Michael A. Henning1, Henda C. Swart2
1University of Zululand
2University of Natal.
Abstract:

If \(n\) is an integer, \(n \geq 2\), and \(u\) and \(v\) are vertices of a graph \(G\), then \(u\) and \(v\) are said to be \(K_n\)-adjacent vertices of \(G\) if there is a subgraph of \(G\), isomorphic to \(K_n\), containing \(u\) and \(v\). A total \(K_n\)-dominating set of \(G\) is a set \(D\) of vertices such that every vertex of \(G\) is \(K_n\)-adjacent to a vertex of \(D\). The total \(K_n\)-domination number \(\gamma_{K_n}^t(G)\) of \(G\) is the minimum cardinality among the total \(K_n\)-dominating sets of vertices of \(G\). It is shown that, for \(n \in \{3, 4, 5\}\), if \(G\) is a graph with no \(K_n\)-isolated vertex, then \(\gamma_{K_n}^t(G) \leq (2p)/{n}\). Further, \(K_n\)-connectivity is defined and it is shown that, for \(n \in \{3, 4\}\), if \(G\) is a \(K_n\)-connected graph of order \(\geq n + 1\), then \(\gamma_{K_n}^t(G) \leq (2p)/(n + 1)\). We establish that the upper bounds obtained are best possible.

Alan Rahilly1
1Department of Mathematics University of Queensland St. Lucia, 4067, Australia
Abstract:

Let \(D\) and \(\overline{D}^d\) be two designs such that there is a joint embedding \(D’\) and \(\overline{D}’\) of \(D\) and \(\overline{D}\) in a finite projective plane \(\pi\) of order \(n\) such that the points of \(D’\) and the lines of \(\overline{D}’\) are mutually all of the exterior elements of each other. We show that there is a tactical decomposition \(T\) of \(\pi\), two of the tactical configurations of which are \(D’\) and \(\overline{D}’\), and determine combinatorial restrictions on \(n\) and the parameters of \(D\) and \(\overline{D}^d\). We also determine the entries of the incidence matrices of \(T\).

James Dowdy1, Michael E. Mays1
1Department of Mathematics West Virginia University Morgantown, WV 26506
Abstract:

The Josephus problem is concerned with anticipating which will be the last elements left in the ordered set \(\{1, 2, \ldots, n\}\) as successive $m$th elements (counting cyclically) are eliminated. We study the set of permutations of \(\{1, 2, \ldots, n\}\) which arise from the different orders of elimination as \(m\) varies, and give a criterion based on the Chinese Remainder Theorem for deciding if a given permutation can be interpreted as arising as a given order of elimination for some step size \(m\) in a Josephus problem.

Ernest F. Brickell1
1Sandia National Laboratories Albuquerque, NM 87185
Abstract:

In a secret sharing scheme, a dealer has a secret. The dealer gives each participant in the scheme a share of the secret. There is a set \(\Gamma\) of subsets of the participants with the property that any subset of participants that is in \(\Gamma\) can determine the secret. In a perfect secret sharing scheme, any subset of participants that is not in \(\Gamma\) cannot obtain any information about the secret. We will say that a perfect secret sharing scheme is ideal if all of the shares are from the same domain as the secret. Shamir and Blakley constructed ideal threshold schemes, and Benaloh has constructed other ideal secret sharing schemes. In this paper, we construct ideal secret sharing schemes for more general access structures which include the multilevel and compartmented access structures proposed by Simmons.

MartTIN J. SHARRY1
1Department of Mathematics The University of Queensland St. Lucia, Queensland 4067 AUSTRALIA
Abstract:

It is shown that the collection of all \(\dbinom{12}{5}\) quintuples chosen from a set of twelve points can be partitioned into twelve mutually disjoint \(4-(11,5,1)\) designs in precisely \(24\) non-isomorphic ways. The results obtained are then used to show that the collection of all \(\dbinom{13}{6}\) hextuples chosen from a set of thirteen points cannot be partitioned into thirteen mutually disjoint \(5-(12,6,1)\) designs.

L. J. Cummings1, J. L. Yucas2
1University of Waterloo
2Southern Illinois University
Abstract:

The set of Lyndon words of length \(n\), \(\Lambda_n\), is the set obtained by choosing those strings of length \(n\) over any finite alphabet \(\Sigma\) of cardinality \(\sigma\) which are lexicographically least in the primitive or aperiodic equivalence classes determined by cyclic permutation. It is well-known that \(\Lambda_n\) is a maximal synchronizable code with bounded synchronization delay for fixed word length \(n\). If the Lyndon words of length \(n\) are represented as vertices of the \(n\)-cube, we show that they form a connected set for arbitrary alphabets. Indeed, we show that between any two Lyndon words, there is a path consisting of at most \(2n\) Lyndon words in the \(n\)-cube. Further, we show that there always exists a path of \(n(\sigma – 1) – 1\) Lyndon words in the \(n\)-cube.

Benfu Yang1, Wandi Wei2
1Department of Mathematics Teacher-training College of Chengdu, Chengdu
2Department of Mathematics Sichuan University Chengdu, CHINA
Abstract:

The conjugation relation among the subspaces of a finite unitary geometry and its properties are studied. Then they are used to find some enumeration formulas for the subspaces of the unitary geometry, to prove a type of transitivity of the unitary group, to construct Partially Balanced Incomplete Block (PBIB) designs, and to establish the isomorphism between some known PBIB designs.

Miao Ying1, Zhu Lie1
1Department of Mathematics Suzhou University Suzhou, CHINA
Abstract:

Incomplete group divisible designs (IGDDs) are the group divisible designs (GDDs) missing disjoint sub-GDDs, which need not exist. We denote by \(\text{IGDD}_\text{u}^\text{k}(v, n)\) the design \(\text{GDD}[k, 1, v; uv]\) missing a sub-\(\text{GDD}[k, 1, n; un]\). In this paper, we give the necessary condition for the existence of \(\text{IGDD}_\text{u}^\text{k}(v, n)\) and prove that the necessary condition is also sufficient for \(k = 3\).

Michael R. Fellows1, Sam Stueckle2
1Computer Science Department, University of Idaho, Moscow, ID 83843.
2Mathematics Department, Clemson University, Clemson, SC 29631.
Abstract:

The \({vertex \; integrity}\) of a graph \(I(G)\), is given by \(I(G) = \min_{V’} (|V’| + m(G – V’))\) where \(V’ \subseteq V(G)\) and \(m(G – V’)\) is the maximum order of a component of \(G – V’\). The \({edge \; integrity}\), \(I'(G)\), is similarly defined to be \(I'(G) = \min_{E’} (|E’| + m(G – E’))\). Both of these are measures of the resistance of networks to disruption. It is shown that for each positive integer \(k\), the family of finite graphs \(G\) with \(I'(G) \leq k\) is a lower ideal in the partial ordering of graphs by immersions. The obstruction sets for \(k\leq 4\) are determined and it is shown that the obstructions for arbitrary \(k\) are computable. For every fixed positive integer \(k\), it is decidable in time \(O(n)\) for an arbitrary graph \(G\) of order \(n\) whether \(I(G)\) is at most \(k\), and also whether \(I'(G)\) is at most \(k\). For variable \(k\), the problem of determining whether \(I'(G)\) is at most \(k\) is shown to be NP-complete, complementing a similar previous result concerning \(I(G)\).

E-mail Alert

Add your e-mail address to receive upcoming issues of Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC).

Special Issues

The Combinatorial Press Editorial Office routinely extends invitations to scholars for the guest editing of Special Issues, focusing on topics of interest to the scientific community. We actively encourage proposals from our readers and authors, directly submitted to us, encompassing subjects within their respective fields of expertise. The Editorial Team, in conjunction with the Editor-in-Chief, will supervise the appointment of Guest Editors and scrutinize Special Issue proposals to ensure content relevance and appropriateness for the journal. To propose a Special Issue, kindly complete all required information for submission;