Journal of Combinatorial Mathematics and Combinatorial Computing

ISSN: 0835-3026 (print) 2817-576X (online)

The Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC) embarked on its publishing journey in April 1987. From 2024 onward, it publishes four volumes per year in March, June, September and December. JCMCC has gained recognition and visibility in the academic community and is indexed in renowned databases such as MathSciNet, Zentralblatt, Engineering Village and Scopus. The scope of the journal includes; Combinatorial Mathematics, Combinatorial Computing, Artificial Intelligence and applications of Artificial Intelligence in various files.

Brendan D. McKay 1, Stanislaw P. Radziszowski2
1Department of Computer Science Australian National University Canberra, ACT 2601, Australia
2 Department of Computer Science Rochester Institute of Technology Rochester, NY 14623, USA
Abstract:

We report on progress towards deciding the existence of 2(22,8,4) designs without assuming any automorphisms. Using computer algorithms, we have shown that in any such design every two blocks have nonempty intersection, every quadruple of points can occur in at most two blocks, and no three blocks can pairwise intersect in a single point.

Qing-de Kang1, Zhi-he Liang2, Yin-zhi Gao2, Gui-hua Yang3
1 Institute of Mathematics Hebei Normal College
2Department of Mathematics Hebei Educational College
3Basic Teaching Bureau Hebei Institute of Finance and Economics Shijiazhuang 050091 P.R. of China
Abstract:

A graph Pn2, n3, is the graph obtained from a path Pn by adding edges that join all vertices u and v with d(u,v)=2. A graph Cn+t, n3 and 1tn, is formed by adding a single pendent edge to t vertices of a cycle of length n. A Web graph W(2,n) is obtained by joining the pendent vertices of a Helm graph (i.e., a Wheel graph with a pendent edge at each cycle vertex) to form a cycle and then adding a single pendent edge to each vertex of this outer cycle. In this paper, we find the gracefulness of Pn2 for any n, of Cn+t for n3 and 1tn, and of W(2,n) for n3. Therefore, three conjectures about labeling graphs —Grace’s, Koh’s, and Gallian’s — are confirmed.

Cecil Rousseau1, Zsolt Tuza2
1 Department of Mathematical Sciences The University of Memphis Memphis, Tennessee, USA
2Computer and Automation Institute Hungarian Academy of Sciences Budapest, Hungary
Abstract:

A problem about “nine foreign journalists” from a Nordic Mathematical Olympiad is used as the starting point for a discussion of a class of extremal problems involving hypergraphs.Specifically, the problem is to find a sharp lower bound for the maximum degree of the hypergraph in terms of the number of (hyper)edges and their cardinalities.

Zhi-Hong Chen1, Hong-Jian Lait2
1 Butler University Indianapolis, IN 46208
2West Virginia University Morgantown, WV 26506
Abstract:

In [Discrete Math. 111 (1993), 113-123], the c-th order edge toughness of a graph G is defined as
τc(G)=minXE(G),&ω(GX)>c{|X|ω(GX)c},
for any 1c|V(G)|1. It is proved that τc(G)k if and only if G has k edge-disjoint spanning forests with exactly c components, and that for a given graph G with s=|E(G)|/(|V(G)|c) and 1c|E(G)|,
τc(G)=s if and only if |E(H)|s(|V(H)|1) for any subgraph H of G. In this note, we shall present short proofs of the abovementioned theorems and shall indicate that these results can be extended to matroids.

F.A. Hummer1, J.D.H. Smith1
1Department of Mathematics Towa State University Ames, IA 50011, U.S.A.
Abstract:

In a group channel, codes correcting and detecting arbitrary patterns of errors (not necessarily “white noise”) are described metrically. This yields sphere-packing and Gilbert bounds on the sizes of all and of maximal codes, respectively. The loop transversal approach builds linear codes correcting arbitrary error patterns. In the binary case, the greedy loop transversal algorithm builds lexicodes.

Yury J.Ilonin1, Mohan S.Shrikhande2
1Department of Mathematics Central Michigan University Mt. Pleasant, MI 48859
2 Department of Mathematics Central Michigan University Mt. Pleasant, MI 48859
Abstract:

A λ-design on v points is a family of v subsets (blocks) of a v-set such that any two distinct blocks intersect in λ points and not all blocks have the same cardinality.Ryser’s and Woodall’s λ-design conjecture states that each λ-design can be obtained from a symmetric design by complementing with respect to a fixed block. In a recent paper, we proved this conjecture for v=p+1,2p+1,3p+1, where p is prime, and remarked that similar methods might work for v=4p+1. In the present paper, we prove the conjecture for λ-designs having replication numbers r and r such that (r1,r1)=4 and, as a consequence, the λ-design conjecture is proved for v=4p+1, where p is prime.

D.V. Chopra1
1Department of Mathematics and Statistics Wichita State University Wichita, KS USA 67208-1595
Abstract:

In this paper, we obtain some combinatorial inequalities involving the parameters of a balanced array (B-array) T of strength four and with two levels. We discuss the usefulness of these inequalities in obtaining an upper bound for the number of constraints of T, and briefly describe the importance of these arrays in the design of experiments as well as in combinatorics.

Jun Wu1
1Department of Pure Mathematics University of Waterloo Waterloo, Ontario N2L 3G1
Abstract:

We call a partition μ=(μ1,,μk) of m, mn, a constrained induced partition (cip) from a partition λ=(λ1,,λr) of n if μiλi for i=1,2,,k. In this paper, we study the set of cips (Sections 1-2), determine cips of size p (Section 4), and give a formula for the number of total subsequences with fixed size chosen from a given multiset such that the multiplicity of each digit in a subsequence is less than or equal to the multiplicity of this digit in the given multiset.

Lyle Bertz1, Songlin Tian1
1Department of Mathematics and Computer Science Central Missouri State University Warrensburg, MO 64093
Abstract:

Let n2 be an arbitrary integer. We show that for any two asymmetric digraphs D and F with m-radFmax{4,n+1}, there exists an asymmetric digraph H such that mM(H)D, mP(H)F, and md(D,F)=n.Furthermore, if K is a nonempty asymmetric digraph isomorphic to an induced subdigraph of both D and F, then there exists a strong asymmetric digraph H such that mM(H)D, mP(H)F, and mM(H)mP(H)K if m-radH0F4, where H0 is a digraph obtained from D and F by identifying vertices similar to those in K.

E-mail Alert

Add your e-mail address to receive upcoming issues of Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC).

Special Issues

The Combinatorial Press Editorial Office routinely extends invitations to scholars for the guest editing of Special Issues, focusing on topics of interest to the scientific community. We actively encourage proposals from our readers and authors, directly submitted to us, encompassing subjects within their respective fields of expertise. The Editorial Team, in conjunction with the Editor-in-Chief, will supervise the appointment of Guest Editors and scrutinize Special Issue proposals to ensure content relevance and appropriateness for the journal. To propose a Special Issue, kindly complete all required information for submission;