Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
2 result(s) for "dual fuzzy hypergraph"
Sort by:
A Fuzzy Hypergraph-Based Framework for Secure Encryption and Decryption of Sensitive Messages
The growing sophistication of cyber-attacks demands encryption processes that go beyond the confines of conventional cryptographic methods. Traditional cryptographic systems based on numerical algorithms or standard graph theory are still open to structural and computational attacks, particularly in light of advances in computation power. Fuzzy logic’s in-built ability to manage uncertainty together with the representation ability of fuzzy hypergraphs for describing complex interrelations offers an exciting avenue in the direction of developing highly evolved and secure cryptosystems. This paper lays out a new framework for cryptography using fuzzy hypergraph networks in which a hidden value is converted into a complex structure of dual fuzzy hypergraphs that remains completely connected. This technique not only increases the complexity of the encryption process, but also significantly enhances security, thus making it highly resistant to modern-day cryptographic attacks and appropriate for high security application. This approach improves security through enhanced entropy and the introduction of intricate multi-path data exchange through simulated nodes, rendering it highly resistant to contemporary cryptographic attacks. It ensures effective key distribution, accelerated encryption–decryption processes, and enhanced fault tolerance through dynamic path switching and redundancy. The adaptability of the framework to high-security, large-scale applications further enhances its robustness and performance.
Bipolar fuzzy soft information applied to hypergraphs
Soft set theory is the most developed tool for demonstrating uncertain, vague, not clearly defined objects in a parametric manner. Bipolar uncertainty incorporates a significant role in apprehending discrete and applied mathematical modeling and decision analysis of various physical systems. Graphical and algebraic structures can be studied more precisely when bipolar parametric linguistic properties are to be dealt with, emphasizing the need of a bipolar mathematical approach with soft set theory. In this research paper, we apply the powerful technique of bipolar fuzzy soft sets to hypergraphs and present a novel framework of bipolar fuzzy soft hypergraphs. We elaborate various methods for the construction of bipolar fuzzy soft hypergraphs. We discuss the concept of linearity in bipolar fuzzy soft hypergraphs and study isomorphism properties of bipolar fuzzy soft line graphs of bipolar fuzzy soft hypergraphs, dual and 2-section of bipolar fuzzy soft hypergraphs. We present an application of bipolar fuzzy soft information for analyzing chat conversations of pedophiles and detecting online child grooming cases.