Equivalence Of Super Magic Labelings
Journal Title: INTERNATIONAL JOURNAL OF MATHEMATICS TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 3
Abstract
Let G (V, E) be a graph with p vertices and q edges. A bijection f : V E {1,2,…., p+q} is called a super magic labeling of a graph G, if f(V) = {1, 2,…., p} and for any edge xyE, f(x)+f(y)+f(xy) = c(f), a constant. The super magic strength of a graph G, sm(G) is defined as the minimum of all c(f) where the minimum runs over all super magic labelings f of G. Recently a new version of super magic labeling has been introduced. For the graph G(V, E), a bijection f : V E {1, 2,…., p+q} is called a super magic (special) labeling of G, if f(E) = {1, 2,…., q} for any edge xyE such that f(x)+f(y)+f(xy) = c'(f), a constant. The super magic (special) strength of a graph G, sms(G) is defined as the minimum of all c'(f) where the minimum is taken over all super magic special labelings f of G. In this paper, we prove that sms(G) = 2q-p+sm(G).
Authors and Affiliations
Selvam Avadayappan, S. Kalaimathy, P. Mahalakshmi
Numerical Analysis of the Fuzzy Integro-Differential Equations using Single-Term Haar Wavelet Series
This paper presents numerical analysis of the fuzzy integro-differential equations (FIDE) using Single Term Haar Wavelet Series (STHWS) method [6-9] is considered. The obtained discrete solutions using STHWS are compared...
(i,j) Strongly a**-Closed Sets in Bitopological Spaces
In this paper we introduce a new class of sets namely, (i,j) strongly α**-closed sets. Properties of this set are investigated and we introduce new spaces namely, (i,j)Tsα** spaces, (i,j)g*Tsα** spaces and (i,j)sg* Tsα**...
Hematocrit effects of the axisymmetric blood flow through an artery with stenosis arteries
When the nature of blood flow changes from its usual state to a disturbed flow condition due to the presence of a stenosis in an artery. Then it has been suggested that the deposits of cholesterol on the arterial w...
Soft Ideals of a Soft Lattice
soft set theory was introduced by Molodtsov in 1999 as a mathematical tool for dealing with problems that contain uncertainty. Faruk Karaaslan et al.[6] defined the concept of soft lattices, modular soft lattices and dis...
Securing Server System from Buffer Overflow vulnerability using Vel-Alagar Algorithm
Now a day’s buffer overflows have take place the most common target for network based attacks. The main proliferation method used by worms, malicious codes and improper coding by developers. Many techniques have be...