Application of Graph Theory in Computer science using Data Structure.pdf

Professional Writing Service http://StudyHub.vip/Application-Of-Graph-Theory-In-Computer

International Conference on
Contemporary Technological Solutions towards fulfilment of Social Needs
Aug-2018, Page 125
Application of Graph Theory in Computer science using Data Structure
Sanjay Kumar Bisen Dr Brajendra tiwari
Research Scholar Mathematics HOD MATHEMATICS
RKDF, University, Bhopal (M.P.) RKDF, University, Bhopal (M.P.)
ABSTRACT :
One of the important areas in mathematics in graph theory
which used in structural model. This paper gives an data
structure of the application of graph in heterogeneous field
but mainly focus on the data structure that use graph
theoretical concepts.
Graph data structure is a pictorial
representation of a set of objects where some pairs of objects
are connected by links. Interconnected objects are
represented by paints termed as vertices and the link that
connect the vertices and edges.
This paper is presented especially to
project the idea of graph theory and to demon striate its
objective and importance in data structure.
Keyword :
Graphs, Graph Drawing, Simple Graph, Multi Graph, Finite
and Infinite Graph, Tree Graph, Spanning Trees Graph,
Complete Graph.
Introduction :
This paper present some of the main terminology associated
with the theory of graphs in data structure, we discuss the
representation of graphs in memory and present various
operations on them. In particular, we discuss the breadth –
first search and the depth – first search of our graphs. Certain
applications of graphs including topological sorting are also
vovered.
1. Graphs :
A graph a consists of two things
 A set V of elements called nodes.
 A set E of edges such that each edges e in E is
identified with a unique pair [u, v] of nodes in V denoted by
e = [u, v]
1.1 Linked Represent of a Graph Theory :
The sequential representation of graph in memory. The
representation of G by its adjacency matrix A – has a
number of major drawbacks. First of it may be difficult to
insert and delete nodes in G. this is because the size of a may
need to be changed and the nodes may to be recorded. So
there may be many, many changes in the matrix A.
The graph G in fig (a). The table in fig. (b) show each mode
in G followed by the adjacency list. Which is list of an
adjacent node. The fig. (c) show a schematic graph diagram
of a linked representation of G in Memory.
A D
E
B C
Show Graph G
Fig (A)
Node Adjacency List
A
B
C
D
E
B, C, D
C
C, E
C
Adjacency List of G
The linked representation will contain two list node list and
edge list the graph representation.
International Conference on
Contemporary Technological Solutions towards fulfilment of Social Needs
Aug-2018, Page 126
The graph representation here node will be the name of key
value of the node; next will be a pointer to the next node in
the list node and ADJ will be a pointer to first element in the
adjacency list of the node. Which is maintained in the list
1.2 Data Structure traversing Graph:
Data structure using graph theory algorithms require one to
systematically examine the nodes and edges of graph G.
there are two standard ways that this is done. One way is
called a breadth – first search. The breadth – first search will
use a queue as an auxiliary structure to hold nodes for future
processing and analogously. The depth – first search will use
a staik.
Show fig. (e) suppose G representation the daily flights
between cities of some airline and suppose we want to fly
form city A ti city J with the minimum of stops.
We want the minimum path P from A to J.
Fig, (C)
Adjacency List
A : F, C, B
B : G, C
C : F
D : C
E : D, C, J
F : D
G : C, E
J : D, K
K : E, G
The minimum path P can be found by using a breadth – first
search beginning a city A and ending when J is encountered.
1.3 Data Structure Posets Topological Using Graph :
S is a graph such that each node Vi of S represents a task and
each edge (u, v) means that the completion of the task u is a
prerequisite for starting the task v. suppose such a graph S
contains a cycle such as.
P = (u, v, w, u)
That we cannot begin v until completing u we cannot begin
w until completing v and we cannot u until completing w. In
this fig. (f) observe that s has no cycles. Thus s may be
regarded as a partially order set there is a path from G to C,
B < F and B < C. On the other hand B < A since there is no
path from B to A.
Fig. (D)
Adjacency List
A : C
B : D, F
C :
D : C
E : C
F :
G : A, F
1.4 Stack and Queue Representation of Graph Theory :
All the algorithms we introduce will involve graph and it is
our job to study how to represent them on computer. We
begin by discussing some data structures that are commonly
used to store information in a computer. The ward
informally means an arrangement of objects. More formally
a list consists of a number of elements each of which is a
single field or is divided into several fields. Fields
commonly represent vertices, edges or pointers in particular
there are three types of lists that we use in common.
International Conference on
Contemporary Technological Solutions towards fulfilment of Social Needs
Aug-2018, Page 127
A stack is an ordered collection of items in which new items
can be inserted and from which items can be deleted from
one end called the top of the stack. We can insert and delete
item from a stack so that stack is dynamic. That is constantly
changing object. How does a stack change? The top of a
stack is a single end. If we are adding new items we put
them on the top. So that top of the stack move up wards
similarly. When we remove an item from tee stack the top
item will be deleted. So that the top of the stack moves
downwards in figure (E), (b), (c), (d), (e), (f) and (g) are
different stacks obtained from the stack given in fig. (a)
Fig. (E)
From the figure it is clear that we insert a new item. The
stack expands and when an item is deleted stack shrinks also.
The last element inserted into a stack is the first element
deleted. The stack is called a last – in – first – out list. There
are only two changes that can be down on a stack. They are
nothing but push and pop. That is when an item is added to a
stack. It is pushed on to the stack and when an item is
removed it is popped from the stack.
A queue is an ordered collection of items from which items
may be deleted from one end and items may be inserted at
the other end in see fig. (F)
Front Front Front
A B C B C B C D E
Rear Rear Rear
Fig. (F)
In a queue the first element inserted into a queue is the first
element to be removed. Thus queue is known as a first – in –
first – out list that is it similar to a queue in real life.
A linked list is a sequence of vertices and the sequential
order is maintained by pointers. These are suitable for
applications that require sequential storage. There are
applications that have unpredictable storage requirements
and extensive manipulation of the stored data. Such
applications need liked allocation method of storage for
effective use of computer time and memory. The entire
linked list is assessed from an external edge list directs to the
first vertex in the list.
Using these definitions one can represent graph in a
computer.
1.5 Spanning Trees use in Data Networking :
Spanning trees play an important role in multicasting over
internet protocol (IP) networks to send from a source
computer to multi play receiving computers. Each of which
is a sub network data could be sent separately to each
computer. This type of networking called unicasting, is
inefficient because many copies of the same data are
transmitted over the network to make the transmission of
data to multiple receiving computers more efficient. IP
multicasting is used with IP multicasting a computer sends a
single cope of data over the network and as data reached
intermediate routers. The data are forwarded to one or more
other routers so that ultimately all receiving computers in
their various sub networks receive these data.
For data to reach receiving computers as quickly as possible
there should be no loop in the path that data take through the
network. That is once data have reached a particular router,
data should never return to this router. To avoid loops the
multicast routers use network algorithms to construct a
spanning tree in the graph that has the multicast source the
routers and the sub networks containing receiving computer
as vertices with edges representing the links between
computer and routers. The root of this spanning tree is the
multicast source. The sub networks containing receiving
computer are leaves of the tree.
This is illustrated in fig. (G)
International Conference on
Contemporary Technological Solutions towards fulfilment of Social Needs
Aug-2018, Page 128
(a) Multicast Spanning Tree (b)
Fig. (G)
Router
Sub Network
Sub Network with Receiving Station
1.6 Graph Theory use Seating Arrangement Problem :
Nine member of a new club meet each day for meeting at a
round table. They decide to sit so that “Each member has
different neighbors at each work. How many day can this
arrangement last.
This situation can be represented a graph with nine vertices
such that each vertex. Represents a member and an edge
joining two vertices represent the relationship of sitting next
to each other. The following fig. (H) shows two possible
arrangements (1 2 3 4 5 6 7 8 9 1, 1 3 5 2 7 4 9 6 8 1 ) at the
meeting table.
Fig. (H)
From this figure, we can observe that there are two possible
seating arrangements, which are 1 2 3 4 5 6 7 8 9 1 and 1 3 5
2 7 4 9 6 8 1. It can be shown by graph theoretic
considerations that there are only two more arrangements
possible. Which are 1 5 7 3 9 2 8 4 6 1 and 1 7 9 5 8 3 6 2 4
1. In general for ‘n’ people the number of such possible
arrangements is
=>
𝑛−1
2
, if ‘n’ is odd
=>
𝑛−1
2
, if ‘n’ is even
Conclusion :
The main aim of this paper is to present the importance of
graph theoretical Idea in computer data structure. An
computer data structure is especially to project the Idea of
graph theory.
Reference :
1. Graph theory with application by NARSING
DEV(paentice-hallof private limited 2003)
2. Combinotrics and graph theory by S.B.SINGH
(khanna book publishing co pvt ltd)
3. Graph theory by G. SURESH SINGH
4. Discrete mathematic and graph theory by
BHAVANARI SATYA NARAYANA, KUNCHAM Shyam
Prasad.(Phi learing private limited 2014)
5. Discrete mathematics and its applications (with
combinotrics and Graph theory) by KAMALA
KRITHIVASAN.( Pearson prentice Hill 2013)
6. A beginner’s guide to Graph theory by W.D.
WALLIS. (Springer international edition)
7. Graph theory by Neeraj Pant, SHAHAB FARUGI.(
E.B.S. publishers and Distrbutiors)
8. Graph theory modelery, applications and algorithms
by GEIR AGNARSSON RAYMOND
GREENLAW.(Pearson prentice Hill 2007)
9. Harary Graph theory by V. Krishna murti.( Pearson
prentice Hill 2015)
10. Introduction to Graph theory by DOUGLAS B.
WEST.( Pearson prentice Hill 2015)
11. Graph theory and combinotrics by RALPHP
GRIMALDI.( Pearson prentice Hill 2001)
12. Invitation to Graph theory by S. ARUMUGAM, S.
RAMA CHANDRAN.
13. Application of Graph theory operations research by
Sanjay Kumar Bisen
(International journal of innovative science and Research
ISSN No. 2456 – 2165, Vol. 2, Issue 5, May 2017)
14. Graph Theory use in Transportation Problems and
Railway Network by Sanjay Kumar Bisen (International
Journal of Science & Research, ISSN No. 2319-7064, Vol. 6
Issue 5, May 2017)
15. Graph theory/social network by Kimball martin
(Springer international edition 2014)
16. Application of graph theory in electrical networks
by sanjay kumar bisen (international research journal
printing area sep. 2017, vol. 05, issue 33).
17. Application of graph theory in social networks by
sanjay kumar bisen (international research journal printing
area Aug. 2017, vol. 04, issue 32).
18. Application of graph theory in transportation
networks by sanjay kumar bisen (international research
journal of scientific research and management July 2017,
vol. 05, issue 07).
19. Application of graph theory in transport networks
by sanjay kumar bisen (Vidyawarta international journal oct
to Dec 2017 , vol. 20, issue 43).

Recomendados

Analysis of Impact of Graph Theory in Computer Application von
Analysis of Impact of Graph Theory in Computer ApplicationAnalysis of Impact of Graph Theory in Computer Application
Analysis of Impact of Graph Theory in Computer ApplicationIRJET Journal
128 views4 Folien
Map Coloring and Some of Its Applications von
Map Coloring and Some of Its Applications Map Coloring and Some of Its Applications
Map Coloring and Some of Its Applications MD SHAH ALAM
2.2K views37 Folien
Hafordan Function Essay von
Hafordan Function EssayHafordan Function Essay
Hafordan Function EssaySusan White
3 views46 Folien
A Hough Transform Based On a Map-Reduce Algorithm von
A Hough Transform Based On a Map-Reduce AlgorithmA Hough Transform Based On a Map-Reduce Algorithm
A Hough Transform Based On a Map-Reduce AlgorithmIJERA Editor
50 views9 Folien
Population Growth Graph von
Population Growth GraphPopulation Growth Graph
Population Growth GraphLisa Barnes
2 views44 Folien
Slides Chapter10.1 10.2 von
Slides Chapter10.1 10.2Slides Chapter10.1 10.2
Slides Chapter10.1 10.2showslidedump
3.1K views35 Folien

Más contenido relacionado

Similar a Application of Graph Theory in Computer science using Data Structure.pdf

Graph Tea: Simulating Tool for Graph Theory & Algorithms von
Graph Tea: Simulating Tool for Graph Theory & AlgorithmsGraph Tea: Simulating Tool for Graph Theory & Algorithms
Graph Tea: Simulating Tool for Graph Theory & AlgorithmsIJMTST Journal
134 views4 Folien
From Signal to Symbols von
From Signal to SymbolsFrom Signal to Symbols
From Signal to Symbolsgpano
716 views56 Folien
Fusing Transformations of Strict Scala Collections with Views von
Fusing Transformations of Strict Scala Collections with ViewsFusing Transformations of Strict Scala Collections with Views
Fusing Transformations of Strict Scala Collections with ViewsPhilip Schwarz
20 views28 Folien
Lecture 2.3.1 Graph.pptx von
Lecture 2.3.1 Graph.pptxLecture 2.3.1 Graph.pptx
Lecture 2.3.1 Graph.pptxking779879
32 views23 Folien
Data Structure.pdf von
Data Structure.pdfData Structure.pdf
Data Structure.pdfMemeMiner
12 views138 Folien
graph representation.pdf von
graph representation.pdfgraph representation.pdf
graph representation.pdfamitbhachne
47 views10 Folien

Similar a Application of Graph Theory in Computer science using Data Structure.pdf(20)

Graph Tea: Simulating Tool for Graph Theory & Algorithms von IJMTST Journal
Graph Tea: Simulating Tool for Graph Theory & AlgorithmsGraph Tea: Simulating Tool for Graph Theory & Algorithms
Graph Tea: Simulating Tool for Graph Theory & Algorithms
IJMTST Journal134 views
From Signal to Symbols von gpano
From Signal to SymbolsFrom Signal to Symbols
From Signal to Symbols
gpano716 views
Fusing Transformations of Strict Scala Collections with Views von Philip Schwarz
Fusing Transformations of Strict Scala Collections with ViewsFusing Transformations of Strict Scala Collections with Views
Fusing Transformations of Strict Scala Collections with Views
Philip Schwarz20 views
Lecture 2.3.1 Graph.pptx von king779879
Lecture 2.3.1 Graph.pptxLecture 2.3.1 Graph.pptx
Lecture 2.3.1 Graph.pptx
king77987932 views
Data Structure.pdf von MemeMiner
Data Structure.pdfData Structure.pdf
Data Structure.pdf
MemeMiner12 views
graph representation.pdf von amitbhachne
graph representation.pdfgraph representation.pdf
graph representation.pdf
amitbhachne47 views
Graph Analyses with Python and NetworkX von Benjamin Bengfort
Graph Analyses with Python and NetworkXGraph Analyses with Python and NetworkX
Graph Analyses with Python and NetworkX
Benjamin Bengfort21.5K views
The Functional Programming Triad of Map, Filter and Fold von Philip Schwarz
The Functional Programming Triad of Map, Filter and FoldThe Functional Programming Triad of Map, Filter and Fold
The Functional Programming Triad of Map, Filter and Fold
Philip Schwarz3.5K views
Datastructures using c++ von Gopi Nath
Datastructures using c++Datastructures using c++
Datastructures using c++
Gopi Nath135 views
A SYSTEM FOR VISUALIZATION OF BIG ATTRIBUTED HIERARCHICAL GRAPHS von IJCNCJournal
A SYSTEM FOR VISUALIZATION OF BIG ATTRIBUTED HIERARCHICAL GRAPHSA SYSTEM FOR VISUALIZATION OF BIG ATTRIBUTED HIERARCHICAL GRAPHS
A SYSTEM FOR VISUALIZATION OF BIG ATTRIBUTED HIERARCHICAL GRAPHS
IJCNCJournal55 views
Ds important questions von LavanyaJ28
Ds important questionsDs important questions
Ds important questions
LavanyaJ2859 views
Automatically Inferring ClassSheet Models from Spreadsheets von Jácome Cunha
Automatically Inferring ClassSheet Models from SpreadsheetsAutomatically Inferring ClassSheet Models from Spreadsheets
Automatically Inferring ClassSheet Models from Spreadsheets
Jácome Cunha25 views
An Overview Applications Of Graph Theory In Real Field von Lori Moore
An Overview Applications Of Graph Theory In Real FieldAn Overview Applications Of Graph Theory In Real Field
An Overview Applications Of Graph Theory In Real Field
Lori Moore16 views
Data structures and algorithms short note (version 14).pd von Nimmi Weeraddana
Data structures and algorithms short note (version 14).pdData structures and algorithms short note (version 14).pd
Data structures and algorithms short note (version 14).pd
Nimmi Weeraddana2K views
Cs6660 compiler design november december 2016 Answer key von appasami
Cs6660 compiler design november december 2016 Answer keyCs6660 compiler design november december 2016 Answer key
Cs6660 compiler design november december 2016 Answer key
appasami4.4K views
A Subgraph Pattern Search over Graph Databases von IJMER
A Subgraph Pattern Search over Graph DatabasesA Subgraph Pattern Search over Graph Databases
A Subgraph Pattern Search over Graph Databases
IJMER362 views

Más de Nancy Ideker

An IT Service Reporting Framework for Effective Implementation of ITIL Contin... von
An IT Service Reporting Framework for Effective Implementation of ITIL Contin...An IT Service Reporting Framework for Effective Implementation of ITIL Contin...
An IT Service Reporting Framework for Effective Implementation of ITIL Contin...Nancy Ideker
2 views6 Folien
Abolition, Phallocentrism, and the Mondialisation of Psychoanalysis A Review... von
Abolition, Phallocentrism, and the Mondialisation of Psychoanalysis  A Review...Abolition, Phallocentrism, and the Mondialisation of Psychoanalysis  A Review...
Abolition, Phallocentrism, and the Mondialisation of Psychoanalysis A Review...Nancy Ideker
7 views13 Folien
A Post-Revolutionary Childhood Nostalgia and Collective Memory in Viva Cuba.pdf von
A Post-Revolutionary Childhood  Nostalgia and Collective Memory in Viva Cuba.pdfA Post-Revolutionary Childhood  Nostalgia and Collective Memory in Viva Cuba.pdf
A Post-Revolutionary Childhood Nostalgia and Collective Memory in Viva Cuba.pdfNancy Ideker
4 views15 Folien
A Comprehensive Approach to Faculty Development.pdf von
A Comprehensive Approach to Faculty Development.pdfA Comprehensive Approach to Faculty Development.pdf
A Comprehensive Approach to Faculty Development.pdfNancy Ideker
3 views6 Folien
An Efficient Genetic Algorithm for Solving Knapsack Problem.pdf von
An Efficient Genetic Algorithm for Solving Knapsack Problem.pdfAn Efficient Genetic Algorithm for Solving Knapsack Problem.pdf
An Efficient Genetic Algorithm for Solving Knapsack Problem.pdfNancy Ideker
3 views13 Folien
A modular framework to enable rapid evaluation and exploration of energy mana... von
A modular framework to enable rapid evaluation and exploration of energy mana...A modular framework to enable rapid evaluation and exploration of energy mana...
A modular framework to enable rapid evaluation and exploration of energy mana...Nancy Ideker
2 views21 Folien

Más de Nancy Ideker(20)

An IT Service Reporting Framework for Effective Implementation of ITIL Contin... von Nancy Ideker
An IT Service Reporting Framework for Effective Implementation of ITIL Contin...An IT Service Reporting Framework for Effective Implementation of ITIL Contin...
An IT Service Reporting Framework for Effective Implementation of ITIL Contin...
Nancy Ideker2 views
Abolition, Phallocentrism, and the Mondialisation of Psychoanalysis A Review... von Nancy Ideker
Abolition, Phallocentrism, and the Mondialisation of Psychoanalysis  A Review...Abolition, Phallocentrism, and the Mondialisation of Psychoanalysis  A Review...
Abolition, Phallocentrism, and the Mondialisation of Psychoanalysis A Review...
Nancy Ideker7 views
A Post-Revolutionary Childhood Nostalgia and Collective Memory in Viva Cuba.pdf von Nancy Ideker
A Post-Revolutionary Childhood  Nostalgia and Collective Memory in Viva Cuba.pdfA Post-Revolutionary Childhood  Nostalgia and Collective Memory in Viva Cuba.pdf
A Post-Revolutionary Childhood Nostalgia and Collective Memory in Viva Cuba.pdf
Nancy Ideker4 views
A Comprehensive Approach to Faculty Development.pdf von Nancy Ideker
A Comprehensive Approach to Faculty Development.pdfA Comprehensive Approach to Faculty Development.pdf
A Comprehensive Approach to Faculty Development.pdf
Nancy Ideker3 views
An Efficient Genetic Algorithm for Solving Knapsack Problem.pdf von Nancy Ideker
An Efficient Genetic Algorithm for Solving Knapsack Problem.pdfAn Efficient Genetic Algorithm for Solving Knapsack Problem.pdf
An Efficient Genetic Algorithm for Solving Knapsack Problem.pdf
Nancy Ideker3 views
A modular framework to enable rapid evaluation and exploration of energy mana... von Nancy Ideker
A modular framework to enable rapid evaluation and exploration of energy mana...A modular framework to enable rapid evaluation and exploration of energy mana...
A modular framework to enable rapid evaluation and exploration of energy mana...
Nancy Ideker2 views
A genre analysis of the introduction section of computer science research art... von Nancy Ideker
A genre analysis of the introduction section of computer science research art...A genre analysis of the introduction section of computer science research art...
A genre analysis of the introduction section of computer science research art...
Nancy Ideker4 views
An Overview of Malaysian English Language Learning Strategies.pdf von Nancy Ideker
An Overview of Malaysian English Language Learning Strategies.pdfAn Overview of Malaysian English Language Learning Strategies.pdf
An Overview of Malaysian English Language Learning Strategies.pdf
Nancy Ideker3 views
Algebra And Trigonometry-LR.pdf von Nancy Ideker
Algebra And Trigonometry-LR.pdfAlgebra And Trigonometry-LR.pdf
Algebra And Trigonometry-LR.pdf
Nancy Ideker2 views
Audit independence concepts A CONCEPTUAL FRAMEWORK FOR AUDIT INDEPENDENCE.pdf von Nancy Ideker
Audit independence concepts A CONCEPTUAL FRAMEWORK FOR AUDIT INDEPENDENCE.pdfAudit independence concepts A CONCEPTUAL FRAMEWORK FOR AUDIT INDEPENDENCE.pdf
Audit independence concepts A CONCEPTUAL FRAMEWORK FOR AUDIT INDEPENDENCE.pdf
Nancy Ideker6 views
Aristotle and Modern Argumentation Theory.pdf von Nancy Ideker
Aristotle and Modern Argumentation Theory.pdfAristotle and Modern Argumentation Theory.pdf
Aristotle and Modern Argumentation Theory.pdf
Nancy Ideker3 views
Authorial Impression and Remediation in Anne Carson s Quasi-Artist s Book Nox... von Nancy Ideker
Authorial Impression and Remediation in Anne Carson s Quasi-Artist s Book Nox...Authorial Impression and Remediation in Anne Carson s Quasi-Artist s Book Nox...
Authorial Impression and Remediation in Anne Carson s Quasi-Artist s Book Nox...
Nancy Ideker2 views
ANALYSIS OF CAPITALISM IN THE NOVEL THE GREAT GATSBY BY F SCOTT FITZGERALD ... von Nancy Ideker
ANALYSIS OF CAPITALISM IN THE NOVEL  THE GREAT GATSBY  BY F SCOTT FITZGERALD ...ANALYSIS OF CAPITALISM IN THE NOVEL  THE GREAT GATSBY  BY F SCOTT FITZGERALD ...
ANALYSIS OF CAPITALISM IN THE NOVEL THE GREAT GATSBY BY F SCOTT FITZGERALD ...
Nancy Ideker8 views
An Assessment of Capital Structure Decisions by Small and Medium Enterprises ... von Nancy Ideker
An Assessment of Capital Structure Decisions by Small and Medium Enterprises ...An Assessment of Capital Structure Decisions by Small and Medium Enterprises ...
An Assessment of Capital Structure Decisions by Small and Medium Enterprises ...
Nancy Ideker3 views
A Proven Map to Success with Engineering Research and Dissertation Dr. Subash... von Nancy Ideker
A Proven Map to Success with Engineering Research and Dissertation Dr. Subash...A Proven Map to Success with Engineering Research and Dissertation Dr. Subash...
A Proven Map to Success with Engineering Research and Dissertation Dr. Subash...
Nancy Ideker3 views
1965 -A Western Sunrise -Indias War with Pakistan by Shiv Kunal Verma Reviewe... von Nancy Ideker
1965 -A Western Sunrise -Indias War with Pakistan by Shiv Kunal Verma Reviewe...1965 -A Western Sunrise -Indias War with Pakistan by Shiv Kunal Verma Reviewe...
1965 -A Western Sunrise -Indias War with Pakistan by Shiv Kunal Verma Reviewe...
Nancy Ideker6 views
A qualitative analysis of health professionals job descriptions for surgical... von Nancy Ideker
A qualitative analysis of health professionals  job descriptions for surgical...A qualitative analysis of health professionals  job descriptions for surgical...
A qualitative analysis of health professionals job descriptions for surgical...
Nancy Ideker3 views
Analyzing Complex Problem Solving by Dynamic Brain Networks.pdf von Nancy Ideker
Analyzing Complex Problem Solving by Dynamic Brain Networks.pdfAnalyzing Complex Problem Solving by Dynamic Brain Networks.pdf
Analyzing Complex Problem Solving by Dynamic Brain Networks.pdf
Nancy Ideker6 views
Approaches and implications of eLearning Adoption in Relation to Academic Sta... von Nancy Ideker
Approaches and implications of eLearning Adoption in Relation to Academic Sta...Approaches and implications of eLearning Adoption in Relation to Academic Sta...
Approaches and implications of eLearning Adoption in Relation to Academic Sta...
Nancy Ideker2 views
Applying Business Process Change (BPC) to Implement Multi-agency Collaboratio... von Nancy Ideker
Applying Business Process Change (BPC) to Implement Multi-agency Collaboratio...Applying Business Process Change (BPC) to Implement Multi-agency Collaboratio...
Applying Business Process Change (BPC) to Implement Multi-agency Collaboratio...
Nancy Ideker3 views

Último

REPRESENTATION - GAUNTLET.pptx von
REPRESENTATION - GAUNTLET.pptxREPRESENTATION - GAUNTLET.pptx
REPRESENTATION - GAUNTLET.pptxiammrhaywood
83 views26 Folien
231112 (WR) v1 ChatGPT OEB 2023.pdf von
231112 (WR) v1  ChatGPT OEB 2023.pdf231112 (WR) v1  ChatGPT OEB 2023.pdf
231112 (WR) v1 ChatGPT OEB 2023.pdfWilfredRubens.com
144 views21 Folien
Drama KS5 Breakdown von
Drama KS5 BreakdownDrama KS5 Breakdown
Drama KS5 BreakdownWestHatch
71 views2 Folien
Women from Hackney’s History: Stoke Newington by Sue Doe von
Women from Hackney’s History: Stoke Newington by Sue DoeWomen from Hackney’s History: Stoke Newington by Sue Doe
Women from Hackney’s History: Stoke Newington by Sue DoeHistory of Stoke Newington
141 views21 Folien
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptx von
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptxGopal Chakraborty Memorial Quiz 2.0 Prelims.pptx
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptxDebapriya Chakraborty
598 views81 Folien
ICS3211_lecture 08_2023.pdf von
ICS3211_lecture 08_2023.pdfICS3211_lecture 08_2023.pdf
ICS3211_lecture 08_2023.pdfVanessa Camilleri
103 views30 Folien

Último(20)

REPRESENTATION - GAUNTLET.pptx von iammrhaywood
REPRESENTATION - GAUNTLET.pptxREPRESENTATION - GAUNTLET.pptx
REPRESENTATION - GAUNTLET.pptx
iammrhaywood83 views
Drama KS5 Breakdown von WestHatch
Drama KS5 BreakdownDrama KS5 Breakdown
Drama KS5 Breakdown
WestHatch71 views
Scope of Biochemistry.pptx von shoba shoba
Scope of Biochemistry.pptxScope of Biochemistry.pptx
Scope of Biochemistry.pptx
shoba shoba124 views
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively von PECB
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB 545 views
Ch. 7 Political Participation and Elections.pptx von Rommel Regala
Ch. 7 Political Participation and Elections.pptxCh. 7 Political Participation and Elections.pptx
Ch. 7 Political Participation and Elections.pptx
Rommel Regala72 views
Are we onboard yet University of Sussex.pptx von Jisc
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptx
Jisc77 views
Class 10 English notes 23-24.pptx von TARIQ KHAN
Class 10 English notes 23-24.pptxClass 10 English notes 23-24.pptx
Class 10 English notes 23-24.pptx
TARIQ KHAN107 views
Structure and Functions of Cell.pdf von Nithya Murugan
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdf
Nithya Murugan368 views
Psychology KS5 von WestHatch
Psychology KS5Psychology KS5
Psychology KS5
WestHatch77 views
UWP OA Week Presentation (1).pptx von Jisc
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptx
Jisc74 views
OEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptx von Inge de Waard
OEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptxOEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptx
OEB 2023 Co-learning To Speed Up AI Implementation in Courses.pptx
Inge de Waard167 views
Narration ppt.pptx von TARIQ KHAN
Narration  ppt.pptxNarration  ppt.pptx
Narration ppt.pptx
TARIQ KHAN119 views
Lecture: Open Innovation von Michal Hron
Lecture: Open InnovationLecture: Open Innovation
Lecture: Open Innovation
Michal Hron96 views

Application of Graph Theory in Computer science using Data Structure.pdf

  • 1. International Conference on Contemporary Technological Solutions towards fulfilment of Social Needs Aug-2018, Page 125 Application of Graph Theory in Computer science using Data Structure Sanjay Kumar Bisen Dr Brajendra tiwari Research Scholar Mathematics HOD MATHEMATICS RKDF, University, Bhopal (M.P.) RKDF, University, Bhopal (M.P.) ABSTRACT : One of the important areas in mathematics in graph theory which used in structural model. This paper gives an data structure of the application of graph in heterogeneous field but mainly focus on the data structure that use graph theoretical concepts. Graph data structure is a pictorial representation of a set of objects where some pairs of objects are connected by links. Interconnected objects are represented by paints termed as vertices and the link that connect the vertices and edges. This paper is presented especially to project the idea of graph theory and to demon striate its objective and importance in data structure. Keyword : Graphs, Graph Drawing, Simple Graph, Multi Graph, Finite and Infinite Graph, Tree Graph, Spanning Trees Graph, Complete Graph. Introduction : This paper present some of the main terminology associated with the theory of graphs in data structure, we discuss the representation of graphs in memory and present various operations on them. In particular, we discuss the breadth – first search and the depth – first search of our graphs. Certain applications of graphs including topological sorting are also vovered. 1. Graphs : A graph a consists of two things  A set V of elements called nodes.  A set E of edges such that each edges e in E is identified with a unique pair [u, v] of nodes in V denoted by e = [u, v] 1.1 Linked Represent of a Graph Theory : The sequential representation of graph in memory. The representation of G by its adjacency matrix A – has a number of major drawbacks. First of it may be difficult to insert and delete nodes in G. this is because the size of a may need to be changed and the nodes may to be recorded. So there may be many, many changes in the matrix A. The graph G in fig (a). The table in fig. (b) show each mode in G followed by the adjacency list. Which is list of an adjacent node. The fig. (c) show a schematic graph diagram of a linked representation of G in Memory. A D E B C Show Graph G Fig (A) Node Adjacency List A B C D E B, C, D C C, E C Adjacency List of G The linked representation will contain two list node list and edge list the graph representation.
  • 2. International Conference on Contemporary Technological Solutions towards fulfilment of Social Needs Aug-2018, Page 126 The graph representation here node will be the name of key value of the node; next will be a pointer to the next node in the list node and ADJ will be a pointer to first element in the adjacency list of the node. Which is maintained in the list 1.2 Data Structure traversing Graph: Data structure using graph theory algorithms require one to systematically examine the nodes and edges of graph G. there are two standard ways that this is done. One way is called a breadth – first search. The breadth – first search will use a queue as an auxiliary structure to hold nodes for future processing and analogously. The depth – first search will use a staik. Show fig. (e) suppose G representation the daily flights between cities of some airline and suppose we want to fly form city A ti city J with the minimum of stops. We want the minimum path P from A to J. Fig, (C) Adjacency List A : F, C, B B : G, C C : F D : C E : D, C, J F : D G : C, E J : D, K K : E, G The minimum path P can be found by using a breadth – first search beginning a city A and ending when J is encountered. 1.3 Data Structure Posets Topological Using Graph : S is a graph such that each node Vi of S represents a task and each edge (u, v) means that the completion of the task u is a prerequisite for starting the task v. suppose such a graph S contains a cycle such as. P = (u, v, w, u) That we cannot begin v until completing u we cannot begin w until completing v and we cannot u until completing w. In this fig. (f) observe that s has no cycles. Thus s may be regarded as a partially order set there is a path from G to C, B < F and B < C. On the other hand B < A since there is no path from B to A. Fig. (D) Adjacency List A : C B : D, F C : D : C E : C F : G : A, F 1.4 Stack and Queue Representation of Graph Theory : All the algorithms we introduce will involve graph and it is our job to study how to represent them on computer. We begin by discussing some data structures that are commonly used to store information in a computer. The ward informally means an arrangement of objects. More formally a list consists of a number of elements each of which is a single field or is divided into several fields. Fields commonly represent vertices, edges or pointers in particular there are three types of lists that we use in common.
  • 3. International Conference on Contemporary Technological Solutions towards fulfilment of Social Needs Aug-2018, Page 127 A stack is an ordered collection of items in which new items can be inserted and from which items can be deleted from one end called the top of the stack. We can insert and delete item from a stack so that stack is dynamic. That is constantly changing object. How does a stack change? The top of a stack is a single end. If we are adding new items we put them on the top. So that top of the stack move up wards similarly. When we remove an item from tee stack the top item will be deleted. So that the top of the stack moves downwards in figure (E), (b), (c), (d), (e), (f) and (g) are different stacks obtained from the stack given in fig. (a) Fig. (E) From the figure it is clear that we insert a new item. The stack expands and when an item is deleted stack shrinks also. The last element inserted into a stack is the first element deleted. The stack is called a last – in – first – out list. There are only two changes that can be down on a stack. They are nothing but push and pop. That is when an item is added to a stack. It is pushed on to the stack and when an item is removed it is popped from the stack. A queue is an ordered collection of items from which items may be deleted from one end and items may be inserted at the other end in see fig. (F) Front Front Front A B C B C B C D E Rear Rear Rear Fig. (F) In a queue the first element inserted into a queue is the first element to be removed. Thus queue is known as a first – in – first – out list that is it similar to a queue in real life. A linked list is a sequence of vertices and the sequential order is maintained by pointers. These are suitable for applications that require sequential storage. There are applications that have unpredictable storage requirements and extensive manipulation of the stored data. Such applications need liked allocation method of storage for effective use of computer time and memory. The entire linked list is assessed from an external edge list directs to the first vertex in the list. Using these definitions one can represent graph in a computer. 1.5 Spanning Trees use in Data Networking : Spanning trees play an important role in multicasting over internet protocol (IP) networks to send from a source computer to multi play receiving computers. Each of which is a sub network data could be sent separately to each computer. This type of networking called unicasting, is inefficient because many copies of the same data are transmitted over the network to make the transmission of data to multiple receiving computers more efficient. IP multicasting is used with IP multicasting a computer sends a single cope of data over the network and as data reached intermediate routers. The data are forwarded to one or more other routers so that ultimately all receiving computers in their various sub networks receive these data. For data to reach receiving computers as quickly as possible there should be no loop in the path that data take through the network. That is once data have reached a particular router, data should never return to this router. To avoid loops the multicast routers use network algorithms to construct a spanning tree in the graph that has the multicast source the routers and the sub networks containing receiving computer as vertices with edges representing the links between computer and routers. The root of this spanning tree is the multicast source. The sub networks containing receiving computer are leaves of the tree. This is illustrated in fig. (G)
  • 4. International Conference on Contemporary Technological Solutions towards fulfilment of Social Needs Aug-2018, Page 128 (a) Multicast Spanning Tree (b) Fig. (G) Router Sub Network Sub Network with Receiving Station 1.6 Graph Theory use Seating Arrangement Problem : Nine member of a new club meet each day for meeting at a round table. They decide to sit so that “Each member has different neighbors at each work. How many day can this arrangement last. This situation can be represented a graph with nine vertices such that each vertex. Represents a member and an edge joining two vertices represent the relationship of sitting next to each other. The following fig. (H) shows two possible arrangements (1 2 3 4 5 6 7 8 9 1, 1 3 5 2 7 4 9 6 8 1 ) at the meeting table. Fig. (H) From this figure, we can observe that there are two possible seating arrangements, which are 1 2 3 4 5 6 7 8 9 1 and 1 3 5 2 7 4 9 6 8 1. It can be shown by graph theoretic considerations that there are only two more arrangements possible. Which are 1 5 7 3 9 2 8 4 6 1 and 1 7 9 5 8 3 6 2 4 1. In general for ‘n’ people the number of such possible arrangements is => 𝑛−1 2 , if ‘n’ is odd => 𝑛−1 2 , if ‘n’ is even Conclusion : The main aim of this paper is to present the importance of graph theoretical Idea in computer data structure. An computer data structure is especially to project the Idea of graph theory. Reference : 1. Graph theory with application by NARSING DEV(paentice-hallof private limited 2003) 2. Combinotrics and graph theory by S.B.SINGH (khanna book publishing co pvt ltd) 3. Graph theory by G. SURESH SINGH 4. Discrete mathematic and graph theory by BHAVANARI SATYA NARAYANA, KUNCHAM Shyam Prasad.(Phi learing private limited 2014) 5. Discrete mathematics and its applications (with combinotrics and Graph theory) by KAMALA KRITHIVASAN.( Pearson prentice Hill 2013) 6. A beginner’s guide to Graph theory by W.D. WALLIS. (Springer international edition) 7. Graph theory by Neeraj Pant, SHAHAB FARUGI.( E.B.S. publishers and Distrbutiors) 8. Graph theory modelery, applications and algorithms by GEIR AGNARSSON RAYMOND GREENLAW.(Pearson prentice Hill 2007) 9. Harary Graph theory by V. Krishna murti.( Pearson prentice Hill 2015) 10. Introduction to Graph theory by DOUGLAS B. WEST.( Pearson prentice Hill 2015) 11. Graph theory and combinotrics by RALPHP GRIMALDI.( Pearson prentice Hill 2001) 12. Invitation to Graph theory by S. ARUMUGAM, S. RAMA CHANDRAN. 13. Application of Graph theory operations research by Sanjay Kumar Bisen (International journal of innovative science and Research ISSN No. 2456 – 2165, Vol. 2, Issue 5, May 2017) 14. Graph Theory use in Transportation Problems and Railway Network by Sanjay Kumar Bisen (International Journal of Science & Research, ISSN No. 2319-7064, Vol. 6 Issue 5, May 2017) 15. Graph theory/social network by Kimball martin (Springer international edition 2014) 16. Application of graph theory in electrical networks by sanjay kumar bisen (international research journal printing area sep. 2017, vol. 05, issue 33). 17. Application of graph theory in social networks by sanjay kumar bisen (international research journal printing area Aug. 2017, vol. 04, issue 32). 18. Application of graph theory in transportation networks by sanjay kumar bisen (international research journal of scientific research and management July 2017, vol. 05, issue 07). 19. Application of graph theory in transport networks by sanjay kumar bisen (Vidyawarta international journal oct to Dec 2017 , vol. 20, issue 43).