Utilitas Algorithmica (UA)

ISSN: xxxx-xxxx (print)

Utilitas Algorithmica (UA) is a premier, open-access international journal dedicated to advancing algorithmic research and its applications. Launched to drive innovation in computer science, UA publishes high-impact theoretical and experimental papers addressing real-world computational challenges. The journal underscores the vital role of efficient algorithm design in navigating the growing complexity of modern applications. Spanning domains such as parallel computing, computational geometry, artificial intelligence, and data structures, UA is a leading venue for groundbreaking algorithmic studies.

Walter Carballosa1, Francisco A. Reyes2, Jessica Khera1
1Department of Mathematics and Statistics, Florida International University, 11200 SW 8th Street, Miami, FL 33199 USA
2Mathematics Department, Broward College, 3501 Davie Road, Davie, FL 33314 USA
Abstract:

In this work we study the acyclic orientations of graphs. We obtain an encoding of the acyclic orientations of the complete \(p\)-partite graph with size of its parts \(n_1,n_2,\ldots,n_p\) via a vector with \(p\) symbols and length \(n=n_1+n_2+\ldots+n_p\) when the parts are fixed but not the vertices in each part. We also give a recursive way to construct all acyclic orientations of a complete multipartite graph, this construction can be done by computer easily in order \(\mathcal{O}(n)\). Furthermore, we obtain a closed formula for non-isomorphic acyclic orientations of both the complete multipartite graphs and the complete multipartite graphs with a directed spanning tree. Moreover, we obtain a closed formula for the number of acyclic orientations of a complete multipartite graph \(K_{n_1,\ldots,n_p}\) with labelled vertices. Finally, we obtain a way encode all acyclic orientations of an arbitrary graph as a permutation code. Using the codification mentioned above we obtain sharp upper and lower bounds of the number of acyclic orientations of a graph.

Ahmet Tekcan1
1Bursa Uludag University, Faculty of Science, Department of Mathematics, Bursa, Turkiye
Abstract:

In this work, we defined almost neo balancing numbers and determined the general terms of them in terms of balancing and Lucas-balancing numbers. We also deduced some results on relationship with triangular, square triangular, Pell, Pell-Lucas numbers and these numbers. Further we formulate the sum of first \(n\)-terms of these numbers.

Isaac Owino Okoth1
1Department of Pure and Applied Mathematics, Maseno University, P. Box 333-40105, Maseno, Kenya
Abstract:

In this paper, we prove a surprisingly simple formula that counts connected cycle-free families of set partitions, labelled free cacti and coloured Husimi graphs in which there are no blocks of the same colour that are incident to one another. We also provide a formula that enumerates noncrossing connected, cycle-free pairs of partitions.

Mark Budden1, Richard Prange2
1Department and Mathematics and Computer Science, Western Carolina University, Cullowhee, NC, USA
2Department and Mathematics and Statistics, University of North Carolina at Charlotte, Charlotte, NC, USA
Abstract:

Recently, it was shown that the Gallai-Ramsey number satisfies \(gr(F_{3,2}, K_3, K_3)=31\), where \(F_{3,2}\) is the generalized fan \(F_{3,2}:=K_1+2K_3\). In this paper, we show that the star-critical Gallai-Ramsey number satisfies \(gr_*(F_{3,2}, K_3, K_3)=27\). We also prove that the critical colorings for \(r_*(K_3, K_3)\), \(gr(F_{3,2},K_3,K_3)\), and \(gr_*(F_{3,2},K_3,K_3)\) are unique.

Devin Jean1, Suk Seo1
1Department of Computer Science, Middle Tennessee State University, Murfreesboro, TN, USA
Abstract:

Given a network modeled as a graph, a detection system is a subset of vertices equipped with “detectors” that can uniquely identify an “intruder” anywhere in the graph. We consider two types of detection systems: open-locating-dominating (OLD) sets and identifying codes (ICs). In an OLD set, each vertex has a unique, non-empty set of detectors in its open neighborhood; meanwhile, in an IC, each vertex has a unique, non-empty set of detectors in its closed neighborhood. We explore one of their fault-tolerant variants: redundant OLD (RED:OLD) sets and redundant ICs (RED:ICs), which ensure that removing/disabling at most one detector retains the properties of OLD sets and ICs, respectively. This paper focuses on constructing optimal RED:OLD sets and RED:ICs on the infinite king grid, and presents the proof for the bounds on their minimum densities; \(\left[\frac{3}{10}, \frac{1}{3}\right]\) for RED:OLD sets and \(\left[\frac{3}{11}, \frac{1}{3}\right]\) for RED:ICs.

Annie Clare Antony1, V Sangeetha1
1Centre for Mathematical Needs, Department of Mathematics, Christ University, Bangalore-560029, Karnataka, India
Abstract:

Exploring the vulnerability of any real-life network helps designers understand how strongly components or elements of the network are connected and how well they can function if there is any disruption. Any chemical structure can also be considered as a network in which the atoms correspond to the vertices, and the chemical bonds between the atoms correspond to the edges. Let \(G=(V, E)\) represent any simple graph with vertex set \(V\) and edge set \(E\). The vulnerability measure used in this paper is the paired domination integrity, defined as the minimum of the sum of any paired dominating set \(S\) of a graph \(G\) and the order of the largest component in the induced subgraph of \(V-S\). The minimum is found by considering all possible paired dominating sets of \(G\). In this paper, we obtain the paired domination integrity of the comb product of paths and cycles. In addition, we extend the study of graph vulnerability to chemical structures.

Ze Gu1
1School of Mathematics and Statistics, Zhaoqing University, Zhaoqing, Guangdong, 526061, P.R. China
Abstract:

Let \(k, b, n\) be positive integers such that \(b\geq 2\). Denote by \(S(k,b,n)\) the numerical semigroup generated by \(\left\{b^{k+n+i}+\frac{b^{n+i}-1}{b-1}\mid i\in\mathbb{N}\right\}\). In this paper, we give formulas for computing the embedding dimension and the Frobenius number of \(S(k,b,n)\).

Mohammed L. Nadji1,2, Mohammed Benatallah3, Ibrahim Boufelgha4,5
1Faculty of Mathematics, University of Science and Technology Houari Boumediene, Algiers 16111, Algeria
2RECITS laboratory, BP 32, El Alia, Bab Ezzouar, Algiers 16111, Algeria
3Department of Mathematics, Ziane Achour University, Djelfa 17000, Algeria
4Department of Mathematics, Abdelhafid Boussouf University Center, Mila 43000, Algeria
5 LMAM Laboratory, BP 98, Ouled Aissa, 18000 Jijel, Algeria
Abstract:

Given a connected graph \(G=(V,E)\) of order \(n\ge 2\) and two distinct vertices \(u,v\in V(G)\), consider two operations on \(G\): the \(k\)-multisubdivision and the \(k\)-path addition. Let \(msd_{\gamma_c}(G)\) and \(pa_{\gamma_c}(G)\) denote, respectively, the connected domination multisubdivision and path addition numbers of \(G\). In both operations, \(k\) represents the number of vertices added to \(V(G)\), resulting in a new graph denoted by \(G_{u,v,k}\). We prove that \(\gamma_c(G) \le \gamma_c(G_{u,v,k})\) for \(k = msd_{\gamma_c}(G) \in \{1,2,3\}\) in the case of \(k\)-multisubdivision, where \(uv \in E(G)\). Additionally, we show that \(\gamma_c(G) – 2 \le \gamma_c(G_{u,v,k})\) for \(k = pa_{\gamma_c}(G) \in \{0,1,2,3\}\) in the case of \(k\)-path addition, where \(uv \notin E(G)\), and provide both necessary and sufficient conditions under which these inequalities hold.

Elahe Mehraban1, Bahar Kuloğlu2, Engin Özkan3, Evren Hıncal1
1Mathematics Research Center, Near East University TRNC, Mersin 10, 99138 Nicosia, Türkiye
2Department of Engineering Basic Sciences, Sivas University of Science and Technology, Sivas, Türkiye
3Department of Mathematics, Marmara University, İstanbul, Türkiye
Abstract:

This paper introduces two novel sequences: the \(k-\)-division Fibonacci–Pell polynomials and the \(k-\)-division Gaussian Fibonacci–Pell polynomials. Building on the well-known Fibonacci and Pell sequences, these new sequences are defined using a division-based approach, enhancing their combinatorial and algebraic properties. We present explicit recurrence relations, generating functions, combinatorial identities, and Binet-type formulas for these sequences. A significant contribution of the study is the factorization of the Pascal matrix via the Riordan group method using the proposed polynomials. Two distinct factorizations are derived, highlighting the algebraic structure and combinatorial interpretations of the \(k-\)-division polynomials. The work not only generalizes known polynomial sequences but also provides new insights into their matrix representations and applications.

Daniel Monroe1
17708 Hackamore Drive, Potomac MD 20854, Montgomery Blair High School
Abstract:

This paper provides new lower bounds for van der Waerden numbers using Rabung’s method, which colors based on the discrete logarithm modulo some prime. Through a distributed computing project with 500 volunteers over one year, we checked all primes up to 950 million, compared to 27 million in previous work. We point to evidence that the van der Waerden number for \(r\) colors and progression length \(k\) is roughly \(r^k\).

Special Issues

The Combinatorial Press Editorial Office routinely extends invitations to scholars for the guest editing of Special Issues, focusing on topics of interest to the scientific community. We actively encourage proposals from our readers and authors, directly submitted to us, encompassing subjects within their respective fields of expertise. The Editorial Team, in conjunction with the Editor-in-Chief, will supervise the appointment of Guest Editors and scrutinize Special Issue proposals to ensure content relevance and appropriateness for the journal. To propose a Special Issue, kindly complete all required information for submission;