Journal of Combinatorial Mathematics and Combinatorial Computing

ISSN: 0835-3026 (print) 2817-576X (online)

The Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC) embarked on its publishing journey in April 1987. From 2024 onward, it publishes four volumes per year in March, June, September and December. JCMCC has gained recognition and visibility in the academic community and is indexed in renowned databases such as MathSciNet, Zentralblatt, Engineering Village and Scopus. The scope of the journal includes; Combinatorial Mathematics, Combinatorial Computing, Artificial Intelligence and applications of Artificial Intelligence in various files.

Cheng Zhao1
1Department of Mathematics West Virginia University Morgantown, WV 26506 U.S.A.
Abstract:

A weight w:E(G){1,2} is called a (1,2)-eulerian weight of graph G if the total weight of each edge-cut is even. A (1,2)-eulerian weight w of G is called smallest if the total weight w of G is minimum. In this note, we prove that if graph G is 2-connected and simple, and w0 is a smallest (1,2)-eulerian weight, then either |Ew0=even||V(G)|3 or G=K4.

G. Kong1, R. Wei2
1Mathematics Teaching-Research Section Nanjing Institute of Posets and Telecommunications Nanjing, 210003 P.R. China
2Department of Mathematics Suzhou University Suzhou, 215006 P.R. China
Abstract:

In this paper we prove that a (v,u;{4},3)-IPBD exists when v,u2 or 3(mod4) and v3u+1, and then solve the problem of the existence of (v,u;{4},λ)-IPBD completely, which generalizes the result of [7].

Lane Clark1
1Southern Illinois University at Carbondale Carbondale, Hlinois 62901-4408
Abstract:

For a wide range of p, we show that almost every graph GϵG(n,p) has no perfect dominating set and for almost every graph GϵG(n,p) we bound the cardinality of a set of vertices which can be perfectly dominated. We also show that almost every tree TϵT(n) has no perfect dominating set.

Charles J. Colbourn1
1Department of Combinatorics and Optimization University of Waterloo Waterloo, Ontario CANADA N2L 3G1
Abstract:

Necessary conditions for the existence of group divisible designs with block size three are developed. A computation is described that establishes the sufficiency of these conditions for sixty and fewer elements.

Dragomir Z. Dokovié1
1Department of Pure Mathematics | University of Waterloo Waterloo, Ontario, Canada N2L 3G1
Abstract:

Four {±1}-matrices A,B,C,D of order n are called good matrices if AIn is skew-symmetric, B,C, and D are symmetric, AAT+BBT+CCT+DDT=4nIn, and, pairwise, they satisfy XYT=YXT. It is known that they exist for odd n31. We construct four sets of good matrices of order 33 and one set for each of the orders 35 and 127.

Consequently, there exist 4-Williamson type matrices of order 35, and a complex Hadamard matrix of order 70. Such matrices are constructed here for the first time. We also deduce that there exists a Hadamard matrix of order 1524 with maximal excess.

Gary Chartrand1, Songlin Tian2
1Westem Michigan University
2Central Missouri State University
Abstract:

For a nonempty subset S of vertices of a k-connected graph G and for 1ik, the Steiner i-distance di(S) of S is the minimum size among all i-connected subgraphs containing S. Relationships between Steiner i-distance and the connectivity and hamiltonian properties of a graph are discussed. For a k-connected graph G of order p and integers i and n with 1ik and 1np, the (i,n)-eccentricity of a vertex v of G is the maximum Steiner i-distance di(S) of a set S containing v with |S|=n. The (i,n)-center Ci,n(G) of G is the subgraph induced by those vertices with minimum (i,n)-eccentricity. It is proved that for every graph H and integers i,n2, there exists an i-connected graph G such that Ci,n(G)H.

L. Tao1, Y. C. Zhao1, B. Narahari2
1Dept. of Computer Science, Concordia Uni- versity, Montreal, Quebec, Canada.
2Dept. of Electrical Engineering and Computer Science, George Washington University, Washington, DC, USA.
Abstract:

This paper studies the problem of allocating interacting program modules, of a distributed program, to the heterogeneous processors in a distributed computer system. The interacting program/task modules are represented by an undirected task graph, whose vertices denote task modules and edges denote interactions between modules. We are given the execution cost of a task module on each processor, the communication cost between two task modules if they are placed on different processors, and the interference cost between two task modules if they are placed on the same processor. The objective of our problem is to assign task modules to the processors such that the total of the above three costs incurred by the program on the system is minimized. The above task assignment problem is known to be NP-hard for a three processor system, but its complexity for a two processor system remained open. In this paper we prove that the problem remains NP-hard for a two processor system even when (1) task graph is planar and has maximum degree 3 or (2) task graph is bipartite. We then present three heuristics, based on simulated annealing, tabu search, and stochastic probe approaches respectively. We present an experimental analysis of these three heuristics, and compare their performance with the only known heuristic method in the literature. Our experiments demonstrate that our heuristics provide major improvements.

D. Roelants van Baronaigien1, Frank Ruskey1
1Department of Computer Science University of Victoria Victoria, B.C, V8W 3P6, Canada
Abstract:

Let C(n,p) denote the set of all subsets of {1,2,,n} whose sum is p, and let C(n,k,p) denote the k-element sets of C(n,p). We show that the elements of C(n,p) and C(n,k,p) can be generated efficiently by simple recursive algorithms. The subsets are represented by characteristic bitstrings and by lists of elements. These representations can be generated in time that is proportional to the number of subsets generated.

Laxmi P. Gewali1
1Department of Computer Science University of Nevada, Las Vegas Las Vegas, NEVADA 89154
Abstract:

Consider the problem of computing a stabber for polygonal objects. Given a set of objects S, an object that intersects with all of them is called the stabber of S. Polynomial time algorithms for constructing a line segment stabber for polygonal objects, if one exists, have been reported in the literature. We introduce the problem of stabbing polygonal objects by monotone chains. We show that a monotone chain that stabs the maximum number of given obstacles can be computed in O(n2logn) time. We also prove that the maximum number of monotone chains required to stab all polygons can be computed in O(n2.5) time. The main tool used in developing both results is the construction of a directed acyclic graph induced by polygonal objects in a given direction. These results have applications for planning collision-free disjoint paths for several mobile robots in a manufacturing environment.

Keith M. Martin1
1Department of Pure Mathematics, The University of Adelaide, G.P.O. Box 498, Adelaide SA 5001, Australia
Abstract:

A secret sharing scheme protects a secret (key) by distributing related information among a group of participants. This is done in such a way that only certain pre-specified groups of these participants (the access structure) can reconstruct the secret. In this paper, we introduce a new measure of the efficiency of a perfect secret sharing scheme and examine methods of producing new secret sharing schemes from existing ones. These constructions can be used to help determine the optimal information rates for certain access structures.

E-mail Alert

Add your e-mail address to receive upcoming issues of Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC).

Special Issues

The Combinatorial Press Editorial Office routinely extends invitations to scholars for the guest editing of Special Issues, focusing on topics of interest to the scientific community. We actively encourage proposals from our readers and authors, directly submitted to us, encompassing subjects within their respective fields of expertise. The Editorial Team, in conjunction with the Editor-in-Chief, will supervise the appointment of Guest Editors and scrutinize Special Issue proposals to ensure content relevance and appropriateness for the journal. To propose a Special Issue, kindly complete all required information for submission;