Research Centre, Winnipeg, 1988. [3] F. Celler, J. Neubser, C. R.B. Wright, Some remarks on the computation of complements and normalizers in solvable groups, Acta Applicandae Mathematicae 21 (1990), 57-76. [4] M. D. E. Conder, A. Malnic, D. Marusic, T. Pisanski, P. Potocnik, The cubic edge-but not vertex-transitive graph on 112 vertices, J. Graph Theory 50 (2005), 25-42. [5] M. D. E. Conder, A. Malnic, D. Marusic, P. Potocnik, A census of cubic semisymmetric graphs on up to 768 vertices, J. Algebraic Combin. 23 (2006), 255-294. [6] S. F. Du, J. H. Kwak, M. Y. Xu, 2-arc-transitive regular covers of complete graphs having the covering transformation group Zp, J. Combin. Theory Ser. B 93 (2005), 73-93. [7] J. L. Gross, T. W. Tucker, Topological Graph Theory, Wiley - Interscience, New York, 1987. [8] D. Holt, B. Eick, E. A. O'Brien, Handbook of Computational Group Theory, Chapman and Hall/CRC, Boca Raton London New York Washington D.C., 2005. [9] M. Knor, P. Potocnik, Efficient domination in cubic vertex-transitive graphs, European J. Combin. 33 (2012), 1755-1764. [10] I. Kovacs, K. Kutnar, D. Marusic, Classification of edge-transitive rose window graphs, J. Graph Theory 65 (2010), 216-231. [11] S. McLane Homology, Springer-Verlag, Berlin Gottingen Heidelberg, 1963. [12] A. Malnic, Group actions, coverings and lifts of automorphisms, Discrete Math. 182 (1998), 203-218. [13] A. Malnic, D. Marusic, P. Potocnik, On cubic graphs admitting an edge-transitive solvable group, J. Algebraic Combin. 20 (2004), 99-113. [14] A. Malnic, R. Nedela, M. Skoviera, Lifting graph automorphisms by voltage assignments, European J. Combin. 21 (2000), 927-947. [15] A. Malnic, R. PoZar, On the Split Structure of Lifted Groups, Ars Math. Contemp. 10 (2016) 113-134. [16] P. Potocsnik, Edge-colourings of cubic graphs admitting a solvable vertex-transitive group of automorphisms, J. Combin. Theory Ser. B 91 (2004), 289-300. [17] R. Pozsar, Some computational aspects of solvable regular covers of graphs, J. Symb. Comput. 70 (2015), 1-13. [18] R. PoZar, http://osebje.famnit.upr.si/~rok.pozar. [19] J. X. Zhou, Y. Q. Feng, Semisymmetric elementary abelian covers of the Heawood graph, Discrete Math 310 (2010), 3658-3662. ARS MATHEMATICA CONTEMPORANEA Also available at http://amc-journal.eu ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 11 (2016) 157-173 On factorisations of complete graphs into circulant graphs and the Oberwolfach problem Brian Alspach School of Mathematical and Physical Sciences, University of Newcastle, Callaghan, NSW 2308, Australia. Darryn Bryant School of Mathematics and Physics, The University of Queensland, Qld 4072, Australia. Daniel Horsley School of Mathematical Sciences, Monash University, Vic 3800, Australia. Barbara Maenhaut, Victor Scharaschkin School of Mathematics and Physics, The University of Queensland, Qld 4072, Australia. Received 21 November 2014, accepted 5 August 2015, published online 3 October 2015 Various results on factorisations of complete graphs into circulant graphs and on 2-factorisations of these circulant graphs are proved. As a consequence, a number of new results on the Oberwolfach Problem are obtained. For example, a complete solution to the Oberwolfach Problem is given for every 2-regular graph of order 2p where p = 5 (mod 8) is prime. Keywords: Oberwolfach problem, graph factorisations, graph decompositions, 2-factorisations. Math. Subj. Class.: 05C70, 05C51, 05B30 E-mail addresses: brian.alspach@newcastle.edu.au (Brian Alspach), db@maths.uq.edu.au (Darryn Bryant), danhorsley@gmail.com (Daniel Horsley), bmm@maths.uq.edu.au (Barbara Maenhaut), victors@maths.uq.edu.au (Victor Scharaschkin) ©® This work is licensed under http://creativecommons.org/licenses/by/3.0/ Abstract 158 Ars Math. Contemp. 11 (2016) 101-106 1 Introduction The Oberwolfach problem was posed by Ringel in the 1960s and is first mentioned in [16]. It concerns graph factorisations. A factor of a graph is a spanning subgraph and a factorisation is a decomposition into edge-disjoint factors. A factor that is regular of degree k is called a k-factor. If each factor of a factorisation is a k-factor, then the factorisation is called a k-factorisation, and if each factor is isomorphic to a given graph F, then we say it is a factorisation into F. Let F be an arbitrary 2-regular graph and let n be the order of F. If n is odd, then the Oberwolfach Problem OP(F) asks for a 2-factorisation of Kn into F, and if n is even, then OP(F) asks for a 2-factorisation of Kn - I into F, where Kn - I denotes the graph obtained from Kn by removing the edges of a 1-factor. The Oberwolfach Problem has been solved completely when F consists of isomorphic components [1, 3,18], when F has exactly two components [29], when F is bipartite [5,17] and in numerous special cases. See [7] for a survey of results up to 2006. It is known that there is no solution to OP(F) for F G {C3 UC3, C4 UC5, C3 UC3 UC5, C3 UC3 UC3 UC3}, but a solution exists for every other 2-regular graph of order at most 40 [13]. In [8], it was shown that the Oberwolfach Problem has a solution for every 2-regular graph of order 2p where p is any of the infinitely many primes congruent to 5 (mod 24), and for every 2-regular graph whose order is in an infinite family of primes congruent to 1 (mod 16). In this paper we extend these results as follows. We show that OP(F) has a solution for every 2-regular graph of order 2p where p is any prime congruent to 5 (mod 8) (see Theorem 4.2), and we obtain solutions to OP(F) for broad classes of 2-regular graphs in many other cases (see Theorems 4.3 and 4.4). We also obtain results on the generalisation of the Oberwolfach Problem to factorisations of complete multigraphs into isomorphic 2-factors (see Theorem 5.4). Our results are obtained by constructing various factorisations of complete graphs into circulant graphs in Section 2, and then showing in Section 3 that these circulant graphs can themselves be factored into isomorphic 2-regular graphs in a wide variety of cases. 2 Factorising complete graphs into circulant graphs Let G = (G, •) be a finite group with identity e and let S be a subset of G such that e G S and s G S implies s-1 G S. The Cayley graph on G with connection set S, denoted Cay(G ; S), has the elements of G as its vertices and g is adjacent to g • s for each s G S and each g g G. A Cayley graph on a cyclic group is called a circulant graph. We use the following standard notation. The ring of integers modulo n is denoted by Zn, the multiplicative group of units modulo n is denoted by Z*n and, when b divides |Z^|, the subgroup {xb : x G Zn} of index b in Zn is denoted by (Zn)b. In this section we consider factorisations of Kn for n odd (in Section 2.1) and of Kn -I for n even (in Section 2.2) into circulant graphs. A 2-regular graph is a circulant if and only if its components are all isomorphic. Thus, for each 2-regular circulant graph F, there exists a factorisation of Kn (if F has odd order) or of Kn - I (if F has even order) into F ; except that there is no such factorisation when F G {C3 U C3, C3 U C3 U C3 U C3}. Considerably less is known for factorisations into circulant graphs of degree greater than 2. Some factorisations into Cay(Zn ; ±{1, 2}) and Cay(Zn ; ±{1, 2, 3,4}) are given in [4] and [8] respectively, and some further results, including results on self-complementary and almost self-complementary circulant graphs, appear in [2, 14, 15, 26]. B. Alspach et al.: On factorisations of complete graphs into circulant graphs and... 159 2.1 Factorising complete graphs of odd order In this subsection we will construct factorisations of complete graphs of odd order into isomorphic circulant graphs by finding certain partitions of cyclic groups. Problems concerning such partitions have been well studied, for example see [28], and existing results overlap with some of the results in this subsection. In particular, Theorem 2.3 below is a consequence of Lemma 3.1 of [24]. Lemma 2.1. Let s be an integer, let p = 1 (mod 2s) be prime, and let S = ±{di, d2,..., ds} Ç Zp. Further, suppose a and b are integers such that 2abs = p — 1, let G = (Zp)b, and let H = (Zp)bs. If di, d2,...,ds represent the s distinct cosets of G/H, then there exists a 2s-factorisation of Kp into Cay(Zp ; S). Proof. For each x G Zp let xS = {xy : y G S}. Since p is prime, Cay(Zp ; xS) = Cay(Zp ; S) for any x G Zp \ {0}. If there is a partition of Zp into sets x1S, x2S,..., xabS where xj G Zp \ {0} for i = 1,2,..., ab, then {Cay(Zp ; xjS ) : i = 1, 2,..., ab} is the required 2s-factorisation of Kp. We now present such a partition. Let w be a generator of Zp. Thus, H = w0, wbs, w2bs,..., w(2a-1)bs, and wabs = —1 G H. Let A = w0,wbs,w2bs,.. .,w(a-1)bs, so that H = A U-A (A is a set of representatives for the cosets in H of the order 2 subgroup of H). Since d1,d2,... ,ds represent distinct cosets of G/H, it is easy to see that {xS : x G A} is a partition of G. Thus, if B is a set of representatives for the cosets of Zp/G, then {xyS : x G A, y G B} is the required partition of Zp. □ Note that upon putting s = 1 in Lemma 2.1 we obtain the Hamilton decomposition {Cay(Zp ; {±1}), Cay(Zp ; {±2}),..., Cay(Zp ; {±^})} of Kp. We will be mostly interested in applications of Lemma 2.1 where the connection set S is ±{1, 2}, ±{1,2,3}, ±{1,3,4} or ±{1, 2, 3,4}. The factorisations given by Lemma 2.1 have the property that each factor is invariant under the action of Zp. It is worth mentioning that for S G {±{1,2}, ±{1, 2, 3}, ±{1,3,4}, ±{1,2, 3,4}}, the construction given in Lemma 2.1 yields every 2s-factorisation of Kp into Cay(Zp ; S) with this property. This follows from the results in [9] and [22], together with Turner's result [30] that for p prime Cay(Zp ; S) = Cay(Zp ; S') if and only if there exists an a G Zp such that S ' = aS. Theorem 2.2. Ifp = 1 (mod 4) is prime and 4 divides the order of k in Zp, then there is a factorisation of Kp into Cay(Zp ; ±{1, k}). Proof. Apply Lemma 2.1 with S = ±{1, k} taking G to be the subgroup of Zp generated by k, and H to be the index 2 subgroup of G. □ Theorem 2.3. Ifp = 1 (mod 6) is prime such that 2,3 G (Zp)3 and 6 G (Zp)3, then there is a factorisation of Kp into Cay(Zp ; ±{1, 2,3}). Proof. It follows from 2,3 G (Zp)3 and 6 G (Zp)3 that 1, 2 and 3 represent the three cosets of Zp/(Zp)3. Thus, we obtain the required factorisation by applying Lemma 2.1 with b = 1. □ Theorem 2.4. If p = 1 (mod 6) is prime such that 2,3,6 G (Zp)3, then there is a factorisation of Kp into Cay(Zp ; ±{1, 3,4}). 160 Ars Math. Contemp. 11 (2016) 101-106 Proof. It follows from 2, 3,6 £ (Zp)3 that 1, 3 and 4 represent the three cosets of Z;/(Zp)3. Thus, we obtain the required factorisation by applying Lemma 2.1 with b =1. □ The primes less than 1000 to which Theorem 2.3 applies are 7, 37,139,163,181, 241, 313, 337, 349, 379,409,421, 541, 571, 607, 631, 751, 859, 877, 937, and the primes less than 1000 to which Theorem 2.4 applies are 13,19, 79, 97,199, 211, 331, 373,463,487, 673, 709, 769, 823, 829, 883, 907. In the next theorem we show that there are infinitely many primes to which Theorem 2.3 applies, and also infinitely many primes to which Theorem 2.4 applies. Theorem 2.5. There are infinitely many values of p such that p is prime, p = 1 (mod 6), 2,3 £ (Z*)3 and 6 £ (Zp)3, and there are infinitely many values ofp such that p is prime, p = 1 (mod 6) and 2,3,6 £ (Z*)3. Proof. Assume p = 1 (mod 6). Let Fp be the field with p elements. We use standard definitions and results from algebraic number theory, as found in [20]. The result essentially follows from the Chebotarev Density Theorem. Let w be a primitive cube root of unity, A = be a cube root of 2 and p = a cube root of 3. Consider the following tower of fields: M = Q(w, A,p) D L = Q(w,A) D K = Q(w) D Q. Let OK, OL denote the rings of integers of K and L respectively. We may ignore the finitely many ramified primes. Thus let p be a prime number, sufficiently large that it is unramified in M, let p be a prime in K extending p and p a prime in L extending p. Let K = OK/p and L = OL/p be the residue fields. We view K as embedded in L via the map x + p ^ x + p. As p = 1 (mod 6), p splits in K and K = OK/p ~ Fp. Since M and L are splitting fields, M/K and L/K are Galois extensions. The Galois group of M/K is Gal (M/K) ~ Z3 x Z3 generated by the maps a: A ^ Aw and 8: P ^ pw. The Frobenius map of L/K is the map x ^ x|L|. The Frobenius element aL is the element of Gal(L/K) inducing the Frobenius map on L/K. (A priori aL could also depend on the choice of p extending p, but this is not the case since Gal(L/K) is abelian; see [20, IIL2.1].) Define af £ Gal(M/K) analogously. Then aL is the restriction of a^ to L by [20, m.2.3]. By definition of L, for all sufficiently large p = 1 (mod 6), 2 £ (Z*)3 if and only if L = K. But L = K if and only if aL is the identity map, and it follows that 2 £ (Z*)3 if and only if £ (8). Similarly, 3 £ (Z*)3 if and only if aM £ (a) and 6 £ (Zp)3 if and only if aM £ (a8). In summary: 2, 3 £ (Z*)3, 6 £ (Z*)3 ^ apM £ {a8, a282}. 2, 3,6 £ (Zp)3 ^^ af £{a28,a82}. The Chebotarev Density Theorem [20, V.10.4] implies that for each d £ Gal(M/K), the set of primes p of K (unramified in M) for which af = 0 is infinite. Thus each of the two conditions for af displayed above holds infinitely often. □ It is possible to describe the primes in Theorem 2.5 more explicitly. Given p = 1 (mod 6), factoring the ideal pOK and taking norms, one shows there exist unique c, d £ B. Alspach et al.: On factorisations of complete graphs into circulant graphs and... 161 Z with d > 0, gcd(c, d) = 1, c = 2 (mod 3) and 4p = (2c - 3d)2 + 27d2. Let t(p) = (c (mod 6), d (mod 6)). There are 9 possible values for t(p): (2,1), (2, 3), (2, 5), (5,0), (5,1), (5,2), (5,3), (5,4) and (5, 5). The Chebotarev density theorem implies that each of the 9 possible t(p) values occurs "equally often" (that is, for a subset of the primes p = 1 (mod 6) of relative density 1/9). Using cubic reciprocity [19, Ch. 9] one calculates that 2, 3 G (Z;)3 and 6 G (Zp)3 if and only if t(p) = (2,1) or (5,5), while 2,3, 6 G (Zp)3 if and only if t(p) = (2, 5) or (5,1). Each case occurs for 2/9 of the primes that are 1 (mod 6) . The above applications of Lemma 2.1 have all been with b =1. We note however that the conditions of Lemma 2.1 are never satisfied when S = ±{1, 2,3,4} and b =1. This is because 2 is a quadratic residue when p = 1 (mod 8), which means that both 1 and 4 are in H. The factorisations of Kp into Cay(Zp ; ±{1, 2,3,4}) in [8] were obtained by applying Lemma 2.1 with b = 2 so that G and H have index 2 and 8, respectively, in Zp. Another example where Lemma 2.1 can be applied with b =1 is when p = 919, S = ±{1, 2,3}, a = 51 and b = 3. This yields a factorisation of K9i9 into Cay(Z9i9; ±{1,2, 3}). Such a factorisation cannot be obtained by applying Lemma 2.1 with b =1 because 1, 2 and 3 are all cubes in Z;19. The following lemma can be used to obtain factorisations of Kp, for certain values of p, in which some of the factors are isomorphic to Cay(Zp ; ±{1,2, 3}) and the others are isomorphic to Cay(Zp ; ±{1,2, 3,4}). Lemma 2.6. Let p be prime, let H be the subgroup of Zp generated by { — 1,6}, and let d be the order of 2H in Z;/H. If there exist nonnegative integers a and ft such that d = 3a + 4ft, then there is a factorisation of Kp into a(p-1) copies of Cay(Zp ; ±{1,2,3}) and 1) copies of Cay(Zp ; ±{1,2, 3,4}). Proof. It is sufficient to partition Z; into a(pf1) 6-tuples of the form ±{x, 2x, 3x} and ^f1) 8-tuples of the form ±{x, 2x, 3x, 4x}. Since d = 3a + 4ft, there is a partition {{2ri-1H, 2riH, 2ri+1H} : i = 1,..., a}U {{2ri-1H, 2riH, 2ri+1H, 2ri+2H} : i = a + 1,..., a + ft} of {H, 2H,..., 2f-1H}. But 6 G H implies 2r^-1H = 3 • 2r*H for i =1, 2,..., a + ft. Thus, we can rewrite our partition of {H, 2H,..., 2f-1H} as {{Hi, 2Hi, 3Hj} : i = 1,..., a} U {{Hi, 2Hj, 3Hj, 4Hj} : i = a + 1,..., a + ft}, where Hi = 2r* H for i = 1,..., a + ft. Since -1 G H, for i = 1,..., a, Hi U 2Hi U 3Hi can be partitioned into ^ 6-tuples of the form ±{x, 2x, 3x}, and for i = a + 1,..., a + ft, Hi U 2Hi U 3Hi U 4H can be partitioned into ^ 8-tuples of the form ±{x, 2x, 3x, 4x}. If R is the set of all a^ of these 6-tuples and S is the set of all ft ^ of these 8-tuples, then RUS is a partition of the subgroup G = H U 2H U • • • U 2d-1H of Z;. Thus, if g1, g2,..., gt (t = f-!) represent the cosets of Zp/G, then {giR : R G R,i = 1,..., t} U {giS : S G S ,i = 1,. ..,t} 162 Ars Math. Contemp. 11 (2016) 101-106 is a partition of Z* into ta^ = a(pd 1) 6-tuples of the form ±{x, 2x, 3x} and tft^ = 1) 8-tuples of the form ±{x, 2x, 3x, 4x}. This is the required partition of Zp. □ Notice that any 6-factorisation of Kp into Cay(Zp ; ±{1, 2,3}) given by Lemma 2.1 can also be obtained via Lemma 2.6. For if 1, 2, 3 represent the three distinct cosets of G/H (where G = (Zp)b and H = (Z*)3b, andp - 1 = 6a6), then it follows that {-1,6} Ç H and 2H has order 3 in G/H. This means that if H' is the subgroup of Zp generated by {-1,6}, then H' < H and 3 divides the order d of 2H' in Zp/H'. Thus, we can obtain our 6-factorisation of Kp into Cay(Zp ; ±{1,2,3}) by applying Lemma 2.6 with a = d and ft = 0. Similarly, any 8-factorisation of Kp into Cay(Zp ; ±{1, 2, 3,4}) given by Lemma 2.1 can be obtained by applying Lemma 2.6 with a = 0 and ft = 4. However, Lemma 2.6 gives us additional factorisations such as the following. When p = 101 we have H = ±{1,6,14,17,36}, and 2H has order d =10 in Z*/H. Taking a = 2 and ft = 1, we obtain a factorisation of K101 into 10 copies of Cay(Zp ; ±{1,2,3}) and 5 copies of Cay(Zp ; ±{1, 2, 3,4}). Of course, 101 is neither 1 (mod 6) nor 1 (mod 8), so there is neither a 6-factorisation nor an 8-factorisation of K101. 2.2 Factorising complete graphs of even order In this section we construct factorisations of K2p - I where the factors are all isomorphic to Cay(Z2p ; ±{1, 2}) or all isomorphic to Cay(Z2p ; ±{1, 2, 3,4}). We do this by considering K2p - I as a Cayley graph on a dihedral group and partitioning its connection set to generate the factors. The dihedral group D2p of order 2p has elements r0, r1, r2,..., rp-1, s0, s1, s2,..., sp-1 and satisfies where arithmetic of subscripts is carried out modulo p. Lemma 2.7. Ifp > 3 is prime, then Cay(D2p ; {r±i, sj, si+j}) = Cay(Z2p ; ±{1, 2}) for all i G Zp \ {0} and all j G Zp. Proof. An isomorphism is given by ro ri r2i r3i . .. r(p-i)i Sj Si+j s2i+j s3i+j . . . S(p-1)i+j 1 1 1 | . .. | | 1 1 | . .. | 0 2 4 6 . .. 2p - 2 2p - 1 1 3 5 . .. 2p - 3 □ Lemma 2.8. Ifp > 5 is prime, then Cay(D2p; {r±i , r±2i, sj, si+j, s2i+j, s3i+j }) = Cay(Z2p ; ±{1,2,3,4}) for all i G Zp \ {0} and all j G Zp. B. Alspach et al.: On factorisations of complete graphs into circulant graphs and... 163 Proof. An isomorphism is given by ro r r2i r3i ... r(p_i)i Sj si+j «2i+j s3i+j . .. s(p-i)i+j 0 2 4 6 ... 2p - 2 2p - 3 2p - 1 1 3 ... 2p - 5 □ Theorem 2.9. For each odd prime p, there is a factorisation of K2p - I into Cay(Z2p ; ±{1, 2}). Proof. The required factorisation is F = {Xi : i e Zp \ {0}} where Xj = Cay(D2p ; {r±2i, Sj, s_j}) for i e Zp \ {0}. Note that Xi = X-i so |F| = p—1 as required. Lemma 2.7 guarantees that Xi = Cay(Z2p ; ±{1, 2}) for each i e Zp \ {0}. Also, r0 is the identity of D2p and each element of D2p \ {r0, s0} occurs in exactly one Xi. Thus, F is a factorisation of Cay(D2p ; D2p \ {ro, so}) = K2p - I where the 1-factor I is Cay(D2p ; {so}). □ Following work of Davenport [10, Theorem 5] and Weil, a special case of a result due to Moroz [23] yields the following. If p = 1 (mod 4) is prime and p > 8 x 106, then there exists an integer x such that x, x +1, x + 2, x + 3 represent all four distinct cosets of Zp/(Zp)4. A computer search using PARI/GP [25] verifies in a few minutes that such an x also exists for all p < 8 x 106 with p = 1 (mod 4), with the exceptions p =13 andp = 17. Thus, we have the following result. Lemma 2.10. If p = 1 (mod 4) is prime with p e {13,17}, then there exists an x e Zp such that x, x +1, x + 2 and x + 3 represent all four distinct cosets of Zp/(Zp )4. Theorem 2.11. If p = 5 (mod 8) is prime, then there is a factorisation of K2p - I into Cay(Z2p ; ±{1,2,3,4}); except that there is no factorisation of K26 - I into Cay(Z2p ; ±{1, 2, 3,4}). Proof. We first observe that there is no factorisation of K26 - I into graph Cay(Z2p; ±{1,2,3,4}). If such a factorisation exists, then we can assume without loss of generality that the vertex set is Z26 and that Cay(Z26 ; ±{1,2,3,4}) is a factor. But no edge of Cay(Z26 ; ±{7}) (for example) occurs in a complete subgraph of order 5 in Cay(Z26 ; ±{5,6,7, 8, 9,10,11,12,13}). Since Cay(Z26 ; ±{1, 2,3,4}) contains a complete subgraph of order 5, it follows that there is no factorisation of K26 - I into graph Cay(Z2p ; ±{1, 2, 3, 4}). Let p = 5 (mod 8) be prime with p = 13. By Lemma 2.10, there exists an x e Zp such that x, x + 1, x + 2 and x + 3 represent all four distinct cosets of Zp/(Zp)4. By Lemma 2.8, Cay(D2p ; {r±i, r±2, sx, sx+i, s^+2, sx+3}) = Cay(Z2p ; ±{1, 2, 3, 4}). Now let H = (Zp)4 act on the subscripts of the connection set {r±1, r±2, sx, sx+1, sx+2, sx+3} and consider the collection S1, S2,..., Sp-1 of subsets of D2p thus formed. 164 Ars Math. Contemp. 11 (2016) 101-106 We show that {Cay(D2p ; Sj) : i = 1,2,..., } is a factorisation of K2p - I into Cay(Z2p ; ±{1,2,3,4}). If h G H, then Cay(D2p ; {r±h r±2ho Sh(x+l), sh(x+2), sh(x+3)}) = Cay(Z2p ; ±{1, 2, 3, 4}) by Lemma 2.8 (indeed this is true for any h G Zp) so it remains only to verify that we have a decomposition of K2p - I. To do this we observe that S1, S2,..., Sp-i partitions D2p \ {r0, so} (r0 is the identity in D2p and Cay(D2p ; {so}) is a 1-factor in K2p). We have Hx U H(x + 1) U H(x + 2) U H(x + 3) = Zp \ {0}. Also, since p = 5 (mod 8) we have -1 G (Zp2, -1 G (Z;)4 and 2 G (Z;)2 (by the law of quadratic reciprocity). Thus, {±h : h G H} U {±2h : h G H} = Zp \ {0}. So Si, S2,..., Sp— does indeed partition D2p \ {r0, s0} and we have the required decomposition. □ 3 2-factorisations of circulant graphs In this section we present various results on 2-factorisations of circulant graphs, beginning with a couple of known results. Lemma 3.1 was proved independently in [4] and [27], and is a special case of a result in [6]. Lemma 3.2 was proved in [8]. Lemma 3.1. ([4, 27]) If n > 5 and F is any 2-regular graph of order n, then there is a 2-factorisation of Cay(Zn ; ±{1, 2}) into a copy of F and a Hamilton cycle. Lemma 3.2. ([8]) If n > 9 and F is a 2-regular graph of order n, then there is a 2-factorisation of Cay(Zn ; ±{1,2,3,4}) into F with the definite exceptions of F = C4 U C5 and F = C3 U C3 U C3 U C3 U C3, and the following possible exceptions. (1) F = C3 U C3 U • • • U C3 when n = 3, 6 (mod 9), n > 21. (2) F = C4 U C4 U • • • U C4 when n = 4 (mod 8), n > 20. (3) F = C3 U C3 U • • • U C3 U C4 when n = 1 (mod 3), n > 19. (4) F = C3 U C4 U C4 U • • • U C4 when n = 7 (mod 8), n > 23. We now obtain results on 2-factorisations of Cay(Zn ; ±{1,2, 3}), but first we need some definitions and notation. For each m > 1, the graph with vertex set {0,1,..., m + 2} and edge set {{i, i + 1}, {i + 1, i + 3}, {i, i + 3} : i = 0,1,..., m - 1} is denoted by jm2'3. If F is a 2-regular graph of order m, and there exists a decomposition {H1, H2, H3} of J,^2'3 into F such that (1) V(H1) = {0, 1,. .., m + 2} \ {m, m + 1, m + 2}, (2) V(H2) = {0,1,..., m + 2} \ {0, 2, m + 1}, and (3) V(H3) = {0,1,..., m + 2} \ {0,1, m + 2}, then we shall write J,^2'3 ^ F. Notice that for i = 1,2,3, the subgraph Hj of J,^2'3 contains exactly one vertex from each of {0, m}, {1, m + 1} and {2, m + 2}. Lemma 3.3. If n > 7 and F is a 2-regular graph of order n such that there exists a decomposition J^2'3 ^ F, then there exists a 2-factorisation of Cay(Zn ; ±{1, 2,3}) into F. B. Alspach et al.: On factorisations of complete graphs into circulant graphs and... 165 Proof. For each i G {0,1, 2}, identify vertex i of J'2'3 with vertex n + i. The resulting graph is Cay(Zn ; ±{1, 2, 3}) and the 2-regular graphs in the decomposition J^'2'3 ^ F become the required 2-factors. □ Lemma 3.4. If F and F' are vertex-disjoint 2-regular graphs and there exist decompositions J|t/2(f)| ^ F and J"|V'2('f')| ^ F', then there exists a decomposition J"|t>2('j3)| + |V(F/) ^ F II F '. Proof. Let r and s be the respective orders of F and F', let {H^ H2, H3} be a decomposition J,1'2'3 ^ F and let {Hi, H2, H3} be a decomposition J1'2'3 ^ F'. Apply the translation x ^ x + r to the decomposition {Hi, H2, H3} to obtain a decomposition {Hi', H2', H3'} of a copy of J1'2'3 having vertex set r, r + 1,...,r + s + 2 (H/' being the translation of H/ for i G {1, 2, 3}). It is clear that D = {Hi U Hi', H U H2', H3 U H3'} is a decomposition J1|2i'3 ^ F U F'. Properties (1)-(3) in the definition of J,1'2'3 ^ F ensure that H and H/' are vertex-disjoint for i G {1, 2,3}, and that (1) V(H1 U Hi') = {0,1,. .., r + s + 2} \ {r + s, r + s + 1, r + s + 2}, (2) V(H2 U H2') = {0,1,..., r + s + 2} \ {0, 2, r + s + 1}, and (3) V(H3 U H3') = {0,1,..., r + s + 2}\{0,1,r + s + 2}. □ Lemma 3.5. For each m > 4, J^2'3 ^ Cm. Proof. For m G {4,5,6}, H1, H2, H3 are as defined in the following table. m Hi H2 H3 4 (0,1, 2, 3) (1, 3, 6,4) (2,4, 3, 5) 5 (0,1, 2,4, 3) (1, 3, 5, 7,4) (2, 3, 6,4, 5) 6 (0,1, 2, 5,4, 3) (1, 3, 5, 8, 6,4) (2,4, 7, 5, 6, 3) For m > 7 and odd • Hi contains the edges {0,1}, {1,2}, {0, 3}, {m - 2, m - 1} and {i, i + 2} for i G {2, 3, .. ., m - 3}, • H2 contains the edges {1, 3}, {m — 2, m}, {m, m + 2}, {m — 1, m + 2}, {i, i + 1} for i G {4,6,..., m - 3} and {i, i + 3} for i G {1,3,..., m - 4}, and • H3 contains the edges {2, 3}, {m - 2, m +1}, {m -1, m}, {m -1, m +1}, {i, i + 1} for i G {3, 5,..., m - 4} and {i, i + 3} for i G {2,4,..., m - 3}. For m > 8 and even • H1 contains the edges {0,1}, {1,2}, {3,4}, {0, 3}, {2,5}, {m - 2,m - 1} and {i,i + 2} for i G {4, 5,..., m - 3}, • H2 contains the edges {1, 3}, {1,4}, {3, 5}, {m-2, m}, {m, m+2}, {m-1, m+2}, {i, i + 1} for i G {5, 7,..., m - 3} and {i, i + 3} for i G {4,6,..., m - 4}, and • H3 contains the edges {2,4}, {m - 2, m +1}, {m -1, m}, {m - 1,m +1}, {i,i + 1} for i G {2,4,..., m - 4} and {i, i + 3} for i G {3, 5,..., m - 3}. □ 166 Ars Math. Contemp. 11 (2016) 101-106 Lemma 3.6. For m = 8 and for each m > 10, J^2'3 ^ C3 U Cm-3. Proof. For m G {8,10,11}, Hi, H2, H3 are as defined in the following table. m 8 Hi = (4, 6, 7) U (0,1, 2, 5, 3) H2 = (7, 8,10) U (1, 3, 6, 5,4) H3 = (2, 3,4) U (5, 7, 9, 6, 8) 10 Hi = (7, 8, 9) U (0,1, 2,4, 5, 6, 3) H2 = (1, 3,4) U (5, 7, 6, 9,12,10, 8) H3 = (2, 3, 5) U (4, 6, 8,11, 9,10, 7) 11 Hi = (8, 9,10) U (0,1, 2,4, 5, 7, 6, 3) H2 = (1, 3,4) U (5, 6, 9,11,13,10, 7, 8) H3 = (2, 3, 5) U (4, 6, 8,11,10,12, 9, 7) For m > 12 and even • Hi consists of the 3-cycle (m - 3, m - 2, m - 1) and the (m - 3)-cycle with edges {0,1}, {0, 3}, {1, 2}, {2, 4}, {m - 5, m - 4}, {i, i + 1} for i G {4, 6,..., m - 6} and {i, i + 3} for i G {3,5,..., m - 7}, • H2 consists of the 3-cycle (1, 3,4) and the (m - 3)-cycle with edges {5,7}, {m - 5, m - 2}, {m - 4, m - 3}, {m - 2, m}, {m, m + 2}, {m - 1, m + 2}, {i, i + 1} for i G {5, 7,..., m - 7} and {i, i + 3} for i G {6,8,..., m - 4}, and • H3 consists of the 3-cycle (2,3,5) and the (m - 3)-cycle with edges {4,6}, {4,7}, {m - 2, m + 1}, {m - 3, m}, {m - 1, m}, {m - 1, m +1} and {i, i + 2} for i G {6, 7,..., m - 4}. For m > 13 and odd • Hi consists of the 3-cycle (m - 3, m - 2, m - 1) and the (m - 3)-cycle with edges {0,1}, {0, 3}, {1, 2}, {2, 4}, {3, 6}, {4, 5}, {5, 7}, {m - 5, m - 4}, {i, i + 1} for i G {7, 9,..., m - 6} and {i, i + 3} for i G {6, 8,..., m - 7}, • H2 consists of the 3-cycle (1, 3,4) and the (m - 3)-cycle with edges {5,6}, {m - 5, m - 2}, {m - 4, m - 3}, {m - 2, m}, {m, m + 2}, {m - 1, m + 2}, {i, i + 1} for i G {6, 8,..., m - 7} and {i, i + 3} for i G {5,7,..., m - 4}, and • H3 consists of the 3-cycle (2,3,5) and the (m - 3)-cycle with edges {4,6}, {4,7}, {m - 2, m + 1}, {m - 3, m}, {m - 1, m}, {m - 1, m +1} and {i, i + 2} for i G {6, 7,..., m - 4}. □ Lemma 3.7. Let n > 7 and let F be a 2-regular graph of order n. If v3(F) < v5 (F) + Vj(F) where vm(F) denotes the number of m-cycles in F, then there exists a 2-factorisation of Cay(Zn; ±{1,2, 3}) into F. Proof. If n > 7 and F is a 2-regular graph of order n such that v3(F) < v5(F) + Y^i=7 ^¿(F), then F can be written as a vertex-disjoint union of 2-regular graphs Gi, G2, ..., Gt where each Gj is isomorphic to either • Cm with m > 4, or B. Alspach et al.: On factorisations of complete graphs into circulant graphs and... 167 • C3 U Cm-3 with m = 8 or m > 10. 12 3 By Lemmas 3.5 and 3.6 we have a decomposition J|V(g )| ^ G for i = 1,2,... ,t. Applying Lemma 3.4 we obtain a decomposition J,1'2'3 ^ F, and from this we obtain the required 2-factorisation of Cay(Zn; ±{1, 2, 3}) into F by applying Lemma 3.3. □ We can obtain an analogue of Lemma 3.7 for Cay(Zn ; ±{1, 3,4}) by using similar methods, but we will require F to have girth at least 6. The graph with vertex set {0,1,..., m + 3} and edge set {{i, i + 1}, {i + 1, i + 4}, {i, i + 4} : i = 0,1,... ,m -1} is denoted by J,13'4. We write Jm3'4 ^ F when there exists a decomposition {H1, H2, H3} of J,^3'4 into a 2-regular graph F such that (1) V(H1) = {0, 1,.. ., m + 3} \ {m, m + 1, m + 2, m + 3}, (2) V(H2) = {0,1,..., m + 3} \ {0, 3, m + 1, m + 2}, and (3) V(H3) = {0,1,..., m + 3} \ {0,1, 2, m + 3}. Notice that for i = 1, 2, 3, the subgraph Hj of J^3'4 contains exactly one vertex from each of {0, m}, {1, m + 1}, {2, m + 2} and {3, m + 3}. It is clear that the proofs of Lemmas 3.3 and 3.4 can be easily modified to give the following two results. Lemma 3.8. If n > 9 and F is a 2-regular graph of order n such that there exists a decomposition J^'3'4 ^ F, then there exists a 2-factorisation of Cay(Zn ; ±{1, 3,4}) into F. Lemma 3.9. If F and F' are vertex-disjoint 2-regular graphs and there exist decompositions J|T>3('i4)| ^ F and J|V3(f')| ^ F', then there exists a decomposition J"|T>3'i4)| + |V(F/)| ^ FuF '. Lemmas 3.8 and 3.9 allow us to obtain 2-factorisations of Cay(Zn ; ±{1, 3,4}) via the same method we used in the case of Cay(Zn ; ±{1, 2, 3}), providing we can find appropriate decompositions of J^3'4. We now do this. Lemma 3.10. For m = 6, m = 7 and each m > 9, J,^3'4 ^ Cm. Proof. For m G {6,7,9,10}, H1, H2, H3 are as defined in the following table. m Hi H2 H3 6 (0,1, 5, 2, 3,4) (1, 2, 6, 9, 5,4) (3, 6, 5, 8,4, 7) 7 (0,1, 2, 3, 6, 5,4) (1,4, 7,10, 6, 2, 5) (3,4, 8, 5, 9, 6, 7) 9 (0,1, 2, 3, 7, 6, 5, 8,4) (1,4, 7, 8,12, 9, 6, 2, 5) (3,4, 5, 9, 8,11, 7,10, 6) 10 (0,1, 2, 3, 6, 9, 5, 8, 7,4) (1,4, 8, 9,13,10, 7, 6, 2, 5) (3,4, 5, 6,10, 9,12, 8,11, 7) For m > 11 and odd • H1 contains the edges {0,1}, {0,4}, {1, 2}, {2,3}, {3,7}, {5,6}, {m - 3, m - 2}, {m — 5, m — 1}, {m — 4, m — 1} and {i, i + 4} for i G {4, 5,..., m — 6}, • H2 contains the edges {1,4}, {1,5}, {2,5}, {2,6}, {4,7}, {m, m + 3}, {m — 1, m + 3}, {m — 2, m — 1}, {m — 3, m}, {i, i + 1} for i G {7, 9,..., m — 4} and {i, i + 3} for i G {6,8,..., m — 5}, and 168 Ars Math. Contemp. 11 (2016) 101-106 • H3 contains the edges {3, 4}, {3, 6}, {4, 5}, {m-1, m}, {m—2, m+1}, {m-1, m+ 2}, {m — 4, m}, {m — 3, m + 1}, {m — 2, m + 2}, {i, i + 1} for i G {6, 8,..., m — 5} and {i, i + 3} for i G {5,7,..., m — 6}. For m > 12 and even • Hi contains the edges {0,1}, {0,4}, {1,2}, {2,3}, {3, 6}, {4, 7}, {5, 6}, {5,9}, {m — 5, m — 2}, {m — 4, m — 3}, {m — 4, m — 1}, {m — 2, m — 1}, {i, i + 1} for i G {7, 9,..., m — 7} and {i, i + 3} for i G {8,10,..., m — 6}, • H2 contains the edges {1,4}, {1,5}, {2,5}, {2, 6}, {4, 8}, {m — 6,m — 2}, {m — 5, m — 4}, {m — 5, m — 1}, {m — 3, m — 2}, {m — 3, m}, {m — 1, m+3}, {m, m+3}, {i, i + 1} for i G {6,8,..., m — 8} and {i, i + 3} for i G {7, 9,..., m — 7}, and • H3 contains the edges {3,4}, {3,7}, {4,5}, {5, 8}, {6, 9}, {m — 6, m — 5}, {m — 4, m}, {m — 3, m +1}, {m — 2, m + 1}, {m — 2, m + 2}, {m — 1, m}, {m — 1, m + 2} and {i, i + 4} for i G {6,7,..., m — 7}. □ Lemma 3.11. For each m > 14, J,^3'4 ^ C8 U Cm-8. Proof. For m G {14,15,16,17}, H1, H2, H3 are as defined in the following table. m 14 Hi = (0,1, 2, 3, 7, 8, 5,4) U (6, 9,13,12,11,10) H2 = (8,11,14,17,13,10, 9,12) U (1,4, 7, 6, 2, 5) H3 = (7,10,14,13,16,12,15,11) U (3,4, 8, 9, 5, 6) 15 Hi = (0,1, 2, 3, 6, 5, 8,4) U (7,10,14,13, 9,12,11) H2 = (1,4, 7, 8, 9, 6, 2, 5) U (10,11,14,18,15,12,13) H3 = (8,11,15,14,17,13,16,12) U (3,4, 5, 9,10, 6, 7) 16 Hi = (0,1, 5, 6, 2, 3, 7,4) U (8, 9,10,11,15,14,13,12) H2 = (1, 2, 5, 9, 6, 7, 8,4) U (10,13,16,19,15,12,11,14) H3 = (3,4, 5, 8,11, 7,10, 6) U (9,12,16,15,18,14,17,13) 17 Hi = (0,1, 2, 3, 7, 6, 5,4) U (8, 9,13,16,12,15,14,10,11) H2 = (1,4, 8,12, 9, 6, 2, 5) U (7,10,13,14,17, 20,16,15,11) H3 = (3,4, 7, 8, 5, 9,10, 6) U (11,12,13,17,16,19,15,18,14) For m > 18 and even • H1 consists of the 8-cycle (0,1, 5,6,2, 3, 7,4) and the (m — 8)-cycle with edges {8, 9}, {9,10}, {10, 11}, {8,12}, {m — 5, m — 1}, {m — 4, m — 3}, {m — 3, m — 2}, {m — 2, m — 1} {i, i + 1} for i G {12,14,..., m — 6} and {i, i + 3} for i G {11,13,...,m — 7}, • H2 consists of the 8-cycle (1, 2, 5,9,6, 7, 8,4) and the (m — 8)-cycle with edges {10,13}, {11, 12}, {m — 6, m — 2}, {m — 5, m — 2}, {m — 4, m — 1}, {m — 3, m}, {m — 1, m + 3}, {m, m + 3} and {i, i + 4} for i G {10,11,..., m — 7}, and • H3 consists of the 8-cycle (3,4, 5,8,11,7,10,6) and the (m — 8)-cycle with edges {9, 12}, {9,13}, {m — 4, m}, {m — 3, m + 1}, {m — 2, m + 1}, {m — 2, m + 2}, {m — 1, m}, {m — 1, m + 2}, {i, i +1} for i G {13,15,..., m — 5} and {i, i + 3} for i G {12,14, ...,m — 6}. B. Alspach et al.: On factorisations of complete graphs into circulant graphs and... 169 For m > 19 and odd • H1 consists of the 8-cycle (0,1, 2,3,7,6, 5,4) and the (m - 8)-cycle with edges {8, 9}, {8,11}, {9,13}, {10,11}, {10,14}, {12,15}, {12,16}, {m - 4, m - 1}, {m - 3, m - 2} and {i, i + 4} for i G {13,14,..., m - 5}, • H2 consists of the 8-cycle (1,4, 8,12, 9,6,2, 5) and the (m - 8)-cycle with edges {7, 10}, {7,11}, {10,13}, {11, 15}, {m - 4, m - 3}, {m - 3, m}, {m - 2, m - 1}, {m - 1, m + 3}, {m, m + 3}, {i, i +1} for i G {13,15,..., m - 6} and {i, i + 3} for i G {14,16,..., m - 5}, and • H3 consists of the 8-cycle (3,4, 7,8,5,9,10, 6) and the (m - 8)-cycle with edges {11,12}, {11, 14}, {12,13}, {m - 4, m}, {m - 3, m + 1}, {m - 2, m + 1}, {m -2, m + 2}, {m - 1, m}, {m - 1, m + 2}, {i, i + 1} for i G {14,16,..., m - 5} and {i, i + 3} for i G {13,15,..., m - 6}. □ Lemma 3.12. J^3'4 ^ C8 U C8 U C8. Proof. Take Hi = (0,1, 2, 3, 6, 5, 8,4) U (7,10, 9,12,13,14,15,11) U (16,17,18,19, 23, 22, 21, 20), H2 = (1,4, 7, 8, 9, 6, 2, 5) U (10,11,12,15,16,13,17,14) U (18, 21, 24, 27, 23, 20,19, 22), and H3 = (3,4, 5, 9,13,10, 6, 7) U (8,11,14,18,15,19,16,12) U (17, 20, 24, 23, 26, 22, 25, 21). □ The following result is an analogue of Lemma 3.7 for 2-factorisations of Cay(Zn; ±{1, 3,4}). Lemma 3.13. If n > 9 and F is a 2-regular graph of order n with girth at least 6, then there exists a 2-factorisation of Cay(Zn ; ±{1, 3,4}) into F. Proof. If n > 9 and F is a 2-regular graph of order n with girth at least 6, then F can be written as a vertex-disjoint union of 2-regular graphs Gi, G2,..., Gt where each Gj is isomorphic to either • Cm with m = 6, 7 or m > 9, • C8 U Cm-8 with m > 14, or • Cg u Cg u c8. 1 3 4 By Lemmas 3.10,3.11 and 3.12 we have a decomposition j|V(g )| ^ Gj for i = 1, 2,..., t. Applying Lemma 3.9 we obtain a decomposition J>3 >4 ^ F, and from this we obtain the required 2-factorisation of Cay(Zn; ±{1, 3,4}) into F by applying Lemma 3.8. □ 4 2-factorisations and the Oberwolfach Problem In this section we use results from the preceding sections to obtain results on the Oberwolfach Problem (and an additional result on 2-factorisations of Kn - I into a number of specified 2-factors and Hamilton cycles). We will also use the following corollary of Lemma 3.2 which was proved in [8]. 170 Ars Math. Contemp. 11 (2016) 101-106 Lemma 4.1. ([8]) If there exists a factorisation of Kn or of Kn —I into Cay(Zn ; ±{1,2, 3, 4}), then OP(F ) has a solution for each 2-regular graph F of order n, with the exception that there is no solution to OP(C4 U C5). Theorem 4.2. If p = 5 (mod 8) is prime, then OP(F) has a solution for every 2-regular graph F of order 2p. Proof. The case p = 13 is covered in [13]. For p = 13, Theorem 2.11 gives us a factorisation of K2p — I into Cay(Z2p ; ±{1, 2, 3,4}) and the result then follows by Lemma 4.1. □ Theorem 4.3. Let P be the set of primes given by p G P if and only if p > 7 and neither 4 nor 32 is in the subgroup of Zp generated by { — 1, 6}. Then P is infinite and if p G P, then OP(F) has a solution for every 2-regular graph F of order p satisfying v3(F) < v5(F) + Y^n=7 vi(F) where vm(F) denotes the number of m-cycles in F. Proof. Let p be prime such that p = 1 (mod 6), 2,3 G (Zp)3 and 6 G (Zp)3. Theorem 2.5 says that there are infinitely many such p. We shall show that p G P, which shows that P is also infinite. We have —1 G (Zp)3, and this together with the fact that 6 g (Zp)3 implies that the subgroup of Zp generated by {—1,6} is a subgroup of (Zp)3. Since it follows from 2 G (Zp)3 that 4, 32 G (Zp)3, neither 4 nor 32 is in the subgroup of Zp generated by { —1,6}. That is, p G P. Now let p be an arbitrary element of P and let G be the subgroup of Zp generated by { — 1,6}. The condition that neither 4 nor 32 is in G implies that the order d of 2G in Zp/G is neither 1, 2 nor 5, and so there exist non-negative integers a and ft such that d = 3a + 4ft. Thus, by Lemma 2.6 there is a factorisation of Kp in which each factor is either Cay(Zp ; ±{1, 2, 3}) or Cay(Zp ; ±{1,2, 3,4}). Let F be a 2-regular graph of order p satisfying v3 (F) < v5 (F) + J2n=7 V (F). Lemma 3.7 gives us a 2-factorisation of Cay(Zp ; ±{1,2, 3}) into F, and Lemma 3.2 gives us a 2-factorisation of Cay(Zp ; ±{1,2,3,4}) (the facts that p is prime and that v3(F) < v5 (F) + J2n=7 vi(F) imply that F is not amongst the possible exceptions listed in Lemma 3.2). The result follows. □ Theorem 4.4. Let P be the set of primes such that p G P if and only if p = 1 (mod 6) and 2, 3, 6 G (Zp)3. Then P is infinite and if p G P, then OP(F ) has a solution for every 2-regular graph F of order p with girth at least 6. Proof. By Theorem 2.5, P is infinite. If p G P, then Theorem 2.4 gives us a factorisation of Kp into Cay(Zp ; ±{1,3,4}), and the result then follows by applying Lemma 3.13 to each factor (7 G P so Lemma 3.13 can indeed be applied). □ For each odd prime p, the following theorem states there is a 2-factorisation of K2p — I into p-1 prescribed 2-factors and p-1 Hamilton cycles. Theorem 4.5. If p is an odd prime and Gi, G2,..., G p-i are 2-regular graphs of order 2 2p, then there is a 2-factorisation {Fi, F2,..., Fp-i} of K2p — I such that Fi = Gi for i = 1, 2,..., p-1 and Fi is a Hamilton cycle for i = p^1, p^,... ,p — 1. Proof. By Theorem 2.9 there is a factorisation of K2p — I into Cay(Zp ; ±{1, 2}). By Lemma 3.1, each copy of Cay(Zp ; ±{1,2}) can be factored into any specified 2-regular graph of order 2p and a Hamilton cycle. The result follows. □ B. Alspach et al.: On factorisations of complete graphs into circulant graphs and... 171 5 Isomorphic 2-factorisations of complete multigraphs The complete multigraph of order n and multiplicity s is denoted by sKn. It has s distinct edges joining each pair of distinct vertices. Lemma 5.1. If p is an odd prime and S = ±{d1, d2,..., ds} Ç Zp, then there exists a 2s-factorisation of sKp into Cay(Zp ; S). Proof. The required factorisation is given by {Cay(Zp ; w®S) : i = 0,1,..., } where w is primitive in Zp and w®S = {w®s : s G S}. □ Theorem 5.2. If p is an odd prime and F is any 2-regular graph of order p satisfying v3(F) < v5(F) + Vj(F), where vm(F) denotes the number of m-cycles in F, then there exists a 2-factorisation of 3Kp into F. Proof. The cases p = 3 and p = 5 are trivial so assume p > 7. By Lemma 5.1 there exists a 6-factorisation of 3Kp into Cay(Zp ; ±{1,2,3}), and by Lemma 3.7 each such 6-factor has a 2-factorisation into F. □ Theorem 5.3. If p is an odd prime and F is any 2-regular graph of order p, then there exists a 2-factorisation of 4Kp into F. Proof. The cases p = 3 andp = 5 are trivial. Since solutions to OP(C7) and OP(C3 UC4) exist, the case p = 7 can be dealt with by taking four copies of these 2-factorisations of K7. So we may assume p > 11. By Lemma 5.1 there exists an 8-factorisation of 4Kp into Cay(Zp ; ±{1,2, 3,4}), and by Lemma 3.2 each such 8-factor has a 2-factorisation into F; except in the case where F is one of the listed exceptions or possible exceptions in Lemma 3.2. These are easily dealt with as follows. Since p is prime the only relevant exceptions are F = C3 U C3 U • • • U C3 U C4 where the number of copies of C3 is at least 5, and F = C3 U C4 U C4 U • • • U C4 where the number of copies of C4 is odd and at least 5. However, it is known that for each such F, there is a 2-factorisation of Kp into F; the former case is covered in [11], and the latter case is covered in [21]. Thus, by taking four copies of these 2-factorisations of Kp, we obtain the required 2-factorisations of 4Kp. □ Theorem 5.4. Let p be an odd prime and let F be a 2-regular graph of order p. If A = 0 (mod 4), then there exists a 2-factorisation of AKp into F. Moreover, if F satisfies v3(F ) < v5(F ) + 5^=7 Vj(F), where vm(F) denotes the number of m-cycles in F, then the result also holds for A = 3 and for all A > 6. Proof. For the given values of A, it is trivial to factorise AKp such that each factor is either 3Kp or 4Kp, and with each factor being 4Kp when A = 0 (mod 4). Thus, the result follows by Theorems 5.2 and 5.3. □ Acknowledgement. The authors gratefully acknowledge the support of the Australian Research Council via grants DE120100040, DP0770400, DP120100790, DP120103067, DP150100506, DP150100530 and DP130102987. 172 Ars Math. Contemp. 11 (2016) 101-106 References [1] B. Alspach and R. Haggkvist, Some observations on the Oberwolfach problem, J. Graph Theory 9 (1985), 177-187. [2] B. Alspach, J. Morris and V. Vilfred, Self-complementary circulant graphs, Ars Combin. 53 (1999), 187-191. [3] B. Alspach, P. J. Schellenberg, D. R. Stinson and D. Wagner, The Oberwolfach problem and factors of uniform odd length cycles, J. Combin. Theory Ser. A 52 (1989), 20-43. [4] D. Bryant, Hamilton cycle rich two-factorisations of complete graphs, J. Combin. Des. 12 (2004), 147-155. [5] D. Bryant and P. Danziger, On bipartite 2-factorisations of Kn — I and the Oberwolfach problem, J. Graph Theory 68 (2011), 22-37. [6] D. Bryant and G. Martin, Some results on decompositions of low degree circulant graphs, Australas. J. Combin. 45 (2009), 251-261. [7] D. Bryant and C. A. Rodger, Cycle decompositions, in: C. J. Colbourn, J. H. Dinitz (eds.), The CRC Handbook of Combinatorial Designs, 2nd edition CRC Press, Boca Raton, 2007, 373-382. [8] D. Bryant and V. Scharaschkin, Complete solutions to the Oberwolfach problem for an infinite set of orders, J. Combin. Theory Ser. B 99 (2009), 904-918. [9] M. Buratti, A packing problem and its application to Bose's families, J. Combin. Des. 4 (1996), 457-472. [10] H. Davenport, On character sums in finite fields, Acta Math. 71 (1939), 99-121. [11] I. J. Dejter, F. Franek, E. Mendelsohn, and A. Rosa, Triangles in 2-factorizations, J. Graph Theory 26 (1997), 83-94. [12] I. J. Dejter, C. Lindner and A. Rosa, The number of 4-cycles in 2-factorizations of Kn, J. Combin. Math. Combin. Comput. 28 (1998), 101-112. [13] A. Deza, F. Franek, W. Hua, M. Meszka and A. Rosa, Solutions to the Oberwolfach problem for orders 18 to 40, J. Combin. Math. Combin. Comput. 74 (2010), 95-102. [14] E. Dobson and M. Sajna, Almost self-complementary circulant graphs, Discrete Math. 278 (2004), 23-44. [15] D. Froncek, A. Rosa and J. Siran, The existence of self-complementary circulant graphs, European J. Combin. 17 (1996), 625-628. [16] R. K. Guy, Unsolved combinatorial problems, Proceedings of the Conference on Combinatorial Mathematics and Its Applications, Oxford, 1967 (ed. D. J. A. Welsh, Academic Press, New York, 1971) p. 121. [17] R. Haggkvist, A lemma on cycle decompositions, Ann. Discrete Math. 27 (1985), 227-232. [18] D. G. Hoffman and P. J. Schellenberg, The existence of Ck -factorizations of K2n — F, Discrete Math. 97 (1991), 243-250. [19] K. Ireland and M. Rosen, A Classical Introduction to Modern Number Theory, 2nd ed., Graduate Texts in Mathematics 84, Springer-Verlag, 1990. [20] G. J. Janusz Algebraic Number Fields, 2nd ed., Graduate Studies in Mathematics Vol 7, American Mathematical Society, 1996. [21] E. Kohler, Das Oberwolfacher problem, Mitt. Math. Ges. Hamburg 10 (1973), 52-57. [22] K. Momihara, On cyclic 2(k — 1)-support (n, k)k-1 difference families, Finite Fields Appl. 15 (2009), 415-427. B. Alspach et al.: On factorisations of complete graphs into circulant graphs and... 173 [23] B. Z. Moroz, The distribution of power residues and non-residues, Vestnik Leningrad. Univ. 16 (1961), 164-169. [24] A. Munemasa, On perfect t-shift codes in abelian groups, Des. Codes Cryptogr. 5 (1995), 253259. [25] PARI/GP, version 2.5.1, Bordeaux, 2013, http://pari.math.u-bordeaux.fr/. [26] C. Praeger, C. H. Li and L. Stringer, Common circulant homogeneous factorisations of the complete digraph, Discrete Math. 309 (2009), 3006-3012. [27] C. A. Rodger, Hamilton decomposable graphs with specified leaves, Graphs Combin. 20 (2004), 541-543. [28] S. Szabo, Topics in factorization of abelian groups, Birkhuser Verlag, Basel, 2004. [29] T. Traetta, A complete solution to the two-table Oberwolfach problems, J. Combin. Theory Ser. A 120 (2013), 984-997. [30] J. Turner, Point-symmetric graphs with a prime number of points, J. Combin. Theory 3 (1967), 136-145. /^creative ^commor ARS MATHEMATICA CONTEMPORANEA Also available at http://amc-journal.eu ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 11 (2016) 175-187 The 2 A-Majorana representations of the Harada-Norton group Clara Franchi Dipartimento di Matematica e Fisica, Universita Cattolica del Sacro Cuore, Via Musei 41, I-25121 Brescia, Italy Alexander A. Ivanov Department of Mathematics, Imperial College, 180 Queen's Gt., London, SW7 2AZ, UK Mario Mainardis Dipartimento di Matematica e Informatica, Universita di Udine, Via delle Scienze 206, I-33100 Udine, Italy Received 28 May 2015, accepted 18 September 2015, published online 11 October 2015 Abstract We show that all 2A-Majorana representations of the Harada-Norton group F5 have the same shape. If R is such a representation, we determine, using the theory of association schemes, the dimension and the irreducible constituents of the linear span U of the Majorana axes. Finally, we prove that, if R is based on the (unique) embedding of F5 in the Monster, U is closed under the algebra product. Keywords: Majorana representations, association schemes, Monster algebra, Harada-Norton group. Math. Subj. Class.: 20D08, 20C34, 05E30, 17B69. 1 Introduction Let (W, ■) be a real commutative algebra endowed with a scalar product (, )W and denote with Aut(W) the group of algebra automorphisms of W that preserve the scalar product. We shall assume that, for every u,v,w e W, (M1) (, )W is associative , that is (u ■ v, w) = (u, v ■ w), (M2) the Norton Inequality, (u ■ u,v ■ v) > (u ■ v, u ■ v), holds. E-mail addresses: clara.franchi@unicatt.it (Clara Franchi), a.ivanov@imperial.ac.uk (Alexander A. Ivanov), mario.mainardis@uniud.it (Mario Mainardis) ©® This work is licensed under http://creativecommons.org/licenses/by/3.0/ 176 Ars Math. Contemp. 11 (2016) 101-106 Recall that a Majorana axis of W (see [10, Definition 8.6.1] or, equivalently, [9, p. 2423]) is a vector a e W such that (M3) a has length 1, (M4) the adjoint endomorphism ad(a), induced by multiplication by a on the R-vector space W, is semisimple with spectrum contained in {1,0,2-2, 2-5}, (M5) a spans linearly the eigenspace relative to the eigenvalue 1 of ad(a), (M6) the linear transformation aT: W ^ W, that inverts the eigenvectors of ad(a) relative to 2-5 and centralises the other eigenvectors, preserves the algebra product, (M7) the linear transformation a 26 Vp := ao + ai + 33(a_i + a_i) —3ao • ai, Wp := — 27(3ao + 3ai — a_i — a_i — a_2) + ao • ai, Up2 := p5 (2ao + 2a_i + a_2) — I35ao • a_i. The indexing with powers of p is justified by the fact that, in the action of M on WM, for 3 < N < 5, the NA-axes are essentially determined (up to the sign in the 5A-case) by the cyclic groups (p) in M of order N (see [9, p. 2450]). It is not clear if that property follows from Axioms (M1)-(M7), therefore axiom (M8)(b) was added in [3] in the definition of Majorana representations. The vectors ap, ap2, resp. ap3 appearing in the algebras of type 2A-, 4B-, resp. 6A are further Majorana axes. As above, the indexing is suggested by the action of M on WM since, in that case, whenever ao and ai generate a subalgebra of type 2A, the product p = ag ai is the Majorana involution corresponding to ap. As in the previous paragraph, that property will be axiomatised in (M8)(a). Finally, by the Norton-Sakuma Theorem (see [9, Lemma 2.20 (iv) and (v)]), ao and a2 (resp. ao and a3) generate a subalgebra of type 2 A in the algebra of type 4B (resp. 6 A) and, for i e {2,3}, by the definition of a®, the product a5aT is equal to p®. The Norton-Sakuma Theorem inspired the definition of Majorana representations, introduced by A. A. Ivanov in [10] in order to provide an axiomtic framework for studying 178 Ars Math. Contemp. 11 (2016) 101-106 the actions of 2AM-generated subgroups of M on WM. Let G be a finite group, T a G-invariant set of involutions generating G, ^: G ^ Aut(W) a faithful representation of G on W, and ^: T^ A be an injective map such that for every g G G and t G T, (tf)T := t* (1.1) and (tf / = (g-1tg)f. (1.2) The quintet R :=(G, T,W,^) is called a Majorana representation (or, to put evidence on the set T, a T-Majorana representation) of G, if R satisfies the following condition (see [3, Axiom M8]): (M8) (a) For t1 and t2 in T, the Norton-Sakuma algebra generated by tf and tf has type 2A if and only if t1t2 G T. (b) Suppose that t1, t2, t3, and t4 are elements of T such that t1t2 = t3t4 and the subalgebras generated by tf, tf and tf, tf have both type 3A, 4A, or 5 A. Then U(tl = U(i3i4)^ , V(ili2}^ = V(i3i4)^ , or W(ili2}^ = W(i3i4)^ , respectively. Axiom (M8)(a) and Norton-Sakuma Theorem (see [9, Lemma 2.20]) imply that, if tf and tf generate a Norton-Sakuma subalgebra of W of type 2A, 4B, or 6A, then t1t2, (t1t2)2 , or (t1t3)3 belongs to T, and (t1t2)f, ((t1t2)2)f, or ((t1t3)3)f coincides with a^^, a((tlt2)2)^, or a((t1t2)3)^, respectively. An immediate consequence of that definition is that, given a Majorana representation R :=(G, T,W,^) of a group G and a nonempty subset 7o of T, such that 7o is (7o) -invariant, the quintet R(T„> :=((To),To,W^|(To)^|To) (1.3) is a To-Majorana representation of (To). Further, if we replace W with the subalgebra Wt„ generated by the set of Majorana axes T^f in the quintet (1.3), we still have a Majorana representation of (To) provided (To) acts nontrivially on Wt„ (which is the case, e.g., when (To) has trivial centre). In particular, if e is an embedding of a group H in M and He is generated by a subset T of 2AM, then H inherits a (T n He)e -Majorana representation Re obtained by composing e with the restriction of RM to He. In that case, the Majorana representation Re of H is said to be based on the embedding e. In this paper, whenever a Majorana representation of a group G is based on an embedding e in the Monster, we shall always identify G with Ge. For a pair (a, b) of elements in W, denote the subalgebra they generate with ((a, b)). Let R be as above, the shape of R is a function shR from the set of the nondiagonal orbitals of G on T to the set of types of the Norton-Sakuma algebras so that C. Franchi, et al.: The 2A-Majorana representations of the Harada-Norton group 179 1. shR((t, s)G) = NX if and only if ts has order N and the algebra ((t^1, s^}} is a Norton-Sakuma algebra of type NX. 2. shR must respect the embeddings of the algebras: 2A 4B, 2A 6A, 2B 4A, 3A 6A in the sense that, for t,ri,r2 € T, if ((t^}} < ((t^,rf}} < ((t^}}, then (sM(t, ri)G), shR((t, r2)G)) € {(2A, 4B), (2A, 6A), (2B, 4A), (3A, 6A)}. Remark: Clearly, if T0 is a (70} -invariant nonempty subset of T, the shape of R(t0) is the restriction of shR to 70 x 70. Majorana representations of several groups have already been investigated (see [9, 11, 12, 13, 14, 5, 3, 6]). In this paper we study the 2A-Majorana representations of the Harada-Norton group F5, where 2A is the set of the involutions of F5 whose centraliser is (2HS) • 2, the double cover of the Higman-Sims group extended by its outer automorphism group of order 2. We shall show that every 2A-Majorana representation of F5 has the same shape as the Majorana representations of F5 based on its embedding into M as the subgroup generated by the set of involutions in 2AM that centralise an element of type 5 A (here 2A = 2AM nF5, see [4]). By [18, Theorem 21], that one is the unique embedding of F5 into M (up to conjugation in M), hence, since F5 is transitive on 2A, there is (up to conjugation in M) only one Majorana representation of F5 based on an embedding in M. We prove the following result. Theorem 1.1. Let W be as above and R := (F5,2A, W, —) be a 2A-Majorana representation of F5 on W. Then (i) R has the shape given in Table 3; (ii) The R-linear span (2A^} of 2A^ has dimension 18 316; (iii) (2A^} is the direct sum of three irreducible R[F5]-submodules of dimensions 1, 8910 and 9405, respectively; (iv) if R is based on the embedding of F5 in M, then W2A = (2A^}. Unless explicitly stated, for the remainder of this paper we shall stick to the notations introduced in this section. We shall also set T := 2A. 2 The First Eigenmatrix By [4, p. 166], we have |T| = 1539000, and it seems hard, at present, to perform a direct computation of the dimension of the linear span of T^. We therefore apply the theory of association schemes as in [14] and [6] to reduce ourselves to a more manageable situation. The first step is to compute the first eigenmatrix of the association scheme relative to the permutation action of F5 on T (see [1, pp. 59-60]). For that purpose, we need to recover some information about the action F5 induces by conjugation on T. 180 Ars Math. Contemp. 11 (2016) 101-106 Let n := |T| and let t1,..., tn be the distinct elements of T, so that B := (ti,...,tn) is an ordered basis for the complex permutation module V of F5 on T. With respect to B, we identify EndC(V) with the set of n x n matrices with complex entries. Let T0,... ,T8 be the orbitals of F5 on T and, for every k e {0,..., 8}, let Ak be the adjacency matrix associated to the orbital Tk, that is (Ak)ij = 1 if the pair (ti, tj) is in Tk 0 otherwise. By [1, Theorem 1.3], the 9-tuple (A0,..., A8) is a basis for the centralizer algebra C := Endc[F5](V). For i, j, k e {0,..., 8}, let pj be the number of elements z in T such that for a fixed pair (x, y) in Tk we have (x, z) e Ti and (z, y) e Tj. By definition, the pj's are all non negative integers and, by [1, §2.2], they are the structure constants of C relative to the basis ( A0 , . . . , A8 ) , that is pikj k=0 AiAj = > 'pkjAk. (2.1) The matrix Bi of size 9 whose j, k entry is pkj is called ith intersection matrix. Clearly, Bt is the matrix associated to the endomorphism induced by Ai on C via left multiplication with respect to the basis (A0,..., A8), in particular Bi has the same eigenvalues as Ai. By [8, Lemma 2.18.1(ii)] we may choose the indexes of the orbitals T0,..., T8 in such a way that T0 is the diagonal orbital (hence B0 is the identity matrix), Ti is the non-diagonal orbital of smallest size, and the first intersection matrix Bi is as follows: ! Bi V By [1, Theorem 3.1], we have that V decomposes into the direct sum V = Vo e ... e V8 (2.2) of nine irreducible C[F5]-submodules. Since F5 is transitive on T, the subspace linearly spanned by the sum of all elements of T is the unique trivial submodule of V. As usual, we shall denote it by V0. Since the action of F5 on T is multiplicity free (see [8, Lemma 2.18.1.(ii)]), the Vj's are minimal common eigenspaces for the adjacency matrices Ai. It follows that there is a complex invertible matrix D that simultaneously diagonalises the matrices Ai's. By the definition of the adjacency matrices, we have that, for each i, the 0 1 0 0 0 0 0 0 0 1408 53 32 18 4 2 0 0 0 0 50 0 2 12 0 2 0 0 0 450 32 100 32 50 32 0 0 0 350 672 112 160 100 92 160 0 0 504 0 504 288 356 312 320 0 0 0 672 672 552 650 720 640 1280 0 0 0 0 360 250 240 288 0 0 0 0 0 0 0 10 0 128 C. Franchi, et al.: The 2A-Majorana representations of the Harada-Norton group 181 sums (say kj) of the entries in each row of the matrices Ai are constant, whence V0 is a k^-eigenspace for Ai, for each i. For i,j e {0,..., 8}, let pij be the eigenvalue of Aj on Vj. The 9 x 9 matrix P := (pij) is called the first eigenmatrix of the association scheme (T, {T0,..., T8}). Lemma 2.1. With the above notations, 11 1408 2200 35200 123200 354816 739200 277200 5775 1 128 200 0 1600 -2304 0 0 375 1 28 -50 -50 -100 396 -750 450 75 1 16 4 -56 -136 -288 504 0 -45 1 -32 40 -80 80 576 -240 -360 15 1 -47 -50 250 350 -504 0 0 0 1 -112 300 1000 -2200 -864 -1800 3600 75 1 208 -50 2200 -2800 2016 4200 -6300 525 1 208 100 1000 1400 2016 -4200 0 -525 Proof. Note that, since A0 is the identity matrix, pi0 = 1 for all i's. Straightforward computation shows that the eigenvalues of Bi are 1408, 128, 28, 16, -32, -47, -112, 208, and 208, giving the first two columns of P. Set (A0,..., A8) = (1408,128, 28,16, -32, -47, -112, 208, 208). For each h e {0,..., 8}, let Sh be the linear system (Bi - Ah/d) 4(1, Ah, xa,..., x8) = 0 (2.3) in the indeterminates x2,..., x8. Taking i =1 in Equation (2.1) and multipling each term by D on the right and by D-i on the left, we get 8 (D-lAiD)(D-lAj D) = £ phj (D-iAhD). (2.4) h=0 Since the matrices D-iAhD are diagonal with eigenvalues pkh on the common eigenspaces Vk, for each h e {0,..., 8}, from Equation (2.4) we obtain that the relation 8 Ak pkj = E phj pfch (2.5) h=0 holds for every k e {0,..., 8}. Note that the second member is the jth entry of the vector Bit(1, Ak ,pk2,... ,pk8), therefore Equation (2.5) implies that the 9-tuple (1, Ak,pk2, . . . ,pk8) is an eigenvector for Bi relative to the eigenvalue Ak, for every k e {0,..., 8}. Since, for k = 7,8, the eigenvalue Ak has multiplicity 1, it follows that the first seven rows of the matrix P can be obtained computing the unique solution (pk2,... ,pk8) of the system Sk for each k e {1,..., 6}. We are now left with the last two rows of the matrix P, corresponding to the eigenvalue 208 of Bi. The set of solutions of the system S7, (Bi - 208/d) 4(1, 208, x2,..., x8) = 0, 182 Ars Math. Contemp. 11 (2016) 101-106 is {(25 - X, 1600 + y, -700 - 4x, 2016, 8x, -3150 - 6x, x) | where x G R}. Therefore, for suitable x, y G R, we can write the last two rows of the matrix P as follows x 8x 1, 208, 25 --, 1600 +--, -700 - 4x, 2016, 8x, -3150 - 6x, x 77 1, 208, 25 - y, 1600 + 8y, -700 - 4y, 2016, 8y, -3150 - 6y, y. Set mj = dimR(Vj). Then m0 = 1 and, for 1 < i < 6, can be computed from the rows of P using the following formula (see [1, Theorem 4.1]): V8 V 2^j=o kj Pij from which we get mi = 16929, m2 = 267520, m3 = 653125, m4 = 365750, m5 = 214016, m6 = 8910, whence 6 m7 + m8 = n - ^^ mi = 12749. i=0 Comparing that value with the decomposition of the permutation module of F5 on T into irreducible submodules given in [8, Lemma 2.18.1.0'/)], we obtain that, modulo interchanging the indices 7 and 8, m7 = 3344 and m8 = 9405. By the Column Orthogonality Relation of the first eigenmatrix, 8 EmfcPfciPfcj = nkjSjj fc=0 (see [1, Theorem 3.5]), applied with (i, j) = (0, 8) and (i, j) = (8, 8), we get the quadratic system 3344x + 9405y = -3182025 3344x2 + 9405y2 = 3513943125 whose solutions are (x, y) = (525, -525) or (x, y) = (1575/61, 62475/61). By [2, Theorem 3.5(b)], the matrices Ai's are symmetric, since, by [4], the Frobenius-Schur indices of the irreducible constituents of the permutation character of F5 on T is +1 (and the action is multiplicity free). Thus, recalling that the pj's are all non negative integers, in order to determine which of the two solutions is the right one, we may use the formula 1 nkh Phj = n—tr(AiAj Ah) (2.6) (see [1, Theorem 3.6(ii)]). Since the trace is invariant by matrix conjugation, tr(AiAjAh) can be obtained by multiplying, entry-wise, the ith, jth, and hth columns of the matrix P and adding the entries of the resulting column. In that way, we get that the entries pkj are integers only in the case when (x, y) = (525, -525). □ n C. Franchi, et al.: The 2A-Majorana representations of the Harada-Norton group 183 3 The shape We continue with the notations of the last section. The next lemma recalls some known facts about conjugacy classes in M and F5 (see [16, 15]). For the remainder of this paper let H be the centraliser in M of an A5-subgroup of type (2A, 3A, 5A). By [15], we have that H = A12 and we may w.l.o.g. assume that F5 centralizes a 5A-element in that A5-subgroup, in particular H < F5. Lemma 3.1. Denoting the conjugacy classes of M and F5 as in [4], the correspondences between the conjugacy classes of the elements of order less or equal to 6 in M, F5 and H are as in Table 2. Table 2: Correspondences between the conjugacy classes of the elements of order at most 6 in M, F5, and H. Conj. class in M 2A 2B 3A 4A 4B 5A 6A Conj. class in F5 2A 2B 3A 4A 4B 5A 6A Cycle type in H 22, 26 24 3, 32,34 42, 42 • 22 4 • 2, 4 • 22 5, 52 3 • 22, 6 • 23, 62, 32 • 22 Let (t1,..., tn) be as in the previous section. For i, j e {1,... n}, set Yij := (tf ,t|)w. Lemma 3.2. If (ti, tj) and (th, tk) belong to the same orbital of F5 on T, then Yj = Yhk. Proof. That follows immediately from Equation (1.2) and the definition of y j. □ Thus, we can set, for k e {0,..., 8} and (t, s) e Tk, Yk :=(t^)w. (3.1) Lemma 3.3. For every x e {22,3,4 • 2, 24, 5} there are pairs of involutions of type 22 in A12 such that their product has cycle type x. Every element of cycle type 42 • 22 in A12 is the product of two elements of cycle type 26. Proof. That is an elementary computation (note that two elements of cycle type 26 whose product has cycle type 42 • 22 are explicitely given in the proof of Lemma 3.4). □ Lemma 3.4. With the above notations, for every k e {0,..., 8} and (t, s) e Tk, the scalar products Yk's are given in Table 3. Proof. The first two columns of Table 3 follow from Lemma 2.1. The correspondence that associates to each orbital Tk of F5 on T the F5-conjugacy class xk of the products ts, where (t, s) e Tk, has been determined by Segev in [20], giving the third column. 184 Ars Math. Contemp. 11 (2016) 101-106 Table 3: Valencies, shapes, and scalar products related to the orbitals of F5 on the set of its 2A-involutions. k |tCF5 (s)| (st)F5 shK(Tfc) Yk 0 1 1 - 1 1 1408 5A 5A 3/27 2 2200 2A 2A 1/23 3 35200 3A 3A 13/28 4 123200 4B 4B 1/26 5 354816 5E 5A 3/27 6 739200 6A 6A 5/28 7 277200 4A 4A 1/25 8 5775 2B 2B 0 Assume sMTfc) = NX, where N € {1,..., 6} and X G {A, B, C}. By the definition of shape, for (t, s) g Tk, we have that |st| = N .In particular, for k equal to 1, 5 and 6, we have that shR(Tk) is equal to 5A, 5A, and 6A, respectively. Let k G {2, 3,4,8}. By the second and third rows of Table 2 and Lemma 3.3 there are involutions s and t of cycle type 22 in Tn H such that st G xk, whence, by the first and third columns of Table 3, (s,t) G Tk n (H x H). By the remark in the introduction, we have that shR(Tfc) = sh^H ((s,t)H), whence Lemma 8 and Table 10 in [6] give the entry in the fourth column corresponding to k. Assume now k = 7. Choose the elements s = (1, 2)(3, 4)(5, 6)(7, 8)(9,10)(11,12) and t = (1, 3)(2,4)(5, 7)(6, 9)(8,11)(10,12) in H. Then st has cycle type 4222. ByTable2, s and t are contained in T and (st)F5 = 4A, hence, by the third column of Table 3, (s, t) G T7 and, by the Norton-Sakuma Theorem, shR(Tr) G {4A, 4B}. By Equation (1.2), (t^ )(ts)* = (tts)^ = (t3)^, so we have that t^ and (ts)^ are contained in the subalgebra generated by t^ and s^, which is (s, t)-invariant. Since tts has cycle type 24, by Table 2 it belongs to the class 2B of F5, whence, by the third column of Table 3, (t, ts) g T8 and the subalgebra generated by t^, (ts)^ is of type 2B, by the previous paragraph. By the second condition of the definition of the shape, shR(T7) = 4A. Finally, the last column follows from Table 1. □ C. Franchi, et al.: The 2A-Majorana representations of the Harada-Norton group 185 4 Closure Lemma 4.1. Suppose that R is based on the embedding of F5 in M. Then (T*) = Wr. Proof. Let H be the subgroup of F5 isomorphic to A12 defined as in the previous section. Let t, s be distinct elements of T, set p = (ts)^ and let N be the order of p. Let U be the Norton-Sakuma algebra generated by t* and s*, and let NX be its type. By Table 1, if NX is contained in {2A, 2B, 4B}, then U is linearly spanned by elements in T*, otherwise, by Lemma 3.4, NX g {3A, 4A, 5A, 6A} and U has a basis all of whose elements but the NX-axis are Majorana axes. Therefore, with the notations of Table 1, we may assume that NX g {3A, 4A, 5A, 6A} and show that, in all those cases, the NX-axes up, vp, wp, up2 are contained in (T* ) . If ts has order 3,4, or 5, then, by Lemma 3.1, there is g g F5, depending on ts, such that ts is an element of cycle type respectively 3, 42 • 22, and 5 in Hg. By Lemma 3.3, there are elements t' and s' of cycle type 22 or 26 in Hg such that ts = t's'. By Lemma 3.1, (t')* and (s')* generate a Norton-Sakuma algebra of the same type as U, thus, by Axiom (M8)(b), we have that up = u(t,s,)^, vp = v(t,s,)^, and wp = w(t,s,)^, respectively. Assume NX = 3A. By [3, Corollary 3.2], u(t,s,)^ is a linear combination of elements of (T n Hg )* and we are done. Similarly, assume NX = 4A (resp. NX = 5A). By [3], second formula in the abstract, or Section 6 (resp. Lemma 5.1), we have that v(t,(resp. w(t,s,)^) is a linear combination of elements in (Tn Hg )* and 3A-axes, and we are done by the previous case. Finally assume NX = 6A. Then, by the remarks after Table 1, up2 is a 3A-axis and again we are done by the 3A case. □ Note that in the previous proof we require that R is based on the embedding of F5 in M only to deal with the case 4A, all the other cases following from results of [3] that depend only on the shape of that representation of Ai2. 5 Proof of Theorem 1.1 The first claim of Theorem 1.1 follows from Lemma 3.4 and the last is the content of Lemma 4.1. To prove the second and the third claims, let r = (Yj) be the Gram matrix of (, )W associated to the n-tuple (t*,..., t*). By an elementary result on Euclidean spaces, we have that rank(r) =dimR((t* 11 gT)). (5.1) Since T0,..., T8 is a partition of T x T and, by Equation (3.1), Yk = Yj, for (tj, tj) g Tk, we have that 8 r = ^ Yk Ak. (5.2) k=0 186 Ars Math. Contemp. 11 (2016) 101-106 Let D be as in Section 2. From Equation (5.2) we get: 8 r := D-1rD = ^ YkD-1AkD, (5.3) k=0 where all the matrices r, and Ak := D-1AkD for k G {0,..., 8}, are diagonal. Now, clearly, the rank of r is equal to the rank of r, hence (being r diagonal) to the number of nonzero entries of r. By Lemma 3.4 (Table 3), Equation (5.3) becomes — —r 13_ 1 _ 1-, -, r = Ao + 27 Ai + 8 A2 + 28 A3 + 26 A4 + 27 A5 + 28 Ae + 25 A7 + 0A8, which, by Lemma 2.1, gives the eigenvalues 70875/2,0,0, 0, 0,0, 875/8,0, 225/4 of r on the subspaces V0,..., V8, respectively. Hence dimR((T^)) = m0 + me + m8 = 1 + 9405 + 8910 = 18 316. References [1] E. Bannai and T. Ito, Algebraic Combinatorics I. Association Schemes, Benjamin-Cummings Lect. Notes, Menlo Park, 1984. [2] P. J. Cameron, Permutation Groups, London Mathematical Society Student Texts 45, Cambridge Univ. Press, Cambridge, 1999. [3] A. Castillo-Ramirez and A. A. Ivanov, The Axes of a Majorana Representation of A12, in: Groups of Exceptional Type, Coxeter Groups and Related Geometries, Springer Proceedings in Mathematics & Statistics 82 (2014), 159-188. [4] J. H. Conway, R. T. Curtis, S. P. Norton, R. A. Parker and R. A. Wilson, Atlas of Finite Simple Groups, Clarendon Press, Oxford, 1985. [5] S. Decelle, The L2(11)-subalgebra of the Monster algebra. J. Ars Math. Contemp. 7.1 (2014), 83-103. [6] C. Franchi, A. A. Ivanov, M. Mainardis, Standard Majorana representations of the symmetric groups, preprint (2014). [7] The GAP Group: Gap - Groups Algorithms and Programming, Version 4.4.12. http://www.gap-system.org (2008). [8] A. A. Ivanov, S. A. Linton, K. Lux, J. Saxl, and L. H. Soicher, Distance transitive graphs of the sporadic groups, Comm. Alg. 23 (1995), 3379-3427. [9] A. A. Ivanov, D. V. Pasechnik, A. Seress and S. Shpectorov, Majorana representations of the symmetric group of degree 4, J. Algebra 324 (2010), 2432-2463. [10] A. A. Ivanov, The Monster Group and Majorana Involutions, Cambridge Tracts in Mathematics 176, Cambridge Univ. Press, Cambridge, 2009. [11] A. A. Ivanov and A. Seress, Majorana representations of A5, Math. Z. 272 (2012), 269-295. [12] A. A. Ivanov, On Majorana representations of A6 and A7, Comm. Math. Phys. 306 (2011), 1-16. [13] A. A. Ivanov, Majorana representations of A6 involving 3C-algebras, Bull. Math. Sci. 1 (2011), 356-378. C. Franchi, et al.: The 2A-Majorana representations of the Harada-Norton group 187 [14] A. A. Ivanov and S. Shpectorov, Majorana representations of L3(2), Adv. Geom. 14 (2012), 717-738. [15] S. P. Norton, F and other simple groups, PhD Thesis, Cambridge, 1975. [16] S. P. Norton, The uniqueness of the monster, in: J. McKay (ed.), Finite Simple Groups, Coming of Age, Contemp. Math. 45, AMS, Providence, RI 1982, 271-285. [17] S. P. Norton, The Monster algebra: some new formulae, in Moonshine, the Monster and Related Topics, Contemp. Math. 193, AMS, Providence, RI 1996, pp. 297-306. [18] S. P. Norton and R. A. Wilson, Anatomy of the Monster II, Proc. London Math. Soc. 84 (3) (2002), 581-598. [19] S. Sakuma, 6-transposition property of t-involutions of vertex operator algebras, Int. Math. Res. Not. (2007), doi:10.1093/imrn/rmn030. [20] Y. Segev, The uniqueness of the Harada-Norton group, J. Algebra 151 (1992), 261-303. ARS MATHEMATICA CONTEMPORANEA Also available at http://amc-journal.eu ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 11 (2016) 189-213 On colour-preserving automorphisms of Cayley graphs Ademir Hujdurovic *, Klavdija Kutnar t University ofPrimorska, FAMNIT, Glagoljaska 8, 6000 Koper, Slovenia Dave Witte Morris , Joy Morris * Department of Mathematics and Computer Science, University of Lethbridge, Lethbridge, Alberta, T1K 3M4, Canada Received 25 November 2014, accepted 26 March 2015, published online 20 October 2015 We study the automorphisms of a Cayley graph that preserve its natural edge-colouring. More precisely, we are interested in groups G, such that every such automorphism of every connected Cayley graph on G has a very simple form: the composition of a left-translation and a group automorphism. We find classes of groups that have the property, and we determine the orders of all groups that do not have the property. We also have analogous results for automorphisms that permute the colours, rather than preserving them. Keywords: Cayley graph, automorphism, colour-preserving, colour-permuting. Math. Subj. Class.: 05C25 1 Introduction Definitions 1.1. Let S be a subset of a group G, such that S = S-1. (All groups and all graphs in this paper are finite.) • The Cayley graph of G, with respect to S, is the graph Cay(G; S) whose vertices are the elements of G, and with an edge x — xs, for each x G G and s G S. * Partially supported by the Slovenian Research Agency: research program P1-0285. ^Partially supported by the Slovenian Research Agency: research program P1-0285 and research projects N1-0011, J1-6743, and J1-6720. * Partially supported by a research grant from the Natural Sciences and Engineering Research Council of Canada. E-mail addresses: ademir.hujdurovic@upr.si (Ademir Hujdurovic), klavdija.kutnar@upr.si (Klavdija Kutnar), dave.morris@uleth.ca (Dave Witte Morris), joy.morris@uleth.ca (Joy Morris) ©® This work is licensed under http://creativecommons.org/licenses/by/3.0/ Abstract 190 Ars Math. Contemp. 11 (2016) 101-106 • Cay(G; S) has a natural edge-colouring. Namely, each edge of the form x — xs is coloured with the set {s, s-1}. (In order to make the colouring well-defined, it is necessary to include s-1, because x — xs is the same as the edge xs — x, which is of the form y — ys-1, with y = xs.) Note that Cay(G; S) is connected if and only if S generates G. Also note that a permutation ^ of G is a colour-preserving automorphism of Cay(G; S) if and only if we have y(xs) G {^(x) s±:L}, for each x G G and s G S. For any g G G, the left translation x ^ gx is a colour-preserving automorphism of Cay(G; S). In addition, if a is an automorphism of the group G, such that a(s) G {s±:} for all s G S, then a is also a colour-preserving automorphism of Cay(G; S). We will see that, in many cases, every colour-preserving automorphism of Cay(G; S) is obtained by composing examples of these two obvious types. Definition 1.2. Let G be a group. 1. A function ^: G ^ G is said to be affine if it is the composition of an automorphism of G with left translation by an element of G. This means y(x) = a(gx), for some a G Aut G and g G G. 2. A Cayley graph Cay(G; S) is CCA if all of its colour-preserving automorphisms are affine functions on G. (CCA is an abbreviation for the Cayley Colour Automorphism property.) 3. We say that G is CCA if every connected Cayley graph on G is CCA. Here are some of our main results: Theorem 1.3. 1. There is a non-CCA group of order n if and only if n > 8 and n is divisible by either 4, 21, or a number of the form pq ■ q, where p and q are prime (see Corollary 6.13 and Remark 6.14). 2. An abelian group is not CCA if and only if it has a direct factor that is isomorphic to either Z4 x Z2 or a group of the form Z2k x Z2 x Z2, with k > 2 (see Proposition 4.1). 3. Every dihedral group is CCA (see Corollary 5.4). 4. No generalized dicyclic group or semidihedral group is CCA, except that Z4 is di-cyclic, but is CCA (see Corollary 2.8). 5. Every non-CCA group of odd order has a section that is isomorphic to either the nonabelian group of order 21 or a certain generalization of a wreath product (called a semi-wreathed product) (see Theorem 6.8). 6. If G x H is CCA, then G and H are both CCA (see Proposition 3.1). The converse is not always true (for example, Z4 x Z2 is not CCA), but it does hold if gcd(|G|, |H|) = 1 (see Proposition 3.2). We also consider automorphisms of Cay(G; S) that permute the colours, rather than preserving them: A. Hujdurovic et al.: On colour-preserving automorphisms of Cayley graphs 191 Definitions 1.4. • An automorphism a of a Cayley graph Cay(G; S) is colour-permuting if it respects the colour classes; that is, if two edges have the same colour, then their images under a must also have the same colour. This means there is a permutation n of S, such that a(gs) G {a(g) n(s)±1} for all g G G and s G S (and n(s-1) = n(s)-1). • We say that a group G is strongly CCA if every colour-permuting automorphism of every connected Cayley graph on G is affine. Note that any strongly CCA group is CCA, since colour-preserving automorphisms are colour-permuting (with n being the identity map on S). The converse is not true. For example, any dihedral group is CCA (as was mentioned above), but it is not strongly CCA if its order is of the form 8k + 4 (see Proposition 5.6). However, the converse does hold for at least two natural families of groups: Theorem 1.5. A CCA group is strongly CCA if either: 1. it is abelian (see Proposition 4.1), or 2. it has odd order (see Proposition 6.4). Remarks 1.6. 1. It follows from Theorems 1.3(2) and 1.5(1) that every cyclic group is strongly CCA. This is also a consequence of the main theorem of [9]. 2. Groups that are not strongly CCA seem to be far more likely to be of even order than of odd order. For example, of the 28 groups of order less than 32 that are not strongly CCA, only one has odd order (see Section 7). In fact, there are only three groups of odd order less than 100 that are not strongly CCA: the non-abelian group G21 of order 21, the group G21 x Z3 of order 63, and the wreath product Z3 I Z3, which has order 81 (see Corollary 6.15). 3. If the subgroup consisting of all left-translations is normal in the automorphism group of the Cayley graph Cay(G; S), then Cay(G; S) is said to be normal [12]. It is not difficult to see that every normal Cayley graph is strongly CCA (cf. Remark 6.2), and that every automorphism of a normal Cayley graph is colour-permuting. 4. The notion of (strongly) CCA generalizes in a natural way to the setting of Cayley digraphs Cay(G; S), by putting the colour s on each directed edge of the form x x xs. (There is no need to include s-1 in the colour.) However, it is very easy to see that if Cay(G; S) is connected, then every colour-preserving automorphism of Cay(G; S) is left-translation by some element of G [11, Thm. 4-8, p. 25], and that every colour-permuting automorphism is affine [3, Lem. 2.1]. Therefore, both notions are completely trivial in the directed setting. However, there has been some interest in determining when every automorphism of Cay(G; S) is colour-permuting [1, 2] (in which case, the Cayley digraph is normal, in the sense of (3)). 2 Examples of non-CCA groups Remark 2.1. Since automorphisms are the only affine functions that fix the identity element e (and left-translations are colour-preserving automorphisms of any Cayley graph), it is easy to see that if Cay(G; S) is CCA, then every colour-preserving automorphism that fixes the identity is an automorphism of the group G. More precisely: 192 Ars Math. Contemp. 11 (2016) 101-106 A Cayley graph Cay(G; S) is CCA if and only if, for every colour-preserving automorphism p of Cay(G; S), such that p(e) = e, we have p G Aut G. The same is true with "strongly CCA" in the place of "CCA',' if "colour-preserving" is replaced with "colour-permuting'.' This is reminiscent of the CI (Cayley Isomorphism) property [7], and this similarity motivated our choice of terminology. We thank Gabriel Verret for pointing out that the quaternion group Qg is not CCA. In fact, two different groups of order 8 are not CCA: Example 2.2 (G. Verret). Z4 x Z2 and Qg are not CCA. Proof. (Qg) Let r = Cay(Q8; {±i, ±j}). This is the complete bipartite graph K4,4. (See Figure 1 with the labels that are inside the vertices.) Let p be the graph automorphism that interchanges the vertices k and —k while fixing every other vertex. This is clearly not an automorphism of G since i and j are fixed by p and generate G, but p = 1. It is, however, a colour-preserving automorphism of r. (Z4 x Z2) Let r = Cay(Z4 x Z2; {±(1,0), ±(1,1)}). This is again the complete bipartite graph K4 4. (See Figure 1 with the labels that are outside the vertices.) Let p be the graph automorphism that interchanges the vertices (0,1) and (2,1) while fixing all of the other vertices. This is clearly not an automorphism of G since (1,0) and (1,1) are fixed by p and generate G, but p = 1. It is, however, a colour-preserving automorphism of r. □ (0,0) (1,0)( i (1,1) (0,1) Figure 1: Interchanging the two black vertices while fixing all of the white vertices is a colour-preserving graph automorphism that fixes the identity vertex but is not a group automorphism. Both of the groups in Example 2.2 are generalized dicyclic (cf. Definition 2.6): • Qg is the generalized dicyclic group over Z4, and • Z4 x Z2 is the generalized dicyclic group over Z2 x Z2. More generally, we will see in Corollary 2.8(4) below that no generalized dicyclic group is CCA (unless the cyclic group Z4 is considered to be dicyclic). A. Hujdurovic et al.: On colour-preserving automorphisms of Cayley graphs 193 We will see in Theorem 6.8 that the following example is the smallest group of odd order that is not CCA. Example 2.3. The nonabelian group of order 21 is not CCA. Proof. Let G = (a, x | a3 = e, a-1xa = x2 }. (Since x = e-1xe = a-3xa3 = x8, the relations imply x7 = e, so G has order 21.) By letting b = ax, we see that G also has the presentation G = ( a, b | a3 = e, (ab-1 )2 = b-1a}. As illustrated in Figure 2, every element of G can be written uniquely in the form aVak, where i, j, k G {0, ±1} and j = 0 ^ k = 0. Define {bj a-k if i = 0, ab-j ak if i = 1, a-1b-j a-k if i = -1. Then ^ is a colour-preserving automorphism of Cay(G; {a±1, b±1^ (see Figure 2). However, ^ is not affine, since it fixes e, but is not an automorphism of G (because y(ab) = ab-1 = ab = y>(a) y>(b)). □ Figure 2: The colour-preserving automorphism ^ fixes every black vertex, but interchanges the two vertices labeled ©, for 1 < i < 8. Since the neighbours of both copies of © have the same labels (for example, the vertices labeled © are connected by a black edge to © and ©, and by a white edge to © and ©), we see that ^ is indeed a colour-preserving automorphism of the graph (if the orientations of the edges are ignored). 194 Ars Math. Contemp. 11 (2016) 101-106 See Proposition 3.3 for a generalization of the following example. Example 2.4. The wreath product Zm I Zn is not CCA whenever m > 3 and n > 2. Proof. This group is a semidirect product (Z m X Zm X • • • X Zm) X Zn. For the generators a = ((1,0,0,..., 0), 0) and b = ((0,0,..., 0), 1), the map ((xi,x2,x3, ...,x„),y) ^ ((-xi,x2,x3, ...,x„),y) (negate a sing(le factor of the abeli)an normal subgroup) is a colour-preserving automorphism of Cay (Zm I Zn; { a±1, b±1}) that fixes the identity element but is not a group automorphism. □ The following construction provides many additional examples of non-CCA groups by generalizing the idea of Example 2.2. Proposition 2.5. Suppose there is a generating set S of G, an element t of G, and a subset T of S, such that: • t is an element of order 2, • each element of S is either centralized or inverted by t, • t2 = t for all t € T, • the subgroup ((S \ T) U {t}} is not all of G, and • either |G : ((S \ T) U {t}} | > 2 or t is not in the centre of G. Then G is not CCA. Proof. For convenience, let H = ((S \ T) U {t}}. Since (S} = G, but, by assumption, H = G, there exists some x € T \ H. Define <^(g) = I gT if g € xH, 1 g otherwise. It is obvious that ^ fixes e, since e € xH. We claim that ^ is is not an automorphism of G. If |G : H | > 2, this follows from the fact that a nonidentity automorphism cannot fix more than half of the elements of G. Thus, we may assume |G : H| = 2. Then, by assumption, there is some element h of G that does not commute with t. Since t commutes with every element of T (because t = t2), we see that we may assume h € H .If ^ is an automorphism, then, since it is the identity on the normal subgroup H of G, but x-1 = xx-2 = xt € xH, we have: x-1hx = <^>(x-1hx) = <^>(x-1) • ^>(h) • ^>(x) = x-1T • h • xt = x-1hxT2 = x-1hx. This is a contradiction. Since each element of S is either centralized or inverted by t, we know that right-multiplication by t is a colour-preserving automorphism of Cay(G; S). Restricting to xH, A. Hujdurovic et al.: On colour-preserving automorphisms of Cayley graphs 195 this tells us that ^ preserves colours (and existence) of all edges of Cay(G; S) that have both endvertices in xH. Now consider an edge from g to h, where g G xH and h G xH. There is some element t G T such that gt = h, and there is an edge of the same colour from y(g) = gr to grt-1. Since t2 = t and r2 = e, we have t-1 = rt. Hence, the edge is from y>(g) to grt-1 = gt2t-1 = gt = h = y(h). Thus ^ preserves the existence and colour of every edge from a vertex in xH to a vertex outside of xH. Since the only vertices moved by ^ are in xH, this shows that ^ is a colour-preserving automorphism of Cay(G; S). □ Here are a few particular examples to which Proposition 2.5 can be applied. Definition 2.6. Let A be an abelian group of even order. Choose an involution y of A. The corresponding generalized dicyclic group is Dic(y, A) = (x, A | x2 = y, x-1ax = a-1, Va G A}. Definition 2.7. For n > 1, let SemiD16n = (a, x | a8n = x2 = e, xa = a4n-1x}. This is a semidihedral (or quasidihedral) group. The term is usually used only when n is a power of 2, but the construction is valid more generally. Corollary 2.8. The following groups are not CCA: 1. Z4 x Z2, 2. Z2k x Z2 x Z2,for any k > 2, 3. Q8, 4. every generalized dicyclic group except Z4 (this generalizes (3)), and 5. every semidihedral group. Proof. (1) Apply Proposition 2.5 with r = (2,0) and S = T = {(1,0), (1,1)}. (2) Apply Proposition 2.5 with r = (2k-1,0,0), T = {(2k-2,1,0), (2k-2,0,1)}, and S = {(1,0,0)}U T. (3) Since ¿2 = j2 = -1, we may apply Proposition 2.5 with r = -1 and S = T = {ij }. (4) For G = Dic(y, A) = (x, y, A}, apply Proposition 2.5 with r = y and S = T = xA. (We have |G : ((S \ T) U {r}}| = |G : (r}| = |G|/2 > 2, since G = Z4.) (5) For G = SemiD16n = (a, x}, apply Proposition 2.5 with r = a4n, T = {(ax)±1}, and S = {x} U T. (Note that |G : ((S \ T) U {r}} | = |G : (x, r}| = |G|/4 > 4.) □ 3 Direct products and semidirect products Proposition 3.1. If G1 is not strongly CCA, and G2 is any group, then G1 x G2 is not strongly CCA. Furthermore, the same is true with "CCA" in the place of "strongly CCA!' 196 Ars Math. Contemp. 11 (2016) 101-106 Proof. Since G1 is not strongly CCA, some connected Cayley graph Cay(Gi; Si) on Gi has a colour-permuting automorphism < that is not affine. Let n be a permutation of S1, such that ^1(g1s) G j^1(g1) n(s)±1} for all g1 G G1. (If G1 is not CCA, then we may assume n is the identity permutation.) Now, fix any connected Cayley graph Cay(G2; S2) on G2, and let S = (S1 xje}) U (je}x S2), so Cay(G1 x G2; S) is connected. (It is isomorphic to the Cartesian product Cay(G1; S1) □ Cay(G2; S2).) Define a permutation < of G1 x G2 by <(01 ,02) = (<£>(01), 02). For all (01,02) G G1 x G2 and sj G Sj, we have • <((01,02) • (s1; e)) = (<1(01s1),02) G {<(01,02) • (n(s1),e)±1},and • <((01,02) • (e, = (<1(01),02s^ = <(01,02) • (e, s2). Therefore, < is a colour-permuting automorphism of Cay(G1 x G2; S) (and it is colour-preserving if n is the identity permutation of S1). However, < is not affine (since its restriction to G1 is the permutation < 1 , which is not affine). So G is not strongly CCA (and is not CCA if n is the identity permutation of S1). □ Proposition 3.1 tells us that if G1 x G2 is CCA, then G1 and G2 must both be CCA. The converse is not true. (For example, Z4 and Z2 are both CCA, but Example 2.2 tells us that the direct product Z4 x Z2 is not CCA.) However, the converse is indeed true when the groups are of relatively prime order: Proposition 3.2. Assume gcd(|G1|, |G2|) = 1. Then G1 x G2 is CCA (or strongly CCA) if and only if G1 and G2 are both CCA (or strongly CCA, respectively). Proof. Proposition 3.1. Let • G = G1 x G2, • S be a generating set of G, • < be a colour-permuting automorphism of Cay(G; S) that fixes the identity element (see Remark 2.1), • n : G1 x G2 ^ Gj be the natural projection, and • k be a multiple of |G21 that is = 1 (mod |G11), so 0k = n1 (0) for all 0 G G. Consider some s G S, and let t = <(s), so <(xsj) = <(x) t±j for all x G G and i G Z. Then, for all 0 G G, we have <(0n1(s)) = <(0sk) = <(0) t±k = <(0) • n1(t)±1. (*) Since n1(S) generates G1, this implies there is a well-defined permutation <2 of G2, such that <(G1 x {02}) = G1 x {<2(02)}. A. Hujdurovic et al.: On colour-preserving automorphisms of Cayley graphs 197 By repeating the argument with the roles of G1 and G2 interchanged, we conclude that there is a permutation < of G1, such that ¥>(01,02) = (<£1(01), ¥>2(02)) • Now, (*) implies that <1 is a colour-permuting automorphism of Cay(G1; n^S)). Similarly, <2 is a colour-permuting automorphism of Cay(G2; n2(S)). Since each Gj is CCA, we conclude that < is an automorphism of Gj. So < is an automorphism of G1 x G2. □ The idea used in Example 2.4 yields the following result that generalizes the CCA part of Proposition 3.1. Proposition 3.3. Suppose G = H x K is a semidirect product, and Cay(H; S0) is a connected Cayley graph of H, such that: • S0 is invariant under conjugation by every element of K, and • there is a colour-preserving automorphism <0 of Cay(H; S0), such that either o <0 is not affine, or o <0(e) = e, and there exist s G S0 and k G K, such that <0(k-1sk) = k-1 <0(s) k. Then G is not CCA. Proof. Define <: G ^ G by <(hk) = <0(h) k. We claim that < is a colour-preserving automorphism of Cay(G; S0 U K) that is not affine (so G is not CCA, as desired). For k1 G K, we have <(hk k1) = <0(h) kk1 = <(hk) k1, so < preserves the colour of K-edges. Now consider some s G S0 and let ks = ksk-1 G S0. Then, since <0 is colour preserving, we have <(hks) = <(h ksk) = <0(h ks) k = (<0(h) (ks)±1) k = <0(h) ks±1 = <(hk) s±1, so < also preserves the colour of S0-edges. Hence, < is colour-preserving. Now, suppose < is affine. Then the restriction <0 of < to H is also affine, so, by assumption, we must have <(e) = e, so < is an automorphism of G. Hence, for all s G S0 and k G K, we have <0(k-1sk) = <(k-1sk) = <(k)-1 <(s) <(k) = k-1 <(s) k = k-1 <0(s) k. This contradicts the hypotheses of the proposition. □ Remark 3.4. Proposition 3.3 can be generalized slightly: assume G = HK and H < G (but do not assume H n K = {e}, which would make G a semidirect product). Then the above proof applies if we make the additional assumption that <0(hk) = <0(h) k for all h G H and k G H n K. 198 Ars Math. Contemp. 11 (2016) 101-106 4 Abelian groups The following result shows that all non-CCA abelian groups can be constructed from examples that we have already seen in Corollary 2.8 (and that CCA and strongly CCA are equivalent for abelian groups). Proposition 4.1. For an abelian group G, the following are equivalent: 1. G has a direct factor that is isomorphic to either Z4 x Z2 or a group of the form Z2k x Z2 x Z2, with k > 3. 2. G is not CCA. 3. G is not strongly CCA. Proof. (1 ^ 2) This is immediate from Corollary 2.8 and Proposition 3.1. (2 ^ 3) Obvious. (3 ^ 1) Let ^ be a colour-permuting automorphism of any connected Cayley graph Cay(G; S) on G, such that y(0) = 0. From Proposition 3.2 (and the fact that any abelian group is the direct sum of its Sylow subgroups), we may assume G is a p-group for some prime p. Then G == Zpfc^ X Z„k2 x • • • x Zpkm, with ki > k2 > • • • > km > 1. Since S is a generating set, it is easy to see that there is some s1 G S, such that |s11 = pkl. Also, it is a basic fact about finite abelian groups that every cyclic subgroup of maximal order is a direct summand [4, Lem. 1.3.3, p. 10]. Therefore, by induction on i, we see that there exist s1,..., sm G S, such that if we let Gj = (s1,..., sft, then Gj = Gi-1 x Zpfci and G = Gj x Zpki+1 x • • • x Zpkm, for each i. It is important to note that each element of Gj can be written uniquely in the form g + rsj, with g G Gj-i and -pki/2 < r < pki/2 (and r G Z). (f) For convenience, also let tj = y(sj) and Hj = (ti,... ,tj). We will show, by induction on i, that if G does not have any direct summands of the form specified in the statement of the proposition, then Hj is a direct factor of G, and the restriction of ^ to Gj is an isomorphism onto Hj. (Note that this implies G/Gj = G/ff^ by the uniqueness of the decomposition of G as a direct sum of cyclic groups.) Taking i = m yields the desired conclusion that ^ is an automorphism of G. The base case i = 0 is trivial. For the induction step, write G = Gj-1 x G, so G = G/Gj-i = Zpki x Zpki+i x • • • x Zpkm, and let_: G ^ G be the natural projection. Then (sj) = Gj = Zpki is a direct summand of G. Since ^ is colour-permuting (and Hj-1 = ^(Gj-1) is a subgroup), it is easy to see that the order of tj in G/Hj-1 is equal to pki (the same as the the order of sj in G/Gj-1), and that ^>(pfci sj) = pkitj. This implies that if we define a: Gj ^ Hj by a(g + rsj) = y(g) + rtj for g G Gj-1 and r G Z, A. Hujdurovic et al.: On colour-preserving automorphisms of Cayley graphs 199 then a is a well-defined isomorphism. So we need only show that the restriction of p to Gi is equal to a (unless G has a direct summand of the desired form). Suppose p|Gi = a. (This will lead either to a contradiction or to a summand of the desired form.) Since p is colour-permuting and, by definition, a agrees with p on Gi_i, this implies there is some g G Gi_1, such that p(g + si) = a(g + si). However, since p is colour-permuting, we know p(g + si) = p(g) ± p(si) = a(g) ± ti. Since a(g + si) = a(g) + ti, the preceding two sentences imply p(g + si) = a(g) - ti G Hi_i - ti. Furthermore, since p is colour-permuting (and p(sj) = tj), we know that it maps edges of colour js^1},..., {s±11} to edges of colour {t±1},..., {t±_11}, so p(x + h) G p(x) + Hi_1 for all x G G and h G Hi_1. Taking x = si and h = g yields p(g + si) G Hi_1 + p(si) = Hi_1 + ti. This contradicts the uniqueness of r in the analogue of (f) for Hi, unless 1 = pki/2. Hence, we must have pki = 2 (so Z2 is a direct summand of G), which means p = 2 and ki = 1. We have p(g) + 2ti = a(g + 2si) (definition of a) = p(g + 2si) (g + 2si = g + pkisi G Gi_1) = p(g) - 2ti (p(g + si) = a(g) - ti = p(g) - ti), so 4ti = 0. Also note that, since p(g) + ti = a(g + si) = p(g + si) = p(g) - ti, we must have 2ti = 0. So |ti | = 4. Since (s1;..., si_1) = Gi_1, there must exist g' G Gi_1, and j < i, such that p(g' + si) = a(g') + ti, but p(g + sj + si) = a(g' + sj) - ti = a(g') + tj - ti. Since p is colour-permuting, we also have p(g' + sj + si) = p(g' + si) ± tj = a(g') + ti ± tj. Hence, tj - ti = ti ± tj, so tj ^ tj = 2ti. Since 2ti = 0, we conclude that 2tj = 2ti; hence, |tj | =4. Since 2kj = ^j : Hj_^ is a divisor of |tj |, and |tj | = 4, there are two possibilities for kj: • If kj = 2, then Z4 x Z2 = Z2kj x Z2ki is a direct summand of G, as desired. • If kj = 1, then, since |tj | = 4, there must be some I < j, such that k£ > 2. This implies that Z2kt x Z2 x Z2 = Z2kt x Z2kj x Z2ki is a direct summand of G, as desired. □ Corollary 4.2. For n G Z+, there is a non-CCA abelian group of order n if and only if n is divisible by 8. 200 Ars Math. Contemp. 11 (2016) 101-106 5 Generalized dihedral groups Definition 5.1. The generalized dihedral group over an abelian group A is the group (a, A | a2 = e, aaa = a-1 Va G A}. Lemma 5.2. Suppose D is the generalized dihedral group over an abelian group A, and f is a colour-permuting automorphism of a connected Cayley graph Cay(D; S), such that f (e) = e. If A is strongly CCA, and f (S n A) = S n A, then f is an automorphism of D. Proof. Label the elements of S as S = {a1; a2,..., ak, a1; a2,..., at}, where aj G A for 1 < i < k, and aj G A for 1 < i < t (so each is an involution that inverts the elements of A). By assumption, {a1; a2,..., ak} and {a1; a2,..., at} are invariant under f. Thus, for each i, we have • f (aj) = aj for some aj G {a1; a2,..., ak}, and • f (aj) = a' for some a' G {a1; a2,..., at}. Notice that since a1,..., at are involutions, each aj is its own inverse. Therefore, whenever a is a word in a1,..., at and g G D, the fact that f is a colour-permuting automorphism means that f (ga) = f (g)a', where a' is formed from a by replacing each instance of aj in a by a'. Therefore, if we let E be the subgroup generated by {a1;..., at}, then f is a colour-preserving automorphism of the Cayley graph Cay(D; S U E). Hence, there is no harm in assuming that S = S U E, so E C S. Since (S n A} is normal in D (in fact, every subgroup of A is normal, because every element of D either centralizes or inverts it), we have D = (S n A}E. Therefore A = (SnA} (EnA) = (SnA}, so Cay(A; SnA) is connected. Since f is colour-preserving, and f (S n A) = S n A, this implies that f (A) = A. So f is a colour-permuting automorphism of the connected Cayley graph Cay(A; S n A). Since, by assumption, A is strongly CCA, this implies that f |A is an automorphism of A. So f (abe) = f (a) f (b)e for all a, b G A and e G Z. Now we are ready to show that f is an automorphism of D. Let g, h G D. Then we may write g = aa and h = ba, where a, b G A and a, a G {e, a1}. For convenience, let e G {±1}, such that aca = ce for all c G A. Note that, since a' G {a1;..., at}, we know that a' and a' both invert A, so we also have a'ca' = ce. Then f (gh) = f (aa • ba) = f (abe • aa) = f (a) f (b)e • a'a' = f (a)a' • f (b)a' = f (g) • f (h). Since g, h G D are arbitrary, this proves that f is an automorphism of D. □ Proposition 5.3. The generalized dihedral group D over an abelian group A is CCA if and only if A is CCA. Proof. Note that if f is any colour-preserving automorphism of a connected Cayley graph Cay(D; S), then f (S n A) = S n A, since A is closed under inverses. Furthermore, A is strongly CCA, since it is assumed to be CCA and every CCA abelian group is strongly CCA (see Proposition 4.1). Therefore, Lemma 5.2 implies that f is a group automorphism. So D is CCA. Write D = A x (a}. Since A is not CCA, there is a colour-preserving automorphism f 0 of some connected Cayley graph Cay(A; S), such that f 0 is not affine. Since A. Hujdurovic et al.: On colour-preserving automorphisms of Cayley graphs 201 a inverts every element of S, it is easy to see that Cay(D; S U ja}) is isomorphic to the Cartesian product Cay(A; S) □ P2. So the proof of Proposition 3.1 provides a colour-preserving automorphism ^ of Cay(D; S U ja}) whose restriction to A is y>0, which is not an affine map. Therefore, ^ is not affine. □ The following result is the special case where A is cyclic (since Proposition 4.1 implies that every cyclic group is CCA). Corollary 5.4. Every dihedral group is CCA. Lemma 5.5. If T is a generating set of a group H, and a is a nontrivial automorphism of H, such that a(t) G jt±1| for every t G T, then the group G = (H x (a)) x Z2 is not strongly CCA. Proof. Let G' = H x Z2 x Z2 and define ^: G ^ G' by ax,y) = (h, x,y) for h G H and x, y G Z2. Since a(t) G jt±1} for every t, it is easy to verify that ^ is a colour-respecting isomorphism from Cay(G; (H, e, 0) U j(e, a, 0), (e, 0,1)}) to Cay(G; (H, 0, 0) U j(e, 1, 0), (e, 0,1)}). Permuting the two Z2 factors of G' provides an automorphism of G' that preserves the generating set, and therefore corresponds to a colour-permuting automorphism of the two Cayley graphs. However, it is not an automorphism of G, since it takes the central element (e, e, 1) to (e, a, 0), which is not central (since the automorphism a is nontrivial). □ Proposition 5.6. The generalized dihedral group over an abelian group A is strongly CCA if and only if either A does not have Z2 as a direct factor, or A is an elementary abelian 2-group (in which case, the generalized dihedral group is also an elementary abelian 2-group). Proof. Suppose A = A' x Z2, and A' is not elementary abelian. Then the generalized dihedral group A x (a) over A is isomorphic to (A' x (a)) x Z2, so Lemma 5.5 tells us that it is not strongly CCA. Let D = A x (a) be the generalized dihedral group over A, and let ^ be a colour-permuting automorphism of a connected Cayley graph Cay(D; S), such that y(e) = e. We may assume A does not have Z2 as a direct factor (otherwise, the desired conclusion follows from the fact that every elementary abelian 2-group is strongly CCA (see Proposition 4.1)). From Proposition 4.1, we see that A is strongly CCA. Hence, the desired conclusion will follow from Lemma 5.2 if we show that y(S n A) = S n A. Let a G S n A. Since ^ is colour-permuting, we have |y(s)| = |s| for all s G S. Also, we know that |g| = 2 for all g G D \ A. Therefore, it is obvious that y(a) G S n A if |a| = 2. So we may assume |a| = 2. Since A does not have Z2 as a direct factor, this implies that a is a square in A: that is, we have a = x2, for some x G A. Also, since Cay(D; S) is connected, we may write x = s1s2 • • • sn for some s1,..., sn G S. So a = (s1s2 • • • sn)2 can be written as a word in which every element of S occurs an even number of times. Since ^ is colour-permuting, this implies that y(a) can be written as a word in which, for each s g S, the total number of occurrences of either s or s-1 is even. Since s and s-1 both either centralize A or invert it, this implies that <^(a) centralizes A. Since every element of D \ A inverts A, we conclude that y(a) G A, as desired. □ 202 Ars Math. Contemp. 11 (2016) 101-106 6 Groups of odd order The following notation will be assumed throughout this section. Notation 6.1. For a fixed Cayley graph Cay(G; S): • A° is the group of all colour-preserving automorphisms of Cay(G; S). • G is the subgroup of A0 consisting of all left translations by elements of G. (Although we do not need this terminology, it is often called the left regular representation of G.) • He is the stabilizer of the identity element e in Cay(G; S), for any subgroup H of A0. Remark 6.2. It is well known (and very easy to prove) that a permutation of G is affine if and only if it normalizes G (see, for example [10, Lem. 2]). Lemma 6.3. A° is a 2-group. Proof. Let ^ G A°, so ^ is a colour-preserving automorphism of Cay(G; S) that fixes e. If C is any monochromatic cycle through e, then either ^ is the identity on C or ^ reverses the orientation of C. Therefore, acts trivially on the union of all monochromatic cycles that contain e. This implies that acts trivially on all vertices at distance < 1 from e. ok Repeating the argument shows that acts trivially on all vertices at distance < k — 1 ok from e. For k larger than the diameter of Cay(G; S), this implies that is trivial. So the order of ^ is a power of 2. □ Proposition 6.4. Let Cay(G; S) be a connected Cayley graph on a group G of odd order. If every colour-preserving automorphism of Cay(G; S) is affine, then every colour-permuting automorphism is affine. Proof. Let A* be the group of all colour-permuting automorphisms of Cay(G; S). Since A* acts on the set of colours, and A° is the kernel of this action (and the kernel of a homomorphism is always normal), it is obvious that A° < A*. Also, since G is CCA, we have G < A° (cf. Remark 6.2). Furthermore, |G| is odd, |A° | is a power of 2, and A° = G • A°. Therefore, G is the (unique) largest normal subgroup of odd order in A°. The uniqueness implies that G is characteristic in A°. (That is, it is fixed by all automorphisms of A°.) So G is a characteristic subgroup of the normal subgroup A° of A*. Although a normal subgroup of a normal subgroup need not be normal, it is well known (and easy to prove) that any characteristic subgroup of a normal subgroup is normal [4, Thm. 2.1.2(ii), p. 16]. Therefore G < A*. This implies that G is strongly CCA (see Remark 6.2). □ Wreath products Zm\Zn provide examples of non-CCA groups of odd order (see Example 2.4). We will see in Theorem 6.8 that the following slightly more general construction is essential for understanding many of the other non-CCA groups of odd order. Example 6.5. Let a be an automorphism of a group A, and let n G Z+. Then we can define an automorphism a of An by a(wi,. .. ,w„) = (a(w„), wi,w2,. .. , w„_i). A. Hujdurovic et al.: On colour-preserving automorphisms of Cayley graphs 203 It is easy to see that the order of a is n times the order of a, so we may form the corresponding semidirect product An x ^Zn | a |. Let us call this the semi-wreathed product of A by Zn, with respect to the automorphism a, and denote it A la Zn. (If a is the trivial automorphism, then this is the usual wreath product A I Zn.) Negating the first coordinate, as in Example 2.4, shows that if n > 1 and A is abelian, but not an elementary abelian 2-group, then A la Zn is not CCA. Remark 6.6. Because it may be of interest to find minimal examples, we point out that any semi-wreathed product of odd order satisfying the conditions in the final paragraph of Example 6.5 must contain a subgroup that is isomorphic to a semi-wreathed product A ia Zq, where A is an elementary abelian p-group, p and q are primes (not necessarily distinct), a is an automorphism of q-power order, and no nontrivial, proper subgroup of A is invariant under a. Definition 6.7 ([4, p. 5]). Let G be a group. For any subgroups H and K of G, such that K < H, the quotient H/K is said to be a section of G. Theorem 6.8. Any non-CCA group of odd order has a section that is isomorphic to either: 1. a semi-wreathed product A la Zn (see Example 6.5), where A is a nontrivial, elementary abelian group (of odd order) and n > 1, or 2. the (unique) nonabelian group of order 21. Proof. Assume Cay(G; S) is a connected Cayley graph on a group G of odd order that does not have a section as described in either (1) or (2). We will show, by induction on the order, that if A is any subgroup of A0 that contains G, then G is a normal subgroup of A. (Then taking A = A0 implies that G is CCA (see Remark 6.2).) It is important to note that this conclusion implies G is a characteristic subgroup of A (because Lemma 6.3 implies that G is the unique largest normal subgroup of odd order). For convenience, we write G < A when G is characteristic. Let N be a minimal normal subgroup of A. Then N is either elementary abelian or the direct product of (isomorphic) nonabelian simple groups [4, Thm. 2.1.5, p. 17], and we consider the two possibilities as separate cases. Case 1. Assume N is elementary abelian. Since the Sylow 2-subgroup Ae, being the stabilizer of a vertex, does not contain any normal subgroups of A, we know that N is not contained in a Sylow 2-subgroup. Hence, N is not a 2-group, so it must be a p-group for some odd prime p. Therefore, since G is a maximal subgroup of odd order, we have N C G, so N = N, for some (elementary abelian) normal subgroup N of G. Let N+ be the largest normal subgroup of A that is contained in NAe. Since NAe is the stabilizer of a point under the action of A on the space G/N of N-orbits, we know that N+ is the kernel of the action of A on G/N, so A/N+ is a group of colour-preserving automorphisms of Cay(G/N; S), where S is the image of S in G/N.. Therefore, by induction on |A|, we know that GN+/N+ is normal in A/N+, so GN+ is normal in A. Then we may assume Gn+ = A, for otherwise, by induction on |A|, we would know G < Gn+, so G < A, as desired. Since |G| is odd, this implies that N+ contains a Sylow 2-subgroup of A. In fact, since N+ is normal and all Sylow 2-subgroups are conjugate, this 204 Ars Math. Contemp. 11 (2016) 101-106 implies that N+ contains every Sylow 2-subgroup. In particular, it contains Ae. Therefore N+ = NAe, so NAe < A. This means that Ae acts trivially on G/N, so, for every s G S \ N, Ae preserves the orientation of every s-edge. (This uses the fact that, since |s | is odd, s ^ s-1 (mod N) if s G N.) This implies: for ^ G Ae, g G G, and x G (S \ N}, we have y(gx) = ^(g) x. (6.9) Let (S n N) = { gsg-1 | s G S n N, g G (S \ N} }. Now, suppose t G (SnN) and h G N. There exists s G SnN and x G (S \ N}, such that xsx-1 = t. From (6.9) and the fact that ^ is colour-preserving, we see that y(ht) = ^(hxsx-1) = y(h) x s±1x-1 = <^(h) t^1. Hence, is a colour-preserving automorphism of Cay(V; (S n N) U ((S \ N} n N)). Since S generates G, it is easy to see that this Cayley graph is connected. Note that CAe (N) is normalized by both N and Ae, so it is a normal subgroup of NAe. Therefore, it must be trivial (since the largest normal 2-subgroup of NAe is characteristic, and is therefore normal in A, but the stabilizer Ae does not contain any nontrivial normal subgroups of A). So Ae acts faithfully by conjugation on N. (6.10) Also, we know that is an automorphism of N (by Remark 6.2, since ^ normalizes N = N). Since, being a colour-preserving automorphism, ^ either centralizes or inverts every element of the generating set of N, this implies that ^2|N is trivial. Since this is true for every ^ G Ae, we conclude that Ae acts on N via an elementary abelian 2-group. From (6.10), we conclude that Ae is elementary abelian. We can think of N as a vector space over Zp, and, for each homomorphism 7: A ^ {±1}, let Ny = { n G N | ana-1 = 7(a) n for all a G Ae }. (This is called the "weight space" associated to 7.) Since every linear transformation satisfying T2 = I is diagonalizable, and Ae is commutative, the elements of Ae can be simultaneously diagonalized. This means that if we let r — {7 | N7 = {0} }, then, since eigenspaces for different eigenvalues are always linearly independent, we have N = 07er Ny. This direct-sum decomposition is canonically defined from the action of Ae on N. Since G acts on NAe (by conjugation), we conclude that the action of G on N by conjugation must permute the weight spaces. More precisely, there is an action of G on r, such that VN7V-1 = Ng7 for all g G G. Since N is abelian, this factors through to a well-defined action of G/N on r. If the G-action on r is trivial, then every weight space is G-invariant, which implies that the action ^f G on N commutes with the ^ction of Ae. Sjnce Ae acts faithfully, we conclude that G centralizes AeN/N; that is, [G, Ae] C N C G. So Ae normalizes G, as desired. A. Hujdurovic et al.: On colour-preserving automorphisms of Cayley graphs 205 We may now assume that the G-action is nontrivial, so there is some g G G with an orbit of some length n > 1 on r. Let 70 be an element of this orbit, so gn normalizes NYo. Since S \ N generates G/N, we may assume g G S \ N, so (6.9) tells us that (?) n N is centralized by Ae. However, the minimality of N implies that CN(Ae) = N n Z(NAe) is trivial. Therefore, (N, g) = N x (?) is a semidirect product. So (Nyo,?) = (0 PM N7) x (g). Then modding out C^ (NYo ) yields a section of G that is isomorphic to NYo \a Zn, where a is the automorphism of NYo induced by the conjugation action of g™. So G has a semi-wreathed section, as described in (1). This completes the proof of this case. Case 2. Assume N = £1 x • • • x Lr, where each Li is a nonabelian simple group, and Li = L1 for all i. We know that A = GAe, Ae is a 2-group, and |G| is odd, so G is a 2-complement in A. (By definition, this means that |G| is odd and |A : G| is a power of 2 [6, p. 88].) So L1 is a nonabelian simple group that has a 2-complement (namely, G n L1). By using the Classification of Finite Simple Groups, it can be shown that this implies L1 = PSL(2,p), for some Mersenne prime p > 7 (see [8, Thm. 1.3]). Note that Ae n Li is a Sylow 2-subgroup of PSL(2,p). Therefore, it is dihedral [4, Lem. 15.1.1(iii)] and has order p +1 (because p is a Mersenne prime). Let • Ci be the unique cyclic subgroup of order (p + 1)/2 in Ae n Li, • C2 be the unique subgroup of index 2 in Ci, and • e2 = e1 x • • • e2 c Ae n (l1 x • • • x Lr). Since every element of ei is a colour-preserving automorphism, it either fixes or inverts each element of S, so we know that C2 fixes every element of S. Since stabilizers are conjugate, this implies s-1 e2g C Ae, for every s G S. We must have p > 7, for otherwise G n Li, being the 2-complement of PSL(2, 7), would be the nonabelian group of order 21, as in (2). This implies that C2 is the unique cyclic subgroup of order (p + 1)/4 in the dihedral group Ae n Li, so we must have s- 1e2g = C2, which means that Snormalizes C2. Since this holds for every s in the generating set S, we conclude that G normalizes C2. Note that Ae normalizes Ae n N, and that C2 < Ae n N (since, as was mentioned above, Ci is the unique cyclic subgroup of its order in Ae n Li). Therefore, C2 < Ae. We conclude that C2 is normal in GAe = A. So C2 = C2 n L1 is normal in L1, contradicting the fact that L1 is simple. □ Lemma 6.11. To prove a group G is strongly CCA (or CCA), it suffices to consider only the connected Cayley graphs Cay(G; S), such that every element of S has prime-power order. Proof. Suppose is a colour-permuting automorphism of some connected Cayley graph Cay(G; S). There is a permutation n of S, such that y(gs) = y(g) n(s)±1, for all g G G and s G S. (Furthermore, if is colour-preserving, then n can be taken to be the identity permutation.) By induction on k, this implies ^(gsfc) = 8, and n is divisible by either 4, 21, or a number of the form pq ■ q, where p and q are primes (not necessarily distinct) and p is odd. Proof. We prove (1 ^ 3) and (1 ^ 2). (3 ^ 1) If n is divisible by 4, then there is a generalized dicyclic group of order n, which is not CCA (see Corollary 2.8(4)). The nonabelian group of order 21 and the wreath product Zp I Zq (which is of order pq ■ q) are not CCA (see Examples 2.3 and 2.4). Taking an appropriate direct product yields a non-CCA group whose order is any multiple of these (see Proposition 3.1). (1 ^ 3) Assume there is a group G of order n that is not CCA, but n is not divisible by 4, 21, or a number of the form pq ■ q. From Theorem 6.8, we see that n is even. (Otherwise, n = |G| is divisible by the order of a semi-wreathed product | A ia Zk |. If we let p and q be prime divisors of |A| and k, respectively, then |A ia Zk| = |A|k ■ k is amultiple ofpq ■ q.) Furthermore, n must be square-free, for otherwise it is a multiple of either 4 or p2 ■ 2, for some prime p. Therefore, G is a semidirect product Zk We may assume the centre of G is trivial, for otherwise we can write G as a nontrivial direct product, so Proposition 3.2 (and induction on n) implies that G is CCA. Therefore, k is odd (so I is even), so we may write G = Zk x (Zm x Z2), and Zm x Z2 acts faithfully on Zk. Let H = Zk x Zm, so |H | = km is odd, and H is the (unique) subgroup of index 2 in G. Let y be a colour-preserving automorphism of a connected Cayley graph Cay(G; S). (We wish to show that y is affine.) There is no harm in assuming that every element of S has prime order (see Lemma 6.11). Fix some t G S with |t| = 2. We claim we may assume that t is the only element of order 2 in S, and that H = (S \ {t}). To see this, let A. Hujdurovic et al.: On colour-preserving automorphisms of Cayley graphs 207 • T be the set of all elements of order 2 in S, and • S' = {t} U { uv | u, v G T, u = v } U (S \ T). It is easy to see that p is a colour-preserving automorphism of the connected Cayley graph Cay(G; S'), and that G = (S \ {t})(t}. This establishes the claims. From Theorem 6.8 (and the fact that |H| is odd), we know that p|H is affine. By composing with a left translation, we may assume that p fixes e. Then p|H is a group automorphism. By composing with an automorphism of Zk x (Zm x Z2) of the form (x, y, z) ^ (xr, y, z), we may assume p|Zk is the identity map. Also, since p(s) G {s±1} for every s G S, and |H/Zk| = m is odd, Lemma 6.12 implies that p also fixes every element of (S n H) \ Zk. Hence, p|H is an automorphism that fixes every element of a generating set, so p(h) = h for every h G H. Since p(ht) = p(h) t = ht, for all h G H (because p is colour-preserving and t = t-1), we conclude that p fixes every element of G, and is therefore affine, as desired. (1 ^ 2) Obvious. (2 ^ 1) Assume there is a group G of order n that is not strongly CCA, but n is not divisible by 4, 21, or a number of the form pq ■ q. Let p be a colour-permuting automorphism of some connected Cayley graph Cay(G; S), such that p(e) = e. As in the proof of (1 ^ 3) above, we see that we may assume |G| is square-free, and we may write G = Zk x (Zm x Z2), where Zm x Z2 acts faithfully on Zk. Let H = Zk x Zm be the (unique) subgroup of index 2 in G. From (1 ^ 3) above, we know that G is CCA, so G < A0. Hence, H < A0 (since it is the unique largest normal subgroup of odd order), so p normalizes H. This implies that the restriction of p to H is an automorphism of H. For each s g S, let I = p(s) G S. To prove that p is affine, it suffices to show p(xs) = p(x) I for all x G G and s G S (see Remark 1.6(4)). If this is not the case, then, since p is colour-permuting, there must be some x, such that p(xs) = p(x) I-1 (and I-1 = I, which means |s| = 2). This will lead to a contradiction. We may assume every element of S has prime order (see Lemma 6.11). Since |s| = 2, this implies s G H. Then, since p|H is an automorphism, but p(xs) = p(x) I-1 = p(x) p(s)-1 = p(x) p(s), we must have x G H. Since H has only two cosets, and there must be some element of S that is not in H, this implies that we may assume x G S, after multiplying on the left by an appropriate element of H (and using the fact that p normalizes H). Note that, since x G H, and every element of S has prime order, this implies |x| = 2. So the order of I is also 2, which implies xI / H (since | H| is odd). Since p is colour-permuting, we have p(xs) = p( xsx) = p( xs)I. Also, by the choice of x and s, we have p(xs) = p(x) I-1 = 11-1. Therefore fx \ x—— 1 p(xs) = xsI . Since Zm acts faithfully on Zk, we have a(h) = h (mod Zk), for every automorphism a of H (see Lemma 6.12). Since p and conjugation by x are automorphisms of H, this implies s = s-1 (mod Zk). Since |s| is odd, we conclude that s G Zk. 208 Ars Math. Contemp. 11 (2016) 101-106 Then, since the automorphism group of a cyclic group is abelian, we have ^(xs) = Ms) = M so x-1x must invert J. But this is impossible, because, as was mentioned above, x and x, being of order 2, cannot be in H, so they are both in the other coset of H, so x-1x G H has odd order. This contradiction completes the proof that 9 is affine. □ Remark 6.14. It is not necessary to assume p is odd in the statement of Corollary 6.13(3), because 2q ■ q is divisible by 4, which is already in the list of divisors. Theorem 6.8 implies that very few small groups of odd order fail to be strongly CCA: Corollary 6.15. Let G21 = Z7 x Z3 be the (unique) nonabelian group of order 21. Then the only groups of odd order less than 100 that are not strongly CCA are G21, G21 x Z3, and Z3 I Z3. Proof. Suppose G is a group of odd order, such that G is not strongly CCA and |G| < 100. From Corollary 6.13, we see that |G| is divisible by either 21 or 33 ■ 3 = 81. Since |G| < 100, this implies that |G| is either 21, 21 x 3 = 63, or 33 ■ 3 = 81. Also, G must be nonabelian (see Corollary 4.2). • The nonabelian group G21 of order 21 is not CCA (see Example 2.3). • There are two nonabelian groups of order 63. One of them, the direct product G21 x Z3, is not CCA (see Proposition 3.1). • Theorem 6.8 implies that Z3 I Z3 is the only non-CCA group of order 81 (see also Example 2.4). To complete the proof, we sketch a verification that the following group of order 63 is CCA: G = Z7 x Z9 = (x, a | x7 = a9 = e, a-1xa = x2 }. Let 9 be a colour-preserving automorphism of a connected Cayley graph Cay(G; S), such that 9(e) = e. We may assume S is either {a±1, x±1} or {a±1, (ax)±1}, after discarding redundant generators, applying an automorphism of G, and replacing some elements by appropriate powers (cf. the proof of Lemma 6.11). If S = {a±1,x±1}, then we may assume <^(x) = x, by composing with an automorphism of G. Also, since 9 is colour-preserving, it must pass to a well-defined automorphism of the cycle Cay(G/(x}; {a±:L}), so there exists e G {±1}, such that <9>(ga) = 9(g) ae for all g G G. Then, since (1,1) is the only pair (e, J) G {±1}2 that satisfies a-ex5ae = x2, we see that ^(xW) = x®aj for all i and j, so 9 is the identity map, which is certainly affine. Assume, now, that S = {a±1, (ax)±1}. Let a1 = a and a2 = xa. For any g G G and e G {±1}, if 9(ga1) = 9(g) af, then, since af = af (and 9 is colour-preserving), we have y(g sm) = 9(g) sem, for all m and all s G S. Since S generates G, this implies <9>(gs) = 9(g) se for all g and all s G S. So 9 is affine. □ A. Hujdurovic et al.: On colour-preserving automorphisms of Cayley graphs 209 7 Groups of small order In this section, we briefly explain which groups of order less than 32 are CCA (or strongly CCA). First, note that almost all of the abelian ones are strongly CCA: Proposition 7.1 (cf. Proposition 4.1). An abelian group of order less than 32 is not strongly CCA if and only if it is either • Z2 x Z4 (of order 8), • Z2 x Z2 x Z4 (of order 16), or • Z2 x Z3 x Z4 (of order 24). None of these are CCA. Also note that almost all of the groups whose order is not divisible by 4 are CCA: Proposition 7.2. The only groups that are not strongly CCA, and whose order is < 32 and not divisible by 4 are: • the wreath product Z3 I Z2, which is isomorphic to D6 x Z3 and has order 18, and • the nonabelian group of order 21. Neither of these is CCA. Proof. For the groups of odd order, the conclusion is immediate from Theorem 6.8 and Example 2.3 (see Corollary 6.15 for a stronger result). Proposition 3.2 deals with the groups D6 x Z5 and D10 x Z3 of order 30. For all of the other groups of even order, it suffices to note that if m is odd, then every generalized dihedral group of order 2m is strongly CCA (see Proposition 5.6). □ So it is surprising that very few of the remaining groups are strongly CCA: Proposition 7.3. The only nonabelian groups that are strongly CCA and whose order is < 32 and divisible by 4 are: • the dihedral groups of order 8, 16, and 24, • the alternating group A4, which is of order 12, • another group of order 16, namely, the semidirect product Z8 x Z2 in which a-1xa = x5 for x G Z8 and (a) = Z2, and • three additional groups groups of order 24, namely, D8 x Z3, A4 x Z2, and the semidirect product Z3 x Z8 in which Z8 inverts Z3. Furthermore, the only groups of order < 32 that are CCA, but not strongly CCA, are: • the dihedral groups D12, D20, and D28, and • the group D12 x Z2, which is a generalized dihedral group of order 24. 210 Ars Math. Contemp. 11 (2016) 101-106 Sketch of proof. The result can be verified by an exhaustive computer search, but we summarize a case-by-case analysis that can be carried out by hand, using the classification of groups of order less than 32. Each group of such small order can be specified by its "GAP Id',' which is an ordered pair [n, k], where n is the order of the group, and k is the id number that has been assigned to that particular group (see [5], for example). Assume G is nonabelian, |G| < 32, and |G| is divisible by 4. We may assume that G is neither generalized dicyclic, semidihedral, nor generalized dihedral, for otherwise Corollary 2.8(4,5) and Propositions 5.3 and 5.6 determine whether G is CCA or strongly CCA. By inspection of the list of groups of each order, we see that this leaves only thirteen possibilities for G, and we consider each of these GAP Ids separately. In most cases, Proposition 2.5 implies that G is not CCA. [12, 3] = A4. This group is strongly CCA (see Example 7.5 below). [16, 3] = ( a, b, c | a4 = b2 = c2 = e, ab = 6a, 6c = cb, cac = ab}. Proposition 2.5 applies with S = {a±\ c}, T = {a^}, and t = a2 G Z(G). [16, 6] = ( a, x | a8 = x2 = e, xax = a5 } = (a} x (x} = Z8 x Z2. This group is strongly CCA (see Example 7.5 below). [16,13] = ( a, x, y | a4 = x2 = e, a2 = y2,xax = a-1, ay = ya, xy = yx}. Proposition 2.5 applies with S = {a±1,x,y±1}, T = {a±:, y±:}, and t = a2 G Z(G). [20, 3] = ( a, b | a5 = b4 = e, bab-1 = a2 }. Proposition 2.5 applies with S = {a±:, b±:}, T = {b±1}, and t = b2 (which inverts a). [24,1] = Z3 x Z8, where Z8 inverts Z3. This group is strongly CCA (see Example 7.5 below). [24, 3] = SL(2,3) = Q8 x Z3 = (i, j} x (a}, where aia-1 = j and a-1ia = ij. Proposition 2.5 applies with S = {¿±\ ai1}, T = {¿+1}, and t = i2 G Z(G). [24, 5] = S3 XZ4. Proposition 2.5 applies with T = {(1,2)}x{±1}, S = {((2, 3), 0)}uT, and t = (e, 2) G Z(G). [24, 8] = Z3 x D8 = ( a, b, c | a3 = b4 = c2 = e, bab-1 = a-1, ac = ca, cbc-1 = b-1}. Proposition 2.5 applies with S = {(ab)±1, b±1, c}, T = {(ab)±1, b^}, and t = b2 G Z(G). [24.10] = D8 x Z3. Since D8 is strongly CCA (see Proposition 5.6), the same is true for this group (see Proposition 3.2). [24.11] = Q8 x Z3. This is not CCA, since Q8 is not CCA (see Corollary 2.8(3) and Proposition 3.1). [24.12] = S4. Let a = (1,2, 3,4) and b = (1,2,4, 3), so Proposition 2.5 applies, with S = {a±1,b±1}, T = {a^1}, and t = a2 = (1,3)(2,4), which inverts b. [24.13] = A4 x Z2. This group is strongly CCA (see Example 7.5 below). □ The following simple observation plays a key role in the proof of Example 7.5. Lemma 7.4. Let • f be a colour-permuting automorphism of a Cayley graph Cay(G; S), such that ^(e) = e> A. Hujdurovic et al.: On colour-preserving automorphisms of Cayley graphs 211 • a = y(a) andb = <^(b), for some a, b G S, • t(v) G {±1}, such that y(va) = <£>(v) àT(v),forall v G G, and • k1,k2,.. .,k2r G Z \ {0}, such that akl bk2 ak3 • • • bk2r = e (and r > 2). If e1 = e3 and e2 = e4, for all e1,..., e2r G {±1}, such that aeiklbe2k2 • • • 6£2rk2r = e, then y(va) = <£>(v) a and <^>(vb) = <^>(v) b, for all v G (ak3, bk2}. Proof. Since ^ is colour-permuting, there exist a, r: G ^ {±1}, such that We wish to show a(v) = r(v) = 1 for all v G (ak3, bk2}. Since a(e) = r(e) = 1, it suffices to show that a(vbk2) = r(vak3) = r(v) for all v G G. The two parts of the proof are very similar, so we show only that a(vbk2) = a(v). The relation akl bk2 ak3 • • • bk2r = e represents a closed walk starting at v (or at any other desired vertex). Applying ^ yields a closed walk starting at y(v). Since ^ is colour-permuting, this closed walk corresponds to a relation of the form a£lklb£2k2 • • • b€2rk2r = e, with G {±1}. By assumption, we must have e1 = e3. Therefore This establishes the desired conclusion, since a(v) = a(vakl), and vakl is an arbitrary Example 7.5. The groups [12,3], [16,6], [24,1], and [24,13] from the proof of Proposition 7.3 are strongly CCA. Proof. We consider each of the four groups individually; for convenience, let G be the group under consideration. Suppose ^ is a colour-permuting automorphism of a connected Cayley graph Cay(G; S), such that y(e) = e, and let H = y(s), for each s G S. We wish to show ^ G Aut G. Assume G = [12, 3]. Let a G S with |a| = 3, and let N be the (unique) subgroup of order 4 in G. Assume, for the moment, that there exists b G S n N (so |b| = 2). Then (ab)3 = e. Suppose i, j, k G {±1}, with so i + j + k = 0 (mod 3). Since i, j, k G {±1}, this implies i = j = k. We conclude from Lemma 7.4 that y(vs) = y(v) a, for all v G (a, b} = G and s G {a±1, b}, so ^ G Aut G. We may now assume |s| = 3 for all s G S. Let b G S \ (a}. We may assume a = b (mod N), by replacing b with its inverse if necessary. Write b = arx, with r G {±1} and x G N. Note that (a-1b)2 = e. Suppose i, j, k, ^ G {±1}, with <^(va) = y>(v) Sff(v) and y(va) = y(v) bT(v) for all v G G. a(akl bk2 ) = e3 = e1 = a(v). element of G. □ e = 7jb ajb akb = Si+j+k (mod N), (Sk-r£xS-k+rf> if j = i =1, (àkxà-k )x if j = —1 and i = 1, (~kxà-k )x if j = 1 and i = —1, (~k-rj xà-k+rj )x if j = i = —1. 212 Ars Math. Contemp. 11 (2016) 101-106 Since the component in N must be trivial, and no nontrivial power of a centralizes x, we see that we must have j = £ and k = rj = r£. Then, since the exponent of a must be 0, this implies i = k. We conclude from Lemma 7.4 that <(vs) = <(v) a, for all v G (a, 6} = G and s G {a± so < G Aut G. Assume G = [16, 6]. Let a G S with |a| = 8. Let 6 G S \ (a}. Assume, for the moment, that |6| = 8. Write 62 = a2r, for some odd r. Then we must have 62 = a2r. This implies that if i, j G {±1}, such that e = a2j a-2rj, then i = j (since |62| = |62| > 2). We conclude (much as in Lemma 7.4) that <(vs) = <(v) a, for all v G (a, 6} = G and s G {a±1,6±1}, so < G Aut G. We may now assume |6| G {2,4}, so 62 G (a4}. Note that, since 6 G (a}, we have 6a6-1a3 = e. Suppose i, j, k, £ G {±1}, with e = bj aj a-k a3£ = &i-k a5j+3£ = (mod (a4}), so j = £. Then we must also have i = k. We conclude from Lemma 7.4 that <(vs) = <(v) S, for all v G (a, 6} = G and s G {a±1,6±1}, so < G Aut G. Assume G = [24,1]. Let a G S with |a| = 8, and let 6 G S, such that 6 G (a}. Write 6 = arx, where (x} = Z3. We may assume 6 has prime-power order (see Lemma 6.11), and we know that a2 centralizes x, so either r is odd or r = 0. Assume, for the moment, that r = 0, which means (6} = Z3 = (6}. Then a inverts 6, so a6a-16 = e. Suppose i, j, k, £ G {±1}, with e = Sj P S-k = Si-k S-j+£. Since the exponents of a and 6 must be 0, we have i = k and j = We conclude from Lemma 7.4 that <(vs) = <(v) a, for all v G (a, 6} = G and s G {a±1, 6±1}, so < G Aut G. We may now assume that r is odd. The proof of Lemma 6.11 shows there is no harm in replacing 6 with a power that is relatively prime to 8, so we may assume r = 1. Since a2 G Z(G), we have a26a-26-1 = e. Suppose i, j, k, £ G {±1}, with e = a2i ip a-2k 6-£ = a2i-2k v-t = a?-i (mod (a4, x}). Then j = £. Therefore a2i-2k = e, so i = k. For v G G with <(va) = <(v) a, we conclude from the proof of Lemma 7.4 that <(v6a) = <(v6) a. In addition, interchanging the roles of a and 6 tells us that if <(v6) = <(v) 6, then <(va6) = <(va) 6. We conclude that <(vs) = <(v) a, for all v G (a, 6} = G and s G {a±1, 6±1}, so < G Aut G. Assume G = [24,13]. We may assume |s| G {2,3}, for all s G S (see Lemma 6.11). Let a G S with |a| = 3. Choose 6 G S, such that 6 G A4. Since every element of order 3 is contained in A4, we must have |6| =2. Assume, for the moment, that (a, 6} = G. Note that (a6a-16)2 = e, and, for convenience, let 6m = a-m 6 am for m G Z. Suppose i, j, k, £ G {±1}, with e = aj 6 a-j 6 ak 6 a-£ 6 = ai-j+k-£ • 6-j+k-£ 6k-^ 6-£ 6. A. Hujdurovic et al.: On colour-preserving automorphisms of Cayley graphs 213 This implies k = i, for otherwise 0, -i, and k - i are all distinct modulo 3, so bk— b— b = 616_16 = e (mod Z2), but b_j+k_£ is obviously nontrivial (mod Z2). (Then, since the exponent of a is 0, we must also have i = j.) We conclude from Lemma 7.4 that <(vs) = <(v) for all v G (a, b) = G and s G {a±1, b}, so < G Aut G. We may now assume (a, s) = G, for all s G S. Then, since b G A4 (and b is an element of order 2 in S), we see that b G Z(G). Since Z(G) has only one nontrivial element, this implies that S = (S n A4) U {b}, and that b = b (since only b-edges make 4-cycles with the edges of every other colour). Therefore Cay(G; S) = Cay(A4; S n A4) x Cay(Z2; {b}), and <(b) = b. Since A4 is strongly CCA, it is now easy to see that < G Aut G. □ Acknowledgments. D. W. M. and J.M. thank the Faculty of Mathematics, Natural Sciences and Information Technologies of the University of Primorska (Slovenia) for its hospitality during the visit that gave rise to this research project. References [1] M. Albert, J. Bratz, P. Cahn, T. Fargus, N. Haber, E. McMahon, J. Smith and S. Tekansik, Color-permuting automorphisms of Cayley graphs. Congr. Numer. 190 (2008), 161-171. MR2489799 [2] E. Dobson, Some non-normal Cayley digraphs of the generalized quaternion group of certain orders, Electron. J. Combin. 10 (2003), #R31, 7 pages. MR 2014518 [3] M. L. Fiol, M. A. Fiol and J. L. A. Yebra, When the arc-colored line digraph of a Cayley colored digraph is again a Cayley colored digraph, Ars Combin. 34 (1992), 65-73. MR 1206550 [4] D. Gorenstein, Finite Groups, second ed., Chelsea, New York, 1980. ISBN 0-8284-0301-5, MR0569209 [5] Groupprops, The Group Properties Wiki: Groups of a particular order, http://groupprops.subwiki.org/wiki/Category:Groups_of_a_particular_order [6] I. M. Isaacs, Finite Group Theory, American Mathematical Society, Providence, RI, 2008. ISBN 978-0-8218-4344-4, MR 2426855 [7] C. H. Li, On isomorphisms of finite Cayley graphs—a survey, Discrete Math. 256 (2002) 301334. MR 1927074 [8] C. Martinez-Perez and W. Willems, The trivial intersection problem for characters of principal indecomposable modules, Adv. Math. 222 (2009), 1197-1219. MR 2554934 [9] J.Morris, Automorphisms of circulants that respect partitions, Contrib. Discrete Math. (to appear). [10] S. K. Sehgal, On the normalizer of a group in the Cayley representation, Internat. J. Math. Math. Sci. 12 (1989), 459-462. MR 1007196 [11] A. T. White, Graphs, Groups and Surfaces, Elsevier, New York, 1973. MR 0340026 [12] M.-Y. Xu, Automorphism groups and isomorphisms of Cayley digraphs, Discrete Math. 182 (1998), 309-319. MR 1603719 ARS MATHEMATICA CONTEMPORANEA Also available at http://amc-journal.eu ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 11 (2016) 215-229 Geometric point-circle pentagonal geometries from Moore graphs Klara Stokes * School of Engineering Science, University ofSkövde, 54128 Skövde Sweden Milagros Izquierdo Department of Mathematics, Linkoping University, 58183 Linkoping Sweden Received 27 December 2014, accepted 13 October 2015, published online 15 November 2015 We construct isometric point-circle configurations on surfaces from uniform maps. This gives one geometric realisation in terms of points and circles of the Desargues configuration in the real projective plane, and three distinct geometric realisations of the pentagonal geometry with seven points on each line and seven lines through each point on three distinct dianalytic surfaces of genus 57. We also give a geometric realisation of the latter pentagonal geometry in terms of points and hyperspheres in 24 dimensional Euclidean space. From these, we also obtain geometric realisations in terms of points and circles (or hyperspheres) of pentagonal geometries with k circles (hyperspheres) through each point and k -1 points on each circle (hypersphere). Keywords: Uniform map, equivelar map, dessin d'enfants, configuration of points and circles Math. Subj. Class.: 05B30, 05B45, 14H57, 14N20, 30F10, 30F50, 51E26 1 Introduction A compact Klein surface S is a surface (possibly with boundary and non-orientable) endowed with a dianalytic structure, that is, the transition maps are holomorphic or antiholo-morphic (the conjugation z ^ z is allowed). If the surface S admits analytic structure and is closed, then the surface is a Riemann surface. By the uniformization theorem each Klein surface is a quotient S = U/G, where U is either the Riemann sphere, the complex Euclidean plane or the hyperbolic plane, and G is a group without elliptic elements. In the case of surfaces without boundary the group G is torsion-free. * Partially supported by the Spanish MEC project ICWT (TIN2012-32757) and ARES (CONSOLIDER INGENIO 2010 CSD2007-00004). E-mail addresses: klara.stokes@his.se (Klara Stokes), milagros.izquierdo@liu.se (Milagros Izquierdo) Abstract ©® This work is licensed under http://creativecommons.org/licenses/by/3.0/ 216 Ars Math. Contemp. 11 (2016) 215-229 The surface inherits the geometry of its universal covering space U through this quotient. Incidences between lines and circles in S follow the same axioms as in the covering space and geodesics on the surface come from lines in the covering space. In what follows, terms like line and circle will refer to such geometric objects, if not defined otherwise. A map is a drawing of a graph on a surface such that the complement of the drawing is a disjoint union of topological discs called faces. So a map consists of a set of vertices, a set of edges and a set of faces. The genus of a map is the genus of the surface in which the graph is embedded, and can be calculated through the Euler characteristic using a generalization of Euler's polyhedron formula. Given a map with |V | points, |E| edges and |F | faces, the Euler characteristic is x = |V| — |E| + |F|. The genus g of an orientable surface satisfies X = 2 — 2g and the genus h of a non-orientable surface satisfies x = 2 — h. By considering the map as the lifting of the segment [0,1] in C, the map determines the structure of the dianalytic surface. In general, a given surface allows different maps, and a given graph can be embedded as a map on different surfaces [18, 5, 4]. However, among the different maps of a graph there is one which has the largest Euler characteristic, then called the Euler characteristic of the graph. This map will have the smallest orientable or non-orientable genus of all maps of this graph, depending on whether it is orientable or not. It makes sense to consider both the smallest orientable and the smallest non-orientable genus of the graph. For example, the orientable genus of a planar graph is the genus of the sphere, which is 0. This is also the orientable genus of the 1-skeleta of the Platonic surfaces. The Petersen graph is not planar and so it has orientable genus at least 1. Since it can be drawn without crossings on the torus, it has orientable genus exactly 1. The hemi-dodecahedron is the abstract polyhedron obtained by identifying antipodal points in the dodecahedron. The 1-skeleton of this polyhedron is the Petersen graph, defining a map of the Petersen graph in the real projective plane, so the non-orientable genus of the Petersen graph is 1. The study of configurations in projective real or complex plane is a classical subject in geometry. Configurations appear naturally as arrangements of lines, planes or circles in a geometric plane or space. In contrast with the situation when graphs are realised as maps on surfaces, the requirement that there should be no crossings on the surface other than the incidences defined by the configuration is typically relaxed (although not always). For example, Hilbert and Cohn-Vossen [16] define a planar point-line configuration as follows. "A plane configuration is a system of v points and b straight lines arranged in a plane in such a way that every point is incident with r lines and every line is incident with k points." Note that it is not required that the b lines should meet only in the v points, only the incidences in the distinguished points are important. However, extra incidences on these points are often regarded as an anomaly. For example, consider Desargues' Theorem, which is a theorem regarding the realisation of the configuration in Figure 1 in projective planes. In a projective plane every pair of lines intersect, therefore every pair of the 10 lines in the configuration in Figure 1 must meet at some point. Some of these points do not belong to the configuration. Similarly, there is of course a line between each pair of points, but some of these lines do not belong to the configuration. What makes it a configuration is the fact that in any of the 10 points there are r = 3 of the 10 lines intersecting, and on any of the 10 lines there are k = 3 of the 10 points. However, if it was drawn so that a 4th of the 10 points accidently were on an K. Stokes andM. Izquierdo: Geometric point-circle pentagonal geometries from Moore graphs 217 Figure 1: Desargues' Theorem: two triangles are perspective from a point if and only if they are perspective from a line. extra line, then some lines would have 3 points and others would have 4 points, making the configuration degenerate. An (r, k)-combinatorial configuration is a set of incidences between two sets of v and b elements called points and lines respectively, defined in analogy with the planar and linear definition above, but without considering realisability in some geometric space; see for example [13,22]. A combinatorial configuration is called linear if each pair of lines meet at most once. Linear combinatorial configurations are often simply called combinatorial configurations. Combinatorial configuration with k = 2 or r = 2 are graphs or their duals are graphs, respectively. Therefore it is typically required that r > 3 and k > 3. A pentagonal geometry is a (linear) combinatorial configuration in which, for any point p, all points that are not collinear with p are on a single line, which is called the opposite line of p. A pentagonal geometry has order (k, r) if there are r lines through each point and k points on each line [1]. There are two classes of lines in a pentagonal geometry, lines that are the opposite line of some point, and lines that are not. A pentagonal geometry with no non-opposite lines is self-polar by the polarity that associates each point with its opposite line. The deficiency graph (P, E) of a configuration is a graph with vertex set P, consisting of the points of the configuration, and edge set E, consisting of all the pairs (p, q) such that the points p, q G P are not collinear. In a pentagonal geometry, for each p G P the opposite line of p is formed by the points that are neighbours to p in the deficiency graph. When r = k, the number of points equals the number of lines, so there are no non-opposite lines, and all lines are defined by the neighbourhood of some point in the deficiency graph. Given the deficiency graph it is then possible to construct the pentagonal geometry by drawing a (combinatorial) line through the neighbourhood of each point in the deficiency graph. This construction of pentagonal geometries was described in [1], where it also was proved that pentagonal geometries with r = k are exactly the ones with a Moore graph (of diameter two) as deficiency graph. There are only three known Moore graphs of diameter 2: the cycle graph of length 5, the Petersen graph, and the Hoffman-Singleton graph. These graphs have valency 2, 3 and 7, respectively. They are unique for their valencies [17]. The existence of a Moore graph of valency 57 is still an open question. The pentagonal geometries obtained from these graphs are, respectively, the ordinary pentagon, the Desargues configuration (Figure 1) and a pentagonal geometry with parameters (7, 7) and with 50 points and 50 lines. In [1], it was also proved that all pentagonal configurations of order (k, k + 1) can be constructed from pentagonal geometries of order (k +1, k +1) through the removal of one point and its opposite line. There are therefore at most three such pentagonal geometries, with k = 2,6 218 Ars Math. Contemp. 11 (2016) 215-229 and maybe 56. The construction of pentagonal geometries from a graph with a combinatorial line through the neighbourhood of each vertex can also be used to construct other configurations. Indeed, the same construction works for any graph with the property that any two vertices have at most one common neighbour. In other words, the graph should be without cycles of length 4. This construction seems to appear first in an article by Lefevre-Percsy, Percsy and Leemans, as the neighbourhood geometry (of rank 2) of a graph [20], and later, in the context of geometric realisations of configurations in articles by Gevay and Pisan-ski [9, 10]. If the graph can be drawn in the real Euclidean plane in such a way that a circle can be traced through the neighbours of each point, then the drawing and the construction together give rise to a geometric point-circle configuration in the real Euclidean plane [10]. For example, any 3-regular graph has this property, defining a point-circle (3,3)-configuration in the real Euclidean plane. Also unit-distance graphs can be used for the same purpose. Indeed, a circle is defined as the collection of points at a given distance from the center of the circle. As an extra feature, a unit-distance graph gives an isometric point-circle configuration, in which all circles have the same radius. As was observed in [9], a point-plane configuration in real Euclidean 3-space, constructed through a similar construction from the 1-skeleton of a 3-polytope, defines a point-circle configuration in the real Euclidean plane through stereographic projection whenever the points in each plane are concyclic. In particular, it was proved in [9] that any Platonic or Archimedean solid gives a point-circle configuration on the Riemann sphere, and that the circle-preserving property of the stereographic projection implies that any point-circle configuration drawn on the sphere can also be drawn in the real Euclidean plane. In this article we will generalize this construction on the sphere to surfaces in general. This construction is motivated by the study of geometric realisations of pentagonal geometries. 2 Constructing configurations of points and isometric circles on surfaces The geometric construction of Gevay and Pisanski described above does not require an embedding without crossings of the graph. Rather, what the construction requires from the graph embedding is that the neighbours of each vertex are concyclic [10]. On the sphere, any circle is a planar section, so any point-circle configuration gives a point-plane configuration in 3-space. Since more than 3 points in a plane are not necessarily concyclic, the converse is not true in general when k > 3. A nice way of making neighbours concyclic is to mimic the idea of using a map of the 1-skeleton of a convex polytope. A regular tiling (p, q) of the universal covering space U of a Riemann surface is a collection of congruent polygons which partitions and fills up the entire space, in such a way that p q-gons meet at each vertex. The stabilizer of this tiling is a subgroup of a triangle group r(p, 2, q). Since the polygons are congruent, the neighbours of each vertex are concyclic on isometric circles. The distance is the spherical, the Euclidean or the hyperbolic distance respectively. Definition 2.1. A uniform map of type (p, q) on a Riemann surface with universal covering space U is the quotient of a regular tiling of U of type (p, q) by the action of a torsion-free group G Ç r(p, 2, q). This terminology comes from the theory of dessin d'enfants [12, 18, 26], where also K. Stokes andM. Izquierdo: Geometric point-circle pentagonal geometries from Moore graphs 219 the term uniform dessin d'enfants is used. In the theory of tilings and polytopes the word uniform map instead refers to a map with an automorphism group acting transitively on the vertices. In the literature of tilings and polytopes, our uniform maps are instead known as equivelar maps. In particular, our uniform maps are not necessarily vertex transitive. In a uniform map of type (p, q) the vertices have valency p, the edges have valency 2, and the faces have valency q. Any map with this property is a uniform map of type (p, q). A map is regular if its automorphism group acts transitively on triples of incident vertices, edges and faces, that is, on the flags. This implies that a regular map is always uniform. Isometric circles through the neighbours of each vertex of a regular tiling of U will be mapped to isometric circles through the neighbours of each vertex of the corresponding uniform map on U/G. Since each circle contains p points and p circles goes through each point, this construction gives a configuration of points and circles on the surface, and we have proved the following. Theorem 2.2. A uniform map on a surface produces a configuration of points and isometric circles on the same surface. On the sphere, this construction gives a configuration of points and isometric circles which can be taken to a configuration of points and non-isometric circles on the Euclidean plane through stereographic projection from a suitable point. The uniform maps on the sphere are regular. Consequently, there are two infinite families of uniform maps of the sphere, the hosohedra of type (n, 2) for n > 1, consisting of n digons meeting at two antipodal vertices, and the dihedra of type (2, n) for n > 1, consisting of two n-gons meeting at n vertices along a meridian. The result from applying Theorem 2.2 to a hosohedron is a degenerate configuration consisting of two points and two circles of radius zero, each point occuring with multiplicity n on one of the circles. By instead using a dihedron one obtains a configuration of n points and n circles with two points on each circle. This configuration is connected if n is odd, otherwise the configuration consist of two disconnected components. A part from the two infinite families just described, which result in configurations of limited interest, there are only five more uniform maps on the sphere, corresponding to the Platonic solids. Of the resulting configurations, there is only one which is linear when regarded as a combinatorial configuration. Theorem 2.3. The only linear point-circle configuration (with r > 2 and k > 2) coming from a uniform map on the Riemann sphere is the (203, 203)-configuration on Figures 1, 2, 3 in [10], obtained from the dodecahedron projected on the sphere. In the real projective plane, the only linear point-circle configuration coming from a uniform map is the Desargues configuration, obtained from the hemidodecahedron. Proof. The uniform maps of type (p, q) on the sphere satisfying p > 2 and q > 2 are the Platonic solids. Gevay and Pisanski constructed point-plane configurations from all Platonic (and Archimedean) solids except the octahedron in [10]. The octahedron has the property that the planes through the neighbours of two antipodal vertices coincide. They also proved that their construction gives a combinatorial point-line configuration (i.e. in which any two combinatorial lines share at most one point) only if the graph does not have cycles of length 4. The only Platonic solid graph without cycles of length 4 is the dodecahedron graph. The uniform maps in the real projective plane are obtained from the uniform maps on the sphere by identifying antipodal points. As we pointed out in the introduction, the hemi-dodecahedron is obtained from the dodecahedron in this way. □ 220 Ars Math. Contemp. 11 (2016) 215-229 The sphere has finite area, implying that each uniform tiling has a finite number of tiles. Hence the automorphism group of the tiling is finite and has a finite number of subgroups. Therefore the finite number of regular tilings with p,q > 3 of the sphere gives a finite number of uniform maps. The situation is different in the Euclidean and the hyperbolic plane. The Euclidean plane has a finite number of regular tilings (of types (6,3), (3,6) and (4,4)), but here the area is infinite, resulting in infinitely many uniform maps. The hyperbolic plane has infinite area and there are infinitely many regular tilings, and consequently infinitely many uniform maps. In comparison with the situation in the Euclidean plane, where it is possible to construct isometric point-circle configurations without starting with a planar unit-distance embedding of the graph, it is clear that in general it is not necessary to require the graph to be embedded as a uniform map on the surface. Isometric point-circle configurations can in some cases be obtained using other embeddings (non-uniform, non-congruent, with crossings) of the graph on the surface. However, in this article we focus on point-circle configurations coming from uniform maps, more precisely, on those coming from uniform pentagonal maps of Moore graphs of diameter 2. 3 Geometric pentagonal geometries Here (in three subsections) we discuss different geometric realisations of pentagonal geometries, with focus on embeddings in Riemann surfaces. 3.1 The ordinary pentagon The ordinary pentagon is the smallest non-degenerate pentagonal geometry. Its deficiency graph is the cycle graph on 5 vertices. This graph can also be seen as a point-line realisation of the configuration itself. The ordinary pentagon can also be constructed as a point-circle configuration with two points on each circle from its deficiency graph using the geometric construction by Gevay and Pisanski. So it can be argued that any point-line realisation of the ordinary pentagon produces a point-circle realisation of the same. The cycle graph on 5 vertices has diameter 2 and girth 5, as do all Moore graphs (of diameter 2). The smallest number of edges in any face of an embedding of this graph on a surface is therefore 5. For example, it can be embedded in the Riemann sphere as a pentagonal cycle along one of the geodesics. This map has 5 vertices, 5 edges and 2 faces and so the orientable genus is 0. We call it a pentagonal map, meaning simply that all faces have 5 vertices. By introducing one new vertex on the midpoint of each edge of this pentagonal spherical map, and identifying antipodal points in the resulting decagonal map one obtains a non-orientable pentagonal map with 1 face in the real projective plane, so the non-orientable genus is 1. So the ordinary pentagon can be realised as a configuration of points and circles on the Riemann sphere (and consequently in the Euclidean plane), and in the real projective plane. 3.2 The Desargues configuration The Desargues configuration is a (3, 3)-configuration on 10 points and 10 lines. It is the pentagonal geometry with the Petersen graph, the 3-regular Moore graph, as deficiency graph. The polarity of the Desargues configuration is known as the von Staudt polarity [28](cf. [8]). Figure 1 shows a classical drawing of Desargues configuration in the K. Stokes andM. Izquierdo: Geometric point-circle pentagonal geometries from Moore graphs 221 real plane as the 10 points and 10 lines of Desargues' Theorem. There are plenty of geometric realisations of the Desargues configuration in terms of incidences of points and lines. Indeed, finite projective planes over finite fields are called Desarguesian since they admit the Desargues configuration as points and lines. The automorphism group of the (combinatorial) Desargues configuration is S5, the symmetric group acting on a set of five elements. When a configuration is realised geometrically, the automorphism group of the realisation is a subgroup of the automorphism group of the combinatorial configuration. Geometric realisations of the Desargues configuration were studied by Coxeter in [8], where he showed how to realise subgroups of S5 as collineations of certain embeddings of the Desargues configuration in some geometric space. Among his collection of geometric realisations of the Desargues configuration, there are two which have the full automorphism group S5. The first is due to Edge, who proved that in PG(2,5), the interior points of a conic, together with the lines that are neither tangents nor secants to the same conic, form a Desargues configuration. The second is an embedding of the Desargues configuration on a non-orientable surface of Euler characteristic -5. This embedding arises from a regular map of the Menger graph (collinearity graph) of the configuration on the surface, with automorphism group S5. Coxeter observed that the 30 edges in this regular map are situated on 10 geodesics of the surface in such a way that the vertices of the map together with the 10 geodesics form a Desargues configuration of points and lines on the surface, which also has automorphism group S5. We saw in the introduction that any (3,3)-configuration can be realised as a configuration of points and circles in the Euclidean plane using Gevay and Pisanski's geometric spherical construction and an embedding of some 3-regular graph [10]. In particular this is true for the Desargues configuration, using an embedding of the Petersen graph. Gevay and Pisanski also showed how to make the circles isometric. Unit-distance embeddings of the graph always produce isometric circles, but some embeddings with edges of different lengths also work. They provided two examples of the Desargues configuration as a configuration of points and isometric circles in the real Euclidean plane, coming from a unit-distance and a non-unit-distance embedding of the Petersen graph, respectively. The automorphism group of these realisations are the cyclic group C5 and the dihedral group D5 [10]. We show now that the Desargues configuration also can be drawn as a point-circle configuration in the real projective plane from a pentagonal map of the Petersen graph. Indeed, the (Riemann) spherical (3,3)-configuration on 20 points and 20 circles constructed from the dodecahedron in [10] is the double cover of a (3,3)-configuration on 10 points and 10 circles in the real projective plane which can be constructed analogously from the hemi-dodecahedron. Since the 1-skeleton of the hemi-dodecahedron is the Petersen graph, it is easy to see that this configuration on 10 points and 10 circles is a point-circle realisation of the Desargues configuration. Figure 2 shows this point-circle configuration constructed in this way from the Petersen graph embedded as the 1-skeleton of the hemi-dodecahedron. Be aware that incidences outside the vertices may be accidental. The automorphism group of this realisation is the symmetric group S5. 3.3 The pentagonal geometry with the Hoffman-Singleton graph as deficiency graph The third and last pentagonal geometry that we will discuss in this article is the (7, 7) pentagonal geometry which has the Hoffman-Singleton graph as deficiency graph. The Hoffman-Singleton graph was first constructed by Hoffman and Singleton in 1960 [17]. It 222 Ars Math. Contemp. 11 (2016) 215-229 Figure 2: The Desargues configuration (black lines) obtained from the Petersen graph embedded in the real projective plane as the hemi-dodecahedron (dotted lines). Points are identified according to letters, and edges are identified according to numbers. is a symmetric graph with automorphism group P£U(3,5) = PSU(3,5) x C2, which has order 252000. The group PSU(3,5) is the automorphism group of the Hermitian curve over F25. The first geometric construction of the Hoffman-Singleton graph in this curve was described by Benson and Losey [2] in 1971. Recently Shimada presented a unified construction of the Hoffman-Singleton graph, the Higman-Sims graph and the McLaughlin graph in this curve [24]. In a classical construction by Robertson [23](cf. [15]) the Hoffman-Singleton graph is obtained after connecting the vertices of 5 pentagons and 5 pentagrams. Later this construction was interpreted in terms of affine geometry over F5 by Hafner [15]. There is also the following construction of the Hoffman-Singleton graph due to Haemers [14]. Take as vertices the union of the points vp and the lines vi of PG(3, 2). Put an edge between a point vertex vp and a line vertex vi if p is a point on l. This gives each point vertex valency 7 and each line vertex valency 3. Also put an edge between two line vertices vi and vi> if l n V = 0. This makes the graph 7-regular. To see that this is the Hoffman-Singleton graph, observe that the girth is 5 and that there are 50 vertices. Other geometric constructions of the Hoffman-Singleton graph are described for example in [3]. In all the constructions described above, except in the first two ([2, 24]), it is required that the vertex set be partitioned into two parts, and then the vertices in the different parts are represented by geometric objects of different types. We argue that in these cases what is dealt with are not geometric realisations of the Hoffman-Singleton graph, but geometric constructions. K. Stokes andM. Izquierdo: Geometric point-circle pentagonal geometries from Moore graphs 223 Our interest in this article is focused on geometric realisations of the (7, 7) pentagonal geometry in the classical sense. That means realisations of the configuration in terms of points and lines, or points and circles, in the plane or on some other two-dimensional surface. We are also interested in higher dimensional generalizations, hyperplanes instead of lines and hyperspheres instead of circles. In particular, all geometric realisations of the (7,7) pentagonal geometry will be circular or spherical. The construction of the (7, 7)-pentagonal geometry from the Hoffman-Singleton graph associates the points of the pentagonal geometry with the vertices of the graph. Therefore we are interested in geometric realisations of the Hoffman-Singleton graph in which all the vertices are represented by geometric objects of the same type. 3.3.1 The (7,7) pentagonal geometry as a point-circle configuration on a surface of characteristic -55 Just as for the smaller Moore graphs of diameter 2, in a drawing without crossings of the Hoffman-Singleton graph on some surface, all faces will have at least 5 vertices. It can be seen from Eulers polyhedron formula that a map with only pentagonal faces will have the smallest possible genus. Indeed, since the Hoffman-Singleton graph has 50 vertices and 175 edges, the Euler characteristic of the map is x = | V| - |E| + |F| = -125 + |F|, where |F | is at most 350/5 = 70, so x reaches its largest value of -55 if all faces are pentagons. In that case the surface has non-orientable genus 57. It can be proved that such a map does exist, but cannot be a regular map [6]. Consequently, the automorphism group of the map will not be the full automorphism group of the graph. More precisely, there exist maps representing the Hoffman-Singleton graph which have as automorphism group the cyclic groups C7, C5 and the trivial group. These maps sit on non-orientable surfaces of the form S = H/G, where G is a torsion-free non-normal subgroup of r(7,2, 5). Remark 3.1. All these maps can be taken with congruent pentagons, and from Theorem 2.2 we obtain configurations of points and circles on the surfaces, in which the circles are isometric in terms of a quotient of the hyperbolic distance. Figures 3, 4 and 5 show examples of these three distinct geometric realisations of the combinatorial pentagonal geometry of order (7,7) in terms of points and circles, represented in the Poincare disk. In the case of the realisation coming from the map with automorphism group C7, the group action divides the vertex set of the map into seven orbits, each of length seven and one additional fixed point. In Figure 5 the map and the configuration is represented so that the automorphism of order seven is visible as a rotation around the fixed point. It is much harder to visualize the automorphisms of the geometric realisation with automorphism group C5. The group action does not fix any vertex, edge nor face of the map. Proposition 3.2. The dianalytic surfaces of Euler characteristic 55 that admit geometric realisations of the (7, 7) pentagonal geometry as a point-circle configuration with different automorphism groups are different. Proof. Consider the non-orientable Riemann surfaces Sj = H/Gj admitting the maps representing the Hoffman-Singleton graph, where Gj are torsion-free non-normal subgroups of r(7,2,5). Note that r(7,2, 5) is a non-arithmetic triangle group [27], and that it is maximal with respect to inclusion [25]. By Theorem 1 in [11], two groups G and G', contained 224 Ars Math. Contemp. 11 (2016) 215-229 Figure 3: A drawing in a non-orientable surface of genus 57 (identification along the border according to the labelling of the points). The edges colored magenta give the pentagonal geometry of order (7, 7). The edges colored black give the pentagonal map of the Hoffman-Singleton graph. The automorphism group of this realisation is the trivial group. K. Stokes andM. Izquierdo: Geometric point-circle pentagonal geometries from Moore graphs 225 Figure 4: A drawing in a non-orientable surface of genus 57 (identification along the border according to the labelling of the points). The edges colored magenta give the pentagonal geometry of order (7, 7). The edges colored black give the pentagonal map of the Hoffman-Singleton graph. The automorphism group of this realisation is the cyclic group of order five. 226 Ars Math. Contemp. 11 (2016) 215-229 Figure 5: A drawing in a non-orientable surface of genus 57 (identification along the border according to the labelling of the points). The edges colored magenta give the pentagonal geometry of order (7, 7). The edges colored black give the pentagonal map of the Hoffman-Singleton graph. The automorphism group of this realisation is the cyclic group of order 7. K. Stokes andM. Izquierdo: Geometric point-circle pentagonal geometries from Moore graphs 227 in a non-arithmetic Fuchsian triangle group r(p, r, q), are the uniformizing groups of two dianalytically equivalent surfaces if and only if they are conjugate in a maximal Fuchsian triangle group extending r(p, r, q), and so the result follows. □ Note that Coxeter realised Desargues configuration by embedding its Menger graph (collinearity graph) as a map on a surface of Euler characteristic -5. The edges of the Menger graph nicely line up along the geoedesics. A similar geometric realisation of the (7,7) pentagonal geometry is impossible. Indeed, in this case there are 7 points on each line and 7 lines through each point, so that at each vertex in the Menger graph there are 49 edges. If a combinatorial line with 7 points is represented by a geodesic on this surface, then all the edges between the vertices representing these points in the embedded Menger graph must be on this geodesic. Therefore the geometric representations of these edges would partially overlap, but this is never the case in a map. 3.3.2 The (7,7)-pentagonal geometry as a point-hypersphere configuration in 24 dimensional Euclidean space The Leech lattice is a Euclidean unimodular lattice in 24 dimensions with extraordinary properties. It can be constructed from the Golay code and provides the optimal kissing configuration of unit balls (hyperspheres) in 24 dimensions and the densest lattice ball packing in E24. Each unit ball touches 196560 other unit balls. The Leech lattice was found in 1967 by Leech [19]. There is a construction of the Higman-Sims graph in the Leech lattice [7]. Start with three lattice points forming the vertices of a triangle with sides of length 2, a/6 and a/6. The number of lattice points at distance 2 from at least one of the vertices of the triangle is exactly 100. Construct a graph with these 100 points as vertices and with an edge between two points whenever the distance between them is a/6. Then this graph is the Higman-Sims graph with automorphism group the Higman-Sims sporadic simple group HS. It is well-known that the vertex set of the Higman-Sims graph can be partitioned into two copies of the Hoffman-Singleton graph. The automorphism groups of these two copies of the Hoffman-Singleton graph in the Leech lattice are two conjugate subgroups of HS, each isomorphic to PSU(3,5) x C2, the automorphism group of the combinatorial Hoffman-Singleton graph. Note that the edges in one of these embeddings of the Hoffman-Singleton graph all have length a/6. Hence there is a hypersphere centered at each vertex of radius a/6, such that the graph vertices contained in each hypersphere are exactly those that are adjacent to the vertex in the center. Indeed, this is (more or less) Theorem 2.2 for the Euclidean plane generalized to higher dimensions. The result is a geometric realisation of the (7,7)-pentagonal geometry as a point-hypersphere configuration in 24 dimensions. The automorphism group of this embedding of the Hoffman-Singleton graph is PSU(3,5) x C2. Since this is the automorphism group of the combinatorial object, this is the largest possible. The embedding of the Hoffman-Singleton graph in the Leech lattice is not unit-distance, but it is isometric, as required by the construction in Theorem 2.2. It was proved by Mae-hara and Rodl that any graph of maximum valency d can be embedded as a unit-distance graph in E2d [21], however this does not say anything about the symmetry group of the embedding. 228 Ars Math. Contemp. 11 (2016) 215-229 3.4 The pentagonal geometries of order (k, k + 1) Since all pentagonal geometries of order (k, k + 1) can be constructed from pentagonal geometries of order (k +1, k + 1) through the removal of one point and its opposite line, there are at most three (connected) pentagonal geometries of order (k,k + 1), with k = 2,6 and maybe 56. The automorphism group of these combinatorial pentagonal geometries is the point-stabilizer of the automorphism group of the corresponding combinatorial pentagonal geometry of order (k + 1, k + 1). The pentagonal geometry of order (2,3) is constructed from the Desargues configuration and has automorphism group S3 x C2. The pentagonal geometry of order (6,7) has automorphism group S7. As a consequence of the construction of pentagonal geometries of order (k,k +1) from those of order (k +1, k +1), any geometric realisation of a (k +1, k +1) pentagonal geometry gives rise to a geometric realisation of the corresponding pentagonal geometry of order (k,k +1), by simply removing from the realisation a point and the geometric realisation of its opposite combinatorial line. In the case of point-circle (point-hypersphere) realisations, the geometric realisation of a combinatorial line is a circle (hypersphere). Therefore any geometric realisation, in terms of points and circles (or hyperspheres), of a pentagonal geometry of order (k +1, k +1), described previously in this article, gives rise to a geometric realisation in terms of points and circles (or hyperspheres) of the corresponding pentagonal geometry of order (k,k + 1). The automorphism group of the geometric realisation of the pentagonal geometry of order (k,k + 1) is the intersection of the point-stabilizer of the combinatorial pentagonal geometry of order (k+1, k+1) and the automorphism group of its corresponding geometric realisation. References [1] S. Ball, J. Bamberg, A. Devillers and K. Stokes, An alternative way to generalize the pentagon, J. Combin. Des. 21 (2013), 163-179, doi:10.1002/jcd.21325. [2] C. T. Benson and N. E. Losey, On a graph of Hoffman and Singleton, J. Combinatorial Theory Ser. B 11 (1971), 67-79. [3] A. E. Brouwer and J. H. van Lint, Strongly regular graphs and partial geometries, in: Enumeration and design (Waterloo, Ont., 1982), Academic Press, Toronto, ON, 1984 pp. 85-122. [4] R. P. Bryant and D. Singerman, Foundations of the theory of maps on surfaces with boundary, Quart. J. Math. Oxford Ser. (2) 36 (1985), 17-41, doi:10.1093/qmath/36.1.17. [5] M. Conder and B. Everitt, Regular maps on non-orientable surfaces, Geom. Dedicata 56 (1995), 209-219, doi:10.1007/BF01267644. [6] M. Conder and K. Stokes, Minimum genus embeddings of the Hoffman-Singleton graph. [7] J. H. Conway and N. J. A. Sloane, Sphere packings, lattices and groups, volume 290 of Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences], Springer-Verlag, New York, 3rd edition, 1999, doi:10.1007/978-1-4757-6568-7. [8] H. S. M. Coxeter, Desargues configurations and their collineation groups, Math. Proc. Cambridge Philos. Soc. 78 (1975), 227-246. [9] G. Gevay, Symmetric configurations and the different levels of their symmetry, Symmetry Cult. Sci 20 (2009), 309-329. [10] G. Gevay and T. Pisanski, Kronecker covers, V-construction, unit-distance graphs and isometric point-circle configurations, Ars Math. Contemp. 7 (2014), 317-336. K. Stokes andM. Izquierdo: Geometric point-circle pentagonal geometries from Moore graphs 229 [11] E. Girondo, D. Torres-Teigell and J. Wolfart, Shimura curves with many uniform dessins, Math. Z. 271 (2012), 757-779, doi:10.1007/s00209-011-0889-4. [12] G. Gonzalez-Diez, Variations on Belyi's theorem, Q. J. Math. 57 (2006), 339-354, doi:10. 1093/qmath/hai021. [13] B. Grünbaum, Configurations of points and lines, volume 103 of Graduate Studies in Mathematics, American Mathematical Society, Providence, RI, 2009, doi:10.1090/gsm/103. [14] W. H. Haemers, Eigenvalue techniques in design and graph theory, volume 121 of Mathematical Centre Tracts, Mathematisch Centrum, Amsterdam, 1980, dissertation, Technische Hogeschool Eindhoven, Eindhoven, 1979. [15] P. R. Hafner, The Hoffman-Singleton graph and its automorphisms, J. Algebraic Combin. 18 (2003), 7-12, doi:10.1023/A:1025136524481. [16] D. Hilbert and S. Cohn-Vossen, Geometry and the imagination, Chelsea Publishing Company, New York, N. Y., 1952, translated by P. Nemenyi. [17] A. J. Hoffman and R. R. Singleton, On Moore graphs with diameters 2 and 3, IBM J. Res. Develop. 4 (1960), 497-504. [18] G. A. Jones and D. Singerman, Theory of maps on orientable surfaces, Proc. London Math. Soc. (3) 37 (1978), 273-307. [19] J. Leech, Notes on sphere packings, Canad. J. Math. 19 (1967), 251-267. [20] C. Lefevre-Percsy, N. Percsy and D. Leemans, New geometries for finite groups and polytopes, Bull. Belg. Math. Soc. Simon Stevin 7 (2000), 583-610. [21] H. Maehara and V. Rodl, On the dimension to represent a graph by a unit distance graph, Graphs Combin. 6 (1990), 365-367, doi:10.1007/BF01787703. [22] T. Pisanski and B. Servatius, Configurations from a graphical viewpoint, Birkhauser Advanced Texts: Basler Lehrbucher. [Birkhauser Advanced Texts: Basel Textbooks], Birkhauser/Springer, New York, 2013, doi:10.1007/978-0-8176-8364-1. [23] G. N. Robertson, Graphs minimal under girth, valency and connectivity constraints, ProQuest LLC, Ann Arbor, MI, 1969, thesis (Ph.D.)-University of Waterloo (Canada). [24] I. Shimada, The graphs of Hoffman-Singleton, Higman-Sims and McLaughlin, and the Hermi-tian curve of degree 6 in characteristic 5, Australas. J. Combin. 59 (2014), 161-181. [25] D. Singerman, Finitely maximal Fuchsian groups, J. London Math. Soc. (2) 6 (1972), 29-38. [26] D. Singerman and R. I. Syddall, The Riemann surface of a uniform dessin, Beiträge Algebra Geom. 44 (2003), 413-430. [27] K. Takeuchi, Arithmetic triangle groups, J. Math. Soc. Japan 29 (1977), 91-106. [28] K. G. C. von Staudt, Geometrie der lage, Bauer und Raspe, 1847. ARS MATHEMATICA CONTEMPORANEA Author Guidelines Before submission Papers should be written in English, prepared in ETpX, and must be submitted as a PDF file. The title page of the submissions must contain: • Title. The title must be concise and informative. • Author names and affiliations. For each author add his/her affiliation which should include the full postal address and the country name. If avilable, specify the e-mail address of each author. Clearly indicate who is the corresponding author of the paper. • Abstract. A concise abstract is required. The abstract should state the problem studied and the principal results proven. • Keywords. Please specify 2 to 6 keywords separated by commas. • Mathematics Subject Classification. Include one or more Math. Subj. Class. codes - see http://www.ams.org/msc. After acceptance Articles which are accepted for publication must be prepared in ETeX using class file amcjoucc.cls (which has replaced the deprecated amcjou.cls class file) and the bst file am-cjoucc.bst (if you use BiblEX). If you dont use BibTEX, please make sure that all your references are carefully formatted following the examples provided in the sample file. All files can be found on-line at: http://amc-journal.eu/index.php/amc/about/submissions#authorGuidelines Abstracts: Be concise. As much as possible, please use plain text in your abstract and avoid complicated formulas. Do not include citations in your abstract. All abstracts will be posted on the website in fairly basic HTME, and HTME can't handle complicated formulas. It can barely handle subscripts and greek letters. Cross-referencing: All numbering of theorems, sections, figures etc. that are referenced later in the paper should be generated using standard EaTeX \label{...} and \ref{...} commands. See the sample file for examples. Theorems and proofs: The class file has pre-defined environments for theorem-like statements; please use them rather than coding your own. Please use the standard \begin{proof} \end{proof} environment for your proofs. Spacing and page formatting: Please do not modify the page formatting and do not use \medbreak, \bigbreak, \pagebreak etc. commands to force spacing. In general, please let EaTeX do all of the space formatting via the class file. The layout editors will modify the formatting and spacing as needed for publication. Figures: Any illustrations included in the paper must be provided in PDF format, or via ETeX packages which produce embedded graphics, such as TiKz, that compile with PdfETEX. (Note, however, that PSTricks is problematic.) Make sure that you use uniform lettering and sizing of the text. If you use other methods to generate your graphics, please provide .pdf versions of the images (or negotiate with the layout editor assigned to your article). ix ARS MATHEMATICA CONTEMPORANEA Subscription Yearly subscription: 150 EUR Any author or editor that subscribes to the printed edition will receive a complimentary copy of Ars Mathematica Contemporánea. Subscription Order Form Name: .............................. E-mail: .............................. Postal Address: ...................... I would like to subscribe to receive ...... copies of each issue of Ars Mathematica Contemporanea in the year 2016. I want to renew the order for each subsequent year if not cancelled by e-mail: □ Yes □ No Signature: Please send the order by mail, by fax or by e-mail. By mail: Ars Mathematica Contemporanea UP FAMNIT Glagoljaska 8 SI-6000 Koper Slovenia By fax: +386 5 611 75 71 By e-mail: info@famnit.upr.si x ARS MATHEMATICA CONTEMPORANEA tP ANNOUNCEMENT PhD Fellowship ("Young Researcher" position) at the University of Primorska, Slovenia The University of Primorska announces two "Young researcher" positions under the supervision of • Dragan Marusic (Algebra and Discrete Mathematics); • Enes Pasalic (Cryptography). Applicants should have a BSc or equivalent training (by September 2016). Applicants for Young researcher positions in mathematics are expected to enroll in the PhD program at UP FAMNIT. The positions are for 4 years and include a tuition fee waiver. More information available at: http://www.famnit.upr.si/sl/novice/javni-razpis-za-mlad-3 The deadline for applications is July 29, 2016. Applicants should send a letter of interest with CV and two recommendation letters to: The application should also be sent by e-mail to the address manca.drobne@upr.si. For any additional information please contact Manca Drobne at Phone: +386 5 611 7585 Fax: +386 5 611 7592 Email: manca.drobne@upr.si "Young Researcher position" University of Primorska, UP IAM Muzejski trg 2 6000 Koper Slovenia Photos: Miha Peroša xi Printed in Slovenia by