0% found this document useful (0 votes)
45 views4 pages

Applications of Graph Theory in Science and Computer Science

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views4 pages

Applications of Graph Theory in Science and Computer Science

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

International Journal of Advances in Engineering and Management (IJAEM)

Volume 2, Issue 6, pp: 736-739 www.ijaem.net ISSN: 2395-5252

Applications of Graph Theory in Science and Computer


Science
Dr. Gurusharan Kaur1 Dr. Namrata Tripathi2 Dr. Mona Verma3
Asst. Prof.(Dept. of Computer Science/ Mathematics ) Career College, Bhopal (M.P)
Asst. Prof.(Department of Mathematics ) Govt. PG. College,Rajgarh (M.P)
Asst. Prof.(Department of Mathematics ) Govt. PG. College, Narsinghgarh (M.P)

----------------------------------------------------------------------------------------------------------------------------- ----------
Date of Submission: 15-09-2020 Date of Acceptance: 29-09-2020
----------------------------------------------------------------------------------------------------------------------------- ----------

ABSTRACT: Graph Theory is one of the tremendousapplications say traveling salesman


significant and important area in Mathematics , problem, database design concepts, resource
which is used in Network Security. Cryptography networking. This leads to thedevelopment of new
is art of science to achieving security by encoding algorithms and new theorems that can be used in
message to make it non-readable (secretive) to tremendous applications.
unintended users. Many techniques are presents to This paper has beendivided into two sections. First
encrypt plain text and convert it to the cipher section gives the application of graph theory in
text[2]. Any cryptographic scheme is secure if and Sciences. Second section emphasizes how graph
only if it is unbreakable in reasonable time, using theory is utilized in various technical (Computer
feasible resources in spite of the intruder’s being Science)fields.
aware of the encryption and decryption algorithm
and size of the key. In the proposed algorithm, Section – I
adjacent matrix of graph can be used to obtain key History of Graph theory:
for encryption and decryption which is safer The origin of graph theory started with the
compared to other keys. problem of Koinsbergbridge, in 1735. This
Keywords: adjacent matrix, sparse, symmetric, problem lead to the concept of Eulerian Graph.
asymmetric,trading graph. Euler studied the problem of Koinsberg bridge and
constructed a structure to solve the problem called
I. INTRODUCTION: Eulerian graph. In 1840, A.F Mobius gave the idea
Graph theory is rapidly moving into the of complete graph and bipartite graph
mainstream of mathematics mainly because of its andKuratowski proved that they are planar by
applications in diverse fields which include means of recreational problems. The concept of
Biology,Electronic engineering , Communication tree, (a connected graph without cycles[10]) was
Networks and Mathematics. The wide scope of implemented by Gustav Kirchhoff in 1845, and he
these and other applications has been well- employed graph theoretical ideas in the calculation
documented cf. [1][6]. The powerful combinatorial of currents in electrical networks or circuits. In
methods found in graph theory have also been used 1852, Thomas Gutherie found the famous four
to prove significant and well-known results in a color problem. Then in 1856, Thomas. P. Kirkman
variety of areas in mathematics itself.. There are and William R.Hamilton studied cycles on
many examples of applications of graph theory to polyhydra and invented the concept called
other parts of mathematics[7]. Graph theoretical Hamiltonian graph by studying trips that visited
ideas are highly utilized in Technology. Especially, certain sites exactly once. In 1913,
in research areas ofcomputer science such data H.Dudeneymentioned a puzzle problem.
mining, image segmentation, clustering, image Eventhough the four color problem was invented it
capturing, networking etc., For examplea data was solved only after a century by Kenneth Appel
structure can be designed in the form of tree which and Wolfgang Haken. This time is considered as
in turn utilized vertices and edges. Similarly, the birth of Graph Theory.
modeling ofnetwork topologies can be done using
graph concepts. In the same way the most Applications of Graph theory in Sciences :
important concept of graph coloringis utilized in Graph theoretical concepts are widely
resource allocation, scheduling. Also, paths, walks used in different areas.They include study of
and circuits in graph theory are used in molecules, construction of bonds in chemistry and
DOI: 10.35629/5252-0206736739 | Impact Factor value 7.429 | ISO 9001: 2008 Certified Journal Page 736
International Journal of Advances in Engineering and Management (IJAEM)
Volume 2, Issue 6, pp: 736-739 www.ijaem.net ISSN: 2395-5252

the study of atoms. Similarly, Graph theory is used with group theory. Graph theory is a very natural
in biology and conservation efforts where a vertex and powerful tool in combinatorial operations
represents regions where certain species exist and research. Some important OR problems that can be
the edges represent migration path or movement solved using graphs are given here. A network
between the regions. This information is important called transport network where a graph is used to
when looking at breeding patterns or tracking the model the transportation of commodity from one
spread of disease, parasites and to study the impact place to another. The objective is to maximize the
of migration that affect other species.Graph flow or minimize the cost within the prescribed
theoretical concepts are widely used in Operations flow. The graph theoretic approach is found more
Research. For example, the traveling salesman efficient for these types ofproblems though they
problem,the shortest spanning tree in a weighted have more constraints [9].
graph, obtaining an optimal match of jobs and men
and locating the shortest path between two vertices Section – II:
in a graph. It is also used in modeling transport Graph Theory inComputer Science:
networks, activity networks and theory of games. Mathematically speaking trees are a
The network activity is used to solve large number special class of a graph. The relationship of trees to
of combinatorial problems. The most popular and a graph is very important in solving many problems
successful applications of networks in OR is the in Math’s and Computer Science. Trees and many
planning and scheduling of large complicated other definition of graph theory are having its
projects. The best well known problems are application in various field of computer science.
PERT(Project Evaluation Review Technique) and
CPM (Critical Path Method). Applications of Graph Theory in Artificial
Intelligence:
Graph Theory in Chemistry: Various AI troubles may be direct as the
Graph Theory is used to study molecules trouble of discovering a trail in a graph. A graph is
in chemistry, graph makes a natural model for a fabricated of arcs and nodes. Arcs are planned pairs
molecules,where vertices represent atom and edges of nodes which may contain connected
bonds.The importance of graph theory for expenditure. Many sort of trouble is frequently
chemistry stemsmainly from the existence of the resolved through a graph search technique. We
phenomenon of isomerism,which is rationalized by symbolize the trouble as an array of states that are
chemical structure theory. This theory accounts for snapshots of the world and operators that alter one
all constitutional isomers by using purely graph- state into a further States may be mapped to nodes
theoretical methods, which earlier chemists viewed of a graph and operators are the edges of the graph.
as 'tricks with points and lines (valencies)".Graphs Game tree used in artificial intelligence also uses
are used in the field of chemistry to model concept of graph theory.
chemical compounds. In computational
biochemistry some sequences of cell samples have Applications of Graph Theory in
to be excluded to resolve the conflicts between two communication network:
sequences. This is modeledin the form of graph Graph theory may be utilized to symbolize
where the vertices represent the sequences in the communication systems. A communications system
sample. An edge will be drawn between two is a compilation of links, nodes and terminals that
vertices if and only if there is a conflict between the join to facilitate telecommunication amid the
corresponding sequences. terminals users. Every terminal in the system
should encompass a inimitable address as a result
Graph Theory in Physics: connections or messages may be routed to the
In Physics, the three dimensional structure accurate receivers. The compilation of addresses in
of complicated simulated atomic structures can be the system is known as the address space. Each
studied quantitatively by gathering statistics on communications system has three fundamental
graph-theoretic properties related to the topology of constituents: terminals (the starting and stopping
the atoms.Forexample,Franzblau’s shortest- points of system), processors (that offer data
path(SP) rings. transmission control functions), transmission
channels (that assist in transmission of data).
Graph Theory in Mathematics: The communication system intends to convey data
In mathematics, graphs are useful in packets amid telephones, computers, processors or
geometry and certain parts of topology,e.g. Knot other appliances.
Theory . Algebraic graph theory has close links

DOI: 10.35629/5252-0206736739 | Impact Factor value 7.429 | ISO 9001: 2008 Certified Journal Page 737
International Journal of Advances in Engineering and Management (IJAEM)
Volume 2, Issue 6, pp: 736-739 www.ijaem.net ISSN: 2395-5252

Applications of Graph Theory in Social Applications of Graph Theory in Network


Networking sites Analysis: Security:
Rightnow, online social networking sites Until recently computer and network
is just like a trend and so it in popularity for sharing security has been formulate as a technical problem.
and accessing various information among friends, However, it is now widely recognized that most
society etc. Various sites are dedicated to security mechanisms cannot succeed without taking
sustaining the contacts and perform a good role as a into account the user (Patrick, Long, &Flinn,
mediator to share and keep relation between the 2003). A key area in security research is
users. Online social networks are a type of web, so authentication, the determination of whether a user
there is need to analyze for arranging, customizing should be allowed access to a given system or
and navigate information among users.The resource. Traditionally, alphanumeric passwords
properties of the Web graph have been studied have been used for authentication, but they are
extensively for analysis of social networking sites. known to have security and usability problems.

Applications of Graph Theory in Cloud Applications of Graph Theory in many other


Computing: fields in Computer science:
Today, Cloud computer plays an very  Graph theory is having its application in
important role in graph theory.Application of graph modeling
is in cloud computing technology is unique. This  Networking security to keep data safe.
technology is an open standard, service-based,  Used for representing and analysis of Social
Internet-centric, safe, convenient data storage and networking sites
network computing services. Cloud provides us  Application in data and Communications
three service models IaaS, PaaS and SaaS. Cloud networks
computing is actually an internet based model for  Used in Information network
assist convenient, on demand network access to a  Developers used Software design to represent
shared pool of configurable computing resources. different modules
The software,application, data all are save on  In Transportation networks
server instead of a personal data. These types of  In the field of Artificial Intelligence
services are provided by Cloud Computing.  In solving problem of neural network
A graphical authentication password is a The major role of graph theory in
verification program that works when the customer computer applications is the development of graph
uses proposed table on the basis of which data is algorithms. Numerous algorithms are used to solve
substituted. Proposed table is original and can be problems that are modeled in the form of graphs.
used by both sender and receiver to protect data. These algorithms are used to solve the graph
The algorithm is not easy to crack and it also theoretical concepts which intern used to solve the
enhanced security of the cloud from malicious corresponding computer science application
users. problems.
Cloud computing is a term used to Various computer languages are used to
describe both a platform and type of application. A support the graph theory concepts. The main goal
cloud computing platform dynamically provisions, of such languages is to enable the user to formulate
configures, reconfigures, and de-provisions servers operations on graphs in a compact and natural
as needed. Servers used in the cloud can be manner
physical machines or virtual machines. Advanced
clouds typically include other computing resources II. CONCLUSION:
such as storage area networks (SANs), network The main aim of this paper is to present
equipment, firewall and other security devices . the importance of graph theoretical ideas in various
Key Cloud Computing providers: IBM, HP, areas ofcomputer applications for researches that
Google, Microsoft, Amazon Web Services, they can use graph theoretical concepts for the new
Salesforce.com, NetSuite, VMware, EMC etc. research. An overview ispresented especially to
Examples of Cloud Computing services includes project the idea of graph theory. So, the graph
Google Docs, Office 365, Drop Box, SkyDrive, theory section of each paper is givenimportance
facebook etc. than to the other sections. Researches may get
some information related to graph theory and
itsapplications in computer field and can get some
ideas related to their field of research.

DOI: 10.35629/5252-0206736739 | Impact Factor value 7.429 | ISO 9001: 2008 Certified Journal Page 738
International Journal of Advances in Engineering and Management (IJAEM)
Volume 2, Issue 6, pp: 736-739 www.ijaem.net ISSN: 2395-5252

REFERENCES:
[1]. AshayDharwadker, (2006), The Vertex
Cover Algorithm. http:// www.
dharwadker. org/ vertex_cover
[2]. AshayDharwadker, (2006), The Vertex
ColoringAlgorithm.http://www.dharwadke
r.org/ vertex_coloring
[3]. AshayDharwadker,(2000),A New Proof of
The Four Colour Theorem, 2000, http://
www.dharwadker.org
[4]. AshayDharwadker, (2004), A New
Algorithm for finding Hamiltonian Circuits,
http:// www. dharwadker.org/ hamilton
[5]. E. Bertram and P. Horak, (1999),Some
applications of graph theory to other parts of
mathematics, The Mathematical
Intelligencer (Springer - Verlag, New York)
6-11.
[6]. F. S. Roberts, (1978), Graph theory and its
applications to the problems of society,
CBMS-NSF Monograph 29, SIAM
Publications, Philadelphia.
[7]. J.A. Bondy and U.S.R. Murty, Graph Theory
with Applications, (1976), Elsevier Science
Publishing Company Inc.
[8]. L. Caccetta and K. Vijayan, (1986),
Applications of graph theory, Fourteenth
Australasian Conference on Combinatorial
Mathematics and Computing (Dunedin),
Ars. Combin., Vol.23, 21-77.
[9]. NarasinghDeo, “Graph theory with
applications to engineering and computer
science”, Prentice Hall of India, 1990.
[10]. S.G.Shrinivas ,S.Vetrivel and N.M. Eiango,
(2010),“Applications of Graph Theory in
Science an Overview”, International Journal
of Engineering Sciece and Technology,Vol.
2(9),4610-4621.

DOI: 10.35629/5252-0206736739 | Impact Factor value 7.429 | ISO 9001: 2008 Certified Journal Page 739

You might also like