SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.5, No.4, December 2013

THE RESULT FOR THE GRUNDY NUMBER ON P4CLASSES
Ali Mansouri1 and Mohamed Salim bouhlel 2
1

Department of Electronic Technologies of Information and Telecommunications Sfax,
Tunisia
2
Department of Electronic Technologies of Information and Telecommunications Sfax,
Tunisia

ABSTRACT
Our work becomes integrated into the general problem of the stability of the network ad hoc. Some, works
attacked (affected) this problem. Among these works, we find the modelling of the network ad hoc in the
form of a graph. We can resume the problem of coherence of the network ad hoc of a problem of allocation
of frequency
We study a new class of graphs, the fat-extended P4 graphs, and we give a polynomial time algorithm to
calculate the Grundy number of the graphs in this class. This result implies that the Grundy number can be
found in polynomial time for many graphs

KEYWORDS
Graph Theory, Grundy number, P4-classes, Total graph, Graph coloring, Wireless Network, Mobile
Network,

1. INTRODUCTION
We denoted a graph G by G = (V, E) and an order θ = v1, . . . , vn over V, for coloring the vertices
of G, we used the polynomial algorithm, we affected to vi the minimum positive integer that was
not affected to its neighborhood in the set {v1, . . . , v i−1}[10].
The execution of this algorithm for a graph give a coloring that we can gives name as a greedy
coloring.
The greedy coloring of a graph G is characterized by the maximum number of colors of, over all
the orders θ of V (G) is the Grundy number of G; we represented by Γ (G) the grundy number of
graph. [10]. the Grundy number is considered NP-complete [9]. We can show a graph G and an
integer r it is a coNP-complete problem to decide if the grundy number of G respect the
following condition Γ (G) ≤ χ + r [9] or if Γ (G) ≤ r × χ (G) or if Γ (G) ≤ c × ω (G) [2]. In the next
section, we study the polynomial time algorithms to determinate the Grundy number of many
classes of graphs like the cographs [4], the trees [5] and the k-partial trees [8].

DOI:10.5121/jgraphoc.2013.5402

19
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.5, No.4, December 2013

2. RELATED WORKS
This parameter was introduced by Christen and Selkow [11] in 1979. They proved that
determining the Grundy number is NP-complete for general graphs (also studied by McRae in
1994 [AMC94]). In [SST84], Hedetniemi et al. gave a linear algorithm for the Grundy number of
a tree and established a relation between the chromatic number, the Grundy number and the
achromatic number: Ҳ (G) ≤Γ (G) ≤ Ψ (G), where the achromatic number Ψ (G) is the maximum
number of colors used for a proper coloring of G such that each pair of colors appears on at least
one edge of G.
In 1997, Telle and Proskurowski [12] gave an algorithm for the Grundy number of partial k-trees
in O (n3k2) and bounded this parameter for these graphs by the value 1 + k log2 n, where n is the
graph order. In 2000, Dunbar et al. used the Grundy number to bound new parameters that they
introduced in [13], the chromatic and the achromatic numbers of a fall coloring.
Recently, Germain and Kheddouci studied in [14], the Grundy coloring of power graphs. They
gave bounds for the Grundy number of the power graphs of a path, a cycle, a caterpillar and a
complete binary tree. Such colorings are also explored for other graphs like chessboard graphs
[15].
Hedetniemi et al. (1982 determinate an algorithm witch can gives a solution for this problem on
trees; and an algorithm on partial k-trees gives by Telle and Proskurowski (1997). The problem
was shown to be NP-complete on directed graphs Christen and Selkow (1979).

3. FAT EXTENDED P4-LADEN GRAPHS
In this section, we give some definitions. In first time, we denote G by G = (V, E) is a graph and S
is a subset of V (G) [10].The subgraph of G is represented by G[S]. The module of a graph G is
denoted or represented by M [10]. The sets V and {x}, for every x ∈ V, are trivial modules, the
last one being called as a singleton module.
We called graph prime if this graph have all of modules are trivial. M is considered like a strong
module of G if this condition is approved “|for every module M′ of G, either M′∩M = ∅ or M ⊂
M or M′⊂ M” [10].
We denoted by r an internal node of T(G), we denoted by M(r) the set of leaves of the sub tree of
T(G) , also we denoted by V (r) = {r1, . . . , rk} the children of r in T(G). After that, If G [M(r)] is
not connected, then we called r a parallel node and the graph G [M (r1)],. . . ,G M (rk)] are define
like its components. Now , If the graph G¯ [M(r)] is not connected , so we called r a set of set
node , G¯ [M (r1)],. . . ,G¯ [M(rk)] define the components of graph. Finally, r is define like a
neighbourhood node and M (r1), . . . , M(rk) is called the unique set of maximal submodules of
M(r) , if the graphs G [M(r)] is connected at G¯ [M(r)]. we denoted, by quotient graph of r, the
G(r), is G [v1, . . . , vk], where vi ∈ M(ri), for 1 ≤ i ≤ k. r is called a fat node, with simple
condition if M(r) is not a singleton module.
We called spider graph, a graph have vertex set can be devised into three sets S, K and R
We denoted a stable set by S, K represents a clique, the set of vertices of R are adjacent to all the
vertices of K and is not adjacent of the vertices of S

20
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.5, No.4, December 2013

A graph is called a graph split if it is {C5, C4, C¯ 4}-free. [10] A pseudo-split graph is defined as
a {C4, C¯ 4}-free graph. Also, a split graph G = (S∪K, E), its vertex set can be devised into three
disjoint sets S (G), K (G) and R (G)
There is condition must be respected “S(G) ⊆ S and every vertex s ∈ S(G) is not adjacent to at
least one vertex in K, K(G) is the neighborhood of the vertices in S(G) and R(G) = V (G)S(G) ∪
K(G). [10]
Giakoumakis [3] defined a graph G as extended P4-laden graphs if, for all H ⊆ G such that |V
(H)| ≤ 6, then the following statement is true: if H contains more than two induced P4’s, then H is
a pseudo-split graph. We can define an extended P4-laden graph by its modular partition tree
Theorem 1 [3] we denote a graph G by G = (V, E), we denote by T (G) the modular partition tree
and by r the any neighborhood node of T (G),
Then G is extended P4-laden if and only if G(r) is isomorphic to:
(i) a P5 or a P¯ 5 or a C5, and each M(ri) is a singleton module; or
(ii) a spider H = (S∪K ∪R, E) and each M(ri) is a singleton module, except the one corresponding
to R and eventually another one which may have exactly two vertices; or
(iii) a split graph H, whose modules corresponding to the vertices of S(H) are independent sets
and the ones corresponding to the vertices of K(H) are cliques.
We say that a graph is fat-extended P4-laden if its modular decomposition satisfies the Theorem
1, except in the first case, where G(r) is isomorphic to a P5 or a P¯ 5 or a C5, but the maximal
strong modules M(ri), 1 ≤ i ≤ 5, of M(r) are not necessarily singleton modules.

4. GRUNDY NUMBER ON FAT EXTENDED P4-LADEN GRAPHS
From now, let G = (V, E) be a fat-extended P4-laden graph and T (G) its modular decomposition
tree. The modular partition tree T (G) can be determinate in polynomial time [7], we give an
algorithm to determinate Γ (G). We know that the Grundy number of the leaves of T (G) is equal
to one and we show in this section how to determine the Grundy number of G[M(v)], for every
inner node v of T(G), based on the Grundy number of its children.
First, observe that for every series node (resp. parallel node) v of T (G), the Grundy number of
G[M(v)] is equal to the sum of the Grundy number of its children (resp. the maximum Grundy
number of its children) [4]. Thus, we only need to prove that the Grundy number of G [M (v)] can
be found in polynomial time when v is a neighborhood node of T (G).
The following result is a simple generalization of a result due to Asté etal. [2] for the Grundy
number of lexicographic product of graphs:
Proposition 2: Let G, H1, . . . , Hn be disjoint graphs such that n = |V (G)| and let V (G) = {v1, . . .
, vn}. If G′is the graph obtained by replacing vi ∈ V (G) by Hi , then for every greedy coloring of
G′at most Γ(Hi) colors contain vertices of the induced subgraph G′[Hi] ⊆ G′, for all i ∈ {1, . . . ,
n}.
Lemma 3: Let v be a neighborhood node of T(G) isomorphic to a P5 or aC5 or a C¯ 5, v1, . . . , v5
be the children of v and Γi be the Grundy number of G[M(vi)], 1 ≤ i ≤ 5. Then Γ (G [M (v)]) can
be found in constant time.
21
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.5, No.4, December 2013

Proof: (Sketch) Without loss of generality, suppose that v1, . . . , v5 label the children of v as
depicted in Figure 1 and Hi = Γ(G[M(vi)]). In order to simplify the notation, denote by θi an
ordering over M (vi) that induces a greedy coloring with Γ i colors, 1 ≤ i ≤ 5.
We calculate Γ (G [M (v)]) by verifying all the possible configurations for a greedy Γ (G [M
(v)])-coloring and by returning the greater value found between all the cases. Suppose that G (v)
is isomorphic to a P5. Let S = {S1, . . . , Sk} be a greedy Γ(G[M(v)])-coloring of G[M(v)].
We claim that if there exists a vertex u ∈ V (H1) colored by Sk, then Γ (G [M (v)]) = Γ1 + Γ2. This
fact holds because combining the observation that u has at least one vertex colored by S i , for all i
∈ {1, . . . , k −1}, with the proposition 2, we conclude that Γ(G[M(v)]) ≤ Γ1 + Γ2. On the other
hand, if we consider any ordering θ over G [M (v)] that has starts with θ 1 and θ2, we see that the
first-fit algorithm over this order will produce a greedy coloring with at least Γ1 + Γ2 colors. Using
the symmetry, we can also prove that if u ∈ V (H5), then Γ (G [M (v)]) = Γ4 + Γ5.
All the other cases use similar arguments, that is, by finding an upper bound based on the position
of a vertex colored Sk and a lower bound based in an ordering over M (v). The cases where G (v)
is isomorphic to C5 or P¯ 5 are also proved by using similar arguments [10].
Lemma 4 :Let v be a neighborhood node of T (G) isomorphic to a spider H = (S ∪ K ∪ R, E), fr
be its child corresponding to R, f2 be its child corresponding to the module which has eventually
two vertices and Γ(R) be the Grundy number of G[M(fr)]. Then Γ (G [M (v)]) can be found in
linear time.

Figure 1: Fat neighborhood nodes.

Proof: If M (f2) is singleton module, then G [M (v)] is a spider. In this case, we cannot have two
colors Si and Sj , j > i, such that both contain only vertices of S. For otherwise, since S is a stable
set, the vertices colored Sj would not any neighbor colored Si, a contradiction. Thus, Γ (G [M (v)]
) ≤ 1 + |K| + Γ (R). If R = θ , then an ordering over M (v) such that all the vertices of S come
before the vertices of K induces a greedy coloring with Γ (G[M(v)]) = 1 + |K| colors. If R 6= θ,
we will prove that Γ (G [M (v)] ) ≤ |K| + Γ (R). Observe first that there is at least one color Si
occurring in R. Consequently, Si does not occur in K. Thus, there is no order over M(v) whose
greedy coloring returns a color Sj containing only vertices of S, because a vertex of S colored Sj
would not be adjacent to a vertex colored Si. On the other hand, if θ R is an ordering that induces a
greedy Γ (R)-coloring of R, then any ordering over M(v) starting by θ R induces a greedy coloring
with at least |K| + Γ (R) colors.
The case where M (f2) is not a singleton module is proved using similar arguments. [10]
If G (v) is a split graph H and the factors corresponding to vertices of S (H) are independent sets
and the ones corresponding to vertices of K (H) are cliques, then we can use the same arguments
of Lemma 3.3 observing that S, K and R correspond to S (H), K (H) and R (H), respectively
.
22
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.5, No.4, December 2013

Theorem 5: If G = (V, E) is a fat-extended P4-laden graph and |V | = n, then Γ (G) can be found
in O (n3).
Proof: The algorithm calculates Γ (G) by traversing the modular decomposition tree of G in a
postorder way and determining the Grundy of each inner node of T (G) based on the Grundy
number of the leaves. The modular decomposition tree can be found in linear time, the postorder
traversal can be done in O (n2) and the Grundy number of each inner node can be found in linear
time, because of Lemmas 3and 4 and the results of Gyarf´as and J.Lehel [4] for cographs.
Corollary 6: Let G be a graph that belongs to one of the following classes:
P4-reducible, extended P4-reducible, P4-sparse, extended P4-sparse, P4-extendible, P4-lite, P4tidy, P4-laden and extended P4-laden. Then, Γ (G) can be found in polynomial time.
Proof: According to definition of these classes [6], they are all strictly contained in the fatextended P4-laden graphs and so the corollary follows.

5. CONCLUSIONS
In the conclusion, we determinate, in first time, a new class of graphs, this class is called the fatextended P4-laden graphs, in second time; we calculate the Grundy number of the graphs in this
class by using a polynomial time algorithm. Finally, we can say that the Grundy number can be
calculated of each node in linear time, so, the total Grundy number of graph can be determinate
in polynomial time.

ACKNOWLEDGEMENTS
I think Mr. Julio Cesar Silva Araujo for his collaboration.

REFERENCES
[1]

J. C. Araujo., “Coloring graphs”,(2009). Master in Science Dissertation, in:
ww.lia.ufc.br/˜juliocesar/dissertacao.pdf (in Portuguese)”.
[2] M., F. Havet & C. Linhares Sales, (2008) “Grundy number and lexicographic product of graphs” in:
International Conference on Relations, Orders and Graphs and their Interaction with Computer
Science
[3] V. Giakoumakis., (1996) “p4-laden graphs: A new class of brittle graphs”, Information
Processing
Letters 60 pp, 29–36.
[4] A, Gyarf´as. & J. Lehel, (1988) “On-line and first fit colorings of graphs”, Journal of Graph Theory
pp. 217–227.
[5] T. Beyer S. M. & S. T. Hedetniemi, (1982) “A linear algorithm for the grundy number of a tree”,
Congressus Numerantium 36, pp. 351–363.
[6] Pedrotti, V, (2007) “Decomposi¸c˜ao modular de grafos n˜ao-orientados,” Master’s thesis,
Universidade Estadual de Campinas
[7] Tedder, M., D. Corneil, & C. Paul, (2007).” Simple, linear-time modular decomposition”.
[8] J, Telle A. & A. Proskurowski, (1997) “Algorithms for vertex partitioning problems on partial ktrees”, SIAM Journal on Discrete Mathematics 10 pp. 529–550.
[9] M, Zaker, (2005) “Grundy number of the complement of bipartite graphs” Journal of Combinatorics
31 pp. 325––330.
[10] J. C. Silva Ara´ujo, C. L. Sales, (2009) “Grundy number on P4-classes”, Electronic Notes in Discrete
Mathematics, Volume 35, 1, Pages 21–27.
[11] M. Selkow C. & A. Christen (1979) “ Some perfect coloring properties of graphs”, Journal of
Combinatorial Theory B27 ,49-59.
23
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.5, No.4, December 2013
[12] A. Proskurowski, & J.A. Telle, (1997), “Algorithms for vertex partitioning problems on partial ktrees”, SIAM Journal on Discrete Mathematics 10(4), 529-550.
[13] S.M. Hedetniemi, J.E. Dunbar, D.P. Jacobs & J. Knisely, (2000), “Colorings of Graphs”, Journal of
Combinatorial Mathematics and Combinatorial Computing 33 ,257-273.
[14] C. Germain and H. Kheddouci, “Grundy coloring for power caterpillars”, (2000), Proceedings of
International Optimization Conference INOC 2003, 243-247, Evry/Paris France.
[15] J. Rhyne&C. Parks (2002) “Grundy Coloring for Chessboard Graphs”, Seventh North Carolina MiniConference on Graph Theory,

24

Weitere ähnliche Inhalte

Was ist angesagt?

On sum edge coloring of regular, bipartite and split graphs
On sum edge coloring of regular,  bipartite and split graphsOn sum edge coloring of regular,  bipartite and split graphs
On sum edge coloring of regular, bipartite and split graphs政謙 陳
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Total Dominating Color Transversal Number of Graphs And Graph Operations
Total Dominating Color Transversal Number of Graphs And Graph OperationsTotal Dominating Color Transversal Number of Graphs And Graph Operations
Total Dominating Color Transversal Number of Graphs And Graph Operationsinventionjournals
 
Treewidth and Applications
Treewidth and ApplicationsTreewidth and Applications
Treewidth and ApplicationsASPAK2014
 
Dynamic Programming Over Graphs of Bounded Treewidth
Dynamic Programming Over Graphs of Bounded TreewidthDynamic Programming Over Graphs of Bounded Treewidth
Dynamic Programming Over Graphs of Bounded TreewidthASPAK2014
 
SUPER MAGIC CORONATIONS OF GRAPHS
SUPER MAGIC CORONATIONS OF GRAPHS SUPER MAGIC CORONATIONS OF GRAPHS
SUPER MAGIC CORONATIONS OF GRAPHS IAEME Publication
 
Mathematicalfoundationofcomputerscience
MathematicalfoundationofcomputerscienceMathematicalfoundationofcomputerscience
Mathematicalfoundationofcomputersciencejntuworld
 
Important Cuts
Important CutsImportant Cuts
Important CutsASPAK2014
 
Basic galois field arithmatics required for error control codes
Basic galois field arithmatics required for error control codesBasic galois field arithmatics required for error control codes
Basic galois field arithmatics required for error control codesMadhumita Tamhane
 
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRYON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRYFransiskeran
 
Darmon Points for fields of mixed signature
Darmon Points for fields of mixed signatureDarmon Points for fields of mixed signature
Darmon Points for fields of mixed signaturemmasdeu
 
A common fixed point of integral type contraction in generalized metric spacess
A  common fixed point of integral type contraction in generalized metric spacessA  common fixed point of integral type contraction in generalized metric spacess
A common fixed point of integral type contraction in generalized metric spacessAlexander Decker
 
A Short Study of Galois Field
A Short Study of Galois FieldA Short Study of Galois Field
A Short Study of Galois FieldHazratali Naim
 

Was ist angesagt? (20)

Chap4
Chap4Chap4
Chap4
 
445 colouring0
445 colouring0445 colouring0
445 colouring0
 
On sum edge coloring of regular, bipartite and split graphs
On sum edge coloring of regular,  bipartite and split graphsOn sum edge coloring of regular,  bipartite and split graphs
On sum edge coloring of regular, bipartite and split graphs
 
Chapter 22 Finite Field
Chapter 22 Finite FieldChapter 22 Finite Field
Chapter 22 Finite Field
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Total Dominating Color Transversal Number of Graphs And Graph Operations
Total Dominating Color Transversal Number of Graphs And Graph OperationsTotal Dominating Color Transversal Number of Graphs And Graph Operations
Total Dominating Color Transversal Number of Graphs And Graph Operations
 
Treewidth and Applications
Treewidth and ApplicationsTreewidth and Applications
Treewidth and Applications
 
Exhaustive Combinatorial Enumeration
Exhaustive Combinatorial EnumerationExhaustive Combinatorial Enumeration
Exhaustive Combinatorial Enumeration
 
Dynamic Programming Over Graphs of Bounded Treewidth
Dynamic Programming Over Graphs of Bounded TreewidthDynamic Programming Over Graphs of Bounded Treewidth
Dynamic Programming Over Graphs of Bounded Treewidth
 
SUPER MAGIC CORONATIONS OF GRAPHS
SUPER MAGIC CORONATIONS OF GRAPHS SUPER MAGIC CORONATIONS OF GRAPHS
SUPER MAGIC CORONATIONS OF GRAPHS
 
10.1.1.226.4381
10.1.1.226.438110.1.1.226.4381
10.1.1.226.4381
 
Mathematicalfoundationofcomputerscience
MathematicalfoundationofcomputerscienceMathematicalfoundationofcomputerscience
Mathematicalfoundationofcomputerscience
 
Important Cuts
Important CutsImportant Cuts
Important Cuts
 
Basic galois field arithmatics required for error control codes
Basic galois field arithmatics required for error control codesBasic galois field arithmatics required for error control codes
Basic galois field arithmatics required for error control codes
 
Cs6702 GCC
Cs6702 GCCCs6702 GCC
Cs6702 GCC
 
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRYON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
ON ALGORITHMIC PROBLEMS CONCERNING GRAPHS OF HIGHER DEGREE OF SYMMETRY
 
Darmon Points for fields of mixed signature
Darmon Points for fields of mixed signatureDarmon Points for fields of mixed signature
Darmon Points for fields of mixed signature
 
Question bank
Question bankQuestion bank
Question bank
 
A common fixed point of integral type contraction in generalized metric spacess
A  common fixed point of integral type contraction in generalized metric spacessA  common fixed point of integral type contraction in generalized metric spacess
A common fixed point of integral type contraction in generalized metric spacess
 
A Short Study of Galois Field
A Short Study of Galois FieldA Short Study of Galois Field
A Short Study of Galois Field
 

Andere mochten auch (15)

apple news app
apple news appapple news app
apple news app
 
Lina Cantero
Lina CanteroLina Cantero
Lina Cantero
 
2 e
2 e2 e
2 e
 
Templete
TempleteTemplete
Templete
 
Power alusivo a blog
Power alusivo a blogPower alusivo a blog
Power alusivo a blog
 
Computacion basica
Computacion basicaComputacion basica
Computacion basica
 
2063 p1-in v-teknik-komputer_jaringan
2063 p1-in v-teknik-komputer_jaringan2063 p1-in v-teknik-komputer_jaringan
2063 p1-in v-teknik-komputer_jaringan
 
Ejemplo de Formulacion y Evalucion de Proyecto Factible
Ejemplo de Formulacion y Evalucion de Proyecto FactibleEjemplo de Formulacion y Evalucion de Proyecto Factible
Ejemplo de Formulacion y Evalucion de Proyecto Factible
 
12e5b6eaf8faf933f93b68e1c17aa1c4
12e5b6eaf8faf933f93b68e1c17aa1c412e5b6eaf8faf933f93b68e1c17aa1c4
12e5b6eaf8faf933f93b68e1c17aa1c4
 
La playuki
La playukiLa playuki
La playuki
 
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGM
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGME-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGM
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGM
 
Ns30 laeg
Ns30 laegNs30 laeg
Ns30 laeg
 
Socialización (básico)
Socialización (básico)Socialización (básico)
Socialización (básico)
 
BOSS Hoop It Up
BOSS Hoop It UpBOSS Hoop It Up
BOSS Hoop It Up
 
Entre rios listado de partidos
Entre rios listado de partidosEntre rios listado de partidos
Entre rios listado de partidos
 

Ähnlich wie THE RESULT FOR THE GRUNDY NUMBER ON P4- CLASSES

On the Equality of the Grundy Numbers of a Graph
On the Equality of the Grundy Numbers of a GraphOn the Equality of the Grundy Numbers of a Graph
On the Equality of the Grundy Numbers of a Graphjosephjonse
 
Graph theory and life
Graph theory and lifeGraph theory and life
Graph theory and lifeMilan Joshi
 
Ce31342345
Ce31342345Ce31342345
Ce31342345IJMER
 
New Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-AalNew Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-AalGiselleginaGloria
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
On algorithmic problems concerning graphs of higher degree of symmetry
On algorithmic problems concerning graphs of higher degree of symmetryOn algorithmic problems concerning graphs of higher degree of symmetry
On algorithmic problems concerning graphs of higher degree of symmetrygraphhoc
 
FURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHSFURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHSFransiskeran
 
New Classes of Odd Graceful Graphs
New Classes of Odd Graceful GraphsNew Classes of Odd Graceful Graphs
New Classes of Odd Graceful Graphsgraphhoc
 
Strong (Weak) Triple Connected Domination Number of a Fuzzy Graph
Strong (Weak) Triple Connected Domination Number of a Fuzzy GraphStrong (Weak) Triple Connected Domination Number of a Fuzzy Graph
Strong (Weak) Triple Connected Domination Number of a Fuzzy Graphijceronline
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
ICAMS033-G.NITHYA.pptx
ICAMS033-G.NITHYA.pptxICAMS033-G.NITHYA.pptx
ICAMS033-G.NITHYA.pptxmathematicssac
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
4. [22 25]characterization of connected vertex magic total labeling graphs in...
4. [22 25]characterization of connected vertex magic total labeling graphs in...4. [22 25]characterization of connected vertex magic total labeling graphs in...
4. [22 25]characterization of connected vertex magic total labeling graphs in...Alexander Decker
 
11.characterization of connected vertex magic total labeling graphs in topolo...
11.characterization of connected vertex magic total labeling graphs in topolo...11.characterization of connected vertex magic total labeling graphs in topolo...
11.characterization of connected vertex magic total labeling graphs in topolo...Alexander Decker
 
4. [22 25]characterization of connected vertex magic total labeling graphs in...
4. [22 25]characterization of connected vertex magic total labeling graphs in...4. [22 25]characterization of connected vertex magic total labeling graphs in...
4. [22 25]characterization of connected vertex magic total labeling graphs in...Alexander Decker
 

Ähnlich wie THE RESULT FOR THE GRUNDY NUMBER ON P4- CLASSES (20)

On the Equality of the Grundy Numbers of a Graph
On the Equality of the Grundy Numbers of a GraphOn the Equality of the Grundy Numbers of a Graph
On the Equality of the Grundy Numbers of a Graph
 
Graph theory and life
Graph theory and lifeGraph theory and life
Graph theory and life
 
Ce31342345
Ce31342345Ce31342345
Ce31342345
 
Am03102420247
Am03102420247Am03102420247
Am03102420247
 
New Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-AalNew Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-Aal
 
X4102188192
X4102188192X4102188192
X4102188192
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
On algorithmic problems concerning graphs of higher degree of symmetry
On algorithmic problems concerning graphs of higher degree of symmetryOn algorithmic problems concerning graphs of higher degree of symmetry
On algorithmic problems concerning graphs of higher degree of symmetry
 
Ar25260265
Ar25260265Ar25260265
Ar25260265
 
FURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHSFURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHS
 
New Classes of Odd Graceful Graphs
New Classes of Odd Graceful GraphsNew Classes of Odd Graceful Graphs
New Classes of Odd Graceful Graphs
 
Strong (Weak) Triple Connected Domination Number of a Fuzzy Graph
Strong (Weak) Triple Connected Domination Number of a Fuzzy GraphStrong (Weak) Triple Connected Domination Number of a Fuzzy Graph
Strong (Weak) Triple Connected Domination Number of a Fuzzy Graph
 
graph theory
graph theorygraph theory
graph theory
 
Aj26225229
Aj26225229Aj26225229
Aj26225229
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
ICAMS033-G.NITHYA.pptx
ICAMS033-G.NITHYA.pptxICAMS033-G.NITHYA.pptx
ICAMS033-G.NITHYA.pptx
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
4. [22 25]characterization of connected vertex magic total labeling graphs in...
4. [22 25]characterization of connected vertex magic total labeling graphs in...4. [22 25]characterization of connected vertex magic total labeling graphs in...
4. [22 25]characterization of connected vertex magic total labeling graphs in...
 
11.characterization of connected vertex magic total labeling graphs in topolo...
11.characterization of connected vertex magic total labeling graphs in topolo...11.characterization of connected vertex magic total labeling graphs in topolo...
11.characterization of connected vertex magic total labeling graphs in topolo...
 
4. [22 25]characterization of connected vertex magic total labeling graphs in...
4. [22 25]characterization of connected vertex magic total labeling graphs in...4. [22 25]characterization of connected vertex magic total labeling graphs in...
4. [22 25]characterization of connected vertex magic total labeling graphs in...
 

Mehr von graphhoc

ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...graphhoc
 
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...graphhoc
 
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSDISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSgraphhoc
 
Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet  Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet graphhoc
 
A Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control ManetA Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control Manetgraphhoc
 
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices graphhoc
 
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 A Review of the Energy Efficient and Secure Multicast Routing Protocols for ... A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...graphhoc
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text graphhoc
 
Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective  Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective graphhoc
 
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...graphhoc
 
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidanceFault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidancegraphhoc
 
Enhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksEnhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksgraphhoc
 
Simulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networksSimulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networksgraphhoc
 
Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...graphhoc
 
Simulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real lifeSimulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real lifegraphhoc
 
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...graphhoc
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...graphhoc
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...graphhoc
 
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles  An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles graphhoc
 
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATIONACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATIONgraphhoc
 

Mehr von graphhoc (20)

ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
 
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
 
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSDISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
 
Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet  Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet
 
A Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control ManetA Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control Manet
 
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
 
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 A Review of the Energy Efficient and Secure Multicast Routing Protocols for ... A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text
 
Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective  Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective
 
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
 
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidanceFault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
 
Enhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksEnhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networks
 
Simulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networksSimulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networks
 
Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...
 
Simulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real lifeSimulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real life
 
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
 
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles  An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
 
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATIONACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
 

Kürzlich hochgeladen

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 

Kürzlich hochgeladen (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 

THE RESULT FOR THE GRUNDY NUMBER ON P4- CLASSES

  • 1. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.4, December 2013 THE RESULT FOR THE GRUNDY NUMBER ON P4CLASSES Ali Mansouri1 and Mohamed Salim bouhlel 2 1 Department of Electronic Technologies of Information and Telecommunications Sfax, Tunisia 2 Department of Electronic Technologies of Information and Telecommunications Sfax, Tunisia ABSTRACT Our work becomes integrated into the general problem of the stability of the network ad hoc. Some, works attacked (affected) this problem. Among these works, we find the modelling of the network ad hoc in the form of a graph. We can resume the problem of coherence of the network ad hoc of a problem of allocation of frequency We study a new class of graphs, the fat-extended P4 graphs, and we give a polynomial time algorithm to calculate the Grundy number of the graphs in this class. This result implies that the Grundy number can be found in polynomial time for many graphs KEYWORDS Graph Theory, Grundy number, P4-classes, Total graph, Graph coloring, Wireless Network, Mobile Network, 1. INTRODUCTION We denoted a graph G by G = (V, E) and an order θ = v1, . . . , vn over V, for coloring the vertices of G, we used the polynomial algorithm, we affected to vi the minimum positive integer that was not affected to its neighborhood in the set {v1, . . . , v i−1}[10]. The execution of this algorithm for a graph give a coloring that we can gives name as a greedy coloring. The greedy coloring of a graph G is characterized by the maximum number of colors of, over all the orders θ of V (G) is the Grundy number of G; we represented by Γ (G) the grundy number of graph. [10]. the Grundy number is considered NP-complete [9]. We can show a graph G and an integer r it is a coNP-complete problem to decide if the grundy number of G respect the following condition Γ (G) ≤ χ + r [9] or if Γ (G) ≤ r × χ (G) or if Γ (G) ≤ c × ω (G) [2]. In the next section, we study the polynomial time algorithms to determinate the Grundy number of many classes of graphs like the cographs [4], the trees [5] and the k-partial trees [8]. DOI:10.5121/jgraphoc.2013.5402 19
  • 2. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.4, December 2013 2. RELATED WORKS This parameter was introduced by Christen and Selkow [11] in 1979. They proved that determining the Grundy number is NP-complete for general graphs (also studied by McRae in 1994 [AMC94]). In [SST84], Hedetniemi et al. gave a linear algorithm for the Grundy number of a tree and established a relation between the chromatic number, the Grundy number and the achromatic number: Ҳ (G) ≤Γ (G) ≤ Ψ (G), where the achromatic number Ψ (G) is the maximum number of colors used for a proper coloring of G such that each pair of colors appears on at least one edge of G. In 1997, Telle and Proskurowski [12] gave an algorithm for the Grundy number of partial k-trees in O (n3k2) and bounded this parameter for these graphs by the value 1 + k log2 n, where n is the graph order. In 2000, Dunbar et al. used the Grundy number to bound new parameters that they introduced in [13], the chromatic and the achromatic numbers of a fall coloring. Recently, Germain and Kheddouci studied in [14], the Grundy coloring of power graphs. They gave bounds for the Grundy number of the power graphs of a path, a cycle, a caterpillar and a complete binary tree. Such colorings are also explored for other graphs like chessboard graphs [15]. Hedetniemi et al. (1982 determinate an algorithm witch can gives a solution for this problem on trees; and an algorithm on partial k-trees gives by Telle and Proskurowski (1997). The problem was shown to be NP-complete on directed graphs Christen and Selkow (1979). 3. FAT EXTENDED P4-LADEN GRAPHS In this section, we give some definitions. In first time, we denote G by G = (V, E) is a graph and S is a subset of V (G) [10].The subgraph of G is represented by G[S]. The module of a graph G is denoted or represented by M [10]. The sets V and {x}, for every x ∈ V, are trivial modules, the last one being called as a singleton module. We called graph prime if this graph have all of modules are trivial. M is considered like a strong module of G if this condition is approved “|for every module M′ of G, either M′∩M = ∅ or M ⊂ M or M′⊂ M” [10]. We denoted by r an internal node of T(G), we denoted by M(r) the set of leaves of the sub tree of T(G) , also we denoted by V (r) = {r1, . . . , rk} the children of r in T(G). After that, If G [M(r)] is not connected, then we called r a parallel node and the graph G [M (r1)],. . . ,G M (rk)] are define like its components. Now , If the graph G¯ [M(r)] is not connected , so we called r a set of set node , G¯ [M (r1)],. . . ,G¯ [M(rk)] define the components of graph. Finally, r is define like a neighbourhood node and M (r1), . . . , M(rk) is called the unique set of maximal submodules of M(r) , if the graphs G [M(r)] is connected at G¯ [M(r)]. we denoted, by quotient graph of r, the G(r), is G [v1, . . . , vk], where vi ∈ M(ri), for 1 ≤ i ≤ k. r is called a fat node, with simple condition if M(r) is not a singleton module. We called spider graph, a graph have vertex set can be devised into three sets S, K and R We denoted a stable set by S, K represents a clique, the set of vertices of R are adjacent to all the vertices of K and is not adjacent of the vertices of S 20
  • 3. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.4, December 2013 A graph is called a graph split if it is {C5, C4, C¯ 4}-free. [10] A pseudo-split graph is defined as a {C4, C¯ 4}-free graph. Also, a split graph G = (S∪K, E), its vertex set can be devised into three disjoint sets S (G), K (G) and R (G) There is condition must be respected “S(G) ⊆ S and every vertex s ∈ S(G) is not adjacent to at least one vertex in K, K(G) is the neighborhood of the vertices in S(G) and R(G) = V (G)S(G) ∪ K(G). [10] Giakoumakis [3] defined a graph G as extended P4-laden graphs if, for all H ⊆ G such that |V (H)| ≤ 6, then the following statement is true: if H contains more than two induced P4’s, then H is a pseudo-split graph. We can define an extended P4-laden graph by its modular partition tree Theorem 1 [3] we denote a graph G by G = (V, E), we denote by T (G) the modular partition tree and by r the any neighborhood node of T (G), Then G is extended P4-laden if and only if G(r) is isomorphic to: (i) a P5 or a P¯ 5 or a C5, and each M(ri) is a singleton module; or (ii) a spider H = (S∪K ∪R, E) and each M(ri) is a singleton module, except the one corresponding to R and eventually another one which may have exactly two vertices; or (iii) a split graph H, whose modules corresponding to the vertices of S(H) are independent sets and the ones corresponding to the vertices of K(H) are cliques. We say that a graph is fat-extended P4-laden if its modular decomposition satisfies the Theorem 1, except in the first case, where G(r) is isomorphic to a P5 or a P¯ 5 or a C5, but the maximal strong modules M(ri), 1 ≤ i ≤ 5, of M(r) are not necessarily singleton modules. 4. GRUNDY NUMBER ON FAT EXTENDED P4-LADEN GRAPHS From now, let G = (V, E) be a fat-extended P4-laden graph and T (G) its modular decomposition tree. The modular partition tree T (G) can be determinate in polynomial time [7], we give an algorithm to determinate Γ (G). We know that the Grundy number of the leaves of T (G) is equal to one and we show in this section how to determine the Grundy number of G[M(v)], for every inner node v of T(G), based on the Grundy number of its children. First, observe that for every series node (resp. parallel node) v of T (G), the Grundy number of G[M(v)] is equal to the sum of the Grundy number of its children (resp. the maximum Grundy number of its children) [4]. Thus, we only need to prove that the Grundy number of G [M (v)] can be found in polynomial time when v is a neighborhood node of T (G). The following result is a simple generalization of a result due to Asté etal. [2] for the Grundy number of lexicographic product of graphs: Proposition 2: Let G, H1, . . . , Hn be disjoint graphs such that n = |V (G)| and let V (G) = {v1, . . . , vn}. If G′is the graph obtained by replacing vi ∈ V (G) by Hi , then for every greedy coloring of G′at most Γ(Hi) colors contain vertices of the induced subgraph G′[Hi] ⊆ G′, for all i ∈ {1, . . . , n}. Lemma 3: Let v be a neighborhood node of T(G) isomorphic to a P5 or aC5 or a C¯ 5, v1, . . . , v5 be the children of v and Γi be the Grundy number of G[M(vi)], 1 ≤ i ≤ 5. Then Γ (G [M (v)]) can be found in constant time. 21
  • 4. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.4, December 2013 Proof: (Sketch) Without loss of generality, suppose that v1, . . . , v5 label the children of v as depicted in Figure 1 and Hi = Γ(G[M(vi)]). In order to simplify the notation, denote by θi an ordering over M (vi) that induces a greedy coloring with Γ i colors, 1 ≤ i ≤ 5. We calculate Γ (G [M (v)]) by verifying all the possible configurations for a greedy Γ (G [M (v)])-coloring and by returning the greater value found between all the cases. Suppose that G (v) is isomorphic to a P5. Let S = {S1, . . . , Sk} be a greedy Γ(G[M(v)])-coloring of G[M(v)]. We claim that if there exists a vertex u ∈ V (H1) colored by Sk, then Γ (G [M (v)]) = Γ1 + Γ2. This fact holds because combining the observation that u has at least one vertex colored by S i , for all i ∈ {1, . . . , k −1}, with the proposition 2, we conclude that Γ(G[M(v)]) ≤ Γ1 + Γ2. On the other hand, if we consider any ordering θ over G [M (v)] that has starts with θ 1 and θ2, we see that the first-fit algorithm over this order will produce a greedy coloring with at least Γ1 + Γ2 colors. Using the symmetry, we can also prove that if u ∈ V (H5), then Γ (G [M (v)]) = Γ4 + Γ5. All the other cases use similar arguments, that is, by finding an upper bound based on the position of a vertex colored Sk and a lower bound based in an ordering over M (v). The cases where G (v) is isomorphic to C5 or P¯ 5 are also proved by using similar arguments [10]. Lemma 4 :Let v be a neighborhood node of T (G) isomorphic to a spider H = (S ∪ K ∪ R, E), fr be its child corresponding to R, f2 be its child corresponding to the module which has eventually two vertices and Γ(R) be the Grundy number of G[M(fr)]. Then Γ (G [M (v)]) can be found in linear time. Figure 1: Fat neighborhood nodes. Proof: If M (f2) is singleton module, then G [M (v)] is a spider. In this case, we cannot have two colors Si and Sj , j > i, such that both contain only vertices of S. For otherwise, since S is a stable set, the vertices colored Sj would not any neighbor colored Si, a contradiction. Thus, Γ (G [M (v)] ) ≤ 1 + |K| + Γ (R). If R = θ , then an ordering over M (v) such that all the vertices of S come before the vertices of K induces a greedy coloring with Γ (G[M(v)]) = 1 + |K| colors. If R 6= θ, we will prove that Γ (G [M (v)] ) ≤ |K| + Γ (R). Observe first that there is at least one color Si occurring in R. Consequently, Si does not occur in K. Thus, there is no order over M(v) whose greedy coloring returns a color Sj containing only vertices of S, because a vertex of S colored Sj would not be adjacent to a vertex colored Si. On the other hand, if θ R is an ordering that induces a greedy Γ (R)-coloring of R, then any ordering over M(v) starting by θ R induces a greedy coloring with at least |K| + Γ (R) colors. The case where M (f2) is not a singleton module is proved using similar arguments. [10] If G (v) is a split graph H and the factors corresponding to vertices of S (H) are independent sets and the ones corresponding to vertices of K (H) are cliques, then we can use the same arguments of Lemma 3.3 observing that S, K and R correspond to S (H), K (H) and R (H), respectively . 22
  • 5. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.4, December 2013 Theorem 5: If G = (V, E) is a fat-extended P4-laden graph and |V | = n, then Γ (G) can be found in O (n3). Proof: The algorithm calculates Γ (G) by traversing the modular decomposition tree of G in a postorder way and determining the Grundy of each inner node of T (G) based on the Grundy number of the leaves. The modular decomposition tree can be found in linear time, the postorder traversal can be done in O (n2) and the Grundy number of each inner node can be found in linear time, because of Lemmas 3and 4 and the results of Gyarf´as and J.Lehel [4] for cographs. Corollary 6: Let G be a graph that belongs to one of the following classes: P4-reducible, extended P4-reducible, P4-sparse, extended P4-sparse, P4-extendible, P4-lite, P4tidy, P4-laden and extended P4-laden. Then, Γ (G) can be found in polynomial time. Proof: According to definition of these classes [6], they are all strictly contained in the fatextended P4-laden graphs and so the corollary follows. 5. CONCLUSIONS In the conclusion, we determinate, in first time, a new class of graphs, this class is called the fatextended P4-laden graphs, in second time; we calculate the Grundy number of the graphs in this class by using a polynomial time algorithm. Finally, we can say that the Grundy number can be calculated of each node in linear time, so, the total Grundy number of graph can be determinate in polynomial time. ACKNOWLEDGEMENTS I think Mr. Julio Cesar Silva Araujo for his collaboration. REFERENCES [1] J. C. Araujo., “Coloring graphs”,(2009). Master in Science Dissertation, in: ww.lia.ufc.br/˜juliocesar/dissertacao.pdf (in Portuguese)”. [2] M., F. Havet & C. Linhares Sales, (2008) “Grundy number and lexicographic product of graphs” in: International Conference on Relations, Orders and Graphs and their Interaction with Computer Science [3] V. Giakoumakis., (1996) “p4-laden graphs: A new class of brittle graphs”, Information Processing Letters 60 pp, 29–36. [4] A, Gyarf´as. & J. Lehel, (1988) “On-line and first fit colorings of graphs”, Journal of Graph Theory pp. 217–227. [5] T. Beyer S. M. & S. T. Hedetniemi, (1982) “A linear algorithm for the grundy number of a tree”, Congressus Numerantium 36, pp. 351–363. [6] Pedrotti, V, (2007) “Decomposi¸c˜ao modular de grafos n˜ao-orientados,” Master’s thesis, Universidade Estadual de Campinas [7] Tedder, M., D. Corneil, & C. Paul, (2007).” Simple, linear-time modular decomposition”. [8] J, Telle A. & A. Proskurowski, (1997) “Algorithms for vertex partitioning problems on partial ktrees”, SIAM Journal on Discrete Mathematics 10 pp. 529–550. [9] M, Zaker, (2005) “Grundy number of the complement of bipartite graphs” Journal of Combinatorics 31 pp. 325––330. [10] J. C. Silva Ara´ujo, C. L. Sales, (2009) “Grundy number on P4-classes”, Electronic Notes in Discrete Mathematics, Volume 35, 1, Pages 21–27. [11] M. Selkow C. & A. Christen (1979) “ Some perfect coloring properties of graphs”, Journal of Combinatorial Theory B27 ,49-59. 23
  • 6. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.4, December 2013 [12] A. Proskurowski, & J.A. Telle, (1997), “Algorithms for vertex partitioning problems on partial ktrees”, SIAM Journal on Discrete Mathematics 10(4), 529-550. [13] S.M. Hedetniemi, J.E. Dunbar, D.P. Jacobs & J. Knisely, (2000), “Colorings of Graphs”, Journal of Combinatorial Mathematics and Combinatorial Computing 33 ,257-273. [14] C. Germain and H. Kheddouci, “Grundy coloring for power caterpillars”, (2000), Proceedings of International Optimization Conference INOC 2003, 243-247, Evry/Paris France. [15] J. Rhyne&C. Parks (2002) “Grundy Coloring for Chessboard Graphs”, Seventh North Carolina MiniConference on Graph Theory, 24