Utilitas Algorithmica (UA)
ISSN: xxxx-xxxx (print)
Utilitas Algorithmica (UA) is a premier, open-access international journal dedicated to advancing algorithmic research and its applications. Launched to drive innovation in computer science, UA publishes high-impact theoretical and experimental papers addressing real-world computational challenges. The journal underscores the vital role of efficient algorithm design in navigating the growing complexity of modern applications. Spanning domains such as parallel computing, computational geometry, artificial intelligence, and data structures, UA is a leading venue for groundbreaking algorithmic studies.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 074
- Pages: 103-110
- Published: 31/08/2010
In this paper, we present (by using Cauchy-Schwarz inequalities) some new results amongst the parameters of balanced arrays (B-arrays) with two symbols and having strength four, which are necessary for the existence of such balanced arrays. We then discuss and illustrate their use and applications.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 074
- Pages: 95-102
- Published: 31/08/2010
The Oberwolfach problem (OP) asks whether \( K_n \) (for \( n \) odd) or \( K_n \) minus a \( 1 \)-factor (for \( n \) even) admits a \( 2 \)-factorization where each \( 2 \)-factor is isomorphic to a given \( 2 \)-factor \( F \). The order \( n \) and the type of the \( 2 \)-factor \( F \) are the parameters of the problem. For \( n \leq 17 \), the existence of a solution has been resolved for all possible parameters. There are also many special types of \( 2 \)-factors for which solutions to OP are known. We provide solutions to OP for all orders \( n \), \( 18 \leq n \leq 40 \). The computational results for higher orders were obtained using the SHARCNET high-performance computing cluster.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 074
- Pages: 83-94
- Published: 31/08/2010
Let \( f_6(n) \) denote the number of partitions of the natural number \( n \) into parts co-prime to \( 6 \). This function was originally studied by Schur. We derive two explicit formulas for \( f_6(n) \), one of them in terms of the partition function \( p(n) \). We also derive three recurrences for \( f_6(n) \).
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 074
- Pages: 53-64
- Published: 31/08/2010
We consider the problem of relocating a sensor node in its neighborhood so that the connectivity of the network is not altered. In this context, we introduce the notion of \in-free and out-free regions to capture the set of points where the node can be relocated by conserving connectivity. We present a characterization of maximal free-regions that can be used for identifying the position where the node can be moved to increase the reliability of the network connectivity. In addition, we prove that the free-region computation problem has a lower bound \(\Omega(n\log n)\) in the comparison tree model of computation, and also present two approximation algorithms for computing the free region of a sensor node in time \(O(k)\) and \(O(k\log k)\).
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 074
- Pages: 43-52
- Published: 31/08/2010
Chain integrator backstepping is a recursive design tool that has been used in nonlinear control systems. The complexity of the computation of the chain integrator backstepping control law makes inevitable the use of a computer algebra system. A recursive algorithm is designed to compute the integrator backstepping control process. A computer algebra program (Maple procedure) is developed for symbolic computation of the control function using a newly developed recursive algorithm. We will present some demonstrative examples to show the stability of the control systems using Lyapunov functions.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 074
- Pages: 33-42
- Published: 31/08/2010
Chain integrator backstepping is a recursive design tool that has been used in nonlinear control systems. The complexity of the computation of the chain integrator backstepping control law makes inevitable the use of a computer algebra system. A recursive algorithm is designed to compute the integrator backstepping control process. A computer algebra program (Maple procedure) is developed for symbolic computation of the control function using a newly developed recursive algorithm. We will present some demonstrative examples to show the stability of the control systems using Lyapunov functions.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 074
- Pages: 13-31
- Published: 31/08/2010
Let \( G \) be a graph with vertex set \( V(G) \) and edge set \( E(G) \), and let \( A \) be an abelian group. A labeling \( f: V(G) \to A \) induces an edge labeling \( f^*: E(G) \to A \) defined by \( f^*(xy) = f(x) + f(y) \) for each \( xy \in E(G) \). For each \( i \in A \), let \( v_f(i) = \text{card}\{v \in V(G) \mid f(v) = i\} \) and \( e_f(i) = \text{card}\{e \in E(G) \mid f^*(e) = i\} \). Let \( c(f) = \{\lvert e_f(i) – e_f(j) \rvert \mid (i, j) \in A \times A\} \). A labeling \( f \) of a graph \( G \) is said to be \( A \)-friendly if \( \lvert v_f(i) – v_f(j) \rvert \leq 1 \) for all \( (i, j) \in A \times A \). If \( c(f) \) is a \( (0, 1) \)-matrix for an \( A \)-friendly labeling \( f \), then \( f \) is said to be \( A \)-cordial. When \( A = \mathbb{Z}_2 \), the friendly index set of the graph \( G \), \( FI(G) \), is defined as \( \{\lvert e_f(0) – e_f(1) \rvert \mid \text{the vertex labeling } f \text{ is } \mathbb{Z}_2\text{-friendly}\} \). In \([15]\) the friendly index set of a cycle is completely determined. We consider the friendly index sets of broken wheels with three spokes.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 074
- Pages: 3-11
- Published: 31/08/2010
The intractability of the traditional discrete logarithm problem (DLP) forms the basis for the design of numerous cryptographic primitives. In \([2]\) M. Sramka et al. generalize the DLP to arbitrary finite groups. One of the reasons mentioned for this generalization is P. Shor’s quantum algorithm \([4]\) which solves efficiently the traditional DLP. The DLP for a non-abelian group is based on a particular representation of the group and a choice of generators. In this paper, we show that care must be taken to ensure that the representation and generators indeed yield an intractable DLP. We show that in \(\text{PSL}(2,p) = \langle \alpha, \beta \rangle\) the generalized discrete logarithm problem with respect to \((\alpha,\beta)\) is easy to solve for a specific representation and choice of generators \(\alpha\) and \(\beta\). As a consequence, such representation of \(\text{PSL}(2,p)\) and generators should not be used to design cryptographic primitives.
- Research article
- Full Text
- Journal of Combinatorial Mathematics and Combinatorial Computing
- Volume 074
- Pages: 65-81
- Published: 31/08/2010
Beautifully Ordered Balanced Incomplete Block Designs, \(\text{BOBIBD}(v, k, \lambda, k_1, \lambda_1)\), are defined and the proof is given to show that necessary conditions are sufficient for the existence of BOBIBDs with block size \(k = 3\) and \(k = 4\) for \(k_1 = 2\) except possibly for eleven exceptions. Existence of BOBIBDs with block size \(k = 4\) and \(k_1 = 3\) is demonstrated for all but one infinite family and the non-existence of \(\text{BOBIBD}(7, 4, 2, 3, 1)\), the first member of the unknown series, is shown.
- Research article
- Full Text
- Ars Combinatoria
- Volume 097
- Pages: 183-191
- Published: 31/10/2010
Let \(G\) be a graph. Let \(g(x)\) and \(f(x)\) be two nonnegative integer-valued functions defined on \(V(G)\) with \(g(x) \leq f(x)\) for any \(x \in V(G)\). A spanning subgraph \(F\) of \(G\) is called a fractional \((g, f)\)-factor if \(g(x) \leq d_G^h(x) \leq f(x)\) for all \(x \in V(G)\), where \(d_G^h(x) = \sum_{e \in E_x} h(e)\) is the fractional degree of \(x \in V(F)\) with \(E_x = \{e : e = xy \in E(G)\}\). A graph \(G\) is said to be fractional \((g, f, n)\)-critical if \(G – N\) has a fractional \((g, f)\)-factor for each \(N \subseteq V(G)\) with \(|N| = n\). In this paper, several sufficient conditions in terms of stability number and degree for graphs to be fractional \((g, f, n)\)-critical are given. Moreover, we show that the results in this paper are best possible in some sense.




