Journal of Combinatorial Mathematics and Combinatorial Computing

ISSN: 0835-3026 (print) 2817-576X (online)

The Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC) embarked on its publishing journey in April 1987. From 2024 onward, it publishes four volumes per year in March, June, September and December. JCMCC has gained recognition and visibility in the academic community and is indexed in renowned databases such as MathSciNet, Zentralblatt, Engineering Village and Scopus. The scope of the journal includes; Combinatorial Mathematics, Combinatorial Computing, Artificial Intelligence and applications of Artificial Intelligence in various files.

Youssef Ahendouz1, Ismail Akharraz1
1Mathematical and Informatics Engineering Laboratory Ibn Zohr University – Morocco
Abstract:

Let p be a prime number, and let k and m be positive integers with k2. This paper studies the algebraic structure of λ-constacyclic codes of arbitrary length over the finite commutative ring R=Fpm[u,v]uk,v2,uvvu, where λ is a unit in R given by λ=i=0k1λiui+vi=0k1λiui, with λi,λiFpm and λ0,λ10. We provide a complete classification of these constacyclic codes, determine their dual structures, and compute their Hamming distances when the code length is ps.

Madhu Dadhwal1, Pankaj .2
1Department of Mathematics and Statistics, Himachal Pradesh University, Summer Hill, Shimla, 171005, India
2Department of Mathematics, Government College Chamba, Himachal Pradesh, 176314, India
Abstract:

In this paper, the hyperoctahedral group algebra F[Sn] over a splitting field F of wreath product Sn with char(F)|Sn|, is considered and the unique idempotents corresponding to the four linear characters of the group Sn are explored. Also, by establishing the minimum weights and dimensions, all group codes generated by the linear idempotents in the aforementioned group algebra are completely characterized for every n. The nonlinear idempotents corresponding to nonlinear characters of S3 are also obtained and various group codes in F[S3] generated by linear and nonlinear idempotents are examined.

Rao Li1
1Deptartment of Computer Science, Engineering and Mathematics, University of South Carolina Aiken, Aiken, SC 29801, USA
Abstract:

Let G=(V,E) be a graph with minimum degree at least one. The general inverse degree of G is defined as vV1dα(v), where α is a real number with α>0. In this paper, we present sufficient conditions involving the general inverse degree with α1 for some Hamiltonian properties of graphs and upper bounds for the general inverse degree with α1.

Zhicheng Ma1
1Songyuan Yongsheng Construction Company, Songyuan, Jilin, 138000, China
Abstract:

In today’s era, the rapid development of artificial intelligence is transforming warehousing and logistics by enhancing efficiency and reducing labor costs. In this paper, we first employ a least squares support vector machine to develop an inventory prediction model for warehousing logistics, accurately forecasting inventory values. Next, we design an automated logistics and warehousing architecture that facilitates seamless data transfer and information feedback. Finally, this architecture is used to build a comprehensive inventory management model. Our analysis shows that the AI-based prediction nearly matches the actual inventory value (229 vs. 230) and achieves an inventory turnover rate of 5 times per month, which significantly reduces backlog and improves overall management efficiency and user satisfaction.

Yanhao Guan1, Yi Lu1, Guolin Shao1
1School of Software, Nanchang University, Nanchang, Jiangxi, 330031, China
Abstract:

The Cascaded Integrator Comb (CIC) decimation filter is a pivotal technology extensively employed in digital signal processing (DSP). This paper delves into a comprehensive examination of the CIC algorithm within software-defined radio (SDR) systems from the perspective of parallel computing and introduces a novel Non-Recursive Implementation (NR-I) on an NVIDIA GPU using CUDA. The NR-I approach significantly reduces computational load by unfolding the recursive CIC structure with pre-derived Unfold Factors. Further optimization was achieved through data-transfer enhancements using PM Implementation (PM-I) and ODT Implementation (ODT-I). Experimental results demonstrate that NR-I achieves a speedup of over 449.48. Additionally, the data-transfer optimizations resulted in substantial performance improvements, with PM-I and ODT-I reducing execution time by 43.24% and 64.22%, respectively. The GPU implementation’s speedup is significantly greater than that of OpenMP, ranging from 3.34 to 10.22 times. These results underscore the effectiveness of the proposed Non-Recursive Implementation in accelerating time-intensive and data-intensive computations.

Elahe Mehraban1,2,3, T. Aaron Gulliver4, Ömür Deveci5, Evren Hincal1,2,3
1Mathematics Research Center, Near East University TRNC, Mersin 10, 99138 Nicosia, Turkey
2Department of Mathematics, Near East University TRNC, Mersin 10, 99138 Nicosia, Turkey
3Faculty of Art and Science, University of Kyrenia, TRNC, Mersin 10, 99320 Kyrenia, Turkey
4Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, V8W 2Y2, Canada
5Department of Mathematics, Faculty of Science and Letters Kafkas University, 36100, Turkey
Abstract:

This paper presents a new sequence called the kdivision sequence. The Pell and Lehmer sequences are then used to define new sequences called the kdivision LLehmer-Pell sequences and some properties of these sequences are determined. Then the kdivision LLehmer-Pell sequences and corresponding self-invertible matrices are used in a new Affine-Hill cipher algorithm. The security of this cipher is examined.

Yan Wu1,2,3, Gao Liang2
1School of Marxism Studies, Hefei Normal University, Hefei, Anhui, 230021, China
2Institute of Intellectual Property, University of Science and Technology of China, Hefei, Anhui, 230026, China
3School of Humanities and Social Sciences, University of Science and Technology of China, Hefei, Anhui, 230026, China
Abstract:

In the era of globalization and intense market competition, strategic human resource management (SHRM) is critical for boosting corporate competitiveness. This study employs structural equation modeling (SEM) and multiple linear regression to uncover the complex influence of SHRM perceptions on employee proactive behaviors, and uses a convolutional neural network (CNN) to explore nonlinear relationships and validate the SEM findings. Results reveal that SHRM perception has a significant positive effect on employee proactive behavior (β=0.254, p<0.001). Mediators such as job self-efficacy and conceptual psychological contract play a positive role, with indirect effects of 0.1043 and 0.1726, respectively, while insider identity perception significantly moderates the relationship (β=0.09, p<0.01). The CNN model ranks the importance of variables in descending order as: conceptual psychological contract, job self-efficacy, SHRM perception, job category, and insider identity perception, consistent with the SEM results. These findings highlight the potential of CNNs to optimize HR strategies and enhance employee motivation.

Wei Fan1
1Namseoul University, Cheonan, Chungnam, South Korea
Abstract:

One of the urgent challenges in auditing today is preventing accounting management risk. This study integrates big data auditing technology to enhance audit quality by developing an audit risk assessment index system based on material misstatement risk and inspection risk. By combining the hierarchical analysis and entropy weighting methods to assign risk indicators, the accounting audit risk index for Company Z was calculated using a multi-level fuzzy comprehensive evaluation method and regression analysis to examine impact factors. Empirical evidence shows that the overall expected audit risk is 0.412—indicating a low to average risk level—with significant correlations between the previous year’s audit opinion, audit fee, and other factors such as the largest shareholder’s holding, board size, percentage of independent directors, operating income growth, net profit, and the audit environment. The study focuses on developing effective prevention and response strategies in the era of big data and offers recommendations to reduce potential auditing risks.

Zevi Miller1, Walker Yane2
1Department of Mathematics, Miami University, Oxford, OH 45056, USA
2Department of Mathematics, St. Louis University High School, St. Louis, Missouri
Abstract:

Let F be a family of graphs, and H a “host” graph. A spanning subgraph G of H is called F- saturated in H if G contains no member of F as a subgraph, but G+e contains a member of F for any edge eE(H)E(G). We let Sat(H,F) be the minimum number of edges in any graph G which is F-saturated in H, where Sat(H,F)=|E(H)| if H contains no member of F as a subgraph. Let Pmr be the r-dimensional grid, with entries in each coordinate taken from {1,2,,m}, and Kt the complete graph on t vertices. Also let S(F) be the family of all subdivisions of a graph F. There has been substantial previous work on extremal questions involving subdivisions of graphs, involving both Sat(Kn,S(F)) and the Turan function ex(Kn,S(F)), for F=Kt or F a complete bipartite graph. In this paper we study Sat(H,S(F)) for the host graph H=Pmr, and F=K4, motivated by previous work on Sat(Kn,S(Kt)). Our main results are the following; 1) If at least one of m or n is odd with m5 and n5, then Sat(Pm×Pn,S(K4))=mn+1. 2) For m even and m4, we have m3+1Sat(Pm3,S(K4))m3+2. 3) For r3 with m even and m4, we have Sat(Pmr,S(K4))mr+2r12.

LeRoy B. Beasley1
1Clocktower Plaza#317, 550 North Main, Box C3 Logan, Utah 84321, USA
Abstract:

An undirected graph is said to be cordial if there is a friendly (0,1)-labeling of the vertices that induces a friendly (0,1)-labeling of the edges. An undirected graph G is said to be (2,3)-orientable if there exists a friendly (0,1)-labeling of the vertices of G such that about one-third of the edges are incident to vertices labeled the same. That is, there is some digraph that is an orientation of G that is (2,3)-cordial. Examples of the smallest noncordial/non-(2,3)-orientable graphs are given, and upper bounds on the possible number of edges in a cordial/(2,3)-orientable graph are presented. It is also shown that if T is a linear operator on the set of all undirected graphs on n vertices that strongly preserves the set of cordial graphs or the set of (2,3)-orientable graphs, then T is a vertex permutation.

E-mail Alert

Add your e-mail address to receive upcoming issues of Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC).

Special Issues

The Combinatorial Press Editorial Office routinely extends invitations to scholars for the guest editing of Special Issues, focusing on topics of interest to the scientific community. We actively encourage proposals from our readers and authors, directly submitted to us, encompassing subjects within their respective fields of expertise. The Editorial Team, in conjunction with the Editor-in-Chief, will supervise the appointment of Guest Editors and scrutinize Special Issue proposals to ensure content relevance and appropriateness for the journal. To propose a Special Issue, kindly complete all required information for submission;