Journal of Combinatorial Mathematics and Combinatorial Computing

ISSN: 0835-3026 (print) 2817-576X (online)

The Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC) began its publishing journey in April 1987 and has since become a respected platform for advancing research in combinatorics and its applications.
Open Access: The journal follows the Diamond Open Access model—completely free for both authors and readers, with no article processing charges (APCs)
Publication Frequency: From 2024 onward, JCMCC publishes four issues annually—in March, June, September, and December.
Scope: JCMCC publishes research in combinatorial mathematics and combinatorial computing, as well as in artificial intelligence and its applications across diverse fields.
Indexing & Abstracting: The journal is indexed in MathSciNet, Zentralblatt MATH, and EBSCO, enhancing its visibility and scholarly impact within the international mathematics community.
Rapid Publication: Manuscripts are reviewed and processed efficiently, with accepted papers scheduled for prompt appearance in the next available issue.
Print & Online Editions: All issues are published in both print and online formats to serve the needs of a wide readership.

Arthur H.Busch1, Michael S.Jacobson1
1Department of Mathematics University of Colorado at Denver Denver, CO 80217
Abstract:

A tournament \(T = (V, A)\) is \({arc-traceable}\) if for each arc \(xy \in A\), \(xy\) lies on a directed path containing all the vertices of \(V\), i.e., a hamiltonian path. In this paper, we give two extremal results related to arc-traceability in tournaments. First, we show that a non-arc-traceable tournament \(T\) which is \(m\)-arc-strong must have at least \(2^{m+1}+4m-3\) vertices, and we construct an example that shows that this result is best possible. Next, we consider the maximum number of arcs in a strong tournament that are not part of any hamiltonian path. We use the structure of non-arc-traceable tournaments to prove that no strong tournament contains more than \(\frac{n^2-4n+3}{8}\) arcs that are not part of a hamiltonian path, and we give the unique example that shows that this bound is best possible.

R.G. Stanton1
1Department of Computer Science University of Manitoba Winnipeg, MB, Canada R3T 2N2
Abstract:

We point out that restricted SB triple systems can only exist for \(v \leq 8\). The case \(v = 8\) is especially interesting since it is extremal in that the pair frequencies of the fifteen pairs not involving either \(1\) or \(2\) must be the frequencies \(2, 3, \dots, 16\), in some order.

Sin-Min Lee1, Yung-Chin Wang2, Yihui Wen3
1Department of Computer Science San Jose State University San Jose, California 95192 U.S.A.
2Department of Physical Therapy Tzu-Hui Institute of Technology Taiwan, Republic of China
3Department of Mathematics Suzhou Science and Technology College Suzhou, Jiangsu 215009 People’s Republic of China
Abstract:

Let \( a \) and \( b \) be two positive integers. For the graph \( G \) with vertex set \( V(G) \) and edge set \( E(G) \) with \( p = |V(G)| \) and \( q = |E(G)| \), we define two sets \( Q(a) \) and \( P(b) \) as follows:

\[
Q(a) = \begin{cases}
\{\pm a, \pm(a+1), \ldots, \pm(a + (q-2)/2)\} & \text{if } q \text{ is even,} \\
\{0\} \cup \{\pm a, \pm(a+1), \ldots, \pm(a + (q-3)/2)\} & \text{if } q \text{ is odd,}
\end{cases}
\]

\[
P(b) = \begin{cases}
\{\pm b, \pm(b+1), \ldots, \pm(b + (p-2)/2)\} & \text{if } p \text{ is even,} \\
\{0\} \cup \{\pm b, \pm(b+1), \ldots, \pm(b + (p-3)/2)\} & \text{if } p \text{ is odd.}
\end{cases}
\]

For the graph \( G \) with \( p = |V(G)| \) and \( q = |E(G)| \), \( G \) is said to be \( Q(a)P(b) \)-super edge-graceful (in short, \( Q(a)P(b) \)-SEG), if there exists a function pair \( (f, f^+) \) which assigns integer labels to the vertices and edges; that is, \( f^+: V(G) \to P(b) \), and \( f: E(G) \to Q(a) \) such that \( f^+ \) is onto \( P(b) \) and \( f \) is onto \( Q(a) \), and

\[
f^+(u) = \sum\{ f(u,v) : (u, v) \in E(G) \}.
\]

We investigate \( Q(a)P(b) \) super-edge-graceful labelings for three classes of \( (p,p+1) \)-graphs.

Kung-Kuen Tse1
1Department of Mathematics and Computer Science Kean University Union, NJ 07083 USA
Abstract:

The Ramsey number \( R(C_p, C_q, C_r) \) is the smallest positive integer \( m \) such that no matter how one colors the edges of the \( K_m \) in red, white, and blue, there must be a red \( C_p \), a white \( C_q \), or a blue \( C_r \). In this work, we verified some known \( R(C_p, C_q, C_r) \) values and computed some new \( R(C_p, C_q, C_r) \) values. The results are based on computer algorithms.

Dharam Chopra1, Sin-Min Lee2
1Department of Mathematics and Statistics Wichita State University Wichita, KS 67260, USA
2Department of Computer Science San Jose State University San Jose, California 95192 U.S.A.
Abstract:

A \( (p,q) \) graph \( G \) is total edge-magic if there exists a bijection \( f: V \cup E \to \{1, 2, \ldots, p+q\} \) such that for each \( e = (u,v) \in E \), we have \( f(u) + f(e) + f(v) \) as a constant. For a graph \( G \), denote \( M(G) \) the set of all total edge-magic labelings. The magic strength of \( G \) is the minimum of all constants among all labelings in \( M(G) \), denoted by \( \text{emt}(G) \). The maximum of all constants among \( M(G) \) is called the maximum magic strength of \( G \) and denoted by \( \text{eMt}(G) \).

Hegde and Shetty classify a magic graph as strong if \( \text{emt}(G) = \text{eMt}(G) \), ideal magic if \( 1 \leq \text{eMt}(G) – \text{emt}(G) \leq p \), and \(\textbf{weak magic}\) if \( \text{eMt}(G) – \text{emt}(G) > p \). A total edge-magic graph is called a super edge-magic if \( f(V(G)) = \{1, 2, \ldots, p\} \). The problem of identifying which kinds of super edge-magic graphs are weak-magic graphs is addressed in this paper.

L.J. Cummings1
1University of Waterloo Waterloo, Ontario, Canada N2L 3G1
Abstract:

For even codeword length \( n = 2k, k > 1 \) and alphabet size \( \sigma > 1 \), a family of comma-free codes is constructed with \({\left\lfloor \frac{\sigma^2}{3} \right\rfloor}^r \left( \sigma^2 – \left\lfloor \frac{\sigma^2}{3} \right\rfloor \right)^{k-r}\) codewords where \( 1 \leq r < k \). In particular, a new maximal comma-free code with \( n = 4 \) and \( \sigma = 4 \) is given by one of these codes.

John J.Lanttanzio1
1Department of Mathematics Indiana University of Pennsylvania, Indiana, PA 15701
Abstract:

If \( K \) is an \( r \)-clique of \( G \) and \( \chi(G) \) decreases by \( r \) upon the removal of all of the vertices in \( K \), then \( K \) is called a critical \( r \)-clique. Two critical cliques are completely independent provided that no vertex in one clique is adjacent to a vertex from the other. An infinite family of graphs is constructed which demonstrates that for every \( s, t \in \mathbb{N} \), there exists a vertex critical graph which admits a critical \( s \)-clique and a critical \( t \)-clique that are completely independent.

D.V. Chopra1, M. Bsharat2
1Wichita State University Wichita, KS 67260-0033, U.S.A.
2Quintiles, Inc Kansas City, Missouri 64134-0708, U.S.A.
Abstract:

In this paper, we obtain a set of inequalities which are necessary conditions for the existence of balanced arrays of strength five, having \( m \) rows (constraints), and with two symbols. We discuss the use of these inequalities to obtain an upper bound on \( m \), and present some illustrative examples.

Yinghong Ma1, Qinglin Yu2
1Department of Computing Science Shandong Normal University, Jinan, Shandong, China
2Center for Combinatorics, LPMC Nankai University, Tianjing, China 3Department of Mathematics and Statistics Thompson Rivers University, Kamloops, BC, Canada
Abstract:

For a graph \( G \) with vertex set \( V(G) \) and edge set \( E(G) \), let \( i(G) \) be the number of isolated vertices in \( G \). The \emph{isolated toughness} of \( G \) is defined as \(I(G) = \min\left\{\frac{|S|}{i(G-S)} \mid S \subseteq V(G), i(G-S) \geq 2 \right\},\)if \( G \) is not complete; and \( I(K_n) = n-1 \). In this paper, we investigate the existence of \([a, b]\)-factors in terms of this graph invariant. We proved that if \( G \) is a graph with \( \delta(G) \geq a \) and \( I(G) \geq a \), then \( G \) has a fractional \( a \)-factor. Moreover, if \( \delta(G) \geq a \), \( I(G) > (a-1) + \frac{a-1}{b} \), and \( G-S \) has no \( (a-1) \)-regular component for any subset \( S \) of \( V(G) \), then \( G \) has an \([a, b]\)-factor. The latter result is a generalization of Katerinis’ well-known theorem about \([a, b]\)-factors (P. Katerinis, Toughness of graphs and the existence of factors, \emph{Discrete Math}. 80(1990), 81-92).

L.H. Clark1, A.T. Mohr1, T.D. Porte1
1Department of Mathematics Southern Illinois University Carbondale, IL 62901-4408
Abstract:

We partition the set of spanning trees contained in the complete graph \( K_n \) into spanning trees contained in the complete bipartite graph \( K_{s,t} \). This classification shows that some properties of spanning trees in \( K_n \) can be derived from trees in \( K_{s,t} \). We use Abel’s binomial theorem and the formula for spanning trees in \( K_{s,t} \) to obtain a proof of Cayley’s theorem using partial derivatives. Some results concerning non-isomorphic spanning trees are presented. In particular, we count these trees for \( Q_3 \) and the Petersen graph.

E-mail Alert

Add your e-mail address to receive upcoming issues of Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC).

Special Issues

The Combinatorial Press Editorial Office routinely extends invitations to scholars for the guest editing of Special Issues, focusing on topics of interest to the scientific community. We actively encourage proposals from our readers and authors, directly submitted to us, encompassing subjects within their respective fields of expertise. The Editorial Team, in conjunction with the Editor-in-Chief, will supervise the appointment of Guest Editors and scrutinize Special Issue proposals to ensure content relevance and appropriateness for the journal. To propose a Special Issue, kindly complete all required information for submission;