3-Total Super Product Cordial Labeling For Some Graphs
Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 2
Abstract
"In this paper we investigate a new labeling called 3-total super product cordial labeling. Suppose G=(V(G),E(G) ) be a graph with vertex set V(G) and edge set E(G). A vertex labeling f:V(G)→{0,1,2}. For each edge uv assign the label (f(u)*f(v) )mod 3. The map f is called a 3-total super product cordial labeling if |f(i)-f(j) |≤1 for i,j ε {0,1,2} where f(x) denotes the total number of vertices and edges labeled with x={0,1,2} and for each edge uv,|f(u)-f(v) |≤1 . Any graph which satisfies 3-total super product cordial labeling is called 3-total super product cordial graphs. Here we prove some graphs like path, cycle and complete bipartite graphk1,n are 3-total super product cordial graphs. "
FPGA Based Architecture for High Performance SRAM Based TCAM for Search Operations
Ternary Content Addressable memory is a type of memory that allows the memory to be searched by content rather than by address. It performs high speed look-up operations within a single clock cycle. But when compared to...
Synthesis, Characterization and Evaluation of Antimicrobial Activity of Various Mannich Bases of Isoindoledione Derivatives
"Isoindoledione possess a structural feature–CO-N(R)-CO- , an imide ring which help them to be biologically active and pharmaceutically useful. Isoindoledione have received attention due to their antibacterial, antifunga...
Factors Influencing Implementation of Strategic Plans in Public Secondary Schools in Lari District, Kiambu County
Previous studies have indicated that good strategies have been written but very little has been achieved in their implementation. It has further been argued that only 10% of formulated strategies are successfully implem...
Cipher Suites - The Cryptographic Computations in Routing of Mobile Ad hoc Networks (MANET)
Cipher Suites - The Cryptographic Computations in Routing of Mobile Ad hoc Networks (MANET)
Development of Mobile Data Encryption Mechanism in Cloud Environment
The use of mobile is not limited to calling only. The multiple use of application leads to requirement of comparatively large storage capacity which is big constraint of mobile device. Cloud storage can be used to overco...