Home The Higman operations and embeddings of recursive groups
Article Publicly Available

The Higman operations and embeddings of recursive groups

  • Vahagn H. Mikaelian ORCID logo EMAIL logo
Published/Copyright: June 13, 2023

Abstract

In the context of Higman embeddings of recursive groups into finitely presented groups, we suggest an approach, termed the 𝐻-machine, which for certain wide classes of groups allows constructive Higman embeddings of recursive groups into finitely presented groups. The approach is based on Higman operations, and it explicitly constructs some specific recursively enumerable sets of integer sequences arising during the embeddings. Specific auxiliary operations are introduced to make the work with Higman operations a simpler and more intuitive procedure. Also, an automated mechanism of constructive embeddings of countable groups into 2-generator groups preserving certain “patterns” is mentioned.

1 Introduction

1.1 Higman’s embedding theorem

In 1961, Higman proved that a finitely generated group can be embedded in a finitely presented group if and only if it is recursively presented [7] (see definitions and notation in Section 2.1). In his work, Higman extensively uses specific recursively enumerable sets of integer sequences which in some sense “code” defining relations of groups. Our objective is to suggest an algorithm for construction of such integer sequences for certain types of groups. This allows us to list wide classes of groups for which Higman’s famous embedding construction can be constructive and effective.

The approach of [7] will be very briefly outlined in Section 3 below. For now, let us just mention the main steps of Higman’s construction to distinguish those parts to which our new algorithm concerns. A finitely generated group

G = A R = a 1 , a 2 , r 1 , r 2 ,

with recursively enumerable relations r 1 , r 2 , can be constructively embedded into a 2-generator group T = b , c r 1 , r 2 , where the relations r 1 = r 1 ( b , c ) , r 2 = r 2 ( b , c ) , … are certain words on letters b , c , and they also are recursively enumerable. Then, for each r s , s = 1 , 2 , , a unique sequence f s of integers is compiled (see details in Section 3.2) so that the set { r 1 , r 2 , } of relations is “coded” by means of a set B = { f 1 , f 2 , } of such sequences. Since the transaction from relations set 𝑅 to sequences set ℬ is done via just a few constructive steps, the set ℬ also is recursively enumerable.

The tedious part of [7] is to show that ℬ is recursively enumerable if and only if ℬ can be constructed by some chain of special operators (H). And parallel to application of those operations, a respective benign subgroup is being constructed in the free group F 3 = a , b , c of rank three (see Section 2.5). As this process ends up on construction of ℬ, the respective benign subgroup A B is obtained inside F 3 .

In the final short step, the benign subgroup A B is used to get another benign subgroup in the free group F 2 = b , c of rank two. Then that new subgroup is used to embed the group 𝑇 (and hence also 𝐺) into a finitely presented group via the “The Higman Rope Trick” (see [12, p. 219] and [22]).

1.2 Our algorithm for construction of ℬ

In [7], Higman just relies on theoretical possibility for construction of ℬ via operations (H), without any examples of such construction for particular groups. This is understandable as the objective of the fundamental article [7] is much deeper, and for its purposes, it is sufficient to know that such a construction of ℬ is possible, provided that the set of Gödel numbers specifically constructed for the set 𝑅 is equal to the range of a certain partial recursive function described by Kleene’s characterization (see references in Section 2.1 below).

However, it is rather strange that, after Higman’s result, there was no attempt to explicitly find constructions of ℬ by operations (H) for particular groups (at least, we were unable to find them in the literature). Investigating the topic, we noticed that such construction may be a doable task for many classes of groups, such as the free abelian, metabelian, soluble, nilpotent groups, the additive group of rational numbers ℚ, the quasicyclic group C p , divisible abelian groups, etc. (see examples in Section 3.3).

We suggest an 𝐻-machine algorithm with some generic tools that allow to explicitly construct ℬ by operations (H) without any usage of Kleene’s characterization, at all. In Example 4.11, we show how simple it is to apply the algorithm (see Remark 4.12).

The advantage of this approach is that construction of the benign subgroup A B and, thus, of the explicit embedding of the given 𝐺 into a finitely presented group becomes a manageable procedure.

To shorten the routine of work with basic Higman operations, we introduce a few auxiliary operations which make the proofs not only shorter but also, we hope, more intuitive to understand (see notation in Section 2.4).

Another embedding aspect we touch upon is the manner by which the initial group 𝐺 is constructively embedded into a 2-generator group 𝑇, and how the relations of 𝑇 can be obtained from those of 𝐺. In the literature, there is no shortage in constructive embeddings of this type (in fact, the original method of [8] already allows that). However, for our purposes, we need a method which not only makes deduction of the relations of 𝑇 from the relations of 𝐺 a trivial automated task, but also preserves certain “patterns” in the relations (for illustration of the “patterns”, see [16] and also examples in Section 3.3 below).

2 Definitions, references, preliminary constructions

2.1 Basic notation and references

For general group theory information, we refer to textbooks [19, 10, 21]. For background on free constructions, such as free products, free products with amalgamated subgroups, HNN-extension, we refer to [12, 4, 21]. See also the recent note [15], where we apply some methods related to free constructions. We use them here without restating the notation again. Information on varieties of groups can be found in Hanna Neumann’s monograph [18].

We will study recursive groups in the language of Higman operations (H). Recall that a recursive (or recursively presented) group 𝐺 is that possessing a presentation

G = X R = x 1 , , x n , r 1 , r 2 ,

with finite or countable set of generators 𝑋 and with a recursively enumerable set of defining relations 𝑅. That is to say, to each relation r i R , one can assign a Gödel number (see [7, Section 2] or [12, p. 218]) to interpret 𝑅 via a set of respective Gödel numbers, and then that set turns out to be the range of a partial recursive function. By Kleene’s characterization, a partial recursive function is that obtained from the zero function, the successor function and the identity function using the operations of composition, primitive recursion and minimization (see [6, 20, 5] for details).

Although Higman’s theorem is for finitely generated recursive groups, its analog holds for embeddings of countably generated recursive groups into finitely presented groups. For, a countably generated recursive group can first be effectively embedded into a finitely generated recursive group (see the remark proceeding the corollary in [7, p. 456]). Thus, in embedding procedures, we will not take care of the number of generators, as long as the relations are recursively enumerated.

2.2 Sets of integer-valued functions and sequences of integers

Denote by ℰ the set of all functions f : Z Z with finite support

sup ( f ) = { i Z f ( i ) 0 } .

When 𝑚 is any positive integer such that sup ( f ) { 0 , 1 , , m 1 } , then we can interpret 𝑓 as a sequence f = ( n 0 , , n m 1 ) of length 𝑚, assuming f ( i ) = n i for each index i = 0 , , m 1 . The value f ( i ) is called the 𝑖-th coordinate of 𝑓, or the coordinate of 𝑓 at the index 𝑖. Say, f = ( 0 , 0 , 7 , 8 , 5 , 5 , 5 , 5 ) means that f ( 2 ) = 7 , f ( 3 ) = 8 , f ( i ) = 5 for i = 4 , , 7 , and f ( i ) = 0 for any i 1 or i 8 . Here the initial 0 is the 0th coordinate, and 7 is the 2nd coordinate.

Depending on the situation, we may interpret the same function by sequences of different length by adding some zeros to it. Say, the above function 𝑓 can be interpreted as the sequence f = ( 0 , 0 , 7 , 8 , 5 , 5 , 5 , 5 , 0 , 0 , 0 ) with three “new” coordinates f ( 8 ) = f ( 9 ) = f ( 10 ) = 0 . And the constant zero function f ( i ) = 0 may equally well be interpreted as f = ( 0 ) or, say, as f = ( 0 , 0 , 0 , 0 ) .

2.3 The Higman operations

Start by two specific subsets of ℰ,

Z = { ( 0 ) } , S = { ( n , n + 1 ) n Z } .

We are going to extensively use the following operations from [7]:

(H) ι , υ ; ρ , σ , τ , θ , ζ , π , ω m ( for each m = 1 , 2 , ) ,

which we call Higman operations on subsets of ℰ. The first two operations are binary functions, and for any subsets A , B of ℰ, they are defined as just the intersection ι ( A , B ) = A B and the union υ ( A , B ) = A B of those sets. This notation differs a little from the original notation ι A B and υ A B of [7] which in our case would cause confusion when used in long formulas together with other operations.

The other Higman operations are unary functions defined on any subset 𝒜 of ℰ as follows.

  • ρ ( A ) consists of all f E for which there is a g A such that f ( i ) = g ( i ) .

  • σ ( A ) consists of all f E for which there is a g A such that f ( i ) = g ( i 1 ) .

  • τ ( A ) consists of all f E for which there is a g A such that f ( 0 ) = g ( 1 ) , f ( 1 ) = g ( 0 ) and f ( i ) = g ( i ) for i 0 , 1 .

  • θ ( A ) consists of all f E for which there is a g A such that f ( i ) = g ( 2 i ) .

  • ζ ( A ) consists of all f E for which there is a g A such that f ( i ) = g ( i ) for i 0 .

  • π ( A ) consists of all f E for which there is a g A such that f ( i ) = g ( i ) for i 0 .

  • 𝜁 and 𝜋 are called liberations of 𝒜 in the sense that 𝜁liberates the sequences on 0: for every g A , it adds to our set 𝒜 all the functions 𝑓 which accept any value at 0, but which coincide with 𝑔 elsewhere. And 𝜋liberates the sequences on positive integers: for every g A , the operation 𝜋 adds to 𝒜 all the functions which accept any values at positive indices, but which coincide with 𝑔 on zero and on all negative indices.

For a fixed m = 1 , 2 , , the set ω m ( A ) consists of all f E for which, for every i Z , there is a g = t i = ( f ( m i ) , f ( m i + 1 ) , , f ( m i + m 1 ) ) A . This operation is called sequence building as it constructs the functions 𝑓 by means of some subsequences 𝑔 of length 𝑚 chosen from 𝒜. Since sup ( f ) is finite, either 𝒜 contains the zero function, or ω m ( A ) = .

We may agree to apply the unary Higman operations to individual functions also: a set A = { f } may consist of a single function 𝑓 only, so notations like ρ f , σ f , τ f , etc., should cause no confusion.

To get familiar with these operations, the reader may check examples and basic lemmas in [7, Section 2] or in [15, Section 2.2].

Following Higman [7], we denote by 𝒮 the set of all subsets of ℰ which can be obtained from 𝒵 and 𝒮 by any series of operations (H). The elements in 𝒮 play a key role in the study of recursively presented groups. One of our main tasks below is going to be the discovery of many “natural” generic types of subsets of ℰ inside 𝒮.

2.4 Extra auxiliary operations

Our proofs will be much simplified by some auxiliary operations, each of which is a combination of a few Higman operations on subsets 𝒜 of ℰ.

For a positive integer 𝑖, naturally denote by σ i A = σ σ A the result of application of 𝜎 for 𝑖 times. Set the inverse σ 1 = ρ σ ρ as follows: f σ 1 ( A ) when there is a g A such that f ( i ) = g ( i + 1 ) . This allows to define the negative powers of 𝜎. Setting σ 0 A = A , we have the powers σ i for any integer i Z . Clearly, σ i just “shifts” a sequence g A by | i | steps to the right or to the left depending on the sign of 𝑖.

It is easy to verify that σ i ζ σ i A consists of all functions f A in which the 𝑖-th coordinate is liberated. For briefness, denote ζ i = σ i ζ σ i . Moreover, for a finite subset S = { i 1 , , i m } Z , denote the result of application of ζ i 1 ζ i m by ζ i 1 , , i m or by ζ S . That is, ζ S A is the set of all those functions f E for which there is some g A such that f ( i ) = g ( i ) for each i S .

Denote by π A = ρ π ρ A the liberation of 𝒜 on all negative coordinates, i.e., the set of all functions f E for which there is some g A such that f ( i ) = g ( i ) for each i 0 . Denote by π i A = σ i π σ i A the liberation of 𝒜 on all coordinates after the 𝑖-th coordinate and, similarly, denote by π i A = σ i π σ i A the liberation of 𝒜 on all coordinates before the 𝑖-th coordinate. In this notation, the original Higman operation 𝜋 is nothing but π 0 .

For any integers k < l , set s = l k 1 . It is not hard to verify that the set τ k , l A = σ k ( τ σ ) s τ ( σ 1 τ ) s σ k A consists of all modified functions of 𝒜 with 𝑘-th and 𝑙-th coordinates “swapped”. More precisely, τ k , l A is the set of all functions f E for which there is some g A such that f ( k ) = g ( l ) , f ( l ) = g ( k ) and f ( i ) = g ( i ) for each i k , l . In this notation, the Higman operation 𝜏 is nothing but τ 0 , 1 .

Furthermore, since any permutation 𝛼 of a finite set 𝑆 has a transposition decomposition α = ( k 1 l 1 ) ( k m l m ) , we may introduce the set

α A = τ k 1 , l 1 τ k m , l m A

which can be obtained from 𝒜 by respective permutation of coordinates for all g A . Clearly, α A is the set of all functions 𝑓 for which there is a g A such that f ( i ) = g ( α 1 ( i ) ) for any i Z .

For any finite set of indices S = { i 1 , , i m } and for any A E , define the extract ϵ S A = ϵ i 1 , , i m A to be the 𝑚-tuples set { ( g ( i 1 ) , , g ( i m ) ) g A } . This operation can be constructed using (H) as follows. Assume i 1 < < i m for clarity, and denote S = { i 1 , i 1 + 1 , , i m 1 , i m } \ S (the set of all integers from i 1 to i m except those in 𝑆). The set A 1 = ζ S π i 1 π i m A consists of functions from 𝒜 with all coordinates outside 𝑆 liberated. And the set A 2 = ζ S Z consists of all functions which accept any integer values on S = { i 1 , , i m } and which are zero elsewhere. The intersection A 3 = ι ( A 1 , A 2 ) consists of those functions 𝑓 for which there is some g A such that f ( i ) = g ( i ) when i S , and f ( i ) = 0 elsewhere. To get ϵ S A from A 3 , it remains to apply the appropriate permutation 𝛼 that re-distributes the coordinates of f A 3 at the indices i 1 , , i m on the 0 , 1 , , m 1 (here 𝛼 is a permutation of the union { i 1 , , i m ; 0 , 1 , , m 1 } ).

For any subset A E , denote sup ( A ) = { sup ( f ) f A } . The point-wise sum f + g of any functions f , g E is defined as

( f + g ) ( n ) = f ( n ) + g ( n ) , n Z .

For any subsets A , B E , their sum A + B is the set { f + g f A , g B } . The sum of three or more sets is defined in the same manner. We are going to use this operation for cases when sup ( A ) and sup ( B ) are disjoint finite sets.

The intersection of any three or more subsets, such as A , B , C E , can be expressed by Higman operations as ι ( ι ( A , B ) , C ) . To have shorter notation, record this as ι 3 ( A , B , C ) . Similarly, define intersections ι n and unions υ n . In [7], Higman denotes the same by ι 2 A B C , but in our case, this would create confusion in long formulas with many operations.

Investigating the subsets of ℰ in 𝒮, in addition to standard operations (H), we may often use the introduced auxiliary operations. This will shorten the proofs without changing the actual set 𝒮, for we above have representation of each auxiliary operation via (H).

2.5 The benign subgroups

The concept of benign subgroups is the key group-theoretical notion used in [7] to connect the sets in 𝒮 with subgroups in free groups, needed in construction of embeddings into finitely presented groups. A subgroup 𝐻 in a finitely generated group 𝐺 is called a benign subgroup in 𝐺 if 𝐺 can be embedded in a finitely presented group 𝐾 with a finitely generated subgroup L K such that G L = H . For basic properties and examples of benign subgroups, we refer to [7, Section 3] or to [15, Sections 3.1 and 3.2].

Below, we reserve the letters K , L for these specific groups only. In particular, if we have K , L for an “old” group and then we construct a “new” group with a respective finitely presented overgroup and its finitely generated subgroup, we may again denote them by the same letters 𝐾 and 𝐿. Also, if we have two benign subgroups, say, H 1 and H 2 , we will denote the respective groups by K 1 , K 2 and L 1 , L 2 . The context will tell us for which benign subgroups they are being considered, and no misunderstanding will occur.

3 The main steps of embeddings of recursive groups

3.1 Embedding with “universal” words in a free group of rank 2

Any countable group 𝐺 is embeddable into a 2-generator group 𝑇 (see [8]). Higman’s embedding construction [7] starts by some effective embedding of 𝐺 into an appropriate 𝑇. In the recent note [16], we suggested a method of effective embedding of any countable group 𝐺 into a 2-generator group 𝑇 such that the defining relations of 𝑇 are straightforward to deduce from relations of 𝐺. In fact, the very first embedding construction [8] (based on free constructions) and some other embedding constructions (based on wreath products, group extensions, etc.) already allow finding the relations of 𝑇. However, we need a method that not only makes deduction of the relations of 𝑇 from those of 𝐺 an automated task, but also preserves certain pattern in them, as we will see a little later; see Remark 3.8.

Let a countable group 𝐺 be given as

G = F / R ¯ = A R = a 1 , a 2 , r 1 , r 2 , ,

where 𝐹 is a free group on a countable alphabet 𝐴 and where R ¯ = r 1 , r 2 , F is the normal closure of the set of all defining relations

r s ( a i s , 1 , , a i s , k s ) , s = 1 , 2 , ,

in 𝐹.

In the free group F 2 = b , c of rank 2, choose the words

(3.1) a i ( b , c ) = c ( b c i ) 2 b 1 ( c 1 ) b = b c i b 1 c i b 1 c b c i b c i b 2 c 1 b ,

i = 1 , 2 , . The map γ : a i a i ( b , c ) defines a correspondence

r s ( a i s , 1 , , a i s , k s ) r s ( b , c ) = r s ( a i s , 1 ( b , c ) , , a i s , k s ( b , c ) )

obtained by replacing each a i s , j in r s by the word a i s , j ( b , c ) , j = 1 , , k s . In fact, 𝛾 defines an embedding of 𝐺 into the 2-generator group

T = b , c r 1 ( b , c ) , r 2 ( b , c ) ,

given by the relations r s ( b , c ) , s = 1 , 2 , , on letters b , c (see [16, Theorem 1.1]). If 𝑅 is recursively enumerable, then the set R of all above relations r s ( b , c ) also is recursively enumerable. That is, 𝑇 is a recursive group, in case 𝐺 is.

And when 𝐺 is a torsion-free group, then (3.1) can be replaced by shorter words

(3.2) a ¯ i ( b , c ) = c ( b c i ) 2 b 1 = b c i b 1 c i b 1 c b c i b c i b 1 .

Inserting these a ¯ i ( b , c ) in r s , we get shorter words r s ′′ ( b , c ) . Then γ : a i a ¯ i ( b , c ) defines an embedding of 𝐺 into the 2-generator group

T = b , c r 1 ′′ ( b , c ) , r 2 ′′ ( b , c ) ,

(see [16, Theorem 3.2]).

Example 3.1

Let G = a 1 , a 2 , [ a k , a l ] , k , l = 1 , 2 , be the free abelian group Z of countable rank with relations r s = r k , l = [ a k , a l ] . Since 𝐺 is torsion-free, we can use the shorter formula (3.2) to map each a i respectively to a ¯ i ( b , c ) in order to get the embedding of 𝐺 into the 2-generator recursive group

T = b , c [ c ( b c k ) 2 b 1 , c ( b c l ) 2 b 1 ] , k , l = 1 , 2 , .

3.2 The main construction of the Higman embedding

For free generators a , b , c , fix the free group F 3 = a , b , c in addition to the above mentioned F 2 = b , c . Denote by b i the conjugate b c i for any i Z . Then, for each function f E define the product

b f = b 1 f ( 1 ) b 0 f ( 0 ) b 1 f ( 1 )

and the conjugate a f = a b f . Say, for f = ( 5 , 2 , 1 ) , we have

a f = a b 0 5 b 1 2 b 2 1 = c 2 b c b 2 c b 5 a b 5 c 1 b 2 c 1 b 1 c 2 .

For any subset ℬ of ℰ, introduce the subgroup A B = a f f B in F 3 . In particular, for the zero set B = Z , we get the subgroup

A Z = a f f = ( 0 ) = a ,

and for the set B = S , we get the subgroup

A S = a f f S = c 1 b ( n + 1 ) c b n a b n c 1 b n + 1 c n Z .

As is verified in [7, Lemma 4.4], A Z and A S are benign in F 3 , and the respective 𝐾, 𝐿 (check notation in Section 2.5) can easily be constructed for each of them.

The most part of [7] is occupied by proofs for [7, Theorems 3 and 4] which set up the environment in which recursion is studied by group-theoretical means. By [7, Theorem 4], a set ℬ is recursively enumerable in ℰ if and only if A B is benign in F 3 , and by [7, Theorem 3], ℬ is recursively enumerable in ℰ if and only if it belongs to 𝒮, i.e., it can be constructed from the basic sets 𝒵 and 𝒮 using the Higman operations (H). This means we can start from benign subgroups A Z and A S , and as ℬ is being built from 𝒵 and 𝒮 by some series of operations (H), the benign subgroup A B is being constructed step by step. Note that, after Section 2.4, we are free to also use the new auxiliary operations we suggested there.

Each relation r s we constructed in Section 3.1 for our recursive 2-generator group T = b , c R can be written as

r s ( b , c ) = b n 0 c n 1 b n 2 m c n 2 m + 1 for some m = m ( s ) ,

and this presentation will be unique if we also require n 1 , , n 2 m 0 . Thus, r s can be “coded” by the sequence of exponents f s = ( n 0 , n 1 , , n 2 m + 1 ) , and the elements b f = b f s and a f = a f s can be defined for these particular f = f s . Say, for b 3 c b 1 c 2 , we have f = ( 3 , 1 , 1 , 2 ) and

b f = b 0 3 b 1 b 2 1 b 3 2 with a f = a b 0 3 b 1 b 2 1 b 3 2 .

The set B = { f 1 , f 2 , } of all such sequences clearly is a subset of ℰ, and we can define the respective subgroup A B = a f f B = a f s s = 1 , 2 , in F 3 . As we mentioned above, A B is benign in F 3 if and only if ℬ can be constructed from the basic sets 𝒵 and 𝒮 using the Higman operations. This launches the following massive procedure in [7]: the set ℬ is written as an output of a series of operations (H) started from 𝒵 and 𝒮. For each step, one of the following actions may be taken.

  1. B 1 , B 2 are already given, and B 3 is obtained from them by any of the binary Higman operations ι , υ . Also given are the respective benign subgroups A B 1 , A B 2 in F 3 , together with the respective groups K 1 , K 2 and L 1 , L 2 (see the remark about notation in Section 2.5). Then A B 3 is also benign and can construct the respective K 3 and L 3 .

  2. B 1 is already given, and B 2 is obtained from it by any of the unary Higman operations ρ , σ , τ , θ , ζ , π , ω m for m = 1 , 2 , . Also given are the respective benign subgroup A B 1 in F 3 , together with the respective groups K 1 and L 1 . Then A B 2 is also benign, and we have a mechanism allowing us to construct the K 2 and L 2 .

This procedure eventually outputs our sequences set ℬ together with A B , with the respective group 𝐾 and its subgroup 𝐿.

If, for a group 𝐺 (or for groups of a given generic type), we are able to explicitly write the set ℬ and are able to tell how ℬ can be extracted from 𝒵 and 𝒮 by operations (H), then we have an embedding of F 3 into a finitely presented group 𝐾 with a finitely generated group 𝐿 such that F 3 L = A B .

The final part of the Higman embedding is far shorter. By the proofs of [7, Lemmas 5.1 and 5.2], the normal closure R ¯ = R F 2 is benign in F 2 if and only if A B is benign in F 3 . The proofs of these lemmas also provide the finitely presented group 𝐾 with a finitely generated subgroup 𝐿 such that 𝐾 embeds F 2 , and also F 2 L = R ¯ . Then “the Higman Rope Trick” (see the end of [7, Section 5], [12, p. 219] or [22]) uses these 𝐾 and 𝐿 to embed T = b , c R , and thus also 𝐺, into a finitely presented group using a free product with amalgamation and an HNN-extension.

That is, if we are able to explicitly write ℬ by the operations (H), then we can construct the explicit embedding of 𝐺 into a finitely presented group. This is what we are going to do in the rest of this article.

3.3 Examples, the structure of sequences in ℬ

Let us continue Example 3.1 by applying the constructions from the previous section for the group Z .

Example 3.2

The group 𝑇 in Example 3.1 has the relations

r s ′′ ( b , c ) = r k , l ′′ ( b , c ) = [ c ( b c k ) 2 b 1 , c ( b c l ) 2 b 1 ] = b c k b 1 c k b 1 c 1 b c k b c k l b 1 c l b 1 c 1 b c l b c l k b 1 c k b 1 c b c k b c k l b 1 c l b 1 c b c l b c l b 1 ,

k , l = 1 , 2 , . The respective sequence in ℰ is

f s = f k , l = ( 1 , k , 1 , k , 1 , 1 , 1 , k , 1 , k l , 1 , l , 1 , 1 , 1 , l , 1 , l k , 1 , k , 1 , 1 , 1 , k , 1 , k l , 1 , l , 1 , 1 , 1 , l , 1 , l , 1 ) .

As we see, each f k , l is a sequence of length 35 mostly filled by eleven entries 1 and by eleven entries −1, with the following exceptions only: two entries are 𝑘; three entries are k ; three entries are 𝑙; two entries are l ; two entries are k l ; one entry is l k (the case with k = l is not an exception, as a k commutes with itself, and we will just have some coordinates k k = 0 in the sequence above). Denote the respective set of sequences as B = { f k , l , k , l = 1 , 2 , } .

Can this ℬ be constructed by a series of operations (H)? For now let us just simplify this question, postponing the full answer to Example 4.11. As we saw in Section 2.4, if 𝛼 is any permutation of sup ( B ) , then ℬ belongs to 𝒮 if and only if α B belongs to 𝒮. In our case, sup ( B ) is in the set { 0 , 1 , , 34 } of all 35 indices. It is trivial to find the permutation

α = ( 0 ) ( 1 24 7 22 6 ) ( 2 11 30 9 32 10 14 3 25 33 29 8 ) ( 4 12 15 27 31 28 20 18 17 34 21 5 13 16 ) ( 19 26 ) ( 23 )

(we write the cycles of length 1 also) that reorders the indices so that all the similar coordinates in f k , l are grouped, i.e., α f k , l starts by 1 repeated eleven times, followed by −1 repeated eleven times, then followed by two times 𝑘, etc.,

(3.3) α f k , l = ( 11 × 1 , 11 × 1 , 2 × k , 3 × k , 3 × l , 2 × l , 2 × ( k l ) , l k ) ,

where 11 × 1 naturally means 1 repeated eleven times, etc. …

Remark 3.3

The above trick will be used below repeatedly: applying a permutation 𝛼, we may transform the set ℬ to such an α B in which coordinates are grouped in the manner of (3.3). It is simpler to work with such an appropriately permuted set α B keeping in mind that ℬ belongs to 𝒮 if and only if α B belongs to 𝒮, as we saw in Section 2.4.

Example 3.4

Let

G = a 1 , a 2 , | [ [ a k , a l ] , [ a u , a v ] ] , k , l , u , v = 1 , 2 ,

be the free metabelian group F ( M ) of countable rank in the variety of all metabelian groups 𝔐. It is easy to deduce that this torsion-free group can be embedded into the 2-generator group

T = b , c | [ [ c ( b c k ) 2 b 1 , c ( b c l ) 2 b 1 ] , [ c ( b c u ) 2 b 1 , c ( b c v ) 2 b 1 ] ] , k , l , u , v = 1 , 2 , .

Then the respective appropriately permuted sequences (see the previous remark) will be

α f k , l , u , v = ( 40 × 1 , 49 × 1 , 6 × k , 7 × k , 6 × l , 6 × l , 7 × u , 6 × u , 6 × v , 6 × v , l k , l u , v u , v l , k l , k v , u v )

(we omit the routine calculations).

Example 3.5

The additive group of rational numbers ℚ has a presentation

a 1 , a 2 , a s s = a s 1 , s = 2 , 3 , ,

where a generator a i corresponds to the fraction 1 i ! with i = 2 , 3 , (see [9]). In [16, Example 3.5], we gave the embedding of ℚ into the 2-generator group

T = b , c ( c s ) ( b c s ) 2 b 1 ( c 1 ) ( b c s 1 ) 2 b 1 , s = 2 , 3 , = b , c ( c s ) b c s b c ( c 1 ) b c s 1 b , s = 2 , 3 , .

The respective appropriately permuted sequences (see Remark 3.3) then are

α f s = ( 6 × 1 , 6 × 1 , 2 × s , 2 × s , 1 s , 2 × ( s 1 ) ) ,

or a little but shorter variant

α f s = ( 5 × 1 , 6 × 1 , 2 × s , s , 1 s , s 1 ) ,

s = 2 , 3 , (the omitted calculations are easy to verify).

Remark 3.6

In 1999, Bridson and de la Harpe posed in the Kourovka notebook [11, Problem 14.10] in which they grouped a few questions as a “well-known problem”. The questions mainly concern explicit embeddings of some countable groups into finitely generated or finitely presented groups. In particular, one of the points of [11, Problem 14.10 (a)] asks to find an explicit embedding of ℚ into a “natural” finitely presented group.

As the main steps outlined in Section 3 show, we are able to explicitly embed a recursive group 𝐺 into a finitely presented group, as soon as we have the explicit embedding of 𝐺 into the respective 2-generator group T = T G , have the set ℬ of integer sequences corresponding to defining relations of T G and also are able to construct ℬ from the sets 𝒵 and from 𝒮 using the Higman operations (H). Example 3.5 directly provides 𝑇 for ℚ, and it gives ℬ by means of α f s .

The 𝐻-machine of Section 4 shows how to easily write down the operations (H) if we know ℬ. That is, a group answering [11, Problem 14.10] of Bridson and de la Harpe can be constructed by a series of free constructions matching to the series of Higman operations. Of course, the question is if that group can be called a “natural” finitely presented group ….

Recently, a direct solution to the problem of Bridson and de la Harpe was found by Belk, Hyde and Matucci in [3]. Moreover, one of the remarkable finitely presented groups constructed by them is the group T A which is 2-generator and also simple [3].

Example 3.7

The quasicyclic Prüfer 𝑝-group G = C p can be presented as

G = a 1 , a 2 , a 1 p , a s + 1 p = a s , s = 1 , 2 , ,

where each a i corresponds to the primitive ( p i ) -th root ε i of unity [10]. As we found in [16, Example 3.6], this group can be embedded into the 2-generator group

T = b , c | ( c ( b c ) 2 b 1 ( c 1 ) b ) p , ( c ( b c s + 1 ) 2 b 1 ( c 1 ) b ) p c b ( c 1 ) ( b c s ) 2 b 1 , s = 1 , 2 , .

From the first single relation, we get the appropriately permuted sequence (see Remark 3.3)

α f 0 = ( ( 5 p + 2 ) × 1 , 5 p × 1 , ( p 1 ) × 2 , p × 2 ) .

And from the remaining relations, we get the respective appropriately permuted sequences

α f s = ( ( 3 p + 4 ) × 1 , ( 3 p + 3 ) × 1 , s , s , p × ( s + 1 ) , p × ( s 1 ) ) ,

s = 2 , 3 , (the calculations are omitted). Clearly, α α .

Examples similar to Example 3.2 and Example 3.4 are easy to construct for free soluble groups, for free nilpotent groups and, more generally, for other types of groups defined by commutator-based identities.

Further, since any divisible abelian group is a direct product of copies of ℚ and of some C p , it is not hard to use Example 3.5 and Example 3.7 to get sequences of similar formats for them also. Moreover, every abelian group is a subgroup in an abelian divisible group, so we get similar sequences for embeddings of any countable abelian group (provided that its embedding into a countable divisible abelian group is constructively, effectively given).

Remark 3.8

We could continue to collect examples with the same features, but it already seems to be clear that there are numerous groups for which the respective sequence sets have a similar “format”.

  1. Some coordinates in them have a fixed value (or one of pre-given fixed values). Say, the initial 0th coordinate is equal to 1 in each sequence α f k , l in Example 3.2.

  2. Some coordinates can accept any integer values 𝑘, like the 22nd coordinate 𝑘 in the sequence α f k , l .

  3. Some coordinates are duplicates of certain other coordinates. Say, the 1st, 2nd, …, 10th coordinates in α f k , l all are the duplicates of the 0th coordinate 1. And also the 23rd coordinate 𝑘 is the duplicate of the 22nd coordinate 𝑘.

  4. Some coordinates are the opposites of certain other coordinates. Say, the 11th coordinate −1 in α f k , l is the opposite of the 10th coordinate 1. Also, the 27th coordinate k is the opposite of the 26th coordinate 𝑘.

  5. And some coordinates are obtained from other coordinates by arithmetical operations. Say, the 33rd coordinate k l in α f k , l is the difference of the 22nd coordinate 𝑘 and of the 28th coordinate 𝑙.

As we see now, construction of a set B S by operations (H) in many cases can be reduced to the following question: can we build a “machine” which constructs ℬ by performing the five operations listed above, i.e., by assigning fixed pre-given values to some coordinates, then copying those values to other coordinates, then assigning the opposites, the sums or differences of those values to some other coordinates? If yes, then constructive Higman embeddings are available for the considered types of groups.

In the next section, we will step by step collect a positive answer to this question. The reader may skip to Example 4.11 to see an application of the method.

4 The 𝐻-machine

This is the main section of this note, and its objective is to show that 𝒮 contains some general kinds of subsets of ℰ which can be constructed by generic operations outlined in Remark 3.8. The reader not interested in the routine of proofs may skip the details below.

4.1 Construction of sum of subsets with disjoint supports

For definition of the sum of subsets from 𝒮 and of other auxiliary operations, we refer to Section 2.4.

Lemma 4.1

If the sets B k , k = 1 , , m , all belong to 𝒮 and their supports S k = sup ( B k ) are finite pairwise disjoint sets, then the sum B 1 + + B m also belongs to 𝒮.

Proof

The set B 1 * = ( ζ S 2 ζ S m ) B 1 clearly consists of all functions from B 1 with all coordinates from S 2 , , S m liberated. This can be achieved by applying some operations ζ i for finitely many times, so B 1 * belongs to 𝒮. In a similar way, we define the sets B 2 * , , B m * in 𝒮. It is easy to see that

B 1 + + B m = ι m ( B 1 * , , B m * ) .

The analog of this lemma could be proved for the case of infinite supports, but we restrict to this case for simplicity.

4.2 Construction of ( n ) with restrictions on 𝑛

Denote by B + = { ( n ) n = 1 , 2 , } the set of all functions with a single positive coordinate, and by B = { ( n ) n = 1 , 2 , } the set of all functions with a single negative coordinate. Their union B ± = { ( n ) n Z \ { 0 } } is the set of all functions with a single non-zero coordinate.

Lemma 4.2

The sets B + , B and B ± belong to 𝒮.

Proof

A 1 = ω 2 υ ( ζ 1 Z , τ S ) clearly consists of functions 𝑔 in which, for every i Z , the subsequence t i = ( g ( 2 i ) , g ( 2 i + 1 ) ) is either of type ( 0 , n ) or of type ( n , n 1 ) , with n Z . For any even n = 2 , 4 , , we can apply ω 2 to the pairs

( n , n 1 ) , ( n 2 , n 3 ) , , ( 2 , 1 ) τ S

to construct in A 1 the sequence g = ( n , n 1 , , 1 ) . The sequence

g = ( 0 , n , n 1 , , 1 , 0 )

can be built by the pair ( 0 , n ) ζ 1 Z and the pairs

( n 1 , n 2 ) , , ( 3 , 2 ) , ( 1 , 0 ) τ S .

Clearly, σ 1 g = g , and so g A 2 = ι ( A 1 , σ 1 A 1 ) . In a similar manner, we discover in A 2 all the functions g = ( n , n 1 , , 1 ) for odd n = 1 , 3 , . This time, 𝑔 is constructed by the pairs ( n , n 1 ) , ( n 2 , n 3 ) , , ( 1 , 0 ) τ S , and g can be built by ( 0 , n ) ζ 1 Z with ( n 1 , n 2 ) , , ( 2 , 1 ) τ S . Thus, for any n = 1 , 2 , , the set A 2 contains a function 𝑔 with the property g ( 0 ) = n .

Let us show that g ( i ) < 0 is impossible for any g A 2 . Assuming the contrary, suppose the least coordinate g ( k ) < 0 of 𝑔 is achieved at some index 𝑘. If 𝑘 is even, then the pair ( g ( k ) , g ( k + 1 ) ) in g A 1 has to be either of type ( n , n 1 ) τ S (which is impossible as g ( k 1 ) g ( k ) ) or of type ( 0 , n ) ζ 1 Z (which is impossible as g ( k ) = 0 0 ). If 𝑘 is odd, then the pair ( g ( k ) , g ( k + 1 ) ) in g σ 1 A 1 has to be either of type σ 1 ( n , n 1 ) or of type σ 1 ( 0 , n ) (which both again are impossible).

Next let us exclude those functions g A 2 for which g ( 0 ) = 0 . Clearly, we have that A 3 = π 1 π τ S is the set of all those functions from ℰ which coincide with ( n , n 1 ) on indices 0 , 1 and which may have any coordinates elsewhere. Then g ( 0 ) > 0 for each g ι ( A 2 , A 3 ) , and the extract ϵ 0 ι ( A 2 , A 3 ) is the set B + .

In a similar way, we can construct B . And the union of the above is

B ± = υ ( B + , B ) .

The reader may compare the above proof with the argument of [7, Lemma 2.1].

Let B k + or B k denote the set of all ( n ) for which n > k or n < k , respectively.

Lemma 4.3

For any integers k Z the sets B k + and B k belong to 𝒮.

Proof

The set D 1 = ι ( τ S , ζ σ B + ) consists of all pairs ( n + 1 , n ) for n = 1 , 2 , . Then B 1 + is the extract ϵ 0 D 1 . By induction, we construct in 𝒮 the set

D k = ι ( τ S , ζ σ B ( k 1 ) + ) ,

and the extract B k + = ϵ 0 D k . The case of B k is discussed analogously. ∎

For an integer n Z , denote by N n the set { ( n ) } consisting of a single sequence ( n ) of length 1. More generally, denote N n 1 , , n k = { ( n 1 ) , , ( n k ) } the set consisting of 𝑘 functions of the above type.

Lemma 4.4

For any fixed integers n 1 , n 2 , , n k Z , the set N n 1 , , n k belongs to 𝒮.

Proof

It is clear that N 1 = { ( 1 ) } is in 𝒮, for τ S = { ( n + 1 , n ) n Z } , and so N 1 = ι ( τ S , ζ Z ) consists of ( 0 + 1 , 0 ) = ( 1 , 0 ) = ( 1 ) only. Similarly, we have that N 2 = { ( 2 ) } is in 𝒮 because N 2 = ϵ 0 ι ( τ S , ζ σ N 1 ) . By induction, we construct all the N 3 , N 4 , . The sets N 1 , N 2 , can be obtained in a similar way. Finally, N 0 = { ( 0 ) } = Z . Taking the union of the required one-element sets { ( n 1 ) } , , { ( n k ) } , we finish the proof. ∎

4.3 Duplication of the last term

Let B S be any set of functions 𝑔 which are zero after the 𝑘-th coordinate, i.e., g ( i ) = 0 for each i > k . Then, by Higman operations, we can “duplicate” the 𝑘-th coordinate in all g B . More precisely, for each g B , let g be defined as g ( i ) = g ( i ) for all i k + 1 , g ( k + 1 ) = g ( k ) . In this notation, define B k , k = { g g B } .

Lemma 4.5

Let B S be a set of functions 𝑔 which are zero after the 𝑘-th coordinate. Then the set B k , k also belongs to 𝒮.

Proof

For simpler notation, assume k = 0 as the general case can be reduced to this by shifting ℬ by σ k , and then shifting back by σ k after duplication of the 0th coordinate.

Denote by F 1 the set of all functions from ℬ with the 1st and 2nd coordinates liberated, i.e., F 1 = ζ 1 , 2 B . Let F 2 be the set of all functions g E in which g ( 1 ) = g ( 0 ) + 1 , and the 2nd coordinate together with all the negative coordinates are liberated, i.e., F 2 = π ζ 2 S . Let F 3 be the set of all functions 𝑔 in which g ( 2 ) = g ( 1 ) 1 , and the 0th coordinate together with all the negative coordinates are liberated, i.e., F 3 = π ζ σ τ S = π 1 σ τ S . Then the 2nd and 0th coordinates of each function from F 4 = ι 3 ( F 1 , F 2 , F 3 ) are equal.

To get the duplicated set B 0 , 0 it remains to swap the 2nd and 1st coordinates in F 4 , and then to erase the new 2nd coordinates. Namely, set F 5 = ζ 2 τ 1 , 2 F 4 and F 6 = π 2 Z , and take the intersection B 0 , 0 = ι ( F 5 , F 6 ) . ∎

4.4 Construction of the pairs ( n , n )

Denote by B + , = { ( n , n ) n = 1 , 2 , } the set of all couples ( n , n ) with n = 1 , 2 , . The objective of this section is to prove the following lemma.

Lemma 4.6

The set B + belongs to 𝒮.

Our proof will follow from a series of steps, cases, examples below.

The set L 1 = ζ 2 , 3 Z can be interpreted as the set of all 4-tuples

(4.1) ( 0 , 0 , m , n )

with m , n Z . Next C 1 = τ 1 , 2 τ S can be interpreted as the set of all 4-tuples

( m , 0 , m 1 , 0 ) ,

while C 2 = τ 1 , 2 σ 2 S can be interpreted as the set of all 4-tuples

( 0 , n , 0 , n + 1 ) .

Then the sum L 2 = C 1 + C 2 is the set of all 4-tuples

(4.2) ( m , n , m 1 , n + 1 ) .

The set L 3 = ω 4 υ ( L 1 , L 2 ) consists of g E in which, for every i Z , the subsequence

(4.3) t i = ( g ( 4 i ) , g ( 4 i + 1 ) , g ( 4 i + 2 ) , g ( 4 i + 3 ) )

is of type (4.1) or of type (4.2) (not ruling out the zero 4-tuple which is of type (4.1) for m = n = 0 ). Define a set M = ι ( L 3 , σ 2 L 3 ) .

Step 1. Start by showing that if g M , then g ( k ) 0 for any k = 4 i , 4 i + 2 with i Z . Assume the contrary: m = g ( k ) < 0 for some 𝑘 of one of the above types.

If k = 4 i , i.e., 𝑚 is the initial term of the 4-tuple t i in (4.3), then t i is of type (4.2) because the tuples of type (4.1) have to start by a zero. Thus we have g ( 4 i + 2 ) = m 1 < 0 .

Next assume k = 4 i + 2 . As g σ 2 L 3 , there exists a g L 3 such that σ 2 g = g . Then g ( 4 ( i + 1 ) ) = g ( 4 i + 2 + 2 ) = g ( 4 i + 2 ) = m , i.e., the next 4-tuple of g also starts by negative number 𝑚 and has to be of type (4.2). But then g ( 4 ( i + 1 ) + 2 ) = m 1 , and so g ( 4 i + 2 + 2 ) = g ( 4 ( i + 1 ) ) = m 1 < 0 , i.e., the ( i + 1 ) -th sequence t i + 1 in 𝑔 starts by m 1 .

We got that, for any k = 4 i and k = 4 i + 2 , from g ( k ) < 0 , it follows that g ( k + 2 ) < 0 , g ( k + 4 ) < 0 , etc. because g ( k + 2 ) = m 1 , g ( k + 4 ) = m 2 , etc. This leads to a contradiction as g E cannot have infinitely many non-zero coordinates.

In a similar way, we show that g ( k ) 0 for any k = 4 i + 1 , 4 i + 3 for i Z .

Example 4.7

Consider two functions g M of above types. First, the function

(4.4) g = ( 4 , 4 , 3 , 3 ; 2 , 2 , 1 , 1 )

is constructed by two 4-tuples of type (4.2), and it can be presented as g = σ 2 g for

g = ( 0 , 0 , 4 , 4 ; 3 , 3 , 2 , 2 ; 1 , 1 , 0 , 0 )

which is constructed by one 4-tuple of type (4.1) and two 4-tuples of type (4.2).

Next consider another function

(4.5) g = ( 0 , 0 , 4 , 4 ; 3 , 3 , 2 , 2 ; 1 , 1 , 0 , 0 )

constructed by one 4-tuple of type (4.1) and two 4-tuples of type (4.2), and this 𝑔 can be presented as g = σ 2 g for the function

g = ( 0 , 0 , 0 , 0 ; 4 , 4 , 3 , 3 ; 2 , 2 , 1 , 1 )

which is constructed by two 4-tuples of type (4.2) (and the zero 4-tuples of course).

Observe that, in these two functions, we took 4 and −4 to be the opposites of each other, ignoring the case of a tuple, say, ( 4 , 0 , 5 , 0 ) . We will cover that issue later.

Step 2. We see that, from any positive g ( k ) , a chain of positive, descending coordinates g ( k ) , g ( k + 2 ) , g ( k + 4 ) , starts for k = 4 i or k = 4 i + 2 . How may this chain end?

Case 2.1. The chain achieves 1 (its last positive coordinate) at some index 4 j , i.e., in the first half of some 4-tuple t j , like in (4.5); then the term g ( 4 j + 2 ) automatically is 1 1 = 0 . Starting from the term g ( 4 j + 4 ) in t j + 1 , we may have either zeros, or a new chain may begin from there.

Case 2.2. The chain achieves 1 at some index 4 j + 2 , i.e., in the second half of some 4-tuple t j , like in (4.4). Then the next term g ( 4 j + 2 + 2 ) = g ( 4 ( j + 1 ) ) (which is 0 and which lies in the next tuple t j + 1 ) may have two potential ways to occur: either the next tuple is of type (4.1), i.e., it starts by two zeros, and after them, we may have either zeros, or a new chain may begin there; or the next tuple is of type (4.2) with an initial term g ( 4 ( j + 1 ) ) = 0 . But then the ( 4 ( j + 1 ) + 2 ) -th term of that tuple has to be 0 1 = 1 . Since negative values are ruled out for such coordinates, that is impossible.

The analogs of these arguments hold for negative, ascending chains

g ( k ) , g ( k + 2 ) , g ( k + 4 ) ,

starting at some g ( k ) for a k = 4 i + 1 or k = 4 i + 3 . Namely, the last negative term −1 of such a term is achieved.

Case 2.3. Either at some 4 j + 1 , i.e., in the first half of some 4-tuple, like in (4.4); then the next term g ( 4 j + 3 ) automatically is 1 1 = 0 .

Case 2.4. Or −1 is achieved at some index 4 j + 3 , i.e., in the second half of some 4-tuple, like in (4.5). Then the next tuple may be of type (4.1) only, i.e., it starts by two zeros.

Step 3. The key feature of this construction is that the two chains we discuss (the ascending and the descending chains residing inside some consecutive 4-tuples) terminate simultaneously, i.e., the last 4-tuple t j either ends by ( 1 , 1 ) (i.e., t j = ( 2 , 2 , 1 , 1 ) or t j = ( 0 , 0 , 1 , 1 ) ), or t j = ( 1 , 1 , 0 , 0 ) . Assume the contrary, and arrive to contradiction in all cases occurring.

Case 3.1. Assume t j ends by ( m , 1 ) for an m 2 . Then, by Case 2.2 above, the next 4-tuple t j + 1 need start with two zeros. We get a contradiction because m 1 0 .

Case 3.2. Assume t j ends by ( 0 , 1 ) (that is, m = 0 in terms of the previous case). Since g = σ 2 g L 3 , the ( j + 1 ) -th 4-tuple in g starts by ( 0 , 1 ) . Then that 4-tuple in g is of type (4.2), i.e., it ends by ( 0 1 , 1 + 1 ) = ( 1 , 0 ) . So t j + 1 in 𝑔 starts by ( 1 , 0 ) , which is a contradiction as g ( 4 ( j + 1 ) ) = 1 cannot be negative.

Case 3.3. Assume the last 4-tuple t j is ( m , 1 , 0 , 0 ) with m 2 or m = 0 . Since 1 0 , then t j is of type (4.2). Then its 2nd term is m 1 , which is impossible as m 1 0 .

We get that, whenever a g M contains a couple ( m , n ) with a positive 𝑚 and a negative 𝑛, we have n = m (see the remark at the end of Example 4.7). In particular, if, for some g M , we have g ( 0 ) > 0 and g ( 2 ) < 0 , then g ( 2 ) = g ( 2 ) . Clearly, for any positive 𝑛, we can build a g M with g ( 0 ) = n and g ( 2 ) = n .

Step 4. Denote by C 3 = π 2 π M the set of all functions g E which coincide with some ( n , n ) with n = 0 , 1 , and which have any coordinates elsewhere. Then C 4 = B + + σ B can be interpreted as the set of all couples ( m , n ) with positive 𝑚 and negative 𝑛, and B + , = ι ( C 3 , C 4 ) is the set of all couples ( n , n ) with n = 1 , 2 , .

Thus, Lemma 4.6 is fully argued.

If needed, we can easily get the analogs of Lemma 4.6 not only for the couples ( n , n ) for all n = 1 , 2 , but for, say, n = k , k + 1 , , or for 𝑛 from a given finite set only.

4.5 Construction of the triples ( p , q , p q ) and ( p , q , p + q )

Assume the set 𝒫 consists of some pairs ( p , q ) . In this section, we show that if 𝒫 belongs to 𝒮, then the set consisting of all triples ( p , q , p q ) and the set consisting of all triples ( p , q , p + q ) also belong to 𝒮.

For a fixed pair ( p , q ) , denote by P 1 the set of 8-tuples of the following types:

(4.6) ( p , q , q , 0 , 0 , 0 , 0 , 0 ) ,
(4.7) ( 0 , 0 , 0 , 0 , p , q , p , n ) ,
(4.8) ( p , q , m , n , p , q , m 1 , n 1 ) ,
(4.9) ( p , q , m , n , p , q , m + 1 , n + 1 )
for any m , n Z , together with the zero function which we can interpret as the 8-tuple ( 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 ) .

The set of 8-tuples of type (4.6) is in 𝒮 since we can apply Lemma 4.5 to couples ( p , q ) to duplicate the coordinate 𝑞. Similarly, the set of 8-tuples of type (4.7) is also in 𝒮. The 8-tuples of type (4.8) can be obtained as follows: the set of all 8-tuples of type ( 0 , 0 , m , n , 0 , 0 , m 1 , n 1 ) can be obtained using a permutation 𝛼 of the set σ 2 τ S + σ 3 τ S . Then we take the sum of that set and the set of all 8-tuples ( p , q , 0 , 0 , p , q , 0 , 0 ) . The case of 8-tuples of types (4.9) is covered in a similar way. This means the combined set P 1 of all8-tuples of types (4.6)–(4.9) is in 𝒮.

Thus, the intersection P 2 = ι ( P 1 , σ 4 P 1 ) also is in 𝒮. Using Higman operations on P 2 , we can construct ( p , q , p q ) . Let us first explain the idea by simple examples.

Example 4.8

Let p = 6 and q = 2 . The sequence

g = ( 6 , 2 , 6 , 4 , 6 , 2 , 5 , 3 ; 6 , 2 , 4 , 2 , 6 , 2 , 3 , 1 ; 6 , 2 , 2 , 0 , 0 , 0 , 0 , 0 )

is constructed by two 8-tuples of type (4.8) and by one 8-tuple of type (4.6). And 𝑔 can be presented as g = σ 4 g for

g = ( 0 , 0 , 0 , 0 , 6 , 2 , 6 , 4 ; 6 , 2 , 5 , 3 , 6 , 2 , 4 , 2 ; 6 , 2 , 3 , 1 , 6 , 2 , 2 , 0 )

which is constructed by one 8-tuple type (4.7) and two 8-tuples of type (4.8). Note that the 3rd coordinate in 𝑔 is p q = 6 2 = 4 .

Yet another function

g = ( 0 , 0 , 0 , 0 , 6 , 2 , 6 , 4 ; 6 , 2 , 5 , 3 , 6 , 2 , 4 , 2 ; 6 , 2 , 3 , 1 , 6 , 2 , 2 , 0 )

is constructed by one 8-tuple of type (4.7) and by two 8-tuples of type (4.8). And 𝑔 can be presented as g = σ 4 g for

g = ( 0 , 0 , 0 , 0 , 0 , 0 , 0 , 0 ; 6 , 2 , 6 , 4 , 6 , 2 , 5 , 3 ; 6 , 2 , 4 , 2 , 6 , 2 , 3 , 1 ; 6 , 2 , 2 , 0 , 0 , 0 , 0 , 0 )

which is constructed by two 8-tuples of type (4.8) and one 8-tuple of type (4.6) (and the zero sequences of course). Note that the 11th coordinate in 𝑔 is

p q = 6 2 = 4 .

As we see, using Higman operations, it is easy to obtain the triple ( 6 , 2 , 4 ) from any of the functions 𝑔 constructed above. Using some loose wording, we could say that we “mimic” the arithmetical operation 6 2 = 4 by means of Higman operations (in the sense that we were able to build the triple ( 6 , 2 , 6 2 ) ). We did this using some descending chains of coordinates (at indices 4 k + 2 , 4 k + 6 , ) starting by 6 and ending by 2.

The purpose of the numbers 6, 2 standing at some indices 8 k , 8 k + 1 or 8 k + 4 , 8 k + 5 is the following. Besides the pair ( 6 , 2 ) , our set 𝒫 may also contain another pair, say, ( 9 , 1 ) . We want to construct in 𝒫 the triple ( 6 , 2 , 4 ) without adding the unnecessary triple ( 6 , 1 , 5 ) into 𝒫. That is, we need a descending chain starting by 6 and ending by 2 (but not by 1). So those numbers 6 , 2 guarantee that we concatenate 8-tuple corresponding to the same pair ( 6 , 2 ) only.

Observe that p q in each of above examples. When p < q , then we could build ascending chains using 8-tuples of type 4.9. Say, if p = 3 and q = 9 , the sequence

g = ( 3 , 9 , 3 , 6 , 3 , 9 , 4 , 5 ; 3 , 9 , 5 , 4 , 3 , 9 , 6 , 3 ; 3 , 9 , 7 , 2 , 3 , 9 , 8 , 1 ; 3 , 9 , 9 , 0 , 0 , 0 , 0 , 0 )

is constructed by three 8-tuples of type (4.9) and by one 6-tuple of type (4.6). And 𝑔 can be presented as g = σ 4 g for the function

g = ( 0 , 0 , 0 , 0 , 3 , 9 , 3 , 6 ; 3 , 9 , 4 , 5 , 3 , 9 , 5 , 4 ; 3 , 9 , 6 , 3 , 3 , 9 , 7 , 2 ; 3 , 9 , 8 , 1 , 3 , 9 , 9 , 0 )

which is constructed by one 8-tuple of type (4.7) and three 8-tuples of type (4.9). Note that the 3rd coordinate in 𝑔 is p q = 3 9 = 6 .

After these examples, the formal proofs are simpler to understand. Assume a pair ( p , q ) is chosen and 𝑔 is any non-zero function in P 2 . Since g E , there is a first8-tuple

t i = ( g ( 8 i ) , g ( 8 i + 1 ) , g ( 8 i + 2 ) , g ( 8 i + 3 ) , g ( 8 i + 4 ) , g ( 8 i + 5 ) , g ( 8 i + 6 ) , g ( 8 i + 7 ) )

in which 𝑔 has its first non-zero coordinate. Using arguments similar to those in Section 4.4, we show that if t i is of type (4.8), then a descending chain of coordinates g ( 8 i + 2 ) , g ( 8 i + 6 ) , g ( 8 i + 10 ) , starts from t i . If p < q , then this chain never ends, which is a contradiction to the fact that g E has finitely many non-zero coordinates. If p q , then this chain ends either by the 8-tuple ( p , q , q , 0 , 0 , 0 , 0 , 0 ) of type (4.6), or by the 8-tuple ( p , q , q + 1 , 1 , p , q , q , 0 ) of type (4.8). This means that g ( 8 i + 2 ) is equal to p q .

If t i is of type (4.9), then an ascending chain of coordinates starts from t i . If p > q , we get a contradiction, and if p q , we again get that g ( 8 i + 2 ) is equal to p q .

Finally, if t i is of type (4.7), we get a descending or ascending chain, and then g ( 8 i + 6 ) is equal to p q .

The “extremal” case when t i = ( p , q , q , 0 , 0 , 0 , 0 , 0 ) is of type (4.6) for a 𝑔 is possible only if the respective g either starts by ( 0 , 0 , 0 , 0 , p , q , p , n ) of type (4.7) (i.e., p = q and n = 0 , that is, we again have the equality p q = p p = n = 0 ), or g starts by ( p , q , m , n , p , q , m 1 , n 1 ) of type (4.8) (i.e., p = q = m = n = 0 , which leads to a contradiction, as then t i is a zero 8-tuple). The case when t i is of type (4.9) is excluded in a similar way.

We see that a sequence g P 2 can consist of a few 8-tuples (holding a chain of the above types) only. Now we need extract the required fragments ( p , q , p q ) .

Clearly, π 1 P consists of sequences of type

h = ( p , q , n 2 , n 3 , ) with ( p , q ) P ,

and with only finitely many of the coordinates n 2 , n 3 , being non-zero.

Denote P 3 = ι ( P 2 , π 1 P ) and choose any g P 3 . Since g P 2 , it is constructed by some 8-tuples of one of the types (4.6)–(4.9). Since also g π 1 P , its first non-zero 8-tuple occupies indices 0–7 and is of types (4.7) or (4.8) with one of p , q being non-zero. Then, by our construction, 𝑔 starts by the triple ( p , q , p q ) .

The case when 𝒫 does contain the couple ( 0 , 0 ) also is covered by our construction because, in that case, the 8-tuple of type (4.6) with p = q = 0 is in P 2 , and to P 3 contains a sequence starting by ( 0 , 0 , 0 ) .

The extract set ϵ 0 , 1 , 2 P 3 is the set of triples

P 1 , 2 , 1 2 = { ( p , q , p q ) ( p , q ) P } .

The other set P 1 , 2 , 1 + 2 can now be obtained in two ways. Either we can modify the constructions above to adapt it for the triples ( p , q , p + q ) . Or we can use the construction of Section 4.4 to build the set of P 4 of triples ( p , q , q ) . Then the extract ϵ 0 , 2 P 4 is the set { ( p , p q ) ( p , q ) P } . So we can directly apply the already constructed proof to get the triples ( p , q , p ( q ) ) = ( p , q , p + q ) and finally replace q by 𝑞.

We proved the following lemma.

Lemma 4.9

If the sets 𝒫 belongs to 𝒮, then the sets P 1 , 2 , 1 2 and P 1 , 2 , 1 + 2 both belong to 𝒮.

Combining Lemma 4.9 with Lemma 4.5 and Lemma 4.6, we get that if 𝒬 is a set of some ( q ) , then Q S implies that 𝒮 contains the set of all couples ( q , q ) , the set of all triples ( q , q , 2 q ) and the set of all couples ( q , 2 q ) (which is obtained from the set of previous triples via the extract ϵ 0 , 2 ). Repeating this, we get the set of all couples ( q , s q ) for any pre-given integer 𝑠, and q Q .

Lemma 4.9 can also be generalized by taking any distinct indices instead of 0 , 1 , 2 . Let ℬ be any subset of ℰ, and let p = g ( i ) and q = g ( j ) be the 𝑖-th and 𝑗-th coordinates of generic g B . For an index 𝑘, different from i , j , denote by P i , j , i j , k the set of all functions f E for which there is a g B such that 𝑓 coincides with 𝑔 on all coordinates except the 𝑘-th, and f ( k ) = p q . In other words, we replace the 𝑘-th coordinate in each g B by p q = g ( i ) g ( j ) . We can similarly define the set P i , j , i + j , k .

Lemma 4.10

If the set ℬ belongs to 𝒮 and, for fixed i , j , the set

P = { ( p , q ) g B , p = g ( i ) , q = g ( j ) }

also belongs to 𝒮, then the sets P i , j , i j , k and P i , j , i + j , k both belong to 𝒮.

Proof

Applying the appropriate permutation 𝛼, we can reorder the coordinates of each g B so that α g ( 0 ) = p = g ( i ) , α g ( 1 ) = q = g ( j ) , α g ( 2 ) = g ( k ) . Then R 1 = ζ 2 α B consists of all those reordered sequences with the 2nd coordinate liberated.

Applying Lemma 4.9 to 𝒫, the set

P 1 , 2 , 1 2 = { ( p , q , p q ) ( p , q ) P }

is in 𝒮. Then R 2 = π π 2 P 1 , 2 , 1 2 consists of all g E which coincide with ( p , q , p q ) on indices 0 , 1 , 2 and which may have arbitrary coordinates elsewhere. Then the intersection R 3 = ι ( R 1 , R 2 ) consists of all sequences 𝑔 from R 1 in which the 2nd coordinate is replaced by p q = g ( 0 ) g ( 1 ) . It remains to apply the permutation α 1 to get P i , j , i j , k = α 1 R 3 .

The proof for P i , j , i + j , k is similar. ∎

4.6 An application of the 𝐻-machine

Now we are in position to launch the 𝐻-machine to construct the series of sets ℬ mentioned in examples in Section 3.3 by Higman operations (H). Here we do that for the group Z .

Example 4.11

For the free abelian group Z in Example 3.2, we have the set ℬ of sequences f k , l of length 35 constructed in Example 3.2. The following algorithm constructs ℬ by operations (H).

  1. Using the single permutation 𝛼 constructed in Example 3.2, bring the sequences f k , l to simpler form α f k , l .

  2. Using Lemma 4.4, obtain the set { ( 1 ) } .

  3. Using Lemma 4.5 ten times, duplicate the 0th coordinate 1 to get the set A 1 consisting of one 11-tuple ( 1 , , 1 ) .

  4. Using Lemma 4.4, obtain the set { ( 1 ) } .

  5. Using Lemma 4.5 ten times, duplicate the 0th coordinate −1 to get the set A 2 consisting of one 11-tuple ( 1 , , 1 ) .

  6. By Lemma 4.6, the set B + , of all couples ( k , k ) , k = 1 , 2 , , is in 𝒮. Construct the set A 3 of all 5-tuples ( k , k , k , k , k ) , k = 1 , 2 , , i.e., duplicate in B + the coordinate k twice by Lemma 4.5, then rotate the resulting set by 𝜌, duplicate the 0th coordinate 𝑘, and then rotate back by 𝜌 and shift by 𝜎.

  7. Similarly, construct the set A 4 of all 5-tuples ( l , l , l , l , l ) , l = 1 , 2 , .

  8. The sum A 5 = A 1 + σ 11 A 2 + σ 22 A 3 + σ 27 A 4 consists of 32-tuples (indexed by 0 , 1 , , 31 ): the above 11-tuples ( 1 , , 1 ) , followed by 11-tuples ( 1 , , 1 ) , followed by 5-tuple ( k , k , k , k , k ) and then followed by 5-tuple ( l , l , l , l , l ) with any k , l = 1 , 2 , .

  9. Using Lemma 4.10 on the set A 5 for i = 22 , j = 27 , k = 32 , we adjoin a new 32nd entry (equal to the respective k l ) to sequences from A 5 . Repeating this step for k = 33 , adjoin a 33rd entry k l . Call the new set A 6 .

  10. Using Lemma 4.10 on A 6 for i = 27 , j = 22 , k = 34 , we adjoin a new 34th entry l k to all sequences from A 6 . That is, we get the set of all sequences α B .

  11. Apply the inverse α 1 of the permutation 𝛼 used in Example 3.2 to get the set ℬ of all f k , l .

  12. As a last step, use the definition in Section 2.4 to replace by Higman operations (H) each of the auxiliary operations

    σ i , ζ i , ζ S , π i , π i , τ k , l , α = τ k 1 , l 1 τ k m , l m , ϵ S , addition + , ι n

    that we used in previous steps.

Remark 4.12

Comparing the very similarly structured sequences of Example 3.2, Example 3.4, Example 3.5 or Example 3.7, the reader can see how easy it would be to adapt the above algorithm for free metabelian, soluble, nilpotent groups, for ℚ (for [17]), for C p , or for their direct products including divisible abelian groups, and for any other constructively given subgroups therein.

Award Identifier / Grant number: 21T-1A213

Funding statement: The current work is supported by the 21T-1A213 grant of SCS MES RA.

Acknowledgements

Application of the methods that we present here allows to build a group answering a question of Bridson and de la Harpe on embedding of ℚ into a finitely presented group mentioned in the Kourovka notebook [11, Problem 14.10 (a)]. Recently, a direct solution to that problem was found by Belk, Hyde and Matucci in [3]; see Remark 3.6 for details. Another explicit embedding will be given in [17]. It is a pleasure to me to thank the referee of the Journal of Group Theory for careful work and for very helpful and encouraging remarks.

  1. Communicated by: Dessislava Kochloukova

References

[1] S. Aanderaa, A proof of Higman’s embedding theorem using Britton extensions of groups, Word Problems: Decision Problems and the Burnside Problem in Group Theory, Stud. Logic Found. Math. 71, North-Holland, Amsterdam (1973), 1–18. 10.1016/S0049-237X(08)71901-3Search in Google Scholar

[2] S. I. Adyan and V. S. Atabekyan, 𝑛-torsion groups, J. Contemp. Math. Anal. 54 (2019), no. 6, 319–327. 10.3103/S1068362319060013Search in Google Scholar

[3] J. Belk, J. Hyde and F. Matucci, Embedding ℚ into a finitely presented group, Bull. Amer. Math. Soc. (N. S.) 59 (2022), no. 4, 561–567. 10.1090/bull/1762Search in Google Scholar

[4] O. Bogopolski, Introduction to Group Theory, EMS Textbk. Math., European Mathematical Society, Zürich, 2008. 10.4171/041Search in Google Scholar

[5] G. Boolos, J. Burgess and R. Jeffrey, Computability and Logic, 4th ed., Cambridge University, Cambridge, 2002. 10.1017/CBO9781139164931Search in Google Scholar

[6] M. Davis, Computability and Unsolvability, McGraw-Hill, New York, 1958. Search in Google Scholar

[7] G. Higman, Subgroups of finitely presented groups, Proc. Roy. Soc. Lond. Ser. A 262 (1961), 455–475. 10.1098/rspa.1961.0132Search in Google Scholar

[8] G. Higman, B. H. Neumann and H. Neumann, Embedding theorems for groups, J. Lond. Math. Soc. 24 (1949), 247–254. 10.1112/jlms/s1-24.4.247Search in Google Scholar

[9] D. L. Johnson, Presentations of Groups, 2nd ed., London Math. Soc. Stud. Texts 15, Cambridge University, Cambridge, 1997. Search in Google Scholar

[10] M. I. Kargapolov and J. I. Merzljakov, Fundamentals of the Theory of Groups, Grad. Texts in Math. 62, Springer, New York, 1979. 10.1007/978-1-4612-9964-6Search in Google Scholar

[11] E. I. Khukhro and V. D. Mazurov, The Kourovka Notebook, 19th ed., Sobolev Institute of Mathematics, Novosibirsk, 2018. Search in Google Scholar

[12] R. C. Lyndon and P. E. Schupp, Combinatorial Group Theory, Ergeb. Math. Grenzgeb. (3) 89, Springer, Berlin, 1977. Search in Google Scholar

[13] V. H. Mikaelian, Metabelian varieties of groups and wreath products of abelian groups, J. Algebra 313 (2007), no. 2, 455–485. 10.1016/j.jalgebra.2004.02.040Search in Google Scholar

[14] V. H. Mikaelian, Subvariety structures in certain product varieties of groups, J. Group Theory 21 (2018), no. 5, 865–884. 10.1515/jgth-2018-0017Search in Google Scholar

[15] V. H. Mikaelian, A modified proof for Higman’s embedding theorem, preprint (2019), https://arxiv.org/abs/1908.10153. Search in Google Scholar

[16] V. H. Mikaelian, Embeddings determined by universal words in the rank 2 free group, Sib. Math. J. 62 (2021), no. 1, 123–130. 10.1134/S0037446621010134Search in Google Scholar

[17] V. H. Mikaelian, An explicit embedding of ℚ into a finitely presented group, in preparation. Search in Google Scholar

[18] H. Neumann, Varieties of Groups, Springer, New York, 1967. 10.1007/978-3-642-88599-0Search in Google Scholar

[19] D. J. S. Robinson, A Course in the Theory of Groups, 2nd ed., Grad. Texts in Math. 80, Springer, New York, 1996. Search in Google Scholar

[20] H. Rogers, Jr., Theory of Recursive Functions and Effective Computability, McGraw-Hill, New York, 1967. Search in Google Scholar

[21] J. J. Rotman, An Introduction to the Theory of Groups, 4th ed., Grad. Texts in Math. 148, Springer, New York, 1995. 10.1007/978-1-4612-4176-8Search in Google Scholar

[22] Why is “The Higman Rope Trick” thus named?, https://mathoverflow.net/questions/195011/why-is-the-higman-rope-trick-thus-named. Search in Google Scholar

Received: 2021-06-15
Revised: 2023-04-14
Published Online: 2023-06-13
Published in Print: 2023-11-01

© 2023 Walter de Gruyter GmbH, Berlin/Boston

Downloaded on 11.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/jgth-2021-0095/html
Scroll to top button