Journal of Combinatorial Mathematics and Combinatorial Computing
ISSN: 0835-3026 (print) 2817-576X (online)
The Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC) began its publishing journey in April 1987 and has since become a respected platform for advancing research in combinatorics and its applications.
Open Access: The journal follows the Diamond Open Access model—completely free for both authors and readers, with no article processing charges (APCs).
Publication Frequency: From 2024 onward, JCMCC publishes four issues annually—in March, June, September, and December.
Scope: JCMCC publishes research in combinatorial mathematics and combinatorial computing, as well as in artificial intelligence and its applications across diverse fields.
Indexing & Abstracting: The journal is indexed in MathSciNet, Zentralblatt MATH, and EBSCO, enhancing its visibility and scholarly impact within the international mathematics community.
Rapid Publication: Manuscripts are reviewed and processed efficiently, with accepted papers scheduled for prompt appearance in the next available issue.
Print & Online Editions: All issues are published in both print and online formats to serve the needs of a wide readership.
- Research article
- https://doi.org/10.61091/jcmcc130-16
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 130
- Pages: 241-253
- Published Online: 10/04/2026
What are the collections of sets \({A}_i\subset\mathbb{Z}\) such that any \(n\in\mathbb{Z}\) has exactly one representation as \(n=a_0+a_1+\dotsb\) with \(a_i\in{A}_i\)? The answer for \(\mathbb{N}_0\) instead of \(\mathbb{Z}\) is given by a theorem of de Bruijn. We describe a family of natural candidate collections for \(\mathbb{Z}\), which we call canonical collections. Translating the problem into the language of dynamical systems, we show that the question of whether the sumset of a canonical collection covers the entire \(\mathbb{Z}\) is difficult: specifically, there is a collection for which this question is equivalent to the Collatz conjecture, and there is a well-behaved family of collections for which this question is equivalent to the universal halting problem for Fractran and is therefore undecidable.
- Research article
- https://doi.org/10.61091/jcmcc130-15
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 130
- Pages: 227-240
- Published Online: 03/04/2026
We extend the study of link-irregular graphs to directed graphs (digraphs), where a digraph is link-irregular if no two vertices have isomorphic directed links. We establish that link-irregular digraphs exist on n vertices if and only if n ≥ 5, and prove that their underlying graphs must contain 3-cycles. We conjecture that link-irregular tournaments exist if and only if n ≥ 6, providing explicit constructions for n ≤ 8 and computational verification for n ≤ 100. We derive lower bounds on the minimum degree and outdegree required for link-irregularity, establish that almost all link-irregular digraphs are nonplanar, and prove that any link-irregular orientable graph admits a link-irregular labeling. Additionally, we construct explicit examples of link-irregular digraphs with constant outdegree and regular tournaments.
- Research article
- https://doi.org/10.61091/jcmcc130-14
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 130
- Pages: 207-226
- Published Online: 03/04/2026
In food processing, effective optimization of process parameters can improve product quality, reduce production costs, and shorten production cycles. This paper improves the traditional particle swarm optimization algorithm by introducing an adaptive learning factor and an elite particle variation strategy, thereby balancing global search and local convergence while preventing particle aggregation and local optima. Using kimchi as a case study, an optimization model including fermentation temperature and other variables is developed, and the improved algorithm is applied to the multi-objective optimization of processing parameters to achieve optimal product quality. Experimental results are compared with those of the traditional particle swarm algorithm and the response surface method. The findings show that the improved model requires only 43 iterations and reduces final risk loss by 14.26%, outperforming the other two methods, which require 52 and 100 iterations, respectively. Thus, the improved particle swarm optimization model can effectively shorten the optimization cycle and reduce the cost of food-processing parameter optimization.
- Research article
- https://doi.org/10.61091/jcmcc130-13
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 130
- Pages: 187-205
- Published Online: 30/03/2026
This work introduces two algebraic variants of the Massey-Omura cryptosystem based on newly defined generalized (k,t)-Jacobsthal p-numbers and their extensions to finite groups. We first generalize the classical Jacobsthal recurrence and establish structural properties including periodicity, invertibility conditions, and recurrence behavior modulo finite integers. These results are then extended to group-theoretic settings, where we construct the corresponding (k,t)-Jacobsthal sequences in specific finite groups and derive their sequence periods. Leveraging these algebraic foundations, we propose two Massey-Omura-type encryption schemes in which private exponents are selected from the generalized Jacobsthal sequences. We formally prove the correctness of both constructions and analyze the implications of periodicity on exponent invertibility and protocol feasibility. The proposed schemes do not introduce new hardness assumptions beyond those inherent in the underlying platform group. Instead, they provide a mathematically structured alternative to classical exponent selection in three-pass protocols. The results highlight a new connection between recurrence-defined sequences and multiplicative exponentiation in finite groups, offering an algebraically motivated direction for exploring generalized exponent families in symmetric and non-abelian cryptosystems.
- Research article
- https://doi.org/10.61091/jcmcc130-12
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 130
- Pages: 165-185
- Published Online: 07/03/2026
We study the Equivalent Local Sequence Problem (ELSP), which consists in recovering an explicit sequence of local complementations that transforms a graph into a locally equivalent one. Focusing on directed Paley graphs, we establish that local complementations commute and induce a free action of an elementary abelian 2-group. The stabilizer condition is reformulated as a system of convolution equations and analyzed through Fourier techniques over finite fields, leading to a proof of stabilizer triviality. As a consequence, each graph in the orbit admits a unique subset encoding, and ELSP reduces to solving a linear inversion problem over 𝔽2. This characterization completely resolves ELSP for directed Paley graphs, provides a polynomial-time inversion algorithm and highlights structural features that may support future developments in cryptographic frameworks and quantum graph-state models.
- Research article
- https://doi.org/10.61091/jcmcc130-11
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 130
- Pages: 151-164
- Published Online: 07/03/2026
Given a configuration of pebbles on the edges of a connected graph G, an edge pebbling move is defined as the removal of two pebbles off an edge and placing one on an adjacent edge. The domination cover edge pebbling number of a graph G is the minimum number of pebbles required such that the set of edges that contain pebbles form an edge dominating set S of G, for the initial configuration of pebbles can be altered by a sequence of pebbling moves and it is denoted by ψe(G) for a graph G. In this paper, we determine ψe(G) for Generalized Petersen graph, Jewel graph and Triangular snake graph.
- Research article
- https://doi.org/10.61091/jcmcc130-10
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 130
- Pages: 137-149
- Published Online: 20/02/2026
In this paper we study group divisible designs (GDDs) with block size 4 and two groups of different sizes when λ2 = 1. We obtain necessary conditions for the existence of such GDDs and prove that these necessary conditions are sufficient in several cases. Further, we present general constructions using resolvable designs.
- Research article
- https://doi.org/10.61091/jcmcc130-09
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 130
- Pages: 123-136
- Published Online: 20/02/2026
In 1940, Birkhoff posed an open problem of counting all finite lattices on n elements. Recently, Bhavale counted all non-isomorphic lattices on n elements, containing up to four reducible elements, and having nullity up to three. Further, Aware and Bhavale counted all non-isomorphic lattices on n elements, containing up to five comparable reducible elements, and having nullity up to three. In this paper, we count all non-isomorphic lattices on n elements, containing five reducible elements, and having nullity three.
- Research article
- https://doi.org/10.61091/jcmcc130-08
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 130
- Pages: 107-121
- Published Online: 14/02/2026
The unit graph of a commutative ring with a non-zero identity is a graph with vertices as ring elements, and there is an edge between two distinct vertices if their sum is a unit. This study investigates the decomposition of the unit graph by examining its induced subgraphs and analyze key graph invariants, such as connectivity, diameter, and girth, for a finite local ring. We further decompose the unit graph of certain finite commutative rings into fundamental structures, such as cycle and star graphs.
- Research article
- https://doi.org/10.61091/jcmcc130-07
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 130
- Pages: 97-105
- Published Online: 14/02/2026
A mapping of the set of undirected simple (loopless) graphs to itself is a linear operator if it maps the edgeless graph to the edgeless graph and maps the union of graphs to the union of their images. A linear operator preserves a set if it maps that set to itself. We study linear operators that map sets defined by the restriction of their chromatic number. For example the set of all graphs whose chromatic number is at least \(k\) for some fixed \(3\leq k\leq n\). We show these linear operators must be vertex permutations.




