Next Article in Journal
A Multi-Strategy Marine Predator Algorithm and Its Application in Joint Regularization Semi-Supervised ELM
Next Article in Special Issue
Some Fixed Point Results of Weak-Fuzzy Graphical Contraction Mappings with Application to Integral Equations
Previous Article in Journal
Price Competition and Setup Cost
Previous Article in Special Issue
Approximation of the Constant in a Markov-Type Inequality on a Simplex Using Meta-Heuristics
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Discrete Group Actions on Digital Objects and Fixed Point Sets by Isok(·)-Actions

Department of Mathematics Education, Institute of Pure and Applied Mathematics, Jeonbuk National University, Jeonju 54896, Jeonbuk, Korea
Mathematics 2021, 9(3), 290; https://doi.org/10.3390/math9030290
Submission received: 6 January 2021 / Revised: 27 January 2021 / Accepted: 28 January 2021 / Published: 1 February 2021
(This article belongs to the Special Issue Nonlinear Problems and Applications of Fixed Point Theory)

Abstract

:
Given a digital image (or digital object) ( X , k ) , X Z n , this paper initially establishes a group structure of the set of self-k-isomorphisms of ( X , k ) with the function composition, denoted by I s o k ( X ) or A u t k ( X ) . In particular, let C k n , l be a simple closed k-curve with l elements in Z n . Then, the group I s o k ( C k n , l ) is proved to be isomorphic to the standard dihedral group D l with order l. The calculation of this quantity I s o k ( C k n , l ) is a key step for obtaining many new results. Indeed, it is essential for exploring many features of I s o k ( X ) . Furthermore, this quantity is proved to be a digital topological invariant. After proceeding with an I s o k ( X ) -action on ( X , k ) , we investigate some properties of fixed point sets by this action. Finally, we explore various features of fixed point sets by this action from the viewpoint of digital k-curve theory. This paper only deals with k-connected digital images ( X , k ) whose cardinality is equal to or greater than 2. Besides, we discuss some errors that have appeared in the lilterature.
MSC:
54H30; 55Q05; 54H25; 47H10; 05E18; 22F05; 68U03

1. Introduction

Let Z (resp. N ) represent the set of integers (resp. natural numbers), and Z n be the n times Cartesian product of Z , n N . Besides, let N 0 (resp. N 1 ) be the set of even (resp. odd) natural numbers. Digital geometry mainly deals with discrete objects in Z n from the viewpoints of digital k-curve and digital k-surface theory, where the k-adjacency means the digital k-connectivity of Z n (see (1) in Section 2). Indeed, a digital image ( X , k ) , X Z n , can be considered to be a digital graph on Z n with a certain k-adjacency of Z n or a discrete topological subspace on Z n with a k-adjacency relation of Z n (for details see Section 2). They are indeed equivalent to each other. This kind of consideration facilitates our recognition of some discrete objects in a modern smart electronic device. For instance, a smart computer screen, being finite pixels, can be assumed to be a set followed from these two approaches among others. In addition, there are also further many types of approaches of studying digital objects in Z n . Hence, many works taking these approaches include the papers [1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19]. Besides, some studies related to nonlinearizable action of dihedral groups on affine space [20], free actions on R -trees [21], and a group of paths in R 2 [22] were done. In addition, there are some researches on the fixed point property related to two-dimensional polyhedra [23] and fixed point sets of circle action [24]. Hereinafter, for convenience, for a , b Z with a < b , we follow the notation [ a , b ] Z : = { n Z | a n b } [13]. Besides, in the present paper we call ( X , k ) a digital image or a digital object in Z n .
Given a digital image (or digital object) ( X , k ) in Z n , we assume (for more detail see Section 3, Section 4 and Section 5)
I s o k ( X ) : = A u t k ( X ) : = { h | h : ( X , k ) ( X , k ) is a k - isomorphism } , and C o n k ( X ) : = { f | f : ( X , k ) ( X , k ) is a k - continuous map } .
One important thing to note is that the current approach in a digital topological setting plays an important role in applied mathematics as well as applied sciences. Hence, based on this approach, let D k ( X ) { I s o k ( X ) , C o n k ( X ) } , the present paper explores some new structures and features associated with the fixed point sets by the D k ( X ) -actions on a digital image ( X , k ) (see Definition 10) and further, examines if alignments of fixed point sets by the D k ( X ) -actions are 2-connected or perfect (see Definition 11). In particular, these actions include fixed point and fixed point free ones [25] and further, these are discrete groups or monoid ones.
The recent papers [7,8,26] studied the set of cardinalities of fixed point sets of all k-continuous self-maps of ( X , k ) , denoted by F ( C o n k ( X ) ) in the present paper (or F ( X ) in [26]). Motivated by this approach, this paper further investigates some more important features of D k ( X ) . The obtained results give us some big advantages of recognizing the sizes or volumes of the fixed points sets by the D k ( X ) -actions on ( X , k ) . The papers [7,8] also characterized the set F ( C o n k ( X ) ) with 2-adjacency which is referred to as “an alignment of fixed point sets” (see Definition 10) [8]. Since the present paper indeed deals with two kinds of algebraic structures, I s o k ( X ) and C o n k ( X ) , the usage of the notations F ( I s o k ( X ) ) and F ( C o n k ( X ) ) can finally avoid a certain possible confusion among fixed point sets derived from these two actions on ( X , k ) .
The algebraic structure of I s o k ( X ) is essential for exploring fixed point sets of the I s o k ( X ) -actions on ( X , k ) in a D T C ( k ) setting, where D T C ( k ) is a category consisting of the set of digital images (or digital objects) ( X , k ) and the set of digitally k-continuous maps (for details see Section 2). Thus, they play important roles in studying fixed point theory [27] and group theory in a D T C ( k ) setting. Using these structures, we further investigate some properties of the I s o k ( X ) -action on ( X , k ) and explore a certain condition that makes the alignment of fixed point sets by the C o n k ( X ) -action perfect (for details see Definitions 10 and 11), where for a digital object ( X , k ) we say that F ( C o n k ( X ) ) is perfect if it is equal to [ 0 , X ] Z (see Definition 11). Papers [7,8] have also explored some alignments of fixed point sets that are 2-connected (or perfect). Since an existence of a perfect alignment of fixed point sets depends on the situation, we strongly need to examine if F ( C o n k ( X ) ) is perfect, which can play an important role in digital topology and many areas of applied sciences [8]. Indeed, this kind of approach gives us to efficiently characterize the fixed point sets of f C o n k ( X ) .
The present paper investigates various properties of F ( I s o k ( X ) ) and F ( C o n k ( X ) ) related to fixed point sets in the category D T C ( k ) (for details see Section 5). Let C k n , l be a simple closed k-curve with l elements in Z n (for more details see the property (2)). Then, based on the minimal simple closed k-curve C k n , 4 in Z n , it turns out that either C k n , 5 or C k n , 6 is the secondary to the minimal simple closed k-curve C k n , 4 in Z n depending on both the “k-adjacency” and the dimension “n” [8]. Naively, while there is C 8 2 , 6 , neither C 4 2 , 6 nor C k 2 , 5 exists, where k { 4 , 8 } . Meanwhile, C k n , 5 exists if 3 t n and k : = k ( t , n ) (for more details see the property (2) in the present paper or the property of (2) of [8]). Considering a digital wedge C k n , l C k n , 4 whose digital k-fundamental group is an infinite cyclic group or a trivial group depending on the number l, a recent paper mentioned that in the case l N 0 \ { 2 } , F ( C o n k ( C k n , l C k n , 4 ) ) is 2-connected (or perfect) (see Definition 11) if and only if l { 4 , 6 , 8 , 10 } , where the term “perfect“ means that F ( C o n k ( C k n , l C k n , 4 ) ) = [ 0 , l + 3 ] Z . Besides, a recent paper further developed a certain condition of which F ( C o n k ( C k n , l C k n , 6 C k n , 4 ) ) is perfect. In addition, in the case 5 l N 1 , the study of F ( C o n k ( C k n , l C k n , 4 ) ) was also proceeded [8]. This kind of study can be substantially helpful to study fixed point theory and k-homotopy theory in a digital topological setting. Since the present paper deals with many properties related to the digital topological property, let us recall the property in advance. Hereafter, as usual, we say that a digital topological invariant is a property of a digital image ( X , k ) which is invariant under digital k-isomorphisms. In other words, a property of digital images is a digital topological property if whenever a digital image ( X , k ) possesses that property every digital image k-isomorphic to ( X , k ) has that property.
Based on this approach, we may pose the following queries.
(●1)
How can we characterize the group I s o k ( X ) ?
(●2)
Given C k n , l , what group is isomorphic to I s o k ( C k n , l ) ?
(●3)
After proceeding with the I s o k ( X ) -action on ( X , k ) , how can we characterize the fixed point sets by the I s o k ( X ) -action ?
(●4)
What are the fixed point sets of an I s o k ( C k n , l 1 C k n , l 2 ) -action on C k n , l 1 C k n , l 2 ?
(●5)
Given C k n , l 1 C k n , l 2 with a certain hypothesis, l 1 , l 2 N 0 \ { 2 } , how can we formulate F ( C o n k ( C k n , l 1 C k n , l 2 ) ) ?
After developing many new tools, we will address all of these issues in this paper.
The rest of the paper is organized as follows: Section 2 provides various concepts needed for this study and deals with some properties of them. Section 3 develops the group structure of I s o k ( X ) . Besides, we prove that I s o k ( C k n , l ) is isomorphic to the standard dihedral group D l with 2 l elements. Section 4 deals with some fixed point sets of an I s o k ( X ) -action on the given digital image ( X , k ) . Section 5 explores various properties of F ( C o n k ( C k n , l 1 C k n , l 2 ) ) , where l 1 , l 2 N 0 \ { 2 } . Indeed, the study of this kind of a digital wedge remains open. Section 6 concludes the paper with some remarks and a further work. In this paper the notation “ : = ” is used for introducing a new terminology. In addition, we will use the notation X to indicate the cardinality of a set X.

2. Preliminaries

Rosenfeld [17,18] called the pair ( X , k ) a digital image (or digital object), where X Z n with digital k-connectivity, n { 1 , 2 , 3 } . Motivated by these k-adjacency relations for low dimensional digital images, a paper [5] initially developed the generalized version of them for high dimensional digital images X Z n , n N . Indeed, this approach is essential for studying many digital objects from the viewpoint of digital topology such as digital products with normal adjacencies [5] and their applications [28,29]. More explicitly, the following k-adjacency relations of Z n were taken in [5,28] for studying X Z n .
For a natural number t, 1 t n , distinct points
p = ( p 1 , p 2 , , p n ) and q = ( q 1 , q 2 , , q n ) Z n ,
are k ( t , n ) -adjacent if at most t of their coordinates differ by ± 1 and the others coincide. According to this statement, the k ( t , n ) -adjacency relations of Z n , n N , were formulated [5,28]), as follows:
k : = k ( t , n ) = i = 1 t 2 i C i n , where C i n = n ! ( n i ) ! i ! .
Using a digital k-adjacency of Z n , n N , it turns out that a digital image ( X , k ) is a digital space [30]. In this paper ( X , k ) is assumed in Z n , n N , with one of the k-adjacency of (1). The following terminology and notions [5,7,17,18,29] will be often used later.
Given a digital image ( X , k ) with X 2 , by a k-path with l + 1 elements in X, we mean the sequence ( x i ) i [ 0 , l ] Z X such that x i and x j are k-adjacent if | i j | = 1 [13]. Using this approach, we can also represent the concept of k-connectedness, as follows [13].
  • We say that ( X , k ) is k-connected if for any distinct points x , y X there is a k-path ( x i ) i [ 0 , l ] Z in X such that x 0 = x and x l = y (for more details see [7]).
  • By a simple k-path, we mean a finite set ( x i ) i [ 0 , m ] Z Z n such that x i and x j are k-adjacent if and only if | i j | = 1 [13]. In particular, if x 0 = x and x m = y , then the length of this set ( x i ) i [ 0 , m ] Z is denoted by l k ( x , y ) : = m .
  • We say that a simple closed k-curve (or simple k-cycle) with l elements in Z n , n 2 , denoted by S C k n , l [5,13], l 4 , is a set ( x i ) i [ 0 , l 1 ] Z Z n such that x i and x j are k-adjacent if and only if | i j | = ± 1 ( mod l ) . In particular, as mentioned in the previous part, in this paper we use the notation C k n , l to abbreviate S C k n , l .
More precisely, for l N 1 , no C 2 n n , l exists, according to the notion of C k n , l (see also (2) below), we observe the following properties [8]. The number l of C k n , l depends on the k-adjacency of Z n in (1), i.e., k : = k ( t , n ) of (1) (for more details, see the property (2) of [8] and several examples in Figure 1 and Figure 2).
( 1 ) in the case k = 2 n ( n 2 ) , we have l N 0 \ { 2 } ; ( 2 ) in the case k 2 n , the number l depends on the dimension of n ( for more details , see the property ( 2 ) of [8] ) ; and ( 3 ) in the case k : = k ( t , n ) , 3 t n , we have l N \ { 1 , 2 , 3 } ( for more details , see the property ( 2 ) of [8] ) .
For instance, we can consider the following digital objects: C 4 2 , 4 , C 8 2 , 4 , C 8 2 , 7 , C 18 3 , 9 and C 26 3 , 5 . However, in Z 2 neither C 4 2 , 5 nor C 8 2 , 5 exists. Besides, in Z 3 neither C 6 2 , 5 nor C 18 2 , 5 exists.
  • Given ( X , k ) , by the k-component of x X , we mean the maximal k-connected subset of ( X , k ) containing the point x [13].
For a k-connected digital image ( X , k ) , the paper [5] already established a certain metric on ( X , k ) (for more details see [5,7]). Thus, given a digital image ( X , k ) on Z n , we obtain [5,29] that for a point x 0 ( X , k ) ,
N k ( x 0 , 1 ) = { x X | x is k - adjacent to x 0 } { x 0 } .
This set is called a digital k-neighborhood of x 0 with radius 1 [5]. As another approach for the digital k-neighborhood of x 0 with radius ε in (3) using a special kind of metric on ( X , k ) was established in the papers [5,7]. The digital ( k 0 , k 1 ) -continuity of a map f : ( X , k 0 ) ( Y , k 1 ) in [18] can be represented, as follows:
Proposition 1.
[4,6] A function f : ( X , k 0 ) ( Y , k 1 ) is (digitally) ( k 0 , k 1 ) -continuous if and only if for every x X , f ( N k 0 ( x , 1 ) ) N k 1 ( f ( x ) , 1 ) .
In Proposition 1, in the case k : = k 0 = k 1 , the map f is called a “k-continuous” map to abbreviate the ( k , k ) -continuity of Proposition 1. Using the presentation of the k-continuity from Proposition 1, let us recall the category DTC consisting of the following two pieces of data [5], called the digital topological category.
  • The set of ( X , k ) , where X Z n , as objects of DTC;
  • for every ordered pair of objects ( X i , k i ) , i { 0 , 1 } , the set of all ( k 0 , k 1 ) -continuous maps between them as morphisms of DTC.
In DTC, in the case k : = k 0 = k 1 , we will particularly use the notation DTC(k) [29].
The recent paper studied the following property of digital continuity of a set X Z n , which can play an important role in digital topology.
Theorem 1.
[8] Given a set X Z n , let us consider the two digital connectivities of X such as k ( t 1 , n ) and k ( t 2 , n ) with t 1 < t 2 (see the property of (1)). Naively, we can assume the two digital images ( X , k 1 : = k ( t 1 , n ) ) and ( X , k 2 : = k ( t 2 , n ) ) . Further consider a k 1 -continuous self-map of ( X , k 1 ) and a k 2 -continuous self-map of ( X , k 2 ) . Then, neither of them implies the other.
In order to discuss some errors in the literature written by L. Boxer [31], we need to recall the following. We say that a nonempty digital image ( X , k ) has the almost fixed point property (AFPP for brevity) if every k-continuous self-map f of ( X , k ) has a point x X such that f ( x ) = x or f ( x ) is k-adjacent to x[18]. Then, a paper [18] proved that a digital screen ( X : = [ a , b ] Z × [ c , d ] Z , 8 ) has the AFPP. Motivated by this research, the paper [7] has generalized it as follows:
Theorem 2.
[7] For n N , the n-dimensional digital cube with k-adjacency ( X : = [ 1 , 1 ] Z n , k ) on Z n has the AFPP if and only if k = 3 n 1 .
Indeed, this assertion is correct. Moreover, this fact plays an important role in digital geometry. A paper [31] also agrees that this assertion holds. Despite this fact, Boxer [31] mentions that the proof of this theorem in [7] has some errors or unclear. However, it is clear that Boxer’s argument is false. More explicitly, let us set the false straightfoward more precisely, as follows:
  • As for this comment on the page 362 of the paper [31], we now state that Boxer’s argument is false because he seems to read Han’s proof in [7] incorrectly.
    (1)
    The proof of this theorem in [7] is correct. More explicitly, as we can see the proof in [7] as well as Theorem 1 above, given a set X in Z 3 , Han [7] does not say that every 6-continuous map implies an 18-continuous map. As mentioned in Theorem 1, for instance, given a set X in Z 3 , assume a 6-continuous self-map of ( X , 6 ) and an 18-continuous self-map of ( X , 18 ) . Then, in general, neither of them implies the other (for more details, see Figure 2 in [8]). Indeed, although every 6-continuous map need not imply 18-continuous, depending on the situation, a certain 6-continuous map can be an 18-continuous map. For instance, given the set Y : = [ 1 , 1 ] Z 3 and the given maps g of (7), h of (8), and r of (9) in [7], the composite r h g : ( Y , 18 ) ( Y , 18 ) in the proof of Theorem 2 in [7] is clearly 18-continuous. Indeed, Example 3.1 of [31] is not related to Han’s assertion in [7] (for more details see the proof of [8] and Figure 2 of [8]).
    (2)
    Boxer [31] also incorrectly argues about Han’s second proof in [7] related to Theorem 2. Since the method of suggesting a counterexample againt a certain assertion is obviously a kind of typical proof, Han’s proof taken in [7] can be acceptable because the counterexample considered in Z 3 can be enough to prove Theorem 2. Besides, a paper [7] further explains an n-dimensional case.
To classify digital images ( X , k ) [6], we often use the notion of a ( k 0 , k 1 ) -isomorphism (or k-isomorphism) as in [6], as follows:
Definition 1.
[6] ( ( k 0 , k 1 ) -homeomorphism in [32]) Consider two digital images ( Z , k 0 ) and ( W , k 1 ) in Z n 0 and Z n 1 , respectively. Then, a map h : Z W is called a ( k 0 , k 1 ) -isomorphism if h is a ( k 0 , k 1 ) -continuous bijection and further, h 1 : W Z is ( k 1 , k 0 ) -continuous. Then, we use the notation Z ( k 0 , k 1 ) W . In the case k : = k 0 = k 1 , we use the notation Z k W to abbreviate Z ( k 0 , k 1 ) W .
The notion of (strict) digital wedge (or one point union of two digital images was initially proposed in [5,33]. Given two digital images ( X , k ) and ( Y , k ) , a digital wedge (or one point union of digital images), denoted by ( X Y , k ) , is defined [5,33] as the union of the digital images ( X , k ) and ( Y , k ) , where
(1)
X Y is a singleton, say { p } .
(2)
X \ { p } and Y \ { p } are not k-adjacent, where two subsets A and B of ( X , k ) is k-adjacent if A B = and there are at least two points a A and b B such that a is k-adjacent to b [13].
(3)
( X , k ) is k-isomorphic to ( X , k ) and ( Y , k ) is k-isomorphic to ( Y , k ) (see Definition 1).
In view of this process, we may finally consider ( X Y , k ) to be a digital object ( X Y , k ) using these ( X , k ) and ( Y , k ) . In this paper we only deal with this digital wedge which is quite different from the typical one point union in classical topology [34].
In digital topology, we are strongly required to follow this digital wedge ( X Y , k ) . If we do not follow this approach, we will get some big difficulties in proceeding with further works in digital topology. Meanwhile, in the case of ( X , k 0 ) and ( Y , k 1 ) such that k 0 k 1 , the compatible k-adjacency of ( X Y , k ) was also established. More precisely, for l N 1 , since no C 2 n n , l exists, given C k n , l 1 C k n , l 2 such that l 1 N 1 and l 2 N 0 , depending on the numbers l i , i { 1 , 2 } , we can consider many types of C k n , l 1 C k n , l 2 (for more details, see the property (4) of [8]).
Based on the pointed digital k-homotopy in [9,10,11] (see also [32]), the concept of k-homotopy relative to a subset A X is established, as follows:
Definition 2.
[5,32] Let ( ( X , A ) , k 0 ) and ( Y , k 1 ) be a digital image pair and a digital image in Z n 0 and Z n 1 , respectively. Let f , g : X Y be ( k 0 , k 1 ) -continuous functions. Suppose there exist m N and a function H : X × [ 0 , m ] Z Y such that
(●1)
for all x X , H ( x , 0 ) = f ( x ) and H ( x , m ) = g ( x ) ;
(●2)
for all t [ 0 , m ] Z , the induced function H t : X Y given by H t ( x ) = H ( x , t ) for all x X is ( k 0 , k 1 ) -continuous;
(●3)
for all x X , the induced function H x : [ 0 , m ] Z Y given by H x ( t ) = H ( x , t ) for all t [ 0 , m ] Z is ( 2 , k 1 ) -continuous.
Then, H is said to be a ( k 0 , k 1 ) -homotopy between f and g [32].
(●4)
Furthermore, for all t [ 0 , m ] Z , H t ( x ) = f ( x ) = g ( x ) for all x A and for all t [ 0 , m ] Z [5].
Then, we call H a ( k 0 , k 1 ) -homotopy relative to A between f and g, and f and g are said to be ( k 0 , k 1 ) -homotopic relative to A in Y, f ( k 0 , k 1 ) r e l . A g in symbols [29].
In Definition 2, in the case k : = k 0 = k 1 and n 0 = n 1 , we call a k-homotopy to abbreviate ( k 0 , k 1 ) -homotopy. In addition, if A = { x 0 } X , then we say that F is a pointed ( k 0 , k 1 ) -homotopy at { x 0 } [32]. When f and g are pointed ( k 0 , k 1 ) -homotopic in Y, we use the notation f ( k 0 , k 1 ) g . In the case k : = k 0 = k 1 and n 0 = n 1 , f and g are said to be pointed k-homotopic in Y and we take the symbol f k g to abbreviate f ( k 0 , k 1 ) g . If, for some x 0 X , 1 X is k-homotopic to the constant map in the space X relative to { x 0 } , then ( X , x 0 ) is said to be pointed k-contractible [32]. Indeed, taking this approach, the concept of strong k-deformation retract was developed in [29].
Based on this k-homotopy, the notion of digital homotopy equivalence firstly introduced in [35] (see also [36]), as follows:
Definition 3.
[35] (see also [36]) Given two digital images ( Z , k ) and ( W , k ) , if there are k-continuous maps h : Z W and l : W Z such that the composite l h is k-homotopic to 1 Z and the composite h l is k-homotopic to 1 W , then the map h : Z W is called a k-homotopy equivalence and is denoted by Z k · h · e W . Besides, ( Z , k ) is said to be k-homotopy equivalent to ( W , k ) or ( Z , k ) is the same k-homotopy types with ( W , k ) . If the identity map 1 Z is k-homotopy equivalent to a certain constant map c { z 0 } , z 0 Z , we say that ( Z , k ) is k-contractible.
Based on the several concepts such as a digital k-homotopy class [9,10,11], a Khalimsky operation of two k-homotopy classes [9], a trivial extension [32], the paper [32] defined the digital k-fundamental group, denoted by π k ( X , x 0 ) , x 0 X . Also, we have the following: If X is pointed k-contractible, then it is clear that π k ( X , x 0 ) is a trivial group [32]. A recent paper written by the present author recently proposed the most simplified axiom for a digital covering space. Using the homotopy lifting theorem [4] and the unique digital lifting theorem [5] in digital covering theory [5], we obtain the following [5,29,33]:
Theorem 3.
(1) 
For a non-k-contractible C k n , l , π k ( C k n , l ) is an infinite cyclic group [5].
(2) 
Given C k n , l , π k ( C k n , l ) is trivial if and only if l = 4 [5,32]. Namely, C k n , l is k-contractible if and only if l = 4 .
(3) 
For non-k-contractible C k n , l i , i { 1 , 2 } , π k ( C k n , l 1 C k n , l 2 ) is a free group generated by two generators with infinite orders, i.e., π k ( C k n , l 1 C k n , l 2 ) is isomorphic to the free group Z * Z [5].
This result is essential to characterizing an alignment of fixed point sets in Section 5. Regarding Theorem 3, for instance, C 4 2 , 4 has the trivial group and further, C 3 n 1 n , 4 also has the trivial group, n 2 [4,5,32]. Hence, we have π 4 ( C 4 2 , 8 C 4 2 , 8 ) and π 8 ( C 8 2 , 8 C 8 2 , 6 ) which are infinite free groups with two generators. In other words, π 4 ( C 4 2 , 8 C 4 2 , 4 ) is isomorphic to the infinite cyclic group Z and each π 4 ( C 4 2 , 8 C 4 2 , 8 ) and π 8 ( C 8 2 , 8 C 8 2 , 6 ) is isomorphic to the free group with two generators, Z * Z . In view of Theorem 3, we obtain the following:
Remark 1.
For a given C k 2 , l , k { 4 , 8 } , we obtain the following:
(1) 
π 4 ( C 4 2 , l C 4 2 , 4 ) is an infinite cyclic group with an infinite order if and only if l 8 .
(2) 
π 8 ( C 8 2 , l C 8 2 , 4 ) is an infinite cyclic group with an infinite order if and only if l 6 .
Theorem 4.
[7] A k-isomorphism preserves a k-homotopy, k-contractibility, and a k-homotopy equivalence.
Corollary 1.
A ( k 1 , k 2 ) -isomorphism preserves a ( k 1 , k 2 ) -homotopy and a ( k 1 , k 2 ) -homotopy equivalence, and it transforms k 1 -contractibility into k 2 -contractibility.

3. Characterizations of I s o k ( · ) : I s o k ( C k n , l ) Is Isomorphic to the Dihedral Group D l

This section focuses on characterizing a group of the set of all self-k-isomorphisms of X : = ( X , k ) , denoted by I s o k ( X ) : = ( I s o k ( X ) , ) , i.e., an automorphism group of ( X , k ) in a D T C ( k ) setting. Given a digital image X : = ( X , k ) , the computation of I s o k ( X ) is a very important step for the self-k-isomorphisms classifications of digital images. Indeed, the group I s o k ( X ) is also essential for studying fixed points of continuous self-maps of digital images X : = ( X , k ) (see Section 5).
Comparing with the group of the set of homeomorphisms for typical topological spaces, a digital topological analogue of it has its own features. Hence, motivated by the research of the group of the set of self-homeomorphisms of a topological space [37], given a finite digital image X : = ( X , k ) , we firstly need to characterize a group structure of the set of self-k-isomorphisms of X. Based on this work (see Remark 2 and Theorem 5), we further apply this structure to the fields of group theory, homotopy theory, fixed point theory (see Section 5) and applied sciences.
In particular, given C k n , l , we will intensively explore some properties of
I s o k n , l : = ( I s o k ( C k n , l ) , ) or A u t k n , l : = ( A u t k ( C k n , l ) , ) .
Namely, we will prove that the group I s o k n , l has two generators α and δ with orders l and 2, respectively, such that δ α δ 1 = α 1 (or ( α δ ) 2 = e ). After recognizing some strong relationships between I s o k n , l and the standard dihedral group D l with respect to the multiplication tables and the sizes of them, we prove that they are isomorphic to each other.
Given a digital image X : = ( X , k ) , we define the following:
Definition 4.
For X : = ( X , k ) , let I s o k ( X ) be the set { f | f : X X is a k - isomorphism . } . Consider the function composition, denoted by “ ”, as a binary operation on I s o k ( X ) .
Then, we obviously obtain the following:
Lemma 1.
I s o k ( X ) : = ( I s o k ( X ) , ) is a group.
Proof. 
It is obvious that I s o k ( X ) forms a group with the function composition for a group operation. Then, we clearly observe that the identity map 1 X is the identity element of the group. □
We will often use the notation Z m : = { 0 , 1 , , m 1 } instead of ( Z m , + ) which is the finite cyclic group with the operation “ + ”, as usual.
Remark 2.
Let ( X , k ) be a simple k-path which is not a singleton. Then, I s o k ( X ) is isomorphic to the finite cyclic group Z 2 .
Proof. 
Let ( X : = ( x t ) t [ 0 , l 1 ] Z , k ) be a simple k-path on Z n such that X = l , l N \ { 1 } . Then, we have the typical identity map 1 X and further, another self-k-isomorphism h of X such that h ( x t ) = x l t 1 , t [ 0 , l 1 ] Z , which completes the proof. □
It is important to recognize and understand certain key features of I s o k ( C k n , l ) . Hence, for any C k n , l , we now intensively explore some properties of I s o k n , l : = I s o k ( C k n , l ) . Before studying this issue, let us recall some properties of the dihedral group D l with 2 l elements, l 4 . To be precise, D l indeed consists of two generators r and s with order l and 2, respectively, such that s r s 1 = r 1 . Indeed, D l is produced by 2 l symmetries from a regular l-gon in R 2 [38]. Namely, “ r ” and “ s " represent the rotations and the reflections of this regular l-gon, respectively.
Based on this geometric definition of D l , to make a good combination between this geometric definition for D l and that of I s o k n , l with respect to relations of the two groups, l 4 , we recall D l , as follows:
D l : = < r , s | r l = e = s 2 , s r s 1 = r 1 > = { r i , s i | s i = r i s 0 , i [ 0 , l 1 ] Z } , with the property r i r j = r i + j , r i s j = s i + j , s i r j = s i j , and s i s j = r i j , where the subscripts and the superscripts are always read modulo l .
The relation “ s r s 1 = r 1 ” in (4) can be equivalently considered as “ r s r = s ”, “ ( s r ) 2 = e ”, or “ s r s = r 1 ”. However, for convenience in the paper we will follow the relation taken in (4). Furthermore, the equation s i = r i s 0 has strong advantages in comparing D l and I s o k n , l , we certainly follow the equality. This presentation of (4) indeed plays an important role in making a good combination between D l and I s o k n , l : = I s o k ( C k n , l ) . Motivated by this approach, let us move onto the study of rotations and reflections of C k n , l formulating I s o k n , l . For convenience, firstly reshape C k n , l : = ( x i ) i [ 0 , l 1 ] Z into like a (digital) rectangle or a virtual l-gon (need not be regular) on Z 2 up to k-isomorphism (see Figure 1(1) and Figure 2). One important thing to note is that this reshaped object need not be a regular l-gon. According to the number l of C k n , l , based on the reshaped object from C k n , l , we can efficiently consider special kinds of rotations and reflections (or symmetries, or diagonal like flips) of C k n , l (see Figure 1(1) and Figure 2). Indeed, this kind of consideration can be acceptable because a digital ( k 1 , k 2 ) -isomorphism h : C k 1 n 1 , l C k 2 n 2 , l induces a group isomorphism h * : I s o k 1 n 1 , l I s o k 2 n 2 , l (for details see Theorem 6 and Corollary 2). Furthermore, these rotations and symmetries are different from those related to a regular l-gon with some angle producing a traditional dihedral group D l as mentioned above (for details see Remark 3). Based on a self-k-isomorphism of C k n , l , I s o k ( C k n , l ) is produced by l rotations of C k n , l and l reflections of C k n , l . Hence, our work that is strongly involved in I s o k n , l related to the presentation of D l in (4). Indeed, owing to a k-isomorphism of C k n , l and the reshaped simple closed 4- or 8-curve with l elements in Z 2 , the current rotations should proceed with special types of rotations with some angles depending on the situation (see Figure 1(1)(a)–(c) and Figure 2) or special kinds of symmetries with some different angles depending on the situation (see Figure 1(4)).
The next theorem plays an important role in establishing many results later.
Theorem 5.
Given C k n , l , l 4 , I s o k n , l : = I s o k ( C k n , l ) is isomorphic to the dihedral group D l .
When proving the assertion, we will count on both l rotational symmetries and l reflection symmetries which are slightly different from those associated with the typical dihedral group with respect to the angles associated with the rotations and the reflections (for details see Remark 3).
Proof. (Case 1) Let us consider the case l N 0 \ { 2 } .
(Case 1-1) [l rotational symmetries of C k n , l with respect to the k-isomorphism of C k n , l ]
Let us consider the following self-k-isomorphism of C k n , l : = ( x t ) t [ 0 , l 1 ] Z as l rotational symmetries.
With l 4 , for i [ 0 , l 1 ] Z , assume the map
α i , such that α i ( x t ) = x i + t ( mod l ) , t [ 0 , l 1 ] Z .
Based on (5), we obtain the set
A : = { α i | ( α i ) l = e = 1 C k n , l , i [ 0 , l 1 ] Z }
Then, further consider the function composition for A as a binary operation on A, denoted by ∘. Next, we may consider the set A in (6) with the operation “∘” to be a cyclic group with a generator α . Namely, using the following operation,
α α m : = α m + 1 ( mod l ) : = α α m , m [ 0 , l 1 ] Z with ( α m ) l = e = 1 C k n , l ,
we finally recognize that the pair ( A , ) is equivalent to the cyclic group < α > with degree l. Indeed, < α > is a cyclic subgroup of I s o k n , l : = I s o k ( C k n , l ) such that α l = e .
(Case 1-2) [l reflection symmetries of C k n , l with respect to the k-isomorphism of C k n , l ]
Based on the reshaped digital-based rectangle or a virtual l-gon (see Figure 1(1)), according to the reflections (diagonal like flips with some angles) of C k n , l up to k-isomorphism (see the picture in Figure 1(2)–(4)), we obviously have only l types of self-k-isomorphisms of C k n , l . For convenience, we may admit l types of certain reflection symmetries using some diagonal-like flips with some angles. These angles need not be constant, which is quite different from the geometric definition of D l . Indeed, we only need take the reflections of C k n , l as k-isomorphisms of C k n , l , as follows (see Figure 1(2)–(4)):
δ 0 is the reflection based on the axis joining the two points x 0 , x l 2 ; δ 1 is the reflection using a mirror axis in bisection between the two virtual line segments x 0 x 1 ¯ and x l 2 x l 2 + 1 ¯ ; δ 2 is the reflection about the axis formulated by the two points x 1 , x l 2 + 1 ; δ l 2 is the reflection w . r . t . the axis joining the two points x l 2 1 , x l 1 ; and δ l 1 is the reflection using a mirror axis in bisection between the two virtual line segments x l 2 1 x l 2 ¯ and x l 1 x 0 ¯ .
Then, it is clear that the map δ i in (7) is a self-k-isomorphism of C k n , l because the generator δ I s o k n , l is termed by “diagonal flip”. Then, owing to the reflection δ i from (7), we obtain the paired set ( B , ) , where
B : = { δ i | δ i 2 = 1 C k n , l , α δ i = δ i + 1 ( mod l ) , i [ 0 , l 1 ] Z } .
Owing to (8), we observe the property
δ i δ i + 1 ( mod l ) δ i + 1 ( mod l ) δ i .
Besides, the cosets < α > and < α > δ i , i [ 0 , l 1 ] Z , exhaust all of the set I s o k n , l = A B , A B = , and ( I s o k n , l ) = 2 l (see the multiplication table for the elements of I s o 8 2 , 4 in Figure 3 and I s o 8 2 , 6 in Figure 4). Hence,. due to (6) and (8), it turns out that the elements α A and δ 0 B are generators for the group I s o k n , l with 2 l elements because the element α has the order l and each δ i has the order 2 and further, δ i = α i δ 0 , i [ 0 , l 1 ] Z . At the moment, let us explore the relation among elements of I s o k n , l from (6) and (7) (see the multiplication tables for I s o 8 2 , 4 in Figure 3 and I s o 8 2 , 6 in Figure 4), as follows: For i , j [ 0 , l 1 ] Z , the following properties are obtained (see Figure 3 and Figure 4).
α l = e = δ i 2 = ( α δ i ) 2 ; α i α j = α i + j ( mod l ) ; α i δ j = δ i + j ( mod l ) ; δ i α j = δ i j ( mod l ) ; δ i δ j = α i j ( mod l ) ; and δ i δ i + 1 ( mod l ) δ i + 1 ( mod l ) δ i .
The order of the elements of I s o k n , l denoting the composition is right to left, as usual. Eventually, owing to the properties (9), the group I s o k n , l : = ( I s o k n , l , ) has the following presentation.
I s o k n , l : = < α , δ | α l = e = α 0 = δ 2 , ( α δ ) 2 = e > = { α i , δ j | δ i = α i δ 0 , i , j [ 0 , l 1 ] Z } , with the following property : α i α j = α i + j , α i δ j = δ i + j , δ i α j = δ i j , and δ i δ j = α i j , where all cases of subtractions and additions of subscripts and superscripts are always read by using modular arithmetic with modulo l .
Naively, it is clear that I s o k n , l is a finite group whose degree is equal to 2 l . Comparing the properties of (4) and those of (10), it is obvious that they are equivalent. In view of the group presentation of I s o k n , l , l 4 , owing to the property δ i δ i + 1 ( mod l ) δ i + 1 ( mod l ) δ i , we see that I s o k n , l is not abelian. Indeed, since I s o k n , l has the property of (10) and I s o k n , l has the same size as D l with respect to their multiplication tables (see the tables in Figure 3 and Figure 4), we can establish a homomorphism from D l to I s o k n , l which leads to an isomorphism because they have the same order 2 l and same numbers of generators with same orders. Writing down an explicit homomorphism from D l to I s o k n , l , we now prove an isomorphism between D l of (4) and I s o k n , l of (10) in the following way: consider the map
h : D l I s o k n , l
defined by
h ( r ) = α , h ( s ) = δ so that h ( r i s k ) = α i δ k , i , k [ 0 , l 1 ] Z ,
which leads to a homomorphism from D l to I s o k n , l . Let us now check if h is surjective. Since each element of I s o k n , l has the form α i δ k which is mapped by the established-map h, this mapping of h is eventually a surjection to lead to an isomorphism between D l and I s o k n , l .
(Case 2) Let us consider the case l N 1 \ { 1 , 3 } .
(Case 2-1) [l rotational symmetries of C k n , l with respect to the k-isomorphism of C k n , l ]
Using the methods referred to in (5) and (6), given the assumption, we obtain l rotations of C k n , l (see Figure 2(b)), which completes the proof.
(Case 2-2) [l reflection symmetries of C k n , l with respect to the k-isomorphism of C k n , l ]
Indeed, the l reflection symmetries of C k n , l , l N 1 , are similarly considered to those of C k n , l , l N 0 , as stated in (Case 1-2) (see (7)). However, as compared with the reflections referred to in (7), the current reflections are slightly different from the reflections referred to in (6) because of the odd number of l (compare Figure 1(2)–(4) and Figure 2(c)). □
Based on Theorem 5, let us now compare a geometric definition of D l and that of I s o k n , l .
Remark 3.
[Comparison a geometric definition of I s o k n , l and that of D l ]
(1) 
As for the rotations r producing D l , first of all, recall the geometric definition producing D l stated in (4). Meanwhile, as to the rotations of I s o k n , l , the element α I s o k n , l (see (6)) is termed the rotation or the generator of the cyclic piece of I s o k n , l (see (6)). However, there are some difference between α I s o k n , l and r D l with respect to the angles of the rotations. To be precise, let P : = { p i | i [ 0 , l 1 ] Z } be a regular l-gon with vertex p i P on the plane. In the case r k D l , with P, the rotation r proceeds evenly over 2 π k n angle. Namely, each of the vertices p i on P is transformed in terms of the one click counterclockwise movement on P by a constant angle.
Meanwhile, in the case α : = α i I s o k n , l , the element α is a self-k-isomorphism of C k n , l being mapped as in (5). Thus, we may recognize α I s o k n , l as one click movement of points of C k n , l in the counterclockwise direction (see the map f 1 in (5) and Figure 2(b) as an example). However, in light of these rotations, α I s o k n , l , α { α i | i [ 1 , l 1 ] Z } , is equivalent (not equal) to r D l because α l = e = r l . Meanwhile, unlike r D l (see (4)), the rotation α need not proceed evenly over a certain angle on the plane, which is a slightly different from the rotation r of D l .
(2) 
Comparing s i D l and δ i I s o k n , l , we see only one difference between them with respect to the reflection angle (see Figure 1 (4) and Figure 2(c)).
Example 1.
I s o 8 2 , 6 : = I s o k ( C 8 2 , 6 ) is isomorphic to the dihedral group D 6 .
(Case 1) [Rotation as an 8-isomorphism of C 8 2 , 6 ]
Let us consider the following self-map α i of C 8 2 , 6 : = ( z t ) t [ 0 , 5 ] Z defined in the following way (see Figure 1 (4)). For instance, consider six rotations of C 8 2 , 6 (see Figure 1 (4)), as follows: For i [ 0 , 5 ] Z ,
α i such that α i ( z t ) = z t + i ( mod 6 ) , t [ 0 , 5 ] Z .
Then, the map α i of ( 12 ) is a self-8-isomorphism of C 8 2 , 6 . From (12), we obtain the pair ( A , ) , where
A : = { α i | e : = α 0 = 1 C 8 2 , 6 , i [ 0 , 5 ] Z } ,
which makes ( A , ) the cyclic group < α > with ( α i ) 6 = 1 C 8 2 , 6 . Then, we clearly obtain A = 6 .
(Case 2) [Some reflections (diagonal like flips) of C 8 2 , 6 ]
Based on the reshaped digital-based rectangle (see Figure 1(1)(a) → (b) or (c) as an example) according to the 8-isomorphism of C 8 2 , 6 , we obviously have only six types of reflections as self-8-isomorphisms of C 8 2 , 6 (see the picture in Figure 1(4)). To be precise, we may represent these reflections more precisely in the following way (see Figure 1(4)).
δ 0 is the reflection about the diagonal joining the points z 0 , z 3 ; δ 1 is the reflection using a mirror axis in bisection between the two virtual line segments z 0 z 1 ¯ and z 3 z 4 ¯ ( see the number 1 : = δ 1 in Figure ( 4 ) ) ; δ 2 is the reflection about the axis joining by the points z 1 , z 4 ; δ 3 is the reflection using a mirror axis in bisection between the two virtual line segments z 1 z 2 ¯ and z 4 z 5 ¯ ( see the number 3 : = δ 3 in Figure ( 4 ) ) ; δ 4 is the reflection about the axis joining the points z 2 , z 5 ; and δ 5 is the reflection using a mirror axis in bisection between the two virtual line segments z 2 z 3 ¯ and z 5 z 0 ¯ ( see the number 5 : = δ 5 in Figure ( 4 ) ) .
Then, it is clear that the maps δ i , i [ 0 , 5 ] Z in ( 14 ) are self-8-isomorphisms of C 8 2 , 6 . Thereby, owing to (13) and (14), we obtain the pair ( B , ) , where (see Figure 1(4))
B : = { δ i | δ i 2 = 1 C 8 2 , 6 , δ i = α i δ 0 , i [ 0 , 5 ] Z } .
Then, it is clear that B = 6 . Besides, owing to the partition of I s o 8 2 , 6 by the set { A , B } , we see that I s o 8 2 , 6 = A B . In particular, in I s o 8 2 , 6 , after carefully examining the relationships among the elements of I s o 8 2 , 6 , we observe the following: For i , j [ 0 , 5 ] Z ,
α 6 = δ i 2 = e = ( α δ i ) 2 ; α i α j = α i + j ( mod l ) ; α i δ j = δ i + j ( mod 6 ) ; δ i α j = δ i j ( mod 6 ) ; δ i δ j = α i j ( mod 6 ) ; and δ i δ i + 1 ( mod 6 ) δ i + 1 ( mod 6 ) δ i .
With the dihedral group D 6 of (4) in mind, using the properties in (16), using the properties from (13) and (15), we finally have the presentation, as follows:
I s o 8 2 , 6 = < α , δ | α 6 = e = δ 2 , ( α δ ) 2 = e > .
Comparing the relation of (4) and that of (16) and further, taking a look at the multiplication table in Figure 4, we conclude that D 6 is isomorphic to I s o 8 2 , 6 . However, as already stated in the proof of Theorem 5, D 6 is not equal to I s o 8 2 , 6 . More precisely, we now establish the following map
h ( r ) = α , h ( s ) = δ , so that h ( r i s k ) = α i δ k , i , k [ 0 , 5 ] Z ,
as referred in the proof of Theorem 5. Indeed, since I s o 8 2 , 6 has two generators with the property (17) and it has the same size as D 6 . By mapping r α and s δ , we finally have an isomorphism between them (see the multiplication table in Figure 4).
Using a method similar to the process of Example 1, we obtain the following:
Example 2.
(1) I s o 26 3 , 5 : = I s o k ( C 26 3 , 5 ) is isomorphic to the dihedral group D 5 .
(2) I s o 8 2 , 7 : = I s o k ( C 8 2 , 7 ) is isomorphic to the dihedral group D 7 .
Theorem 6.
A k-isomorphism between ( X , k ) and ( Y , k ) implies an isomorphism between I s o k ( X ) and I s o k ( Y ) .
Proof. 
Let h : X : = ( X , k ) Y : = ( Y , k ) be a k-isomorphism.
Consider f I s o k ( X ) . Then, we obtain the composite h f h 1 I s o k ( Y ) . Thus, let us now define the map
h * : I s o k ( X ) I s o k ( Y ) such that h * ( f ) = h f h 1 .
Then, for any f 2 , f 1 I s o k ( X ) , we clearly obtain h * ( f 2 f 1 ) = h * ( f 2 ) h * ( f 1 ) and further, using the property of (18), we observe that h * is a bijection, which completes the proof. □
By Theorem 6, we obtain the following because the identity l 1 = l 2 obviously implies an isomorphism between I s o k ( C k n , l 1 ) and I s o k ( C k n , l 2 ) , as follows:
Corollary 2.
In a D T C ( k ) setting, I s o k ( C k n , l 1 ) is isomorphic to I s o k ( C k n , l 2 ) if and only if l 1 = l 2 .
According to Theorems 5 and 6, it is clear that I s o k ( C k n , l ) depends on the number l. Thus, for a ( k 1 , k 2 ) -isomorphism between C k 1 n 1 , l 1 and C k 2 n 2 , l 2 we obtain the following:
Corollary 3.
Given two digital images C k i n i , l i , i { 1 , 2 } , I s o k 1 ( C k 1 n 1 , l 1 ) is isomorphic to I s o k 2 ( C k 2 n 2 , l 2 ) if and only if l 1 = l 2 .

4. Fixed Points Sets of an I s o k ( C k n , l ) -Action on C k n , l and an I s o k ( C k n , l 1 C k n , l 2 ) -Action on C k n , l 1 C k n , l 2

Given a digital image ( X , k ) and D k ( X ) { I s o k ( X ) , C o n k ( X ) } , for f D k ( X ) , we use the notation F i x ( f ) : = { x X | f ( x ) = x } , where C o n k ( X ) is the set of self-k-continuous maps of ( X , k ) .
Definition 5.
Given a digital image ( X , k ) , we use the notation
F ( I s o k ( X ) ) : = { F i x ( f ) | f I s o k ( X ) } .
Let us now prove that F ( I s o k ( X ) ) is a digital topological invariant, as follows:
Proposition 2.
In a D T C ( k ) setting, F ( I s o k ( X ) ) is a digital topological invariant.
Proof. 
Let h : ( X , k ) ( Y , k ) be a k-isomorphism. Then, it suffices to prove that F ( I s o k ( X ) ) is equal to F ( I s o k ( Y ) ) . More explicitly, consider an arbitrary t F ( I s o k ( X ) ) . Then there is a set C X such that C = t , where for any x C and a certain f I s o k ( X ) we have the property f ( x ) = x . Then we need to prove that the number t belongs to F ( I s o k ( Y ) ) . Furthermore, using a method similar to this approach above, we need to prove that any element s in F ( I s o k ( Y ) ) also belongs to F ( I s o k ( X ) ) .
As mentioned above, given a number t F ( I s o k ( X ) ) , take the set C X such that C = t , where for a certain f I s o k ( X ) we obtain that any x C has the property f ( x ) = x . Since h is a k-isomorphism, we have h ( C ) = C . By (18), take g : = h f h 1 . Then, we clearly obtain g I s o k ( Y ) . Then, for y h ( C ) , let x = h 1 ( y ) . Since we obtain
g ( y ) = h f h 1 ( y ) = h f ( x ) = h ( x ) = y .
Let us now put D : = F i x ( g ) , which implies that h ( C ) D so that
C D .
Similarly, for any y D , let us put x : = h 1 ( y ) . Then, using a method similar to the process of (19), for any g I s o k ( Y ) , after putting f : = h 1 g h , we obtain
f ( x ) = x so that h 1 ( D ) C
which implies that
D C .
Due to the properties of (20) and (21), we obtain that F ( I s o k ( Y ) ) is equal to F ( I s o k ( X ) ) . □
By Theorem 6 and Proposition 2, we obtain the following:
Corollary 4.
Consider two digital images ( X , k 1 ) , ( Y , k 2 ) which are ( k 1 , k 2 ) -isomorphic. Then F ( I s o k 1 ( X ) ) is equal to F ( I s o k 2 ( Y ) ) .
Since both C k n , l and C k n , l 1 C k n , l 2 play important roles in digital geometry, let us characterize the set of cardinalities of the fixed sets of self-k-continuous maps of them.
Lemma 2.
Given C k n , l with 4 l N 0 , F ( I s o k ( C k n , l ) ) = { 0 , 2 , l } .
Proof. 
With the hypothesis, consider f I s o k ( C k n , l ) . By Theorem 5, it is clear that f A in (6) or f B in (8) (see Figure 1).
(Case 1) Assume f = 1 C k n , l A in (6). Then we obtain F i x ( f ) = l .
(Case 2) Assume f { α i | i [ 1 , l 1 ] Z } A in (6). Then we have F i x ( f ) = 0 .
(Case 3) Assume f B in (8). Then we obtain F i x ( f ) { 0 , 2 } . □
Unlike the above case of 4 l N 0 , for an odd number 5 l N 1 (see also the property (2)), we obtain the following:
Lemma 3.
Given C k n , l with 5 l N 1 , F ( I s o k ( C k n , l ) ) = { 0 , 1 , l } .
Proof. 
In the case of 5 l N 1 , the proof of { 0 , l } F ( I s o k ( C k n , l ) ) is proceeded by using a method similar to the proofs of the Cases 1 and 2 stated in the proof of Lemma 2. However, unlike the Case 3 referred to in the proof of Lemma 2, in the case that f is a reflection of C k n , l , l N 1 , as shown in Figure 2(c), we obtain F i x ( f ) = 1 . □
Based on the properties from Lemmas 2 and 3, we obtain the following:
Theorem 7.
Given ( C k n , l 1 C k n , l 2 , k ) with l 1 = l 2 N 0 , F ( I s o k ( C k n , l 1 C k n , l 2 ) ) = { l 1 + l 2 1 , l 1 + 1 , 3 , 1 } .
Proof. 
Using Theorem 5 and Lemmas 2 and 3, we need to consider the following several cases.
(Case 1) Making the part C k n , l 1 or C k n , l 2 of C k n , l 1 C k n , l 2 remained, we consider a certain symmetry of C k n , l 1 C k n , l 2 referred to in (6). More explicitly, we first consider 1 C k n , l 1 C k n , l 2 to obtain l 1 + l 2 1 F ( I s o k ( C k n , l 1 C k n , l 2 ) ) .
Second, as another case, after fixing C k n , l 1 (resp. C k n , l 2 ) of C k n , l 1 C k n , l 2 , we further consider a certain symmetry of the part C k n , l 2 (resp. C k n , l 1 ) introduced in (8) to obtain l 1 + 1 F ( I s o k ( C k n , l 1 C k n , l 2 ) ) .
(Case 2) Fixing the point in C k n , l 1 C k n , l 2 and using the property (8), we further consider the reflection of both C k n , l 1 and C k n , l 2 on themselves respectively to obtain 3 F ( I s o k ( C k n , l 1 C k n , l 2 ) ) .
(Case 3) Fixing the point in C k n , l 1 C k n , l 2 and exchanging the points of C k n , l 1 and those of C k n , l 2 under a k-isomorphism to obtain 1 F ( I s o k ( C k n , l 1 C k n , l 2 ) ) . □
Unlike the case of l 1 = l 2 N 0 of ( C k n , l 1 C k n , l 2 , k ) stated in Theorem 7, using a method similar to the proof of Theorem 7, we obtain the following:
Corollary 5.
Given ( C k n , l 1 C k n , l 2 , k ) with l 1 , l 2 N 0 and l 1 l 2 , F ( I s o k ( C k n , l 1 C k n , l 2 ) ) = { l 1 + l 2 1 , l 1 + 1 , l 2 + 1 , 3 } .
Proof. 
The assertion of { l 1 + l 2 1 , l 1 + 1 , l 2 + 1 } F ( I s o k ( C k n , l 1 C k n , l 2 ) ) is proved by using the methods referred to in the cases of Theorem 7. However, since l 1 l 2 , we cannot further proceed with the process of Case 3 of the proof of Theorem 7. □
Let us now consider the cases l 1 N 0 , l 2 N 1 or l 2 N 0 , l 1 N 1 . Without loss of generality, we may consider the case l 1 N 0 , l 2 N 1 (see Figure 5b), as follows:
Theorem 8.
Given ( C k n , l 1 C k n , l 2 , k ) with l 1 N 0 , l 2 N 1 , F ( I s o k ( C k n , l 1 C k n , l 2 ) ) = { l 1 + l 2 1 , l 1 , l 2 + 1 , 2 } .
Proof. 
Using a method similar to the proof of Theorem 7, we complete the proof. To guarantee this approach, for instance, given C 26 3 , 5 C 26 3 , 6 in Figure 5b, we obtain F 26 ( I s o 26 ( C 26 3 , 5 C 26 3 , 6 ) ) = { 10 , 6 , 2 } . □
Let us now investigate F ( I s o k ( C k n , l 1 C k n , l 2 ) ) for the case of l 1 , l 2 N 1 .
Theorem 9.
Given ( C k n , l 1 C k n , l 2 , k ) with l 1 , l 2 N 1 , we obtain the following:
(1) 
F ( I s o k ( C k n , l 1 C k n , l 2 ) ) = { l 1 + l 2 1 , l 1 , 1 } if l 1 = l 2 .
(2) 
F ( I s o k ( C k n , l 1 C k n , l 2 ) ) = { l 1 + l 2 1 , l 1 , l 2 } if l 1 l 2 .
Proof. 
Using Theorem 5 and Lemmas 2 and 3, we need to consider the following cases.
(1)
In the case of l 1 = l 2 N 1 , making the part C k n , l 1 of C k n , l 1 C k n , l 2 remained, we consider a certain symmetry of C k n , l 1 C k n , l 2 used in the Case 2 of the proof of Theorem 5. Then we first consider 1 C k n , l 1 C k n , l 2 to obtain l 1 + l 2 1 F ( I s o k ( C k n , l 1 C k n , l 2 ) ) .
Second, we can consider a certain symmetry of C k n , l 1 C k n , l 2 referred to in (8) to obtain l 1 F ( I s o k ( C k n , l 1 C k n , l 2 ) ) .
Third, making the point in C k n , l 1 C k n , l 2 fixed and using the property referred to in the Case 2 of the proof of Theorem 5 (see also the property (8)), we map the points of C k n , l 1 onto those of C k n , l 2 under a k-isomorphism to obtain 1 F ( I s o k ( C k n , l 1 C k n , l 2 ) ) .
Fourth, making the point in C k n , l 1 C k n , l 2 fixed and exchanging the points of C k n , l 1 and those of C k n , l 2 under a k-isomorphism, we obtain 1 F ( I s o k ( C k n , l 1 C k n , l 2 ) ) . To support this process, for instance, given C 26 3 , 5 C 26 3 , 5 in Figure 5a, we obtain F 26 ( I s o 26 ( C 26 3 , 5 C 26 3 , 5 ) ) = { 9 , 5 , 1 } .
(2)
In the case of l 1 l 2 N 1 , using a method similar to the proof of the above Case 1 and the proof of Corollary 5, we complete the proof. For instance, we obtain F ( I s o k ( C 8 2 , 7 C 8 2 , 9 ) ) = { 15 , 9 , 7 } .
Let us now recall the notion of digital ( k , k ) -imbedding to study some generalized versions of Theorems 7–9 and Corollary 5.
Definition 6.
[39] Consider two digital images ( X , k : = k ( t , n ) ) , X Z n and ( Y , k : = k ( t , n ) ) , Y Z n such that there is an arbitrary ( k , k ) -isomorphism h : ( X , k ) ( h ( X ) , k ) ( Y , k ) . Then, ( X , k ) is said to be a digital topological imbedding into ( Y , k ) with respect to the ( k , k ) -isomorphism h or the map h is called a digital topological ( k , k ) -imbedding from ( X , k ) into ( Y , k ) .
Definition 7.
In Definition 6, as to k : = k ( t , n ) for X and k : = k ( t , n ) for Y, if t = t , then ( X , k ) is said to be a strictly digital topological imbedding into ( Y , k ) with respect to the ( k , k ) -isomorphism h. In particular, in the case X Z n with the same k-adjacency of both X and Z n , a digital topological imbedding is simply understood to be an inclusion ( X , k ) ( Z n , k ) .
Based on the concept of the digital topological imbedding above, let us now make the digital wedge ( C k n , l 1 C k n , l 2 , k ) more generalized, as follows:
Definition 8.
[39] Given two digital images ( X , k 1 ) in Z n 1 and ( Y , k 2 ) in Z n 2 , where k 1 : = k ( t 1 , n 1 ) and k 2 : = k ( t 2 , n 2 ) , take n : = max { n 1 , n 2 } and t : = max { t 1 , t 2 } . Then, we define a digital wedge of ( X , k 1 ) and ( Y , k 2 ) in Z n with a k-adjacency of Z n , where k : = k ( t , n ) , denoted by ( X Y , k ) , as one point union of the certain digital images ( X , k 1 : = k ( t 1 , n ) ) and ( Y , k 2 : = k ( t 2 , n ) ) in Z n satisfying the following properties.
(W1) 
There are the following digital topological imbeddings,
f : ( X , k 1 ) ( X , k 1 ) w i t h r e s p e c t t o a ( k 1 , k 1 ) - i s o m o r p h i s m a n d g : ( Y , k 2 ) ( Y , k 2 ) w i t h r e s p e c t t o a ( k 2 , k 2 ) - i s o m o r p h i s m ,
such that the set X Y Z n is assumed with the k-adjacency and further,
(W2) 
X Y is a singleton, say { p } ,
(W3) 
X \ { p } and Y \ { p } are not k-adjacent, and
(W4) 
as for the subsets ( X , k ) , ( Y , k ) ( X Y , k ) , the following properties hold.
W X : ( X , k ) ( X , k 1 ) i s a ( k , k 1 ) - i s o m o r p h i s m a n d W Y : ( Y , k ) ( X , k 2 ) is a ( k , k 2 ) - i s o m o r p h i s m .
In view of this feature, we may consider ( X Y , k ) to be ( X Y , k ) which is one point union of X and Y with k-adjacency.
As mentioned in [39], given C k i n i , l i , i { 1 , 2 } , not every C k 1 n 1 , l 1 C k 2 n 2 , l 2 always exists in Z n with a certain k-adjacency of Z n , where n : = max { n 1 , n 2 } . For instance, given C 4 2 , 8 and C 8 2 , 6 , no C 4 2 , 8 C 8 2 , 6 exists in Z 2 for any k-adjacency, where k { 4 , 8 } . However, given C 26 3 , 5 and C 18 3 , 6 , we can consider C 26 3 , 5 C 18 3 , 6 in Z 3 with 26-adjacency, i.e., ( C 26 3 , 5 C 18 3 , 6 , 26 ) (see Figure 5b). Based on the generalized digital wedge from Definition 8, we obtain the following:
Theorem 10.
Given ( C k 1 n , l 1 C k 2 n , l 2 , k ) with l 1 , l 2 N 0 , we obtain the following:
(1) 
F ( I s o k ( C k 1 n 1 , l 1 C k 2 n 2 , l 2 ) ) = { l 1 + l 2 1 , l 1 + 1 , 3 , 1 } if l 1 = l 2 .
(2) 
F ( I s o k ( C k 1 n 1 , l 1 C k 2 n 2 , l 2 ) ) = { l 1 + l 2 1 , l 1 + 1 , l 2 + 1 , 3 } if l 1 l 2 .
Proof. 
Using certain methods similar to the proofs of (1) and (2) of Theorem 7 and the proof of Corollary 5, we complete the proof. □
Theorem 11.
Given ( C k 1 n , l 1 C k 2 n , l 2 , k ) with l 1 , l 2 N 1 , we obtain the following:
(1) 
F ( I s o k ( C k 1 n 1 , l 1 C k 2 n 2 , l 2 ) ) = { l 1 + l 2 1 , l 1 , 1 } if l 1 = l 2 .
(2) 
F ( I s o k ( C k 1 n 1 , l 1 C k 2 n 2 , l 2 ) ) = { l 1 + l 2 1 , l 1 , l 2 } if l 1 l 2 .
Proof. 
Using certain methods similar to the proofs of (1) and (2) of Theorem 9, we complete the proof. □
Theorem 12.
Given ( C k 1 n 1 , l 1 C k 2 n 2 , l 2 , k ) with l 1 N 0 , l 2 N 1 , F ( I s o k ( C k 1 n 1 , l 1 C k 2 n 2 , l 2 ) ) = { l 1 + l 2 1 , l 1 , l 2 + 1 , 2 } .
Proof. 
Using a certain method similar to the proof of Theorem 8, we complete the proof. □
Remark 4.
In view of Lemmas 2 and 3 and Theorems 7–10, and Corollary 5, for X { C k n , l , C k n , l 1 C k n , l 2 , C k 1 n 1 , l 1 C k 2 n 2 , l 2 } , we observe that each F ( I s o k ( X ) ) depends on the numbers l , l i , i { 1 , 2 } .

5. Conditions Being the Perfectness of F ( C o n k ( C k n , l 1 C k n , l 2 ) ) , l 1 , l 2 N 0

As for the study of some properties of F ( C o n k ( C k n , l 1 C k n , l 2 ) ) , we have recently studied the following cases, l i N 1 , i { 1 , 2 } [39] and l 1 N 0 , l 2 N 1 (or l 1 N 1 , l 2 N 0 ) [39]. Thus, for the case of l i N 0 , i { 1 , 2 } , the study of F ( C o n k ( C k n , l 1 C k n , l 2 ) ) still remains. This section explores certain conditions which make F ( C o n k ( C k n , l 1 C k n , l 2 ) ) perfect. Based on the study of F ( C o n k ( X ) ) [8], and the property of (2), where X { C k n , l C k n , 4 , C k n , l C k n , 4 C k n , 4 C k n , 4 , C k n , l C k n , 6 , C k n , l C k n , 6 C k n , 6 , C k n , l C k n , 6 C k n , 4 | l N 0 } , this section investigates some digital topological properties of C k n , l 1 C k n , l 2 , where l i N 0 \ { 2 } , i { 1 , 2 } . Since C k n , l 1 C k n , l 2 is k-isomorphic to C k n , l 2 C k n , l 1 and an alignment of fixed point sets is a digital topological invariant (see Proposition 3), we obtain
F ( C o n k ( C k n , l 1 C k n , l 2 ) ) = F ( C o n k ( C k n , l 2 C k n , l 1 ) ) .
Furthermore, given a digital image ( X , k ) , after studying C o n k ( X ) -action on a digital object ( X , k ) , we investigate certain properties of fixed point sets of ( X , k ) by the C o n k ( X ) -action on ( X , k ) . Regarding this approach, we count on certain roles of C k n , 6 and C k n , 4 that are involved in the perfectness of F ( C o n k ( C k n , l 1 C k n , l 2 ) ) (see Definition 11). Indeed, the study of F ( C o n k ( C k n , l 1 C k n , l 2 ) ) still remains open. Up to now, it turns out that digital fundamental groups of C k n , l C k n , 4 and C k n , l C k n , 6 are strongly related to the digital topological features of alignments of fixed point sets of them (see Theorem 13). Given f C o n k ( X ) , we use the notation F i x ( f ) : = { x X | f ( x ) = x } .
Definition 9.
[26] Given a digital image ( X , k ) , we say
F ( C o n k ( X ) ) : = { F i x ( f ) | f C o n k ( X ) } .
Given D k ( X ) { I s o k ( X ) , C o n k ( X ) } , for f D k ( X ) , we define F i x ( f ) : = { x X | f ( x ) = x } . As a generalization of F ( C o n k ( X ) ) [8,26], the following is defined.
Definition 10.
Given a digital object ( X , k ) , we say that the digital image
F ( D k ( X ) ) : = { F i x ( f ) | f D k ( X ) } : = ( F ( D k ( X ) ) , 2 )
is an alignment of the set of cardinalities of fixed point sets of maps in D k ( X ) , where D k ( X ) { I s o k ( X ) , C o n k ( X ) } . Then, we call ( F ( D k ( X ) ) , 2 ) (or F ( D k ( X ) ) for brevity) an alignment of fixed point sets of ( X , k ) according to D k ( X ) .
In view of Definition 10, it is clear that ( F ( C o n k ( X ) ) , 2 ) is a special case of ( F ( D k ( X ) ) , 2 ) stated in Definition 9. Using Lemma 4, we obtain the following:
Proposition 3.
[26] The quantity F ( C o n k ( X ) ) is a digital topological invariant.
Definition 11.
[8] Given ( X , k ) , if F ( C o n k ( X ) ) = [ 0 , X ] Z , then ( F ( C o n k ( X ) ) , 2 ) (or F ( C o n k ( X ) ) for brevity) is said to be perfect.
Remark 5.
In view of Lemmas 2 and 3 and Theorems 7–12, we observe that each F ( I s o k ( X ) ) , X { C k n , l , C k 1 n 1 , l 1 C k 2 n 2 , l 2 } , is a proper subset of [ 0 , X ] Z .
We now explore some conditions supporting perfectness of an alignment of fixed point sets.
Lemma 4.
(1) 
In the case C k n , l is k-contractible, F ( C o n k ( C k n , l ) ) is perfect [8].
(2) 
In the case C k n , l is not k-contractible, F ( C o n k ( C k n , l ) ) is not perfect [8].
(3) 
Given C k n , l , l N 0 , F ( C o n k ( C k n , l ) ) = [ 0 , l 2 + 1 ] Z { l } [26].
Regarding Lemma 4, we also need to remind that not every k-contractible digital image ( X , k ) has a perfect F ( C o n k ( X ) ) [26]. However, by Lemma 4, it is clear that the k-contractibility of C k n , l implies the perfectness of F ( C o n k ( C k n , l ) ) and the converse also holds [8]. This section is based on the studies of some digital topological properties of F ( C o n k ( C k n , l C k n , 4 ) ) in [8] and the perfectness of it associated with the number l, where l 4 [8]. One important thing to note is that we need to recall that the digital k-fundamental group of C k n , l C k n , 4 is trivial or an infinite cyclic group with an infinite order depending on the number l (see Theorem 3). For instance, C k n , 4 C k n , 4 is k-contractible [5], and if l 6 , then C k n , l C k n , 4 is not k-contractible [5] (see also Theorem 3).
In view of Theorems 3–5, since the number l of C k n , l strongly influences some digital topological properties of C k n , l . In particular, depending on the number l (even or odd), many digital topological properties of C k n , l are determined. A recent paper [26] only proposed the property referred to in Lemma 4(3). In view of the property of (2), we need the following result improving the assertion of [26] (see Lemma 4(3)).
Lemma 5.
[8] Given C k n , l with 5 l N 1 , F ( C o n k ( C k n , l ) ) = [ 0 , l + 1 2 ] Z { l } .
Theorem 13.
Given ( C k n , l 1 C k n , l 2 , k ) , l i N \ { 1 , 2 , 3 } , if π k ( C k n , l 1 C k n , l 2 ) is isomorphic to an infinite cyclic group such that | l 1 l 2 | 6 or trivial, then F ( C o n k ( C k n , l 1 C k n , l 2 ) ) is perfect.
Proof. (Case 1) Let us consider the case that π k ( C k n , l 1 C k n , l 2 ) is trivial. Then, by Theorem 3, owing to the k-homotopic property of C k n , l 1 C k n , l 2 , by the properties ( 2 ) and ( 3 ) of Definition 2, it is clear that each C k n , l 1 and C k n , l 2 are k-contractible. Thus, by Theorem 3, we have only the case C k n , 4 C k n , 4 . Then, by Lemma 4, we obtain
F ( C o n k ( C k n , 4 C k n , 4 ) ) = [ 0 , 7 ] Z ,
which proves the perfectness of F ( C o n k ( C k n , 4 C k n , 4 ) ) .
(Case 2) Let us consider the case that π k ( C k n , l 1 C k n , l 2 ) is isomorphic to an infinite cyclic group. Then, without loss of generality we may replace C k n , l 1 C k n , l 2 by C k n , l C k n , 4 or C k n , 4 C k n , l (see (22)), where l 5 .
Without loss of generality, we may take C k n , l C k n , 4 .
(Case 2-1) Let us assume 6 l N 0 . Owing to the part C k n , 4 of C k n , l C k n , 4 , if l 10 , by Lemma 4(3), we obtain [8]
F ( C o n k ( C k n , l C k n , 4 ) ) = [ 0 , l + 3 ] Z ,
which implies the perfectness of F ( C o n k ( C k n , l C k n , 4 ) ) because ( C k n , l C k n , 4 ) = l + 3 .
(Case 2-2) Let us assume 5 l N 1 . Owing to the part C k n , 4 of C k n , l C k n , 4 , if l 9 , by Lemma 5, we obtain [8]
F ( C o n k ( C k n , l C k n , 4 ) ) = [ 0 , l + 3 ] Z ,
which implies the perfectness of F ( C o n k ( C k n , l C k n , 4 ) ) because ( C k n , l C k n , 4 ) = l + 3 . □
Since the perfectness of F ( C o n k ( C k n , l 1 C k n , l 2 ) ) depends on the numbers l 1 and l 2 , the paper [8] investigated various properties of F ( C o n k ( C k n , l C k n , 4 ) ) , F ( C o n k ( C k n , l C k n , 4 C k n , 4 ) ) , F ( C o n k ( C k n , l C k n , 6 ) ) , and so on.
As mentioned in the earlier part, sinc C k n , 6 also plays a crucial role in digital and computational topology. Let us explore an alignment of fixed point sets of C k n , l C k n , 6 . Let us now explore F ( C o n k ( C k n , l C k n , 6 ) ) for the case l 16 .
Theorem 14.
In the case 16 l N 0 , F ( C o n k ( C k n , l C k n , 6 ) ) has three 2-components. Namely, F ( C o n k ( C k n , l C k n , 6 ) ) = [ 0 , l + 5 ] Z \ ( { l 1 , l 2 , , l i } { l + 4 } ) , where i = l 14 2 .
Proof. 
Regarding F ( C o n k ( C k n , l C k n , 6 ) ) , though there are several cases of self-k-continuous maps of C k n , l C k n , 6 we have the following four cases.
( a ) f | C k n , 6 ( x ) = x ; or ( b ) f | C k n , l ( x ) = x ; or ( c ) f ( C k n , l ) C k n , l and f ( C k n , 6 ) C k n , 6 ; or ( d ) f does not have any fixed point .
First, from (a) we obtain the following:
[ 6 , 6 + l 2 ] Z { l + 5 } F ( C o n k ( C k n , l C k n , 6 ) ) .
Second, from (b) we have the following:
[ l , l + 3 ] Z F ( C o n k ( C k n , l C k n , 6 ) ) .
Third, from (c) and (d), the following is obtained.
[ 0 , l 2 + 4 ] Z F ( C o n k ( C k n , l C k n , 6 ) ) .
Hence based on these three quantities as subsets of F ( C o n k ( C k n , l C k n , 6 ) ) , we obtain
F ( C o n k ( C k n , l C k n , 6 ) ) = [ 0 , l 2 + 6 ] Z [ l , l + 3 ] Z { l + 5 } .
For instance, in the case l = 16 , we obtain
F ( C o n k ( C k n , 16 C k n , 6 ) ) = [ 0 , 14 ] Z [ 16 , 19 ] Z { 21 } .
Thus, in view of these calculations and by the property in (23), in the case l 16 , we can conclude that F ( C o n k ( C k n , l C k n , 6 ) ) has three 2-components. Furthermore, we have the formula representing (23) in the following way. If l 16 , then we obtain
F ( C o n k ( C k n , l C k n , 6 ) ) = [ 0 , l + 5 ] Z \ ( { l 1 , l 2 , , l i } { l + 4 } ) ,
where i = l 14 2 . □
Example 3.
F ( C o n k ( C k n , 22 C k n , 6 ) ) = [ 0 , 27 ] Z \ ( { 21 , 20 , 19 , 18 } { 26 } ) . Thus, we see that the alignment ( F ( C o n k ( C k n , 22 C k n , 6 ) ) , 2 ) has three 2-components.
Based on Theorems 13 and 14, we obtain the following:
Theorem 15.
Assume l 1 l 2 ( 6 ) N 0 . Then, F ( C o n k ( C k n , l 1 C k n , l 2 ) ) = [ 0 , l 2 + l 1 2 ] Z [ l 1 , l 1 + l 2 2 ] Z { l 1 + l 2 1 } .
Proof. 
Using a method similar to the approach taken in (23), regarding F ( C o n k ( C k n , l 1 C k n , l 2 ) ) , it is sufficient to consider the following k-continuous self-maps f of C k n , l 1 C k n , l 2 such that
( a ) f | C k n , l 2 ( x ) = x ; or ( b ) f | C k n , l 1 ( x ) = x ; or ( c ) f ( C k n , l i ) C k n , l i , i { 1 , 2 } ; or ( d ) f does not have any fixed point , where f | B means the restriction function f to the given set B .
First of all, from (a) above and Lemma 4, since C k n , l 1 C k n , l 2 has the cardinality l 1 + l 2 1 , we obtain
[ l 2 , l 2 + l 1 2 ] Z { l 1 + l 2 1 } F ( C o n k ( C k n , l 1 C k n , l 2 ) ) .
Second, from (b) above, we have
[ l 1 , l 1 + l 2 2 ] Z { l 1 + l 2 1 } F ( C o n k ( C k n , l 1 C k n , l 2 ) ) .
Third, from (c) and (d) above, we obtain
[ 0 , l 1 + l 2 2 + 1 ] Z F ( C o n k ( C k n , l 1 C k n , l 2 ) ) .
Owing to the hypothesis “ l 1 l 2 , l i 6 , i { 1 , 2 } ”, and the Properties (24)–(26), we conclude that
F ( C o n k ( C k n , l 1 C k n , l 2 ) ) = [ 0 , l 2 + l 1 2 ] Z [ l 1 , l 1 + l 2 2 ] Z { l 1 + l 2 1 }
which completes the proof.
For instance, in the case l 1 = 14 and l 2 = 6 , we obtain
F ( C o n k ( C k n , 14 C k n , 6 ) ) = [ 0 , 17 ] Z { 19 } .
Example 4.(1) F ( C o n 8 ( C 8 2 , 18 C 8 2 , 6 ) ) = [ 0 , 15 ] Z [ 18 , 21 ] Z { 23 } .
(2) F ( C o n 8 ( C 8 2 , 20 C 8 2 , 8 ) ) = [ 0 , 18 ] Z [ 20 , 24 ] Z { 27 } .
As shown in (1) and (2) above, we observe that these alignments consist of three 2-components.
In view of Proposition 3, we obtain the following:
Corollary 6.
Given a digital image ( X , k ) , the perfectness of F ( C o n k ( X ) ) is a digital topological invariant.

6. Conclusions

We have addressed five issues posed in Section 1, which can facilitate the studies of both digital topology and fixed point theory. One of the important things that comes from this paper is the development of group structures, I s o k n , l which play crucial roles in studying digital images from the viewpoint of fixed point theory. Besides, we have explored various properties of fixed point sets of the I s o k n , l ( · ) -actions in a D T C setting. On top of this, we have intensively studied the algebraic topological structures of I s o k n , l ( · ) and C o n k ( · ) . Furthermore, given a digital image ( X , k ) C o n k ( X ) - and I s o k ( X ) -action on ( X , k ) , we have studied some alignments of fixed point sets by these actions.
As a further work, we can study various properties of these actions from the aspect of digital geometry. The obtained results in the D T C setting can be applied to the fields of chemistry, physics, computer sciences and so on. In particular, this approach can be extremely useful in the fields of classifying molecular structures, computer graphics, image processing, approximation theory, game theory, mathematical morphology, optimization theory, digitization, information processing, rough set theory, and so forth.

Funding

The author was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education, Science and Technology(2019R1I1A3A03059103).

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Berge, C. Graphs and Hypergraphs, 2nd ed.; North-Holland: Amsterdam, The Netherlands, 1976. [Google Scholar]
  2. Chen, L. Digital and Discrete Geometry, Theory and Algorithm; Springer: Berlin/Heidelberg, Germany, 2014; ISBN 978-3-319-12098-0. [Google Scholar]
  3. Ghorbani, M.; Songhori, M. Polyhdral graphs via their automorphism group. Appl. Math. Comput. 2018, 321, 1–10. [Google Scholar]
  4. Han, S.-E. Digital coverings and their applications. J. Appl. Math. Comput. 2005, 18, 487–495. [Google Scholar]
  5. Han, S.-E. Non-product property of the digital fundamental group. Inf. Sci. 2005, 171, 73–92. [Google Scholar] [CrossRef]
  6. Han, S.-E. On the simplicial complex stemmed from a digital graph. Honam Math. J. 2005, 27, 115–129. [Google Scholar]
  7. Han, S.-E. Remarks on the preservation of the almost fixed point property involving several types of digitizations. Mathematics 2019, 7, 954. [Google Scholar] [CrossRef] [Green Version]
  8. Han, S.-E. Fixed point sets of digital curves and digital surfaces. Mathematics 2020, 8, 1869. [Google Scholar] [CrossRef]
  9. Khalimsky, E. Motion, deformation, and homotopy in finite spaces. In Proceedings of the IEEE International Conferences on Systems, Man, and Cybernetics, Alexandria, Egypt, 20 October 1987; pp. 227–234. [Google Scholar]
  10. Khalimsky, E. Topological structures in computer sciences. J. Appl. Math. Simul. 1987, 1, 25–40. [Google Scholar] [CrossRef]
  11. Khalimsky, E. Pattern analysis of n-dimensional digital images. In Proceedings of the IEEE International Conferences on Systems, Man, and Cybernetics, Alberta, GA, USA, 14 October 1986; pp. 1562–1599. [Google Scholar]
  12. Kiselman, C.O. Digital Geometry and Mathematical Morphology; Lecture Notes; Department of Mathematics, Uppsala University: Uppsala, Sweden, 2002. [Google Scholar]
  13. Kong, T.Y.; Rosenfeld, A. Digital topology: Introduction and survey. Comput. Vision Graph. Image Process. 1989, 48, 357–393. [Google Scholar] [CrossRef]
  14. Kong, T.Y.; Rosenfeld, A. Topological Algorithms for the Digital Image Processing; Elsevier Science: Amsterdam, The Netherlands, 1993. [Google Scholar]
  15. Kovalevsky, V. Finite topology as applied to image analysis. Comput. Vis. Graph. Image Process. 1989, 46, 141–161. [Google Scholar] [CrossRef] [Green Version]
  16. Kovalevsky, V. Axiomatic Digital Topology. J. Math. Imaging Vis. 2006, 26, 41–58. [Google Scholar] [CrossRef] [Green Version]
  17. Rosenfeld, A. Digital topology. Am. Math. Mon. 1979, 86, 76–87. [Google Scholar] [CrossRef]
  18. Rosenfeld, A. Continuous functions on digital pictures. Pattern Recognit. Lett. 1986, 4, 177–184. [Google Scholar] [CrossRef]
  19. Szymik, M. Homotopies and the universal point property. Order 2015, 32, 30–311. [Google Scholar] [CrossRef] [Green Version]
  20. Masuda, K. Nonlinearizable actions of dihedral groups on affine space. Trans. Am. Math. Soc. 2004, 356, 3545–3556. [Google Scholar] [CrossRef] [Green Version]
  21. Rimlinger, F. Free actions on R-trees. Trans. Am. Math. Soc. 1992, 332, 313–329. [Google Scholar]
  22. Kenyon, R. A group of paths in R2. Trans. Am. Math. Soc. 1996, 348, 3155–3172. [Google Scholar] [CrossRef]
  23. Barmark, J.A.; Costa, I.S. On a question of R.H. Bing concerning the fixed point property for two-dimensinal polyhedra. Adv. Math. 2017, 305, 339–350. [Google Scholar] [CrossRef] [Green Version]
  24. Buijs, U.; Flix, Y.; Murillo, A. Rational homotopy of the (homotopy) fixed point sets of circle action. Adv. Math. 2009, 222, 151–171. [Google Scholar] [CrossRef]
  25. Oliver, B.; Segev, Y. Fixed point free actions on Z-acyclic 2-complex. Acta Math. 2002, 189, 203–285. [Google Scholar] [CrossRef]
  26. Boxer, L.; Staecker, P.C. Fixed point sets in digital topology, 1. Appl. Gen. Topol. 2020, 21, 87–110. [Google Scholar] [CrossRef] [Green Version]
  27. May, J.P.; Ponto, K. More concise algebraic topology. In Chicago Lectures in Mathmatics; The University of Chigago: Chigago, IL, USA; London, UK,, 2011. [Google Scholar]
  28. Han, S.-E. Estimation of the complexity of a digital image form the viewpoint of fixed point theory. Appl. Math. Comput. 2019, 347, 236–248. [Google Scholar]
  29. Han, S.-E. Strong k-deformation retract and its applications. J. Korean Math. Soc. 2007, 44, 1479–1503. [Google Scholar] [CrossRef] [Green Version]
  30. Herman, G.T. Oriented surfaces in digital spaces. CVGIP Graph. Model. Image Process. 1993, 55, 381–393. [Google Scholar] [CrossRef]
  31. Boxer, L. Approximate fixed point properties in digital topology. Bull. Int. Math. Vertual Inst. 2020, 10, 357–367. [Google Scholar]
  32. Boxer, L. A classical construction for the digital fundamental group. J. Math. Imaging Vis. 1999, 10, 51–62. [Google Scholar] [CrossRef]
  33. Han, S.-E. Non-ultra regular digital covering spaces with nontrivial automorphism groups. Filomat 2013, 27, 1205–1218. [Google Scholar] [CrossRef]
  34. Munkres, J.R. Topology; Prentice-Hall Inc.: Upper Saddle River, NJ, USA, 1975. [Google Scholar]
  35. Han, S.-E. On the classification of the digital images up to a digital homotopy equivalence. J. Comput. Commun. Res. 2000, 10, 194–204. [Google Scholar]
  36. Han, S.-E.; Park, B.G. Digital Graph (k0,k1)-Homotopy Equivalence and Its Applications. 2003. Available online: http://atlas-conferences.com/c/a/k/b/35.htm (accessed on 2 January 2021).
  37. Wechsler, M.T. Homeomorphism groups of certain topological spaces. Ann. Math. 1955, 62, 360–373. [Google Scholar] [CrossRef]
  38. Hungaford, T.W. Algebra; Springer: New York, NY, USA, 1974. [Google Scholar]
  39. Han, S.-E. The most refined axiom for a digital covering space and its utilities. Mathematics 2020, 8, 1868. [Google Scholar] [CrossRef]
Figure 1. On several portions of Z 2 , the following figures are described. (1) Explanation of reshaping the given C 8 2 , 14 (see (a)) to another C 4 2 , 14 : = ( x i ) i [ 0 , 11 ] Z with i : = x i for brevity (see (b)) or C 8 2 , 14 (see (c)) which are loosely similar to the digital l-gons in Z 2 . (2,3) Configuration of a geometric definition of i : = δ i I s o 4 2 , 4 , i [ 0 , 3 ] Z and i : = δ i I s o 8 2 , 4 , i [ 0 , 3 ] Z ; (4) Configuration of a geometric definition of i : = δ i I s o 8 2 , 6 , i [ 0 , 5 ] Z .
Figure 1. On several portions of Z 2 , the following figures are described. (1) Explanation of reshaping the given C 8 2 , 14 (see (a)) to another C 4 2 , 14 : = ( x i ) i [ 0 , 11 ] Z with i : = x i for brevity (see (b)) or C 8 2 , 14 (see (c)) which are loosely similar to the digital l-gons in Z 2 . (2,3) Configuration of a geometric definition of i : = δ i I s o 4 2 , 4 , i [ 0 , 3 ] Z and i : = δ i I s o 8 2 , 4 , i [ 0 , 3 ] Z ; (4) Configuration of a geometric definition of i : = δ i I s o 8 2 , 6 , i [ 0 , 5 ] Z .
Mathematics 09 00290 g001
Figure 2. Given C 8 2 , 7 , fourteen isomorphic symmetries are described (from (a) to (b) and (c)). For C 8 2 , 7 (see (a)), configuration of geometric definitions of α i , i [ 0 , 6 ] Z (see (b)), and i : = δ i I s o 8 2 , 7 , i [ 0 , 6 ] Z (see (c)).
Figure 2. Given C 8 2 , 7 , fourteen isomorphic symmetries are described (from (a) to (b) and (c)). For C 8 2 , 7 (see (a)), configuration of geometric definitions of α i , i [ 0 , 6 ] Z (see (b)), and i : = δ i I s o 8 2 , 7 , i [ 0 , 6 ] Z (see (c)).
Mathematics 09 00290 g002
Figure 3. A multiplication table for I s o 8 2 , 4 . In this table, for convenience, we read a i as α i and d j as δ j . We read the order of composition of the elements in the following way, α δ 2 = δ 3 , δ 2 δ 3 = α 3 , and δ 3 α 2 = δ 1 . This table is equivalent to the multiplication table presenting the property (4) for D 4 .
Figure 3. A multiplication table for I s o 8 2 , 4 . In this table, for convenience, we read a i as α i and d j as δ j . We read the order of composition of the elements in the following way, α δ 2 = δ 3 , δ 2 δ 3 = α 3 , and δ 3 α 2 = δ 1 . This table is equivalent to the multiplication table presenting the property (4) for D 4 .
Mathematics 09 00290 g003
Figure 4. A multiplication table for I s o 8 2 , 6 . In this table, for convenience, we read a i as α i and d j as δ j . We also read the order of composition of the elements in the following way δ 5 α 4 = δ 1 , δ 1 α 5 = δ 2 , and δ 4 δ 3 = α . This table is equivalent to the multiplication table presenting the property (4) for D 6 .
Figure 4. A multiplication table for I s o 8 2 , 6 . In this table, for convenience, we read a i as α i and d j as δ j . We also read the order of composition of the elements in the following way δ 5 α 4 = δ 1 , δ 1 α 5 = δ 2 , and δ 4 δ 3 = α . This table is equivalent to the multiplication table presenting the property (4) for D 6 .
Mathematics 09 00290 g004
Figure 5. (a) Given C 26 3 , 5 C 26 3 , 5 , an explanation of F 26 ( I s o 26 ( C 26 3 , 5 C 26 3 , 5 ) ) as an example for the assertion of Theorem 9(1). (b) Given C 26 3 , 5 C 26 3 , 6 (or C 26 3 , 5 C 18 3 , 6 ), an explanation of F 26 ( I s o 26 ( C 26 3 , 5 C 26 3 , 6 ) ) as an example for the assertion of Theorem 8.
Figure 5. (a) Given C 26 3 , 5 C 26 3 , 5 , an explanation of F 26 ( I s o 26 ( C 26 3 , 5 C 26 3 , 5 ) ) as an example for the assertion of Theorem 9(1). (b) Given C 26 3 , 5 C 26 3 , 6 (or C 26 3 , 5 C 18 3 , 6 ), an explanation of F 26 ( I s o 26 ( C 26 3 , 5 C 26 3 , 6 ) ) as an example for the assertion of Theorem 8.
Mathematics 09 00290 g005
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Han, S.-E. Discrete Group Actions on Digital Objects and Fixed Point Sets by Isok(·)-Actions. Mathematics 2021, 9, 290. https://doi.org/10.3390/math9030290

AMA Style

Han S-E. Discrete Group Actions on Digital Objects and Fixed Point Sets by Isok(·)-Actions. Mathematics. 2021; 9(3):290. https://doi.org/10.3390/math9030290

Chicago/Turabian Style

Han, Sang-Eon. 2021. "Discrete Group Actions on Digital Objects and Fixed Point Sets by Isok(·)-Actions" Mathematics 9, no. 3: 290. https://doi.org/10.3390/math9030290

APA Style

Han, S. -E. (2021). Discrete Group Actions on Digital Objects and Fixed Point Sets by Isok(·)-Actions. Mathematics, 9(3), 290. https://doi.org/10.3390/math9030290

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop