Applications of Graph Labeling in Major Areas of Computer Science
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 8
Abstract
The field of Graph Theory plays a vital role in various fields. In Graph theory main problem is graph labeling. Graph Labeling is the assignment of integer’s form 1 to n for vertex, edges and both of the graphs respectively. One of the important areas in graph theory is Graph Labeling which is used in many applications like coding theory, radar, astronomy, circuit design, missile guidance, communication network addressing, xray crystallography, data base management. Here we would like to enhance the graph labeling applications in the field of computer science. This paper gives an overview of labeling of graphs in heterogeneous fields to some extent, but mainly focuses on important major areas of computer science like data mining, image processing, cryptography, software testing, information security, communication networks etc….These are various subjects in engineering studies and these are more efficiently used in various sectors like government sectors, corporate sectors like that. In these subjects every subject has their concept and gave their usage related to graph labeling. Future enhancements for the graph labeling should be used in cloud computing, signal processing etc… Various papers based on graph theory and graph labeling applications have been studied and we explore the usage of Graph Labeling in several areas like data mining, communication networks, image processing, cryptosystems, computer science applications and an overview has been proposed here.
Authors and Affiliations
N. Lakshmi prasanna K. Sravanthi , Nagalla Sudhakar
A Study on Security Advances for LEACH in WSN
Wireless Sensor Network consist of several autonomous sensor nodes that are capable of some sort of sensing power. Since the sensor nodes are placed in harsh environments, WSN is vulnerable to various types of attacks....
Exemplary Instinctive Repression Of Worms
Key diligence is the routing procedure that absolute the packet in the network routing sachets fully associated to wireless set of connections has considered to a great coverage but the assumption on packed connectiv...
Minimizing Packet Delay Rate in Tree based wireless sensor networks
In this advanced and fast world people do not want to wait much for collecting information. Hence now a day’s collecting information in a faster way became a challenge for the researchers. Faster data collection in W...
A Model for WAP-Based Mobile Banking Services
Mobile banking has emerged as a wireless service delivery channel in order to create added value for customers’ banking transactions. Previous studies indicate that factors contributing to the adoption of mobile ban...
Issues and Dependencies on Affect Data Models For Assessment of Disorders- A Survey
Analysis of free-form data has always been a challenge. In that, data depicting affects in hidden form and/or in various modes complicates the task of mining to identify and analyze relevant affects from the input. A...