A Unified Approach to Image Recognition and Cryptography via Flexible Weak Inverse Property Quasigroups
Nonassociative algebra presents multiple options for comprehending and dealing with difficulties in graph theory, artificial intelligence, and cryptography. Its distinctive traits introduce genuine concepts and procedures not found in conventional associative algebra, yielding to new results from st...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2025-01-01
|
Series: | Journal of Function Spaces |
Online Access: | http://dx.doi.org/10.1155/jofs/9426301 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Nonassociative algebra presents multiple options for comprehending and dealing with difficulties in graph theory, artificial intelligence, and cryptography. Its distinctive traits introduce genuine concepts and procedures not found in conventional associative algebra, yielding to new results from studies and breakthroughs in multiple disciplines. Vertex algebras are nonassociative binary operations providing a complete breakdown of graph structures. Algebra without associativity can be employed to strengthen the security guaranteed by specific cryptographic algorithms and protocols, as well as to establish new chances for accomplishing cryptographic targets such as encryption, hashing, and digital signatures. Quasigroup ∐, a generalization of both algebraic structures, loop groups, and groups, may possess a crucial role in future applications. This paper investigates the structural properties of the inverse graph ΩC2θ×K4,⊛1Sλ,ρ when compared to the finite flexible quasigroup C2θ×K4,⊛1. It also addresses the implementation of polynomial functions PTt in image and pattern detection, with emphasis on feature extraction and edge detection. The application of polynomials in imaging systems may improve recognizing object’s accuracy, curve fitting, and machine learning–based grouping, making them essential for computer vision modifications. Along with this, we made use of two classes of finite flexible non-G-quasigroups Y1 and finite weak inverse property G-quasigroups Y2 in cryptography. |
---|---|
ISSN: | 2314-8888 |