SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 06 Issue: 01 June 2017 Page No.27-30
ISSN: 2278-2397
27
A Study on Graceful and ∅-Graceful Labeling of Some
Graphs
M. Radhika1
, V. S. Selvi2
Research Scholar1
, Professor2
1,2
Department of Mathematics, Theivanai Ammal College for Women (Autonomous) Villupuram, India.
Email: radhikamathi19@yahoo.com, vsselviravi@gmail.com
Abstract – In this paper, we prove that result on
graceful labeling of path and symmetrical trees are
graceful graphs. We also prove that result on ϕ-
graceful labeling of paths, flower graph, friendship
graph.
Keywords: Path, symmetrical trees, flower graph,
friendship graph
I. INTRODUCTION
Graph labeling is an active area of research in graph
theory. Graph labeling where the vertices are
assigned some value subject to certain condition.
Labeling of vertices and edges play a vital role in
graph theory. To begin with simple, finite,
connected and undirected graph G = (V(G), E(G))
with |V(G)| = p and |E(G)| = q. For standard
terminology and notation we follow Gallian [1],
Gross and Yellen [2]. The definitions and other
information which serve as prerequisites for the
present investigation.
II. DEFINITIONS
Definition 2.1: A function 𝑓 is called graceful
labeling of a graph G if 𝑓: V(G) → {0, 1, . . . , q} is
injective and the induced function
𝑓∗
: E(G) → {0, 1, . . . , q} defined as
𝑓∗ (𝑒 = 𝑢𝑣) = |𝑓(𝑢) − 𝑓(𝑣)|
is bijective. The graph which admits graceful
labeling is called a graceful graph.
Definition 2.2: A rooted tree in which every level
contains vertices of the same degree is called
symmetrical trees. The following result is a
gracefully labeled symmetrical tree on 15 vertices.
Definition 2.3: A function 𝑓 is called a ∅-graceful
labeling of graph G,
if 𝑓: 𝑉(𝐺) → {0, 1, … , 𝑛 − 1} is injective and the
induced function 𝑓∗
∶ 𝐸(𝐺) → 𝑁 is defined as
𝑓∗(𝑒 = 𝑢𝑣) = 2 { 𝑓(𝑢) + 𝑓(𝑣)} , then edge labels
are distinct. The concept of graceful labeling is an
active area of research in graph theory which has
rigorous applications in coding theory,
communication networks, optimal circuits layouts
and graph decomposition problems. For a dynamic
survey of various graph labeling problems along
with an extensive bibliography we refer to Gallian
[1].
The following three types of problems are
considered generally in the area of graph labeling.
1. How particular labeling is affected under
various graph operations;
2. Investigation of new families of graphs which
admit particular graph labeling;
3. Given a graph theoretic property and
characterizing the class/classes of graphs with
property that admits particular graph labeling.
It is clear that the problems of second type are
largely studied than the problems of first and third
types. The present work is aimed to discuss some
problems of the first kind in the context of graceful
and ∅-graceful labeling.
Definition 2.4: Let G be a graph with order ‘𝑛’ and
size 𝑛 − 1, such that exactly one node is adjacent to
every other 𝑛 − 1 nodes, this is also known as
flower graph. The resulting graph is flower graph
with 𝑛 − 1 petal.
Definition 2.5: A friendship graph 𝐹
𝑛 is a graph
which consists of 𝑛 triangles with common vertices.
III. RESULTS ON GRACEFUL
LABELING
Theorem 3.1: Every path (Pn) graph is graceful
graphs.
Proof: Let G be a path graph.
Label the first vertex 0, and label every other vertex
increasing by 1 each time.
Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 06 Issue: 01 June 2017 Page No.27-30
ISSN: 2278-2397
28
Label the second vertex q and label every other
vertex decreasing by 1 each time.
There are q + 1 vertices,
so the first set will label it’s vertices with numbers
from the set {0, 1, … , q 2
⁄ } if 𝑞 is even and from the
set {0, 1, … , (q + 1) 2
⁄ } if q is odd.
The second set will label it’s vertices with numbers
from the set
{(q + 2) 2, … , q
⁄ } if 𝑞 is even and {(q + 3) 2, … , q
⁄ }
if 𝑞 is odd.
Thus, the vertices are labeled legally.
With the vertices labeled in this manner, the edges
attain the values
q, q − 1, q − 2, … ,1 in that order.
Thus, this is a graceful labeling, so G is graceful.
∴, All path Pn graphs are graceful.
Illustration:
Graceful labeling of the graph P4 is shown in fig.1.
Fig1: Graceful graph of 𝑃4
Theorem 3.2: All symmetrical trees are graceful.
Proof: We prove the theorem by induction method.
The number of layers that all symmetrical trees are
graceful, and there exists a graceful labeling which
assigns the number 1 to the root.
If ‘T ’ is a symmetrical tree with 0 layers,
Then, it consists of 0 edges and just one vertex.
And clearly, there is a graceful which assigns 1 to
the vertex.
Suppose, we have proved that for some
𝑙 > 0.
All symmetrical trees with ≤ 𝑙 − 1 layers are
graceful and each of them has a graceful which
assigns the number 1 to the root.
⇒ 𝑓(𝑣) = 1
This completes the induction.
∴, All symmetrical trees are graceful.
Illustration:
Gracefully labeled symmetrical tree on 15 vertices is
shown in fig.2.
Fig2: Graceful labeling of symmetrical tree on 15-
vertex.
IV. RESULTS ON ∅-GRACEFUL
LABELING
Theorem 4.1: Path (Pn) graphs are ∅-graceful
graphs.
Proof: Let Pn be a path with vertex set
v1, v2, v3, … , vn and e1, e2, e3, … , en−1 be the edges
of the path.
We define the vertex labeling
f ∶ V(G) → {0, 1, 2, … , n − 1}
f ( v1 ) = 0
f ( v2 ) = 1
:
:
f ( vn ) = n − 1 , vertex labeling can be done in both
directions.
The edge labeling function f∗
is defined as follows
f∗
∶ E(G) → N is defined by
f∗ ( u v ) = 2 { f ( u ) + f ( v ) }
f∗ ( v vn ) = 2 { f ( v ) + f ( vn ) }
:
:
= { 2, 6, 10, … , (4n − 6) } such that the edge labels
are distinct.
In view of above labeling pattern the paths are ∅-
graceful labeling.
Hence Pn is a ∅-greceful graph.
Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 06 Issue: 01 June 2017 Page No.27-30
ISSN: 2278-2397
29
Illustration:
∅-Graceful labeling of the graph 𝑃4 is shown in
fig.3.
Theorem 4.2: Flower graphs are ∅-graceful graphs.
Proof: Let G be a flower graph. Then G has n
vertices and (n-1) edges.
Therefore V = {v1, v2, … , vn} and
E = {e1, e2, … , en}
We define the vertex labeling
f : V(G) → {0, 1, 2, …, n-1}
f ( v1 ) = 0
f ( v2 ) = 1
:
:
f ( vn ) = n − 1 such that labeling of the vertices
may be clockwise or anticlockwise.
The edge labeling function f∗
is defined as follows
f∗
∶ E(G) → N is defined by
f∗( u v ) = 2 { f (u) + f (v) }
f∗ ( v1vn ) = 2 { f (v1) + f (vn) }
:
:
= {2, 4, 6, 8, … , 2n} then the edge labels are distinct
and it’s in increasing order.
Hence all flower graphs are ∅-graceful graph.
Fig3: ∅ - Graceful graph of P4.
Illustration:
Flower graph with 8 petals in fig.4.
Theorem 4.3: A Friendship graph F2 is a ∅-
graceful graph.
Proof: Let G = Fn be the Friendship Graph.
Let v1, v2, v3, … , vn be the vertices of Fn and edges
are 𝑒1, 𝑒2, 𝑒3, … , 𝑒𝑚.
We define the vertex labeling
f ∶ V(G) → { 0, 1, 2, … , n − 1 }
f ( v1 ) = 0
f ( v2 ) = 1
:
:
f ( vn ) = n − 1
The edge labeling function f∗
is defined as follows
f∗
∶ E(G) → N is defined by
f∗ ( uv ) = 2 { f (u) + f (v) }
f∗ ( v1v2 ) = 2 { f(v1) + f(v2) } = 2 ;
:
:
= {2, 4, 6, 10, 14, 12 } then the edge labels are
distinct.
In view of the above labeling pattern the 𝐹2 is a ∅-
graceful labeling. Hence F2 is a ∅-graceful graph.
Fig4: ∅ - Graceful graph of flower graph.
Illustration:
∅ - Graceful labeling of the graph F2 is shown in
fig.5.
Fig5: ∅ - Graceful graph of 𝐹2 graph.
Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 06 Issue: 01 June 2017 Page No.27-30
ISSN: 2278-2397
30
V. CONCLUSION
In this paper we have shown that every path graphs
are Graceful and ∅ - Graceful graph, Friendship
graph is a ∅ - Graceful graph, every flower graph is
a ∅ - Graceful graph. Are investigated it can also
verified for some graphs.
Acknowledgment
We would like to give the grateful thanks to Dr.
Seenuvasan and Dr. Rishivarman who gives for their
valuable suggestions and improvements to the paper
of research project and work. Moreover, we want to
thank Parent’s, Friends, ICMA17 – GT165 and
IJCTA for their encouragement and support.
References
[1] A Gillian. “A dynamic Survey of graph
labeling”, the Electronics Journal of
Combinatories Dec 20,(2013).
[2] J. Gross and J. Yellen, “Graph theory and its
applications”, CRC Press,(1999).
[3] Frank Harray, “Graph Theory”, Narosa
Publishing House .
[4] Gray Chatrand, Ping Zhang, “Introduction to
graph theory”, McGraw –Hill international
Edition.
[5] Murugesan N, Uma.R , “Graceful labeling of
some graphs and their sub graphs” Asian
Journal of Current Engineering and Maths 6
Nov-Dec. (2012).
[6] V. J. Kaneria, S. K. Vaidya, G. V.Ghodasara and
S. Srivastav, “Some classes of disconnected
graceful graphs”, Proceedings of the First
International Conference on Emerging
Technologies and
[7] Applications in Engineering, Technology and
Sciences, (2008), pp 1050 –1056.
[8] S. K. Vaidya and Lekha Bijukumar, “Some new
graceful graphs”, International Journal of
Mathematics and Soft Computing,1(1)(2011), pp
37-45.
[9] K. Kathiresan, “Two classes of Graceful
graphs”, Ars. Combin.55 (2000), pp 129-132.
[10] Jacob Yunker, “Graceful Labeling Necklace
Graphs”, (2012) .
[11] M. M. A. A. Md Forhad Hossain and M.
Kaykobad, “New classes of graceful trees”.
Journal of Discrete mathematics, (2014).

Weitere ähnliche Inhalte

Ähnlich wie A Study on Graceful and ∅-Graceful Labeling of Some Graphs

E-Cordial Labeling of Some Mirror Graphs
E-Cordial Labeling of Some Mirror GraphsE-Cordial Labeling of Some Mirror Graphs
E-Cordial Labeling of Some Mirror GraphsWaqas Tariq
 
SUPER MAGIC CORONATIONS OF GRAPHS
SUPER MAGIC CORONATIONS OF GRAPHS SUPER MAGIC CORONATIONS OF GRAPHS
SUPER MAGIC CORONATIONS OF GRAPHS IAEME Publication
 
FURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHSFURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHSFransiskeran
 
FURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHSFURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHSgraphhoc
 
New Families of Odd Harmonious Graphs
New Families of Odd Harmonious GraphsNew Families of Odd Harmonious Graphs
New Families of Odd Harmonious GraphsIJMIT JOURNAL
 
Metric dimesion of circulsnt graphs
Metric dimesion of circulsnt graphsMetric dimesion of circulsnt graphs
Metric dimesion of circulsnt graphsAmna Abunamous
 
New Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-AalNew Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-AalGiselleginaGloria
 
Graph ASS DBATU.pptx
Graph ASS DBATU.pptxGraph ASS DBATU.pptx
Graph ASS DBATU.pptxARVIND SARDAR
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Matrix Product (Modulo-2) Of Cycle Graphs
Matrix Product (Modulo-2) Of Cycle GraphsMatrix Product (Modulo-2) Of Cycle Graphs
Matrix Product (Modulo-2) Of Cycle Graphsinventionjournals
 
Graph theory and its applications
Graph theory and its applicationsGraph theory and its applications
Graph theory and its applicationsManikanta satyala
 
Lecture 5b graphs and hashing
Lecture 5b graphs and hashingLecture 5b graphs and hashing
Lecture 5b graphs and hashingVictor Palmar
 

Ähnlich wie A Study on Graceful and ∅-Graceful Labeling of Some Graphs (20)

E-Cordial Labeling of Some Mirror Graphs
E-Cordial Labeling of Some Mirror GraphsE-Cordial Labeling of Some Mirror Graphs
E-Cordial Labeling of Some Mirror Graphs
 
SUPER MAGIC CORONATIONS OF GRAPHS
SUPER MAGIC CORONATIONS OF GRAPHS SUPER MAGIC CORONATIONS OF GRAPHS
SUPER MAGIC CORONATIONS OF GRAPHS
 
Graph Theory
Graph TheoryGraph Theory
Graph Theory
 
FURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHSFURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHS
 
FURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHSFURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHS
 
New Families of Odd Harmonious Graphs
New Families of Odd Harmonious GraphsNew Families of Odd Harmonious Graphs
New Families of Odd Harmonious Graphs
 
Graphs.pdf
Graphs.pdfGraphs.pdf
Graphs.pdf
 
Metric dimesion of circulsnt graphs
Metric dimesion of circulsnt graphsMetric dimesion of circulsnt graphs
Metric dimesion of circulsnt graphs
 
Am03102420247
Am03102420247Am03102420247
Am03102420247
 
graph ASS (1).ppt
graph ASS (1).pptgraph ASS (1).ppt
graph ASS (1).ppt
 
New Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-AalNew Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-Aal
 
Graph
GraphGraph
Graph
 
Graph ASS DBATU.pptx
Graph ASS DBATU.pptxGraph ASS DBATU.pptx
Graph ASS DBATU.pptx
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Stochastic Processes Homework Help
Stochastic Processes Homework Help Stochastic Processes Homework Help
Stochastic Processes Homework Help
 
Matrix Product (Modulo-2) Of Cycle Graphs
Matrix Product (Modulo-2) Of Cycle GraphsMatrix Product (Modulo-2) Of Cycle Graphs
Matrix Product (Modulo-2) Of Cycle Graphs
 
09_DS_MCA_Graphs.pdf
09_DS_MCA_Graphs.pdf09_DS_MCA_Graphs.pdf
09_DS_MCA_Graphs.pdf
 
Network Theory
Network TheoryNetwork Theory
Network Theory
 
Graph theory and its applications
Graph theory and its applicationsGraph theory and its applications
Graph theory and its applications
 
Lecture 5b graphs and hashing
Lecture 5b graphs and hashingLecture 5b graphs and hashing
Lecture 5b graphs and hashing
 

Mehr von MangaiK4

Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...MangaiK4
 
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...MangaiK4
 
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationHigh Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationMangaiK4
 
Relation Extraction using Hybrid Approach and an Ensemble Algorithm
Relation Extraction using Hybrid Approach and an Ensemble AlgorithmRelation Extraction using Hybrid Approach and an Ensemble Algorithm
Relation Extraction using Hybrid Approach and an Ensemble AlgorithmMangaiK4
 
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy LogicSaturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy LogicMangaiK4
 
Image Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmImage Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmMangaiK4
 
A Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for EducationA Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for EducationMangaiK4
 
Smart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingSmart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingMangaiK4
 
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachBugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachMangaiK4
 
Motion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMotion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMangaiK4
 
Encroachment in Data Processing using Big Data Technology
Encroachment in Data Processing using Big Data TechnologyEncroachment in Data Processing using Big Data Technology
Encroachment in Data Processing using Big Data TechnologyMangaiK4
 
Performance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing ImagesPerformance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing ImagesMangaiK4
 
A Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyA Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyMangaiK4
 
Modeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
Modeling Originators for Event Forecasting Multi-Task Learning in Mil AlgorithmModeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
Modeling Originators for Event Forecasting Multi-Task Learning in Mil AlgorithmMangaiK4
 
quasi-uniform theta graph
quasi-uniform theta graphquasi-uniform theta graph
quasi-uniform theta graphMangaiK4
 
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...MangaiK4
 
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...MangaiK4
 
Marine Object Recognition using Blob Analysis
Marine Object Recognition using Blob AnalysisMarine Object Recognition using Blob Analysis
Marine Object Recognition using Blob AnalysisMangaiK4
 
Implementation of High Speed OFDM Transceiver using FPGA
Implementation of High Speed OFDM Transceiver using FPGAImplementation of High Speed OFDM Transceiver using FPGA
Implementation of High Speed OFDM Transceiver using FPGAMangaiK4
 
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...MangaiK4
 

Mehr von MangaiK4 (20)

Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...
 
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...
 
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationHigh Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
High Speed Low-Power Viterbi Decoder Using Trellis Code Modulation
 
Relation Extraction using Hybrid Approach and an Ensemble Algorithm
Relation Extraction using Hybrid Approach and an Ensemble AlgorithmRelation Extraction using Hybrid Approach and an Ensemble Algorithm
Relation Extraction using Hybrid Approach and an Ensemble Algorithm
 
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy LogicSaturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy Logic
 
Image Based Password using RSA Algorithm
Image Based Password using RSA AlgorithmImage Based Password using RSA Algorithm
Image Based Password using RSA Algorithm
 
A Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for EducationA Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for Education
 
Smart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud ComputingSmart Security For Data Sharing In Cloud Computing
Smart Security For Data Sharing In Cloud Computing
 
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachBugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining Approach
 
Motion Object Detection Using BGS Technique
Motion Object Detection Using BGS TechniqueMotion Object Detection Using BGS Technique
Motion Object Detection Using BGS Technique
 
Encroachment in Data Processing using Big Data Technology
Encroachment in Data Processing using Big Data TechnologyEncroachment in Data Processing using Big Data Technology
Encroachment in Data Processing using Big Data Technology
 
Performance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing ImagesPerformance Evaluation of Hybrid Method for Securing and Compressing Images
Performance Evaluation of Hybrid Method for Securing and Compressing Images
 
A Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyA Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and Steganography
 
Modeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
Modeling Originators for Event Forecasting Multi-Task Learning in Mil AlgorithmModeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
Modeling Originators for Event Forecasting Multi-Task Learning in Mil Algorithm
 
quasi-uniform theta graph
quasi-uniform theta graphquasi-uniform theta graph
quasi-uniform theta graph
 
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...
 
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...
 
Marine Object Recognition using Blob Analysis
Marine Object Recognition using Blob AnalysisMarine Object Recognition using Blob Analysis
Marine Object Recognition using Blob Analysis
 
Implementation of High Speed OFDM Transceiver using FPGA
Implementation of High Speed OFDM Transceiver using FPGAImplementation of High Speed OFDM Transceiver using FPGA
Implementation of High Speed OFDM Transceiver using FPGA
 
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...
 

Kürzlich hochgeladen

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 

Kürzlich hochgeladen (20)

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 

A Study on Graceful and ∅-Graceful Labeling of Some Graphs

  • 1. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm Volume: 06 Issue: 01 June 2017 Page No.27-30 ISSN: 2278-2397 27 A Study on Graceful and ∅-Graceful Labeling of Some Graphs M. Radhika1 , V. S. Selvi2 Research Scholar1 , Professor2 1,2 Department of Mathematics, Theivanai Ammal College for Women (Autonomous) Villupuram, India. Email: radhikamathi19@yahoo.com, vsselviravi@gmail.com Abstract – In this paper, we prove that result on graceful labeling of path and symmetrical trees are graceful graphs. We also prove that result on ϕ- graceful labeling of paths, flower graph, friendship graph. Keywords: Path, symmetrical trees, flower graph, friendship graph I. INTRODUCTION Graph labeling is an active area of research in graph theory. Graph labeling where the vertices are assigned some value subject to certain condition. Labeling of vertices and edges play a vital role in graph theory. To begin with simple, finite, connected and undirected graph G = (V(G), E(G)) with |V(G)| = p and |E(G)| = q. For standard terminology and notation we follow Gallian [1], Gross and Yellen [2]. The definitions and other information which serve as prerequisites for the present investigation. II. DEFINITIONS Definition 2.1: A function 𝑓 is called graceful labeling of a graph G if 𝑓: V(G) → {0, 1, . . . , q} is injective and the induced function 𝑓∗ : E(G) → {0, 1, . . . , q} defined as 𝑓∗ (𝑒 = 𝑢𝑣) = |𝑓(𝑢) − 𝑓(𝑣)| is bijective. The graph which admits graceful labeling is called a graceful graph. Definition 2.2: A rooted tree in which every level contains vertices of the same degree is called symmetrical trees. The following result is a gracefully labeled symmetrical tree on 15 vertices. Definition 2.3: A function 𝑓 is called a ∅-graceful labeling of graph G, if 𝑓: 𝑉(𝐺) → {0, 1, … , 𝑛 − 1} is injective and the induced function 𝑓∗ ∶ 𝐸(𝐺) → 𝑁 is defined as 𝑓∗(𝑒 = 𝑢𝑣) = 2 { 𝑓(𝑢) + 𝑓(𝑣)} , then edge labels are distinct. The concept of graceful labeling is an active area of research in graph theory which has rigorous applications in coding theory, communication networks, optimal circuits layouts and graph decomposition problems. For a dynamic survey of various graph labeling problems along with an extensive bibliography we refer to Gallian [1]. The following three types of problems are considered generally in the area of graph labeling. 1. How particular labeling is affected under various graph operations; 2. Investigation of new families of graphs which admit particular graph labeling; 3. Given a graph theoretic property and characterizing the class/classes of graphs with property that admits particular graph labeling. It is clear that the problems of second type are largely studied than the problems of first and third types. The present work is aimed to discuss some problems of the first kind in the context of graceful and ∅-graceful labeling. Definition 2.4: Let G be a graph with order ‘𝑛’ and size 𝑛 − 1, such that exactly one node is adjacent to every other 𝑛 − 1 nodes, this is also known as flower graph. The resulting graph is flower graph with 𝑛 − 1 petal. Definition 2.5: A friendship graph 𝐹 𝑛 is a graph which consists of 𝑛 triangles with common vertices. III. RESULTS ON GRACEFUL LABELING Theorem 3.1: Every path (Pn) graph is graceful graphs. Proof: Let G be a path graph. Label the first vertex 0, and label every other vertex increasing by 1 each time.
  • 2. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm Volume: 06 Issue: 01 June 2017 Page No.27-30 ISSN: 2278-2397 28 Label the second vertex q and label every other vertex decreasing by 1 each time. There are q + 1 vertices, so the first set will label it’s vertices with numbers from the set {0, 1, … , q 2 ⁄ } if 𝑞 is even and from the set {0, 1, … , (q + 1) 2 ⁄ } if q is odd. The second set will label it’s vertices with numbers from the set {(q + 2) 2, … , q ⁄ } if 𝑞 is even and {(q + 3) 2, … , q ⁄ } if 𝑞 is odd. Thus, the vertices are labeled legally. With the vertices labeled in this manner, the edges attain the values q, q − 1, q − 2, … ,1 in that order. Thus, this is a graceful labeling, so G is graceful. ∴, All path Pn graphs are graceful. Illustration: Graceful labeling of the graph P4 is shown in fig.1. Fig1: Graceful graph of 𝑃4 Theorem 3.2: All symmetrical trees are graceful. Proof: We prove the theorem by induction method. The number of layers that all symmetrical trees are graceful, and there exists a graceful labeling which assigns the number 1 to the root. If ‘T ’ is a symmetrical tree with 0 layers, Then, it consists of 0 edges and just one vertex. And clearly, there is a graceful which assigns 1 to the vertex. Suppose, we have proved that for some 𝑙 > 0. All symmetrical trees with ≤ 𝑙 − 1 layers are graceful and each of them has a graceful which assigns the number 1 to the root. ⇒ 𝑓(𝑣) = 1 This completes the induction. ∴, All symmetrical trees are graceful. Illustration: Gracefully labeled symmetrical tree on 15 vertices is shown in fig.2. Fig2: Graceful labeling of symmetrical tree on 15- vertex. IV. RESULTS ON ∅-GRACEFUL LABELING Theorem 4.1: Path (Pn) graphs are ∅-graceful graphs. Proof: Let Pn be a path with vertex set v1, v2, v3, … , vn and e1, e2, e3, … , en−1 be the edges of the path. We define the vertex labeling f ∶ V(G) → {0, 1, 2, … , n − 1} f ( v1 ) = 0 f ( v2 ) = 1 : : f ( vn ) = n − 1 , vertex labeling can be done in both directions. The edge labeling function f∗ is defined as follows f∗ ∶ E(G) → N is defined by f∗ ( u v ) = 2 { f ( u ) + f ( v ) } f∗ ( v vn ) = 2 { f ( v ) + f ( vn ) } : : = { 2, 6, 10, … , (4n − 6) } such that the edge labels are distinct. In view of above labeling pattern the paths are ∅- graceful labeling. Hence Pn is a ∅-greceful graph.
  • 3. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm Volume: 06 Issue: 01 June 2017 Page No.27-30 ISSN: 2278-2397 29 Illustration: ∅-Graceful labeling of the graph 𝑃4 is shown in fig.3. Theorem 4.2: Flower graphs are ∅-graceful graphs. Proof: Let G be a flower graph. Then G has n vertices and (n-1) edges. Therefore V = {v1, v2, … , vn} and E = {e1, e2, … , en} We define the vertex labeling f : V(G) → {0, 1, 2, …, n-1} f ( v1 ) = 0 f ( v2 ) = 1 : : f ( vn ) = n − 1 such that labeling of the vertices may be clockwise or anticlockwise. The edge labeling function f∗ is defined as follows f∗ ∶ E(G) → N is defined by f∗( u v ) = 2 { f (u) + f (v) } f∗ ( v1vn ) = 2 { f (v1) + f (vn) } : : = {2, 4, 6, 8, … , 2n} then the edge labels are distinct and it’s in increasing order. Hence all flower graphs are ∅-graceful graph. Fig3: ∅ - Graceful graph of P4. Illustration: Flower graph with 8 petals in fig.4. Theorem 4.3: A Friendship graph F2 is a ∅- graceful graph. Proof: Let G = Fn be the Friendship Graph. Let v1, v2, v3, … , vn be the vertices of Fn and edges are 𝑒1, 𝑒2, 𝑒3, … , 𝑒𝑚. We define the vertex labeling f ∶ V(G) → { 0, 1, 2, … , n − 1 } f ( v1 ) = 0 f ( v2 ) = 1 : : f ( vn ) = n − 1 The edge labeling function f∗ is defined as follows f∗ ∶ E(G) → N is defined by f∗ ( uv ) = 2 { f (u) + f (v) } f∗ ( v1v2 ) = 2 { f(v1) + f(v2) } = 2 ; : : = {2, 4, 6, 10, 14, 12 } then the edge labels are distinct. In view of the above labeling pattern the 𝐹2 is a ∅- graceful labeling. Hence F2 is a ∅-graceful graph. Fig4: ∅ - Graceful graph of flower graph. Illustration: ∅ - Graceful labeling of the graph F2 is shown in fig.5. Fig5: ∅ - Graceful graph of 𝐹2 graph.
  • 4. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm Volume: 06 Issue: 01 June 2017 Page No.27-30 ISSN: 2278-2397 30 V. CONCLUSION In this paper we have shown that every path graphs are Graceful and ∅ - Graceful graph, Friendship graph is a ∅ - Graceful graph, every flower graph is a ∅ - Graceful graph. Are investigated it can also verified for some graphs. Acknowledgment We would like to give the grateful thanks to Dr. Seenuvasan and Dr. Rishivarman who gives for their valuable suggestions and improvements to the paper of research project and work. Moreover, we want to thank Parent’s, Friends, ICMA17 – GT165 and IJCTA for their encouragement and support. References [1] A Gillian. “A dynamic Survey of graph labeling”, the Electronics Journal of Combinatories Dec 20,(2013). [2] J. Gross and J. Yellen, “Graph theory and its applications”, CRC Press,(1999). [3] Frank Harray, “Graph Theory”, Narosa Publishing House . [4] Gray Chatrand, Ping Zhang, “Introduction to graph theory”, McGraw –Hill international Edition. [5] Murugesan N, Uma.R , “Graceful labeling of some graphs and their sub graphs” Asian Journal of Current Engineering and Maths 6 Nov-Dec. (2012). [6] V. J. Kaneria, S. K. Vaidya, G. V.Ghodasara and S. Srivastav, “Some classes of disconnected graceful graphs”, Proceedings of the First International Conference on Emerging Technologies and [7] Applications in Engineering, Technology and Sciences, (2008), pp 1050 –1056. [8] S. K. Vaidya and Lekha Bijukumar, “Some new graceful graphs”, International Journal of Mathematics and Soft Computing,1(1)(2011), pp 37-45. [9] K. Kathiresan, “Two classes of Graceful graphs”, Ars. Combin.55 (2000), pp 129-132. [10] Jacob Yunker, “Graceful Labeling Necklace Graphs”, (2012) . [11] M. M. A. A. Md Forhad Hossain and M. Kaykobad, “New classes of graceful trees”. Journal of Discrete mathematics, (2014).