Shyam Saurabh1
1Department of Mathematics, Tata College, Kolhan University, Chaibasa, India
Abstract:

Some methods of decomposing \(v(=mn)\times b\) incidence matrix of regular group divisible (RGD) designs into square submatrices of order \(m\) are described. Such designs are known as tactical decomposable designs. As a by–product, resolvable solutions of some RGD designs are obtained. A relationship between tactical decomposable designs and \(\left(2,\ n\right)-\)threshold schemes is also given.

Li Chen1
1Department of Chinese Language and Literature, Pingdingshan Vocational and Technical College, Pingdingshan, Henan, 467000, China
Abstract:

Cultural heritage represents the historical and cultural achievements of a nation, playing a vital role in studying human civilization and preserving national languages and scripts. This study utilizes virtual simulation technology to design a virtual pavilion for Chinese language and writing, employing image and text feature extraction algorithms for feature fusion and 3D modeling. The effectiveness of Chinese character extraction is validated through feature point matching, while the virtual exhibition’s impact is assessed via user experience scores. Results indicate that the proposed algorithm achieves accurate extraction with no misrecognition. User interest rankings highlight text images as the most influential factor, followed by visual imagery, pavilion experience, scene art, and language culture. Analysis of user feedback shows an average experience score exceeding 60 points, confirming the pavilion’s effectiveness in preserving and promoting Chinese language and writing culture.

Chenchen Lv1,2, Yifeng Wang2, Jin Chai1
1School of Sports Economics and Management, Xi’an Physical Education University, Xi’an, Shaanxi, 710068, China
2School of Economics and Management, XIDIAN University, Xi’an, Shaanxi, 710126, China
Abstract:

In recent years, due to the adjustment of economic structure, the people’s living standard and the increase of leisure time, the sports industry has become a new economic growth point. This paper studies and analyzes the characteristics of the industry background and business background of the sports industry, explores the factors and internal driving force affecting the design of its business model, and fully analyzes the mechanism, functional role, and logical relationship of the elements for constructing the business model of the sports industry, and then explores the characteristics of the business style of the sports industry. From the perspective of knowledge state, using the reinforcement learning mechanism, the evolution process of the sports industry business model from the first stage to the fourth stage is described. Taking Company H as a research case, the process and economic effect of the transformation and upgrading of its business model through the reinforcement learning mechanism is analyzed and it is found that as of 2023 the company’s operating income has increased by 2.4 times through transformation and upgrading, and its net profit has increased by 125.57 percentage points compared to 2016. It further understands the role that the enhanced learning mechanism brings to the development of the sports industry, and expects to be able to provide a reference for the sports industry to carry out business model transformation in the future.

Kevin K. Ferland1
1Commonwealth University, Bloomsburg, PA 17815
Abstract:

We initiate a study of the toughness of directed graphs by considering the natural generalization of that for ordinary graphs. After providing some general results, computations are completed for a few natural examples. Maximum possible toughness is also considered. Some open problems are  posed.

Tita Khalis Maryati1, Fawwaz Fakhrurrozi Hadiputra2
1Department of Mathematics Education, UIN Syarif Hidayatullah Jakarta, Jakarta, Indonesia
2School of Mathematics and Statistics, The University of Melbourne, Parkville, VIC 3010, Australia
Abstract:

Let \(G\) and \(H\) be graphs and \(1\) be a positive number. An \(H\)-irregular labeling of \(G\) is an assignment of integers from \(1\) up to \(k\) to either vertices, edges, or both in \(G\) such that each sum of labels in a subgraph isomorphic to \(H\) are pairwise distinct. Moreover, a comb product of \(G\) and \(H\) is a construction of graph obtained by attaching several copies of \(H\) to each vertices of \(G\). Meanwhile, an edge comb product of \(G\) and \(H\) is an alternate construction where the copies of \(H\) is attached on edges of \(G\) instead. In this paper, we investigate the vertex, edge, and total \(H\)-irregular labeling of \(G\) where both \(G\) and \(H\) is either a comb product or an edge comb product of graphs.

Yanfeng Shang1,2, Yanxia Shang3, Yutong Shang4, Ooi Boon Keat2
1Department of Physical Education and Health, Wuxi Vocational Institute of Commerce, Wuxi 214000, China
2Management and Science University, Shah Alam 40100, Malaysia
3School of Athletic Performance, Shanghai University of Sport, Shanghai 200438, China
4Jiangsu Xishan Senior High School, Wuxi 214000, China
Abstract:

This study applies Support Vector Machine (SVM) and K-Nearest Neighbors (KNN) algorithms to classify five types of basketball footwork. SVM maps the training data into a high-dimensional space using nonlinear transformation and classifies it with support vectors and a hyperplane. Experimental analysis showed minimal differences in peak and trough values of footwork movements; therefore, only mean and standard deviation features were retained, resulting in 12 effective features. KNN experiments demonstrated that recognition accuracy varies with different K values. The highest accuracy (80.7%) was achieved when K = 5 with the selected features. The study also examined the physical characteristics of basketball players, analyzing height, weight, and other indicators. Statistical results showed no significant body shape differences between experimental and control groups (P > 0.05). A T-test on dribbling, shooting, and layup performance also revealed no significant differences between the groups (P > 0.05).

Meiling Yan1
1Department of Tourism Management, Jinzhong University, Jinzhong 030619, China
Abstract:

This study explores the employment competitiveness of computer science majors by integrating combinatorial mathematics into the evaluation process. Utilizing the Analytic Hierarchy Process (AHP) and the improved FKCM clustering algorithm, we construct a hierarchical model to assess the impact of entrepreneurial education, learning motivation, and investment on job competitiveness. Data from 314 participants were analyzed using combinatorial techniques to derive optimal weightings for each factor, ensuring the evaluation model’s robustness. The results highlight significant gender differences in practical and feedback-based entrepreneurship education, with males outperforming females. However, no notable differences were observed in job interest, learning motivation, or overall employment competitiveness.

Opeyemi Oyewumi1,2, Adriana Roux1, Stephan Wagner1,3,4
1Department of Mathematical Sciences, Stellenbosch University, South Africa
2Department of Mathematics, Air Force Institute of Technology, Kaduna, Nigeria
3Institute for Discrete Mathematics, TU Graz, Graz, Austria
4Department of Mathematics, Uppsala University, Sweden
Abstract:

An (unrooted) binary tree is a tree in which every internal vertex has degree \(3\). In this paper, we determine the minimum and maximum number of total dominating sets in binary trees of a given order. The corresponding extremal binary trees are characterized as well. The minimum is always attained by the binary caterpillar, while the binary trees that attain the maximum are only unique when the number of vertices is not divisible by~\(4\). Moreover, we obtain a lower bound on the number of total dominating sets for \(d\)-ary trees and characterize the extremal trees as well.

Zhimei Wang1, Runli Tian1
1School of Medicine and Health, Yunnan Trade and Foreign Affairs Vocational College, Kunming 650000, Yunnan, China
Abstract:

This paper proposes an optimized Backpropagation (BP) neural network for improving intelligent elderly care talent training. To address BP’s limitations, including noise sensitivity and slow convergence, we introduce Particle Swarm Optimization (PSO) to refine network weights and thresholds. The model integrates course quality, teacher effectiveness, platform support, and market demand, aiming to optimize elderly care service talent cultivation. Experimental results demonstrate a significant improvement in prediction accuracy, with average error reduced from 9.94% to 6.3%. This enhanced model offers a more efficient and accurate solution for aligning educational outcomes with industry needs.

Wei Zhang1
1School of Accountancy, Sichuan Vocational College of Finance and Economics, Chengdu 610101, Sichuan, China
Abstract:

Amnesty international is recognized as a key force in promoting social development, with higher education also facing the need for innovation. This paper explores new opportunities in educational theory and policy proposed in a recent initiative. The proposal emphasizes filtering ideology, political education, and public opinion to enhance the accuracy of ideological and political teaching. By incorporating personal suggestions through interviews, the model recommends learning materials tailored to student characteristics. System implementation and testing demonstrate its potential as a core tool for ideological education in colleges, supporting the integration of knowledge, politics, and technology to meet students’ educational needs.

Shikun Zhou1, Feng Li1
1School of Computer, Qinghai Normal University, Xining, Qinghai, 810000, Chian
Abstract:

Networks with smaller strong diameters generally have better fault tolerance because they enable closer connections between vertices, leading to shorter information paths. This allows the network to maintain communication and functionality more effectively during attacks or failures. In contrast, larger strong diameters mean vertices are connected over longer distances, increasing vulnerability to disruptions. Thus, the strong diameter is a key metric for assessing and optimizing network fault tolerance. This paper determines the optimal orientations for the Cartesian and strong products of even cycles, provides the minimum strong diameters and their bounds under specific conditions, and establishes a lower bound for the maximum strong diameter. A conjecture about the exact value of the maximum strong diameter is also proposed.

Emma Jent1, Ping Zhang1
1Department of Mathematics, Western Michigan University, Kalamazoo, Michigan 49008-5248, USA
Abstract:

For a graph \(F\) and a positive integer \(t\), the edge-disjoint Ramsey number \(ER_t(F)\) is the minimum positive integer \(n\) such that every red-blue coloring of the edges of the complete graph \(K_n\) of order \(n\) results in \(t\) pairwise edge-disjoint monochromatic copies of a subgraph isomorphic to \(F\). Since \(ER_1(F)\) is in fact the Ramsey number of \(F\), this concept extends the standard concept of Ramsey number. We investigate the edge-disjoint Ramsey numbers \(ER_t(K_{1, n})\) of the stars \(K_{1, n}\) of size \(n\). Formulas are established for \(ER_t(K_{1, n})\) for all positive integers \(n\) and \(t = 2, 3, 4\) and bounds are presented for \(ER_t(K_{1, n})\) for all positive integers \(n\) and \(t \ge 5\). Furthermore, exact values of \(ER_t(K_{1, n})\) are determined for \(n = 3, 4\) and several integers \(t \ge 5\).

Xin Liu1
1School of Plastic Arts, Dankook University, Yongin, 17113, Korea
Abstract:

The development of artificial intelligence enables computers to not only simulate human artistic creations, but also synthesize fine art works with deeper meanings based on natural images. This study digitally parses the fusion of fine art and philosophy visual expressions, and develops a visual expression system based on the fusion of fine art and philosophy by utilizing a variety of key big data algorithms for visual expressions such as adversarial networks. Research on pattern recognition of this system in art creation is carried out through model training, recommendation performance evaluation, pattern recognition strategy application and regression analysis. The model in this paper works best when the number of nearest neighbors k=15, and the recommendation model in this paper can provide a personalized list of artwork recommendations for different people. The recognition of the system in this paper in the five dimensions of “spiritual level”, “value level”, “philosophical level”, “aesthetic level” and “technical level” is distributed between 4.24\(\mathrm{\sim}\)4.55. The results of regression analysis indicated that the system in this paper can improve the artistic creation as well as pattern recognition.

Dongfeng Chen1,2, Honglei Wei1, Wei Kong2, Lijuan Zhang1,2, Rui Li3
1School of Law and Politics, Hebei North University, Zhangjiakou 075000, Hebei, China
2Research Institute for Ecological Construction and Industrial Development, Hebei North University, Zhangjiakou 075000, China
3Chengdu sport university, Chengdu 610041, Sichuan, China
Abstract:

With development of Internet of Things, big data and artificial intelligence, cell phone signaling data, point-of-interest data and machine learning methods have been widely used in research of various fields of transportation. The use of big data processing techniques and machine learning methods to mine intercity travel data collected by various types of traffic detectors provides a new way of thinking to study travel mode selection behavior. In this paper, we pre-processed cell phone signaling data, geospatial data and interest point data around three aspects: personal attributes, travel attributes and travel mode attributes, and designed intercity travel target group extraction, travel chain extraction, travel mode extraction and travel purpose extraction algorithms, which provide basis for travel feature analysis and travel mode choice behavior prediction modeling.

Guiqin Hao1, Jun Wang2
1Guang Zhou Electric Power Construction Co., Ltd, China
2Huiyuantong Group Co., Ltd, China
Abstract:

Conventional techniques to electric power network (EPN) design and management are insufficient to handle extreme weather events like hurricanes due to the growing complexity and fragility of power systems. As a sophisticated simulation and optimization tool, digital twin (DT) technology may offer real-time power infrastructure monitoring and prediction. This study aims to investigate the possible application of digital twin technology in enhancing power system resilience and streamlining the design process, as well as to use it for the 3D design of the full substation engineering infrastructure process. A digital twin-based EPN model that incorporates all of the main components of the power system—power plants, substations, transmission and distribution networks, and customers—is proposed in this paper. Every component of the power system undergoes vulnerability analysis, and the chance of the system failing is calculated using a Bayesian network (BN) model and a parametric vulnerability function. According to modeling projections, Hurricane Ike will cause the majority of consumers’ power supplies to be interrupted. The model predicts that power consumption for residential, commercial, and industrial buildings will be 96.4%, 96.0%, and 94.2%, respectively, depending on the kind of building.

Jinjin Xu1
1School of Electronics and Computer Science, University of Southampton, Southampton, Hampshire, SO17 1BJ, UK
Abstract:

Radar ranging and speed measurement are common applications in daily life, with performance largely dependent on the radar signal processor. However, existing civilian radar signal processors struggle with weak signal reception and low analysis efficiency. This study designs a high-speed radar signal processor based on FPGA architecture, incorporating a fusion processing algorithm to integrate different radar signal bands, enhancing processing efficiency and accuracy. The design includes data feature analysis, storage, and fusion modules. Tests showed that the processor achieved real-time performance with a processing time under 1ms, a ranging error below 1m, and speed measurement accuracy within 5m/s, meeting practical requirements.

Peyman Fahimi1, Walter Trump2, Chérif F. Matta3, Alireza Ahmadi Baneh4
1Department of Mathematics and Statistics, Dalhousie University, Halifax, NS B3H4R2, Canada
2Department of Physics, Gymnasium Stein, 90547 Stein, Germany
3Department of Chemistry and Physics, Mount Saint Vincent University, Halifax, NS B3M2J6, Canada
4Department of Applied Mathematics, Tarbiat Modares University, Tehran, Tehran, Iran
Abstract:

Intriguing symmetries are uncovered regarding all magic squares of orders 3, 4, and 5, with 1, 880, and 275,305,224 distinct configurations, respectively. In analogy with the travelling salesman problem, the distributions of the total topological distances of the paths travelled by passing through all the vertices (matrix elements) only once and spanning all elements of the matrix are analyzed. Symmetries are found to characterise the distributions of the total topological distances in these instances. These results raise open questions about the symmetries found in higher-order magic squares and the formulation of their minimum and maximum total path lengths.

Abolape Deborah Akwu1, Comfort Agbaji1
1Department of Mathematics, Joseph Sarwuan Tarka University, Makurdi, Nigeria
Abstract:

In this paper, we introduce the concept of vertex-edge locating Roman dominating functions in graphs. A vertex-edge locating Roman dominating \({(ve-LRD)}\) function of a graph \(G=(V,E)\) is a function \(f:V(G)\rightarrow\{0,1,2\}\) such that the following conditions are satisfied: (i) for every adjacent vertices \(u,v\) with \(f(u)=0\) or \(f(v)=0\), there exists a vertex \(w\) at distance \(1\) or \(2\) from \(u\) or \(v\) with \(f(w)=2\), (ii) for every edge \(uv\in E\), \(\max[f(u),f(v)]\neq 0\), and (iii) any pair of distinct vertices \(u,v\) with \(f(u)=f(v)=0\) does not have a common neighbour \(w\) with \(f(w)=2\). The weight of ve-LRD function is the sum of its function values over all the vertices. The vertex-edge locating Roman domination number of \(G\), denoted by \(\gamma_{veLR}(G)\), is the minimum weight of a {ve-LRD} function in \(G\). We proved that the vertex-edge locating Roman domination problem is NP-complete for bipartite graphs. Also, we present the upper and lower bounds of \({ve-LRD}\) function for trees. Lastly, we give the upper bounds of \({ve-LRD}\) function for some connected graphs.

Ning Zhou1,2, Yiming Wu3
1Xinjiang Institute of Technology, Aksu, Xinjiang, 843100, China
2Zhejiang A and F University, Hangzhou, Zhejiang, 311300, China
3Rural Revitalization Academy of Zhejiang Province, Zhejiang A and F University, Hangzhou, Zhejiang, 311300, China
Abstract:

Traditional personnel recruitment methods are often inefficient and struggle to find candidates who meet job requirements. In this paper, we first develop a comprehensive personnel management system for colleges and universities that streamlines the recruitment process and information management. Next, recruitment data from the system is analyzed using the fuzzy C-means algorithm to cluster applicant profiles and extract position-specific user characteristics. Finally, a joint embedded neural network is employed to match applicant profiles with job positions by optimizing an objective function. Experimental results demonstrate a high job matching rate (up to 98.1%), a significantly reduced recruitment cycle (from job posting to candidate onboarding in 25 days), and a system response time as low as 0.5 seconds. These findings highlight the effectiveness of big data technology in providing timely feedback, reducing recruitment costs and staff workload, and promoting the intelligent development of talent recruitment.

Shujing Ma1
1The Chinese University of Hong Kong, Hong Kong, 999077, China
Abstract:

The rapid development of information technology makes intelligent decision support system play an increasingly important role in economic standardized management. The Intelligent Decision Support System (IDSS) constructed in this paper includes interaction layer, analysis layer and data layer. The system standardizes the management of enterprise economy through strategic forecasting and decision analysis, economic planning and control, and economic analysis. The study combines the fuzzy hierarchical analysis method (FAHP) and the fuzzy comprehensive evaluation method (FCE) to evaluate the standardized level of economic management of enterprise A. The evaluation score of the standardized level of enterprise A’s economic management is \(F=80.955\), which is greater than 80, and it belongs to the grade of “good”. It shows that the intelligent decision support system constructed based on this paper can effectively help standardize the management of enterprise economy.

Xiang Ji1
1Higher National School of Administration, Moscow State University (MSU), MOSCOW, 119991, Russia
Abstract:

In order to solve the multi-objective optimization problem of resource allocation in enterprise strategic management, the article firstly establishes a multi-objective resource allocation model for maximizing the benefits of enterprises in enterprise strategic management. Then, it optimizes and improves the initial population, convergence factor and dynamic weights of the gray wolf algorithm, increases the population diversity by using the population strategy of reverse learning, improves the convergence factor into a nonlinear factor, and finally changes the decision-making weights of the gray wolf leadership and applies the dynamic weights to improve the accuracy of the algorithm. Subsequently, the improved gray wolf algorithm is utilized for model decoupling. By applying this paper’s algorithm and the other two algorithms to solve the six algorithms 30*6, 60*6, 90*2, 90*4, 150*4 and 150*6 for 9 times, it is found that in the analysis of the 30*6 algorithm, the enterprise’s resource allocation reaches 5,000 when the time is 110 s. At the same time, this paper’s algorithm obtains a better non-dominated solution than the other two algorithms, which proves that this paper’s algorithm solves the multi-objective resource allocation problem of enterprise law industry is proved to be effective.

Ting Hu1
1Faculty of Science, The University of Hong Kong, 999077, Hong Kong Special Administrative Region
Abstract:

In food processing, foreign matter inevitably contaminates packaged food. To ensure food safety, ray-based detection is used; however, the original images suffer from aberrations and noise that degrade quality and hinder further processing. Thus, images are preprocessed to enhance quality by highlighting key features and suppressing irrelevant ones before abnormal pattern recognition. Following image segmentation, a BP neural network algorithm is applied for foreign object detection. In tests with contaminants such as metal wires, stones, and glass, the algorithm identified distinct abnormal fluctuations at gray levels of 132, 108, and 34, respectively, allowing it to reliably detect foreign objects. Although the practical detection rate reached 100%, occasional misjudgments suggest that further optimization is needed. Overall, this method introduces a novel approach to detecting foreign objects in food and offers promising new strategies for improving food safety monitoring.

Andrew Bowling1, Bryan Freyberg2
1Department of Chemical Engineering, University of Minnesota Duluth, MN 55812 USA
2Department of Mathematics and Statistics, University of Minnesota Duluth, MN 55812 USA
Abstract:

Let \(G=(V,E,F)\) be a planar graph with vertex set \(V\), edge set \(E\), and set of faces \(F.\) For nonnegative integers \(a,b,\) and \(c\), a type \((a,b,c)\) face-magic labeling of \(G\) is an assignment of \(a\) labels to each vertex, \(b\) labels to each edge, and \(c\) labels to each face from the set of integer labels \(\{1,2,\dots a|V|+b|E|+c|F|\}\) such that each label is used exactly once, and for each \(s\)-sided face \(f \in F,\) the sum of the label of \(f\) with the labels of the vertices and edges incident with \(f\) is equal to some fixed constant \(\mu_s\) for every \(s.\) We find necessary and sufficient conditions for every quadruple \((a,b,c,n)\) such that the \(n\)-prism graph \(Y_n \cong K_2 \square C_n\) admits a face-magic labeling of type \((a,b,c)\).

S. Madhumitha1, S. Naduvath1
1Department of Mathematics Christ University, Bangalore, India
Abstract:

A special type of algebraic intersection graph called the \(n\)-inordinate invariant intersection graph has been constructed based on the symmetric group, and its structural properties are studied in the literature. In this article, we discuss the different types of dominator coloring schemes of the \(n\)-inordinate invariant intersection graphs and their complements, \(n\)-inordinate invariant non-intersection graphs, by obtaining the required coloring pattern and determining the graph invariant associated with the coloring.

Oleksiy Dovgoshey1,2
1Department of Theory of Functions, Institute of Applied Mathematics and Mechanics of NASU, Slovyansk, Ukraine
2Department of Mathematics and Statistics, University of Turku, Turku, Finland
Abstract:

Let \(G\) be a connected graph and let \(d_G\) be the geodesic distance on \(V(G)\). The metric spaces \((V(G), d_{G})\) were characterized up to isometry for all finite connected \(G\) by David C. Kay and Gary Chartrand in 1965. The main result of this paper expands this characterization on infinite connected graphs. We also prove that every metric space with integer distances between its points admits an isometric embedding in \((V(G), d_G)\) for suitable \(G\).

Brian Hopkins1, Jesús Sistos Barrón2, Hua Wang3
1Department of Mathematics and Statistics, Saint Peter’s University, Jersey City NJ 07306 USA
2Department of Mathematics, University of Georgia, Athens GA 30602 USA
3Department of Mathematical Sciences, Georgia Southern University, Statesboro GA 30458 USA
Abstract:

MacMahon extensively studied integer compositions, including the notion of conjugation. More recently, Agarwal introduced \(n\)-color compositions and their cyclic versions were considered by Gibson, Gray, and Wang. In this paper, we develop and study a conjugation rule for cyclic \(n\)-color compositions. Also, for fixed \(\ell\), we identify and enumerate the subset of self-conjugate compositions of \(\ell\), as well as establish a bijection between these and the set of cyclic regular compositions of \(\ell\) with only odd parts.

A. Lourdusamy1, T. Mathivanan2
1Department of Mathematics, St. Xavier’s College (Autonomous), Palayamkottai – 627 002, Tamilnadu, India
2Department of Mathematics, Athoor Cooperative Arts and Science College, Seeval Saragu, Dindigul – 624 303, Tamilnadu, India
Abstract:

The covering cover pebbling number, \(\sigma(G)\), of a graph \(G\), is the smallest number such that some distribution \(D \in \mathscr{K}\) is reachable from every distribution starting with \(\sigma(G)\) (or more) pebbles on \(G\), where \(\mathscr{K}\) is a set of covering distributions. In this paper, we determine the covering cover pebbling number for two families of graphs those do not contain any cycles.

Mohammed Alshammari1, Sergey Kitaev1, Chaoliang Tang2, Tianyi Tao2, Junchi Zhang2
1Department of Mathematics and Statistics, University of Strathclyde, 26 Richmond Street, Glasgow G1 1XH, United Kingdom
2Shanghai Center for Mathematical Sciences, Fudan University, 220 Handan Road, Shanghai 200433, China
Abstract:

Jeff Remmel introduced the concept of a \(\mathit{k}\)-11-representable graph in 2017. This concept was first explored by Cheon et al. in 2019, who considered it as a natural extension of word-representable graphs, which are exactly 0-11-representable graphs. A graph \(G\) is \(k\)-11-representable if it can be represented by a word \(w\) such that for any edge (resp., non-edge) \(xy\) in \(G\) the subsequence of \(w\) formed by \(x\) and \(y\) contains at most \(k\) (resp., at least \(k+1\)) pairs of consecutive equal letters. A remarkable result of Cheon et al. is that  any graph is 2-11-representable, while it is still unknown whether every graph is 1-11-representable. Cheon et al. showed that the class of 1-11-representable graphs is strictly larger than that of word-representable graphs, and they introduced a useful toolbox to study 1-11-representable graphs, which was extended by additional powerful tools suggested by Futorny et al. in 2024. In this paper, we prove that all graphs on at most 8 vertices are 1-11-representable hence extending the known fact that all graphs on at most 7 vertices are 1-11-representable. Also, we discuss applications of our main result in the study of multi-1-11-representation of graphs we introduce in this paper analogously to the notion of multi-word-representation of graphs suggested by Kenkireth and Malhotra in 2023.

Harsha Vardhan K S1, Anuradha D S1, Jaganathan B1
1Department of Computer Science, Vellore Institute of Technology, Chennai, India
Abstract:

Topological Indices (TIs) are quantitative measures derived from molecular geometry and are utilized to predict physicochemical properties. Although more than 3000 TIs have been documented in the published literature, only a limited number of TIs have been effectively employed owing to certain limitations. A significant drawback is the higher degeneracy resulting from the lower discriminative power. TIs utilize simple graphs in which atoms and bonds are conceptualized as the vertices and edges of mathematical graphs. As multiple edges are not supported in these graphs, double and triple bonds are considered single. Consequently, the molecular structure undergoes alterations during the conversion process, which ultimately affects the discriminative power. In this investigation, indices for double-bond incorporation were formulated to preserve structural integrity. This study addresses, demonstrates, and verifies a set of double-bonded indices. The indices demonstrated promising results, exhibiting enhanced discriminative power when validated for polycyclic aromatic hydrocarbons using regression analysis. These indices and their potential applications will significantly contribute to QSAR/QSPR studies.

Paola T. Pantoja1, Rodrigo Chimelli1, Simone Dantas1, Rodrigo Marinho2, Daniel F.D. Posner3
1 IME, Universidade Federal Fluminense, Niterói, RJ, 24210-201, Brazil
2CS-CAC, Federal University of Santa Maria, Cachoeira do Sul, RS, 96503-205, Brazil
3CC-IM, Federal Rural University of Rio de Janeiro, Nova Iguaçu, RJ, 26020-740, Brazil
Abstract:

In 2003, the frequency assignment problem in a cellular network motivated Even et al. to introduce a new coloring problem: Conflict-Free coloring. Inspired by this problem and by the Gardner-Bodlaender’s coloring game, in 2020, Chimelli and Dantas introduced the Conflict-Free Closed Neighborhood \(k\)-coloring game (CFCN \(k\)-coloring game). The game starts with an uncolored graph \(G\), \(k\geq 2\) different colors, and two players, Alice and Bob, who alternately color the vertices of \(G\). Both players can start the game and respect the following legal coloring rule: for every vertex \(v\), if the closed neighborhood \(N[v]\) of \(v\) is fully colored then there exists a color that was used only once in \(N[v]\). Alice wins if she ends up with a Conflict-Free Closed Neighborhood \(k\)-coloring of \(G\), otherwise, Bob wins if he prevents it from happening. In this paper, we introduce the game for open neighborhoods, the Conflict-Free Open Neighborhood \(k\)-coloring game (CFON \(k\)-coloring game), and study both games on graph classes determining the least number of colors needed for Alice to win the game.

Shude Long1, Junliang Cai2
1Department of Mathematics, Chongqing University of Arts and Sciences, Chongqing, 402160, P.R.China
2School of Mathematical Sciences, Beijing Normal University, Beijing 100875, P.R.China
Abstract:

This paper investigates the number of rooted biloopless nonseparable planar near-triangulations and presents some formulae for such maps with three parameters: the valency of root-face, the number of edges and the number of inner faces. All of them are almost summation-free.

Wei-Ping Ni1, Wen-yao Song1
1School of Mathematics and Statistics, Zaozhuang University, Shandong, 277160, China
Abstract:

A graph is 1-planar if it can be drawn on the plane so that each edge is crossed by at most one other edge. In this paper, we confirm the total-coloring conjecture for 1-planar graphs without 4-cycles with maximum degree \(\Delta\geq10\).

Gee-Choon Lau1, Wai Chee Shiu2
177D, Jalan Suboh, 85000 Segamat, Johor, Malaysia
2Department of Mathematics, The Chinese University of Hong Kong, Shatin, Hong Kong, P.R. China
Abstract:

For a graph \(G=(V,E)\) of size \(q\), a bijection \(f : E \to \{1,2,\ldots,q\}\) is a local antimagic labeling if it induces a vertex labeling \(f^+ : V \to \mathbb{N}\) such that \(f^+(u) \ne f^+(v)\), where \(f^+(u)\) is the sum of all the incident edge label(s) of \(u\), for every edge \(uv \in E(G)\). In this paper, we make use of matrices of fixed sizes to construct several families of infinitely many tripartite graphs with local antimagic chromatic number 3.

S. Nazari-Moghaddam1, M. Chellali2, S.M. Sheikholeslami3
1Department of Mathematics University of Ilam Ilam, Iran
2LAMDA-RO Laboratory, Department of Mathematics, University of Blida, B.P. 270, Blida, Algeria
3Department of Mathematics, Azarbaijan Shahid Madani University, Tabriz, Iran
Abstract:

An outer independent double Roman dominating function (OIDRDF) of a graph \( G \) is a function \( f:V(G)\rightarrow\{0,1,2,3\} \) satisfying the following conditions:
(i) every vertex \( v \) with \( f(v)=0 \) is adjacent to a vertex assigned 3 or at least two vertices assigned 2;
(ii) every vertex \( v \) with \( f(v)=1 \) has a neighbor assigned 2 or 3;
(iii) no two vertices assigned 0 are adjacent.
The weight of an OIDRDF is the sum of its function values over all vertices, and the outer independent double Roman domination number \( \gamma_{oidR}(G) \) is the minimum weight of an OIDRDF on \( G \). Ahangar et al. [Appl. Math. Comput. 364 (2020) 124617] established that for every tree \( T \) of order \( n \geq 4 \), \( \gamma_{oidR}(T)\leq\frac{5}{4}n \) and posed the question of whether this bound holds for all connected graphs. In this paper, we show that for a unicyclic graph \( G \) of order \( n \), \( \gamma_{oidR}(G) \leq \frac{5n+2}{4} \), and for a bicyclic graph, \( \gamma_{oidR}(G) \leq \frac{5n+4}{4} \). We further characterize the graphs attaining these bounds, providing a negative answer to the question posed by Ahangar et al.

R. Ponraj1, K. Annathurai2, R. Kala3
1Department of Mathematics, Sri Paramakalyani College, Alwarkurichi-627 412, India
2Department of Mathematics, Thiruvalluvar College, Papanasam–627 425, India
3Department of Mathematics, Manonmaniam Sundaranar University, Tirunelveli-627012, India
Abstract:

Let \(G\) be a \((p,q)\) graph. Let \(f\) be a function from \(V(G)\) to the set \(\{1,2,\ldots, k\}\) where \(k\) is an integer \(2< k\leq \left|V(G)\right|\). For each edge \(uv\) assign the label \(r\) where \(r\) is the remainder when \(f(u)\) is divided by \(f(v)\) (or) \(f(v)\) is divided by \(f(u)\) according as \(f(u)\geq f(v)\) or \(f(v)\geq f(u)\). \(f\) is called a \(k\)-remainder cordial labeling of \(G\) if \(\left|v_{f}(i)-v_{f}(j)\right|\leq 1\), \(i,j\in \{1,\ldots , k\}\) where \(v_{f}(x)\) denote the number of vertices labeled with \(x\) and \(\left|\eta_{e}(0)-\eta_{o}(1)\right|\leq 1\) where \(\eta_{e}(0)\) and \(\eta_{o}(1)\) respectively denote the number of edges labeled with even integers and number of edges labeled with odd integers. A graph with admits a \(k\)-remainder cordial labeling is called a \(k\)-remainder cordial graph. In this paper we investigate the \(4\)-remainder cordial labeling behavior of Prism, Crossed prism graph, Web graph, Triangular snake, \(L_{n} \odot mK_{1}\), Durer graph, Dragon graph.

Mingqiang An1, Runli Tian2, Huiya Yan3
1College of Science, Tianjin University of Science and Technology, Tianjin, 300457, P.R. China
2School of Software Engineering, Changsha Institute of Technology, Changsha, 410200, P.R. China
3Mathematics and Statistics Department, University of Wisconsin-La Crosse, La Crosse, WI 54601, USA
Abstract:

Given a connected graph \(H\), its first Zagreb index \(M_{1}(H)\) is equal to the sum of squares of the degrees of all vertices in \(H\). In this paper, we give a best possible lower bound on \(M_{1}(H)\) that guarantees \(H\) is \(\tau\)-path-coverable and \(\tau\)-edge-Hamiltonian, respectively. Our research supplies a continuation of the results presented by Feng et al. (2017).

A. Anu1, S. Monikandan2
1Department of Mathematics, Vivekananda College, Agasteeswaram, Kanyakumari, Tamilnadu, India
2Department of Mathematics, Manonmaniam Sundaranar University, Abishekapatti, Tirunelveli, Tamilnadu, India
Abstract:

The degree of an edge \(uv\) of a graph \(G\) is \(d_G(u)+d_G(v)-2.\) The degree associated edge reconstruction number of a graph \(G\) (or dern(G)) is the minimum number of degree associated edge-deleted subgraphs that uniquely determines \(G.\) Graphs whose vertices all have one of two possible degrees \(d\) and \(d+1\) are called \((d,d+1)\)-bidegreed graphs. It was proved, in a sequence of two papers [1,17], that \(dern(mK_{1,3})=4\) for \(m>1,\) \(dern(mK_{2,3})=dern(rP_3)=3\) for \(m>0, ~r>1\) and \(dern(G)=1\) or \(2\) for all other bidegreed graphs \(G\) except the \((d,d+1)\)-bidegreed graphs in which a vertex of degree \(d+1\) is adjacent to at least two vertices of degree \(d.\) In this paper, we prove that \(dern(G)= 1\) or \(2\) for this exceptional bidegreed graphs \(G.\) Thus, \(dern(G)\leq 4\) for all bidegreed graphs \(G.\)

Xiaoya Li1, Wenyao Song2, Lianying Miao1
1School of Mathematics, China University of Mining and Technology, Xuzhou, 221116, P. R. China
2School of Mathematics and Statistics, Zaozhuang University, Zaozhuang, 277160, P. R. China
Abstract:

A proper total coloring of a graph \( G \) such that there are at least 4 colors on those vertices and edges incident with a cycle of \( G \), is called an acyclic total coloring. The acyclic total chromatic number of \( G \), denoted by \( \chi^{”}_{a}(G) \), is the smallest number of colors such that \( G \) has an acyclic total coloring. In this article, we prove that for any graph \( G \) with \( \Delta(G)=\Delta \) which satisfies \( \chi^{”}(G)\leq A \) for some constant \( A \), and for any integer \( r \), \( 1\leq r \leq 2\Delta \), there exists a constant \( c>0 \) such that if \( g(G)\geq\frac{c\Delta}{r}\log\frac{\Delta^{2}}{r} \), then \( \chi^{”}_{a}(G)\leq A+r \).

Abstract:

In recent years, intelligent control has realized rapid development in the field of electrical engineering, the article initially studied the principle of electrical intelligent control, accordingly built the electrical intelligent control system, and designed the system hardware, the system module is divided into the main control module, the expansion module, the digital input and output module and the mounting rail. Based on the working principle of fuzzy control, design the software of the electrical intelligent control system, and optimize the traditional fuzzy controller by using fuzzy adaptive hybrid genetic algorithm, so as to improve the fuzzy control accuracy of the electrical intelligent control system in this paper. The electrical control system of this paper is applied to greenhouse greenhouse temperature and humidity control, substation air conditioning energy consumption control and subway station illumination control, and the control effect of the electrical intelligent control system of this paper is known through three experimental data. The system of this paper can effectively deal with the dissimilar data in the greenhouse temperature control experiment. Under the steady state environment, the temperature deviation of this paper’s fuzzy control method and conventional single structure fuzzy control is within 0.1℃ and 1℃ respectively, and the humidity deviation is within 5%RH and 10%RH respectively. Obviously, the fuzzy control method in this paper has higher control accuracy. In the substation air conditioning energy consumption experiment, the annual power consumption of this paper’s electrical intelligent control system and the traditional ventilation and air conditioning system are 32,660 degrees and 45,620 degrees, respectively. The electrical intelligent control system in this paper can save 22,000 yuan per year. The output illuminance of the subway station of the fuzzy control system in this paper increases with the comfort of the light environment and the density of the crowd, which achieves the expected effect.

Michael Braun1
1Faculty of Computer Science University of Applied Sciences, Darmstadt, Germany
Abstract:

An \( (n,r) \)-arc in \( \operatorname{PG}(2,q) \) is a set \( \mathcal{B} \) of points in \( \operatorname{PG}(2,q) \) such that each line in \( \operatorname{PG}(2,q) \) contains at most \( r \) elements of \( \mathcal{B} \) and such that there is at least one line containing exactly \( r \) elements of \( \mathcal{B} \). The value \( m_r(2,q) \) denotes the maximal number \( n \) of points in the projective geometry \( \operatorname{PG}(2,q) \) for which an \( (n,r) \)-arc exists. We show by systematically excluding possible automorphisms that putative \( (44,5) \)-arcs, \( (90,9) \)-arcs in \( \operatorname{PG}(2,11) \), and \( (39,4) \)-arcs in \( \operatorname{PG}(2,13) \)—in case of their existence—are rigid, i.e. they all would only admit the trivial automorphism group of order \( 1 \). In addition, putative \( (50,5) \)-arcs, \( (65,6) \)-arcs, \( (119,10) \)-arcs, \( (133,11) \)-arcs, and \( (146,12) \)-arcs in \( \operatorname{PG}(2,13) \) would be rigid or would admit a unique automorphism group (up to conjugation) of order \( 2 \).

Marilyn Breen1
1The University of Oklahoma Norman, Oklahoma 73019, USA
Abstract:

Let \( S \) be a connected union of finitely many \( d \)-dimensional boxes in \( \mathbb{R}^d \) and let \( \mathcal{B} \) represent the family of boxes determined by facet hyperplanes for \( S \), with \( \mathcal{F} \) the associated family of faces (including members of \( \mathcal{B} \)). For set \( F \) in \( \mathcal{F} \), point \( x \) relatively interior to \( F \), and point \( y \) in \( S \), \( x \) sees \( y \) via staircase paths in \( S \) if and only if every point of \( F \) sees \( y \) via such paths. Thus the visibility set of \( x \) is a union of members of \( \mathcal{F} \), as is the staircase kernel of \( S \). A similar result holds for \( k \)-staircase paths in \( S \) and the \( k \)-staircase kernel of \( S \).

Misa Nakanishi1
1Department of Mathematics, Keio University, Alumni, 3-14-1, Hiyoshi, Kohoku-ku, Yokohama, 223-8522, Japan
Abstract:

The minimum dominating set problem asks for a dominating set with minimum size. First, we determine some vertices contained in the minimum dominating set of a graph. By applying a particular scheme, we ensure that the resulting graph is 2-connected and the length of each formed induced cycle is 0 mod 3. We label every three vertices in the induced cycles of length 0 mod 3. Then there is a way of labeling in which the set of all labeled vertices is the minimum dominating set of the resulting graph, and is contained in the minimum dominating set of the original graph. We also consider the remaining vertices of the minimum dominating set of the original graph and determine all vertices contained in the minimum dominating set of a graph with maximum degree 3. The complexity of the minimum dominating set problem for cubic graphs was shown to be APX-complete in 2000 and this problem is solved by our arguments in polynomial time.

Georgia Penner1, Ethan Williams2
1Department of Mathematics and Statistics, University of Victoria, Victoria, BC V8P 5C2, Canada
2Institute of Discrete Mathematics, TU Graz, Steyrergasse 30, 8010 Graz, Austria
Abstract:

In this paper we study a new graph parameter, the stacking number. Defined in relation to the eternal domination game, we show that there are highly connected graphs for which it is beneficial to allow multiple guards to occupy a vertex, answering an open question of Finbow et al. In fact, we show that for any sequence \( (s_i) \), allowing \( s_j \) guards to occupy a vertex can save arbitrarily many guards in comparison to allowing fewer than this on a vertex. We also show that the stacking number is \( 1 \) for all trees.

Guojing Tan1, Jianan Wang1
1School of Performing Arts, Sichuan University of Media and Communications, Chengdu, Sichuan, 610000, China
Abstract:

The body language of dancers is vital for conveying emotion. In this study, Kinect is used to detect and track dancers’ movements, and we develop two models: a dance action recognition model based on skeleton data and a dance emotion recognition model using an Attention-ConvLSTM. The action recognition model achieves 88.34% accuracy—reaching its best performance after just 40 iterations—while the emotion recognition model reaches an accuracy of 98.95%. Our analysis shows that features such as eigenvalue speed, skeleton pair distance, and inclination effectively differentiate emotions, although certain emotions (e.g., Excited vs. Pleased and Relaxed vs. Sad) can be confused. Notably, the leg’s skeletal points significantly influence emotion expression. Ultimately, the study establishes a dance emotion expression mechanism through coordinated movement changes of the head, hands, legs, waist, and torso.

Tao Wang1, Yuming Xue1, Luoxin Wang1, Tianen Li2, Hongli Dai1
1Institute of New Energy Intelligence Equipment, Tianjin Key Laboratory of Film Electronic & Communication Devices, School of Integrated Circuit Science and Engineering, Tianjin University of Technology, Tianjin, 300384, China
2Institute of Mechanical Engineering, Baoji University of Arts & Science, Baoji, Shaanxi, 721013, China
Abstract:

Deep learning-based target detection algorithms outperform traditional methods by eliminating the need for manual feature design and improving accuracy and efficiency. This paper constructs a YOLOv5 target detection model using a deep convolutional neural network. To enhance accuracy, generalization, and detection speed, three data augmentation techniques—mosaic data enhancement, adaptive anchor frame, and adaptive image scaling—are applied. The model is further optimized with an attention mechanism and a modified YOLOv5 framework. A loss function and global average pooling enhance feature mapping for a fully convolutional network. Experimental results show that the improved YOLOv5n model achieves a 2.9979 percentage point increase in MAP, a 31% improvement in FPS, and a training time reduction of 10 minutes, completing 100 rounds in 20 minutes.

Xi Qu1, Sumalee Chaijaroen1
1Innovation Technology and Learning Science Department, Faculty of Education, Khon Kaen University, Khon Kaen, 40002, Thailand
Abstract:

Metacognition, as a fundamental ability for learners to adapt to complex environments, is equally adapted to constructivist teaching and learning activities. In this paper, we propose a model of learning environment characteristics for metacognitive regulation under constructivist learning theory, and utilize Item2Vec algorithm, Self-Attention mechanism, and BiGRU model to construct a model of metacognitive ability. The model presents a kind of multi-channel network characteristic composed of Self-Attention mechanism and BiGRU model. Design a theoretical model of the learning environment oriented to improving students’ metacognitive ability, and analyze the functional modules of the overall system of the learning environment. Propose a learning activity aiming at the improvement of metacognitive ability and incorporating constructivist theory as the guiding concept to allocate the various aspects of the whole constructivist teaching activity. Analyze the implementation effect of constructivist teaching activities based on metacognitive strategies and organize the influencing factors of metacognitive strategies. The bivariate correlation analysis of students’ total test scores and usual grades are closely related to planning strategies, monitoring strategies, and regulating strategies, and the significance (two-tailed) is less than 0.01. This indicates that the higher the students’ scores, the higher the corresponding level of metacognitive strategies.

Linxuan Zhang1, Rui Bian2
1School of Civil Engineering and Architecture, Guangxi University of Science and Technology, Liuzhou, Guangxi, 545006, China
2Civil Engineering School, FuZhou University, Fuzhou, Fujian, 350000, China
Abstract:

Civil engineering crack detection faces challenges due to complex environments and external interferences. This paper proposes an improved YOLO v8s-WOMA network, integrating ODConv, C2f-MA modules, and WIoU loss function to enhance crack identification accuracy. A BP neural network is also trained to assess crack damage. Experiments on the CBP dataset compare this method with existing detection algorithms. Results show that the proposed model achieves the highest mAP (90.5%), F1-score (90.3%), and accuracy (89.6%). Bridge crack detection errors remain within 0.1mm (width) and 20mm (length), ensuring precise damage assessment. The model effectively handles complex backgrounds, accurately detects cracks, and meets practical engineering needs.

Xiaojing Dong1, Li Yuan2
1Jilin Engineering Normal University, Changchun, Jilin, 130000, China
2Northeast Normal University, Changchun, Jilin, 130000, China
Abstract:

The rapid growth of multilingual information online has made traditional translation insufficient, highlighting the need for intelligent language translation. This study employs a convolutional neural network to extract visual features from translated images and uses region-selective attention to align text and image features. The fused information is then processed through a sequence model to develop a computer vision-based translation algorithm. Results show that the proposed algorithm excels in key evaluation metrics, improving translation quality. It maintains a low leakage rate (1.30%), a mistranslation rate of 2.64%, and an average response time of 67.28ms. With strong generalization and applicability in multilingual translation, the algorithm demonstrates high performance and promising real-world applications.

Ruiqi Gao1
1Business School, University of Sydney, Sydney, NSW, 2000, Australia
Abstract:

This paper addresses the limitations of the traditional portfolio theory centered on the mean-variance model and expected utility theory, and proposes the establishment of a portfolio model that takes into account the subjective psychological factors of investors, taking into account the fact that investors are susceptible to the influence of various psychological biases, affective biases, and cognitive biases in the actual decision-making process, with respect to the theory of consistency of the assumptions of the investor’s risk attitude. The portfolio model based on fuzzy decision-making is proposed, combined with the development and application of linear programming in portfolio optimization, the return of assets is regarded as a random fuzzy variable, and the stochastic fuzzy portfolio model is constructed to consider the risk characteristics of investors. The portfolio returns under different emotions or different risk preferences are explored separately. Combined with the fund categorization allocation of the sample firms, the fund portfolio C based on the fuzzy portfolio model is proposed and compared with the equal weight allocation fund (fund portfolio A) and the risk coefficient weighted allocation fund (fund portfolio B) based on the risk level of return, respectively. Fund Portfolio C has the highest average return.

Daniel Slilaty1
1Department of Mathematics and Statistics, Wright State University, Dayton, Ohio, USA
Abstract:

Given a prime \( p \), a \( p \)-smooth integer is an integer whose prime factors are all at most \( p \). Let \( S_p \) be the multiplicative subgroup of \( \mathbb{Q} \) generated by \(-1\) and the \( p \)-smooth integers. Define the \( p \)-smooth partial field as \( \mathbb{S}_p = (\mathbb{Q}, S_p) \). Let \( g \) be the golden ratio \( (1+\sqrt{5})/2 \). Let \( G_p \) to be the multiplicative subgroup of \( \mathbb{R} \) generated by \( g \), \(-1\), and the \( p \)-smooth integers. Define the \( p \)-golden partial field as \( \mathbb{G}_p = (\mathbb{R}, G_p) \). The partial field \( \mathbb{S}_2 \) is actually the well-known dyadic partial field and \( \mathbb{S}_3 \) has sometimes been called the Gersonides partial field. We calculate the fundamental elements of \( \mathbb{S}_5 \), \( \mathbb{G}_2 \), \( \mathbb{G}_3 \), and \( \mathbb{G}_5 \).
Our proofs make use of the SageMath computational package.