Utilitas Algorithmica (UA)

ISSN: xxxx-xxxx (print)

Utilitas Algorithmica (UA) is a premier, open-access international journal dedicated to advancing algorithmic research and its applications. Launched to drive innovation in computer science, UA publishes high-impact theoretical and experimental papers addressing real-world computational challenges. The journal underscores the vital role of efficient algorithm design in navigating the growing complexity of modern applications. Spanning domains such as parallel computing, computational geometry, artificial intelligence, and data structures, UA is a leading venue for groundbreaking algorithmic studies.

D. A. Gregory1
1Department of Mathematics and Statistics Queen’s University Kingston, Ontario K7L 3N6 CANADA
Abstract:

By a refinement of a rank argument used to prove a directed version of the Graham-Pollak theorem, we show that \(n\) bicliques are needed to partition the arc-set of the complement of a directed cycle.

D. V. Chopra1, R. Dios2
1Wichita State University
2New Jersey Institute of Technology
Abstract:

In this paper, we obtain a polynomial inequality of degree three in \(m\) (the number of constraints), with coefficients involving the parameters \(\mu_i\)’s, on the existence of balanced arrays of strength four and with two symbols. Applications of the inequality to specific balanced arrays for obtaining an upper bound on the number of constraints are also discussed.

S. T. Hedetniemi1, D. P. Jacobs1, R. Laskar1
1Department of Computer Science and Department of Mathematical Sciences Clemson University Clemson, SC 29631 U.S.A.
Abstract:

Let \(r(G)\) denote the rank, over the field of rational numbers, of the adjacency matrix of a graph \(G\). Van Nuffelen and Ellingham have obtained several inequalities which relate \(r(G)\) to other graph parameters such as chromatic number, clique number, Dilworth number, and domination number. We obtain additional results of this type. Our main theorem is that for graphs \(G\) having no isolated vertices, \(OIR(G) \leq r(G)\), where \(OIR(G)\) denotes the upper open irredundance number of \(G\).

Elizabeth J.Billington1, D. G. Hoffman2
1Department of Mathematics University of Queensland Brisbane, Queensland 4067, AUSTRALIA
2Department of Algebra, Combinatorics and Analysis Auburn University Auburn, Alabama 36849, U.S. A.
Abstract:

Let \(D\) denote any balanced ternary design with block size three, index two, and \(\rho_2 = 1\) (that is, with each element occurring repeated in just one block). This paper shows that there exists such a design \(D\) on \(V\) elements containing exactly \(k\) pairs of repeated blocks if and only if \(V \equiv 0 \pmod{3}\), \[0\leq k \leq t_V = \frac{1}{6}V(V-3), \; \; k\neq t_V – 1, \text{and} (k,V)\neq(1,6)\].

C. J. Colbourn1, S. Milici2
1Department of Combinatorics and Optimization University of Waterloo Waterloo, Ontario N2L 3G1 CANADA
2Dipartimento di Matematica Viale A. Doria 6 95125 Catania ITALY
Abstract:

For each integer \(v \geq 0\) and each \(\lambda \in \{4, 5, 7, 8\}\), the possible numbers of distinct blocks in a triple system of order \(v\) and index \(\lambda\) is determined. This essentially completes the determination of possible support sizes for triple systems with \(\lambda \leq 8\).

Michael A.Henning1, Henda C.Swart2
1University of Zululand
2University of Natal.
Abstract:

If \(n\) is an integer, \(n \geq 2\), and \(u\) and \(v\) are vertices of a graph \(G\), then \(u\) and \(v\) are said to be \(K_n\)-adjacent vertices of \(G\) if there is a subgraph of \(G\), isomorphic to \(K_n\), containing \(u\) and \(v\). A total \(K_n\)-dominating set of \(G\) is a set \(D\) of vertices such that every vertex of \(G\) is \(K_n\)-adjacent to a vertex of \(D\). The total \(K_n\)-domination number \(\gamma_{K_n}^t(G)\) of \(G\) is the minimum cardinality among the total \(K_n\)-dominating sets of vertices of \(G\). It is shown that, for \(n \in \{3, 4, 5\}\), if \(G\) is a graph with no \(K_n\)-isolated vertex, then \(\gamma_{K_n}^t(G) \leq (2p)/{n}\). Further, \(K_n\)-connectivity is defined and it is shown that, for \(n \in \{3, 4\}\), if \(G\) is a \(K_n\)-connected graph of order \(\geq n + 1\), then \(\gamma_{K_n}^t(G) \leq (2p)/(n + 1)\). We establish that the upper bounds obtained are best possible.

Alan Rahilly1
1Department of Mathematics University of Queensland St. Lucia, 4067, Australia
Abstract:

Let \(D\) and \(\overline{D}^d\) be two designs such that there is a joint embedding \(D’\) and \(\overline{D}’\) of \(D\) and \(\overline{D}\) in a finite projective plane \(\pi\) of order \(n\) such that the points of \(D’\) and the lines of \(\overline{D}’\) are mutually all of the exterior elements of each other. We show that there is a tactical decomposition \(T\) of \(\pi\), two of the tactical configurations of which are \(D’\) and \(\overline{D}’\), and determine combinatorial restrictions on \(n\) and the parameters of \(D\) and \(\overline{D}^d\). We also determine the entries of the incidence matrices of \(T\).

James Dowdy1, Michael E.Mays1
1Department of Mathematics West Virginia University Morgantown, WV 26506
Abstract:

The Josephus problem is concerned with anticipating which will be the last elements left in the ordered set \(\{1, 2, \ldots, n\}\) as successive \(m\)th elements (counting cyclically) are eliminated. We study the set of permutations of \(\{1, 2, \ldots, n\}\) which arise from the different orders of elimination as \(m\) varies, and give a criterion based on the Chinese Remainder Theorem for deciding if a given permutation can be interpreted as arising as a given order of elimination for some step size \(m\) in a Josephus problem.

Ernest F.Brickell1
1Sandia National Laboratories Albuquerque, NM 87185
Abstract:

In a secret sharing scheme, a dealer has a secret. The dealer gives each participant in the scheme a share of the secret. There is a set \(\Gamma\) of subsets of the participants with the property that any subset of participants that is in \(\Gamma\) can determine the secret. In a perfect secret sharing scheme, any subset of participants that is not in \(\Gamma\) cannot obtain any information about the secret. We will say that a perfect secret sharing scheme is ideal if all of the shares are from the same domain as the secret. Shamir and Blakley constructed ideal threshold schemes, and Benaloh has constructed other ideal secret sharing schemes. In this paper, we construct ideal secret sharing schemes for more general access structures which include the multilevel and compartmented access structures proposed by Simmons.

Special Issues

The Combinatorial Press Editorial Office routinely extends invitations to scholars for the guest editing of Special Issues, focusing on topics of interest to the scientific community. We actively encourage proposals from our readers and authors, directly submitted to us, encompassing subjects within their respective fields of expertise. The Editorial Team, in conjunction with the Editor-in-Chief, will supervise the appointment of Guest Editors and scrutinize Special Issue proposals to ensure content relevance and appropriateness for the journal. To propose a Special Issue, kindly complete all required information for submission;