Ian T. Roberts1, Sue D’Arcy1, Judith Egan1, Martin Griittmiiller2
1School of Engineering, Charles Darwin University Darwin NT 0909, Australia
2Department of Mathematics, University of Rostock 18051 Rostock, Germany
Abstract:

The cardinality of the minimal pairwise balanced designs on v elements with largest block size k is denoted by g(k)(v). It is known that 31g(4)(18)33. In this paper, we show that g(4)(18)31.

Michelle Davidson1, Lynn Batten2
1Department of Mathematics University of Manitoba Winnipeg, Manitoba CANADA R3T 2N2
2School of Information Technology Deakin University 221 Burwood Highway Burwood 3125 AUSTRALIA
Abstract:

In 1966, Wagner used computational search methods to construct a [23,14,5] code. This code has been examined with much interest since that time, in hopes of finding a geometric construction and possible code extensions. In this article, we give a simple geometric construction for Wagner’s code and consider extensions of this construction.

C.C. Lindner1, Giovanni Lo Faro2, Antoinette Tripodi2
1Department of Mathematics and Statistics, Auburn University, Auburn, Alabama 36849, USA
2Department of Mathematics, University of Messina Contrada Papardo,31-98166 Sant’Agata, Messina, Italy
M.V. Bapat1, N.B. Limaye2
1Department of Mathematics Vidyanagari, University of Mumbai Mumbai – 400098, INDIA
2Department of Mathematics S. 8. H. Kelkar College, Devgad Maharashtra, INDIA
Abstract:

A graph G is said to be Ek-Cordial if there is an edge labeling f:E(G){0,1,,k1} such that, at each vertex v, the sum modulo k of the labels on the edges incident with v is f(v) and it satisfies the inequalities |vf(i)vf(j)|1 and |ef(i)ef(j)|1, where vf(s) and ef(t) are, respectively, the number of vertices labeled with s and the number of edges labeled with t. The map f is then called an Ek-cordial labeling of G.

This paper investigates E3-cordiality of snakes, one point unions, path unions, and coronas involving complete graphs.

Khurram H. Shafique1, Ronald D. Dutton1
1School of Computer Science University of Central Florida Orlando, FL USA 82816
Abstract:

A defensive k-alliance in a graph G=(V,E) is a set of vertices AV such that for every vertex vA, the number of neighbors v has in A is at least k more than the number of neighbors it has in VA (where k is a measure of the strength of the alliance). In this paper, we deal with two types of sets associated with defensive k-alliances: maximum defensive k-alliance free and minimum defensive k-alliance cover sets.

Define a set XV to be maximum defensive k-alliance free if X does not contain any defensive k-alliance and is the largest such set. A set YV is called a minimumdefensivekalliancecover if Y contains at least one vertex from each defensive k-alliance and is a set of minimum cardinality satisfying this property. We present bounds on the cardinalities of maximum defensive k-alliance free and minimum defensive k-alliance cover sets.

Jarred T. Collins1, Norman J.Finizio1
1Department of Mathematics University of Rhode Island Kingston, RI 02881
Abstract:

This is the first in a series of three papers in which we investigate a special class of designs that we designate as “Moore-Greig Designs”. The sobriquet is associated with the fact that ideas gleaned from two constructions, one due to E. H. Moore (1896) and the other due to M. Greig (2003), are combined to produce designs that have remarkable properties and features. A Moore-Greig Design is an RBIBD that contains, simultaneously, nested RBIBDs, nested GWhDs, many GWhDs, frames, nested frames, GWhFrames, nested GWhFrames, GWhaFrames, RRDFs, and nested RRDFs. All of these designs are Z-cyclic.

To be more precise, let p be a prime and let {si}i=1m be a monotone increasing sequence of positive integers such that si|si+1 for all i,1im1. Let n be a positive integer such that smn and sm|n. A Moore-Greig Design is a Z-cyclic (pn,psm,psm1)-RBIBD that contains: (1) a Z-cyclic (pn,psi,psi1)-RBIBD for each i,1im1, (2) a Z-cyclic (psi,psm) GWhD(pn) for each i,1im1, (3) for each i,1im1, a Z-cyclic (psi,psm) GWhDa(pn) for each a=αpsi1, α=1,2,,psi2, (4) a Z-cyclic {psm}-frame of type (psm1)q, where q=pn1psm1, (5) a Z-cyclic (psi,psm) GWhFrame of type (psm1)q for each i,1im1, (6) a Z-cyclic (pn1,psi1,psi,1)-RRDF for each i,1im.

Other than a single published example, there is no literature pertaining to GWhDs. Therefore, the infinite classes of GWhDs constructed from the Moore-Greig Designs are the first general results related to this type of design. It is also believed that many of the other designs contained within the infinite classes of Moore-Greig designs are new.

In this paper, Part I, we provide detailed descriptions of both the Moore construction and the Greig construction. In the case of the Moore construction, we supply proofs since such proofs are lacking in Moore’s paper. Also included in this paper is a description of Moore-Greig Designs corresponding to m=2 and a discussion is given of the presence of the GWhFrames, nested designs, and the RRDFs. Our methods are such that the constructions are straightforward if one has the (associated) Galois Field.

Lucia Moura1, Sebastian Raaphors1
1School of Information Technology and Engineering University of Ottawa
Abstract:

Anti-Pasch partial Steiner triple systems (anti-Pasch PSTSs) arise in erasure codes, extremal set systems, and combinatorial design theory. Maximal anti-Pasch PSTSs correspond to erasure-resilient codes that are used for handling failures in large disk arrays. These codes support the failure of any set of 3 disks and most sets of 4 disks while having the smallest possible update penalty and check-disk overhead.

In this article, we apply a general algorithm for isomorph-free exhaustive generation of incidence structures to the specific case of anti-Pasch PSTSs. We develop and implement a distributed version of the algorithm, which is experimentally analyzed. Using this implementation, we obtain a complete, isomorph-free catalogue of the maximal anti-Pasch PSTSs of order v, for v15. The enumeration and classification results for 10v14 are new and computationally nontrivial.

AP Burger1, WR Griindlingh2, JH van Vuuren2
1Department of Mathematics and Statistics, University of Victoria, PO Box 3045, Victoria, BC, Canada, V8W 3P4,
2Department of Applied Mathematics, Stellenbosch University, Private Bag X1, Matieland, 7602, Republic of South Africa
Abstract:

Consider a lottery scheme consisting of randomly selecting a winning t-set from a universal m-set, while a player participates in the scheme by purchasing a playing set of any number of n-sets from the universal set prior to the draw. The player is awarded a prize if k or more elements in the winning t-set match those of at least one of the player’s n-sets in his playing set (1kmin{n,t}m). This is called a k-prize. The player may wish to design a \emph{smallest} playing set which guarantees the player a k-prize, no matter which winning t-set is chosen from the universal set.

In this paper, we consider the optimality of the 302 cardinality 7 (or less) lottery design listings in \verb”BELIC” R: LottoSystemsandTotoSystemstowinWheelGame, [online], [cited 2003, October 31], available from: {http://www.xs4all.nl/ rbelic/}, for which m>20. It is shown, by means of a computerized search technique, that 192 of these designs are optimal, whilst 78 are not, in which case we provide optimal designs.

Then, an additional 429 upper bounds in the tables of Belic (not necessarily of cardinality 7 or less) are improved; 126 of which are optimal. Thus, apart from the 192 designs that we show to be optimal, 204 new lottery numbers are established in this paper, and a further 304 upper bounds are improved. Finally, the optimality of 54 designs of cardinality 7 or less could not be established; however, in each of these cases, a hitherto best known lower bound is provided.

John P. McSorley1
1Department of Mathematics Southern Illinois University Carbondale. IL 62901-4408
Abstract:

For a simple graph G, consider an injection μ:VEN. If for every vertex xV we have μ(x)+yxμ(xy)=h, and for every edge xyE(G) we have μ(x)+μ(xy)+μ(y)=k, for some constants h and k, then μ is a totally magic injection (TMI) of G. Also, mt(G) is the smallest number in N such that there is a TMI μ:VE{1,2,,mt(G)}. Here we study TMIs and the number mt(G) for certain G. One theorem, the Star Theorem, is useful for eliminating many classes of well-known graphs that could have a TMI. For most n and nj, the following graphs do not have a TMI: every non-star tree, Pn, Cn, Wn, Kn, and Kn1,n2,,np. We determine mt(F) for every forest F that has a TMI, and mt(G) for every graph G with 6 vertices that has a TMI.

Henry Escuadro1, Futaba Okamoto1, Ping Zhang1
1Department of Mathematics Western Michigan University Kalamazoo, MI 49008 USA
Abstract:

For a connected graph G of order n3 and an ordered factorization F={G1,G2,,Gk} of G into k spanning subgraphs Gi (1ik), the color code of a vertex v of G with respect to F is the ordered k-tuple c(v)=(a1,a2,,ak) where ai=degGiv. If distinct vertices have distinct color codes, then the factorization F is called a detectable factorization of G; while the detection number det(G) of G is the minimum positive integer k for which G has a detectable factorization into k factors. We study detectable factorizations of cubic graphs. It is shown that there is a unique graph F for which the Petersen graph has a detectable F-factorization into three factors. Furthermore, if G is a connected cubic graph of order (k+23) with det(G)=k, then k2(mod4) or k3(mod4). We investigate the largest order of a connected cubic graph with prescribed detection number.

Gilbert Eyabi1, Renu Laskar1
1Department of Mathematical Sciences, Clemson University
Abstract:

An (2,1) coloring of a graph G=(V,E) is a vertex coloring f:V(G){0,1,2,,k} such that |f(u)f(v)|2 for all uvE(G) and |f(u)f(v)|1 if d(u,v)=2. The span λ(G) is the smallest k for which G has an L(2,1) coloring. A span coloring is an L(2,1) coloring whose greatest color is λ(G). An L(2,1)-coloring f is a full-coloring if f:V(G){0,1,2,,λ(G)} is onto and f is an irreducible no-hole coloring (inh-coloring) if f:V(G){0,1,2,,k} is onto for some k and there does not exist an L(2,1)-coloring g such that g(u)<f(u) for all uV(G) and g(v)<f(v) for some vV(G). The Assignment sum of f on G is the sum of all the labels assigned to the vertices of G by the L(2,1) coloring f. The Sumcoloringnumber of G, introduced in this paper, (G), is the minimum assignment sum over all the possible L(2,1) colorings of G. f is a Sum coloring on G if its assignment sum equals the Sumcoloringnumber. In this paper, we investigate the Sumcoloringnumbers of certain classes of graphs. It is shown that (Pn)=2(n1) and (Cn)=2n for all n. We also give an exact value for the Sum coloring number of a star and conjecture a bound for the Sum coloring number of an arbitrary graph G with span λ(G).

Krystyna T.Balitiska1, Michael L. Gargano2, Louis V.Quintas2, Krzysztof T.Zwierzynski1
1The Technical University of Poznan pl. M. Sklodowskiej-Curie 5, 60-965 Poznan, POLAND
2Pace University Pace Plaza, New York, NY 10038, U.S.A.
Abstract:

Let U(n,f) denote the graph with vertex set the set of unlabeled graphs of order n that have no vertex of degree greater than f. Two vertices H and G of U(n,f) are adjacent if and only if H and G differ (up to isomorphism) by exactly one edge. The problem of determining the values of n and f for which U(n,f) contains a Hamilton path is investigated. There are only a few known non-trivial cases for which a Hamilton path exists. Specifically, these are U(5,3), U(6,3), and U(7,3). On the other hand, there are many cases for which it is shown that no Hamilton path exists. The complete solution of this problem is unresolved.

Russeli Ang1, Jennifer Seberry1, Tadeusz Wysocki2
1Centre for Computer Security Research, School of IT and Computer Science
2School of Electrical, Computer and Telecommunications Engineering, University of Wollongong NSW 2522 Australia
Abstract:

We study nega-cyclic ±1 matrices. We obtain preliminary results which are then used to decrease the search space. We find that there are 2, 4, 9, 23, 63, and 187 ip-equivalence classes for lengths 3, 5, 7, 9, 11, and 13 respectively. The matrices we find are used in a variant given here of the Goethals-Seidel array to form Hadamard matrices, the aim being to later check them for suitability for CDMA schemes.

E-mail Alert

Add your e-mail address to receive upcoming issues of Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC).

Special Issues

The Combinatorial Press Editorial Office routinely extends invitations to scholars for the guest editing of Special Issues, focusing on topics of interest to the scientific community. We actively encourage proposals from our readers and authors, directly submitted to us, encompassing subjects within their respective fields of expertise. The Editorial Team, in conjunction with the Editor-in-Chief, will supervise the appointment of Guest Editors and scrutinize Special Issue proposals to ensure content relevance and appropriateness for the journal. To propose a Special Issue, kindly complete all required information for submission;