Applications of Graph Labeling in Major Areas of Computer Science
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 8
Abstract
The field of Graph Theory plays a vital role in various fields. In Graph theory main problem is graph labeling. Graph Labeling is the assignment of integer’s form 1 to n for vertex, edges and both of the graphs respectively. One of the important areas in graph theory is Graph Labeling which is used in many applications like coding theory, radar, astronomy, circuit design, missile guidance, communication network addressing, xray crystallography, data base management. Here we would like to enhance the graph labeling applications in the field of computer science. This paper gives an overview of labeling of graphs in heterogeneous fields to some extent, but mainly focuses on important major areas of computer science like data mining, image processing, cryptography, software testing, information security, communication networks etc….These are various subjects in engineering studies and these are more efficiently used in various sectors like government sectors, corporate sectors like that. In these subjects every subject has their concept and gave their usage related to graph labeling. Future enhancements for the graph labeling should be used in cloud computing, signal processing etc… Various papers based on graph theory and graph labeling applications have been studied and we explore the usage of Graph Labeling in several areas like data mining, communication networks, image processing, cryptosystems, computer science applications and an overview has been proposed here.
Authors and Affiliations
N. Lakshmi prasanna K. Sravanthi , Nagalla Sudhakar
MCLOUD: Effective Data Sharing In Multiple-Groups
Cloud computing is an emerging computing paradigm. It provides an economical and efficient solution for sharing group resource among cloud users. Due to frequent change of members in multi owner group, preserving user...
Study of Cyber Threats and Data Encryption Techniques to Protect National Information Infrastructure
In today’s era of globalization almost all kind of organizations critically dependent on information technology , at the same time evolution of technology is also creating an opportunities for cyber criminal to exploi...
A Protective Scheme To Prevent The Attacker From Forging Acknowledgment Packets In Manets’s Using Eaack
Amongst all the modern wireless networks Mobile Ad hoc network (MANET) is one of the most significant and exclusive applications. MANET does not necessitate a fixed network infrastructure every single node works as b...
A Location Based Query solution Enables A User to Privately Determine And Acquire Location Data
Location based service (LBS) is an information, activity and efficacy service usually reachable by mobile devices such as, mobile phones, GPS devices, pocket PCs, and functioning in the course of a mobile network. LB...
Effective Routing Plan For Quality Results On Linked Data Using Keyword Search
Keyword search is a natural world view for seeking connected information sources on the web. We propose to route keywords just to pertinent sources to reduce the high cost of handling keyword search queries over all...