Journal of Combinatorial Mathematics and Combinatorial Computing

ISSN: 0835-3026 (print) 2817-576X (online)

The Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC) embarked on its publishing journey in April 1987. From 2024 onward, it publishes four volumes per year in March, June, September and December. JCMCC has gained recognition and visibility in the academic community and is indexed in renowned databases such as MathSciNet, Zentralblatt, Engineering Village and Scopus. The scope of the journal includes; Combinatorial Mathematics, Combinatorial Computing, Artificial Intelligence and applications of Artificial Intelligence in various files.

Xiaochen Cheng1
1Business School, Southwest Jiaotong University Hope College, Chengdu 610400, China
Abstract:

In the modern era, the cultivation of foreign talents extends beyond the traditional enhancement of humanistic knowledge, with literature playing a pivotal role. Addressing the challenges posed by the “golden curriculum,” this study uses the “Selected British and American Stories” program as an example to explore a blended learning and sorting approach. Aligned with the Ministry of Education’s emphasis on “golden subjects,” the research formulates an implementation strategy for curriculum development. In the context of the Ministry’s promotion of the mixed funding program in 2019, the study highlights the necessity of guiding students to utilize the Internet for data-driven blended learning. By emphasizing active engagement, intrinsic motivation, and flexible learning approaches, the proposed strategy aims to enhance teaching quality and align with contemporary educational reform priorities. Furthermore, the paper underscores the significance of equitable teaching evaluation as a feedback mechanism, actively contributing to the overall improvement of teaching quality.

Shahrzad. S. Mirdamad1, Doost Ali Mojdeh1
1Department of Mathematics, Faculty of Mathematical Sciences, University of Mazandaran, Babolsar, Iran
Abstract:

An injective coloring of a given graph G=(V,E) is a vertex coloring of G such that any two vertices with a common neighbor receive distinct colors. An e-injective coloring of a graph G is a vertex coloring of G in which any two vertices v,u with a common edge e (euv) receive distinct colors; in other words, any two end vertices of a path P4 in G achieve different colors. With this new definition, we want to take a review of injective coloring of a graph from the new point of view. For this purpose, we review the conjectures raised so far in the literature of injective coloring and 2-distance coloring, from the new approach of e-injective coloring. Additionally, we prove that, for disjoint graphs G,H, with E(G) and E(H), χei(GH)=max{χei(G),χei(H)} and χei(GH)=|V(G)|+|V(H)|. The e-injective chromatic number of G versus the maximum degree and packing number of G is investigated, and we denote max{χei(G),χei(H)}χei(G◻H)χ2(G)χ2(H). Finally, we prove that, for any tree T (T is not a star), χei(T)=χ(T), and we obtain the exact value of the e-injective chromatic number for some specified graphs.

S. Madhumitha1, Sudev Naduvath1
1Department of Mathematics, Christ University, Bangalore, India
Abstract:

In the literature of algebraic graph theory, an algebraic intersection graph called the invariant intersection graph of a graph has been constructed from the automorphism group of a graph. A specific class of these invariant intersection graphs was identified as the n-inordinate invariant intersection graphs, and its structural properties has been studied. In this article, we study the different types of proper vertex coloring schemes of these n-inordinate invariant intersection graphs and their complements, by obtaining the coloring pattern and the chromatic number associated.

Yangning Ning1
1University of New South Wales, Beaconsfield, 2015, NSW, Australia
Abstract:

This paper examines how digital entertainment consumption drives China’s economic growth from multiple dimensions. Using panel data from 260 prefecture-level cities (2020–2022) and a multi-temporal double-difference method, the study finds that digital entertainment consumption significantly promotes economic growth, with a direct effect coefficient of 0.748. Robustness tests via the PSM-DID method confirm this effect, with a coefficient of 0.714, significant at the 5% level. In the low digital divide group, the regression coefficient is 6.325, while it is significantly lower in the high digital divide group, indicating that the digital divide weakens the effect. Heterogeneity analysis shows that enhancing consumer experience, generating new businesses, and boosting cultural influence positively impact growth. The findings provide insights for the sustainable development of the entertainment industry and the digital economy.

Wenjuan Li1, Xinghua Liu2, Shiyue Zhou1
1Management Science and Engineering School of Shandong University of Finance and Economics, Jinan, Shandong, 250000, China
2Suffolk County, New York, 11790, USA
Abstract:

Financial frauds, often executed through asset transfers and profit inflation, aim to reduce taxes and secure credits. To enhance the accuracy and efficiency of accounting data auditing, this study proposes an anomaly detection scheme based on a deep autoencoder neural network. Financial statement entries are extracted from the accounting information system, and global and local anomaly features are defined based on the attribute values of normal and fraudulent accounts, corresponding to individual and combined anomaly attribute values. The AE network is trained to identify anomalies using account attribute scores. Results demonstrate classification accuracies of 91.7%, 90.3%, and 90.9% for sample ratios of 8:2, 7:3, and 6:4, respectively. The precision, recall, and F1 score reach 90.85%, 90.77%, and 90.81%, respectively. Training takes 95.81ms, with recognition classification requiring only 0.02ms. The proposed deep neural network achieves high recognition accuracy and speed, significantly improving the detection of financial statement anomalies and fraud.

Tianyu Li1
1Carey Business School, Johns Hopkins University, District of Columbia, 20001, Washington, United States of America
Abstract:

The core of financial institutions’ big data lies in risk control, making network security threat identification essential for enhancing data processing and service levels. This study applies the principles of network information transmission security prevention, combining frequency domain analysis and distributed processing to extract threat characteristics. A financial network security threat identification model is developed using BiGRU and Transformer models, and a SQLIA defense system is constructed by integrating multi-variant execution and SQL injection attack prevention. Additionally, an intelligent network security defense strategy is formulated based on finite rationality theory. Simulation results show an F1 composite score of 90.78% for threat identification, and the STRIPS-BR defense strategy reduces relative risk by 74.81% during peak times compared to other strategies. Supported by big data, this system ensures secure data transmission and enhances the network service capabilities of financial institutions.

Botao Yu1
1Heze Emergency Management Support and Technical Service Center, Heze 274000, Shandong, China
Abstract:

Fine chemical processes are integral to modern industries such as automotive, environmental protection, aviation, and new energy. However, these processes involve highly toxic substances and complex chemical interactions, making them vulnerable to uncontrollable circumstances and posing significant risks to human safety and the environment. This work proposes an enhanced GA-LVW algorithm for reliability assessment of fine chemical processes, focusing on essential operating units. The method utilizes global-local structure analysis to extract features from operating unit variables, reducing data noise, simplifying the construction of fuzzy rules, and improving model resilience. The extracted features are integrated into a fuzzy inference system. The proposed approach is validated using the Tennessee Eastman (TE) process model and the R-22 production process in a fluoride facility. Results demonstrate that the enhanced GA-LVW algorithm significantly improves the system’s efficiency and maintainability compared to conventional fuzzy inference systems.

Cong Xu1, Jingjing Xie2
1Nanjing Normal University of Special Education, Nanjing 210000, Jiangsu, China
2School of International Business, Hainan College of Foreign Studies, Wenchang 571321, Hainan, China
Abstract:

Over the past two decades, with the support of the Party and the state, universities have established educational principles integrating curriculum reform, teaching beliefs, and political theories. Despite significant progress in ideological and political theory research, challenges remain that hinder sustainable development. This paper leverages a computerized algorithmic model of complex information networks to explore the intersection of scientific and humanistic approaches in education. By combining these methods, the study provides an optimized knowledge and political model for university education and analyzes its credibility. Empirical results indicate that the proposed model achieves a 91% accuracy rate. The improved model enhances the intellectual and political vitality of university theoretical courses, strengthens educational principles, and ensures the quality of university education.

Ravindra Pawar1, Tarkeshwar Singh1, Himadri Mukherjee1, Jay Bagga2
1Department of Mathematics, BITS Pilani K K Birla Goa Campus, Goa, India
2Department of Computer Science, Ball State University, Indiana, USA
Abstract:

A positive integer k is called a magic constant if there is a graph G along with a bijective function f from V(G) to the first |V(G)| natural numbers such that the weight of the vertex w(v)=uvEf(u)=k for all vV. It is known that all odd positive integers greater than or equal to 3 and the integer powers of 2, 2t, t6, are magic constants. In this paper, we characterize all positive integers that are magic constants and generate all distance magic graphs, up to isomorphism, of order up to 10.

Afeefa Maryam1, M. Tariq Rahim1, Fawad Hussain1
1Department of Mathematics, Abbattabad University of Science and Technology, Pakistan
Abstract:

The Radenković and Gutman conjecture establishes a relationship between the Laplacian eigenvalues of any tree Tn, the star graph Sn, and the path graph Pn, i.e., LE(Pn)LE(Tn)LE(Sn). In this paper, we prove this conjecture for a class of trees with n vertices and having diameter 16 to 30.

E-mail Alert

Add your e-mail address to receive upcoming issues of Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC).

Special Issues

The Combinatorial Press Editorial Office routinely extends invitations to scholars for the guest editing of Special Issues, focusing on topics of interest to the scientific community. We actively encourage proposals from our readers and authors, directly submitted to us, encompassing subjects within their respective fields of expertise. The Editorial Team, in conjunction with the Editor-in-Chief, will supervise the appointment of Guest Editors and scrutinize Special Issue proposals to ensure content relevance and appropriateness for the journal. To propose a Special Issue, kindly complete all required information for submission;