SlideShare a Scribd company logo
1 of 12
Download to read offline
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.5, No.2, June 2013
DOI : 10.5121/jgraphoc.2013.5201 1
New Classes of Odd Graceful Graphs
M. E. Abdel-Aal
Department of Mathematics, Faculty of Science,
Benha University, Benha 13518, Egypt
mohamed_el77@yahoo.com
ABSTRACT
In this paper, we introduce the notions of m-shadow graphs and n-splitting graphs, 2≥m , 1≥n . We
prove that, the m-shadow graphs for paths, complete bipartite graphs and symmetric product between
paths and null graphs are odd graceful. In addition, we show that, the m-splitting graphs for paths, stars
and symmetric product between paths and null graphs are odd graceful. Finally, we present some examples
to illustrate the proposed theories.
KEYWORDS
Odd graceful, m-shadow graph, m-splitting graph, Symmetric product.
1. INTRODUCTION
Graph labeling have often been motivated by practical problems is one of fascinating areas of
research. A systematic study of various applications of graph labeling is carried out in Bloom
and Golomb [1]. Labeled graph plays vital role to determine optimal circuit layouts for computers
and for the representation of compressed data structure.
The study of graceful graphs and graceful labelling methods was introduced by Rosa [2]. Rosa
defined a β-valuation of a graph G with q edges as an injection from the vertices of G to the set
{0, 1, 2, . . . , q} such that when each edge xy is assigned the label |f (x) − f (y)|, the resulting edge
labels are distinct. β-Valuations are the functions that produce graceful labellings. However, the
term graceful labelling was not used until Golomb studied such labellings several years later [3].
The notation of graceful labelling was introduced as a tool for decomposing the complete graph
into isomorphic subgraphs.
We begin with simple, finite, connected and undirected graph G = (V, E) with p vertices and q
edges. For all other standard terminology and notions we follow Harary[5].
Gnanajothi [6] defined a graph G with q edges to be odd graceful if there is an injection f from
V(G) to {0, 1, 2, . . . , 2q-1} such that, when each edge xy is assigned the label f(x) - f(y). Seoud
and Abdel-Aal [7] determine all connected odd graceful graphs of order at most 6 and they
proved that if G is odd graceful, then G ∪ Km ,n is odd graceful for all m, n ≥ 1. In addition, they
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.5, No.2, June 2013
2
proved that many families of graphs such as splitting of complete bipartite graph, Cartesian
product of paths, symmetric product for paths with null graph, conjunction of paths and
conjunction of paths with stars are odd graceful.
We know that, the shadow graph D2(G) of a connected graph G is constructed by taking two
copies of G say and . Join each vertex u in to the neighbors of the corresponding
vertex v in . Also we know that, the splitting graph G is obtained by adding to each vertex v a
new vertex such that is adjacent to every vertex which is adjacent to v in G. The resultant
graph is denoted by Spl(G).
Vaidya and Lekha [8] proved that the shadow graphs of the path Pn and the star K1,n are odd
graceful graphs. Further they proved in [9] that the splitting graphs of the star K1,n admit odd
graceful labeling. Moreover, Sekar [10] has proved that the splitting graph of path is odd graceful
graph. Also, Seoud and Abdel-Aal [7] proved that Spl ( mnK , ), Spl (Pn  2K ).
In this paper, we introduce an extension for shadow graphs and splitting graphs. Namely, for
any integers 1≥m , the m-shadow graph denoted by )(GDm and the m- splitting graph denoted
by Splm(G) which are defined as follows:
Definition 1.1. The m-shadow graph Dm(G) of a connected graph G is constructed by taking m-
copies of G , say mGGGG ,...,,, 321 , then join each vertex u in Gi to the neighbors of the
corresponding vertex v in Gj , mji ≤≤ ,1 .
Definition 1.2. The m- splitting graph Splm(G) of a graph G is obtained by adding to each vertex
v of G new m vertices, say m
vvvv ...,,,, 321
, such that i
v , mi ≤≤1 is adjacent to every vertex
that is adjacent to v in G.
By definitions, the 2-shadow graph is the known shadow graph D2(G) and the 1- splitting graph
is the known splitting graph.
In our study, we generalize some results on splitting and shadow graphs by showing that, the
graphs Dm(Pn), Dm (Pn ⊕ 2K ), and Dm(Kr,s) for each 1,,, ≥srnm are odd graceful. Moreover,
we also show that the following graphs Splm(Pn), Splm(K1,n), Splm (Pn ⊕ 2K ) are odd graceful.
'
G ''
G '
G
''
G
'
v '
v
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.5, No.2, June 2013
3
2. MAIN RESULTS
Theorem 2.1.
Dm(Pn) is an odd graceful graph for all m, n  2.
Proof. Consider m-copies of Pn. Let j
n
jjj
uuuu ...,,,, 321 be the vertices of the jth
-copy of Pn ,
mj ≤≤1 . Let G be the graph Dm(Pn), then |V (G)| = mn and q = |E(G)| = m2
(n − 1).
We define f : V(G) → {0, 1, 2, …, 2 m2
(n − 1) - 1} as follows:




≤≤−=−+−
≤≤−=−−−−−
=
.1,1...,,6,4,2)1(2)2(
,1,1...,,5,3,1)1(2)1(12
)( 2
2
mjnornijim
mjnornijmimq
uf j
i
The above defined function f provides odd graceful labeling for Dm(Pn). Hence Dm(Pn) is an odd
graceful graph for each 1, ≥nm .
Example 2.2. An odd graceful labeling of the graph D4(P6) is shown in Figure 1.
Figure 1: The graph D4 (P6) with its odd graceful labeling.
Theorem 2.3. Dm(Kr,s) is an odd graceful graph for all m, r, s ≥ 1.
Proof. Consider m-copies of Kr,s. Let j
r
jjj
uuuu ...,,,, 321 and j
s
jjj
vvvv ...,,,, 321 be the vertices of
the jth
-copy of Kr,s , mj ≤≤1 . Let G be the graph Dm(Kr,s), then |V (G)| = m(r+s) and q = |E(G)|
= m2
rs. We define
f : V(G) → {0, 1, 2, …, 2 m2
rs - 1}
as follows:
.1,1),1(2)1(2)( mjrijriuf j
i ≤≤≤≤−+−=
.1,1),1(2)1(212)( mjsijmrsimrqvf j
i ≤≤≤≤−−−−−=
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.5, No.2, June 2013
4
Above defined labeling pattern exhausts all possibilities and the graph under consideration admits
odd graceful labeling. Hence Dm(Kr,s) is an odd graceful graph for each m, r, s ≥ 1.
Example 2.4. An odd graceful labeling of the graph D3(K3,4) is shown in Figure 2.
Figure 2: The graph D3(K3,4) with its odd graceful labeling.
Remark 2.5.
In Theorem 2.1, if we take m = 2 we obtain the known shadow path also, when we take m = 2, r
= 1 in Theorem 2.3 we obtain the known shadow star. These special cases of our results are
coincided with Vaidya’s results in [8, theorems 2.6, 2.4]; respectively.
Let G1 and G2 be two disjoint graphs. The symmetric product (G1 ⊕ G2) of G1 and G2 is the graph
having vertex set V(G1) × V(G2) and edge set{(u1, v1) (u2, v2): u1u2∈ E(G1) or
v1v2 ∈ E(G2) but not both}[4].
In [11] Seoud and Elsakhawi shown that P2 ⊕ 2K is arbitrary graceful, and in [7] Seoud and
Abdel-Aal proved that the graphs Pn ⊕ mK , m , n ≥ 2 are odd graceful. The next theorem shows
that the m-shadow of (Pn  2K ) for each m, n ≥ 2 is odd graceful.
Theorem 2.6.
The graph Dm (Pn ⊕ 2K ) , m , n ≥ 2 is odd graceful.
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.5, No.2, June 2013
5
Proof.
Let 11
3
1
2
1
1 ...,,,, nuuuu , 11
3
1
2
1
1 ...,,,, nvvvv be the vertices of Pn ⊕ 2K and suppose j
n
jjj
uuuu ...,,,, 321 ,
j
n
jjj
vvvv ...,,,, 321 be the jth
-copy of Pn ⊕ 2K , mj ≤≤1 . Then the graph
G = Dm (Pn ⊕ 2K ) can be described as indicated in Figure 3.
1
1v 1
2v
2
1v
m
v1
m
v2
m
nvm
v3
m
nv 1−
2
3v
1
3v 1
nv
2
nv
2
1u
m
u1
1
2u
2
2u
m
u 2
m
u3
m
nu 1−
1
3u
2
3u
1
nu
2
nu
m
nu
1
1u 1
1−nu
1
1−nv
2
1−nu
2
2v
2
1−nv
Figure 3
Then the number of edges of the graph G is 4m2
(n-1). We define:
f : V(G) → {0, 1, 2, …, 8 m2
(n-1)-1}
as follows:





==−+−
==−−−−−
=
.,...,2,1,,...6,4,2),1(4)2(4
,...,2,1,,...5,3,1),1(8)1(4)12(
)(
2
2
mjnijim
mjnijmimq
uf j
i





==−+−
==−+−−−
=
.,...,2,1,,...6,4,2,24)2(4
,...,2,1,,...5,3,1,1]24)1(2[2
)(
2
2
mjnijjm
mjnimmjimq
vf j
i
In accordance with the above labeling pattern the graph under consideration admits odd graceful
labeling. Hence Dm (Pn  2K ) is an odd graceful graph for each m, n ≥ 1.
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.5, No.2, June 2013
6
Example 2.7. An odd graceful labeling of the graph D3(P4  2K ) is shown in Figure 4.
Figure 4: The graph D3(P4 ⊕ 2K ) with its odd graceful labeling.
Theorem 2.8.
The graph D2 (Pn × P2), n ≥ 2 is odd graceful.
Proof. Let 11
3
1
2
1
1 ...,,,, nuuuu , 11
3
1
2
1
1 ...,,,, nvvvv be the vertices of Pn × P2 and suppose
22
3
2
2
2
1 ...,,,, nuuuu , 22
3
2
2
2
1 ...,,,, nvvvv , be the second copy of Pn × P2. The graph
G= D2(Pn × P2) is described as indicated in Figure 5.
1
2u 1
3u 1
nu1
1u 1
1−nu1
4u
1
1v 1
2v 1
3v
1
nv1
1−nv1
4v
2
2u 2
3u 2
nu2
1u
2
1−nu2
4u
2
1v
2
2v 2
3v 2
4v 2
1−nv 2
nv
Clearly, the number of edges of the graph G is 12 n - 8. We define:
f : V(G) → {0, 1, 2, …, 24n-17}
as follows:





==−+
==+−−−
=
.2,1,,...6,4,2),23(4
,2,1,,...5,3,1,1])1(6[2
)(
jniji
jnijiq
uf j
i
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.5, No.2, June 2013
7





==++−
==−−
=
.2,1,,...6,4,2,3)6(2
,2,1,,...5,3,1),13(4
)(
jnijiq
jniji
vf j
i
In view of the above defined labeling pattern the graph under consideration admits odd graceful
labeling. Hence D2 (Pn × P2) is an odd graceful graph for each n ≥ 2.
Example 2.9. An odd graceful labeling of the graph D2 (Pn × P2) is shown in Figure 6.
Figure 6: The graph D2 (Pn × P2) with its odd graceful labeling.
3. THE M-SPLITTING GRAPHS
Theorem 3.1. The graph Splm(Pn) for each 2, ≥nm is odd graceful.
Proof. Let 00
3
0
2
0
1 ...,,,, nuuuu be the vertices of Pn and suppose j
n
jjj
uuuu ...,,,, 321 , mj ≤≤1 be
the jth
vertices corresponding to 00
3
0
2
0
1 ...,,,, nuuuu , which are added to obtain Splm(Pn). Let G be
the graph Splm(Pn) described as indicated in Figure 7
Figure 7
Then |V (G)| = n(m+1) and q = |E(G)| = (n − 1)(2m+1). We define
f : V(G) → {0, 1, 2, …, 2 (n − 1)(2m+1) - 1}
as follows:
0
1u 0
2u 0
3u 0
1−nu 0
nu
1
1u
1
2u 1
1−nu 1
nu
m
u1
m
u2
m
u3
m
nu 1−
m
nu
1
3u
2
1u 2
2u
2
3u 2
1−nu 2
nu
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.5, No.2, June 2013
8



−=−
−=−
=
.1...,,6,4,22
,1...,,5,3,1,2
)( 0
nornii
norniiq
uf i



≤≤−=−+−−
≤≤−=−−−
=
.1,1...,,6,4,2,2)12)(1(2
,1,1...,,5,3,1,)1(42
)(
mjnorniijn
mjnornijniq
uf j
i
The above defined function f provides odd graceful labeling for the graph Splm(Pn). Hence
Splm(Pn) is an odd graceful graph.
Example 3.2. Odd graceful labeling of the graph Spl4(P7) is shown in Figure 8.
Figure 8: The graph Spl4(P7) with its odd graceful labeling.
Theorem 3.3. The graph Splm(K1,n ) is odd graceful.
Proof. Let nuuuu ...,,,, 321 be the pendant vertices and 0u be the centre of K1,n , and
j
n
jjj
uuuu ...,,,, 210 , mj ≤≤1 are the added vertices corresponding to nuuuuu ...,,,,, 3210 to
obtain Splm(K1,n ). Let G be the graph Splm(K1,n ). Then |V (G)| = (n+1)(m+1) and q = |E(G)| =
n(2m+1). We define the vertex labeling function:
f : V(G) → {0, 1, 2, …, 2n (2m+1) - 1} as follows:
,12)( 0 −= quf
,1),1(2)( niiuf i ≤≤−=
,1,2)12()( 0 mjnjquf j
≤≤−−=
.1,1),1(2)(2)( mjniijmnuf j
i ≤≤≤≤−++=
In view of the above defined labeling pattern the graph under consideration admits odd graceful
labeling. Hence Splm(K1,n ) is an odd graceful graph.
Example 3.4. An odd graceful labeling of the graph Spl2(K1,4) is shown in Figure 9.
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.5, No.2, June 2013
9
Figure 9: The graph spl2(K1,4) with its odd graceful labeling.
Theorem 3.5.
The graphs Splm (Pn  2K ) , m , n  2 are odd graceful.
Proof. Let nn vvvvuuuu ...,,,,;...,,,, 321321 be the vertices of the graph Pn ⊕ and suppose
j
n
jjj
uuuu ...,,,, 321 , mj ≤≤1 be the jth
vertices corresponding to nuuuu ...,,,, 321 and
j
n
jjj
vvvv ...,,,, 321 , mj ≤≤1 be the jth
vertices corresponding to which are
added to obtain Splm (Pn ⊕ 2K ). The graph Splm (Pn ⊕ 2K ) is described as indicated in Figure
10.
Figure 10
Then the number of edges of the graph Splm (Pn ⊕ 2K ) = 4(2m+1)(n-1).
2K
nvvvv ...,,,, 321
1
1v 1
2v
2
1v
2
2v
m
v 1
m
v 2
m
nvm
v 3
m
nv 1−
2
3v
1
3v 1
1−nv
2
1−nv
1
nv
2
nv
1
1u
2
1u
m
u 1
1
2u
2
2u
m
u 2
m
nu 1−
1
3u
2
3u
1
1−nu
2
1−nu
1
nu
2
nu
m
nu
1u
2u 3u 1−nu
1v
2v 3v 1−nv
nu
nv
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.5, No.2, June 2013
10
We define:
f : V(Splm (Pn ⊕ 2K )) → {0, 1, 2, …8(2m+1)(n-1) - 1}.
First, we consider the labeling for the graph Pn ⊕ 2K as follows:





−=−−+
−=−++−
=
.1,...6,4,2,6]4)12[(4
1,...5,3,1,1]2)12(2[2
)(
nornimim
nornimimq
uf i





−=−+
−=+++−
=
.1,...6,4,2),2)(12(4
1,...5,3,1,3]2)12(2[2
)(
norniim
nornimimq
vf i
For labeling the added vertices mjnivu j
i
j
i ≤≤≤≤ 1,1,, we consider the following two
cases:
Case(i): if i is odd, ni ≤≤1 we have the following labeling, for each mj ≤≤1
,7]42)12(2[2)( ++−+−= mjimquf j
i
1]22)12(2[2)( −+−+−= mjimqvf j
i
Case(ii): if i even, ni ≤≤2 and mj ≤≤1 we have the following labeling:





−=−−++
−=−−++
=
.1,...6,4,2,6]3)12[(4
1,...5,3,1],13)12[(4
)(
mormjmjim
mormjmjim
uf j
i
Now we label the remaining vertices j
iv ,
if i even, ni ≤≤2 and ),2(mod1≡m mj ≤≤1 we have the following labeling:





−=−−++
=−−++
=
1,...6,4,2],12)12[(4
,...5,3,1,6]2)12[(4
)(
mjmjim
mjmjim
vf j
i
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.5, No.2, June 2013
11
if i even, ni ≤≤2 and ),2(mod0≡m mj ≤≤1 we have the following labeling:





=−−++
−=−−++
=
.,...6,4,2,6]2)12[(4
1,...5,3,1],12)12[(4
)(
mjmjim
mjmjim
vf j
i
In accordance with the above labeling pattern the graph under consideration admits odd graceful
labeling. Hence Splm (Pn ⊕ 2K ) is an odd graceful graph.
Example 3.6. Odd graceful labelings of graphs Spl2 (P4 ⊕ ) and Spl3 (P4 ⊕ 2K ) are shown
in Figure (11a) and Figure (11b) respectively.
3v
Figure (11a) ),2(mod0≡m Figure (11b), )2(mod1≡m
Figure (11a), Figure (11b): The graphs spl2 (P4 ⊕ ) and Spl3 (P4 ⊕ ) with their odd
graceful labelings respectively.
Remark 3.7.
In Theorem 3.1, 3.3, 3.5 if we take m = 1 we obtain the known splitting graphs (path, star and Pn
⊕ 2K ; respectively). These special cases of our results are coincided with the results which had
been obtained in the articles (Sekar [10], Vaidya and Shah [9], Seoud and Abdel-Aal.[7] ;
respectively).
2K
2K 2K
International journal on applications of graph theory in wireless ad hoc networks and sensor networks
(GRAPH-HOC) Vol.5, No.2, June 2013
12
4. CONCLUSION
Since labeled graphs serve as practically useful models for wide-ranging applications such as
communications network, circuit design, coding theory, radar, astronomy, X-ray and
crystallography, it is desired to have generalized results or results for a whole class, if possible.
In this work we contribute two new graph operations and several new families of odd graceful
graphs are obtained. To investigate similar results for other graph families and in the context of
different labeling techniques is open area of research.
REFERENCES
[1] G. S. Bloom and S. W. Golomb, (1977) “Applications of numbered undirected graphs”, Proc. IEEE,
Vol. 65, pp. 562-570.
[2] A. Rosa, (1967) On certain valuations of the vertices of a graph, in Theory of Graphs, International
Symposium, Rome, July 1966, Gordon and Breach, NewYork and Dunod, Paris, pp. 349–355.
[3] S.W. Golomb, (1972) “How to number a graph, in Graph Theory and Computing”, R.C. Read,
ed.,Academic Press, NewYork, pp. 23–37.
[4] J. A. Gallian, (2012) A Dynamic Survey of Graph Labeling, Electronic J. Combin. Fiftteenth edition.
[5] F. Harary, (1969) GpaphTheory, Addison-Wesley, Reading MA.
[6] R.B. Gnanajothi, (1991) Topics in graph theory, Ph.D. thesis, Madurai Kamaraj University, India.
[7] M.A. Seoud and M.E. Abdel-Aal, (2013) “On odd graceful graphs”, Ars Combin., Vol. 108, pp.161-
185.
[8] S.K. Vaidy and B. Lekha, (2010) “New Families of Odd Graceful Graphs”, Int. J. Open Problems
Compt. Math., Vol. 3, No. 5, pp. 166-171.
[9] S.K. Vaidy and B. Lekha, (2010) “Odd Graceful Labeling of Some New Graphs”, Modern Applied
Science Vol. 4, No. 10, pp. 65-70.
[10] C.Sekar, (2002) Studies in Graph Theory, Ph.D. Thesis, Madurai Kamaraj University.
[11] M. A. Seoud and E. A. Elsahawi, (2008) On variations of graceful labelings, Ars Combinatoria, Vol.
87, pp. 127-138.
AUTHOR
Mohamed Elsayed Abdel-Aal received the B.Sc. (Mathematics) the M.Sc.(Pure
Mathematics-Abstract Algebra) degree from Benha University, Benha, Egypt in 1999,
2005 respectively. Also, he received Ph.D. (Pure Mathematics) degree from Faculty of
Mathematics, Tajik National University, Tajikistan, in 2011. He is a University lecturer
of Pure Mathematics with the Ben ha University, Faculty of Science, Department of
Pure Mathematics. His current research is Ordinary –partial differential equations,
Graph Theory and Abstract Algebra.

More Related Content

What's hot

Graph kernels
Graph kernelsGraph kernels
Graph kernelsLuc Brun
 
E-Cordial Labeling of Some Mirror Graphs
E-Cordial Labeling of Some Mirror GraphsE-Cordial Labeling of Some Mirror Graphs
E-Cordial Labeling of Some Mirror GraphsWaqas Tariq
 
QMC Error SAMSI Tutorial Aug 2017
QMC Error SAMSI Tutorial Aug 2017QMC Error SAMSI Tutorial Aug 2017
QMC Error SAMSI Tutorial Aug 2017Fred J. Hickernell
 
Au2419291933
Au2419291933Au2419291933
Au2419291933IJMER
 
An application of gd
An application of gdAn application of gd
An application of gdgraphhoc
 
SOLVING BVPs OF SINGULARLY PERTURBED DISCRETE SYSTEMS
SOLVING BVPs OF SINGULARLY PERTURBED DISCRETE SYSTEMSSOLVING BVPs OF SINGULARLY PERTURBED DISCRETE SYSTEMS
SOLVING BVPs OF SINGULARLY PERTURBED DISCRETE SYSTEMSTahia ZERIZER
 
Lego like spheres and tori, enumeration and drawings
Lego like spheres and tori, enumeration and drawingsLego like spheres and tori, enumeration and drawings
Lego like spheres and tori, enumeration and drawingsMathieu Dutour Sikiric
 
Graph Kernels for Chemical Informatics
Graph Kernels for Chemical InformaticsGraph Kernels for Chemical Informatics
Graph Kernels for Chemical InformaticsMukund Raj
 
Novel Performance Analysis of Network Coded Communications in Single-Relay Ne...
Novel Performance Analysis of Network Coded Communications in Single-Relay Ne...Novel Performance Analysis of Network Coded Communications in Single-Relay Ne...
Novel Performance Analysis of Network Coded Communications in Single-Relay Ne...Communication Systems & Networks
 
On the 1-2-3-edge weighting and Vertex coloring of complete graph
On the 1-2-3-edge weighting and Vertex coloring of complete graphOn the 1-2-3-edge weighting and Vertex coloring of complete graph
On the 1-2-3-edge weighting and Vertex coloring of complete graphijcsa
 
Strong (Weak) Triple Connected Domination Number of a Fuzzy Graph
Strong (Weak) Triple Connected Domination Number of a Fuzzy GraphStrong (Weak) Triple Connected Domination Number of a Fuzzy Graph
Strong (Weak) Triple Connected Domination Number of a Fuzzy Graphijceronline
 
ODD HARMONIOUS LABELINGS OF CYCLIC SNAKES
ODD HARMONIOUS LABELINGS OF CYCLIC SNAKESODD HARMONIOUS LABELINGS OF CYCLIC SNAKES
ODD HARMONIOUS LABELINGS OF CYCLIC SNAKESgraphhoc
 
Entity Linking via Graph-Distance Minimization
Entity Linking via Graph-Distance MinimizationEntity Linking via Graph-Distance Minimization
Entity Linking via Graph-Distance MinimizationRoi Blanco
 
S. Duplij, A q-deformed generalization of the Hosszu-Gluskin theorem
S. Duplij, A q-deformed generalization of the Hosszu-Gluskin theoremS. Duplij, A q-deformed generalization of the Hosszu-Gluskin theorem
S. Duplij, A q-deformed generalization of the Hosszu-Gluskin theoremSteven Duplij (Stepan Douplii)
 
Pert 05 aplikasi clustering
Pert 05 aplikasi clusteringPert 05 aplikasi clustering
Pert 05 aplikasi clusteringaiiniR
 

What's hot (19)

Graph kernels
Graph kernelsGraph kernels
Graph kernels
 
E-Cordial Labeling of Some Mirror Graphs
E-Cordial Labeling of Some Mirror GraphsE-Cordial Labeling of Some Mirror Graphs
E-Cordial Labeling of Some Mirror Graphs
 
QMC Error SAMSI Tutorial Aug 2017
QMC Error SAMSI Tutorial Aug 2017QMC Error SAMSI Tutorial Aug 2017
QMC Error SAMSI Tutorial Aug 2017
 
Au2419291933
Au2419291933Au2419291933
Au2419291933
 
An application of gd
An application of gdAn application of gd
An application of gd
 
10.1.1.92.3502
10.1.1.92.350210.1.1.92.3502
10.1.1.92.3502
 
SOLVING BVPs OF SINGULARLY PERTURBED DISCRETE SYSTEMS
SOLVING BVPs OF SINGULARLY PERTURBED DISCRETE SYSTEMSSOLVING BVPs OF SINGULARLY PERTURBED DISCRETE SYSTEMS
SOLVING BVPs OF SINGULARLY PERTURBED DISCRETE SYSTEMS
 
Lego like spheres and tori, enumeration and drawings
Lego like spheres and tori, enumeration and drawingsLego like spheres and tori, enumeration and drawings
Lego like spheres and tori, enumeration and drawings
 
Graph Kernels for Chemical Informatics
Graph Kernels for Chemical InformaticsGraph Kernels for Chemical Informatics
Graph Kernels for Chemical Informatics
 
Triggering patterns of topology changes in dynamic attributed graphs
Triggering patterns of topology changes in dynamic attributed graphsTriggering patterns of topology changes in dynamic attributed graphs
Triggering patterns of topology changes in dynamic attributed graphs
 
Novel Performance Analysis of Network Coded Communications in Single-Relay Ne...
Novel Performance Analysis of Network Coded Communications in Single-Relay Ne...Novel Performance Analysis of Network Coded Communications in Single-Relay Ne...
Novel Performance Analysis of Network Coded Communications in Single-Relay Ne...
 
poster
posterposter
poster
 
On the 1-2-3-edge weighting and Vertex coloring of complete graph
On the 1-2-3-edge weighting and Vertex coloring of complete graphOn the 1-2-3-edge weighting and Vertex coloring of complete graph
On the 1-2-3-edge weighting and Vertex coloring of complete graph
 
Strong (Weak) Triple Connected Domination Number of a Fuzzy Graph
Strong (Weak) Triple Connected Domination Number of a Fuzzy GraphStrong (Weak) Triple Connected Domination Number of a Fuzzy Graph
Strong (Weak) Triple Connected Domination Number of a Fuzzy Graph
 
Entropy 19-00079
Entropy 19-00079Entropy 19-00079
Entropy 19-00079
 
ODD HARMONIOUS LABELINGS OF CYCLIC SNAKES
ODD HARMONIOUS LABELINGS OF CYCLIC SNAKESODD HARMONIOUS LABELINGS OF CYCLIC SNAKES
ODD HARMONIOUS LABELINGS OF CYCLIC SNAKES
 
Entity Linking via Graph-Distance Minimization
Entity Linking via Graph-Distance MinimizationEntity Linking via Graph-Distance Minimization
Entity Linking via Graph-Distance Minimization
 
S. Duplij, A q-deformed generalization of the Hosszu-Gluskin theorem
S. Duplij, A q-deformed generalization of the Hosszu-Gluskin theoremS. Duplij, A q-deformed generalization of the Hosszu-Gluskin theorem
S. Duplij, A q-deformed generalization of the Hosszu-Gluskin theorem
 
Pert 05 aplikasi clustering
Pert 05 aplikasi clusteringPert 05 aplikasi clustering
Pert 05 aplikasi clustering
 

Similar to New classes of odd graceful graphs

New Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-AalNew Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-AalGiselleginaGloria
 
FURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHSFURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHSFransiskeran
 
Odd Harmonious Labelings of Cyclic Snakes
Odd Harmonious Labelings of Cyclic SnakesOdd Harmonious Labelings of Cyclic Snakes
Odd Harmonious Labelings of Cyclic SnakesGiselleginaGloria
 
On the Odd Gracefulness of Cyclic Snakes With Pendant Edges
On the Odd Gracefulness of Cyclic Snakes With Pendant EdgesOn the Odd Gracefulness of Cyclic Snakes With Pendant Edges
On the Odd Gracefulness of Cyclic Snakes With Pendant EdgesGiselleginaGloria
 
One modulo n gracefulness of
One modulo n gracefulness ofOne modulo n gracefulness of
One modulo n gracefulness ofgraphhoc
 
Generarlized operations on fuzzy graphs
Generarlized operations on fuzzy graphsGenerarlized operations on fuzzy graphs
Generarlized operations on fuzzy graphsAlexander Decker
 
Paper id 71201961
Paper id 71201961Paper id 71201961
Paper id 71201961IJRAT
 
AN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHS
AN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHSAN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHS
AN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHSFransiskeran
 
Some New Families on H-Cordial Graphs
Some New Families on H-Cordial GraphsSome New Families on H-Cordial Graphs
Some New Families on H-Cordial GraphsIJMER
 
Graph Theory,Graph Terminologies,Planar Graph & Graph Colouring
Graph Theory,Graph Terminologies,Planar Graph & Graph ColouringGraph Theory,Graph Terminologies,Planar Graph & Graph Colouring
Graph Theory,Graph Terminologies,Planar Graph & Graph ColouringSaurabh Kaushik
 
ODD GRACEFULL LABELING FOR THE SUBDIVISON OF DOUBLE TRIANGLES GRAPHS
ODD GRACEFULL LABELING FOR THE SUBDIVISON OF DOUBLE TRIANGLES GRAPHSODD GRACEFULL LABELING FOR THE SUBDIVISON OF DOUBLE TRIANGLES GRAPHS
ODD GRACEFULL LABELING FOR THE SUBDIVISON OF DOUBLE TRIANGLES GRAPHSijscmcj
 
Metric dimesion of circulsnt graphs
Metric dimesion of circulsnt graphsMetric dimesion of circulsnt graphs
Metric dimesion of circulsnt graphsAmna Abunamous
 
Bn31231239
Bn31231239Bn31231239
Bn31231239IJMER
 
Ce31342345
Ce31342345Ce31342345
Ce31342345IJMER
 
On the Equality of the Grundy Numbers of a Graph
On the Equality of the Grundy Numbers of a GraphOn the Equality of the Grundy Numbers of a Graph
On the Equality of the Grundy Numbers of a Graphjosephjonse
 
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles  An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles graphhoc
 
On the equality of the grundy numbers of a graph
On the equality of the grundy numbers of a graphOn the equality of the grundy numbers of a graph
On the equality of the grundy numbers of a graphijngnjournal
 

Similar to New classes of odd graceful graphs (20)

New Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-AalNew Classes of Odd Graceful Graphs - M. E. Abdel-Aal
New Classes of Odd Graceful Graphs - M. E. Abdel-Aal
 
FURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHSFURTHER RESULTS ON ODD HARMONIOUS GRAPHS
FURTHER RESULTS ON ODD HARMONIOUS GRAPHS
 
Odd Harmonious Labelings of Cyclic Snakes
Odd Harmonious Labelings of Cyclic SnakesOdd Harmonious Labelings of Cyclic Snakes
Odd Harmonious Labelings of Cyclic Snakes
 
graph theory
graph theorygraph theory
graph theory
 
On the Odd Gracefulness of Cyclic Snakes With Pendant Edges
On the Odd Gracefulness of Cyclic Snakes With Pendant EdgesOn the Odd Gracefulness of Cyclic Snakes With Pendant Edges
On the Odd Gracefulness of Cyclic Snakes With Pendant Edges
 
One modulo n gracefulness of
One modulo n gracefulness ofOne modulo n gracefulness of
One modulo n gracefulness of
 
Generarlized operations on fuzzy graphs
Generarlized operations on fuzzy graphsGenerarlized operations on fuzzy graphs
Generarlized operations on fuzzy graphs
 
Paper id 71201961
Paper id 71201961Paper id 71201961
Paper id 71201961
 
64 66
64 6664 66
64 66
 
AN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHS
AN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHSAN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHS
AN APPLICATION OF Gd -METRIC SPACES AND METRIC DIMENSION OF GRAPHS
 
Some New Families on H-Cordial Graphs
Some New Families on H-Cordial GraphsSome New Families on H-Cordial Graphs
Some New Families on H-Cordial Graphs
 
Graph Theory,Graph Terminologies,Planar Graph & Graph Colouring
Graph Theory,Graph Terminologies,Planar Graph & Graph ColouringGraph Theory,Graph Terminologies,Planar Graph & Graph Colouring
Graph Theory,Graph Terminologies,Planar Graph & Graph Colouring
 
ODD GRACEFULL LABELING FOR THE SUBDIVISON OF DOUBLE TRIANGLES GRAPHS
ODD GRACEFULL LABELING FOR THE SUBDIVISON OF DOUBLE TRIANGLES GRAPHSODD GRACEFULL LABELING FOR THE SUBDIVISON OF DOUBLE TRIANGLES GRAPHS
ODD GRACEFULL LABELING FOR THE SUBDIVISON OF DOUBLE TRIANGLES GRAPHS
 
Metric dimesion of circulsnt graphs
Metric dimesion of circulsnt graphsMetric dimesion of circulsnt graphs
Metric dimesion of circulsnt graphs
 
Bn31231239
Bn31231239Bn31231239
Bn31231239
 
Ce31342345
Ce31342345Ce31342345
Ce31342345
 
On the Equality of the Grundy Numbers of a Graph
On the Equality of the Grundy Numbers of a GraphOn the Equality of the Grundy Numbers of a Graph
On the Equality of the Grundy Numbers of a Graph
 
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles  An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
 
X4102188192
X4102188192X4102188192
X4102188192
 
On the equality of the grundy numbers of a graph
On the equality of the grundy numbers of a graphOn the equality of the grundy numbers of a graph
On the equality of the grundy numbers of a graph
 

More from graphhoc

ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...graphhoc
 
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...graphhoc
 
Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet  Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet graphhoc
 
A Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control ManetA Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control Manetgraphhoc
 
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices graphhoc
 
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 A Review of the Energy Efficient and Secure Multicast Routing Protocols for ... A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...graphhoc
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text graphhoc
 
Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective  Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective graphhoc
 
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...graphhoc
 
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidanceFault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidancegraphhoc
 
Enhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksEnhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksgraphhoc
 
Simulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networksSimulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networksgraphhoc
 
Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...graphhoc
 
Simulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real lifeSimulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real lifegraphhoc
 
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...graphhoc
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...graphhoc
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...graphhoc
 
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATIONACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATIONgraphhoc
 
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...graphhoc
 
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor NetworksThe Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networksgraphhoc
 

More from graphhoc (20)

ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
 
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
 
Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet  Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet
 
A Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control ManetA Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control Manet
 
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
 
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 A Review of the Energy Efficient and Secure Multicast Routing Protocols for ... A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text
 
Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective  Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective
 
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
 
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidanceFault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
 
Enhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksEnhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networks
 
Simulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networksSimulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networks
 
Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...
 
Simulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real lifeSimulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real life
 
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
 
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATIONACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
 
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
A Proposal Analytical Model and Simulation of the Attacks in Routing Protocol...
 
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor NetworksThe Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
The Neighborhood Broadcast Problem in Wireless Ad Hoc Sensor Networks
 

Recently uploaded

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 

Recently uploaded (20)

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 

New classes of odd graceful graphs

  • 1. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.2, June 2013 DOI : 10.5121/jgraphoc.2013.5201 1 New Classes of Odd Graceful Graphs M. E. Abdel-Aal Department of Mathematics, Faculty of Science, Benha University, Benha 13518, Egypt mohamed_el77@yahoo.com ABSTRACT In this paper, we introduce the notions of m-shadow graphs and n-splitting graphs, 2≥m , 1≥n . We prove that, the m-shadow graphs for paths, complete bipartite graphs and symmetric product between paths and null graphs are odd graceful. In addition, we show that, the m-splitting graphs for paths, stars and symmetric product between paths and null graphs are odd graceful. Finally, we present some examples to illustrate the proposed theories. KEYWORDS Odd graceful, m-shadow graph, m-splitting graph, Symmetric product. 1. INTRODUCTION Graph labeling have often been motivated by practical problems is one of fascinating areas of research. A systematic study of various applications of graph labeling is carried out in Bloom and Golomb [1]. Labeled graph plays vital role to determine optimal circuit layouts for computers and for the representation of compressed data structure. The study of graceful graphs and graceful labelling methods was introduced by Rosa [2]. Rosa defined a β-valuation of a graph G with q edges as an injection from the vertices of G to the set {0, 1, 2, . . . , q} such that when each edge xy is assigned the label |f (x) − f (y)|, the resulting edge labels are distinct. β-Valuations are the functions that produce graceful labellings. However, the term graceful labelling was not used until Golomb studied such labellings several years later [3]. The notation of graceful labelling was introduced as a tool for decomposing the complete graph into isomorphic subgraphs. We begin with simple, finite, connected and undirected graph G = (V, E) with p vertices and q edges. For all other standard terminology and notions we follow Harary[5]. Gnanajothi [6] defined a graph G with q edges to be odd graceful if there is an injection f from V(G) to {0, 1, 2, . . . , 2q-1} such that, when each edge xy is assigned the label f(x) - f(y). Seoud and Abdel-Aal [7] determine all connected odd graceful graphs of order at most 6 and they proved that if G is odd graceful, then G ∪ Km ,n is odd graceful for all m, n ≥ 1. In addition, they
  • 2. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.2, June 2013 2 proved that many families of graphs such as splitting of complete bipartite graph, Cartesian product of paths, symmetric product for paths with null graph, conjunction of paths and conjunction of paths with stars are odd graceful. We know that, the shadow graph D2(G) of a connected graph G is constructed by taking two copies of G say and . Join each vertex u in to the neighbors of the corresponding vertex v in . Also we know that, the splitting graph G is obtained by adding to each vertex v a new vertex such that is adjacent to every vertex which is adjacent to v in G. The resultant graph is denoted by Spl(G). Vaidya and Lekha [8] proved that the shadow graphs of the path Pn and the star K1,n are odd graceful graphs. Further they proved in [9] that the splitting graphs of the star K1,n admit odd graceful labeling. Moreover, Sekar [10] has proved that the splitting graph of path is odd graceful graph. Also, Seoud and Abdel-Aal [7] proved that Spl ( mnK , ), Spl (Pn  2K ). In this paper, we introduce an extension for shadow graphs and splitting graphs. Namely, for any integers 1≥m , the m-shadow graph denoted by )(GDm and the m- splitting graph denoted by Splm(G) which are defined as follows: Definition 1.1. The m-shadow graph Dm(G) of a connected graph G is constructed by taking m- copies of G , say mGGGG ,...,,, 321 , then join each vertex u in Gi to the neighbors of the corresponding vertex v in Gj , mji ≤≤ ,1 . Definition 1.2. The m- splitting graph Splm(G) of a graph G is obtained by adding to each vertex v of G new m vertices, say m vvvv ...,,,, 321 , such that i v , mi ≤≤1 is adjacent to every vertex that is adjacent to v in G. By definitions, the 2-shadow graph is the known shadow graph D2(G) and the 1- splitting graph is the known splitting graph. In our study, we generalize some results on splitting and shadow graphs by showing that, the graphs Dm(Pn), Dm (Pn ⊕ 2K ), and Dm(Kr,s) for each 1,,, ≥srnm are odd graceful. Moreover, we also show that the following graphs Splm(Pn), Splm(K1,n), Splm (Pn ⊕ 2K ) are odd graceful. ' G '' G ' G '' G ' v ' v
  • 3. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.2, June 2013 3 2. MAIN RESULTS Theorem 2.1. Dm(Pn) is an odd graceful graph for all m, n  2. Proof. Consider m-copies of Pn. Let j n jjj uuuu ...,,,, 321 be the vertices of the jth -copy of Pn , mj ≤≤1 . Let G be the graph Dm(Pn), then |V (G)| = mn and q = |E(G)| = m2 (n − 1). We define f : V(G) → {0, 1, 2, …, 2 m2 (n − 1) - 1} as follows:     ≤≤−=−+− ≤≤−=−−−−− = .1,1...,,6,4,2)1(2)2( ,1,1...,,5,3,1)1(2)1(12 )( 2 2 mjnornijim mjnornijmimq uf j i The above defined function f provides odd graceful labeling for Dm(Pn). Hence Dm(Pn) is an odd graceful graph for each 1, ≥nm . Example 2.2. An odd graceful labeling of the graph D4(P6) is shown in Figure 1. Figure 1: The graph D4 (P6) with its odd graceful labeling. Theorem 2.3. Dm(Kr,s) is an odd graceful graph for all m, r, s ≥ 1. Proof. Consider m-copies of Kr,s. Let j r jjj uuuu ...,,,, 321 and j s jjj vvvv ...,,,, 321 be the vertices of the jth -copy of Kr,s , mj ≤≤1 . Let G be the graph Dm(Kr,s), then |V (G)| = m(r+s) and q = |E(G)| = m2 rs. We define f : V(G) → {0, 1, 2, …, 2 m2 rs - 1} as follows: .1,1),1(2)1(2)( mjrijriuf j i ≤≤≤≤−+−= .1,1),1(2)1(212)( mjsijmrsimrqvf j i ≤≤≤≤−−−−−=
  • 4. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.2, June 2013 4 Above defined labeling pattern exhausts all possibilities and the graph under consideration admits odd graceful labeling. Hence Dm(Kr,s) is an odd graceful graph for each m, r, s ≥ 1. Example 2.4. An odd graceful labeling of the graph D3(K3,4) is shown in Figure 2. Figure 2: The graph D3(K3,4) with its odd graceful labeling. Remark 2.5. In Theorem 2.1, if we take m = 2 we obtain the known shadow path also, when we take m = 2, r = 1 in Theorem 2.3 we obtain the known shadow star. These special cases of our results are coincided with Vaidya’s results in [8, theorems 2.6, 2.4]; respectively. Let G1 and G2 be two disjoint graphs. The symmetric product (G1 ⊕ G2) of G1 and G2 is the graph having vertex set V(G1) × V(G2) and edge set{(u1, v1) (u2, v2): u1u2∈ E(G1) or v1v2 ∈ E(G2) but not both}[4]. In [11] Seoud and Elsakhawi shown that P2 ⊕ 2K is arbitrary graceful, and in [7] Seoud and Abdel-Aal proved that the graphs Pn ⊕ mK , m , n ≥ 2 are odd graceful. The next theorem shows that the m-shadow of (Pn  2K ) for each m, n ≥ 2 is odd graceful. Theorem 2.6. The graph Dm (Pn ⊕ 2K ) , m , n ≥ 2 is odd graceful.
  • 5. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.2, June 2013 5 Proof. Let 11 3 1 2 1 1 ...,,,, nuuuu , 11 3 1 2 1 1 ...,,,, nvvvv be the vertices of Pn ⊕ 2K and suppose j n jjj uuuu ...,,,, 321 , j n jjj vvvv ...,,,, 321 be the jth -copy of Pn ⊕ 2K , mj ≤≤1 . Then the graph G = Dm (Pn ⊕ 2K ) can be described as indicated in Figure 3. 1 1v 1 2v 2 1v m v1 m v2 m nvm v3 m nv 1− 2 3v 1 3v 1 nv 2 nv 2 1u m u1 1 2u 2 2u m u 2 m u3 m nu 1− 1 3u 2 3u 1 nu 2 nu m nu 1 1u 1 1−nu 1 1−nv 2 1−nu 2 2v 2 1−nv Figure 3 Then the number of edges of the graph G is 4m2 (n-1). We define: f : V(G) → {0, 1, 2, …, 8 m2 (n-1)-1} as follows:      ==−+− ==−−−−− = .,...,2,1,,...6,4,2),1(4)2(4 ,...,2,1,,...5,3,1),1(8)1(4)12( )( 2 2 mjnijim mjnijmimq uf j i      ==−+− ==−+−−− = .,...,2,1,,...6,4,2,24)2(4 ,...,2,1,,...5,3,1,1]24)1(2[2 )( 2 2 mjnijjm mjnimmjimq vf j i In accordance with the above labeling pattern the graph under consideration admits odd graceful labeling. Hence Dm (Pn  2K ) is an odd graceful graph for each m, n ≥ 1.
  • 6. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.2, June 2013 6 Example 2.7. An odd graceful labeling of the graph D3(P4  2K ) is shown in Figure 4. Figure 4: The graph D3(P4 ⊕ 2K ) with its odd graceful labeling. Theorem 2.8. The graph D2 (Pn × P2), n ≥ 2 is odd graceful. Proof. Let 11 3 1 2 1 1 ...,,,, nuuuu , 11 3 1 2 1 1 ...,,,, nvvvv be the vertices of Pn × P2 and suppose 22 3 2 2 2 1 ...,,,, nuuuu , 22 3 2 2 2 1 ...,,,, nvvvv , be the second copy of Pn × P2. The graph G= D2(Pn × P2) is described as indicated in Figure 5. 1 2u 1 3u 1 nu1 1u 1 1−nu1 4u 1 1v 1 2v 1 3v 1 nv1 1−nv1 4v 2 2u 2 3u 2 nu2 1u 2 1−nu2 4u 2 1v 2 2v 2 3v 2 4v 2 1−nv 2 nv Clearly, the number of edges of the graph G is 12 n - 8. We define: f : V(G) → {0, 1, 2, …, 24n-17} as follows:      ==−+ ==+−−− = .2,1,,...6,4,2),23(4 ,2,1,,...5,3,1,1])1(6[2 )( jniji jnijiq uf j i
  • 7. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.2, June 2013 7      ==++− ==−− = .2,1,,...6,4,2,3)6(2 ,2,1,,...5,3,1),13(4 )( jnijiq jniji vf j i In view of the above defined labeling pattern the graph under consideration admits odd graceful labeling. Hence D2 (Pn × P2) is an odd graceful graph for each n ≥ 2. Example 2.9. An odd graceful labeling of the graph D2 (Pn × P2) is shown in Figure 6. Figure 6: The graph D2 (Pn × P2) with its odd graceful labeling. 3. THE M-SPLITTING GRAPHS Theorem 3.1. The graph Splm(Pn) for each 2, ≥nm is odd graceful. Proof. Let 00 3 0 2 0 1 ...,,,, nuuuu be the vertices of Pn and suppose j n jjj uuuu ...,,,, 321 , mj ≤≤1 be the jth vertices corresponding to 00 3 0 2 0 1 ...,,,, nuuuu , which are added to obtain Splm(Pn). Let G be the graph Splm(Pn) described as indicated in Figure 7 Figure 7 Then |V (G)| = n(m+1) and q = |E(G)| = (n − 1)(2m+1). We define f : V(G) → {0, 1, 2, …, 2 (n − 1)(2m+1) - 1} as follows: 0 1u 0 2u 0 3u 0 1−nu 0 nu 1 1u 1 2u 1 1−nu 1 nu m u1 m u2 m u3 m nu 1− m nu 1 3u 2 1u 2 2u 2 3u 2 1−nu 2 nu
  • 8. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.2, June 2013 8    −=− −=− = .1...,,6,4,22 ,1...,,5,3,1,2 )( 0 nornii norniiq uf i    ≤≤−=−+−− ≤≤−=−−− = .1,1...,,6,4,2,2)12)(1(2 ,1,1...,,5,3,1,)1(42 )( mjnorniijn mjnornijniq uf j i The above defined function f provides odd graceful labeling for the graph Splm(Pn). Hence Splm(Pn) is an odd graceful graph. Example 3.2. Odd graceful labeling of the graph Spl4(P7) is shown in Figure 8. Figure 8: The graph Spl4(P7) with its odd graceful labeling. Theorem 3.3. The graph Splm(K1,n ) is odd graceful. Proof. Let nuuuu ...,,,, 321 be the pendant vertices and 0u be the centre of K1,n , and j n jjj uuuu ...,,,, 210 , mj ≤≤1 are the added vertices corresponding to nuuuuu ...,,,,, 3210 to obtain Splm(K1,n ). Let G be the graph Splm(K1,n ). Then |V (G)| = (n+1)(m+1) and q = |E(G)| = n(2m+1). We define the vertex labeling function: f : V(G) → {0, 1, 2, …, 2n (2m+1) - 1} as follows: ,12)( 0 −= quf ,1),1(2)( niiuf i ≤≤−= ,1,2)12()( 0 mjnjquf j ≤≤−−= .1,1),1(2)(2)( mjniijmnuf j i ≤≤≤≤−++= In view of the above defined labeling pattern the graph under consideration admits odd graceful labeling. Hence Splm(K1,n ) is an odd graceful graph. Example 3.4. An odd graceful labeling of the graph Spl2(K1,4) is shown in Figure 9.
  • 9. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.2, June 2013 9 Figure 9: The graph spl2(K1,4) with its odd graceful labeling. Theorem 3.5. The graphs Splm (Pn  2K ) , m , n  2 are odd graceful. Proof. Let nn vvvvuuuu ...,,,,;...,,,, 321321 be the vertices of the graph Pn ⊕ and suppose j n jjj uuuu ...,,,, 321 , mj ≤≤1 be the jth vertices corresponding to nuuuu ...,,,, 321 and j n jjj vvvv ...,,,, 321 , mj ≤≤1 be the jth vertices corresponding to which are added to obtain Splm (Pn ⊕ 2K ). The graph Splm (Pn ⊕ 2K ) is described as indicated in Figure 10. Figure 10 Then the number of edges of the graph Splm (Pn ⊕ 2K ) = 4(2m+1)(n-1). 2K nvvvv ...,,,, 321 1 1v 1 2v 2 1v 2 2v m v 1 m v 2 m nvm v 3 m nv 1− 2 3v 1 3v 1 1−nv 2 1−nv 1 nv 2 nv 1 1u 2 1u m u 1 1 2u 2 2u m u 2 m nu 1− 1 3u 2 3u 1 1−nu 2 1−nu 1 nu 2 nu m nu 1u 2u 3u 1−nu 1v 2v 3v 1−nv nu nv
  • 10. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.2, June 2013 10 We define: f : V(Splm (Pn ⊕ 2K )) → {0, 1, 2, …8(2m+1)(n-1) - 1}. First, we consider the labeling for the graph Pn ⊕ 2K as follows:      −=−−+ −=−++− = .1,...6,4,2,6]4)12[(4 1,...5,3,1,1]2)12(2[2 )( nornimim nornimimq uf i      −=−+ −=+++− = .1,...6,4,2),2)(12(4 1,...5,3,1,3]2)12(2[2 )( norniim nornimimq vf i For labeling the added vertices mjnivu j i j i ≤≤≤≤ 1,1,, we consider the following two cases: Case(i): if i is odd, ni ≤≤1 we have the following labeling, for each mj ≤≤1 ,7]42)12(2[2)( ++−+−= mjimquf j i 1]22)12(2[2)( −+−+−= mjimqvf j i Case(ii): if i even, ni ≤≤2 and mj ≤≤1 we have the following labeling:      −=−−++ −=−−++ = .1,...6,4,2,6]3)12[(4 1,...5,3,1],13)12[(4 )( mormjmjim mormjmjim uf j i Now we label the remaining vertices j iv , if i even, ni ≤≤2 and ),2(mod1≡m mj ≤≤1 we have the following labeling:      −=−−++ =−−++ = 1,...6,4,2],12)12[(4 ,...5,3,1,6]2)12[(4 )( mjmjim mjmjim vf j i
  • 11. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.2, June 2013 11 if i even, ni ≤≤2 and ),2(mod0≡m mj ≤≤1 we have the following labeling:      =−−++ −=−−++ = .,...6,4,2,6]2)12[(4 1,...5,3,1],12)12[(4 )( mjmjim mjmjim vf j i In accordance with the above labeling pattern the graph under consideration admits odd graceful labeling. Hence Splm (Pn ⊕ 2K ) is an odd graceful graph. Example 3.6. Odd graceful labelings of graphs Spl2 (P4 ⊕ ) and Spl3 (P4 ⊕ 2K ) are shown in Figure (11a) and Figure (11b) respectively. 3v Figure (11a) ),2(mod0≡m Figure (11b), )2(mod1≡m Figure (11a), Figure (11b): The graphs spl2 (P4 ⊕ ) and Spl3 (P4 ⊕ ) with their odd graceful labelings respectively. Remark 3.7. In Theorem 3.1, 3.3, 3.5 if we take m = 1 we obtain the known splitting graphs (path, star and Pn ⊕ 2K ; respectively). These special cases of our results are coincided with the results which had been obtained in the articles (Sekar [10], Vaidya and Shah [9], Seoud and Abdel-Aal.[7] ; respectively). 2K 2K 2K
  • 12. International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol.5, No.2, June 2013 12 4. CONCLUSION Since labeled graphs serve as practically useful models for wide-ranging applications such as communications network, circuit design, coding theory, radar, astronomy, X-ray and crystallography, it is desired to have generalized results or results for a whole class, if possible. In this work we contribute two new graph operations and several new families of odd graceful graphs are obtained. To investigate similar results for other graph families and in the context of different labeling techniques is open area of research. REFERENCES [1] G. S. Bloom and S. W. Golomb, (1977) “Applications of numbered undirected graphs”, Proc. IEEE, Vol. 65, pp. 562-570. [2] A. Rosa, (1967) On certain valuations of the vertices of a graph, in Theory of Graphs, International Symposium, Rome, July 1966, Gordon and Breach, NewYork and Dunod, Paris, pp. 349–355. [3] S.W. Golomb, (1972) “How to number a graph, in Graph Theory and Computing”, R.C. Read, ed.,Academic Press, NewYork, pp. 23–37. [4] J. A. Gallian, (2012) A Dynamic Survey of Graph Labeling, Electronic J. Combin. Fiftteenth edition. [5] F. Harary, (1969) GpaphTheory, Addison-Wesley, Reading MA. [6] R.B. Gnanajothi, (1991) Topics in graph theory, Ph.D. thesis, Madurai Kamaraj University, India. [7] M.A. Seoud and M.E. Abdel-Aal, (2013) “On odd graceful graphs”, Ars Combin., Vol. 108, pp.161- 185. [8] S.K. Vaidy and B. Lekha, (2010) “New Families of Odd Graceful Graphs”, Int. J. Open Problems Compt. Math., Vol. 3, No. 5, pp. 166-171. [9] S.K. Vaidy and B. Lekha, (2010) “Odd Graceful Labeling of Some New Graphs”, Modern Applied Science Vol. 4, No. 10, pp. 65-70. [10] C.Sekar, (2002) Studies in Graph Theory, Ph.D. Thesis, Madurai Kamaraj University. [11] M. A. Seoud and E. A. Elsahawi, (2008) On variations of graceful labelings, Ars Combinatoria, Vol. 87, pp. 127-138. AUTHOR Mohamed Elsayed Abdel-Aal received the B.Sc. (Mathematics) the M.Sc.(Pure Mathematics-Abstract Algebra) degree from Benha University, Benha, Egypt in 1999, 2005 respectively. Also, he received Ph.D. (Pure Mathematics) degree from Faculty of Mathematics, Tajik National University, Tajikistan, in 2011. He is a University lecturer of Pure Mathematics with the Ben ha University, Faculty of Science, Department of Pure Mathematics. His current research is Ordinary –partial differential equations, Graph Theory and Abstract Algebra.