Journal of Combinatorial Mathematics and Combinatorial Computing

ISSN: 0835-3026 (print) 2817-576X (online)

The Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC) began its publishing journey in April 1987 and has since become a respected platform for advancing research in combinatorics and its applications.
Open Access: The journal follows the Diamond Open Access model—completely free for both authors and readers, with no article processing charges (APCs)
Publication Frequency: From 2024 onward, JCMCC publishes four issues annually—in March, June, September, and December.
Scope: JCMCC publishes research in combinatorial mathematics and combinatorial computing, as well as in artificial intelligence and its applications across diverse fields.
Indexing & Abstracting: The journal is indexed in MathSciNet, Zentralblatt MATH, and EBSCO, enhancing its visibility and scholarly impact within the international mathematics community.
Rapid Publication: Manuscripts are reviewed and processed efficiently, with accepted papers scheduled for prompt appearance in the next available issue.
Print & Online Editions: All issues are published in both print and online formats to serve the needs of a wide readership.

C. J. Colbourn1, S. Milici2
1Department of Combinatorics and Optimization University of Waterloo Waterloo, Ontario N2L 3G1 CANADA
2Dipartimento di Matematica Viale A. Doria 6 95125 Catania ITALY
Abstract:

For each integer \(v \geq 0\) and each \(\lambda \in \{4, 5, 7, 8\}\), the possible numbers of distinct blocks in a triple system of order \(v\) and index \(\lambda\) is determined. This essentially completes the determination of possible support sizes for triple systems with \(\lambda \leq 8\).

Michael A.Henning1, Henda C.Swart2
1University of Zululand
2University of Natal.
Abstract:

If \(n\) is an integer, \(n \geq 2\), and \(u\) and \(v\) are vertices of a graph \(G\), then \(u\) and \(v\) are said to be \(K_n\)-adjacent vertices of \(G\) if there is a subgraph of \(G\), isomorphic to \(K_n\), containing \(u\) and \(v\). A total \(K_n\)-dominating set of \(G\) is a set \(D\) of vertices such that every vertex of \(G\) is \(K_n\)-adjacent to a vertex of \(D\). The total \(K_n\)-domination number \(\gamma_{K_n}^t(G)\) of \(G\) is the minimum cardinality among the total \(K_n\)-dominating sets of vertices of \(G\). It is shown that, for \(n \in \{3, 4, 5\}\), if \(G\) is a graph with no \(K_n\)-isolated vertex, then \(\gamma_{K_n}^t(G) \leq (2p)/{n}\). Further, \(K_n\)-connectivity is defined and it is shown that, for \(n \in \{3, 4\}\), if \(G\) is a \(K_n\)-connected graph of order \(\geq n + 1\), then \(\gamma_{K_n}^t(G) \leq (2p)/(n + 1)\). We establish that the upper bounds obtained are best possible.

Alan Rahilly1
1Department of Mathematics University of Queensland St. Lucia, 4067, Australia
Abstract:

Let \(D\) and \(\overline{D}^d\) be two designs such that there is a joint embedding \(D’\) and \(\overline{D}’\) of \(D\) and \(\overline{D}\) in a finite projective plane \(\pi\) of order \(n\) such that the points of \(D’\) and the lines of \(\overline{D}’\) are mutually all of the exterior elements of each other. We show that there is a tactical decomposition \(T\) of \(\pi\), two of the tactical configurations of which are \(D’\) and \(\overline{D}’\), and determine combinatorial restrictions on \(n\) and the parameters of \(D\) and \(\overline{D}^d\). We also determine the entries of the incidence matrices of \(T\).

James Dowdy1, Michael E.Mays1
1Department of Mathematics West Virginia University Morgantown, WV 26506
Abstract:

The Josephus problem is concerned with anticipating which will be the last elements left in the ordered set \(\{1, 2, \ldots, n\}\) as successive \(m\)th elements (counting cyclically) are eliminated. We study the set of permutations of \(\{1, 2, \ldots, n\}\) which arise from the different orders of elimination as \(m\) varies, and give a criterion based on the Chinese Remainder Theorem for deciding if a given permutation can be interpreted as arising as a given order of elimination for some step size \(m\) in a Josephus problem.

Ernest F.Brickell1
1Sandia National Laboratories Albuquerque, NM 87185
Abstract:

In a secret sharing scheme, a dealer has a secret. The dealer gives each participant in the scheme a share of the secret. There is a set \(\Gamma\) of subsets of the participants with the property that any subset of participants that is in \(\Gamma\) can determine the secret. In a perfect secret sharing scheme, any subset of participants that is not in \(\Gamma\) cannot obtain any information about the secret. We will say that a perfect secret sharing scheme is ideal if all of the shares are from the same domain as the secret. Shamir and Blakley constructed ideal threshold schemes, and Benaloh has constructed other ideal secret sharing schemes. In this paper, we construct ideal secret sharing schemes for more general access structures which include the multilevel and compartmented access structures proposed by Simmons.

Marttin J.SHARRY1
1Department of Mathematics The University of Queensland St. Lucia, Queensland 4067 AUSTRALIA
Abstract:

It is shown that the collection of all \(\dbinom{12}{5}\) quintuples chosen from a set of twelve points can be partitioned into twelve mutually disjoint \(4-(11,5,1)\) designs in precisely \(24\) non-isomorphic ways. The results obtained are then used to show that the collection of all \(\dbinom{13}{6}\) hextuples chosen from a set of thirteen points cannot be partitioned into thirteen mutually disjoint \(5-(12,6,1)\) designs.

L. J. Cummings1, J. L. Yucas2
1University of Waterloo
2Southern Illinois University
Abstract:

The set of Lyndon words of length \(n\), \(\Lambda_n\), is the set obtained by choosing those strings of length \(n\) over any finite alphabet \(\Sigma\) of cardinality \(\sigma\) which are lexicographically least in the primitive or aperiodic equivalence classes determined by cyclic permutation. It is well-known that \(\Lambda_n\) is a maximal synchronizable code with bounded synchronization delay for fixed word length \(n\). If the Lyndon words of length \(n\) are represented as vertices of the \(n\)-cube, we show that they form a connected set for arbitrary alphabets. Indeed, we show that between any two Lyndon words, there is a path consisting of at most \(2n\) Lyndon words in the \(n\)-cube. Further, we show that there always exists a path of \(n(\sigma – 1) – 1\) Lyndon words in the \(n\)-cube.

Benfu Yang1, Wandi Wei2
1Department of Mathematics Teacher-training College of Chengdu, Chengdu
2Department of Mathematics Sichuan University Chengdu, CHINA
Abstract:

The conjugation relation among the subspaces of a finite unitary geometry and its properties are studied. Then they are used to find some enumeration formulas for the subspaces of the unitary geometry, to prove a type of transitivity of the unitary group, to construct Partially Balanced Incomplete Block (PBIB) designs, and to establish the isomorphism between some known PBIB designs.

Miao Ying1, Zhu Lie1
1Department of Mathematics Suzhou University Suzhou, CHINA
Abstract:

Incomplete group divisible designs (IGDDs) are the group divisible designs (GDDs) missing disjoint sub-GDDs, which need not exist. We denote by \(\text{IGDD}_\text{u}^\text{k}(v, n)\) the design \(\text{GDD}[k, 1, v; uv]\) missing a sub-\(\text{GDD}[k, 1, n; un]\). In this paper, we give the necessary condition for the existence of \(\text{IGDD}_\text{u}^\text{k}(v, n)\) and prove that the necessary condition is also sufficient for \(k = 3\).

E-mail Alert

Add your e-mail address to receive upcoming issues of Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC).

Special Issues

The Combinatorial Press Editorial Office routinely extends invitations to scholars for the guest editing of Special Issues, focusing on topics of interest to the scientific community. We actively encourage proposals from our readers and authors, directly submitted to us, encompassing subjects within their respective fields of expertise. The Editorial Team, in conjunction with the Editor-in-Chief, will supervise the appointment of Guest Editors and scrutinize Special Issue proposals to ensure content relevance and appropriateness for the journal. To propose a Special Issue, kindly complete all required information for submission;