IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
On the 1-2-3-edge weighting and Vertex coloring of complete graphijcsa
The document describes a 1-2-3 edge weighting and vertex coloring algorithm for complete graphs (K3q).
The algorithm assigns weights of 1, 2, or 3 to each edge in K3q such that the weighted degree of each vertex (the sum of edge weights connected to the vertex) is distinct. This results in a proper vertex coloring of K3q. The algorithm is proved to work for all K3q graphs. Some open problems related to generalizing the weighting to all graphs are also presented.
E-Cordial Labeling of Some Mirror GraphsWaqas Tariq
Let G be a bipartite graph with a partite sets V1 and V2 and G\' be the copy of G with corresponding partite sets V1\' and V2\' . The mirror graph M(G) of G is obtained from G and G\' by joining each vertex of V2 to its corresponding vertex in V2\' by an edge. Here we investigate E-cordial labeling of some mirror graphs. We prove that the mirror graphs of even cycle Cn, even path Pn and hypercube Qk are E-cordial graphs.
In this paper, we show that the number of edges for any odd harmonious Eulerian graph is congruent to 0 or 2 (mod 4), and we found a counter example for the inverse of this statement is not true. We also proved that, the graphs which are constructed by two copies of even cycle Cn sharing a common edge are odd harmonious. In addition, we obtained an odd harmonious labeling for the graphs which are constructed by two copies of cycle Cn sharing a common vertex when n is congruent to 0 (mod 4). Moreover, we show that, the Cartesian product of cycle graph Cm and path Pn for each n ≥ 2, m ≡ 0 (mod 4) are odd harmonious graphs. Finally many new families of odd harmonious graphs are introduced.
The document discusses solving the 8 queens problem using backtracking. It begins by explaining backtracking as an algorithm that builds partial candidates for solutions incrementally and abandons any partial candidate that cannot be completed to a valid solution. It then provides more details on the 8 queens problem itself - the goal is to place 8 queens on a chessboard so that no two queens attack each other. Backtracking is well-suited for solving this problem by attempting to place queens one by one and backtracking when an invalid placement is found.
This document contains a question paper for an examination in Linear Algebra and Partial Differential Equations. It has two parts - Part A contains 10 short answer questions worth 2 marks each and Part B contains 5 long answer questions worth 16 marks each. The questions cover topics like determining if a subset is a subspace, finding matrix representations of linear transformations, solving partial differential equations using methods like separation of variables, and determining if sets of vectors are linearly dependent or independent.
ODD GRACEFULL LABELING FOR THE SUBDIVISON OF DOUBLE TRIANGLES GRAPHSijscmcj
The aim of this paper is to present some odd graceful graphs. In particular we show that an odd graceful labeling of the all subdivision of double triangular snakes ( 2∆k -snake ). We also prove that the all subdivision of 2 m∆1-snake are odd graceful. Finally, we generalize the above two results (the all subdivision of 2 m∆k -snake are odd graceful).
Group {1, −1, i, −i} Cordial Labeling of Product Related GraphsIJASRD Journal
Let G be a (p,q) graph and A be a group. Let f : V (G) → A be a function. The order of u ∈ A is the least positive integer n such that un = e. We denote the order of u by o(u). For each edge uv assign the label 1 if (o(u), o(v)) = 1 or 0 otherwise. f is called a group A Cordial labeling if |vf (a) − vf (b)| ≤ 1 and |ef (0) − ef (1)| ≤ 1, where vf (x) and ef (n) respectively denote the number of vertices labeled with an element x and number of edges labeled with n(n = 0, 1). A graph which admits a group A Cordial labeling is called a group A Cordial graph. In this paper we define group {1,−1, i,−i} Cordial graphs and prove that Hypercube Qn = Qn−1 × K2, Book Bn = Sn × K2, n-sided prism Prn = Cn × K2 and Pn × K3 are all group {1,−1, i,−i} Cordial for all n.
On the 1-2-3-edge weighting and Vertex coloring of complete graphijcsa
The document describes a 1-2-3 edge weighting and vertex coloring algorithm for complete graphs (K3q).
The algorithm assigns weights of 1, 2, or 3 to each edge in K3q such that the weighted degree of each vertex (the sum of edge weights connected to the vertex) is distinct. This results in a proper vertex coloring of K3q. The algorithm is proved to work for all K3q graphs. Some open problems related to generalizing the weighting to all graphs are also presented.
E-Cordial Labeling of Some Mirror GraphsWaqas Tariq
Let G be a bipartite graph with a partite sets V1 and V2 and G\' be the copy of G with corresponding partite sets V1\' and V2\' . The mirror graph M(G) of G is obtained from G and G\' by joining each vertex of V2 to its corresponding vertex in V2\' by an edge. Here we investigate E-cordial labeling of some mirror graphs. We prove that the mirror graphs of even cycle Cn, even path Pn and hypercube Qk are E-cordial graphs.
In this paper, we show that the number of edges for any odd harmonious Eulerian graph is congruent to 0 or 2 (mod 4), and we found a counter example for the inverse of this statement is not true. We also proved that, the graphs which are constructed by two copies of even cycle Cn sharing a common edge are odd harmonious. In addition, we obtained an odd harmonious labeling for the graphs which are constructed by two copies of cycle Cn sharing a common vertex when n is congruent to 0 (mod 4). Moreover, we show that, the Cartesian product of cycle graph Cm and path Pn for each n ≥ 2, m ≡ 0 (mod 4) are odd harmonious graphs. Finally many new families of odd harmonious graphs are introduced.
The document discusses solving the 8 queens problem using backtracking. It begins by explaining backtracking as an algorithm that builds partial candidates for solutions incrementally and abandons any partial candidate that cannot be completed to a valid solution. It then provides more details on the 8 queens problem itself - the goal is to place 8 queens on a chessboard so that no two queens attack each other. Backtracking is well-suited for solving this problem by attempting to place queens one by one and backtracking when an invalid placement is found.
This document contains a question paper for an examination in Linear Algebra and Partial Differential Equations. It has two parts - Part A contains 10 short answer questions worth 2 marks each and Part B contains 5 long answer questions worth 16 marks each. The questions cover topics like determining if a subset is a subspace, finding matrix representations of linear transformations, solving partial differential equations using methods like separation of variables, and determining if sets of vectors are linearly dependent or independent.
ODD GRACEFULL LABELING FOR THE SUBDIVISON OF DOUBLE TRIANGLES GRAPHSijscmcj
The aim of this paper is to present some odd graceful graphs. In particular we show that an odd graceful labeling of the all subdivision of double triangular snakes ( 2∆k -snake ). We also prove that the all subdivision of 2 m∆1-snake are odd graceful. Finally, we generalize the above two results (the all subdivision of 2 m∆k -snake are odd graceful).
Group {1, −1, i, −i} Cordial Labeling of Product Related GraphsIJASRD Journal
Let G be a (p,q) graph and A be a group. Let f : V (G) → A be a function. The order of u ∈ A is the least positive integer n such that un = e. We denote the order of u by o(u). For each edge uv assign the label 1 if (o(u), o(v)) = 1 or 0 otherwise. f is called a group A Cordial labeling if |vf (a) − vf (b)| ≤ 1 and |ef (0) − ef (1)| ≤ 1, where vf (x) and ef (n) respectively denote the number of vertices labeled with an element x and number of edges labeled with n(n = 0, 1). A graph which admits a group A Cordial labeling is called a group A Cordial graph. In this paper we define group {1,−1, i,−i} Cordial graphs and prove that Hypercube Qn = Qn−1 × K2, Book Bn = Sn × K2, n-sided prism Prn = Cn × K2 and Pn × K3 are all group {1,−1, i,−i} Cordial for all n.
Embedding and np-Complete Problems for 3-Equitable GraphsWaqas Tariq
We present here some important results in connection with 3-equitable graphs. We prove that any graph G can be embedded as an induced subgraph of a 3-equitable graph. We have also discussed some properties which are invariant under embedding. This work rules out any possibility of obtaining a forbidden subgraph characterization for 3-equitable graphs.
Introduction of metric dimension of circular graphs is connected graph , The distance and diameter , Resolving sets and location number then Examples . Application in facility location problems . is has motivation (Applications in Chemistry and Networks systems). Definitions of Certain Regular Graphs. Main Results for three graphs (Prism , Antiprism and generalized Petersen graphs .
This book has been written mainly as an aid to Electrical/Electronic, Computer Engineering Technology students in the University and Polytechnic Education Sector preparing for Circuit Theory Examination aimed at achieving an improved result.
The book covers the National Board Technical Education i Nigeria Curriculum for Circuit Theory Courses in National Diploma and Higher National Diploma programmes.
Students are advice to attempt the questions on their own before writing the answer (solution). The analysis and solutions for each question is immediately after the problems (question).
ENGR. KADIRI, KAMORU OLUWATOYIN Ph, D
The document discusses various backtracking techniques including bounding functions, promising functions, and pruning to avoid exploring unnecessary paths. It provides examples of problems that can be solved using backtracking including n-queens, graph coloring, Hamiltonian circuits, sum-of-subsets, 0-1 knapsack. Search techniques for backtracking problems include depth-first search (DFS), breadth-first search (BFS), and best-first search combined with branch-and-bound pruning.
This document contains a chapter on functions with 30 math exercises. The exercises involve evaluating functions, determining domains and ranges, analyzing graphs of functions, and solving word problems involving functions.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document discusses backtracking as an algorithm design technique. It provides examples of problems that can be solved using backtracking, including the 8 queens problem, sum of subsets, graph coloring, Hamiltonian cycles, and the knapsack problem. It also provides pseudocode for general backtracking algorithms and algorithms for specific problems solved through backtracking.
This document defines and provides examples of key concepts in graph theory, including subgraphs, walks, paths, cycles, connectivity, and k-connectivity. It defines subgraphs, spanning subgraphs, trivial subgraphs, and induced subgraphs. It defines walks, paths, and cycles. It defines connectivity and connectivity in graphs, articulation vertices, bridges, and distance in connected graphs. It defines k-connectivity and cut vertices. It provides examples of separating sets, edge connectivity, edge cuts, and blocks.
This document contains the mark scheme for a mathematics exam involving several multi-part questions.
In question 1, students could earn up to 3 marks for correctly factorizing a quadratic expression in one or two steps.
Question 2 was worth up to 2 marks for correctly writing the equation of a straight line in y=mx+c form.
Question 3 involved solving equations and inequalities across three parts, with a total of 6 available marks through setting up and solving the relevant expressions.
The remaining questions addressed topics including arithmetic and geometric sequences, calculus, coordinate geometry, and quadratic functions. Students could earn marks for setting up correct expressions and equations and obtaining the right numerical or algebraic solutions at each stage.
IIT JAM MATH 2018 Question Paper | Sourav Sir's ClassesSOURAV DAS
IIT JAM Math Previous Year Question Paper
IIT JAM Math 2018 Question Paper
IIT JAM Preparation Strategy
For full solutions contact us.
Call - 9836793076
This document contains 26 multiple choice questions and their answers related to graph theory. It begins by defining key graph theory terms like graphs, vertices, edges, simple graphs, and applications of graph theory. It then discusses incidence, adjacency, degrees, finite and infinite graphs, isolated and pendant vertices, null graphs, and multigraphs. The document also defines complete graphs, regular graphs, cycles, isomorphism, subgraphs, walks, paths, circuits, connectivity, components, Euler graphs, Hamiltonian circuits/paths, trees, properties of trees, distance in trees, eccentricity, center, distance metric, radius, diameter, rooted trees, and binary rooted trees.
This document contains a tutorial on various topics for Grade 10 mathematics, including number patterns and sequences, functions and graphs, algebra and equations, finance, analytical geometry, transformations, trigonometry, mensuration, and data handling. It provides examples and multi-part questions to practice each topic, with explanations and step-by-step workings. The document is designed to help students review and reinforce key concepts covered in Grade 10 math.
IIT JAM MATH 2019 Question Paper | Sourav Sir's ClassesSOURAV DAS
IIT JAM Preparation Strategy
IIT JAM Math Previous Year Question Paper
IIT JAM Math 2019 Question Paper
For full solutions contact us.
Call - 9836793076
In [8] Liang and Bai have shown that the - 4 kC snake graph is an odd harmonious graph for each k ³ 1.
In this paper we generalize this result on cycles by showing that the - n kC snake with string 1,1,…,1 when
n º 0 (mod 4) are odd harmonious graph. Also we show that the - 4 kC snake with m-pendant edges for
each k,m ³ 1 , (for linear case and for general case). Moreover, we show that, all subdivision of 2 k mD -
snake are odd harmonious for each k,m ³ 1 . Finally we present some examples to illustrate the proposed
theories.
IIT JAM MATH 2020 Question Paper | Sourav Sir's ClassesSOURAV DAS
IIT JAM Math Previous Year Question Paper
IIT JAM Math 2020 Question Paper
IIT JAM Preparation Strategy
For full solutions contact us.
Call - 9836793076
Graphs can be represented abstractly as a set of vertices and edges connecting pairs of vertices. They are used to model various real-world relationships and can be represented using adjacency lists or matrices. Breadth-first search (BFS) and depth-first search (DFS) are common graph traversal algorithms that systematically explore the edges of a graph to discover reachable vertices. BFS produces a breadth-first tree and finds the shortest paths from the source, while DFS explores edges deeper first before backtracking.
1. The document contains solutions to problems from chapter 4 of Engineering Electromagnetics by Hayt, Buck. It involves calculating work done, electric fields, electric potentials, and energies for various charge distributions and field configurations.
2. Key steps include using the relations dW=-QE·dL, V=Q/4πε0r, and E=-∇V to solve for requested quantities like work done, potentials, and fields.
3. Calculations are shown for problems involving point charges, line charges, and volume charge distributions using the appropriate expressions for electric field, potential, and integrals over paths or volumes.
This document discusses graphs and graph theory concepts. It defines terms like paths, circuits, connectivity, Euler paths and circuits, Hamilton paths and circuits. It also describes Dijkstra's algorithm for finding the shortest path between two vertices in a weighted graph. Several examples are provided to illustrate graph concepts and applying Dijkstra's algorithm to find shortest paths in weighted graphs.
This document discusses algorithms for solving the all pairs shortest path problem. It introduces the all pair distance problem for unweighted graphs, which can be solved by multiplying the adjacency matrix. For weighted graphs, it describes the randomized Boolean product witness matrix algorithm, which reduces the all pairs shortest path problem to matrix multiplication. Deterministic algorithms like Floyd-Warshall are also discussed.
The document provides sample mathematics questions from past SPM exams, including questions that require students to analyze data sets, calculate measures of central tendency, complete frequency tables, construct histograms and ogives, and interpret graphs. The questions cover topics like data representation, measures of central tendency, quartiles, and data analysis and interpretation.
Este documento presenta un grupo de 16 jóvenes llamado Logroño Dinámica que está realizando una Escuela Taller de Dinamización y Mediación. El objetivo del grupo es dinamizar la sociedad a través de la movilización de personas y trabajar en la resolución de conflictos y mejora de la convivencia comunitaria mediante la mediación. El grupo trabaja con diversos colectivos como barrios problemáticos, inmigración, infancia, adolescencia, personas mayores y desempleados. La Escuela Taller dura 6 meses de form
Embedding and np-Complete Problems for 3-Equitable GraphsWaqas Tariq
We present here some important results in connection with 3-equitable graphs. We prove that any graph G can be embedded as an induced subgraph of a 3-equitable graph. We have also discussed some properties which are invariant under embedding. This work rules out any possibility of obtaining a forbidden subgraph characterization for 3-equitable graphs.
Introduction of metric dimension of circular graphs is connected graph , The distance and diameter , Resolving sets and location number then Examples . Application in facility location problems . is has motivation (Applications in Chemistry and Networks systems). Definitions of Certain Regular Graphs. Main Results for three graphs (Prism , Antiprism and generalized Petersen graphs .
This book has been written mainly as an aid to Electrical/Electronic, Computer Engineering Technology students in the University and Polytechnic Education Sector preparing for Circuit Theory Examination aimed at achieving an improved result.
The book covers the National Board Technical Education i Nigeria Curriculum for Circuit Theory Courses in National Diploma and Higher National Diploma programmes.
Students are advice to attempt the questions on their own before writing the answer (solution). The analysis and solutions for each question is immediately after the problems (question).
ENGR. KADIRI, KAMORU OLUWATOYIN Ph, D
The document discusses various backtracking techniques including bounding functions, promising functions, and pruning to avoid exploring unnecessary paths. It provides examples of problems that can be solved using backtracking including n-queens, graph coloring, Hamiltonian circuits, sum-of-subsets, 0-1 knapsack. Search techniques for backtracking problems include depth-first search (DFS), breadth-first search (BFS), and best-first search combined with branch-and-bound pruning.
This document contains a chapter on functions with 30 math exercises. The exercises involve evaluating functions, determining domains and ranges, analyzing graphs of functions, and solving word problems involving functions.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document discusses backtracking as an algorithm design technique. It provides examples of problems that can be solved using backtracking, including the 8 queens problem, sum of subsets, graph coloring, Hamiltonian cycles, and the knapsack problem. It also provides pseudocode for general backtracking algorithms and algorithms for specific problems solved through backtracking.
This document defines and provides examples of key concepts in graph theory, including subgraphs, walks, paths, cycles, connectivity, and k-connectivity. It defines subgraphs, spanning subgraphs, trivial subgraphs, and induced subgraphs. It defines walks, paths, and cycles. It defines connectivity and connectivity in graphs, articulation vertices, bridges, and distance in connected graphs. It defines k-connectivity and cut vertices. It provides examples of separating sets, edge connectivity, edge cuts, and blocks.
This document contains the mark scheme for a mathematics exam involving several multi-part questions.
In question 1, students could earn up to 3 marks for correctly factorizing a quadratic expression in one or two steps.
Question 2 was worth up to 2 marks for correctly writing the equation of a straight line in y=mx+c form.
Question 3 involved solving equations and inequalities across three parts, with a total of 6 available marks through setting up and solving the relevant expressions.
The remaining questions addressed topics including arithmetic and geometric sequences, calculus, coordinate geometry, and quadratic functions. Students could earn marks for setting up correct expressions and equations and obtaining the right numerical or algebraic solutions at each stage.
IIT JAM MATH 2018 Question Paper | Sourav Sir's ClassesSOURAV DAS
IIT JAM Math Previous Year Question Paper
IIT JAM Math 2018 Question Paper
IIT JAM Preparation Strategy
For full solutions contact us.
Call - 9836793076
This document contains 26 multiple choice questions and their answers related to graph theory. It begins by defining key graph theory terms like graphs, vertices, edges, simple graphs, and applications of graph theory. It then discusses incidence, adjacency, degrees, finite and infinite graphs, isolated and pendant vertices, null graphs, and multigraphs. The document also defines complete graphs, regular graphs, cycles, isomorphism, subgraphs, walks, paths, circuits, connectivity, components, Euler graphs, Hamiltonian circuits/paths, trees, properties of trees, distance in trees, eccentricity, center, distance metric, radius, diameter, rooted trees, and binary rooted trees.
This document contains a tutorial on various topics for Grade 10 mathematics, including number patterns and sequences, functions and graphs, algebra and equations, finance, analytical geometry, transformations, trigonometry, mensuration, and data handling. It provides examples and multi-part questions to practice each topic, with explanations and step-by-step workings. The document is designed to help students review and reinforce key concepts covered in Grade 10 math.
IIT JAM MATH 2019 Question Paper | Sourav Sir's ClassesSOURAV DAS
IIT JAM Preparation Strategy
IIT JAM Math Previous Year Question Paper
IIT JAM Math 2019 Question Paper
For full solutions contact us.
Call - 9836793076
In [8] Liang and Bai have shown that the - 4 kC snake graph is an odd harmonious graph for each k ³ 1.
In this paper we generalize this result on cycles by showing that the - n kC snake with string 1,1,…,1 when
n º 0 (mod 4) are odd harmonious graph. Also we show that the - 4 kC snake with m-pendant edges for
each k,m ³ 1 , (for linear case and for general case). Moreover, we show that, all subdivision of 2 k mD -
snake are odd harmonious for each k,m ³ 1 . Finally we present some examples to illustrate the proposed
theories.
IIT JAM MATH 2020 Question Paper | Sourav Sir's ClassesSOURAV DAS
IIT JAM Math Previous Year Question Paper
IIT JAM Math 2020 Question Paper
IIT JAM Preparation Strategy
For full solutions contact us.
Call - 9836793076
Graphs can be represented abstractly as a set of vertices and edges connecting pairs of vertices. They are used to model various real-world relationships and can be represented using adjacency lists or matrices. Breadth-first search (BFS) and depth-first search (DFS) are common graph traversal algorithms that systematically explore the edges of a graph to discover reachable vertices. BFS produces a breadth-first tree and finds the shortest paths from the source, while DFS explores edges deeper first before backtracking.
1. The document contains solutions to problems from chapter 4 of Engineering Electromagnetics by Hayt, Buck. It involves calculating work done, electric fields, electric potentials, and energies for various charge distributions and field configurations.
2. Key steps include using the relations dW=-QE·dL, V=Q/4πε0r, and E=-∇V to solve for requested quantities like work done, potentials, and fields.
3. Calculations are shown for problems involving point charges, line charges, and volume charge distributions using the appropriate expressions for electric field, potential, and integrals over paths or volumes.
This document discusses graphs and graph theory concepts. It defines terms like paths, circuits, connectivity, Euler paths and circuits, Hamilton paths and circuits. It also describes Dijkstra's algorithm for finding the shortest path between two vertices in a weighted graph. Several examples are provided to illustrate graph concepts and applying Dijkstra's algorithm to find shortest paths in weighted graphs.
This document discusses algorithms for solving the all pairs shortest path problem. It introduces the all pair distance problem for unweighted graphs, which can be solved by multiplying the adjacency matrix. For weighted graphs, it describes the randomized Boolean product witness matrix algorithm, which reduces the all pairs shortest path problem to matrix multiplication. Deterministic algorithms like Floyd-Warshall are also discussed.
The document provides sample mathematics questions from past SPM exams, including questions that require students to analyze data sets, calculate measures of central tendency, complete frequency tables, construct histograms and ogives, and interpret graphs. The questions cover topics like data representation, measures of central tendency, quartiles, and data analysis and interpretation.
Este documento presenta un grupo de 16 jóvenes llamado Logroño Dinámica que está realizando una Escuela Taller de Dinamización y Mediación. El objetivo del grupo es dinamizar la sociedad a través de la movilización de personas y trabajar en la resolución de conflictos y mejora de la convivencia comunitaria mediante la mediación. El grupo trabaja con diversos colectivos como barrios problemáticos, inmigración, infancia, adolescencia, personas mayores y desempleados. La Escuela Taller dura 6 meses de form
Este documento fornece conselhos de segurança para crianças sobre como se comportar em várias situações como caminhar na rua, atravessar estradas, brincar com amigos, interagir online e o que fazer em caso de emergência. Recomenda sempre pedir permissão aos pais e nunca falar com estranhos ou aceitar presentes.
D. Afonso Henriques foi um rei de Portugal que conquistou muitas terras e venceu muitas batalhas dentro do castelo em Guimarães, onde foi criado. Ele lutava com coragem e vontade e se tornou um verdadeiro rei. D. Afonso Henriques também foi batizado na capela onde tudo era espetacular.
Este documento resume las principales alteraciones sexuales que afectan a hombres y mujeres, así como los avances en su tratamiento. Explica que alrededor del 80% de las parejas sufren disfunciones sexuales, aunque la mayoría no busca ayuda. Hoy en día existen métodos efectivos para tratar la mayoría de los problemas sexuales, como la eyaculación precoz, disfunción eréctil e inconvenientes femeninos como dolor durante las relaciones o falta de deseo. También menciona otras alteraciones como las de identidad de género, disfunc
The document discusses various graph labeling concepts such as Z3-vertex magic total labeling, Z3-edge magic total labeling, and total magic cordial labeling. It proves that these labelings exist for the extended duplicate graph of a comb graph and the middle graph of the extended duplicate graph of a path graph. An algorithm is provided to obtain an n-edge magic labeling for the extended duplicate graph of a comb graph. The document also discusses the structures of these graphs.
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSgraphhoc
An L (2, 1)-labeling of a graph G (also called distance two labeling) is a function f from the vertex set V (G) to the non negative integers {0,1,…, k }such that |f(x)-f(y)| ≥2 if d(x, y) =1 and | f(x)- f(y)| ≥1 if d(x, y) =2. The L (2, 1)-labeling number λ (G) or span of G is the smallest k such that there is a f with
max {f (v) : vє V(G)}= k. In this paper we introduce a new type of graph called multi-storey graph. The distance two labeling of multi-storey of path, cycle, Star graph, Grid, Planar graph with maximal edges and its span value is determined. Further maximum upper bound span value for Multi-storey of simple
graph are discussed.
Radix-3 Algorithm for Realization of Type-II Discrete Sine TransformIJERA Editor
In this paper, radix-3 algorithm for computation of type-II discrete sine transform (DST-II) of length N =
3푚 (푚 = 1,2, … . ) is presented. The DST-II of length N can be realized from three DST-II sequences, each of
length N/3. A block diagram of for computation of the radix-3 DST-II algorithm is given. Signal flow graph for
DST-II of length 푁 = 32 is shown to clarify the proposed algorithm.
Radix-3 Algorithm for Realization of Type-II Discrete Sine TransformIJERA Editor
In this paper, radix-3 algorithm for computation of type-II discrete sine transform (DST-II) of length N =
3𝑚 (𝑚 = 1,2, … . ) is presented. The DST-II of length N can be realized from three DST-II sequences, each of
length N/3. A block diagram of for computation of the radix-3 DST-II algorithm is given. Signal flow graph for
DST-II of length 𝑁 = 32 is shown to clarify the proposed algorithm.
This document summarizes research on the gracefulness of merging graphs of the form n ** C4, where n is the number of copies of the 4-vertex circuit C4 that are merged together. The paper presents definitions related to graceful graphs and labeling. An algorithm for determining the gracefulness of the merging graph n ** C4 is presented using Dotnet framework. Examples are provided to illustrate the algorithm for even and odd values of n. The research finds that the merging graph n ** C4 exhibits the property of gracefulness and can be modeled algorithmically.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
This document discusses cubic graceful labeling of graphs. It proves that certain combinations of star graphs and path graphs admit cubic graceful labelings. Specifically, it proves that the graph formed by joining the centers of four stars K1,a, K1,b, K1,c, K1,d to a single vertex u is cubic graceful for all a, b, c, d ≥ 1. It also proves that the graph formed by associating the vertices vr and ur of two copies of the path Pn is cubic graceful. Finally, it proves that the graph formed by joining corresponding vertices of two copies of the path Pn is cubic graceful. Cubic graceful labeling assigns unique integers to vertices such that edge differences are also
This document describes Floyd's algorithm for solving the all-pairs shortest path problem in graphs. It begins with an introduction and problem statement. It then describes Dijkstra's algorithm as a greedy method for finding single-source shortest paths. It discusses graph representations and traversal methods. Finally, it provides pseudocode and analysis for Floyd's dynamic programming algorithm, which finds shortest paths between all pairs of vertices in O(n3) time.
This document summarizes an article from the International Journal of Information Technology & Management Information System (IJITMIS). The article discusses minimal dominating functions of the corona product graph of a path with a star. It provides definitions and properties of the corona product graph and discusses dominating sets and functions. It proves that the domination number of the graph is equal to n, the number of copies of the star. It also proves that a particular function f that assigns 1 to vertices in a minimal dominating set and 0 otherwise is a minimal dominating function of the graph.
The document discusses circles in the coordinate plane. It provides examples of writing the equation of a circle given its center and radius or given two points it passes through. It also gives examples of graphing circles given their equations by identifying the center and radius. Additionally, it presents an example of using three points and their perpendicular bisectors to find the center of a circle passing through those three points, and applies this to solving a problem about finding the location of a structure.
LADDER AND SUBDIVISION OF LADDER GRAPHS WITH PENDANT EDGES ARE ODD GRACEFULFransiskeran
The ladder graph plays an important role in many applications as Electronics, Electrical and Wireless
communication areas. The aim of this work is to present a new class of odd graceful labeling for the ladder
graph. In particular, we show that the ladder graph Ln with m-pendant Ln mk1 is odd graceful. We also
show that the subdivision of ladder graph Ln with m-pendant S(Ln) mk1 is odd graceful. Finally, we
prove that all the subdivision of triangular snakes ( k snake ) with pendant edges
1
( ) k S snake mk are odd graceful.
In this paper we proved some new theorems related with Cubic Harmonious Labeling. A (n,m) graph G =(V,E) is said to be Cubic Harmonious Graph(CHG) if there exists an injective function f:V(G)?{1,2,3,………m3+1} such that the induced mapping f *chg: E(G)? {13,23,33,……….m3} defined by f *chg (uv) = (f(u)+f(v)) mod (m3+1) is a bijection. In this paper, focus will be given on the result “cubic harmonious labeling of star, the subdivision of the edges of the star K1,n , the subdivision of the central edge of the bistar Bm,n, Pm ? nK1”.
1. The document provides a sample paper for mathematics class 12 with questions covering various topics like vectors, matrices, integrals, probability, linear programming, etc. divided into three sections - short 1 mark questions, 4 mark questions and 6 mark questions.
2. It also includes the marking scheme with answers for all the questions.
3. The questions aim to test different cognitive levels from remembering to applications and higher order thinking skills.
1. The document provides a sample paper for mathematics class 12 with questions covering various topics like vectors, matrices, integrals, probability, linear programming, etc. divided into three sections - short 1 mark questions, 4 mark questions and 6 mark questions.
2. It also includes the marking scheme with answers for all the questions.
3. The questions assess different cognitive levels like remembering, understanding, application and higher order thinking skills.
New Classes of Odd Graceful Graphs - M. E. Abdel-AalGiselleginaGloria
In this paper, we introduce the notions of m-shadow graphs and n-splitting graphs,m ≥ 2, n ≥ 1. We
prove that, the m-shadow graphs for paths, complete bipartite graphs and symmetric product between
paths and null graphs are odd graceful. In addition, we show that, the m-splitting graphs for paths, stars
and symmetric product between paths and null graphs are odd graceful. Finally, we present some examples
to illustrate the proposed theories.
On the Odd Gracefulness of Cyclic Snakes With Pendant EdgesGiselleginaGloria
Graceful and odd gracefulness of a graph are two entirely different concepts. A graph may posses one or both of these or neither. We present four new families of odd graceful graphs. In particular we show an odd graceful labeling of the linear 4 1 kC snake mK − e and therefore we introduce the odd graceful labeling of 4 1 kC snake mK − e ( for the general case ). We prove that the subdivision of linear 3 kC snake − is odd graceful. We also prove that the subdivision of linear 3 kC snake − with m-pendant edges is odd graceful. Finally, we present an odd graceful labeling of the crown graph P mK n 1 e .
1. The document discusses vectors in two and three dimensions, including the dot product, properties of the dot product, calculating the dot product, and the dot product theorem.
2. It also covers 2D vectors including unit vectors, addition and subtraction of vectors, and multiplication of a vector by a scalar.
3. Examples are provided to demonstrate calculating magnitudes of vectors, algebraic operations on vectors, and expressing vectors in terms of i and j.
The student is able to (I can):
• Find the midpoint of two given points.
• Find the coordinates of an endpoint given one endpoint
and a midpoint.
• Find the distance between two points.
Computing Some Degree-Based Topological Indices of Grapheneijeei-iaes
This document computes three topological indices - the Arithmetic-Geometric (AG2) index, SK3 index, and Sanskruti index - for the molecular graph of graphene. It begins by introducing topological indices and defining the three indices. It then presents the main results, explicitly calculating the formula for each index in graphene. For the AG2 index, it considers three cases based on the number of benzene rings in the graphene structure. The key findings are concise formulae for each of the three topological indices of graphene.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3Data Hops
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
WeTestAthens: Postman's AI & Automation Techniques
Go3112581266
1. Solairaju, N. Abdul Ali, A. Sumaiya Banu / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 1, January -February 2013, pp.1258-1266
The Graceful Of A Finite Number Of Copies Of C4 With Dotnet
Framework 3.5
A. SOLAIRAJU¹ , N. ABDUL ALI² and A. SUMAIYA BANU3
1-2
: P.G. & Research Department of Mathematics, Jamal Mohamed College, Trichy – 20.
3
: M.Phil Scholar, Jamal Mohamed College, Trichy – 20.
Abstract:
The gracefulness of a finite number of spanning tree of Cartesian product of P2 and Cn was
copies for circuit with length 4 is obtained with obtained (4) Even -edge Gracefulness of the
Dotnet Framework 3.5. Graphs was obtained (5) ladder P2 x Pn is even-edge
graceful, and (6) the even-edge gracefulness of Pn O
Keyword: Graceful labeling, Graceful nC5 is obtained.(8) Gracefulness of Tp-tree with
Graph, Generalized the Graceful of a Finite number five levels obtained by java programming,(9)
of Copies of C4 Gracefulness of nc4 Merging with paths,(10) A new class of
graceful trees and (11) Gracefulness of PK ∘ 2 𝐶 𝑘 , is
Introduction: obtained. (12, 13, 14) used for dot net framework
Most graph labeling methods trace their 3.5
origin to one introduced by Rosa [2] or one given
Graham and Sloane [1]. Rosa defined a function f, Section I: Preliminaries
a -valuation of a graph with q edges if f is an Definition 1.1:
injective map from the vertices of G to the set {0, Let G = (V, E) be a simple graph with p
1, 2 ,…,q} such that when each edge xy is vertices and q edges.
assigned the label f(x)-f(y), the resulting edge A map f: V (G) {0, 1, 2,…, q} is called
labels are distinct. a graceful labeling if
A. Solairaju and K. Chitra [3] first (i) f is one – to – one
introduced the concept of edge-odd graceful
labeling of graphs, and edge-odd graceful graphs. (ii) The edges receive all the labels
A. Solairaju and others [5,6,7,8,9] proved (numbers) from 1 to q where the
the results that(1) the Gracefulness of a spanning label of an edge is the absolute
tree of the graph of Cartesian product of P m and Cn, value of the difference between
was obtained (2) the Gracefulness of a spanning the vertex labels at its ends.
tree of the graph of Cartesian product of Sm and A graph having a graceful labeling
Sn, was obtained (3) edge-odd Gracefulness of a is called a graceful graph.
1258 | P a g e
2. Solairaju, N. Abdul Ali, A. Sumaiya Banu / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 1, January -February 2013, pp.1258-1266
Section – 2:Theorem:
The Graceful of a Finite Number of Copies of C4 Generalization
CASE 1: S is even:-
S = Number of square.
V = {V1, V2,….., Vs , Vs+1 , ……, V2s , V2s+1 , ……, V3s , V3s+1}
q = Number of edges
f(V1) = Number of Edges = 4×S = L.
f(V2) = 4.
𝑓 𝑉𝑛 − 2 − 3 , 𝑓𝑜𝑟 𝑛 = 3,5, … … 𝑆 − 1 ,
f(Vn) = 𝑓 𝑉𝑛 − 2 + 5 , 𝑓𝑜𝑟 𝑛 = 4, 6, … . . 𝑆 − 2
𝑓 𝑉𝑛 − 2 + 4 , 𝑓𝑜𝑟 𝑛= 𝑠
f(Vs+1) = f(Vs-1) – 4.
𝑓 𝑉𝑛 − 1 + 1 , 𝑓𝑜𝑟 𝑛 = 𝑆 + 2,
f(Vn) =
𝑓 𝑉𝑛 − 2 − 4 , 𝑓𝑜𝑟 𝑛 = 𝑆+3
f(Vs+4) = f(Vs+2) + 4
𝑓 𝑉𝑛 − 2 − 5 , 𝑓𝑜𝑟 𝑛 = 𝑆 + 5 , (𝑆 + 7), … … (2𝑆 + 1)
𝑓 𝑉𝑛 − 2 + 3 , 𝑓𝑜𝑟 𝑛 = 𝑆 + 6 , 𝑆 + 8 , … … (2𝑆)
f(Vn) =
𝑓 𝑉𝑛 − 2 − 3 , 𝑓𝑜𝑟 𝑛 = 2𝑠 + 4 , … .3𝑆
𝑓 𝑉𝑛 − 2 + 5 , 𝑓𝑜𝑟 𝑛 = 2𝑠 + 5 , … . (3𝑆 + 1)
f (V2s+3) = 1; f(V2s+2) = L-1
CASE 2: S is odd:-
S = Number of square.
1259 | P a g e
3. Solairaju, N. Abdul Ali, A. Sumaiya Banu / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 1, January -February 2013, pp.1258-1266
V = {V1, V2,….., Vs , Vs+1 , ……, V2s , V2s+1 , ……, V3s , V3s+1}
q = Number of edges
f(V1) = Number of Edges = 4×S = L.
f(V2) = 4.
f (V2s+3) = 1; f(V2s+2) = L-1
𝑓 𝑉𝑛 − 2 − 3 , 𝑓𝑜𝑟 𝑛 = 3,5, … … 𝑆,
f(Vn) =
𝑓 𝑉𝑛 − 2 + 5 , 𝑓𝑜𝑟 𝑛 = 4, 6, … . . 𝑆 − 1
f(Vs+1) = f(Vs) – 2.
f(Vs+2) = f(Vs+1) – 2.
f(Vs+3) = f(Vs+1) + 3.
𝑓 𝑉𝑛 − 2 − 5 , 𝑓𝑜𝑟 𝑛 = 𝑆 + 4 , (𝑆 + 6), … … (2𝑆 + 1)
𝑓 𝑉𝑛 − 2 + 3 , 𝑓𝑜𝑟 𝑛 = 𝑆 + 5 , 𝑆 + 7 , … … (2𝑆)
f(Vn) =
𝑓 𝑉𝑛 − 2 − 3 , 𝑓𝑜𝑟 𝑛 = 2𝑠 + 4 , … . (3𝑆 + 1)
𝑓 𝑉𝑛 − 2 + 5 , 𝑓𝑜𝑟 𝑛 = 2𝑠 + 5 , … . (3𝑆)
Example 2.1: S = 8
Example 2. 2 : S = 7
Section – 3:
An algorithm for THE GRACEFUL OF A FINITE NUMBER OF COPIES OF C 4 in Dotnet Framework
3.5
Case 1 : S is Even
1260 | P a g e
4. Solairaju, N. Abdul Ali, A. Sumaiya Banu / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 1, January -February 2013, pp.1258-1266
using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;
namespace Square
{
public partial class Form1 : Form
{
public Form1()
{
InitializeComponent();
}
private void btnDraw_Click(object sender, EventArgs e)
{
//Initialize Graphics tools.....
Graphics g;
g = this.CreateGraphics();
g.Clear(Color.White);
SolidBrush myBrush = new SolidBrush(Color.Black);
Font font = new Font("Times New Roman", 12.0f);
Pen myPen = new Pen(Color.Red);
myPen.Width = 2;
//Get V values for Even Numbers
int s = Convert.ToInt32(txtSquare.Text);
int arraysize = (s * 3) + 2;
int[] V = new int[arraysize];
if (s % 2 == 0)
{
V[1] = s * 4;
V[2] = 4;
for (int j = 3; j < arraysize; j++)
{
if (j < s)
{
if (j % 2 == 0)
{
V[j] = V[j - 2] + 5;
}
else
{
V[j] = V[j - 2] - 3;
}
}
else if (j == s)
{
V[j] = V[j - 2] + 4;
}
else if (j > s)
{
if (j == s + 1)
{
1261 | P a g e
5. Solairaju, N. Abdul Ali, A. Sumaiya Banu / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 1, January -February 2013, pp.1258-1266
V[s + 1] = V[s - 1] - 4;
}
else if (j == s + 2)
{
V[s + 2] = V[s + 1] + 1;
}
else if (j == s + 3)
{
V[s + 3] = V[s + 1] - 4;
}
else if (j == s + 4)
{
V[s + 4] = V[s + 2] + 4;
}
else if (j > (s + 4))
{
if (j <= ((2 * s) + 1))
{
if (j % 2 == 0)
{
V[j] = V[j - 2] + 3;
}
else
{
V[j] = V[j - 2] - 5;
}
}
else if (j == ((2 * s) + 2))
{
V[j] = (4 * s) - 1;
}
else if (j == ((2 * s) + 3))
{
V[j] = 1;
}
else
{
if (j % 2 == 0)
{
V[j] = V[j - 2] - 3;
}
else
{
V[j] = V[j - 2] + 5;
}
}
}
}
}
}
Case 2 : S is Odd
//Get V values for Odd Numbers
else
{
V[1] = s * 4;
V[2] = 4;
V[(2 * s) + 3] = 1;
V[(2 * s) + 2] = V[1] - 1;
1262 | P a g e
6. Solairaju, N. Abdul Ali, A. Sumaiya Banu / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 1, January -February 2013, pp.1258-1266
for (int j = 3; j < arraysize; j++)
{
if (j <= s)
{
if (j % 2 == 0)
{
V[j] = V[j - 2] + 5;
}
else
{
V[j] = V[j - 2] - 3;
}
}
else if (j > s)
{
if (j == s + 1)
{
V[s + 1] = V[s] - 2;
}
else if (j == s + 2)
{
V[s + 2] = V[s + 1] - 2;
}
else if (j == s + 3)
{
V[s + 3] = V[s + 1] + 3;
}
else if (j >= (s + 4))
{
if (j <= ((2 * s) + 1))
{
if (j % 2 == 0)
{
V[j] = V[j - 2] + 3;
}
else
{
V[j] = V[j - 2] - 5;
}
}
else
{
if (j % 2 == 0)
{
V[j] = V[j - 2] - 3;
}
else
{
V[j] = V[j - 2] + 5;
}
}
}
}
}
}
///Draw Square
int StartX = 20;
int StartY = 20;
1263 | P a g e
7. Solairaju, N. Abdul Ali, A. Sumaiya Banu / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 1, January -February 2013, pp.1258-1266
int Width = 600;
int Height = 600;
for (int square = 0; square < s; square++)
{
g.DrawRectangle(myPen, StartX, StartY, Width, Height);
Width = Width - 30;
Height = Height - 30;
}
int increment = Width + 25;
int increment1 = Height + 25;
StartX = 20;
StartY = 20;
Width = 600;
Height = 600;
for (int p = 1; p < arraysize; p++)
{
if (p <= (s + 1))
{
g.DrawString(V[p].ToString(), font, myBrush, Width, StartY);
if (p == s)
{
Width = 0;
}
else
{
Width = Width - 30;
}
}
else if (p > (s + 1) && p <= ((2 * s) + 1))
{
if (p == (s + 2))
{
StartX = StartX + increment;
StartY = StartY + increment1;
}
else
{
StartX = StartX + 30;
StartY = StartY + 30;
}
g.DrawString(V[p].ToString(), font, myBrush, StartX, StartY);
}
else
{
g.DrawString(V[p].ToString(), font, myBrush, 0, Height);
Height = Height - 30;
}
// Find Difference
int StartX1 = 600;
int StartY1 = 0;
SolidBrush myBrush1 = new SolidBrush(Color.Green);
for (int diff =1; diff <(s+1); diff++)
{
if (diff == s)
{
StartX1 = StartX1 - 50;
}
else if (diff == 1)
1264 | P a g e
9. Solairaju, N. Abdul Ali, A. Sumaiya Banu / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 1, January -February 2013, pp.1258-1266
Example 3.1: S is Even (S=6)
Example 3.2: S is Odd (S=5)
References: 9. A. Solairaju, N.Abdul ali, Gracefulness of
n
1. R. L. Graham and N. J. A. Sloane, On c4 Merging with paths, International
additive bases and harmonious graph, Organization of Scientific Research
SIAM J. Alg. Discrete Math., 1 (1980) (IOSR),Volume 4,Issue 4, 20 December
382 – 404. 2012.Paper ID:G22078
2. A. Rosa, On certain valuation of the 10. A. Solairaju, N.Abdul ali, A new class of
vertices of a graph, Theory of graphs gracefull trees. International journal of
(International Synposium,Rome,July science & engineering research
1966),Gordon and Breach, N.Y.and (IJSER),Volume 4,1st dec 2013.paper ID :
Dunod Paris (1967), 349-355. I01653
3. A.Solairaju and K.Chitra Edge-odd 11. A. Solairaju, N.Abdul ali, Gracefull ness
graceful labeling of some graphs, of PK ∘ 2 𝐶 𝑘 , International Journal of
Electronics Notes in Discrete Mathematics Engineering Research and
Volume 33,April 2009,Pages 1. Technology(IJERT),Volume 1,Issue :10th
4. A. Solairaju and P.Muruganantham, even- dec 2012,Paper ID :P12552 [ISSN 2278 –
edge gracefulness of ladder, The Global 0181]
Journal of Applied Mathematics & 12. Tbuan thai & hoang Q.Lan,”.Net
Mathematical Sciences(GJ-AMMS). Framework Essentials”,O`reilly,2nd
Vol.1.No.2, (July-December- Edition 2007.
2008):pp.149-153. 13. D.Nikhil Kothari,”,.Net
5. A. Solairaju and P.Sarangapani, even-edge Framework”,Addison-Wesley
gracefulness of Pn O nC5, Preprint Professional,2008.
(Accepted for publication in Serials 14. Christian Nagel et al,”Programming in
Publishers, New Delhi). C#”,Wrox Publication,2001
6. A.Solairaju, A.Sasikala, C.Vimala
Gracefulness of a spanning tree of the
graph of product of Pm and Cn,
The Global Journal of Pure and Applied
Mathematics of Mathematical Sciences,
Vol. 1, No-2 (July-Dec 2008): pp 133-
136.
7. A. Solairaju, C.Vimala,A.Sasikala
Gracefulness of a spanning tree of the
graph of Cartesian product of Sm
and Sn, The Global Journal of Pure and
Applied Mathematics of Mathematical
Sciences, Vol. 1, No-2 (July-Dec 2008):
pp117-120.
8. A. Solairaju, N.Abdul ali , s. Abdul
saleem Gracefulness of Tp-tree with five
levels obtained by java programming,
The International Journel of Scientific and
Research Publication (IJSRP),Volume
2,Issue 12,December 2012 Edition [ISSN
2250 – 3153]
1266 | P a g e