Professional Documents
Culture Documents
Fachrichtung Mathematik
Institut für Algebra
Diplomarbeit
zur Erlangung des ersten akademischen Grades
Diplommathematiker
Contents
1 Introduction 3
2 Preliminaries 7
2.1 Permutation groups . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.2 Cellular algebras . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
A. Definitions and notations . . . . . . . . . . . . . . . . . . . 8
B. Symmetries of cellular algebras . . . . . . . . . . . . . . . 14
C. Some simple propositions about cellular algebras . . . . . . 15
D. Some distinguished classes of cellular algebras . . . . . . . 17
2.3 Incidence structures . . . . . . . . . . . . . . . . . . . . . . . . . . 20
A. Definitions and notations . . . . . . . . . . . . . . . . . . . 20
B. Symmetries of incidence structures . . . . . . . . . . . . . 22
C. t-structures and t-designs . . . . . . . . . . . . . . . . . . 22
D. Some distinguished classes of designs . . . . . . . . . . . . 24
4 Flag algebras 30
4.1 Flag-algebras of symmetric 2-designs . . . . . . . . . . . . . . . . 44
4.2 Flag-algebras of quasi-symmetric designs . . . . . . . . . . . . . . 45
4.3 Flag-algebras of quasi-balanced designs . . . . . . . . . . . . . . . 57
1 Introduction
A combinatorial object can be interpreted as a basic set provided with a number
of relations. For instance a graph is defined as a set of vertices equipped with a
binary relation – the adjacency relation.
Between the permutations of the basic set and the relations a Galois correspon-
dence can be introduced. In particular, to each set of permutations the set of
all invariant relations and to each set of relations the set of all automorphisms is
associated. The closed objects of this Galois connection were first described by
M. Krasner in [Kra-38]. From one hand these are just the permutation groups
and from the other hand these are the so called Krasner-clones. This fact makes
it possible to characterize symmetries of combinatorial objects either through
permutation groups or (dually) through Krasner-clones.
In the investigation of transitive permutation groups the binary invariant relations
play a prominent role. Inspired by the work of I. Schur about S-rings, H. Wielandt
in [Wie-36] introduced the concept of the V-ring (German Vertauschungsring).
In the literature these rings are frequently called centralizer algebra. The V-ring
consists of exactly those complex matrices that commute with all permutational
matrices of the given group (see Section 3.1). It can be easily showed that the
adjacency matrices of the 2-orbits of the group form a basis of the V-ring. On
the other hand each binary invariant relation can be expressed as the union of
2-orbits.
The high importance of the V-rings in permutation group theory lead to the
development of a separate structural theory. In [WeiL-68] B. Yu. Weisfeiler and
A. A. Leman introduced cellular algebras. These are complex, self-adjoint matrix
algebras that are closed (in addition to the usual operations) with respect to the
so called Schur-Hadamard product (compare Section 2.2). It is easy to see that
each V-ring represents a cellular algebra. However, the opposite is not true in
general.
Another important element of this development is the theory of association
schemes. The basis of this theory was laid already in the 1930th by R. C. Bose
and K. R. Nair. Out of this evolved the investigation of the Bose-Mesner algebras,
which – from todays point of view – are a special class of cellular algebras.
For a long time the theories of the V-rings and of the association schemes de-
veloped independently. In [Hig-70] both concepts were brought together by
D. G. Higman. He introduced coherent configurations (as a basic set equipped
with a system of binary relation that fulfill certain axioms) and their associated
coherent algebras.
Coherent and cellular algebras comprise more or less the same class of algebraical
structures. In the literature both terms are used synonymously. This treatise uses
1 INTRODUCTION 4
The main topic of this treatise is, to classify incidence structures by properties
of their flag algebras, to find classes of especially symmetric incidence structures
and to examine their flag algebras.
In Section 2 the usual terminology for permutation groups, cellular algebras and
incidence structures is provided.
Section 3 contains descriptions of the most important combinatorial problems
for cellular algebras such as the construction of the first standard basis, the
computation of the structure constants and the cellular subalgebras etc. For
V-rings and for cellular algebras generated by matrices known methods for the
solutions of these tasks are given ([FarKM-94]).
The last two sections form the kernel of the treatise. Section 4 contains the
theoretical considerations. As was mentioned above, incidence structures can be
interpreted as relational structure on their flags. This allows to introduce such
terms as “L-path”, “N-path”, “L-distance”, “N-distance”, “L-connected” and
“N-connected”. This approach follows the methods of algebraical graph theory
for the investigation of adjacency algebras of graphs (see e.g. [Big-93]). Using
these concepts matrices are constructed that have to be contained in each flag
algebra. With these matrices it is possible to give a lower bound for the rank of
flag algebras. Incidence structures that attain this lower bound are called “flag
minimal”. Independently, incidence structures whose flag algebra is dihedral are
called “dihedral designs”. It is observed that each dihedral design must belong
to one of the following classes:
1) symmetric 2-designs,
2) quasi-symmetric designs with intersection numbers (0, µ) or
3) quasi-balanced designs with intersection numbers (0, λ; 0, µ) (see Section
2.3.D for a definition).
For quasi-symmetric designs in Section 4.2, again, the known results from [KliMMZ-97]
about the flag algebras of 2-designs with λ = 1 are given. In addition to this two
other classes of flag minimal dihedral designs are described: the quasi-symmetric
3-designs and the affine point-hyperplane designs. For these classes of algebras
generating relations are elaborated.
Section 4.3 starts with a consideration of disconnected designs. This was not done
before since the 2-designs are self-evidently both: L-connected and N-connected.
A proof is presented that in general for designs the to concepts L-connected and
N-connected are equivalent. This is followed by a complete description of the
disconnected flag-minimal dihedral designs using connected flag minimal dihedral
designs. Finally, a proof for the fact that generalized n-gons are flag-minimal and
dihedral is given. In principle this was already known from [KilS-73]. However,
no evident proof is given there that the considered algebras are coherent.
In Section 5 the combinatorial standard problems for some of the flag algebras
from Section 4 are treated. Using a special kind of term rewriting systems the
structure constants for whole classes of algebras are computed. Each constant
is then a function. The cellular subalgebras are constructed using the method
from Section 3. Using the structure constants it is possible to search for other
types of combinatorial objects such as distance regular graphs (drg), strongly
regular graphs (srg) or directed strongly regular graphs (dsrg). In this way a
few infinite families of directed strongly regular graphs are discovered. At the
end of the section an attempt is made to generalize these series of dsrgs to other
(non flag-minimal) classes of designs. The result is, that two of the families
can be extended to all 2-designs. Another series can be generalized to all quasi-
symmetric 2-designs with intersection numbers (0, µ) and with k = 2µ or µ = 1.
The supplement contains MAPLE-implementations of the following combinato-
rial algorithms:
For those algebras where the automatic construction of the cellular subalgebras
was not successful, protocols of the hand-computations are added.
Hereby I declare that I wrote this master thesis independently. All results were
obtained basing on the sources that are mentioned in the section “References”.
Moreover, each citation is marked appropriately in the text.
2 PRELIMINARIES 7
2 Preliminaries
Lemma 2.2 Let Ω be a set of n elements. Then the set of all permutations of
Ω forms a group S(Ω) — the full symmetric group of Ω. The operations in S(Ω)
are the usual composition of maps and the inversion of maps according to:
• x(πφ) = (xπ )φ ,
−1
• xπ = y ⇐⇒ y π = x.
Φ : G × Ω −→ Ω.
Remarks:
1) Let G be finite group and let (G, Ω, Φ) be an action of G on the finite set
Ω. Then Φ induces a homomorphism Φ e of G into S(Ω) according to:
Following some definitions for different types of linear operator algebras will be
given. As the terminology in this field is to be considered as classical, termini
such as e.g. vector space, linear operator or adjoint operator will be used without
further introduction. A rather extensive treatment of the matter can be found in
[Gre-63] and [Koc-62].
Note that for the definition of cellular algebras it is really necessary to fix a base
in V since the Schur-Hadamard product cannot be defined base independently
(it is a combinatorial property of the algebra).
2:
If A does only have entries c and 0 then nothing has to be proved.
Otherwise let {x1 = c, x2 , . . . , xk } be the set of different entries of A. Define
A(i) = A − xi J and
à := A◦A(2) ◦ · · · ◦A(k) , à = (ãij ) .
Then ãij 6= 0 ⇐⇒ aij = c. Moreover all entries of à are equal to c(c − x2 )(c −
x3 ) · · · (c − xk ) or 0. Thus we get
1
A(c) = Ã
c(c − x2 )(c − x3 ) · · · (c − xk )
:2
2 PRELIMINARIES 10
1) A1 + A2 + · · · + Ar = J,
2) Ai ◦Aj = δij Ai ,
3) For each i ∈ {1, 2, . . . , r} there exists a j ∈ {1, 2, . . . , r} such that A∗i = Aj .
2:
In this proof the notion “support” of a matrix A = (aij ) will be used. It is defined
as the set of all pairs (i, j) such that aij 6= 0.
Because of the Schur-Wielandt principle each element A of W can be expressed
as
A = a1 A(a1 ) + a2 A(a2 ) + · · · + ak A(ak )
where A(ai ) is a 0/1-matrix. From this follows that W has a basis of 0/1-matrices,
suppose this is
W = hB1 , B2 , . . . , Bs i.
Take any two distinct elements Bi , Bj for which Bi ◦Bj 6= 0 Define B̃i = Bi −
(Bi ◦Bj ), B̃j = Bj − (Bi ◦Bj ), B̃ = Bi ◦Bj . Then
n o
B1 , B2 , . . . , Bi−1 , B̃i , Bi+1 , . . . , Bj−1 , B̃j , Bj+1 . . . , Bs , B̃
The parameters pki,j are non-negative integers. They are called structure constants
of W .
2) The original definition of a cellular algebra did not require that the unit
operator I must be included. However, in this thesis only such cellular
algebras will be treated which are proper B-algebras.
It can be easily checked that the intersection of any set of cellular algebra of degree
n is again a cellular algebra. Therefore (as usual for algebraical structures) the
class (Wn , ⊆) forms a complete lattice.
Moreover, in Wn a closure operator can be defined as follows:
Lemma 2.13 Let V be a linear space over the complex number field C. Let W
a matrix representation of a linearly closed subset of operators on V that has a
basis hA1 , A2 , . . . , Ar i of real matrices.
Then W is closed with respect to transposition if and only if W is closed with
respect to adjunction.
2:
“=⇒”: P
Let A ∈ W , A = ai Ai . Since the Ai are real matrices, we have
X X
A∗ = ai A∗i = ai Ati
This implies
r X
X r
∗
A = ai xij Aj
i=1 j=1
“⇐=”:
exactly the same reasoning as above leads to the closeness with respect to trans-
position.
:2
The following terms and notations are commonly used in the theory of cellular
algebras.
2:
If P is cellular then one can easily see that I (x) = I◦J (x,x) .
If I (x) ∈ W for all x then we can define J (x,y) = I (x) JI (y) .
:2
2
Notation: Let W be a cellular algebra, let P = {P1 , P2 , . . . , Pt } be a cellular
partition of W . Let A ∈ W and let x, y ∈ {1, 2, . . . , t}. Then A<x,y> shall denote
the submatrix of A that is induced by Px × Py .
In analogy with J (x,y) define A(x,y) := A◦J (x,y) .
Wx := {A<x,x> | A ∈ W }
is a cellular algebra. If P is the main partition of W then the Wx are cells. They
will be referred to as the cells of W .
Definition 2.20 (Cell Type) Let W be a cellular algebra with first standard
basis hA1 , A2 , . . . , Ar i. Let P = {P1 , P2 , . . . , Pt } be a cellular partition of W .
Then by Lemma 2.18 for each basis element Ai there exists exactly one pair
(x,y)
x, y ∈ {1, 2, . . . , t} such that Ai 6= 0. This leads to a partition of the basis into
t2 classes. According to this observation the type of P is defined as
T (P) = (tx,y )
where tx,y := A ∈ {A1 , A2 , . . . , Ar } | A(x,y) 6= 0 .
Remark: The type of the main partition of W is called cell type of W and is
denoted as T (W ).
∀i ∈ {1, 2, . . . , r} : Ai P = P Bi
If in addition
∀i ∈ {1, 2, . . . , r} : Ai P = P Ai
then P is called automorphism of W .
2 PRELIMINARIES 15
1) The set of all weak automorphisms of W forms a group (under usual com-
position and inversion of matrices). It is denoted as wAut(W ).
The two groups Aut(W ) and wAut(W ) act naturally on {1, 2, . . . , n}. In par-
ticular define the action ( wAut(W ), {1, 2, . . . , n}, Φ) according to (P, x) 7→ xπ
where iπ = j ⇐⇒ Pi,j = 1. Moreover this action is faithful. In the sequel
no distinction will be made between the representation as matrix group and the
representation as permutation group. The following interesting relation of the
two groups is given here without a proof:
This subsection was included to give some motivation for the algebraical approach
to cellular algebras that was given above.
For classical notions such as invariant subspace, character, irreducibility of in-
variant subspaces or multiplicity of characters no self-contained introduction is
given though. For a good introduction [Koc-62] can be used.
Lemma 2.25 Let W = hA1 , A2 , . . . , Ar i be a cell of degree n and let ~j be the all
one vector. Then the following are true:
3) For all i ∈ {1, . . . , r} the value of χ(Ai ) is equal to the spectral radius of
Ai .
2:
(1) this is equivalent to the statement that the elements of the first standard
basis are adjacency matrices of regular graphs. For cells this is easily verified.
2 PRELIMINARIES 16
The corresponding eigenvalues are as follows: Ax1 = (n − 1)x1 , Axi = −xi for
i ∈ {2, . . . , n}.
(3) Let A = Ai for some i and let k be the eigenvalue of A belonging to ~j (k is a
positive real integer). Let λ be any other eigenvalue of A and ~x = (x1 , x2 , . . . , xn )
be an arbitrary eigenvector of λ. Let xi be an entry of ~x with maximal absolute
value. Then
n
X
(A~x)i = λxi = aij xj
j=1
Xn
|λxi | = |λ||xi | = aij xj
j=1
n
X n
X
≤ |aij ||xj | = aij |xj |
j=1 j=1
Xn
≤ aij |xi | = k|xi |
j=1
xi 6= 0 =⇒ |λ| ≤ k
:2
The previous lemma points out the existence of a distinguished character for any
cell W (it is closely related to the theorem of Perron and Frobenius which makes
a similar claim for irreducible positive real matrices; see for instance [Gan-70]).
It will be used in the following lemma to give an algebraic characterization of the
number of cells of a cellular algebra.
2:
First we prove point 1 and 2.
(x,y)
Let Ai be a basis element of W and let x, y ∈ {1, 2, . . . , t} such that Ai 6= 0.
By Lemma 2.18
(x,y)
Ai J (y,y) = rJ (x,y) (1)
where r is some positive integer (depending on Ai ). Then Ai j~k = δkx rj~y . From
this follows that H is indeed W -invariant. By easy computations using Equation
1 one can observe that the restriction of W onto H is the full operator algebra
A(H). Thus H is irreducible.
About 3:
(x,y)
Let Ai be a basis element of W and let x, y ∈ {1, 2, . . . , t} such that Ai 6= 0.
Let Ãi be the matrix of Ai operating on H in the above given basis. Equation
1 states that Ai j~k 6= 0 if and only if k = x. From this follows immediately that
tr(Ãi ) 6= 0 ⇐⇒ x = y.
Assume that x = y. Then Ai corresponds to a basis element A of the cell Wx
(namely A<x,x>
i ). The spectrum of A is contained in the spectrum of Ai . All
other eigenvalues of Ai are equal to 0. Now Lemma 2.25 gives the desired result.
About 4:
Consider once again the all 1 matrix of some cell Wi of W . Then this has its
spectral radius as eigenvalue with multiplicity one. Consequently the W -invariant
subspace H is unique and thus the multiplicity of χ is equal to one.
:2
Distance regular graphs The distance regular graphs play a very prominent
role in algebraic graph theory. Many interesting results in group theory and
combinatorics were obtained with their help.
Here their definition is given mainly because they form a rather natural general-
ization of the class of strongly regular graphs.
A very detailed exposition of the theory of distance regular graphs can be found
in [BroCN-89].
h hAi i = hA0 , A1 , . . . , Ad i
where
1 d(x, y) = i
Ai = (ax,y ) with ax,y =
0 else
Moreover A0 = I, A1 = A and
with the additional assumption that A−1 = Ad+1 = 0 and b−1 = cd+1 = 0.
2:
The proof of this proposition will be omitted here. It is not too difficult and can
be found e.g. in [KliPR-88] or [BroCN-89].
:2
Dihedral algebras
W = h hA, Bi i.
Notations:
• P lies on a,
• a contains P ,
• a goes through P ,
• P and a are incident,
Remark: In what follows only incidence structures without repeated blocks shall
be considered. In this case each block is determined by the set of points on it.
For that reason a block b will be identified with hbi. In particular, the incidence
relation F can be assumed to be the relation of inclusion (∈). Instead of (P, B, F)
sometimes the shortened notation (P, B) will be used. For reasons of convenience,
sometimes we will also identify a point P with hP i.
There are many different ways to associate an incidence structure to a given one.
A few of these constructions will be introduced now.
Definition 2.35 (Dual Structure) Let S = (P, B, F) be an incidence struc-
ture. Then define the dual structure S ∗ of S by exchanging the role of points and
of blocks. In other words S ∗ := (B, P, F ∗ ) where F ∗ = {(p, P ) | (P, p) ∈ F}.
F 00 = F ∩ (P 00 × B 00 ).
2 PRELIMINARIES 22
Dually, for a block b ∈ B the structures Sb and S b can be defined as internal and
external structures in S ∗ .
Φ1 ((ϕ, ψ), P ) := P ϕ
Φ2 ((ϕ, ψ), b) := bψ
Proposition 2.42 With the notions from above the following are true:
2
2 PRELIMINARIES 23
Notations:
2:
Let 0 ≤ s < t. Let S ⊆ P such that |S| = s.
A pair (T, b) of a t-element point-set T and a block b is called good if S ⊆ T and
T ⊆ b.
Let us count the good pairs in two different ways:
From one hand there are v−s
t−s
t-element subsets of P containing S each of which
is contained in λt blocks. This gives v−s
t−s
λt good pairs.
From the other hand assume there are m blocks containing S. Then for each such
block there are k−s
t−s
t-element subsets of P that contain S. This yields m k−s
t−s
good pairs.
All in all we have
v−s k−s
λt =m .
t−s t−s
Consequently
(v − s)! (k − t)!
m = λt .
(v − t)! (k − s)!
This means in particular that m is independent on the actual choice of S. Ex-
pansion of the formula gives:
(v − s)(v − s − 1) · · · (v − t + 1)
m = λt .
(k − s)(k − s − 1) · · · (k − t + 1)
This subsection will be used to introduce some classes of designs that will be of
special interest later in this thesis.
1) for each distinct pair of points P1 and P2 either |P1 ∩P2 | = u or |P1 ∩P2 | = w,
1) Compute the standard representation of the algebra (in form of its first
standard basis)!
In the following these problems are considered for different common situations.
Problem 1
It is a very well known fact that the elements of the first standard basis of V(G, Ω)
are the adjacency matrices of the 2-orbit graphs of (G, Ω). The computation of
these graphs is straightforward. Thus problem 1 is solved in this case.
Problem 2
For the solution of problem 2 let us restate the definition of structure constants
in a combinatorial way:
3 COMPUTATIONS IN CELLULAR ALGEBRAS 26
If we define for each Ai from the first standard basis the relation
Ri := {(x, y) | ax,y = 1}
then we get
cx,y = |{z | (x, z) ∈ Ri , (z, y) ∈ Rj }| .
By definition of a cellular algebra, if (x, y) ∈ Rk then cx,y = pki,j .
Thus each structure constant is obtained by simple counting.
Improvements of the above stated scheme are possible by using the known re-
lations between the structure constants. This usually has the effect that fewer
structure constants have to be counted. However, each relation that is taken into
account first of all increases the overhead of the algorithm. Experience shows
that for algebras of rather small rank such theoretical improvements do not lead
to much higher speed.
Still, if the first standard basis contains many anti-symmetric elements then the
following easy observation may be useful:
Assume for each basis element Ai its mate Ai0 is known such that Ai ∗ = Ai0 .
Then
0
pki,j = pkj 0 ,i0 .
Problem 3
For the computation of cellular subalgebras one makes use of the following fact:
2
Now the main principle is to test different partitions of {1, 2, . . . , r} whether they
lead to subalgebras.
3 COMPUTATIONS IN CELLULAR ALGEBRAS 27
However, not all possible partitions have to be considered since not each subset of
{1, 2, . . . , r} can represent a P
basis element of a subalgebra. In order to illustrate
this let us assume that B = i∈I Ai is a candidate for a basis element. Then the
following conditions have to be satisfied:
1) B◦B ∗ ∈ {B, 0}
It is worth mentioning in the end that for this special case (centralizer rings
of permutation groups) there exists a computer package that solves the above
mentioned four problems. Its name is COCO and it was written by I.Faradžev
and M.Klin (UNIX-version by A.E.Brouwer). Further references to COCO and
the stated methods can be found e.g. in [FarK-91] and [FarKM-94].
3 COMPUTATIONS IN CELLULAR ALGEBRAS 28
According to these partitions the graph gets recoloured. Note that the new colour
classes are again either reflexive or symmetric or antisymmetric.
This procedure is repeated until no further refinement of the colour classes oc-
cures. Now the adjacency matrices of the colour classes are just the elements of
the first standard basis of h hAi i.
The above described procedure is called Weisfeiler-Leman stabilization or shorter
WL-stabilization.
Note that in the end not only the first standard basis is known but also the
k
structure constants (they correspond to the constant values of the functions πi,j ).
Thus problems 1) and 2) are solved for this situation.
By now there exist a few good implementations of this algorithm. Two of them
are:
For the solution of the problems 3) and 4) the situation is identical to the one in
3.1. They can be solved once more using the program package COCO.
4 FLAG ALGEBRAS 30
4 Flag algebras
In the following, cellular algebras shall be considered as well as B-algebras. In
order not to create confusion between these two concepts let us define for a set
of n × n-matrices M :
Note, that both closure operators are well defined—for the first this fact is well
known and can be found in almost any text-book about linear algebra. For the
second operator see Definition 2.12.
CM := {f : M −→ C}.
Together with the above defined operations CM forms a linear space. To each
element i of M assign the function
According to these two relations define the two linear operators L and N on CF :
For f ∈ F:
X
Lf := g,
g∈F
(f,g)∈RL
X
N f := g.
g∈F
(f,g)∈RN
Then
WF := h hL, N i i
is called flag-algebra of S.
Algebras that are defined on flags have been used mainly in order to find necessary
conditions for the existence of certain designs. This spirit is demonstrated very
well in [KilS-73] by R. Kilmoyer and L. Solomon where, using flag-algebras, a
beautiful proof of the well known theorem of Feit-Higman is given. The main tool
there is the computation with the irreducible representations of these algebras.
Another interesting problem is to find certain classes of designs that have a flag-
algebra of given rank. Sources where this problem is treated include [Smi-88],
[FarKM-94], [KliMMZ-97] and [Zie-97]. In [Smi-88] there are described some
classes of symmetric designs with flag-algebras of rank seven. In [FarKM-94]
projective planes are considered. In [KliMMZ-97] these results are extended to
2-designs with λ = 1. A more systematical approach is taken by P. H. Zieschang
in [Zie-97]. He examines dihedral cellular algebras and geometries that can be
associated to them.
The second problem will be treated here.
Let us start with a few general definitions and observations.
Flag-walks are in close relation with the monomials in L and N . For instance
the matrices L and N can be associated with the flag-walks of length one in S
For monomials of higher degree a similar relationship can be observed. However,
here the situation is slightly more complicated.
First of all let Σ = {L, N } be an alphabet and let Σ∗ be the free monoid generated
by Σ (Σ∗ consists of all finite words consisting of letters from Σ such as e.g. LLN .
Then it is possible to associate to any flag-walk Q = (f0 , f1 , . . . , fn ) a word from
Σ∗ as follows:
4 FLAG ALGEBRAS 32
Definition 4.4 With the notions from above define the pattern of Q:
L if (fi−1 , fi ) ∈ RL
w(Q) = x1 x2 x3 · · · xn where xi =
N if (fi−1 , fi ) ∈ RN
Lemma 4.5 With the notions from above assume ϕ(w(Q)) = (af,g ). Then af,g
is equal to the number of flag-walks from f to g that have the pattern w(Q).
2:
This will be proved via induction on the length of Q:
If Q is a flag-walk of length 1 then its pattern consists of exactly one letter; L or
N . Without loss of generality assume that w(Q) = L. Then the image of w(Q)
under ϕ is L. Thus, with the notions from above, af,g = 1 ⇐⇒ (f, g) ∈ RL ;
otherwise af,g = 0. On the other hand it is easily seen that their exists a flag of
pattern L from f to g if and only if (f, g) ∈ RL and that such a walk, if it exists,
is unique. Thus, the situation is clear in the case of walks of length 1.
Assume the claim is proved for patterns of length ≤ n − 1. Let w be a pattern of
length n. For two flags f and g define the set Q of all flag-walks from f to g with
pattern w. Then Q can be partitioned according to the following equivalence
relation:
(f = f0 , f1 , . . . , fn = g) ∼ (f = g0 , g1 , . . . , gn = g) : ⇐⇒ fn−1 = gn−1 .
:2
The previous lemma suggests that the structure of the two algebras [L, N ] and
h hL, N i i is closely related to the flag-walks of S. In order to describe this inter-
relation, we need to introduce a few more termini:
4 FLAG ALGEBRAS 33
Definition 4.6 Let Σ = {L, N } and let Σ∗ be the free monoid generated by the
alphabet Σ. Define a sequence of words from Σ∗ according to
w0 := I
w1 := L
w2 := N
w2n−1 L if 2 | n
w2n+1 :=
w2n−1 N else
w2n N if 2 | n
w2n+2 :=
w2n L else
3) For two flags f and g the L-distance dL (f, g) is defined to be the length of
the shortest L-path from f to g if it exists — otherwise ∞. The N -distance
dN (f, g) is defined analogously.
We have now concepts for the distance of flags. Indeed, similarities to the ter-
minology that is used in graph-theory is not coincidental! Moreover, as in graph
theory, many of the presented proofs will base on the analytical enumeration of
certain configurations of flags (the parallel in graph theory would be the enumer-
ation of certain types of subgraphs of a graph). However, in the case of incidence
structures the formal description of such configurations is rather tedious and
difficult to read. For this reason a more visible notation will be introduced:
Each configuration consists of a set of different symbols (representing the flags)
which are placed in a grid of horizontal and vertical lines. Two flags are placed on
one and the same horizontal line if and only if they are concurrent. Two flags are
placed on one and the same vertical line if and only if they are collinear (compare
Definition 4.2).
4 FLAG ALGEBRAS 34
x x
Having provided these notations we will start by looking at WF (S) from the
inside. In particular we will describe some distinguished elements of it:
4 FLAG ALGEBRAS 35
2:
(i)
Without loss of generality it is enough to prove that DL ∈ WF (D) (for the proof
of the other claim we can switch to the consideration of WF (D∗ )).
The claim will be proved by induction on i.
For i = 0 and for i = 1 nothing needs to be proved.
Now assume that the claim is proved for i ≤ n − 1. We will prove that it also
holds for i = n:Define
n−1
X
(<n) (i)
DL = DL .
i=0
Two flags f and g have L-distance n if and only if there is an L-walk from f to g
that has pattern w2n−1 and there is no flag-walk from f to g of pattern w2j−1 for
all j < n. By Lemma 4.5 this means that if A = ϕ(w2n−1 ) = (af,g ) then af,g 6= 0
and that for all j < n the corresponding entry in ϕ(w2j−1 ) is equal to 0. Let us
define now another matrix:
(<n)
B := (J − DL )◦A = (bf,g ).
2:
Define A = (af,g ) := L2 ◦I + I and B = (bf,g ) := N 2 ◦I + I.
Then af,f = |p| and bf,f = |P |.
4 FLAG ALGEBRAS 36
Now, using the Schur-Wielandt principle, we get matrices A|p| and B|P | .
Define C|P |,|p| = (cf,g ) := A|p| ◦B|P | .
Then cg,g = 1 if and only if |p| = |q| and |P | = |Q|.
The different matrices C|P |,|p| form a partition of the identity operator into scalar
0/1-matrices.
The rest follows with Lemma 2.16.
:2
Lemma 4.11 Let S = (P, B, F) be an incidence structure and let WF (S) be its
flag-algebra. Then the following are true:
1) Let µ be a natural number such there exist blocks b1 , b2 ∈ B with |b1 ∩b2 | = µ.
Let
1 |p ∩ q| = µ
Xµ = (xf,g ) with xf,g = for flags f = (P, p), g = (Q, q)
0 else
Then Xµ ∈ WF (S).
Then Yλ ∈ WF (S).
2:
About 1) Define A = (af,g ) := (LN L◦N ) + N . Then
|p ∩ q| (f, g) ∈ RN
af,g = .
0 else
2:
It can be easily observed that
Z(1,1) = LN ◦N L,
Z(0,1) = LN ◦(J − Z(1,1) ),
Z(1,0) = N L◦(J − Z(1,1) ),
Z(0,0) = J − L − N − Z(0,1) − Z(1,0) − Z(1,1) .
:2
The construction of the above described matrices is independent from the actual
incidence structure S. Thus we obtain a lower bound for the rank of the flag-
algebra of an incidence structure. To give an exact expression for this lower
bound is tedious in the general case. However, it would be very interesting to
examine those designs for that rank(WF ) is minimal in this sense.
1) S is called flag-minimal if
Our main interest will be concentrated on the description of the last two classes
(the homogeneous, dihedral case). In most cases a complete characterization
appears to be very difficult. In general the best overview can be given for flag-
minimal + flag-homogeneous + sharply dihedral structures. This case has been
studied now for some time by various authors (exact references will be given
later on). Moreover the chances seem to be rather good to obtain a complete
classification in near future.
Let us start now with the statement of some simple implications:
4) If S is dihedral then
|P ∩ Q| ∈ {0, λ, r},
|a ∩ b| ∈ {0, µ, k}.
4 FLAG ALGEBRAS 39
2:
1.) trivial.
2.) If WF is not flag-homogeneous, then it admits a cellular partition P =
{P1 , P2 , . . . , Pt } (this is a partition of F). This means that for all x, y ∈ {1, 2, . . . , t} :
J (x,y) ∈ WF . If WF is dihedral then there must be such a pair (x, y) such that e.g.
L◦J (x,y) = L. However, this means that two flags f and g may only be collinear
if f ∈ Px and if g ∈ Py . Hence for a flag h = (B, b) that is not in Px there does
not exist any collinear flag. This means, that the block b does contain exactly
one element (namely B). This is a contradiction to the assumption that S is a
non-trivial incidence structure.
3.) this is a direct consequence of Lemma 4.10.
4.) Let P1 , P2 , Q1 and Q2 be points such that |P1 ∩ Q1 | = λ1 and |P2 ∩ Q2 | = λ2
where λ1 , λ2 > 0 and λ1 6= λ2 . This implies that there exist blocks b1 and b2 such
that f1 = (P1 , b1 ), f2 = (Q1 , b1 ), f3 = (P2 , b2 ) and f4 = (Q2 , b2 ). Let Yλ1 = (xf,g )
and Yλ2 = (yf,g ) be as defined in Lemma 4.11. Then xf1 ,f2 = 1 and yf3 ,f4 = 1. At
the same time we also have that (f1 , f2 ) and (f3 , f4 ) are collinear. Consequently,
L◦Yλ1 6= 0 and L◦Yλ2 6= 0. As Yλ1 ◦Yλ2 = 0, this means that S is not dihedral.
The other point of the claim follows with analogous reasonings.
:2
1) S is a symmetric 2-design.
Each of these three classes will be treated separately. The search for flag-minimal
designs will consist of the following steps:
1) Description of [L, N ] in terms of defining relations (in the alphabet {L, N }),
For the first two steps there can be made some general observations. These will
be given now — before we start with the consideration of each class.
To characterize sharply dihedral designs it is helpful to know a basis of [L, N ].
The following proposition gives such a description.
or
[L, N ] = hϕ(w0 ), ϕ(w1 ), . . . , ϕ(wn−2 ), ϕ(wn )i.
If n is odd then
[L, N ] = hϕ(w0 ), ϕ(w1 ), . . . , ϕ(wn−1 )i.
2:
First we observe that
From this follows immediately that [L, N ] has a basis of elements from the se-
quence wi .
The rest will be shown by induction.
Clearly I = ϕ(w0 ), L = ϕ(w1 ) and N = ϕ(w2 ) are linearly independent.
Assume that we proved that M = {ϕ(w0 ), ϕ(w1 ), . . . , ϕ(w2t )} is a linearly inde-
pendent set.
Now we distinguish four cases:
Note that the cases 2 and 3 might overlap. However, this will be not loss in
generality.
Using the equations 2 and 3 we observe that ϕ(Lwi ) and ϕ(wi X) can be
expressed as linear combinations of the elements of M ∪ {ϕ(x2t+1 )}. Con-
sequently we get that ϕ(w2t+3 ) and ϕ(w2t+4 ) are linear combinations of the
elements of M ∪ {ϕ(x2t+1 )}.
This reasoning can be repeated for all words w2t+s , s ≥ 5 ad infinitum.
Ultimately we come to the conclusion that:
1) rank([L, N ]) = 2t + 1 and
2) [L, N ] = hϕ(w0 ), ϕ(w1 ), . . . , ϕ(w2t+1 )i.
Case 3: This case can be treated analogously to Case 2. The conclusion here is
that
1) rank([L, N ]) = 2t + 1 and
2) [L, N ] = hϕ(w0 ), ϕ(w1 ), . . . , ϕ(w2t−1 ), ϕ(w2t ), ϕ(w2t+2 )i.
1) rank([L, N ]) = 2t and
4 FLAG ALGEBRAS 42
In Figure 1 this situation is visualized. Note however, that some of the above
defined sets may be empty.
U1 U2 U3 U4 Ud
N L N
L
N M2 L M3 N M4 Md
f
L N L
N
L N L
L1 L2 L3 L4 Ld
Now we check, how the flags of the different classes are related to f :
Lemma 4.18 With the notions from above, assume that f = (P, p) and
g = (Q, q). Then the following are true:
4 FLAG ALGEBRAS 43
2:
The first 5 lines are evident.
Using an indirect argument one can easily see that if dL (f, g) ≥ 3 and dN (f, g) ≥ 3
• o
then the induced configuration of f and g is .
o •
From now on assume that dL (f, g) ≥ 3 and dN (f, g) ≥ 3. If P ∩ Q 6= ∅ then there
• o +
exists a configuration and hence dN (f, g) = 3.
o • +
• o
If p ∩ q 6= ∅ then there exists a configuration o • and hence dL (f, g) = 3.
+ +
Now the statements in the Lemma are just combinations of these three observa-
tions.
:2
The distance-profile that was described in Figure 1 is in general not sufficient for
the description of the flag-algebras of flag-minimal dihedral designs. The reason
may be traced with the aid of Lemma 4.9. Namely it could happen that the
classes Ui and Li split according to different L- and N -distances of f to the flags
of these sets.
4 FLAG ALGEBRAS 44
FiL (f ) := {g ∈ F | dL (f, g) = i}
FiN (f ) := {g ∈ F | dN (f, g) = i}
Mi (f ) = FiL (f )
∩ FiN (f ),
!
[
Li (f ) = FiL (f ) ∩ FjN (f ) .
j>i
Using Lemma 4.18 we can describe now the first standard basis of the flag algebra
of a flag-minimal dihedral design in a very natural way.
Theorem 4.20 With the notions from above, assume that D = (P, B, F) is a
flag-minimal dihedral design. Then the first standard basis of WF (D) contains
only elements of the following form (besides the identity matrix):
(i,j) 1 if g ∈ FiL (f ) ∩ FjN (f )
A = (af,g ) where af,g = for f, g ∈ F.
0 else
rank([L, N ]) = 6.
2
The consequence of this lemma is that
By Definition 4.13 this means that the first standard basis of the flag-algebra of
a sharply dihedral symmetric design has to be:
This means that, if D has parameters (v, v, k, k, λ), then λ = 1 (otherwise Z(1,1) 6=
0).
On the other hand in [FarKM-94] a proof can be found that the flag-algebra of a
symmetric design with λ = 1 does always have rank 6.
Altogether we get that
About those dihedral flag-minimal designs that are not sharply dihedral we can
say that
WF (D) = hI, L, N, Z(0,0) , Z(0,1) , Z(1,0) , Z(1,1) i.
1) LN = Y(1,1) + Y(0,1) ,
2) N L = Y(1,1) + Y(1,0) ,
a1 = (k − 1)(λ − 1)
a2 = (k − 2)(λ − 1)
a3 = (µ − 1)(λ − 2) + (k − µ)(λ − 1)
a4 = µ(λ − 1) + (k − µ − 1)λ
a5 = (µ − 1)(λ − 2) + (k − µ − 1)(λ − 1)
a6 = (µ − 1)(λ − 1) + (k − µ)λ
a7 = (µ − 2)(λ − 2) + (k − µ)(λ − 1)
a8 = (k − 1)λ
4 FLAG ALGEBRAS 47
/
6) N LN L = b1 I + b2 L + b3 N + b4 Y(0,0) + b5 Y(0,1) + b6 Y(1,0) + b7 Y(1,1) + b8 O
where
b1 = (k − 1)(λ − 1)
b2 = (k − 2)(λ − 1)
b3 = (µ − 1)(λ − 2) + (k − µ)(λ − 1)
b4 = µ(λ − 1) + (k − µ − 1)λ
b5 = (µ − 1)(λ − 1) + (k − µ)λ
b6 = (µ − 1)(λ − 2) + (k − µ − 1)(λ − 1)
b7 = (µ − 2)(λ − 2) + (k − µ)(λ − 1)
b8 = (k − 1)λ
2:
The proof will be based on the counting of configurations of flags in D. Every
single counting task is quite simple. For this reason most of the details will be
omitted and only one expressive example will be elaborated.
Each expression describes the pattern of a flag-walk. For each pair of flags f and
g the number of flag-walks starting in f and ending in g with this pattern has to
be counted. The matrices that were described in Definition 4.24 form a partition
of J. For this reason the pair (f, g) can be associated to exactly one matrix
A = (ai,j ) from there ((f, g) is associated to A iff af,g = 1). It turns out that the
number of walks does only depend on this matrix A. Thus each expression can
be written as linear combination of the matrices from Definition 4.24.
Following for each pattern a table is given. In the first column the associated
matrix is given. The second column contains the configuration that has to be
counted in order to obtain the coefficient of this matrix. Finally the third column
contains the coefficient itself.
About LN:
Basis element Configuration Resulting coefficient
• o
Y(0,1) 1
x •
• +
Y(1,1) 1
x •
about NL:
Basis element Configuration Resulting coefficient
• x
Y(1,0) 1
o •
• x
Y(1,1) 1
+ •
4 FLAG ALGEBRAS 48
About LNL:
Basis element Configuration Resulting coefficient
• •
N (µ − 1)
x x
• o
Y(0,0) x x µ
o •
• o
Y(0,1) x x (µ − 1)
+ •
• +
Y(1,0) x x (µ − 1)
o •
• +
Y(1,1) x x (µ − 2)
+ •
About NLN:
Basis element Configuration Resulting coefficient
• x
L (λ − 1)
• x
• x o
Y(0,0) λ
o x •
• x o
Y(0,1) (λ − 1)
+ x •
• x +
Y(1,0) (λ − 1)
o x •
• x +
Y(1,1) (λ − 2)
+ x •
• x o
/
O λ
o x •
4 FLAG ALGEBRAS 49
About LNLN:
Basis element Configuration Resulting coefficient
• x
I (k − 1)(λ − 1)
x x
• ?
L x x (k − 2)(λ − 1)
• x
• x •
N (µ − 1)(λ − 2) + (k − µ)(λ − 1)
x x ?
• ? o
Y(0,0) x x ? µ(λ − 1) + (k − µ − 1)λ
o x •
• ? o
Y(0,1) x x ? (µ − 1)(λ − 2) + (k − µ − 1)(λ − 1)
+ x •
• ? +
Y(1,0) x x ? (µ − 1)(λ − 1) + (k − µ)λ
o x •
• ? +
Y(1,1) x x ? (µ − 2)(λ − 2) + (k − µ)(λ − 1)
+ x •
• ? o
/
O x x o (k − 1)λ
o x •
4 FLAG ALGEBRAS 50
About NLNL:
Basis element Configuration Resulting coefficient
• x
I (k − 1)(λ − 1)
x x
• x
L x x (k − 2)(λ − 1)
• ?
• x •
N (µ − 1)(λ − 2) + (k − µ)(λ − 1)
? x x
• x o
Y(0,0) ? x x µ(λ − 1) + (k − µ − 1)λ
o ? •
• x o
Y(0,1) ? x x (µ − 1)(λ − 1) + (k − µ)λ
+ ? •
• x +
Y(1,0) ? x x (µ − 1)(λ − 2) + (k − µ − 1)(λ − 1)
o ? •
• x +
Y(1,1) ? x x (µ − 2)(λ − 2) + (k − µ)(λ − 1)
+ ? •
• x o
O/ o x x (k − 1)λ
o ? •
Now for the promised example: Let us count the coefficient of Y(1,1) in LN LN .
f +
Let f and g be two flags such that their induced configuration is If there
+ g
is a path from f to g with pattern LN LN then this means that we can extend
f +
this configuration as follows: x x . This means that in order to count
+ x g
the paths of pattern LN LN from f to g, we must count configurations of the
• ? +
following type: x x ? . This is done by distinguishing two cases:
+ x •
• ? +
case 1) Count configurations of type x1 x2 + .
+ x3 •
• ? +
case 2) Count configurations of type x1 x2 o .
+ x3 •
4 FLAG ALGEBRAS 51
In the first case we have (µ − 2) possibilities to choose the point of the flag x2 . If
we have chosen such a point, we have (λ − 2) possibilities to choose the block of
x2 . All in all we get (µ − 2)(λ − 2) possibilities to choose x2 . Now it can be easily
seen that x2 determines x1 and x3 . Thus the number of choices of x2 is also the
number of configuration that we were looking for.
The second case is solved in the same way as the first case. Here we have (k − µ)
possibilities to choose a point for x2 and (λ − 1) ways to choose its block. Again
we observe that x2 determines x1 and x3 and conclude that there are (k−µ)(λ−1)
configurations in this case.
Altogether this gives the claimed coefficient.
:2
The previous lemma gives enough information for the description of the B-algebra
[L, N ]. One consequence is, e.g.:
L2 = (k − 1)I + (k − 2)L,
N 2 = (r − 1)I + (r − 2)N,
LN LN + (k + λ − 2)LN = N LN L + (k + λ − 2)N L,
2:
The first two equations follow directly from the definition of L and N (in partic-
ular the fact that RL and RN are equivalence relations can be used).
The other two equations are direct consequences of Lemma 4.25.
:2
This however is a complete set of generating relations for [L, N ].
/
[L, N ] ≤ hI, L, N, Y(0,0) , Y(0,1) , Y(1,0) , Y(1,1) , Oi.
Having a set of generating relations for [L, N ] it is possible to describe its irre-
ducible representations:
Proposition 4.29 With the notions from above [L, N ] splits into three 1-dimensional
and one 4-dimensional representation. Namely:
Ri (L) Ri (N ) multiplicity
R1 (L) = k − 1 R1 (N ) = r − 1 1
v(r − k)
R2 (L) = k − 1 R2 (N ) = −1 =b−v
k
k + kvr − kv − vr
R3 (L) = −1 R3 (N ) = −1
k
−1 r − λ r−1 0
R4 (L) = R4 (N ) = v−1
0 k−1 1 −1
2:
The correctness of the representations can be confirmed by substituting them
into the equations of Lemma 4.27. The multiplicities can be computed using
elementary linear algebra as follows:
First we use Lemma 4.25 to observe that
N LN + L + λN + LN + N L + λI = λJ.
In other words this means that J ∈ [L, N ]. The all one vector ~j spans an invariant
space belonging to R1 . Thus, in particular it is an eigenspace of J. The eigenvalue
of J belonging to this eigenspace has multiplicity one. Hence the multiplicity of
R1 is equal to 1.
For the other multiplicities we compute the trace of L and N in two different
ways. From one hand L◦I = N ◦I = 0 and thus tr(L) = tr(N ) = 0. From the
other hand the two traces can be expressed using the irreducible representations
with their multiplicities as follows:
4
X
tr(L) = ni tr(Ri (L))
i=1
X4
tr(N ) = ni tr(Ri (N ))
i=1
4 FLAG ALGEBRAS 53
tr(L) = (k − 1) + n2 (k − 1) − n3 + n4 (k − 2)
tr(N ) = (r − 1) − n2 − n3 + n4 (r − 2)
n1 + n2 + n3 + 2n4 = |F| = vr
Solving this system one gets the desired identities for n2 , n3 and n4 .
:2
Now we are ready to return to the consideration of flag-algebras. In particular we
are able to describe the flag-algebra of flag-minimal quasi-symmetric (v, b, r, k, λ)-
(0, µ) designs:
2
Remark: All above stated computations and observations (those about the
defining relations and the representations) are correct for both situations — λ = 1
or λ > 1. Indeed the difference between the cases arrises only from the fact that
Y(1,1) = 0 if and only if λ = 1.
As it was stated in the beginning of the section, the situation where λ = 1 was
considered already in [KliMMZ-97]. The results from there give raise to the
following
2:
⇐=: Assume that λ = 1. From Lemma 4.25 follows that
LN = Y(0,1)
4 FLAG ALGEBRAS 54
NL = Y(1,0)
LN L = Y(0,0)
N LN = Y(0,0)
LN LN = /
(k − 2)Y (0, 0) + (k − 1)Y (1, 0) + (k − 1) O
N LN L = /
(k − 2)Y (0, 0) + (k − 1)Y (0, 1) + (k − 1) O
/ are elements of WF (D). These
Hence we get that I,L,N ,Y(0,0) , Y(0,1) , Y(1,0) , and O
matrices are linearly independent (since they form a partition of J). From the
other hand we now that [L, N ] has dimension 7. Thus
/ =: hA1 , A2 , . . . , A7 i.
[L, N ] = hI, L, N, Y(0,0) , Y(0,1) , Y(1,0) , Oi
This basis forms a set of mutually orthogonal idempotents with respect to the
Schur-Hadamard product (Ai ◦Aj = δij Ai ). This implies that [L, N ] is closed
under the Schur-Hadamard product. Consequently D is sharply dihedral.
=⇒: Assume that D is sharply dihedral. Then everything follows with Proposi-
tion 4.30.
:2
The characterization of the rank 8 case is more complicated. A complete char-
acterization cannot be given in this thesis. However, a first partial result can be
achieved in the following:
2:
If D is flag-minimal then it has a first standard basis as described in Proposition
/ is closed
4.30. Hence it suffices to prove that hI, L, N, Y(0,0) , Y(0,1) , Y(1,0) , Y(1,1) , Oi
with respect to multiplication.
This can be achieved by extending the system of generating relation that was
given for [L, N ] in Lemma 4.27.
First of all note that
/ = hI, L, N, LN, N L, LN L, N LN, Y(1,1) i
hI, L, N, Y(0,0) , Y(0,1) , Y(1,0) , Y(1,1) , Oi
Y(0,1) = LN − Y(1,1)
Y(1,0) = N L − Y(1,1)
1
Y(0,0) = (LN L − (µ − 1)N − (µ − 1)Y(0,1) − (µ − 1)Y(1,0) − (µ − 2)Y(1,1) )
µ
4 FLAG ALGEBRAS 55
1
/ =
O (N LN − (λ − 1)L − λY(0,0) − (λ − 1)Y(0,1)
λ
−(λ − 1)Y(1,0) − (λ − 2)Y(1,1) ).
Now we compute (Y(1,1) )2 in terms of the prospective first standard basis. The
following configurations can occur:
Basis element Configuration Resulting coefficient
• +
I (k − 1)(λ − 1)
+ x
• +
L + x (k − 2)(λ3 − 1) = (λ − 1)(µ − 2)
• +
• + •
N (µ − 1)(λ − 2)
+ x +
• + o
Y(0,0) + x + µλ3
o + •
• + o
Y(0,1) + x + (µ − 1)(λ3 − 1)
+ + •
• + +
Y(1,0) + x + (µ − 1)(λ3 − 1)
o + •
• + +
Y(1,1) + x + (µ − 2)(λ3 − 2)
+ + •
The same is done for Y(1,1) L, LY(1,1) , Y(1,1) N and N Y(1,1) :
With this we have a complete set of defining relations for WF (D). Consequently
rank(WF (D)) = 8. Hence D is flag-minimal.
This completes the proof.
:2
A quasi-symmetric 3-design with intersection numbers (0, µ) is always the one
point extension of a convenient symmetric 2-design. The question, when a sym-
metric design is extendable to a quasi-symmetric 3-design has been treated by
P. J. Cameron in [Cam-73]. He proved the following
4 FLAG ALGEBRAS 56
2) v = (λ + 2)(λ2 + 4λ + 2), k = λ2 + 3λ + 1.
3) v = 111, k = 11, λ = 1.
4) v = 495, k = 39, λ = 3.
Note that for Hadamard designs there exists always a unique extension to a quasi-
symmetric 3-design (see e.g. [BetJL-86] for a proof of this classical result). For
this reason such designs are commonly called Hadamard 3-designs.
An example for the second parameter class is the Witt-design with parameters
(22, 77, 21, 6, 5). It is a one point extension of the projective plain of order 4.
Another class of designs with flag-algebras of rank 8 can be constructed using
finite affine spaces. The following definition can be found e.g. in [BetJL-86]:
Lemma 4.35 Let AG(n, q) be a finite affine space. For d > 0 let P be the set of
points and B be the set of d-flats of AG(n, q). Then AGd (n.q) := (P, B, ∈) is a
2-design.
2:
see e.g. [BetJL-86]
:2
2:
It is easy to see that AGn−1 (n, q) is quasi-symmetric with intersection numbers
(0, q n−2 ) because two hyperplanes are either parallel or intersect in an (n−2)-flat.
4 FLAG ALGEBRAS 57
Like in the proof of Theorem 4.32 it is enough to show that (Y(1,1) )2 is expressible
/ The coefficients
as linear combination of I, L, N , Y(0,0) , Y(0,1) , Y(1,0) , Y(1,1) and O.
for I, L and N are evident (see proof of Theorem 4.32).
To get the coefficient of Y(0,0) one has to count the following kind of configurations.
f + o
+ x +
o + g
Here f = (P, p) and g = (Q, q) are fixed and x = (X, x) is a variable flag. The
hyperplane x contains P as well as Q. There are λ such planes. For each choice
of x there are |p ∩ x ∩ q| ways to choose X. Since p ∩ x ∩ q must necessarily be
an (n − 3)-flat, the coefficient of Y(0,0) is λq n−3 .
With the same reasoning one gets that the coefficient for Y(0,1) and for Y(1,0) is
(λ − 1)(q n−3 − 1).
The situation is slightly different for the coefficient of Y(1,1) . Here the following
configurations have to be counted:
f + +
+ x +
+ + g
q n − q n−2 q2 − 1
= = q + 1.
q n−1 − q n−2 q−1
Altogether the coefficient of Y(1,1) is equal to (q−1)(q n−2 −2)+(λ−q−1)(q n−3 −2).
:2
A new aspect that comes into play in the case of quasi-balanced designs is the
question of flag-connectedness. This was not an issue for the 2-designs that were
studied previously since (as can easily be shown) 2-designs are always L- and N -
connected. Let us begin our investigations with the disconnected quasi-balanced
designs:
2:
First of all note that the two parts of the assertion are dual to each other since
D is L-connected iff D∗ is N -connected. Hence it suffices to show one direction
of the equivalence. We will show L-connected =⇒ N -connected.
Step 1 Assume that f and g are two collinear flags of D. We show that f and
g are N -connected:
Let Q = (f = f1 , f2 , f3 , . . . , fn−1 ) be any N -path starting with f . If there are
indices i < j such that fi = fj then we can construct an N -path from f to g as
follows:
Thus, if f and g are not N -connected, then this means that neither Q nor any
extension of Q does contain a loop. However, r > 1 and k > 1 and hence any
N -path starting in f can be extended. But this is a contradiction to the finiteness
of D.
4 FLAG ALGEBRAS 59
Step 2 Let f and g be flags such that there exists an L-path from f to g. We
will show that then there exists an N -path from f to g.
Let Q = (f = f1 , f2 , . . . , fn = g) be an L-path from f to g. In Step 1 we showed
that there exists an N -path (f1 = g1 , g2 , . . . , gm = f2 ) from f1 to f2 . If m is even
then (g1 , g2 , . . . , gm , f3 , f4 , . . . , fn ) is an N -path from f to g. If m is odd then
(g1 , g2 , . . . , gm−1 , f3 , f4 , . . . , fn ) is an N -path from f to g.
This completes the proof.
:2
Definition 4.38 A design D that is not L-connected (and hence not N -connected)
is called disconnected.
Bi := {b ∈ B | ∃f ∈ Fi : f = (P, b)}
Pi := {P ∈ P | ∃f ∈ Fi : f = (P, b)}.
2:
It is clear that ∼ is an equivalence relation on F. We will show that ∼ induces
a partition of P.
Since D is a nontrivial incidence structure we know that
[
Pi = P.
i
Assume on the contrary that f := (P, b) ∈ F. Then there exist flags fi = (P, bi ) ∈
Fi and fj = (Pj , b) ∈ Fj . Now (fi , f, fj ) is an N -path from fi to fj . Hence i = j,
but this is a contradiction to the assumption that i 6= j.
The fact that Di = (Pi , Bi , Fi ) is a connected design is an easy consequence.
Indeed the parameters of Di are (vi , bi , r, k) where vi = |Pi | and bi = |Bi |.
:2
For flag-minimal designs the conditions on the connectivity components are much
stronger. In order to be able to formulate necessary and sufficient conditions we
need to introduce the notion of similarity of cellular algebras.
If two cellular algebras are similar, this means that they are isomorphic as B-
algebras. However, they may be non-isomorphic as cellular algebras.
Theorem 4.41 Let D = (P, B, F) be a design with parameters (v, b, r, k). Let
Di = (Pi , Bi , Fi ) (i ∈ {1, 2, . . . , c}) be the connectivity components of D. Then D
is flag-minimal if and only if
1) all connectivity components are designs with the same parameters (v 0 , b0 , r, k),
2:
“=⇒”: By the definition of flag-minimality D is flag-homogeneous. Secondly,
note that for two flags f = (P, p) and g = (Q, q) of D we have
dL (f, g) = dN (f, g) = ∞ =⇒ |p ∩ q| = |P ∩ Q| = 0.
Thus we obtain
1 dL (f, g) = dN (f, g) = ∞
B = (bf,g ) with bf,g = for f, g ∈ F
0 else
where J (i) denotes the all-1-matrix of WF (Di ). Let us compute the square of
J − B:
x1 J (1)
2
x2 J (2) 0
(J − B) = x(J − B)
. . .
0
(c)
xc J
where xi is equal to the number of flags of Di . Since D is flag-homogeneous we
obtain that (J − B)2 = x(J − B). Thus all connectivity components have the
same number of flags. If Di has parameters (vi , bi , r, k) then x = xi = vi r = bi k.
Hence vi and bi do not depend on i. This completes the first part of the proof.
“⇐=”: Let D1 , D2 , . . . , Dc be flag-minimal designs with parameters (v, b, r, k)
(i)
such that their flag-algebras are pairwise similar. Assume that WF (Di ) = hA1 =
(i) (i)
I, A2 , . . . , Ar−1 i. Without loss of generality assume that
ϕ : {1, 2, . . . , r − 1} −→ {1, 2, . . . , r − 1} : x 7→ x
Corollary 4.42 A flag-minimal design is dihedral if and only if all its connec-
tivity components are dihedral.
2:
This is a direct consequence of the proof of Theorem 4.41
:2
Note that by Lemma 4.5 sharply dihedral flag-minimal designs are always con-
nected.
The most prominent class of quasi-balanced designs is formed by the generalized
n-gons that were introduced by J. Tits. The following paragraphs will base
deeply on [KilS-73]. In this paper the algebras [L, N ] for generalized n-gons are
examined. But before going into details let us start with some definitions.
Note the similarity of incidence graphs to the point-block algebras that were
defined above. Indeed, for most incidence structures the Weisfeiler-Leman closure
of the adjacency matrix of ΓPB coincides with WPB .
Following δ will denote the usual distance operator in graphs.
Definition 4.44 Let D = (P, B, F) be a design with parameters (v, b, t+1, s+1)
and let ΓPB = (V, E) be its incidence graph.
Then D is called generalized n-gon if
2) If δ(a, b) = h < n then there exists exactly one path of length h from a to
b.
Lemma 4.45 Let D = (P, B, F) be a generalized n-gon and let f = (P, p) and
g = (Q, q) be flags of D. Define d(f, g) := min{dL (f, g), dN (f, g)}. Then the
following are true:
1) d(f, g) ≤ n,
2) If d(f, g) < n then there is a unique flag-walk of length d(f, g) from f to g,
3) If d(f, g) = n then there is exactly one N -path and one L-path of length n
from f to g.
2:
By Proposition 4.16 we know that [L, N ] has a basis consisting of elements of the
form ϕ(wi ). From the description of the defining relations of [L, N ] in Proposition
4.46 we know that this basis looks as follows:
From Lemma 4.5 we know that if ϕ(wi ) = (af,g ) then af,g is equal to the number
of flag-walks from f to g that have pattern wi . If i is odd then
An easy corollary of Lemma 4.45 is that dL (f, g) = dN (f, g) if and only if d(f, g) =
n. Thus a minimal closed flag-path must always consist of exactly 2n flags (a
flag-path (f0 , f1 , . . . , fx ) is called closed if f0 = fx and (fx−1 , f0 , f1 ) is a flag-path).
Now let f, g ∈ F such that dL (f, g) = x and dN (f, g) = y. We will show that
then x + y = 2n. If (f = f1 , f2 , . . . , fx−1 , g) is a minimal L-path from f to g and
(f = g1 , g2 , . . . , gy−1 , g) is a minimal N -path from f to g then the following cases
can occure:
1) (fx−1 , gy−1 ) ∈ RL
2) (fx−1 , gy−1 ) ∈ RN
3) (fx−1 , gy−1 ) ∈
/ RL and (fx−1 , gy−1 ) ∈
/ RN
In the first case dN (f, g) is even while dL (f, g) is odd and the flags
form a minimal closed flag-path. However, the number of flags on this path is
odd and thus not equal to 2n which is a contradiction.
The same reasoning cancels case 2.
Finally only case 3 is left. In this case we obtain a minimal closed flag-path of
even length. Thus we can conclude that for any two flags f 6= g holds dL (f, g) +
dN (f, g) = 2n.
Minimal flag-paths in D are in a one to one correspondence with minimal paths
in the incidence graph ΓPB (D). The same holds for minimal closed paths and
minimal cycles in the incidence graph. Namely, a minimal closed flag-path of
length 2n corresponds to a minimal cycle consisting of n points and n blocks.
This fact can be used to prove that for any pair of distinct flags f and g with
4 FLAG ALGEBRAS 66
d(f, g) = dL (f, g) ≤ n any L-path from f to g does either have length d(f, g) or
length > n.
All these facts lead to the conclusion that for 0 ≤ i < 2n the basis elements ϕ(wi )
are 0/1-matrices. In particular ϕ(wi ) = (af,g ) such that for i odd af,g = 1 ⇐⇒
dL (f, g) = (i + 1)/2 and for i even af,g = 1 ⇐⇒ dN (f, g) = i/2.
Putting everything together we get
2:
By definition a generalized n-gon is always flag-connected.
We already observed that ϕ(w0 ), ϕ(w1 ), ϕ(w2n−1 ) forms a basis of 0/1-matrices
of [L, N ]. Moreover, we know that
2n−1
X
ϕ(wi ) = J.
i=0
It can be easily seen that ϕ(wi )∗ = ϕ(wi ) ⇐⇒ i mod 4 ∈ {1, 2} and ϕ(wi )∗ =
ϕ(wi+1 ) ⇐⇒ i mod 4 = 3. This is exactly the condition that the first standard
basis is closed under transposition.
:2
5 APPLICATIONS OF FLAG ALGEBRAS 67
1) Projective planes,
7) Generalized n-gons.
From one hand we are interested in the fulfillment of the tasks that were given in
Section 3. From the other hand we also would like to find interesting combina-
torial objects that can be associated with the flag-algebras. In particular these
are
The drgs and srgs were introduced in Section 2.2.D. Directed strongly regular
graphs are defined as follows:
1) |V | = ṽ,
2) AJ = JA = k̃J,
Following are a few helpful propositions about directed strongly regular graphs:
k̃ 0 = ṽ − k̃ − 1,
λ̃0 = ṽ − 2k̃ + µ̃ − 2,
t̃0 = ṽ − 2k̃ + t̃ − 1,
µ̃0 = ṽ − 2k̃ + λ̃.
2:
First of all note
Now
(J − I − A)2 = J 2 − J − JA − J + I + A − AJ + A + A2
= ṽJ − 2J − k̃J + I + A − k̃J + A + t̃I + λ̃A + µ̃(J − I − A)
= (ṽ − 2k̃ + µ̃ − 2)J + (2 + λ̃ − µ̃)A + (1 + t̃ − µ̃)I
λ̃0 = ṽ − 2k̃ + µ̃ − 2
t̃0 = ṽ − 2k̃ + t̃ − 1
µ̃0 = ṽ − 2k̃ + λ̃
The fact that k̃ 0 = ṽ − k̃ − 1 can be easily seen (it is a general property of regular
graphs).
:2
2:
Note that A can be expressed as As + Aa where As is a symmetric and Aa is an
5 APPLICATIONS OF FLAG ALGEBRAS 69
(A∗ )2 = (A2 )∗
= (t̃I + λ̃(As + Aa ) + µ̃(J − I − As − Aa ))∗
= t̃I ∗ + λ̃(As + Aa )∗ + µ̃(J − I − As − Aa )∗
= t̃I + λ̃(As + A∗a ) + µ̃(J − I − As − A∗a )
= t̃I + λ̃A∗ + µ̃(J − I − A∗ ).
:2
In the following a general description of the strategy for the solution of all tasks
from Section 3 will be given.
General strategy: For each class of designs the following information is needed:
The combinatorial description of the first standard basis was already given in
Theorem 4.20. Thus task 1 is solved.
Now for the description of the structure constants:
Assume, that Ai and Aj are elements of the first standard basis of WF . Since we
5 APPLICATIONS OF FLAG ALGEBRAS 70
r
X
ϕ A i Aj = ak ϕ(bk ).
k=1
Note that for the computation of the structure constants the knowledge of the
actual matrices of Ai and Aj was not necessary. The main work is done inside
of the algorithm NF. In general the existence of such an algorithm depends on
the choice of the defining relations. Usually NF is realized as a so called term
rewriting system (TRS). Such normal form algorithms are treated a bit more
detailed in the supplement. Thus task 2 is solved.
Task 3 is solved exactly as in Section 3.1. If (as in our case) the structure
constants are given as functions, then the test for good subsets involves the
solution of systems of Diophantine equations. This process will become clear in
the next subsection.
5 APPLICATIONS OF FLAG ALGEBRAS 71
About Task 4 we only make the following remark: A non-trivial incidence struc-
ture S = (P, B, F) is well determined by its collinearity relation RL and its
concurrency relation RN . In particular, let P e := F/RN , let Be := F/RL and
let Fe := {(Pe, pe) | Pe ∈ P,
e pe ∈ B,
e Pe ∩ pe 6= ∅}. Then (P, B, F) is isomorphic to
(P,
e B,
e F).
e Now it can be easily seen that
Aut(S) ∼
= Aut(RL ) ∩ Aut(RN ).
Since the cellular algebras are in a Galois correspondence with the 2-closed per-
mutation groups, it is clear that
Aut(RL ) ∩ Aut(RN ) ∼
= Aut(WF (S)).
5.1 Hadamard-3-designs
Let D be a Hadamard-3-design. Then D has parameters v = 4n, b = 8n − 2,
r = 4n − 1, k = 2n, λ = 2n − 1 and λ3 = n − 1. Moreover, two blocks are either
disjoint or they intersect in exactly n points.
In Proposition 4.30 a combinatorial description of the first standard basis of
WF (D) was given. Namely
WF (D) = hA0 , A1 , A2 , A3 , A4 , A5 , A6 , A7 i
Ix = xI = x for x ∈ A,
L2 = (2n − 1)I + (2n − 2)L,
N2 = (4n − 2)I + (4n − 3)N,
N LN L = LN LN + (4n − 3)LN − (4n − 3)N L,
LN LN = (4n2 − 6n + 2)I − (2n − 2)L + (4n2 − 6n + 2)N
−(2n − 2)LN + (2n − 1)N L − LN L + (2n − 2)N LN
Y(1,1) 2 = (4n2 − 6n + 2)I + (2n2 − 6n + 4)L + (n2 − 3n + 2)N
−(n − 1)LN − (n − 1)N L + (n − 1)LN L + 2Y(1,1) ,
5 APPLICATIONS OF FLAG ALGEBRAS 72
I = I
L = L
N = N
n−1 n−1 n−1 1
Y(0,0) = − N− LN − N L + LN L + Y(1,1)
n n n n
Y(0,1) = LN − Y(1,1)
Y(1,0) = N L − Y(1,1)
Y(1,1) = Y(1,1)
2(n − 1) n−1 n−1 n−1
/ =
O − L+ N− LN − NL
2n − 1 n 2n − 1 2n − 1
1 1
− LN L + N LN
n 2n − 1
The inverse transformation is:
I = I
L = L
N = N
LN = Y(0,1) + Y(1,1)
NL = Y(1,0) + Y(1,1)
LN L = (n − 1)N + nY(0,0) + (n − 1)Y(0,1) + (n − 1)Y(1,0) + (n − 2)Y(1,1)
N LN = (2n − 2)L + (2n − 1)Y(0,0) + (2n − 2)Y(0,1) + (2n − 2)Y(1,0)
/
+(2n − 3)Y(1,1) + (2n − 1) O
Y(1,1) = Y(1,1)
With this information all structure constants can be computed. Assume e.g. we
want to know Y(0,1) L in terms of the first standard basis. We start by expressing
5 APPLICATIONS OF FLAG ALGEBRAS 73
Y(0,1) and L in B̃. This is (LN − Y(1,1) ) and again L. Thus we get
Y(0,1) L = LN L − Y(1,1) L.
Using the defining relations we get
Y(0,1) L = LN L − (n − 1)N + (n − 1)N L − Y(1,1) .
Finally we transform back to the first standard basis
Y(0,1) L = nY(0,0) + (n − 1)Y(0,1) .
Of course these tedious computations are done using a computer algebra system
(see supplement).
Thus we know all structure constants and can go for the computation of subal-
gebras as it was described in Section 3.1.
We start with the evaluation of good subsets:
The first standard basis is indexed by the numbers {0, 1, . . . , 7}. We know that
A∗4 = Y(0,1) ∗ = Y(1,0) = A5 are the only antisymmetric elements of the basis.
Each good subset must be either symmetric or antisymmetric (by the axioms of
a cellular algebra). Following is a list of all candidates for good subsets:
{1}, {1, 2}, {1, 2, 3}, {1, 2, 3, 6}, {1, 2, 3, 6, 7}, {1, 2, 3, 4, 5, 6, 7}, {1, 2, 3, 4, 5, 6},
{1, 2, 3, 7}, {1, 2, 3, 4, 5, 7}, {1, 2, 3, 4, 5}, {1, 2, 6}, {1, 2, 6, 7}, {1, 2, 4, 5, 6, 7},
{1, 2, 4, 5, 6}, {1, 2, 7}, {1, 2, 4, 5, 7}, {1, 2, 4, 5}, {1, 3}, {1, 3, 6}, {1, 3, 6, 7},
{1, 3, 4, 5, 6, 7}, {1, 3, 4, 5, 6}, {1, 3, 7}, {1, 3, 4, 5, 7}, {1, 3, 4, 5}, {1, 6}, {1, 6, 7},
{1, 4, 5, 6, 7}, {1, 4, 5, 6}, {1, 7}, {1, 4, 5, 7}, {1, 4, 5}, {2}, {2, 3}, {2, 3, 6},
{2, 3, 6, 7}, {2, 3, 4, 5, 6, 7}, {2, 3, 4, 5, 6}, {2, 3, 7}, {2, 3, 4, 5, 7}, {2, 3, 4, 5},
{2, 6}, {2, 6, 7}, {2, 4, 5, 6, 7}, {2, 4, 5, 6}, {2, 7}, {2, 4, 5, 7}, {2, 4, 5}, {3},
{3, 6}, {3, 6, 7}, {3, 4, 5, 6, 7}, {3, 4, 5, 6}, {3, 7}, {3, 4, 5, 7}, {3, 4, 5}, {6},
{6, 7}, {4, 5, 6, 7}, {4, 5, 6}, {7}, {4, 5, 7}, {4, 5}, {4}, {5}
If we would like to know, e.g., whether {1, 2, 3} is a good subset, then we have to
compute powers of A1 + A2 + A3 . It turns out that the computation of squares is
sufficient (enough sets are filtered out). Using the previously computed structure
constants we compute that
(A1 + A2 + A3 )2 = (4n2 + 4n − 3)A0 + (2n2 − 2)A1 + (2n2 + 2n − 3)A2
+(n2 + 6n − 6)A3 + (n2 + 2n)A4 + (n2 + 2n)A5
+(n2 − 2n + 2)A6 + (4n − 2)A7
The coefficients of A1 , A2 and A3 must be equal in order for {1, 2, 3} to be a good
set. In particular
2n2 − 2 = 2n2 + 2n − 3.
5 APPLICATIONS OF FLAG ALGEBRAS 74
For each of these candidates the axioms of a cellular algebra have to be verified.
This is done by computing products of basis-elements. Assume, e.g., we want to
know whether
{{0}, {1}, {2}, {3}, {4}, {5}, {6, 7}}
represents a cell. One of the products to be checked is A1 A2 . We get
A 1 A2 = A4 + A 6 .
W8 = hA0 , A1 + A3 , A2 + A4 + A5 , A6 + A7 i
W0
W1
W2 W3
W5 W4 W6 W8
W7
For each of these sets the axioms of a dsrg have to be tested. Namely, the square
of each candidate has to be computed and the coefficients have to be verified.
This generally leads again to systems of Diophantine equations. The results of
these tests are given in the following Theorem:
matrix k̃ µ̃ λ̃ t̃
A1 + A 3 + A4 8n2 − 2n − 1 4n2 − 2n 4n2 − 2 4n2 − 1
A1 + A4 + A6 8n2 − 6n + 1 4n2 − 4n + 1 4n2 − 6n + 2 4n2 − 4n + 1
A3 + A4 + A7 8n2 − 2n 4n2 4n2 − 2n 4n2 .
WF (D) = hA0 , A1 , A2 , A3 , A4 , A5 , A6 , A7 i
and
−n(LN + N L − LN L) + 2Y(1,1)
Y(1,1) L = n(N + N L) − Y(1,1)
LY(1,1) = n(N + LN ) − Y(1,1)
Y(1,1) N = n(n + 3)(L + LN ) − Y(1,1)
N Y(1,1) = n(n + 3)(L + N L) − Y(1,1)
The transformation between the first standard basis and the auxiliary basis is
given through:
I = I
L = L
N = N
LN = Y(0,1) + Y(1,1)
NL = Y(1,0) + Y(1,1)
LN L = n(N + Y(0,0) + Y(0,1) + Y(1,0) + Y(1,1) ) + Y(0,0) − Y(1,1)
N LN = n(n + 3)(L + Y(0,0) + Y(0,1) + Y(1,0) + Y(1,1) ) + Y(0,0) − Y(1,1)
Y(1,1) = Y(1,1)
2
In figure 3 the Hasse-diagram for these subalgebras is given.
The only non-trivial subalgebra that occurs is W1 . Using the structure constants
of WF (D) it is easy to compute that
A27 = (n + 3)(n + 2)(n + 1)3 (A0 + A1 ) + (n + 2)(n + 1)3 (A2 + A3 + A4 + A5 + A6 )
5 APPLICATIONS OF FLAG ALGEBRAS 79
W0
W1
W2 W3
W4
and
Consequently these two basis elements are adjacency matrices of graphs with
diameter 2. Since in addition A1 is a generalized involution, W1 does not belong
to a distance regular graph.
Theorem 5.6 With the same notions as in Theorem 5.5 the following is a com-
plete list (up to transposition and complement) of all those matrices in WF that
are adjacency matrices of directed strongly regular graphs:
WF (D) = hA0 , A1 , A2 , A3 , A4 , A5 , A6 i
5 APPLICATIONS OF FLAG ALGEBRAS 80
L2 = xI + (x − 1)L
N2 = yI + (y − 1)N
LN LN + xLN = N LN L + xN L
LN LN = xN L − LN L + xN LN
A0 = I
A1 = L
A2 = N
A3 = LN
A4 = NL
A5 = LN L
A6 = N LN − LN L
W0
W3
W1 W8
W7 W5
W2 W9 W6
W4
strongly regular graphs. In the following table their parameters are given:
Wi v k λ µ
W2 xy 2 + 2xy + y + x + 1 x x−1 0
W5 y 2 + 3y + 2 y y−1 0
W6 xy 2 + 2xy + x + y + 1 y y−1 0
W7 2y 2 + 5y + 3 4y + 2 2y + 1 4
W9 x3 + 4x2 + 5x + 2 x2 + 2x x2 + 2x − 1 0
Thus W2 , W5 , W6 and W9 are trivial. W7 belongs to a non-trivial srg. Note that
2 2y + 3
2y + 5y + 3 = .
2
Substituting r = 2y + 3 we get that W7 has parameters v = 2r , k = 2(r − 2),
W1 : A1 is a generalized involution.
(A2 + A3 + A4 + A5 )2 = y(x + 1)2 (A0 + A1 ) + (1 + x)3 A6 +
(1 + x)(x2 + y − 1)(A2 + A3 + A4 + A5 )
This means that for any feasible choice of x and y the matrix (A2 + A3 + A4 + A5 )
belongs to a graph of diameter 2.
(A6 )2 = (y − x)xy(A0 + A1 ) +
x(y − x − 1)(y − x)(A2 + A3 + A4 + A5 )
(3x2 + 2x + x3 − 2xy − 2yx2 − y + y 2 x)A6
With Proposition 2.31 either the coefficient of A1 or of (A2 + A3 + A4 + A5 ) must
be equal to 0. Since generally x, y 6= 0 and x < y this means that y = x + 1. In
this case we get:
(A6 )2 = x(x + 1)(A0 + A1 ) + (x2 − 1)A6 and
A6 A1 = xA6 .
This means that A6 is the adjacency matrix of a disconnected graph and hence
not a drg.
5 APPLICATIONS OF FLAG ALGEBRAS 83
W3 : A1 is a generalized involution.
(A2 + A5 )2 = 2yA0 + (y − 1)(A2 + A5 ) + (A3 + A4 ) + 2A6
The coefficients of (A3 + A4 ) and of A6 are different and 6= 0. With proposition
2.31 this means that (A2 + A5 ) does not represent a drg.
(A3 + A4 )2 = 2yA1 + (A2 + A5 ) + (y − 1)(A3 + A4 ) + 2A6
The coefficients of (A2 + A5 ) and of A6 are different and 6= 0. Thus (A3 + A4 )
does not represent a drg. The matrix A6 was checked already above.
WF (D) = hA0 , A1 , A2 , A3 , A4 , A5 , A6 , A7 i
where A0 = I, A1 = L, A2 = N , A3 = LN , A4 = N L, A5 = LN L, A6 = N LN
and A7 = LN LN .
From Proposition 4.46 we know the defining relations of WF (D).
Ix = xI = x for x ∈ {L, N }
L2 = sI + (s − 1)L
N2 = tI + (t − 1)N
LN LN = N LN L
2
The Flag-algebras of WF (D) and WF (D∗ ) are obviously isomorphic. Indeed, if
WF (D) = h hL, N i i and WF (D∗ ) = h hL̃, Ñ i i then
L 7→ Ñ
N 7→ L̃
induces the isomorphism. For this reason it is enough, to check only candidates
up to duality. The complete protocol of the computations of subalgebras can be
found in the supplement.
Theorem 5.9 Let D be a generalized quadrangle of order (s, t). Then its flag-
algebra WF (D) has the following cellular subalgebras:
for s = t:
for s arbitrary, t = 1:
for t arbitrary, s = 1:
sporadic s = t = 1:
Let us start with the strongly regular graphs: The following is a complete list
(up to duality):
Wi v k λ µ
W3 (s + 1)(st + 1)(t + 1) s s−1 0
W12 2s2 + 4s + 1 s s−1 0
W13 2s2 + 4s + 1 s2 + 2s s2 + 2s − 1 0
W39 45 16 8 4
The first three graphs are trivial (disconnected). W39 has the parameters of a
triangular graph T (10). By the Connor theorem ([Con-58]) it is indeed isomorphic
to T (10).
Now, systematically, for all non-trivial cellular subalgebras (up to duality) we
check whether they belong to distance regular graphs. For all termini related to
drgs that were not introduced by now we refere to [BroCN-89]:
The first graph is just the halfed 6-cube and the second one is the deCaen-
Mathon-Moorhouse graph.
(A1 + A6 ) can be described as the incidence graph of a 2-(16, 16, 10, 10, 6) design
(there are 3 such designs). (A3 + A4 ) represents just the folded 6-cube.
5 APPLICATIONS OF FLAG ALGEBRAS 88
W38 :
W1 : A1 is a generalized involution.
Since s and t must be greater than zero, Proposition 2.31 implies that t = 1.
With this assumption we get
These however are the parameters of the point graph of a generalized octagon of
order (s,1) (it is in fact just the edge graph of the incidence graph of the initial
generalized quadrangle of order (s, s)).
W7 : A2 is a generalized involution.
This graph must be isomorphic to a complete bipartite graph from which a match-
ing was removed.
W0
W1 W2
W6
W3 W4
W5
W0
W8 W7
W1 W11
W3 W10 W9 W2
W12
W13 W4
W5
Finally note that the generalized quadrangles of order (s, 1) are in a one to one
correspondence with the so called s̃ × s̃-grids where s̃ = s + 1. There an x × y-grid
is the edge-graph of the complete bipartite graph Kx,y .
As usual the search for directed strongly regular graphs is much easier than the
search for cellular subalgebras. Only the squares of 16 sets have to be tested in
order to obtain the following result:
Theorem 5.10 Let D be a generalized quadrangle of order (s, t) and with flag-
algebra WF = hA0 , A1 , . . . , A7 i. Then the following are all directed strongly reg-
ular (ṽ, k̃, µ̃, λ̃, t̃)-graphs that can be constructed out of basis elements of WF (up
to transposition and complement):
5 APPLICATIONS OF FLAG ALGEBRAS 91
ṽ = (s + 1)(t + 1)(ts + 1)
Matrix ṽ k̃ µ̃ λ̃ t̃ s t
A1 + A 2 + A3 ṽ ts + t + s 1 t+s−1 t+s arbitr. arbitr.
A1 + A 3 + A5 2(t + 1)2 2t + 1 1 t t+1 1 arbitr.
A2 + A3 + A6 2(s + 1)2 2s + 1 1 s s+1 arbitr. 1
A3 + A5 + A6 8 3 1 1 2 1 1
Ix = xI = x for x ∈ {L, N }
L2 = sI + (s − 1)L
N2 = tI + (t − 1)N
LN L = N LN
Basis transformations are not necessary in this case (they are identity operators).
Thus the structure constants can be computed easily. Also the subalgebras and
dsrgs are found without problems. For the protocols of the computations see the
supplement.
for all s:
sporadic cases:
W5 = h(A0 ), (A1 + A5 ), (A2 ), (A3 + A4 )i s=1
W6 = h(A0 ), (A1 ), (A2 + A5 ), (A3 + A4 )i s=1
W7 = h(A0 ), (A1 + A2 + A5 ), (A3 ), (A4 )i s=1
W8 = h(A0 ), (A1 + A2 + A3 + A4 ), (A5 )i s=1
W9 = h(A0 ), (A1 + A2 + A5 ), (A3 + A4 )i s ∈ {1, 4}
W10 = h(A0 ), (A1 + A5 ), (A2 + A3 + A4 )i s=2
W11 = h(A0 ), (A1 + A3 + A4 ), (A2 + A5 )i s=2
The sporadic subalgebras with s = 1 are not of interest. For the other algebras
we can say that they either belong to strongly regular or distance regular graphs
or are trivial. In particular W0 and W4 are trivial subalgebras. W1 belongs to
the point-graph of a generalized hexagon of order (s, 1) and is therefore distance
regular. Following is a list of all strongly regular graphs with their parameters:
Wi v k λ µ
W2 (s + 1)(s2 + s + 1) s s−1 0
W3 (s + 1)(s2 + s + 1) s s−1 0
W9 105 32 4 12
W10 21 10 5 4
W11 21 10 5 4
W0
W2 W1 W3
W4
include the discovery of a few series of directed strongly regular graphs. In fact
the way these graphs were obtained did not depend on the flag-algebra (the
flag algebra was only used in the proof of strong regularity). For this reason it
seems natural to look if the same construction leads to dsrgs for other classes of
designs. Following such a search will be performed using the B-algebra [L, N ].
The advantage of the use of this algebra is, that e.g. for the 2-designs it can be
easily described.
The notions that will be used here are those from section 4.2.
2:
LN L + (λ − 1)L = N LN + (λ − 1)N.
From this follows that [L, N ] = hI, L, N, LN, N L, LN Li (see also Proposition
4.16).
/ =
In the case v < b we observe that O 6 0. The fact that
M = {I, L, N, LN, N L, LN L, N LN }
is linearly independent can be seen from the fact that for X ∈ M we have that
λJ = N LN + L + λN + λI + LN + N L. (7)
Theorem 5.13 Let D be any 2-(v, b, r, k, λ) design. Let L and N be its collinearity-
and concurrency matrix respectively. Then
(ṽ, k̃, µ̃, λ̃, t̃) = (vr, r(k − 1), λ(k − 1), λ(k − 2), λ(k − 1)).
(ṽ, k̃, µ̃, λ̃, t̃) = (vr, rk − 1, λk, λ(k − 1) + r − 2, λ(k − 1) + r − 1).
2:
From the proof of Proposition 5.12 we know that
N LN = λJ − L − LN − N L − λI − λN.
about (1)
With A = (L + LN ) we get
A2 = L2 + L2 N + LN L + LN LN
= L2 + L2 N + LN L + λ(k − 1)J − L2 − L2 N − LN L − λ(L + LN )
= λ(k − 1)J − λA.
5 APPLICATIONS OF FLAG ALGEBRAS 95
and
JA = JL + JLN = r(k − 1)J.
about (2)
With A = (L + N + LN ) we get
A2 = L2 + LN + L2 N + N L + N 2 + N LN + LN L + LN 2 + LN LN
= LN + N L + N N + N LN + LN 2 + λ(k − 1)J − λL − λLN
= (r − 1)I + λ(k − 1)J + (r − 1 − λ)L + (r − 2)N + (r − λ − 1)LN
+N L + N LN
= (r − λ − 1)I + λkJ + (r − λ − 2)A
AJ = JA = JN + JL + JLN
= ((r − 1) + (k − 1) + (k − 1)(r − 1))J
= (r + k − 2 + kr − k − r + 1)J
= (rk − 1)J.
From Lemma 4.27 we know a set of defining relations for [L, N ]. Moreover, from
Lemma 4.25 we know that [L, N ] is a linear subspace of the linear space
/
hI, L, N, Y(0,0) , Y(0,1) , Y(1,0) , Y(1,1) , Oi.
2:
/
{I, L, N, Y(0,0) , Y(0,1) , Y(1,0) , Y(1,1) , O}.
where
1
c0 = (−2rkλµ + 2rkλµ2 + r2 kµ2 − k 3 λ − 2rk 2 λµ + rk 2 λ + k 3 λ2 − 4kλµ2
λµ2
+2kλ2 µ + 4k 2 λµ − r2 µ2 − 2k 2 λ2 µ + kλ2 µ2 − λ2 µ2 − k 2 λ2 + 2rλµ2 )
c1 = c0
1
c2 = (+2rkλµ2 − 2rk 2 λµ + k 3 λ2 − r2 µ2 + kλ2 µ2 − 2k 2 λ2 µ + r2 kµ2 + rλµ2
λµ2
−kλµ2 + k 2 λµ − 2λµ3 )
1
c3 = (+λ2 µ2 + kλµ2 + rkλµ − 2λµ3 − kλ2 µ + 2rkλµ2 − 2rk 2 λµ + k 3 λ2
λµ2
−r2 µ2 + kλ2 µ2 − 2kλ2 µ + r2 kµ2 )
c4 = c3
c5 = c2
c6 = c2
1
c7 = c2 + 2 (−3kλµ2 + k 2 λµ + 2λµ3 )
λµ
/ the condition from equation 9 is equivalent to
Since A = N + Y(1,0) + Y(1,1) + O,
the system of equations:
t̃ = c0 , λ̃ = c2 = c5 = c6 = c7 and µ̃ = c1 = c3 = c4 .
Again, a series of tedious computations leads to the fact that these equations are
fulfilled if and only if
k 2 − 3kµ + 2µ2
= 0.
µ
This equation has solutions {k = 2µ, k = µ}. The case k = µ can never occur
for non-trivial quasi-symmetric designs. Hence equation 9 is fulfilled if and only
if k = 2µ. Substituting this into the ci (0 ≤ i ≤ 7) leads to the desired result.
Finally, with Proposition 4.29 it becomes evident that A is the adjacency matrix
of a regular graph ((1/vr)J is the spectral projection belonging to the represen-
tation R1 and thus JA = AJ = k̃J).
:2
5 APPLICATIONS OF FLAG ALGEBRAS 98
Acknowledgments
I am greatly indebted to Prof. M. Klin, who organized in 1995/1996 a one-year
teaching program on Algebraic Combinatorics at the Ben-Gurion University of
the Negev in Beer-Sheva Israel. The participants of this program were three
German students and I was one of them. During this year Prof. Klin introduced
us to the main principles of algebraic combinatorics. Moreover he involved us
into first research projects. I consider this year in Israel as the most valuable
experience of my whole studies.
I am also very obliged to Prof. R. Pöschel who pointed out the possibility to
study algebraic combinatorics in Beer-Sheva and who mediated the first contacts
of us three students to Prof. Klin.
Moreover I would like to thank Prof. Lazin for the opportunity to study in frames
of the Overseas Student Program.
REFERENCES 99
References
[BabBLT-97] L. Babel, S. Baumann, M. Lüdecke, G. Tinhofer. STABCOL:
graph isomorphism testing based on the Weisfeiler-Leman algo-
rithm. preprint TUM-M9702, TU-München, 1997.
[BabCKP-97] L. Babel, I. V. Chuvaeva, M. Klin, D. V. Pasechnik. Algebraic
Combinatorics in Mathematical Chemistry. Methods and Algo-
rithms. II. Program Implementation of the Weisfeiler-Leman Al-
gorithm. preprint TUM-M9701, TU-München, 1997.
[BetJL-86] Th. Beth, D. Jungnickel, H. Lenz. Design Theory. BI-
Wissenschaftsverlag Mannheim, 1986.
[Big-93] N. Biggs. Algebraic Graph Theory. 2nd edition, Cambridge Univer-
sity Press, 1993.
[BroCN-89] A. E. Brouwer, A. M. Cohen, A. Neumaier. Distance Regular
Graphs. Springer-Verlag Berlin, 1989.
[Cam-73] P. J. Cameron. Extending symmetric designs. J. Combin. Theory,
A 14 (1973), 215–220.
[ChaGGMW-88] B. W. Char, K. O. Geddes, G. H. Gonnet, M. B. Monagan,
S. M. Watt, The Maple Reference Manual., 5th ed. (WATCOM,
Waterloo, Canada, 1988).
[Con-58] W. S. Connor. The uniqueness of the triangular association scheme.
A. Mat. Stat. 29 (1958), 262–266.
[FarK-91] I. A. Faradžev, M. H. Klin. Computer package for computations
with coherent configurations. Proc. ISSAC-91, Bonn, ACM Press,
1991, 219–223.
[FarKM-94] I. A. Faradžev, M. H. Klin, M. E. Muzichuk. Cellular rings and
groups of automorphisms of graphs. In: I. A. Faradžev et al. (eds.):
Investigations in algebraic theory of combinatorial objects. Kluwer
Acad. Publ., Dordrecht, 1994, 1–152.
[Gan-70] F. R. Gantmacher. Matrizenrechnung. Teil I u. II. 3. Auflage, Berlin
1970,1971.
[Gre-63] W. H. Greub. Linear Algebra. 2nd edition, Springer-Verlag Berlin,
1963.
[Hig-70] D. G. Higman. Coherent configurations. I. Rend. Sem. Mat. Univ.
Padova, 44 (1970), 1–25.
REFERENCES 100
[Hig-88] D. G. Higman.
Strongly
regular designs and coherent configurations
3 2
of type . Europ. J. Combinatorics, 9 (1988), 411–422.
2 3