Utilitas Algorithmica (UA)

ISSN: xxxx-xxxx (print)

Utilitas Algorithmica (UA) is a premier, open-access international journal dedicated to advancing algorithmic research and its applications. Launched to drive innovation in computer science, UA publishes high-impact theoretical and experimental papers addressing real-world computational challenges. The journal underscores the vital role of efficient algorithm design in navigating the growing complexity of modern applications. Spanning domains such as parallel computing, computational geometry, artificial intelligence, and data structures, UA is a leading venue for groundbreaking algorithmic studies.

Elahe Mehraban1, Reza Ebrahimi Atani2, T. Aaron Gulliver3, Evren Hincal1,4,5
1Mathematics Research Center, Near East University TRNC, Mersin 10, 99138 Nicosia, Turkey
2Department of Computer Engineering, University of Guilan, Rasht, Iran
3Department of Electrical and Computer Engineering, University of Victoria, Victoria, BC, V8W 2Y2, Canada
4Department of Mathematical Sciences, Saveetha School of Engineering, SIMATS, Chennai – 602105, Tamilnadu, India
5Research Center of Applied Mathematics, Khazar University, Baku, Azerbaijan
Abstract:

This work introduces two algebraic variants of the Massey-Omura cryptosystem based on newly defined generalized (k,t)-Jacobsthal p-numbers and their extensions to finite groups. We first generalize the classical Jacobsthal recurrence and establish structural properties including periodicity, invertibility conditions, and recurrence behavior modulo finite integers. These results are then extended to group-theoretic settings, where we construct the corresponding (k,t)-Jacobsthal sequences in specific finite groups and derive their sequence periods. Leveraging these algebraic foundations, we propose two Massey-Omura-type encryption schemes in which private exponents are selected from the generalized Jacobsthal sequences. We formally prove the correctness of both constructions and analyze the implications of periodicity on exponent invertibility and protocol feasibility. The proposed schemes do not introduce new hardness assumptions beyond those inherent in the underlying platform group. Instead, they provide a mathematically structured alternative to classical exponent selection in three-pass protocols. The results highlight a new connection between recurrence-defined sequences and multiplicative exponentiation in finite groups, offering an algebraically motivated direction for exploring generalized exponent families in symmetric and non-abelian cryptosystems.

Livinus U. Uko1
1Mathematics Department, Georgia Gwinnett College, Lawrenceville, GA, USA
Abstract:

Given any integers \(q\ge 2\) and \(p\ge 3\), a multidimensional array \[[m(i_1,i_2, \dots, i_q)\colon 1\le i_1\le p, \dots , 1\le i_q\le p],\] with non-repeated entries from the set \(\{1,2,\dots, p^q\}\) will be called a \(q\) dimensional magic hyper-square of order \(p\) if the sum of the numbers in any of its axes or diagonals is \(p(p^q+1)/2\). In this paper, we study odd-order uniform step magic hyper-squares of the form \[m(i_1, \dots, i_q)=1+\sum\limits_{j=1}^{q} p^{j-1}\left[\left(\sum\limits_{k=1}^qa_{j,k} i_k+d_j\right) \bmod p \right] .\] We derive necessary and sufficient conditions for these coefficients to generate magic hyper-squares and use a specific choice of coefficients to get new formula that generates magic hyper-squares of all odd orders greater than two.

Christine T. Cheng1
1Department of Electrical Engineering and Computer Science, University of Wisconsin-Milwaukee, Milwaukee, WI 53211, United States
Abstract:

In this paper, we consider two ways of breaking a graph’s symmetry: distinguishing labelings and fixing sets. A distinguishing labeling ϕ of G colors the vertices of G so that the only automorphism of the labeled graph (G, ϕ) is the identity map. The distinguishing number of G, D(G), is the fewest number of colors needed to create a distinguishing labeling of G. A subset S of vertices is a fixing set of G if the only automorphism of G that fixes every element in S is the identity map. The fixing number of G, Fix(G), is the size of a smallest fixing set. A fixing set S of G can be translated into a distinguishing labeling ϕS by assigning distinct colors to the vertices in S and assigning another color (e.g., the “null” color) to the vertices not in S. Color refinement is a well-known efficient heuristic for graph isomorphism. A graph G is amenable if, for any graph H, color refinement correctly determines whether G and H are isomorphic or not. Using the characterization of amenable graphs by Arvind et al. as a starting point, we show that both D(G) and Fix(G) can be computed in O((|V(G)|+|E(G)|)log |V(G)|) time when G is an amenable graph.

Xiaoqin Zhan1, Ping Zhang1
1School of Science, East China JiaoTong University, Nanchang, 330013, P. R. China
Abstract:

This paper studies the classification problem of block-transitive \( t \)-designs. Let \(\cal D = (\mathcal{P}, \mathcal{B}) \) be a non-trival \( t\)-\((v,k,\lambda) \) design with \( \lambda \leq 5 \), and let \( G \) be a block-transitive, point-primitive automorphism group of \(\cal D \). We prove that if \( \text{Soc}(G) \) is a sporadic simple group, then up to isomorphism, there are exactly 15 such designs \( \cal D \).

Shehnaz Akhter1, Sourav Mondal2, Zahid Raza3
1School of Natural Sciences, National University of Sciences and Technology, Islamabad-44000, Pakistan
2Research Institute of Sciences and Engineering (RISE), MASEP Research Group, University of Sharjah, Sharjah 27272, UAE
3Department of Mathematics, College of Sciences, University of Sharjah, Sharjah 27272, United Arab Emirates
Abstract:

The Mostar invariants are newly introduced bond-additive, distance-related descriptors that compute the degree of peripherality of specific edges as well as the entire graph. These invariants have attracted significant attention in both classical applications of chemical graph theory and studies of complex networks. They have proven to be useful for exploring the topological aspects of these networks. For a graph , the edge Mostar index Moe is defined as the sum of the magnitudes of the differences between m(x) and m(g) across all edges xg of . Here, m(g) (or m(x)) represents the cardinality of the edges in that are closer to g (or x) than x (or g). In this paper, we determine the trees that maximize and minimize the edge Mostar index for fixed order, diameter, and number of pendent vertices. Sharp upper and lower bounds for this index are established, and the corresponding extremal trees are characterized. Moreover, the correlation of the edge Mostar index with certain physicochemical properties is examined.

Apurv Srivastav1, Sudesh K. Srivastav2
1Department of Electrical and Computer Engineering, Center for Bioinformatics and Computational Biology, University of Delaware, Newark, DE 19716, USA
2Department of Biostatistics and Data Science, Tulane University, New Orleans, LA 70112, USA
Abstract:

The design whose blocks consist of all \(k\)-element multisets drawn from a \(v\)-set, denoted \(M(v,k)\), is a classical example of a balanced \((k+1)\)-ary design. Although its parameters are well known, existing derivations often rely on general multiset design theory. This paper gives unified elementary derivations of the parameters \(b\), \(r\), and \(\lambda\) using stars-and-bars and double counting. We exhibit a natural multiplicity-layer decomposition: removing \(s\) copies of a fixed point from all blocks in which it has multiplicity exactly \(s\) yields a family of subdesigns naturally in bijection with \(M(v-1,k-s)\). This viewpoint clarifies the recursive structure underlying complete multiset designs. Finally, the multiplicity vectors of blocks of \(M(v,k)\) form a \((k+1)\)-ary code of length \(v\) with constant coordinate sum \(k\) and minimum Hamming distance \(2\), achieving size \(\binom{v+k-1}{k}\).

Abigail Raz1, Paddy Yang2
1Department of Mathematics, The Cooper Union, 10008 New York City, NY, USA
2Department of Electrical Engineering, The Cooper Union, 10008 New York City, NY, USA
Abstract:

The Explorer-Director game, first introduced by Nedev and Muthukrishnan (2008), simulates a Mobile Agent exploring a ring network with an inconsistent global sense of direction. Two players, the Explorer and the Director, jointly control a token’s movement on the vertices of a graph G with initial location v. Each turn, the Explorer calls any valid distance, d, aiming to maximize the number of vertices the token visits, and the Director moves the token to any vertex distance d away aiming to minimize the number of visited vertices. The game ends when no new vertices can be visited, assuming optimal play, and we denote the total number of visited vertices by fd(G, v). Here we study a variant where, if the token is on vertex u, the Explorer is allowed to select any valid path length, , and the Director now moves the token to any vertex v such that G contains a uv path of length . The corresponding parameter is fp(G, v). In this paper, we explore how far apart fd(G, v) and fp(G, v) can be, proving that for any n there are graphs G and H with fp(G, v) − fd(G, v) > n and fd(H, v) − fp(H, v) > n.

Aritro Pathak1
1University of Missouri, Columbia, Mathematical Sciences Bldg, 202, 810 Rollins St, Columbia, MO 65201
Abstract:

We show that for \(1\) separated subsets of \(\mathbb{R}^{2}\), the natural Marstrand type slicing statements are false with the counting dimension that was used earlier by Moreira and Lima and variants of which were introduced earlier in different contexts. We construct a \(1\) separated subset \(E\) of the plane which has counting dimension \(1\), while for a positive Lebesgue measure parameter set of tubes of width \(1\), the intersection of the tube with the set \(E\) has counting dimension \(1\). This is in contrast to the behavior of such sets with the mass dimension, in regards to slicing, where the slicing theorems hold true.

Marko Riedel1, Markus Scheuer2, Hosam Mahmoud3
1Stuttgart University, Germany
2Hitachi Rail GTS Austria GmbH, Germany
3Department of Statistics, The George Washington University, United States of America
Abstract:

A certain residue representation of the inverse binomial coefficients makes them amenable to Egorychev method for the reduction of sums by analytic methods, wherein the main idea is to identify parts of the summands as residues of analytic functions. We illustrate the use of such residue representation on some instances varying in complexity, including a generalization of an identity by Sung Sik U and Kyu Song Chae in [13].

Ben Lichtin1
149 Boardman St., Rochester, NY 14607, USA
Abstract:

This paper uses exponential sum methods to show that if \(E \subset \mathcal (\mathbb{Z}/p^r)^n \setminus (p)^{(n)}\) has a sufficiently large density and \(j\) is any unit in the finite ring \(\mathbb{Z}/p^r\) then there exist pairs of elements of \(E\) whose dot product equals \(j\). It then applies this to the problem of detecting \(2-\) simplices with endpoints in \(E\).

Special Issues

The Combinatorial Press Editorial Office routinely extends invitations to scholars for the guest editing of Special Issues, focusing on topics of interest to the scientific community. We actively encourage proposals from our readers and authors, directly submitted to us, encompassing subjects within their respective fields of expertise. The Editorial Team, in conjunction with the Editor-in-Chief, will supervise the appointment of Guest Editors and scrutinize Special Issue proposals to ensure content relevance and appropriateness for the journal. To propose a Special Issue, kindly complete all required information for submission;