Huang Yi Ru1, Zhang Ke Mint 2
1Department of Mathematics Shanghai University Shanghai 201800 P.R. of China
2 Department of Mathematics Nanjing University Nanjing 210008 P.R. of China
Abstract:

The two-color Ramsey number \(R(k, l)\) is the smallest integer \(p\) such that for any graph \(G\) on \(p\) vertices either \(G\) contains a \(K_k\) or \(\overline{G}\) contains a \(K_l\), where \(\overline{G}\) denotes the complement of \(G\). A new upper bound formula is given for two-color Ramsey numbers. For example, we get \(R(7,9) \leq 1713\),
\(R(8,10) \leq 6090\) etc.

R.G. Stanton1
1Department of Computer Science University of Manitoba Winnipeg, Canada, R3T 2N2
Cora Stack 1
1 School of Science, Institute of Technology Tallaght, Dublin Ireland
Abstract:

Let \(M\) be a finite dimensional commutative nilpotent algebra over a field \(K\) of prime characteristic \(p\). It has been conjectured that \(\dim M \geq p \;\dim M^{(p)}\),
where \(M^{(p)}\) is the subalgebra of \(M\) generated by \(x^p\), \(x \in M\), \([2]\).
This was proved (by Eggert) in the case \(\dim M^{(p)} \leq 2\) in \(1971\). This result was extended to the noncommutative case in \(1994\) \([8]\). Not only is this conjecture important in its own right, but it was shown (by Eggert) that a proof of the above conjecture would result in a complete classification of the group of units of finite commutative rings of characteristic \(p\) with an identity. In this short paper, we obtain a proof of Eggert’s conjecture in the case \(\dim M^{(p)} = 3\).

N.C.K. Phillips1, W.D. Wallis 1, R.S. Rees 2
1Southern Illinois University at Carbondale
2Memorial University of Newfoundland
Abstract:

Černý, Horák, and Wallis introduced a generalization of Kirkman’s Schoolgirl Problem to the case where the number of schoolgirls is not a multiple of three; they require all blocks to be of size three, except that each resolution class should contain either one block of size two (when \(v \equiv 2 \pmod{3}\)) or one block of size four (when \(v \equiv 1 \pmod{3}\)). We consider the problem of determining the maximum (resp. minimum) possible number of resolution classes such that any pair of elements (schoolgirls) is covered at most (resp. at least) once.

Mirka Miller1, Mirka Slamin2, Joseph Ryan 3, William F. Smyth4,5
1 Department of Computer Science University of Newcastle, NSW 2308, Australia
2Department of Computer Science University of Newcastle, NSW 2308, Australia
3Department of Management University of Newcastle, NSW 2308, Australia
4 School of Computing, Curtin University Bentley, WA 6102, Australia
5Department of Computer Science and Systems McMaster University, Hamilton, Ontario, Canada
Abstract:

A simple undirected graph \(G\) is called a \emph{sum graph} if there exists a labelling \(\lambda\) of the vertices of \(G\) into distinct positive integers such that any two distinct vertices \(u\) and \(v\) of \(G\) are adjacent if and only if there is a vertex \(w\) whose label \(\lambda(w) = \lambda(u) + \lambda(v)\). It is obvious that every sum graph has at least one isolated vertex, namely the vertex with the largest label. The \emph{sum number} \(\sigma(H)\) of a connected graph \(H\) is the least number \(r\) of isolated vertices \(\overline{K}_r\) such that \(G = H + \overline{K}_r\) is a sum graph.
It is clear that if \(H\) is of size \(m\), then \(\sigma(H) \leq m\). Recently, Hartsfield and Smyth showed that for wheels \(W_n\) of order \(n+1\) and size \(m = 2n\), \(\sigma(W_n) \in \Theta(m)\); that is, that the sum number is of the same order of magnitude as the size of the graph. In this paper, we refine these results to show that for even \(n \geq 4\), \(\sigma(W_n) = {n}/{2} + 2\), while for odd \(n \geq 5\) we disprove a conjecture of Hartsfield and Smyth by showing that \(\sigma(W_n) = n\). Labellings are given that achieve these minima.

C. Koukouvinos1, M. Mitrouli2, Jennifer Seberry 3
1 Department of Mathematics, National Technical University of Athens, Zografou 15773, Athens, Greece
2 Department of Mathematics, University of Athens, Panepistemiopolis 15784, Athens, Greece
3School of IT and Computer Science, University of Wollongong, Wollongong, NSW, 2522, Australia.
Abstract:

We give a new algorithm which allows us to construct new sets of sequences with entries from the commuting variables \(0, \pm a, \pm b\), with zero autocorrelation function.
We show that for eight cases if the designs exist they cannot be constructed using four circulant matrices in the Goethals-Seidel array. Furthermore, we show that the necessary conditions for the existence of an \(\text{OD}(44; s_1, s_2)\) are sufficient
except possibly for the following \(8\) cases:
\begin{align*}
(5,34), (8,31), (9,33), (13,29),\\
(7,32), (9,30), (11,30), (15,26)
\end{align*}
which could not be found because of the large size of the search space for a complete search. These cases remain open. In all we find \(399\) cases, show \(67\) do not exist
and establish \(8\) cases cannot be constructed using four circulant matrices.
We give a new construction for \(\text{OD}(2n)\) and \(\text{OD}(n+1)\) from \(\text{OD}(n)\).

We note that all \(\text{OD}(44; s_1, 44-s_2)\) are known except for \(\text{OD}(44; 16, 28)\). These give \(21\) equivalence classes of Hadamard matrices.

Wen-Ai Jackson1, Keith M. Martin‘ 1
1Department of Pure Mathematics, The University of Adelaide, Adelaide SA 5005, Australia
Abstract:

In this paper, we review combinatorial models for secret sharing schemes. A detailed comparison of several existing combinatorial models for secret sharing schemes is conducted. We pay particular attention to the ideal instances of these combinatorial models. We show that the models under examination have a natural hierarchy, but that the ideal instances of these models have a different hierarchy. We demonstrate that, in the ideal case, the combinatorial structures underlying the combinatorial models are essentially independent of the model being used. Furthermore, we show that the matroid
associated with an ideal scheme is uniquely determined by the access structure of the scheme and is independent of the model being used. Using this result, we present a combinatorial classification of
ideal threshold schemes.

K. J. Horadam1, Cantian Lin1
1 Department of Mathematics, Royal Melbourne Institute of Technology, Melbourne, VIC 3001, Australia.
Abstract:

We describe several techniques for constructing \(n\)-dimensional Hadamard matrices from \(2\)-dimensional Hadamard matrices, and note that they may be applied to any perfect binary array \((PBA)\), thus optimally improving a result of Yang. We introduce cocyclic perfect binary arrays, whose energy is not restricted to being a perfect square. These include
all of Jedwab’s generalized perfect binary arrays. There are many more cocyclic \(PBAs\) than \(PBAs\). We resolve a potential ambiguity inherent in the “weak difference set” construction of \(n\)-dimensional Hadamard matrices from cocyclic \(PBAs\) and show it
is a relative difference set construction.

Jonathan Earl Holland1, Earl Glen Whitehead, Jr.1
1Department of Mathematics University of Pittsburgh Pittsburgh, PA 15260, USA
Abstract:

Two graphs are matching equivalent if they have the same matching polynomial. We prove that several infinite families of pairs of graphs are pairwise matching equivalent. We also establish some divisibility relations among matching polynomials. Furthermore, we demonstrate that the matching polynomials of certain graphs serve as a polynomial model for the Fibonacci numbers and the Lucas numbers.

Dean G. Hoffman1, avid A. Piket2
1 Department of Discrete and Statistical Sciences Auburn University, Auburn, Alabama, USA. 36849-5307
2Department of Mathematics East Central University, Ada, Oklahoma, USA. 74820-6899
Abstract:

In this paper, we establish necessary and sufficient conditions on \(m\) and \(n\) in order for \(K_m \times K_n\), the Cartesian product of two complete graphs, to be decomposable into cycles of length \(4\). The main result is that \(K_m \times K_n\) can be decomposed into cycles of length \(4\) if and only if either \(m, n \equiv 0 \pmod{2}\), \(m, n \equiv 1 \pmod{8}\), or \(m, n \equiv 5 \pmod{8}\).

Akbar Hassani1, Mohammad A. Iranmanesh1, Cheryl E. Praeger1
1 Department of Mathematics The University of Western Australia, Nedlands, WA 6907, Australia
Abstract:

This paper contributes to the determination of all integers of the form \(pqr\), where \(p\), \(q\), and \(r\) are distinct odd primes, for which there exists a vertex-transitive graph on \(pqr\) vertices that is not a Cayley graph. The paper addresses the situation where there exists a vertex-transitive subgroup \(G\) of automorphisms of such a graph
which has a chain \(1 < N < K < G\) of normal subgroups, such that both \(N\) and \(K\) are intransitive on vertices and the \(N\)-orbits are proper subsets of the \(K\)-orbits.

Marc Gysin 1, Jennifer Seberry1
1 Centre for Computer Security Research, Department of Computer Science, The University of Wollongong, Wollongong, NSW 2500, Australia
Abstract:

We discuss difference sets (DS) and supplementary difference sets (SDS) over rings. We survey some constructions of SDS over Galois rings where there are no short orbits. From there, we move to constructions involving short orbits, yielding new infinite families
of SDS over \(\text{GF}(p) \times \text{GF}(q)\), \(p\), \(q\) both prime powers.
Many of these families have \(\lambda = 1\). We also present new balanced incomplete block designs and pairwise balanced designs arising from the constructions given here.

Malcolm Greig 1, Dinesh G. Sarvate2
1 Greig Consulting, 5685 Daffodil Drive, West Vancouver, B.C., Canada, V7W 1P2
2Department of Mathematics, University of Charleston, Charleston, SC 29424
Abstract:

Using a blend of Drake’s and Saha’s techniques, we construct a \(\text{BTD}(n^2/4; (n^2 + n)/2; 2n – 4, 3, 2n + 2; n; 8)\) whenever \(n\) is a power of \(2\), as well as some new symmetric \(\text{BTDs}\).It is known that the necessary condition \(v \equiv 1 \pmod{2}\) is sufficient for the existence of simple \(\text{BIBD}(v, 3, 3)\).In the second part of this paper, we provide a simple construction based on graph factorization to prove this result whenever \(v\) is not divisible by \(3\).We then expand upon this result to exhibit further constructions of \(\text{BTDs}\).

Derek Goh1, Deborah J Street1
1 School of Mathematical Sciences University of Technology, Sydney New South Wales 2007 AUSTRALIA
Abstract:

We consider the projective properties of small Hadamard matrices when viewed as two-level \(OAs\) of strength two. We show that in some cases sets of rows with the same type of
projection form balanced incomplete block designs.

G. M. Foust 1, C.A. Rodger1
1 Department of Discrete and Statistical Sciences 120 Math Annex Auburn University, Alabama USA 36849-5307
Abstract:

Let \(H_i\) be the \(3\)-uniform hypergraph on \(4\) vertices with \(i\) hyperedges. In this paper, we settle the existence of \(H_3\)-hypergraph designs of index \(\lambda\), obtaining simple \(H_3\)-hypergraph designs when \(\lambda = 2\), and providing a new proof of their existence when \(\lambda = 1\). The existence of simple \(H_2\)-hypergraph designs of index \(\lambda\) is completely settled, as is the spectrum of \(H_2\)-hypergraph designs of index \(\lambda\).

Diane Donovan1, Adelle Howse 1
1Centre for Discrete Mathematics and Computing, Mathematics Department, The University of Queensland, Queensland, 4072, Australia
Abstract:

This paper provides a general method for finding a critical set for any Latin square of order \(n\). This method is used to prove the existence of critical sets of various sizes. It has also been applied to all main classes of Latin squares of order seven, thereby producing a critical set for each Latin square of order seven.

I. J. Dejter1, Curt Lindner2, A. Rosa3
1Department of Mathematics, Faculty of Natural Sciences University of Puerto Rico Rio Piedras, Puerto Rico 00931
2Department of Discrete and Statistical Sciences 120 Mathematics Annex, Auburn University Auburn, Alabama 36849-5307
3 Department of Mathematics and Statistics McMaster University Hamilton, Ontario, CANADA L8S 4K1
L. J. Cummings 1
1University of Waterloo Dedicated to Anne Penfold Street.
Abstract:

Anne Street wrote an expository article about de Bruijn graphs in the 1970’s. We review some subsequent lines of research, at least one of which was inspired by her article.

Robert S. Coulter1, George Havas 1, Marie Henderson1
1Centre for Discrete Mathematics and Computing Department of Computer Science and Electrical Engineering The University of Queensland Queensland, 4072, Australia
Abstract:

No general algorithm is known for the functional decomposition of wild polynomials over a finite field. However, partial solutions exist. In particular, a fast functional decomposition algorithm for linearised polynomials has been developed using factoring
methods in skew-polynomial rings. This algorithm is extended to a related class of wild polynomials, which are sub-linearised polynomials.

Andrew Clark 1, Ed Dawson1
1Information Security Research Centre Queensland University of Technology GPO Box 2434, Brisbane 4000, Queensland, Australia
Abstract:

This paper presents a comparison of the performance of three optimisation heuristics in automated attacks on a simple classical cipher. The three optimisation heuristics considered are simulated annealing, the genetic algorithm, and the tabu search. Although
similar attacks have been proposed previously, a comparison of multiple techniques has not been performed. Performance criteria such as efficiency and speed are investigated. The use of tabu search in the field of automated cryptanalysis is a largely unexplored area of research. A new attack on the simple substitution cipher utilizing tabu search is also presented in this paper.

Ghulam-Rasool Chaudhry1, Hossein Ghodosi1, Jennifer Seberry1
1Department of Computer Science Centre for Computer Security Research University of Wollongong Wollongong, NSW 2500, AUSTRALIA
Abstract:

Secret sharing schemes are one of the most important primitives in distributed systems. In perfect secret sharing schemes, collaboration between unauthorized participants cannot reduce their uncertainty about the secret. This paper presents a perfect secret sharing scheme arising from critical sets of Room squares.

Elizabeth J. Billington1, C. C. Lindner2
1 Department of Mathematics University of Queensland Brisbane, Queensland 4072 AUSTRALIA
2Department of Discrete and Statistical Sciences 120 Mathematics Annex Auburn University Auburn, Alabama 36849 USA
J. A. Bate1, G. H. J. van Rees2
1Department of Computer Science University Of Manitoba Winnipeg, Manitoba Canada R3T 2N2
2Department of Computer Science University Of Manitoba Winnipeg, Manitoba Canada R3T 2N2
Abstract:

Let \(L(n, k, p, t)\) denote the minimum number of subsets of size \(k\) (\(k\)-subsets) of a set of size \(n\) (\(n\)-set) such that any \(p\)-subset intersects at least one of these \(k\)-subsets in at least \(t\) elements. The value of \(L(n, 6, 6, 2)\) is determined for \(n \leq 54\).

A. Baliga 1
1Department of Mathematics, RMIT., GPO Box 2476V, Melbourne, VIC 3001, Australia.
Abstract:

The structure of cocyclic Hadamard matrices allows for a much faster and more systematic search for binary, self-dual codes. Here, we consider \(\mathbf{Z}_{2}^{2} \times \mathbf{Z}_{t}\)-cocyclic Hadamard matrices for \(t = 3, 5, 7,\) and \(9\) to yield binary
self-dual codes of lengths \(24, 40, 56,\) and \(72\). We show that the extended Golay code cannot be obtained as a member of this class and also demonstrate the existence of four apparently new codes – a \([56, 28, 8]\) code and three \([72, 36, 8]\) codes.

E-mail Alert

Add your e-mail address to receive upcoming issues of Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC).

Special Issues

The Combinatorial Press Editorial Office routinely extends invitations to scholars for the guest editing of Special Issues, focusing on topics of interest to the scientific community. We actively encourage proposals from our readers and authors, directly submitted to us, encompassing subjects within their respective fields of expertise. The Editorial Team, in conjunction with the Editor-in-Chief, will supervise the appointment of Guest Editors and scrutinize Special Issue proposals to ensure content relevance and appropriateness for the journal. To propose a Special Issue, kindly complete all required information for submission;