Journal of Combinatorial Mathematics and Combinatorial Computing

ISSN: 0835-3026 (print) 2817-576X (online)

The Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC) began its publishing journey in April 1987 and has since become a respected platform for advancing research in combinatorics and its applications.
Open Access: The journal follows the Diamond Open Access model—completely free for both authors and readers, with no article processing charges (APCs)
Publication Frequency: From 2024 onward, JCMCC publishes four issues annually—in March, June, September, and December.
Scope: JCMCC publishes research in combinatorial mathematics and combinatorial computing, as well as in artificial intelligence and its applications across diverse fields.
Indexing & Abstracting: The journal is indexed in MathSciNet, Zentralblatt MATH, and EBSCO, enhancing its visibility and scholarly impact within the international mathematics community.
Rapid Publication: Manuscripts are reviewed and processed efficiently, with accepted papers scheduled for prompt appearance in the next available issue.
Print & Online Editions: All issues are published in both print and online formats to serve the needs of a wide readership.

Neville Robbins1
1Mathematics Department San Francisco State University San Francisco, CA 94132
Abstract:

Let \( f_6(n) \) denote the number of partitions of the natural number \( n \) into parts co-prime to \( 6 \). This function was originally studied by Schur. We derive two explicit formulas for \( f_6(n) \), one of them in terms of the partition function \( p(n) \). We also derive three recurrences for \( f_6(n) \).

Laxmi Gewali1, Navin Rongratana1, Jan B. Pedersen1
1School of Computer Science, University of Nevada 4505 Maryland Parkway Las Vegas, NV, 89154, USA
Abstract:

We consider the problem of relocating a sensor node in its neighborhood so that the connectivity of the network is not altered. In this context, we introduce the notion of \in-free and out-free regions to capture the set of points where the node can be relocated by conserving connectivity. We present a characterization of maximal free-regions that can be used for identifying the position where the node can be moved to increase the reliability of the network connectivity. In addition, we prove that the free-region computation problem has a lower bound \(\Omega(n\log n)\) in the comparison tree model of computation, and also present two approximation algorithms for computing the free region of a sensor node in time \(O(k)\) and \(O(k\log k)\).

Hossein Shahmohamad1, Benjamin Zindle1
1School of Mathematical Sciences, RIT, Rochester, NY 14623
Abstract:

Chain integrator backstepping is a recursive design tool that has been used in nonlinear control systems. The complexity of the computation of the chain integrator backstepping control law makes inevitable the use of a computer algebra system. A recursive algorithm is designed to compute the integrator backstepping control process. A computer algebra program (Maple procedure) is developed for symbolic computation of the control function using a newly developed recursive algorithm. We will present some demonstrative examples to show the stability of the control systems using Lyapunov functions.

Reza Ahangar1, Rongdong Wang1
1Department of Mathematics Texas A&M University-Kingsville, Kingsville, TX 78363, USA
Abstract:

Chain integrator backstepping is a recursive design tool that has been used in nonlinear control systems. The complexity of the computation of the chain integrator backstepping control law makes inevitable the use of a computer algebra system. A recursive algorithm is designed to compute the integrator backstepping control process. A computer algebra program (Maple procedure) is developed for symbolic computation of the control function using a newly developed recursive algorithm. We will present some demonstrative examples to show the stability of the control systems using Lyapunov functions.

Sin-Min Lee1, Ho Kuen Ng2, Siu-Ming Tong3
1Department of Computer Science San Jose State University San Jose, CA 95192, USA
2Department of Mathematics San Jose State University San Jose, CA 95192, USA
3Department of Computer Science Northwestern Polytechnic University Fremont, CA 94539, USA
Abstract:

Let \( G \) be a graph with vertex set \( V(G) \) and edge set \( E(G) \), and let \( A \) be an abelian group. A labeling \( f: V(G) \to A \) induces an edge labeling \( f^*: E(G) \to A \) defined by \( f^*(xy) = f(x) + f(y) \) for each \( xy \in E(G) \). For each \( i \in A \), let \( v_f(i) = \text{card}\{v \in V(G) \mid f(v) = i\} \) and \( e_f(i) = \text{card}\{e \in E(G) \mid f^*(e) = i\} \). Let \( c(f) = \{\lvert e_f(i) – e_f(j) \rvert \mid (i, j) \in A \times A\} \). A labeling \( f \) of a graph \( G \) is said to be \( A \)-friendly if \( \lvert v_f(i) – v_f(j) \rvert \leq 1 \) for all \( (i, j) \in A \times A \). If \( c(f) \) is a \( (0, 1) \)-matrix for an \( A \)-friendly labeling \( f \), then \( f \) is said to be \( A \)-cordial. When \( A = \mathbb{Z}_2 \), the friendly index set of the graph \( G \), \( FI(G) \), is defined as \( \{\lvert e_f(0) – e_f(1) \rvert \mid \text{the vertex labeling } f \text{ is } \mathbb{Z}_2\text{-friendly}\} \). In \([15]\) the friendly index set of a cycle is completely determined. We consider the friendly index sets of broken wheels with three spokes.

Ivana Ilic1, Spyros S. Magliveras1
1Department of Mathematical Sciences, Florida Atlantic University 777 Glades Road, Boca Raton, FL 33431, U.S.A.
Abstract:

The intractability of the traditional discrete logarithm problem (DLP) forms the basis for the design of numerous cryptographic primitives. In \([2]\) M. Sramka et al. generalize the DLP to arbitrary finite groups. One of the reasons mentioned for this generalization is P. Shor’s quantum algorithm \([4]\) which solves efficiently the traditional DLP. The DLP for a non-abelian group is based on a particular representation of the group and a choice of generators. In this paper, we show that care must be taken to ensure that the representation and generators indeed yield an intractable DLP. We show that in \(\text{PSL}(2,p) = \langle \alpha, \beta \rangle\) the generalized discrete logarithm problem with respect to \((\alpha,\beta)\) is easy to solve for a specific representation and choice of generators \(\alpha\) and \(\beta\). As a consequence, such representation of \(\text{PSL}(2,p)\) and generators should not be used to design cryptographic primitives.

Hau Chan1, Dinesh G. Sarvate1
1College Of Charleston, Dept. Of Math., Charleston, SC, 29424
Abstract:

Beautifully Ordered Balanced Incomplete Block Designs, \(\text{BOBIBD}(v, k, \lambda, k_1, \lambda_1)\), are defined and the proof is given to show that necessary conditions are sufficient for the existence of BOBIBDs with block size \(k = 3\) and \(k = 4\) for \(k_1 = 2\) except possibly for eleven exceptions. Existence of BOBIBDs with block size \(k = 4\) and \(k_1 = 3\) is demonstrated for all but one infinite family and the non-existence of \(\text{BOBIBD}(7, 4, 2, 3, 1)\), the first member of the unknown series, is shown.

Mustapha Chellali1
1LAMDA-RO Laboratory Department of Mathematics, University of Blida. B.P. 270, Blida, Algeria.
Abstract:

For a graph \( G = (V, E) \), a non-empty set \( S \subseteq V \) is a global offensive alliance (respectively, global strong offensive alliance) if for every vertex \( v \in V – S \), at least half of the vertices in its closed neighborhood are in \( S \) (respectively, a strict majority of its closed neighborhood are in \( S \)). The global offensive alliance number \( \gamma_o(G) \) (respectively, global strong offensive alliance number \( \gamma_{\hat{o}}(G) \)) is the minimum cardinality of a global offensive alliance (respectively, global strong offensive alliance) of \( G \). In this paper, we determine an upper bound on each parameter for bipartite graphs without isolated vertices. More precisely, we show that \( \gamma_o(G) \leq \frac{n – \ell + s}{2} \) and \( \gamma_{\hat{o}}(G) \leq \frac{n + \ell}{2} \), where \( n \), \( \ell \), and \( s \) are the order, the number of leaves, and the support vertices of \( G \), respectively. Moreover, extremal trees attaining each bound are characterized.

Martin Knor1
1Slovak University of Technology, Faculty of Civil Engineering, Department of Mathematics, Radlinského 11, 813 68 Bratislava, Slovakia,
Abstract:

There is a hypothesis that a non-self-centric radially-maximal graph of radius \( r \) has at least \( 3r – 1 \) vertices. Moreover, if it has exactly \( 3r – 1 \) vertices, then it is planar with minimum degree \( 1 \) and maximum degree \( 3 \). Using an enhanced exhaustive computer search, we prove this hypothesis for \( r = 4, 5 \).

E.J. Cockayne1, S. Finbowtand2, J.S. Swarts1
1Department of Mathematics, University of Victoria, PO Box 3045, Victoria, BC, Canada V8W 3P4
2Department of Mathematics, Statistics and Computer Science, PO Box 5000, Antigonish, NS, Canada B2G 2W5
Abstract:

A vertex set \( X \) of a simple graph is called OO-irredundant if for each \( v \in X \), \( N(v) – N(X – \{v\}) \neq \emptyset \). Basic results for maximal OO-irredundant sets of a graph are obtained.

E-mail Alert

Add your e-mail address to receive upcoming issues of Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC).

Special Issues

The Combinatorial Press Editorial Office routinely extends invitations to scholars for the guest editing of Special Issues, focusing on topics of interest to the scientific community. We actively encourage proposals from our readers and authors, directly submitted to us, encompassing subjects within their respective fields of expertise. The Editorial Team, in conjunction with the Editor-in-Chief, will supervise the appointment of Guest Editors and scrutinize Special Issue proposals to ensure content relevance and appropriateness for the journal. To propose a Special Issue, kindly complete all required information for submission;