Utilitas Algorithmica (UA)

ISSN: xxxx-xxxx (print)

Utilitas Algorithmica (UA) is a premier, open-access international journal dedicated to advancing algorithmic research and its applications. Launched to drive innovation in computer science, UA publishes high-impact theoretical and experimental papers addressing real-world computational challenges. The journal underscores the vital role of efficient algorithm design in navigating the growing complexity of modern applications. Spanning domains such as parallel computing, computational geometry, artificial intelligence, and data structures, UA is a leading venue for groundbreaking algorithmic studies.

D.V. Chopra1, Richard M. Low2, R. Dios3
1Department of Mathematics and Statistics Wichita State University Wichita, KS 67260-0033, USA
2Department of Mathematics San Jose State University San Jose, CA 95192, USA
3Department of Mathematics New Jersey Institute of Technology Newark, NJ 07102-1982, USA
Abstract:

In this paper, we present (by using Cauchy-Schwarz inequalities) some new results amongst the parameters of balanced arrays (B-arrays) with two symbols and having strength four, which are necessary for the existence of such balanced arrays. We then discuss and illustrate their use and applications.

A. Deza1, F. Franek1, W. Hua1, M. Meszka2, A. Rosa3
1 Department of Computing and Software McMaster University, Hamilton, Ontario, Canada L8S 4K1
2Faculty of Applied Mathematics AGH University of Science and Technology al. Mickiewicza 30 30-059 Krakdéw, Poland
3Department of Mathematics and Statistics McMaster University, Hamilton, Ontario, Canada L8S 4K1
Abstract:

The Oberwolfach problem (OP) asks whether \( K_n \) (for \( n \) odd) or \( K_n \) minus a \( 1 \)-factor (for \( n \) even) admits a \( 2 \)-factorization where each \( 2 \)-factor is isomorphic to a given \( 2 \)-factor \( F \). The order \( n \) and the type of the \( 2 \)-factor \( F \) are the parameters of the problem. For \( n \leq 17 \), the existence of a solution has been resolved for all possible parameters. There are also many special types of \( 2 \)-factors for which solutions to OP are known. We provide solutions to OP for all orders \( n \), \( 18 \leq n \leq 40 \). The computational results for higher orders were obtained using the SHARCNET high-performance computing cluster.

Neville Robbins1
1Mathematics Department San Francisco State University San Francisco, CA 94132
Abstract:

Let \( f_6(n) \) denote the number of partitions of the natural number \( n \) into parts co-prime to \( 6 \). This function was originally studied by Schur. We derive two explicit formulas for \( f_6(n) \), one of them in terms of the partition function \( p(n) \). We also derive three recurrences for \( f_6(n) \).

Laxmi Gewali1, Navin Rongratana1, Jan B. Pedersen1
1School of Computer Science, University of Nevada 4505 Maryland Parkway Las Vegas, NV, 89154, USA
Abstract:

We consider the problem of relocating a sensor node in its neighborhood so that the connectivity of the network is not altered. In this context, we introduce the notion of \in-free and out-free regions to capture the set of points where the node can be relocated by conserving connectivity. We present a characterization of maximal free-regions that can be used for identifying the position where the node can be moved to increase the reliability of the network connectivity. In addition, we prove that the free-region computation problem has a lower bound \(\Omega(n\log n)\) in the comparison tree model of computation, and also present two approximation algorithms for computing the free region of a sensor node in time \(O(k)\) and \(O(k\log k)\).

Hossein Shahmohamad1, Benjamin Zindle1
1School of Mathematical Sciences, RIT, Rochester, NY 14623
Abstract:

Chain integrator backstepping is a recursive design tool that has been used in nonlinear control systems. The complexity of the computation of the chain integrator backstepping control law makes inevitable the use of a computer algebra system. A recursive algorithm is designed to compute the integrator backstepping control process. A computer algebra program (Maple procedure) is developed for symbolic computation of the control function using a newly developed recursive algorithm. We will present some demonstrative examples to show the stability of the control systems using Lyapunov functions.

Reza Ahangar1, Rongdong Wang1
1Department of Mathematics Texas A&M University-Kingsville, Kingsville, TX 78363, USA
Abstract:

Chain integrator backstepping is a recursive design tool that has been used in nonlinear control systems. The complexity of the computation of the chain integrator backstepping control law makes inevitable the use of a computer algebra system. A recursive algorithm is designed to compute the integrator backstepping control process. A computer algebra program (Maple procedure) is developed for symbolic computation of the control function using a newly developed recursive algorithm. We will present some demonstrative examples to show the stability of the control systems using Lyapunov functions.

Sin-Min Lee1, Ho Kuen Ng2, Siu-Ming Tong3
1Department of Computer Science San Jose State University San Jose, CA 95192, USA
2Department of Mathematics San Jose State University San Jose, CA 95192, USA
3Department of Computer Science Northwestern Polytechnic University Fremont, CA 94539, USA
Abstract:

Let \( G \) be a graph with vertex set \( V(G) \) and edge set \( E(G) \), and let \( A \) be an abelian group. A labeling \( f: V(G) \to A \) induces an edge labeling \( f^*: E(G) \to A \) defined by \( f^*(xy) = f(x) + f(y) \) for each \( xy \in E(G) \). For each \( i \in A \), let \( v_f(i) = \text{card}\{v \in V(G) \mid f(v) = i\} \) and \( e_f(i) = \text{card}\{e \in E(G) \mid f^*(e) = i\} \). Let \( c(f) = \{\lvert e_f(i) – e_f(j) \rvert \mid (i, j) \in A \times A\} \). A labeling \( f \) of a graph \( G \) is said to be \( A \)-friendly if \( \lvert v_f(i) – v_f(j) \rvert \leq 1 \) for all \( (i, j) \in A \times A \). If \( c(f) \) is a \( (0, 1) \)-matrix for an \( A \)-friendly labeling \( f \), then \( f \) is said to be \( A \)-cordial. When \( A = \mathbb{Z}_2 \), the friendly index set of the graph \( G \), \( FI(G) \), is defined as \( \{\lvert e_f(0) – e_f(1) \rvert \mid \text{the vertex labeling } f \text{ is } \mathbb{Z}_2\text{-friendly}\} \). In \([15]\) the friendly index set of a cycle is completely determined. We consider the friendly index sets of broken wheels with three spokes.

Ivana Ilic1, Spyros S. Magliveras1
1Department of Mathematical Sciences, Florida Atlantic University 777 Glades Road, Boca Raton, FL 33431, U.S.A.
Abstract:

The intractability of the traditional discrete logarithm problem (DLP) forms the basis for the design of numerous cryptographic primitives. In \([2]\) M. Sramka et al. generalize the DLP to arbitrary finite groups. One of the reasons mentioned for this generalization is P. Shor’s quantum algorithm \([4]\) which solves efficiently the traditional DLP. The DLP for a non-abelian group is based on a particular representation of the group and a choice of generators. In this paper, we show that care must be taken to ensure that the representation and generators indeed yield an intractable DLP. We show that in \(\text{PSL}(2,p) = \langle \alpha, \beta \rangle\) the generalized discrete logarithm problem with respect to \((\alpha,\beta)\) is easy to solve for a specific representation and choice of generators \(\alpha\) and \(\beta\). As a consequence, such representation of \(\text{PSL}(2,p)\) and generators should not be used to design cryptographic primitives.

Hau Chan1, Dinesh G. Sarvate1
1College Of Charleston, Dept. Of Math., Charleston, SC, 29424
Abstract:

Beautifully Ordered Balanced Incomplete Block Designs, \(\text{BOBIBD}(v, k, \lambda, k_1, \lambda_1)\), are defined and the proof is given to show that necessary conditions are sufficient for the existence of BOBIBDs with block size \(k = 3\) and \(k = 4\) for \(k_1 = 2\) except possibly for eleven exceptions. Existence of BOBIBDs with block size \(k = 4\) and \(k_1 = 3\) is demonstrated for all but one infinite family and the non-existence of \(\text{BOBIBD}(7, 4, 2, 3, 1)\), the first member of the unknown series, is shown.

Hongxia Lin1,1, Guizhen Liu2
1School of Mathematics and Informational Science, Yantai University Yantai, Shandong 264005, P. R. China
2School of Mathematics, Shandong University Jinan, Shandong 250100, P. R. China
Abstract:

Let \(G\) be a graph. Let \(g(x)\) and \(f(x)\) be two nonnegative integer-valued functions defined on \(V(G)\) with \(g(x) \leq f(x)\) for any \(x \in V(G)\). A spanning subgraph \(F\) of \(G\) is called a fractional \((g, f)\)-factor if \(g(x) \leq d_G^h(x) \leq f(x)\) for all \(x \in V(G)\), where \(d_G^h(x) = \sum_{e \in E_x} h(e)\) is the fractional degree of \(x \in V(F)\) with \(E_x = \{e : e = xy \in E(G)\}\). A graph \(G\) is said to be fractional \((g, f, n)\)-critical if \(G – N\) has a fractional \((g, f)\)-factor for each \(N \subseteq V(G)\) with \(|N| = n\). In this paper, several sufficient conditions in terms of stability number and degree for graphs to be fractional \((g, f, n)\)-critical are given. Moreover, we show that the results in this paper are best possible in some sense.

Special Issues

The Combinatorial Press Editorial Office routinely extends invitations to scholars for the guest editing of Special Issues, focusing on topics of interest to the scientific community. We actively encourage proposals from our readers and authors, directly submitted to us, encompassing subjects within their respective fields of expertise. The Editorial Team, in conjunction with the Editor-in-Chief, will supervise the appointment of Guest Editors and scrutinize Special Issue proposals to ensure content relevance and appropriateness for the journal. To propose a Special Issue, kindly complete all required information for submission;