Utilitas Algorithmica (UA)

ISSN: xxxx-xxxx (print)

Utilitas Algorithmica (UA) is a premier, open-access international journal dedicated to advancing algorithmic research and its applications. Launched to drive innovation in computer science, UA publishes high-impact theoretical and experimental papers addressing real-world computational challenges. The journal underscores the vital role of efficient algorithm design in navigating the growing complexity of modern applications. Spanning domains such as parallel computing, computational geometry, artificial intelligence, and data structures, UA is a leading venue for groundbreaking algorithmic studies.

Wei-Guo, Chen1, Zhi-Hong Chen2, Weiqi Luo3
1Guangdong Information Center, Guangzhou, P. R. China
2Butler University, Indianapolis, IN 46208
3JiNan University, Guangzhou, P.R. China
Abstract:

For a graph \(G\), a \({trail}\) is a vertex-edge alternating sequence \(v_0, e_1, v_1, e_2, \ldots, e_{k-1},v_{k-1}, e_k, v_k\) such that all \(e_i\)’s are distinct and \(e_i = v_{i-1}v_i\) for all \(i\). For \(u, v \in V(G)\), a \((u,v)\)-trail of \(G\) is a trail in \(G\) originating at \(u\) and terminating at \(v\). A closed trail is a \((u,v)\)-trail with \(u = v\). A trail \(H\) is a spanning trail of \(G\) if \(V(H) = V(G)\). Let \(X \subseteq E(G)\) and \(Y \subseteq E(G)\) with \(X \cap Y = \emptyset\). This paper studies the minimum edge-connectivity of \(G\) such that for any \(u, v \in V(G)\) (including \(u = v\)), \(G\) has a spanning \((u, v)\)-trail \(H\) with \(X \subseteq E(H)\) and \(Y \cap E(H) = \emptyset\).

Seyed Morteza Dadvand1, Dara Moazzami2,3, Ali Moeini2
1 University of Tehran, School of Engineering, Faculty of Engineering Science, Department of Algorithms and Computation, Tehran, Iran
2University of Tehran, School of Engineering, Faculty of Engineering Science, Department of Algorithms and Computation, Tehran, Iran
3University of California Los Angeles, (UCLA), Department of Mathematics, U.S.A.
Abstract:

In this paper we settle a long-standing open problem. We prove that it
is \(NP\)-hard to recognize \(T\)-tenacious graphs for any fixed positive rational
number \(T\)

Yan Yang1, Qing-qing Li1, Xue-ping Wang2
1College of Sciences Southwest Petroleum University, Sichuan 610500, China
2College of Mathematics and software Science Sichuan Normal University, Sichuan 610066, China
Abstract:

In this paper, we deal with the transitive relations on a finite $n$-element set. The transitive relations are interpreted as Boolean matrices. A special class of transitive relations are constructed and enumerated, which can generate all transitive
relations on a finite n-element set by intersection operation. Besides, several necessary and sufficient conditions that a relation
\(R\) is transitive are given.

Sapna Jain1
1Department of Mathematics University of Delhi Delhi 110 007 India
Abstract:

In this paper, we obtain an upper bound on the order of a blockwise-burst \([11]\) that can be detected by a row-cyclic array code \([10]\) and obtain the fraction of blockwise-bursts of order exceeding the upper bound that go undetected. We also give a decoding algorithm for the correction of blockwise-bursts in row-cyclic array codes.

G. Araujo-Pardo1, L. Barriére2
1Instituto de Matematicas Universidad Nacional] Auténoma de México
2Departament de Matematica Aplicada IV Universitat Politécnica de Catalunya
Abstract:

In this paper we study defensive alliances in some specific regular graphs, the circulant graphs, i.e. Cayley graphs on a cyclic group.The critical defensive alliances of a circulant graph of degree at most \(6\) are completely determined. For the general case, we give tight lower and upper bounds on the alliance number of a circulant graph with \(d\) generators.

K.T. Balinska1, L.V. Quintas2, K.T. Zwierzytiski1
1The Technical University of Poznati pl. M. Sktodowskiej-Curie 5, 60-965 Poznafi, POLAND Institute of Control and Information Engineering
2Pace University 1 Pace Plaza, New York, NY 10038, U.S.A. Mathematics Department
Abstract:

The maximum number of non-isomorphic one-edge extensions \(M(t, n, f)\) of a graph of size \(t\), order \(n\), and vertex degree bounded by \(f\) for \(3 \leq f \leq n-2\) is considered. An upper bound for \(M(t, n, f)\) is obtained, and for the case \(f = n-2\), the exact value is given. Tables are provided for all values of \(M(t, n, f)\) for up to \(n = 12\), \(\left\lfloor \frac{f-1}{2} \right\rfloor < t \leq \left\lfloor \frac{nf}{2} \right\rfloor\), and \(3 \leq f \leq n-2\). Additionally, the relation of these results to the transition digraph for the Random \(f\)-Graph Process, a Markov process concerning graphs with vertex degree bounded by \(f\), is noted.

Agha Kashif1, Imran Anwar2, Zahid Raza1
1National University of Computer and Emerging Sciences Lahore Campus, Pakistan
2COMSATS Institute of Information Technology Lahore, Pakistan.
Abstract:

In this paper, we characterize all spanning trees of the \(r\)-cyclic graph \(G_{n,r}\). We provide the formulation of \(f\)-vectors associated with spanning simplicial complexes \(\Delta_s(G_{n,r})\) and, consequently, deduce a formula for computing the Hilbert series of the Stanley-Reisner ring \(k[\Delta_s(G_{n,r})]\). For the facet ideal \(I(\Delta(G_{n,r}))\), we characterize all associated primes. Specifically, for uni-cyclic graphs with cycle length \(m_i\), we prove that the facet ideal \(I(\Delta(G_{n,1}))\) has linear quotients with respect to its generating set. Furthermore, we establish that projdim \((I_{\mathcal{F}}(\Delta_s(G_{n,1}))) = 1\) and \(\beta_i(I_{\mathcal{F}}(\Delta_(G_s{n,1}))) = m_i\) for \(i \leq 1\).

Kevin Litwack1, Oleg Pikhurko2, Suporn Pongnumkul3
1Microsoft Corporation One Microsoft Way Redmond, WA 98052
2Department of Mathematical Sciences Carnegie Mellon University Pittsburgh, PA 15213-3890
3Department of Computer Science and Engineering University of Washington Seattle, WA 98105-2350
Abstract:

We consider the one-player game called Dundee, where a deck consists of \(s_i\) cards of value \(i\), for \(i = 1, \ldots, v\), and an integer \(m \leq s_1 + \cdots + s_v\). Over \(m\) rounds, the player names a number between \(1\) and \(v\) and draws a random card from the deck, losing if the named number matches the drawn value in at least one round. The famous Problem of Thirteen, proposed by Montmort in 1708, asks for the winning probability when \(v = 13\), \(s_1 = \cdots = s_{13} = 4\), \(m = 13\), and the player names the sequence \(1, \ldots, 13\). Studied by mathematicians including J. and N. Bernoulli, De Moivre, Euler, and Catalan, this problem’s strategic aspects remain unexplored. We investigate two variants: one where the player’s Round \(i\) bid depends on previous rounds’ drawn values, which we completely solve, and another where the player must specify all \(m\) bids in advance, solving this for \(s_1 = \cdots = s_v\) and arbitrary \(m\).

Baohuan Zhang1, Qiuli Xu1, Wei Jiang 1, Junli Liu1
1Math. and Inf. College, Langfang Teachers’ College, Langfang, 065000, China
Abstract:

Let \(n\) be a positive integer with \(n\geq 2\) and \([n] := \{1, 2, \ldots, n\}\). An \(m\)-partial injective map of \([n]\) is a pair \((A, f)\), where \(A\) is an \(m\)-subset of \([n]\) and \(f: A \rightarrow [n]\) is an injective map. Let \(P =L \cup \{I\}\), where \(L\) is the set of all partial injective maps of \([n]\). Partially ordering \(P\) by ordinary or reverse inclusion yields two families of finite posets. This article proves that these posets are atomic lattices, discusses their geometricity, and computes their characteristic polynomials.

G. Araujo-Pardo1, L. Barriére2
1Instituto de Mateméticas Universidad Nacional Auténoma de México
2Departament de Matematica Aplicada IV Universitat Politécnica de Catalunya
Abstract:

In this paper we study defensive alliances in some regular graphs. We determine which subgraphs could a critical defensive alliance of a graph \(G\) induce, if \(G\) is \(6\)-regular and the cardinality of the alliance is at most \(8\).

Special Issues

The Combinatorial Press Editorial Office routinely extends invitations to scholars for the guest editing of Special Issues, focusing on topics of interest to the scientific community. We actively encourage proposals from our readers and authors, directly submitted to us, encompassing subjects within their respective fields of expertise. The Editorial Team, in conjunction with the Editor-in-Chief, will supervise the appointment of Guest Editors and scrutinize Special Issue proposals to ensure content relevance and appropriateness for the journal. To propose a Special Issue, kindly complete all required information for submission;