Chithra M.R.1, A. Vijayakumar 1
1Department of Mathematics Cochin University of Science and Technology, Cochin-682022, India.
Abstract:

The diameter of a graph can be affected by the addition or the deletion of some edges. In [3], we have studied the diameter variability of the Cartesian product of graphs. In this paper, we discuss about two fundamental products, strong and lexicographic products of graphs, whose diameter increases (decreases) by the deletion (addition) of a single edge. The problems of minimality and maximality of the product graphs with respect to its diameter are also solved. These problems are motivated by the fact that these graph products are good interconnection networks.

Yaping Mao1, Yubo Gao1, Zhao Wang1, Chengfu Ye1
1Department of Mathematics, Qinghai Normal University, Xining, Qinghai 810008, China
Abstract:

The concept of the skew energy of a digraph was introduced by Adiga, Balakrishnan and So in 2010. An oriented graph \( G^{\sigma} \) is a simple undirected graph \( G \) with an orientation, which assigns to each edge a direction so that \( G^{\sigma} \) becomes a directed graph. Then \( G \) is called the underlying graph of \( G^{\sigma} \). Let \( S(G^{\sigma}) \) be the skew-adjacency matrix of \( G^{\sigma} \) and \( \lambda_1, \lambda_2, \ldots, \lambda_n \) denote all the eigenvalues of \( S(G^{\sigma}) \). The skew energy of \( G^{\sigma} \) is defined as the sum of the absolute values of all eigenvalues of \( S(G^{\sigma}) \). Recently, Gong, Li and Xu determined all oriented graphs with minimal skew energy among all connected oriented graphs on \( n \) vertices with \( m \) (\( n \leq m \leq 2(n-2) \)) arcs. In this paper, we determine all oriented graphs with the second and the third minimal skew energy among all connected oriented graphs with \( n \) vertices and \( m \) (\( n \leq m < 2(n-2) \)) arcs. In particular, when the oriented graphs are unicyclic digraphs or bicyclic digraphs, the second and the third minimal skew energy is determined.

Zhongxun Zhu1, Yunchao Hong1, Meiying Jiang1
1College of Mathematics and Statistics, South Central University for Nationalities, Wuhan 430074, P.R. China
Abstract:

In this paper, according to the symmetric Lanczos algorithm and general Gauss-type quadrature rule, we give some lower bounds on the Resolvent Estrada index \( EE_r(G) \) and the Resolvent energy \( ER(G) \).

R. Sritharan1
1Computer Science Department The University of Dayton 300 College Park Dayton, OH 45469
Abstract:

The chordal-(\(k,l\)) sandwich and strongly chordal-(\(k,l\)) sandwich problems were considered in recent work [8, 9] where classification of the complexities of the problems for all possible nonnegative integer values for \(k, l\) was considered. We extend the classification in [8, 9] by presenting polynomial time algorithms for some cases that remained open; currently, very few graph sandwich problems are known to be solvable in polynomial time.

Dewey T. Taylo1, Christopher A. Whisenant1
1Department of Mathematics and Applied Mathematics Virginia Commonwealth University Richmond, VA 23284-2014, USA
Abstract:

An odd open dominating set of a graph is a subset of the graph’s vertices with the property that the open neighborhood of each vertex in the graph contains an odd number of vertices in the subset. An odd closed \( r \)-dominating set is a subset of the graph’s vertices with the property that the closed \( r \)-ball centered at each vertex in the graph contains an odd number of vertices in the subset.

We show that the \( n \)-fold direct product of simple graphs has an odd open dominating set if and only if each factor has an odd open dominating set. Secondly, we show that the \( n \)-fold strong product of simple graphs has an odd closed \( r \)-dominating set if and only if each factor has an odd closed \( r \)-dominating set.

Xiuli Wang1, Yakun Hao1
1College of Science, Civil Aviation University of China, Tianjin, 300300, P.R.China.
Abstract:

Multireceiver authentication codes allow one sender to construct an authenticated message for a group of receivers such that each receiver can verify the authenticity of the received message. In this paper, we construct one multireceiver authentication code from pseudo-symplectic geometry over finite fields. The parameters and the probabilities of deceptions of the codes are also computed. The smaller the probability of successful attack, the higher the security of the authentication codes.

Ahmad Abu-Khazneh1, Alexey Pokrovskiy2
1London School of Economics, ETH Zurich, WC2A 2AE, London, UK
28092 Zurich, Switzerland
Abstract:

Ryser’s Conjecture states that for any \( r \)-partite \( r \)-uniform hypergraph, the vertex cover number is at most \( r-1 \) times the matching number. This conjecture is only known to be true for \( r \leq 3 \). For intersecting hypergraphs, Ryser’s Conjecture reduces to saying that the edges of every \( r \)-partite intersecting hypergraph can be covered by \( r-1 \) vertices. This special case of the conjecture has only been proven for \( r \leq 5 \).

It is interesting to study hypergraphs which are extremal in Ryser’s Conjecture, i.e., those hypergraphs for which the vertex cover number is exactly \( r-1 \) times the matching number. There are very few known constructions of such graphs. For large \( r \), the only known constructions come from projective planes and exist only when \( r-1 \) is a prime power. Mansour, Song, and Yuster studied how few edges a hypergraph which is extremal for Ryser’s Conjecture can have. They defined \( f(r) \) as the minimum integer so that there exists an \( r \)-partite intersecting hypergraph \( \mathcal{H} \) with \( \tau(\mathcal{H}) = r-1 \) and with \( f(r) \) edges. They showed that \( f(3) = 3 \), \( f(4) = 6 \), \( f(5) = 9 \), and \( 12 \leq f(6) \leq 15 \).

In this paper, we focus on the cases when \( r = 6, 7 \), and \( 11 \). We show that \( f(6) = 13 \), improving previous bounds. Also, by providing the first known extremal hypergraphs for the \( r = 7 \) and \( r = 11 \) case of Ryser’s Conjecture, we show that \( f(7) \leq 22 \) and \( f(11) \leq 51 \). Our results for \( f(6) \) and \( f(7) \) have been obtained independently by Aharoni, Barat, and Wanless.

Abstract:

Let \( T = S \setminus \left( \cup \left\{ A : A \, \text{ in } \, \mathcal{A} \right\} \right) \), where \( S \) is an orthogonal polytope in \( \mathbb{R}^d \) for \( d \geq 2 \) and where \( \mathcal{A} \) is a collection of \( n \) pairwise disjoint open boxes contained in \( S \). Point \( x \) belongs to \(\text{Ker } T \) if and only if \( x \) belongs to \(\text{Ker } S \) and no coordinate line at \( x \) meets any \( A \) in \( \mathcal{A} \). In turn, this relationship between the staircase kernels of \( S \) and \( T \) produces a Krasnosel’skii-type result for \( T \) in terms of \( n \), extending the class of orthogonal polytopes for which such a theorem exists.

Yunshu Gao1, Haijuan Zhou1
1School of Mathematics and Statistics, Ningxia University Yinchuan, 750021, P. R. China
Abstract:

A graph is said to be claw-free if it does not contain an induced subgraph isomorphic to \(K_{1,3}\). Let \(k\) be an integer with \(k \geq 2\). We prove that if \(G\) is a claw-free graph of order at least \(14k – 13\) and with minimum degree at least four, then \(G\) contains \(k\) vertex-disjoint copies of \(K_{1,4}\). This partially supports a conjecture proposed by Jiang, Chiba, Fujita and Yan.

P. Kaemawichanurat1, L. Caccetta2
1Western Australian Centre of Excellence in Industrial Optimisation(WACEIO)
2Department of Mathematics and Statistics, Curtin University, GPO Box U1987, Perth, WA 6845, Australia
Abstract:

A graph \( G \) is said to be \( k \)-\(\gamma\)-edge critical if the domination number \(\gamma(G) = k\) and \(\gamma(G + uv) < k\) for every \( uv \notin E(G) \). For the connected domination number \(\gamma_c(G) = k\), the total domination number \(\gamma_t(G) = k\) and the independent domination number \( i(G) = k \), a \( k \)-\(\gamma_c\)-edge critical graph, a \( k \)-\(\gamma_t\)-edge critical graph and a \( k \)-\(i\)-edge critical graph are similarly defined. In our previous work, we proved that every \( 2 \)-connected \( k \)-\(\gamma_c\)-edge critical graph is hamiltonian for \( 1 \leq k \leq 3 \) and we provided a class of \( l \)-connected \( k \)-\(\gamma_c\)-edge critical non-hamiltonian graphs for \( k \geq 4 \) and \( 2 \leq l \leq \frac{n-3}{k-1} \). The problem of interest is to determine a sufficient condition for \( k \)-\(\gamma_c\)-edge critical graphs to be hamiltonian for \( k \geq 4 \). In this paper, we prove that every \( 2 \)-connected \( 4 \)-\(\gamma_c\)-edge critical claw-free graph is hamiltonian. For \( k \geq 5 \), we provide a class of \( k \)-\(\gamma_c\)-edge critical claw-free non-hamiltonian graphs of connectivity two. We further show that all \( 3 \)-connected \( k \)-\(\gamma_c\)-edge critical claw-free graphs are hamiltonian for \( 1 \leq k \leq 6 \). Our methodology also establishes some results on the hamiltonian properties of \( 3 \)-connected \( k \)-\(\mathcal{D} \)-edge critical claw-free graphs where \( \mathcal{D} \in \{ \gamma, \gamma_t, i \} \).

E-mail Alert

Add your e-mail address to receive upcoming issues of Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC).

Special Issues

The Combinatorial Press Editorial Office routinely extends invitations to scholars for the guest editing of Special Issues, focusing on topics of interest to the scientific community. We actively encourage proposals from our readers and authors, directly submitted to us, encompassing subjects within their respective fields of expertise. The Editorial Team, in conjunction with the Editor-in-Chief, will supervise the appointment of Guest Editors and scrutinize Special Issue proposals to ensure content relevance and appropriateness for the journal. To propose a Special Issue, kindly complete all required information for submission;