Utilitas Algorithmica (UA)

ISSN: xxxx-xxxx (print)

Utilitas Algorithmica (UA) is a premier, open-access international journal dedicated to advancing algorithmic research and its applications. Launched to drive innovation in computer science, UA publishes high-impact theoretical and experimental papers addressing real-world computational challenges. The journal underscores the vital role of efficient algorithm design in navigating the growing complexity of modern applications. Spanning domains such as parallel computing, computational geometry, artificial intelligence, and data structures, UA is a leading venue for groundbreaking algorithmic studies.

Jeremy Chapman1, Adriano Marzullo2
1DEPARTMENT OF MATHEMATICS, LYON COLLEGE, 2300 HIGHLAND ROAD, BATESVILLE, AR, USA
2DEPARTMENT OF MATHEMATICS, BECKER COLLEGE, 61 SEVER STREET, WORCESTER, MA, USA
Abstract:

We prove that if \( A \subset \mathbb{Z}_q \setminus \{0\} \), \( A \neq \langle p \rangle \), \( q = p^\ell \), \( \ell \geq 2 \) with \( |A| > C \sqrt[3]{\sqrt{\ell}^2 q^{(1-\frac{1}{4\ell})}} \), then
\[
|P(A) \cdot P(A)| \geq C’ q^3
\]
where
\[
P(A) = \left\{ \begin{pmatrix} a_{11} & a_{12} \\ a_{21} & a_{22} \end{pmatrix} \in SL_2(\mathbb{Z}_q) : a_{11} \in A \cap \mathbb{Z}_q^\times, a_{12}, a_{21} \in A \right\}.
\]

The proof relies on a result in \([4]\) previously established by D. Covert, A. Iosevich, and J. Pakianathan, which implies that if \( |A| \) is much larger than \( \sqrt{\ell} q^{(1-\frac{1}{4\ell})} \), then
\[
|\{(a_{11}, a_{12}, a_{21}, a_{22}) \in A \times A \times A \times A : a_{11} a_{22} + a_{12} a_{21} = t\}| = |A|^4 q^{-1} + \mathcal{R}(t)
\]
where \( |\mathcal{R}(t)| \leq \ell |A|^2 q^{(1-\frac{1}{2\ell})} \).

Martin Henk1, Eva Link1
1TECHNISCHE UNIVERSITÄT BERLIN, INSTITUT FÜR MATHEMATIK, SEKR. MA 4-1, STRASSE DES 17 JUNI 136, D-10623 BERLIN, GERMANY
Abstract:

By extending former results of Ehrhart, it was shown by Peter McMullen that the number of lattice points in the Minkowski-sum of dilated rational polytopes is a quasipolynomial function in the dilation factors. Here we take a closer look at the coefficients of these quasi-polynomials and show that they are piecewise polynomials themselves and that they are related to each other by a simple differential equation. As a corollary, we obtain a refinement of former results on lattice points in vector dilated polytopes

Guy Louchard1
1UNIVERSITÉ LIBRE DE BRUXELLES, BELGIUM, DÉPARTEMENT D’INFORMATIQUE, CP 212, BOULEVARD DU TRIOMPHE, B-1050 BRUXELLES, BELGIUM
Abstract:

Using the Saddle point method and multiseries expansions, we obtain from the generating function of the Eulerian numbers \( A_{n,k} \) and Cauchy’s integral formula, asymptotic results in non-central region. In the region \( k = n – n^\alpha \), \( 1 > \alpha > 1/2 \), we analyze the dependence of \( A_{n,k} \) on \(\alpha\). This paper fits within the framework of Analytic Combinatorics.

Zhiping Wang1, Xu Han1
1Department of Mathematics, Dalian Maritime University, 116026 Dalian, P.R. China
Abstract:

Given a distribution \(D\) of pebbles on the vertices of a graph \(G\), a pebbling move on \(G\) consists of removing two pebbles from a vertex and placing one on an adjacent vertex (the other is discarded). The pebbling number of \(G\), denoted \(f(G)\), is the smallest integer \(k\) such that any distribution of \(k\) pebbles on \(G\) allows one pebble to be moved to any specified vertex via pebbling moves. In this paper, we calculate the \(t\)-pebbling number of the graph \(D_{n,C_{2m}}\). Furthermore, we verify the \(q\)-\(t\)-pebbling number to demonstrate that \(D_{n,C_{2m}}\) possesses the \(2t\)-pebbling property.

Haixia Guo1,2, Jizhu Nan2
1College of Science, Tianjin University of Technology and Education, Tianjin, 300222, P, R. China
2School of Mathematica] Sciences, Dalian University of Technology, Dalian, 116024, P. R. China
Abstract:

Most. of pooling designs are always constructed by the “containment matrix”. But we are interested in considering non-containment
relationship. In [J. Guo, K. Wang, Pooling designs with surprisingly high degree of error correction in a finite vector space, Discrete Appl Math], Guo and Wang gave a construction by the use of non-containment relationship. In this paper, we generalize Guo-Wang’s designs and obtain a new family of pooling designs. Our designs and Guo-Wang’s designs have the same numbers of items and pools,but the error-tolerance property of our designs is better than that of Guo-Wang’s designs.

Mukund V.Bapat1, N.B. Limaye2
1Kelkar College of Arts and Science Devgad Maharashtra
2 Department of Mathematics LLT. Bombay Powai, Mumbai 400076
Abstract:

A \(k\)-edge labeling of a graph \(G\) is a function \(f: E(G) \to \{0, \ldots, k-1\}\). Such a labeling induces a labeling on the vertex set \(V(G)\) by defining \(f(v) := \sum f(e) \pmod{k}\), where the summation is taken over all edges \(e\) incident on \(v\). For an edge labeling \(f\), let \(v_f(i)\) (resp., \(e_f(i)\)) denote the number of vertices (resp., edges) receiving the label \(i\). A graph \(G\) is said to be \(E_k\)-cordial if there exists a \(k\)-edge labeling \(f\) of \(G\)such that \(|v_f(i) – v_f(j)| \leq 1\) and \(|e_f(i) – e_f(j)| \leq 1\) for all \(0 \leq i, j \leq k-1\). A wheel \(W_n\) is the join of the cycle \(C_n\) on \(n\) vertices and \(K_1\). A Helm \(H_n\) is obtained by attaching a pendent edge to each vertex of the cycle of the wheel \(W_n\). We prove that (i) Helms, (ii) one-point unions of helms, and (iii) path unions of helms are \(E_3\)-cordial.

M I Jinnah1, S Beena2
1 Department of Mathematics University of Kerala Thiruvananthapuram 695681 Kerala, India.
2 Department of Mathematics NSS College, Nilamel, Kollam Kerala, India
Abstract:

In this paper, we prove that the graphs \(P_n\) (\(n \geq 3\)), \(C_n\) (\(n \geq 3\), \(n \not\equiv 4 \pmod{8}\)), and \(K_n\) (\(n \geq 3\)) are \(E_4\)-cordial graphs. Additionally, we show that every graph of \(\geq 3\) is a subgraph of an \(E_4\)-cordial graph.

Liu Xin-sheng1, Zhu Zhi-qiang1
1College of Mathematics and Information Science, Northwest Normal University, Lanzhou, Gansu 730070
Abstract:

In this paper, we study the upper bounds for the \(D(\beta)\)-vertex-distinguishing total-chromatic numbers using the probability method, and obtain: Let \(\Delta\) be the maximum degree of \(G\), then

\[
\chi_{\beta vt}\leq
\left\{
\begin{array}{ll}
16\Delta^{(\beta+1)/(2\Delta+2)}, & \Delta \geq 3,\beta\geq 4\Delta+3; \\
13\Delta^{(\beta+4)/4} , & \Delta\geq 4,\beta\geq 5;\\
10\Delta^2, & \Delta \geq 3, 2 \leq \beta \leq 4.
\end{array}
\right.
\]

Mohamed Baka Elayech1, Abdeljelil Salhi 2, Hamza Si Kaddour3
1Département de la préparation Mathématiques- Physique, Institut préparatoire aux études d’ingénieur de Sfaz, Université de Sfax, BP 1172, 3000 Sfaz, Tunisie
2Département de Mathématiques, Faculté des Sciences de Gafsa, Université de Gafsa, 2112 Gafsa, Tunisie
3ICJ, Université de Lyon, Université Claude Bernard Lyon 1, 43 BD du 11 Novembre 1918, 69622 Villeurbanne Cedex, France
Abstract:

Given a tournament \(T = (V, A)\), a subset \(X\) of \(V\) is an interval of \(T\) provided that for any \(a, b \in X\) and \(x \in V \setminus X\), \((a, x) \in A\) if and only if \((b, x) \in A\). For example, \(\emptyset\), \(\{x\}\) (\(x \in V\)), and \(V\) are intervals of \(T\), called trivial intervals. A two-element interval of \(T\) is called a duo of \(T\). Tournaments that do not admit any duo are called duo-free tournaments. A vertex \(x\) of a duo-free tournament is \(d\)-critical if \(T – x\) has at least one duo. In 2005, J.F. Culus and B. Jouve [5] characterized the duo-free tournaments, all of whose vertices are d-critical, called tournaments without acyclic interval. In this paper, we characterize the duo-free tournaments that admit exactly one non-d-critical vertex, called (-1)-critically duo-free tournaments.

Wei Gao1
1School of Information Science and Technology, Yunnan Normal University, Kunming 650500, China
Abstract:

The toughness, as the parameter for measuring stability and vulnerability of networks, has been widely used in computer communication
networks and ontology graph structure analysis. A graph \(G\) is called a fractional \((a, b, n)\)-critical deleted graph if after deleting any \(n\) vertices from \(G\), the resulting graph is still a fractional \((a, b)\)-deleted graph. In this paper,we study the relationship between toughness and fractional \((a, b, n)\)-critical deleted graph. A sufficient condition for a graph G to be a fractional \((a, b, n)\)-critical deleted graph is determined.

Special Issues

The Combinatorial Press Editorial Office routinely extends invitations to scholars for the guest editing of Special Issues, focusing on topics of interest to the scientific community. We actively encourage proposals from our readers and authors, directly submitted to us, encompassing subjects within their respective fields of expertise. The Editorial Team, in conjunction with the Editor-in-Chief, will supervise the appointment of Guest Editors and scrutinize Special Issue proposals to ensure content relevance and appropriateness for the journal. To propose a Special Issue, kindly complete all required information for submission;