Utilitas Algorithmica (UA)
ISSN: xxxx-xxxx (print)
Utilitas Algorithmica (UA) is a premier, open-access international journal dedicated to advancing algorithmic research and its applications. Launched to drive innovation in computer science, UA publishes high-impact theoretical and experimental papers addressing real-world computational challenges. The journal underscores the vital role of efficient algorithm design in navigating the growing complexity of modern applications. Spanning domains such as parallel computing, computational geometry, artificial intelligence, and data structures, UA is a leading venue for groundbreaking algorithmic studies.
- Research article
- https://doi.org/10.61091/um125-05
- Full Text
- Utilitas Mathematica
- Volume 125
- Pages: 83-91
- Published Online: 25/12/2025
Let \(G = (V, E)\) be a graph. The Gutman-Milovanović index of a graph \(G\) is defined as \(\sum\limits_{uv \in E} (d(u) d(v))^{\alpha}(d(u) + d(v))^{\beta}\), where \(\alpha\) and \(\beta\) are any real numbers and \(d(u)\) and \(d(v)\) are the degrees of vertices \(u\) and \(v\) in \(G\), respectively. In this note, we present sufficient conditions based on the Gutman-Milovanović index with \(\alpha > 0\) and \(\beta >0\) for some Hamiltonian properties of a graph. We also present upper bounds for the Gutman-Milovanović index of a graph for different ranges of \(\alpha\) and \(\beta\).
- Research article
- https://doi.org/10.61091/um125-04
- Full Text
- Utilitas Mathematica
- Volume 125
- Pages: 61-81
- Published Online: 25/12/2025
Suppose \(G_1=(V_1, E_1)\) is a graph and \(G_2=(V_2, E_2)\) is a strong digraph of \(G_1\), where \(V_1\) and \(V_2\) represent the vertex sets, \(E_1\) and \(E_2\) represent the edge sets. Let \(u\) and \(v\) be any two vertices of \(G_2\). The strong distance \(sd(u,v)\) is the minimum value of edges in a strong subdiagraph of \(G_2\) that contains \(u\) and \(v\). The minimum strong diameter of \(G_2\) is defined as the maximum eccentricity \(se(u)\) from \(u\) to all other vertices in \(G_2\). In this paper, we propose different strong orientation methods to explore the minimum strong diameter of the strong product graph of \(K_{m_1,m_2,\ldots,m_k}\otimes P_n\), where \(K_{m_1,m_2,\ldots,m_k}\) and \(P_n\) represent respectively complete multipartite graph and path. In addition, based on strong orientation methods, a new algorithm is proposed to model the presence or absence of a minimum strong diameter in a strong product graph. Simulation experiments show a trend of simultaneous decrease and concentration in the minimum strong diameter of the strong product graph, as the value of parts in \(K_{m_1,m_2,\ldots,m_k}\) increases while the length of \(P_n\) remains constant.
- Research article
- https://doi.org/10.61091/um125-03
- Full Text
- Utilitas Mathematica
- Volume 125
- Pages: 43-60
- Published Online: 25/12/2025
We consider a joint ordered multifactorisation for a given positive integer \(n\geq 2\) into \(m\) parts, where \(n=n_1~\times~\ldots~\times~n_m\), and each part \(n_j\) is split into one or more component factors. Our central result gives an enumeration formula for all such joint ordered multifactorisations \(\mathcal{N}_m(n)\). As an illustrative application, we show how each such factorisation can be used to uniquely construct and so count the number of distinct additive set systems (historically referred to as complementing set systems). These set systems under set addition generate the first \(n\) non-negative consecutive integers uniquely and, when each component set is centred about 0, exhibit algebraic invariances. For fixed integers \(n\) and \(m\), invariance properties for \(\mathcal{N}_m(n)\) are established. The formula for \(\mathcal{N}_m(n)\) is comprised of sums over associated divisor functions and the Stirling numbers of the second kind, and we conclude by deducing sum over divisor relations for our counting function \(\mathcal{N}_m(n)\). Some related integer sequences are also considered.
- Research article
- https://doi.org/10.61091/um125-02
- Full Text
- Utilitas Mathematica
- Volume 125
- Pages: 21-41
- Published Online: 25/12/2025
In this work we study the acyclic orientations of graphs. We obtain an encoding of the acyclic orientations of the complete \(p\)-partite graph with size of its parts \(n_1,n_2,\ldots,n_p\) via a vector with \(p\) symbols and length \(n=n_1+n_2+\ldots+n_p\) when the parts are fixed but not the vertices in each part. We also give a recursive way to construct all acyclic orientations of a complete multipartite graph, this construction can be done by computer easily in order \(\mathcal{O}(n)\). Furthermore, we obtain a closed formula for non-isomorphic acyclic orientations of both the complete multipartite graphs and the complete multipartite graphs with a directed spanning tree. Moreover, we obtain a closed formula for the number of acyclic orientations of a complete multipartite graph \(K_{n_1,\ldots,n_p}\) with labelled vertices. Finally, we obtain a way encode all acyclic orientations of an arbitrary graph as a permutation code. Using the codification mentioned above we obtain sharp upper and lower bounds of the number of acyclic orientations of a graph.
- Research article
- https://doi.org/10.61091/um125-01
- Full Text
- Utilitas Mathematica
- Volume 125
- Pages: 3-19
- Published Online: 25/12/2025
In this work, we defined almost neo balancing numbers and determined the general terms of them in terms of balancing and Lucas-balancing numbers. We also deduced some results on relationship with triangular, square triangular, Pell, Pell-Lucas numbers and these numbers. Further we formulate the sum of first \(n\)-terms of these numbers.
- Research article
- https://doi.org/10.61091/ojac20-05
- Full Text
- Online Journal of Analytic Combinatorics
- Issue 20, 2025
- Pages: 1-15(Paper #5)
- Published Online: 24/12/2025
In this paper, we prove a surprisingly simple formula that counts connected cycle-free families of set partitions, labelled free cacti and coloured Husimi graphs in which there are no blocks of the same colour that are incident to one another. We also provide a formula that enumerates noncrossing connected, cycle-free pairs of partitions.
- Research article
- https://doi.org/10.61091/cn236-08
- Full Text
- Congressus Numerantium
- Volume 236
- Pages: 115-122
- Published Online: 24/12/2025
Recently, it was shown that the Gallai-Ramsey number satisfies \(gr(F_{3,2}, K_3, K_3)=31\), where \(F_{3,2}\) is the generalized fan \(F_{3,2}:=K_1+2K_3\). In this paper, we show that the star-critical Gallai-Ramsey number satisfies \(gr_*(F_{3,2}, K_3, K_3)=27\). We also prove that the critical colorings for \(r_*(K_3, K_3)\), \(gr(F_{3,2},K_3,K_3)\), and \(gr_*(F_{3,2},K_3,K_3)\) are unique.
- Research article
- https://doi.org/10.61091/jcmcc128-24
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 128
- Pages: 379-397
- Published Online: 08/12/2025
Given a network modeled as a graph, a detection system is a subset of vertices equipped with “detectors” that can uniquely identify an “intruder” anywhere in the graph. We consider two types of detection systems: open-locating-dominating (OLD) sets and identifying codes (ICs). In an OLD set, each vertex has a unique, non-empty set of detectors in its open neighborhood; meanwhile, in an IC, each vertex has a unique, non-empty set of detectors in its closed neighborhood. We explore one of their fault-tolerant variants: redundant OLD (RED:OLD) sets and redundant ICs (RED:ICs), which ensure that removing/disabling at most one detector retains the properties of OLD sets and ICs, respectively. This paper focuses on constructing optimal RED:OLD sets and RED:ICs on the infinite king grid, and presents the proof for the bounds on their minimum densities; \(\left[\frac{3}{10}, \frac{1}{3}\right]\) for RED:OLD sets and \(\left[\frac{3}{11}, \frac{1}{3}\right]\) for RED:ICs.
- Research article
- https://doi.org/10.61091/jcmcc128-23
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 128
- Pages: 365-377
- Published Online: 08/12/2025
Exploring the vulnerability of any real-life network helps designers understand how strongly components or elements of the network are connected and how well they can function if there is any disruption. Any chemical structure can also be considered as a network in which the atoms correspond to the vertices, and the chemical bonds between the atoms correspond to the edges. Let \(G=(V, E)\) represent any simple graph with vertex set \(V\) and edge set \(E\). The vulnerability measure used in this paper is the paired domination integrity, defined as the minimum of the sum of any paired dominating set \(S\) of a graph \(G\) and the order of the largest component in the induced subgraph of \(V-S\). The minimum is found by considering all possible paired dominating sets of \(G\). In this paper, we obtain the paired domination integrity of the comb product of paths and cycles. In addition, we extend the study of graph vulnerability to chemical structures.
- Research article
- https://doi.org/10.61091/jcmcc128-22
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 128
- Pages: 357-363
- Published Online: 04/12/2025
Let \(k, b, n\) be positive integers such that \(b\geq 2\). Denote by \(S(k,b,n)\) the numerical semigroup generated by \(\left\{b^{k+n+i}+\frac{b^{n+i}-1}{b-1}\mid i\in\mathbb{N}\right\}\). In this paper, we give formulas for computing the embedding dimension and the Frobenius number of \(S(k,b,n)\).




