A Unified Approach to Image Recognition and Cryptography via Flexible Weak Inverse Property Quasigroups

Nonassociative algebra presents multiple options for comprehending and dealing with difficulties in graph theory, artificial intelligence, and cryptography. Its distinctive traits introduce genuine concepts and procedures not found in conventional associative algebra, yielding to new results from st...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohammad Mazyad Hazzazi, Muhammad Nadeem, Muhammad Kamran, Muhammad Arshad, Samuel Asefa Fufa
Format: Article
Language:English
Published: Wiley 2025-01-01
Series:Journal of Function Spaces
Online Access:http://dx.doi.org/10.1155/jofs/9426301
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Nonassociative algebra presents multiple options for comprehending and dealing with difficulties in graph theory, artificial intelligence, and cryptography. Its distinctive traits introduce genuine concepts and procedures not found in conventional associative algebra, yielding to new results from studies and breakthroughs in multiple disciplines. Vertex algebras are nonassociative binary operations providing a complete breakdown of graph structures. Algebra without associativity can be employed to strengthen the security guaranteed by specific cryptographic algorithms and protocols, as well as to establish new chances for accomplishing cryptographic targets such as encryption, hashing, and digital signatures. Quasigroup ∐, a generalization of both algebraic structures, loop groups, and groups, may possess a crucial role in future applications. This paper investigates the structural properties of the inverse graph ΩC2θ×K4,⊛1Sλ,ρ when compared to the finite flexible quasigroup C2θ×K4,⊛1. It also addresses the implementation of polynomial functions PTt in image and pattern detection, with emphasis on feature extraction and edge detection. The application of polynomials in imaging systems may improve recognizing object’s accuracy, curve fitting, and machine learning–based grouping, making them essential for computer vision modifications. Along with this, we made use of two classes of finite flexible non-G-quasigroups Y1 and finite weak inverse property G-quasigroups Y2 in cryptography.
ISSN:2314-8888