Utilitas Algorithmica (UA)

ISSN: xxxx-xxxx (print)

Utilitas Algorithmica (UA) is a premier, open-access international journal dedicated to advancing algorithmic research and its applications. Launched to drive innovation in computer science, UA publishes high-impact theoretical and experimental papers addressing real-world computational challenges. The journal underscores the vital role of efficient algorithm design in navigating the growing complexity of modern applications. Spanning domains such as parallel computing, computational geometry, artificial intelligence, and data structures, UA is a leading venue for groundbreaking algorithmic studies.

Lutz Volkmann1
1Lehrstuhl II fiir Mathematik, RWTH Aachen, 52056 Aachen, Germany
Abstract:

A \( c \)-partite tournament is an orientation of a complete \( c \)-partite graph. In 1991, Jian-zhong Wang conjectured that every arc of a regular 3-partite tournament \( D \) is contained in directed cycles of all lengths \( 3, 6, 9, \ldots, |V(D)| \).

In this paper, we show that this conjecture is completely false. Namely, for each integer \( t \) with \( 3 \leq t \leq |V(D)| \), we present an infinite family of regular 3-partite tournaments \( D \) such that there exists an arc in \( D \) which is not contained in a directed cycle of length \( t \).

Mukund V.Bapat1, N.B. Limaye2
1Department of Mathematics, S. S. H. Kelkar College, Devgad, Maharashtra, INDIA
2Department of Mathematics, Vidyanagari, University of Mumbai, Mumbai – 400098. INDIA
Abstract:

Let \( G \) be a graph with vertex set \( V \) and edge set \( E \). A vertex labelling \( f: V \rightarrow \{0, 1, 2\} \) induces an edge labelling \( \overline{f}: E \rightarrow \{0, 1, 2\} \) defined by \( \overline{f}(uv) = |f(u) – f(v)| \). Let \( v_f(0), v_f(1), v_f(2) \) denote the number of vertices \( v \) with \( f(v) = 0, f(v) = 1 \) and \( f(v) = 2 \) respectively. Let \( e_f(0), e_f(1), e_f(2) \) be similarly defined. A graph is said to be 3-equitable if there exists a vertex labelling \( f \) such that \( |v_f(i) – v_f(j)| \leq 1 \) and \( |e_f(i) – e_f(j)| \leq 1 \) for \( 0 \leq i, j \leq 2 \). In this paper, we show that every multiple shell \( MS\{n_1^{t_1}, \ldots, n_r^{t_r}\} \) is 3-equitable for all positive integers \( n_1, \ldots, n_r, t_1, \ldots, t_r \).

Linda Eroh1
1University of Wisconsin Oshkosh
Abstract:

The rainbow Ramsey number \( RR(G_1, G_2) \) or constrained Ramsey number \( f(G_1,G_2) \) of two graphs \( G_1 \) and \( G_2 \) is defined to be the minimum integer \( N \) such that any edge-coloring of the complete graph \( K_N \) with any number of colors must contain either a subgraph isomorphic to \( G_1 \) with every edge the same color or a subgraph isomorphic to \( G_2 \) with every edge a different color. This number exists if and only if \( G_1 \) is a star or \( G_2 \) is acyclic. In this paper, we present the conjecture that the constrained Ramsey number of \( nK_2 \) and \( mK_2 \) is \( m(n-1)+2 \), along with a proof in the case \( m \leq \frac{3}{2}(n-1) \).

Patric R.J.Ostergard1, Esa A.Seuranen1
1Department of Electrical and Communications Engineering Helsinki University of Technology P.O. Box 3000, 02015 HUT, Finland
Abstract:

A set \( C \subseteq \mathbb{F}_2^n \) is said to be an asymmetric covering code with radius \( R \) if every word \( x \in \mathbb{F}_2^n \) can be obtained by replacing \( 1 \) by \( 0 \) in at most \( R \) coordinates of a word in \( C \). In this paper, tabu search is employed in the search for good asymmetric covering codes of small length. Fifteen new upper bounds on the minimum size of such codes are obtained in the range \( n \leq 13 \).

Michael J.Letourneau1, Sheridan K.Houghtent2
1School of Computing Science, Simon Fraser University, Burnaby, British Columbia, Canada
2Department of Computer Science Brock University Ontario, Canada
Abstract:

We use exhaustive computer searches to show that there are exactly \( 36 \) codewords in an optimal ternary \( (11,7) \) code and exactly \( 13 \) codewords in an optimal ternary \( (14,10) \) code. We also enumerate inequivalent optimal ternary \( (14,10) \) codes and show that there are exactly \( 6151 \) such codes.

M.J. Grannell1, T.S. Griggs1, R.G. Stanton2
1Department of Pure Mathematics The Open University Walton Hall, Milton Keynes, MK7 6AA United Kingdom
2Department of Computer Science University of Manitoba Winnipeg, Manitoba, R3T 2N2 Canada
Abstract:

The minimum number of blocks having maximum size precisely four that are required to cover, exactly \( \lambda \) times, all pairs of elements from a set of cardinality \( v \) is denoted by \( g_\lambda^{(4)}(v) \). We present a complete solution to this problem for \( v = 3, 4, \) and \( 5 \).

Terry A.McKee1
1Department of Mathematics & Statistics Wright State University, Dayton, Ohio 45435 U.S.A.
Abstract:

Among the well-studied maximal planar graphs, those having the maximum possible number of 3-cycles are precisely the planar chordal graphs (meaning no induced cycles of lengths greater than three). This motivates a somewhat similar result connecting maximal planar bipartite graphs, 4-cycles, and planar chordal bipartite graphs (meaning bipartite with no induced cycles of lengths greater than four), together with characterizations of planar chordal bipartite graphs as radial graphs of outerplanar multigraphs.

S. Georgiou1, C. Koukouvinos1, E. Lappas1
1Department of Mathematics National Technical University of Athens Zografou 15773, Athens, Greece
Abstract:

Combinatorial designs are a powerful tool because of their beautiful combinatorial structure that can help in many applications, such as coding theory or cryptography. A conference key distribution system is a scheme to design a conference key, and then to distribute this key to only participants attending the conference in order to communicate with each other securely. In this paper, we present an efficient conference key distribution system using difference families. Using techniques for creating the conference key and for performing authentication based on identification information, the communication protocol is designed. Applying the known results on difference families, we obtain many new infinite classes of conference key distribution systems. In special classes of difference families, the message overhead is \( O(v\sqrt{tv}) \), where \( v \) is the number of participants and \( t \) is the number of the \( k \)-elements subsets that consist of the difference family. The security of the presented protocol, which is an important problem in the construction of a secure system, is proved to be as computationally difficult to calculate as factoring and discrete logarithms.

V. Frezza1, V. Napolitano2
1VALERIA FREZZA VIA VaSTO 13 75010 Pisticci SCALO (Mr)
2Vito NAPOLITANO DiPARTIMENTO DI MATEMATICA, UNIVERSITA DELLA BASILICATA, ContTrRaDA MaccHiaA Romana, 85100 POTENZA
Abstract:

In this paper, finite \( \{2,t\} \)-semiaffine linear spaces are investigated. When \( t = 5 \), their parameters are determined, and it is also proved that there is a single finite \( \{2, 5\} \)-semiaffine linear space on \( v = 20 \) points and with constant point degree \( 7 \).

F. Franek1, J. Holub2, A. Rosa3
1Department of Computers and Software McMaster University Hamilton, Ontario, Canada
2Department of Computers and Software McMaster University Hamilton, Ontario, Canada and Department of Computer Science and Engineering Czech Technical University Prague, Czech Republic
3Department of Mathematics and Statistics McMaster University Hamilton, Ontario, Canada
Abstract:

We establish that for each of the 5005 possible types of 2-factorizations of the complete graph \( K_{13} \), there exists at least one solution. We also enumerate all nonisomorphic solutions to the Oberwolfach problem \( \text{OP}(13;3,3,3,4) \).

Special Issues

The Combinatorial Press Editorial Office routinely extends invitations to scholars for the guest editing of Special Issues, focusing on topics of interest to the scientific community. We actively encourage proposals from our readers and authors, directly submitted to us, encompassing subjects within their respective fields of expertise. The Editorial Team, in conjunction with the Editor-in-Chief, will supervise the appointment of Guest Editors and scrutinize Special Issue proposals to ensure content relevance and appropriateness for the journal. To propose a Special Issue, kindly complete all required information for submission;