Utilitas Algorithmica (UA)

ISSN: xxxx-xxxx (print)

Utilitas Algorithmica (UA) is a premier, open-access international journal dedicated to advancing algorithmic research and its applications. Launched to drive innovation in computer science, UA publishes high-impact theoretical and experimental papers addressing real-world computational challenges. The journal underscores the vital role of efficient algorithm design in navigating the growing complexity of modern applications. Spanning domains such as parallel computing, computational geometry, artificial intelligence, and data structures, UA is a leading venue for groundbreaking algorithmic studies.

Rao Li1
1Dept. of Computer Science, Engineering and Math, University of South Carolina Aiken, Aiken, SC 29801, USA
Abstract:

Let \(G = (V, E)\) be a graph. The Gutman-Milovanović index of a graph \(G\) is defined as \(\sum\limits_{uv \in E} (d(u) d(v))^{\alpha}(d(u) + d(v))^{\beta}\), where \(\alpha\) and \(\beta\) are any real numbers and \(d(u)\) and \(d(v)\) are the degrees of vertices \(u\) and \(v\) in \(G\), respectively. In this note, we present sufficient conditions based on the Gutman-Milovanović index with \(\alpha > 0\) and \(\beta >0\) for some Hamiltonian properties of a graph. We also present upper bounds for the Gutman-Milovanović index of a graph for different ranges of \(\alpha\) and \(\beta\).

Ce Zhang1, Feng Li1
1School of Computer Science, Qinghai Normal University, Xi’ning, 810000, China
Abstract:

Suppose \(G_1=(V_1, E_1)\) is a graph and \(G_2=(V_2, E_2)\) is a strong digraph of \(G_1\), where \(V_1\) and \(V_2\) represent the vertex sets, \(E_1\) and \(E_2\) represent the edge sets. Let \(u\) and \(v\) be any two vertices of \(G_2\). The strong distance \(sd(u,v)\) is the minimum value of edges in a strong subdiagraph of \(G_2\) that contains \(u\) and \(v\). The minimum strong diameter of \(G_2\) is defined as the maximum eccentricity \(se(u)\) from \(u\) to all other vertices in \(G_2\). In this paper, we propose different strong orientation methods to explore the minimum strong diameter of the strong product graph of \(K_{m_1,m_2,\ldots,m_k}\otimes P_n\), where \(K_{m_1,m_2,\ldots,m_k}\) and \(P_n\) represent respectively complete multipartite graph and path. ‌‌In addition, based on strong orientation methods, a new algorithm is proposed to model the presence or absence of a minimum strong diameter in a strong product graph. Simulation experiments show a trend of simultaneous decrease and concentration in the minimum strong diameter of the strong product graph, as the value of parts in \(K_{m_1,m_2,\ldots,m_k}\) increases while the length of \(P_n\) remains constant.

A. D. Law1, M. C. Lettington1, K. M. Schmidt1
1Cardiff University, School of Mathematics, UK
Abstract:

We consider a joint ordered multifactorisation for a given positive integer \(n\geq 2\) into \(m\) parts, where \(n=n_1~\times~\ldots~\times~n_m\), and each part \(n_j\) is split into one or more component factors. Our central result gives an enumeration formula for all such joint ordered multifactorisations \(\mathcal{N}_m(n)\). As an illustrative application, we show how each such factorisation can be used to uniquely construct and so count the number of distinct additive set systems (historically referred to as complementing set systems). These set systems under set addition generate the first \(n\) non-negative consecutive integers uniquely and, when each component set is centred about 0, exhibit algebraic invariances. For fixed integers \(n\) and \(m\), invariance properties for \(\mathcal{N}_m(n)\) are established. The formula for \(\mathcal{N}_m(n)\) is comprised of sums over associated divisor functions and the Stirling numbers of the second kind, and we conclude by deducing sum over divisor relations for our counting function \(\mathcal{N}_m(n)\). Some related integer sequences are also considered.

Walter Carballosa1, Francisco A. Reyes2, Jessica Khera1
1Department of Mathematics and Statistics, Florida International University, 11200 SW 8th Street, Miami, FL 33199 USA
2Mathematics Department, Broward College, 3501 Davie Road, Davie, FL 33314 USA
Abstract:

In this work we study the acyclic orientations of graphs. We obtain an encoding of the acyclic orientations of the complete \(p\)-partite graph with size of its parts \(n_1,n_2,\ldots,n_p\) via a vector with \(p\) symbols and length \(n=n_1+n_2+\ldots+n_p\) when the parts are fixed but not the vertices in each part. We also give a recursive way to construct all acyclic orientations of a complete multipartite graph, this construction can be done by computer easily in order \(\mathcal{O}(n)\). Furthermore, we obtain a closed formula for non-isomorphic acyclic orientations of both the complete multipartite graphs and the complete multipartite graphs with a directed spanning tree. Moreover, we obtain a closed formula for the number of acyclic orientations of a complete multipartite graph \(K_{n_1,\ldots,n_p}\) with labelled vertices. Finally, we obtain a way encode all acyclic orientations of an arbitrary graph as a permutation code. Using the codification mentioned above we obtain sharp upper and lower bounds of the number of acyclic orientations of a graph.

Ahmet Tekcan1
1Bursa Uludag University, Faculty of Science, Department of Mathematics, Bursa, Turkiye
Abstract:

In this work, we defined almost neo balancing numbers and determined the general terms of them in terms of balancing and Lucas-balancing numbers. We also deduced some results on relationship with triangular, square triangular, Pell, Pell-Lucas numbers and these numbers. Further we formulate the sum of first \(n\)-terms of these numbers.

Isaac Owino Okoth1
1Department of Pure and Applied Mathematics, Maseno University, P. Box 333-40105, Maseno, Kenya
Abstract:

In this paper, we prove a surprisingly simple formula that counts connected cycle-free families of set partitions, labelled free cacti and coloured Husimi graphs in which there are no blocks of the same colour that are incident to one another. We also provide a formula that enumerates noncrossing connected, cycle-free pairs of partitions.

Mark Budden1, Richard Prange2
1Department and Mathematics and Computer Science, Western Carolina University, Cullowhee, NC, USA
2Department and Mathematics and Statistics, University of North Carolina at Charlotte, Charlotte, NC, USA
Abstract:

Recently, it was shown that the Gallai-Ramsey number satisfies \(gr(F_{3,2}, K_3, K_3)=31\), where \(F_{3,2}\) is the generalized fan \(F_{3,2}:=K_1+2K_3\). In this paper, we show that the star-critical Gallai-Ramsey number satisfies \(gr_*(F_{3,2}, K_3, K_3)=27\). We also prove that the critical colorings for \(r_*(K_3, K_3)\), \(gr(F_{3,2},K_3,K_3)\), and \(gr_*(F_{3,2},K_3,K_3)\) are unique.

Devin Jean1, Suk Seo1
1Department of Computer Science, Middle Tennessee State University, Murfreesboro, TN, USA
Abstract:

Given a network modeled as a graph, a detection system is a subset of vertices equipped with “detectors” that can uniquely identify an “intruder” anywhere in the graph. We consider two types of detection systems: open-locating-dominating (OLD) sets and identifying codes (ICs). In an OLD set, each vertex has a unique, non-empty set of detectors in its open neighborhood; meanwhile, in an IC, each vertex has a unique, non-empty set of detectors in its closed neighborhood. We explore one of their fault-tolerant variants: redundant OLD (RED:OLD) sets and redundant ICs (RED:ICs), which ensure that removing/disabling at most one detector retains the properties of OLD sets and ICs, respectively. This paper focuses on constructing optimal RED:OLD sets and RED:ICs on the infinite king grid, and presents the proof for the bounds on their minimum densities; \(\left[\frac{3}{10}, \frac{1}{3}\right]\) for RED:OLD sets and \(\left[\frac{3}{11}, \frac{1}{3}\right]\) for RED:ICs.

Annie Clare Antony1, V Sangeetha1
1Centre for Mathematical Needs, Department of Mathematics, Christ University, Bangalore-560029, Karnataka, India
Abstract:

Exploring the vulnerability of any real-life network helps designers understand how strongly components or elements of the network are connected and how well they can function if there is any disruption. Any chemical structure can also be considered as a network in which the atoms correspond to the vertices, and the chemical bonds between the atoms correspond to the edges. Let \(G=(V, E)\) represent any simple graph with vertex set \(V\) and edge set \(E\). The vulnerability measure used in this paper is the paired domination integrity, defined as the minimum of the sum of any paired dominating set \(S\) of a graph \(G\) and the order of the largest component in the induced subgraph of \(V-S\). The minimum is found by considering all possible paired dominating sets of \(G\). In this paper, we obtain the paired domination integrity of the comb product of paths and cycles. In addition, we extend the study of graph vulnerability to chemical structures.

Ze Gu1
1School of Mathematics and Statistics, Zhaoqing University, Zhaoqing, Guangdong, 526061, P.R. China
Abstract:

Let \(k, b, n\) be positive integers such that \(b\geq 2\). Denote by \(S(k,b,n)\) the numerical semigroup generated by \(\left\{b^{k+n+i}+\frac{b^{n+i}-1}{b-1}\mid i\in\mathbb{N}\right\}\). In this paper, we give formulas for computing the embedding dimension and the Frobenius number of \(S(k,b,n)\).

Special Issues

The Combinatorial Press Editorial Office routinely extends invitations to scholars for the guest editing of Special Issues, focusing on topics of interest to the scientific community. We actively encourage proposals from our readers and authors, directly submitted to us, encompassing subjects within their respective fields of expertise. The Editorial Team, in conjunction with the Editor-in-Chief, will supervise the appointment of Guest Editors and scrutinize Special Issue proposals to ensure content relevance and appropriateness for the journal. To propose a Special Issue, kindly complete all required information for submission;