Applications of Graph Labeling in Major Areas of Computer Science
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 8
Abstract
The field of Graph Theory plays a vital role in various fields. In Graph theory main problem is graph labeling. Graph Labeling is the assignment of integer’s form 1 to n for vertex, edges and both of the graphs respectively. One of the important areas in graph theory is Graph Labeling which is used in many applications like coding theory, radar, astronomy, circuit design, missile guidance, communication network addressing, xray crystallography, data base management. Here we would like to enhance the graph labeling applications in the field of computer science. This paper gives an overview of labeling of graphs in heterogeneous fields to some extent, but mainly focuses on important major areas of computer science like data mining, image processing, cryptography, software testing, information security, communication networks etc….These are various subjects in engineering studies and these are more efficiently used in various sectors like government sectors, corporate sectors like that. In these subjects every subject has their concept and gave their usage related to graph labeling. Future enhancements for the graph labeling should be used in cloud computing, signal processing etc… Various papers based on graph theory and graph labeling applications have been studied and we explore the usage of Graph Labeling in several areas like data mining, communication networks, image processing, cryptosystems, computer science applications and an overview has been proposed here.
Authors and Affiliations
N. Lakshmi prasanna K. Sravanthi , Nagalla Sudhakar
Protected And Valuable Cutting For Packet Classification
Hardware implementations of Internet procedure (IP) organization algorithms have been proposed by the research community over the years to realize high speed routers and Internet backbone. Firewalls use packet filter...
Integrated Data Mining Approach for Security Alert System
The need for automatic detection of deceptive Emails is increasing due to the rapid usage of Email communication in the Internet world. The proposed “Security Alert System” provides a way to identify the future terro...
Query Clustering method to User profiles
The User profiling is a fundamental component of any personal applications. The several existing user profiling strategies are based on the objects of users are interested in positive references but not negative pref...
Performance Enhancement of Sliding Mode Control Using Fuzzy Logic: An Application And Analysis
Sliding mode control (SMC) is an efficient tool in design of robust controller for nonlinear plants. The main advantage of sliding mode control is order reduction and making the system practically independent of vari...
Image Processing using Bilateral Filtering with future scope in Parellel Processing
Bilateral filtering smooths images while maintaining edges, by use of a nonsimilar combination of nearing image values. The method is less time consuming, local, and easy. It clubs together gray levels or colors based...