
Maheswari VeerasamyVels University · Mathematics
Maheswari Veerasamy
Doctor of Philosophy
About
41
Publications
9,173
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
69
Citations
Introduction
Coding and decoding using Graph Labeling concepts
Skills and Expertise
Publications
Publications (41)
In this paper, we promote Double encryption process of our secret text initially through Difference Labeling of Signed Graphs and then through the Vigenere Cipher technique. Thus we propose Double encryption and their corresponding decryption process thereby making prediction of secret text complicated.
Pharmaceutical firms have realised that increasing supply chain performance is critical to sustaining a
competitive advantage in today's market.. Some areas in which managers need to determine their
organizational goals and balance their entry-related implications are Prediction, strategy, acquisition,
financing, inventory levels, and business p...
In this paper, we estimate the control policies for deteriorating products with various costs by using exponential function. Deteriorating inventory models with exponential function of various costs with shortage are developed. Shortages are acceptable in a production process that is operating well. The fully backlogged portion balances this. Due t...
Cryptography is a concept to protect information and communication from adversaries through the use of codes. Graph theory is ultimately the study of graphs. In this paper we are using cryptographic technique together with graph labeling to protect our message being hacked by any adversaries as well as safeguarding the communication. This paper pro...
Cryptography involves in confidentiality, authentication and data security which is an Art of converting readable text or image into an unreadable format, which is easily unbreakable. In recent times, cryptography adopting a many new techniques to protect or hide our communication from any malicious party. In this paper, we proposed a method of enc...
Cryptography is the study of methodologies to promote secure communications by hiding or converting the original information to some unintelligible form. Graph Labeling is allocation of integers to edges and vertices of a graph following a set of conditions. Cryptography and graph theory are inextricably linked to each other since time immemorial....
Cryptography is the science of using codes for secure transmission of information enabling the intended recipient alone to process its content thereby preventing the invention of any adversaries. The assignment of integers to the nodes and edges of graph adopting certain conditions is Graph theory. In today's world both Cryptography and Graph theor...
In this research paper we transmit the data or message to the receiver using the optimisedweight Injective technique on a family of certain acyclic graphs. Weight injective labeling is a class of graphs labeling widely used in networking of communication channels. Labeling is a technique used to number each vertex or edge with non-negative values....
DryasOctopetala is a flowering plant that grows near the arctic and mountain region. DryasOctopetala structure is used to develop a graph called D8O. The D8O graph is divided into two segments Petal and Pistil. Consider the Pistil of the flower to be a Wheel Graph by avoiding the hub and spokes of the wheel. Take each corner of petals to be vertex...
This research work focuses on the strategies for coding a text message is enunciated by changing plain text into cipher text through graph lebeling and GMJ coding. Illustrations are provided using three star graphs K1,λ ∧ K1,μ ∧ K1,θ by applying the mean labeling to it at two altered situations θ = λ + μ when λ > 9 and θ = λ + μ − 7 when λ > 9.
In this paper we define the concept of a dense element in a B-Almost Distributive Fuzzy Lattice BADFL (,) and prove that the set () of all dense elements of is an implicative filter of. Also, we establish a fuzzy epimorphism of (,) into (* ,) the set of all closed elements of(,) and prove the existence of an fuzzy epimorphism of () into (* ×). We p...
In this paper we define the concept of a dense element in a B-Almost Distributive Fuzzy Lattice BADFL (𝐵, 𝐴) and prove that the set 𝐷𝐴(𝐵) of all dense elements of 𝐵 is an implicative filter of 𝐵. Also, we establish a fuzzy epimorphism of (𝐵,𝐴) into (𝐵∗, 𝐴) the set of all closed elements of(𝐵,𝐴) and prove the existence of an fuzzy epimorphism of 𝐷𝐴(...
Any project is considered to involve integration of various activities and this is considered to be
one of the challenging job of a manager. Many aspects must be examined on what to coordinate most of
these tasks in order to develop a good plan and track the project plan. CPM and PERT, both close by
related activity research methodology, are now...
Assignment problems (AP) are well-known topics in engineering and management
science and are used frequently to analyze problems. A linear programming problem form was
used in transforming assignment problem for crisp problem and in solving as per Hungarian
methodology. Assigning n objects over m objects is an exciting problem that arises in dif...
In this paper, an efficient encryption process using Trifid Cipher accompanied with Graceful Labeling is elaborated. The Trifid Cipher is a trigraphic cipher which uses a 3x3x3 key cube for plaintext encryption and combines the concepts of Substitution cipher along with Transposition and Fractionation techniques making it highly resistant to freque...
In present scenario, a one-time pad dealing with cryptography is used to safeguard our communication from any intruder. DNA is a long chain molecule. It has a different combination of four nitrogenous bases, namely A (adenine), T (thymidine), C (cytosine), and G (guanine). This paper presents an enhanced DNA structure for the implementation of a on...
Cryptography plays a major role in hiding the data. It converts the plaintext into ciphertext in order to secure data. Ciphertext is a form of coding which should not reveal the secrecy. Quintuple Square is a 5x5 table grid with alphabets or symbols. This square table is used to get a ciphertext. Quintuple square encrypts the pairs of letters, whic...
Using the non commutative nature of an ADL we extend the concept of BADFLs to skew BADFLs. We also characterize skew BADFLs in terms of a congruence relation defined thereon and a few set of conditions associated with BADFL along with an induced boolean operation defined thereom. Further we show that every congruence class may be a maximal rectangu...
In this research article we examinedfew results on Double Mean Labelling on somewhere onthe path of the graphs. This content can be expanded to network graphs of higher dimensions, since each graph consists of a path. In previous theory we have proved the results under Double Mean Labelling on the path graph for all n. Here we compute the graph for...
In this paper, we introduced the concept of Local Ideals of B-ADFL. Some types of ideals such as Super Ideals, Ultra Ideals, Hyper Ideals are provided in a B-Almost Distributive Fuzzy Lattice and derive their properties. We obtain relationship between these ideals.
This is an Open Access Journal / article distributed under the terms of the Creative Commons Attribution License (CC BY-NC-ND 3.0) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. All rights reserved. Present day network security plays a major role in any organization. All t...
Supply chains of large companies include many companies around the world (retailers,
wholesalers, factories, and suppliers) and many parts and products. The objectives of corporate
supply chains are to provide customers with the products they need optimally, efficiently, and
productively. Part of the development and advancement of distribution c...
Cryptography is the branch of Discrete Mathematics which deals with the transmission of secret communications between intended parties without the knowledge of third party. Graph theory is the enchanting field if Mathematics that designate integers to edges and vertices through some established functions. In current scenario security of communicati...
In this paper, we have disccussed an algorithm for encryption and decryption using matrix theory and we have worked two examples for this algorithm.
Evolution of wireless technology created tremendous change in this era. Large quantities of messages are registered, altered, and transmitted through wireless or network cable by fixed devices. Privacy of the transmitted message is a main concern in networks. A diversified encryption algorithm has been suggested in these years to preserve the messa...
The Logistics and Production Network Administration agrees that this is a mandatory research area, although there are some written reviews and examinations on this field. Operations research, which is also known as ‘Science of Better’ deals with mathematical models in order to take better decisions with better alternative options. A review of chron...
In this Research paper we examine the encryption technique by defining new functions on the face wheel graph. Instead of passing a message we have used digits as a message. These digits will be sealed by function of labeling. The resulting graph is represented as a Cipher Graph which is transferred to the receiver. Decryption process is done using...
In this article, we introduce the special labeling for the Duplicate Graph of behavior thespecial graph of Circular Polygon Graph.DG(CPGk) k ≥ 2, On signed product, Bi conditional cordial and Sum divisor cordial labeling are admits.
A message is encoded using one-time pad Cipher and Huffman coding with certain algorithm. Encoding process is done using a symmetric key known to sender and receiver. Then we get the encoded message as Ciphertext with a binary tree. Using the binary tree we form a prefix code of Huffman coding and we define a new labeling function of edge and verte...
In this paper, we design plaintext through product edge labeling for a Cyclegraph. The edge labels thus obtained is further processed through Caesar cipher method. The ciphertext thus obtained is subjected to Bifid Cipherfor which we apply matrix multiplication. The decryption is performed usingInverse matrix multiplication and subsequent applicati...
In this paper, We prove that cycle C n is a difference modulo labeled graph. We investigate the graph P n 2 and C 3 ( t ) is a difference modulo labeling. Here, the formulated edge labeling is considered as plaintext and with the help of affine cipher, we investigate a method of encryption and decryption of a message for the system of secured commu...
In this article we admit Bi- Conditional for Duplicate graph of Quadrilateral Snake EDG ( QS m ) m ≥ 2, Double Quadrilateral SnakeGraphs EDG ( DQS m ) m ≥ 2, and Triangular ladder graph. EDG ( TQL m ) m ≥ 2.
Instant Insanity puzzle is a game with four cubes of faces colored with four colors. We stack the cubes in a column. Here we consider six cubes of faces denoted with six faces. Six cubes are placed one above the other to form stack like structure. A multi-graph is implemented using an Instant Insanity puzzle with faces named of even numbers. These...
In this paper, we discuss about the connection between graph theory and cryptography. We use the spanning tree concept of graph theory to encryption the message.