SlideShare a Scribd company logo
1 of 4
ASSIGNMENT # 1
Submitted to:
Mam Hina Qurashi
Submitted by:
Rabia Zafar
17581556-045
Section ‘A’
BS IT
4th semester
Applications of linear algebra in field of IT
Linear algebra:
Linear algebra provides concepts that are crucial to many areas
of computer science, including graphics, image processing, cryptography,
machine learning, computer vision, optimization, graph algorithms,
quantum computation, computational biology, information retrieval and
web search.
Algebra is used in computerscience in many ways: Boolean algebra for
evaluating code paths, error correcting codes, processor optimization,
relational database design/optimization, and so forth.
1. Internet search
2. Network model
3. Machine learning
4. Graphs
5. Bioinformatics
6. Scientific computing
7. Data mining
8. Computer vision
9. Cryptography
10. Matrix computations
11. Parallel computing
Matrix computations:
Matrix computations are used in computer programming in many ways:
graphics, state-space modeling, arithmetic, ad hoc business logic, and so
forth.
Linear algebra as a sub-discipline is often taught in one of two ways: from a
computationalaspect of things, which focuses on matrices, their properties,
and operations on matrices; or, algebraically, where linear mappings are
treated as algebraic structures, and one studies, for instance, the group
theoretic relations that arise.In either case, you will not need to try too hard
to find situations where knowledge of either theoretical linear algebra or
matrix mathematics will be necessary.
Graphs:
Graph is very important part of computerscience. Graph theory is the
study of graphs which are mathematical structures used to model pairwise
relations between objects. A graph in this context is made up of
vectors, nodes, or points which are connected by edges, arcs, or lines. Linear
algebra is very important for solution of graphs in field of IT.
Machine learning:
The concepts of Linear Algebra are crucial for understanding thetheory
behind Machine Learning, especiallyfor Deep Learning. Theygive you better
intuition for how algorithms really work under the hood, which enables you
to make betterdecisions. Soif you really want to be a professionalin this
field, you cannot escape mastering some of its concepts. This post will give
you an introduction to the most important concepts of Linear Algebra that
are used in Machine Learning.
Network model:
For designing network models, linear algebra is also very helpful. We
required n no of hosts in a large network, n(n � 1)=2 (undirected) paths
between them, Want latency and packet loss rates for each path, Use info to
choose servers, route around faults. We make these models with the help of
linear algebra easily.
Cryptography:
Encryption and decryption require the use of some secret information,
usually refers to as a key. Example: let the message be, “PREPARE TO
NEGOTIATE”
WE ASSIGNA NUMBER FOR EACH LETTER OF ALPHABET.
Scientific computing:
Scientific computing is the science of solving problems with computers. The
problems themselves usually arise from other disciplines such as
mathematics, engineering, biology, physics, chemistryand other natural
sciences. As a consequence, scientific computing is interdisciplinary by
nature. Linear algebra help us to solve these type of problems.
END

More Related Content

What's hot

Discrete Mathematics Presentation
Discrete Mathematics PresentationDiscrete Mathematics Presentation
Discrete Mathematics PresentationSalman Elahi
 
Electrical Networks Application in linear algebra
Electrical Networks Application in linear algebraElectrical Networks Application in linear algebra
Electrical Networks Application in linear algebraSami Ullah
 
Application of linear algebra in electric circuit
Application of linear algebra in electric circuitApplication of linear algebra in electric circuit
Application of linear algebra in electric circuitsadam2425
 
Matrix chain multiplication
Matrix chain multiplicationMatrix chain multiplication
Matrix chain multiplicationRespa Peter
 
Engineering mathematics presentation
Engineering mathematics presentationEngineering mathematics presentation
Engineering mathematics presentationAfzal Hossen
 
Elliptic Curve Cryptography: Arithmetic behind
Elliptic Curve Cryptography: Arithmetic behindElliptic Curve Cryptography: Arithmetic behind
Elliptic Curve Cryptography: Arithmetic behindAyan Sengupta
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve CryptographyKelly Bresnahan
 
Number theory and cryptography
Number theory and cryptographyNumber theory and cryptography
Number theory and cryptographyYasser Ali
 
Pseudo Random Number Generators
Pseudo Random Number GeneratorsPseudo Random Number Generators
Pseudo Random Number GeneratorsDarshini Parikh
 
Diagonalization of Matrices
Diagonalization of MatricesDiagonalization of Matrices
Diagonalization of MatricesAmenahGondal1
 
USE OF MATRIX IN ROBOTICS
USE OF MATRIX IN ROBOTICSUSE OF MATRIX IN ROBOTICS
USE OF MATRIX IN ROBOTICSHome
 
Eigen values and eigenvectors
Eigen values and eigenvectorsEigen values and eigenvectors
Eigen values and eigenvectorsAmit Singh
 
ML - Multiple Linear Regression
ML - Multiple Linear RegressionML - Multiple Linear Regression
ML - Multiple Linear RegressionAndrew Ferlitsch
 
B.tech Final year Cryptography Project
B.tech Final year Cryptography ProjectB.tech Final year Cryptography Project
B.tech Final year Cryptography ProjectShivam Vatshayan
 

What's hot (20)

Discrete Mathematics Presentation
Discrete Mathematics PresentationDiscrete Mathematics Presentation
Discrete Mathematics Presentation
 
Applications of numerical methods
Applications of numerical methodsApplications of numerical methods
Applications of numerical methods
 
Electrical Networks Application in linear algebra
Electrical Networks Application in linear algebraElectrical Networks Application in linear algebra
Electrical Networks Application in linear algebra
 
Application of linear algebra in electric circuit
Application of linear algebra in electric circuitApplication of linear algebra in electric circuit
Application of linear algebra in electric circuit
 
Matrix chain multiplication
Matrix chain multiplicationMatrix chain multiplication
Matrix chain multiplication
 
Engineering mathematics presentation
Engineering mathematics presentationEngineering mathematics presentation
Engineering mathematics presentation
 
Elliptic Curve Cryptography: Arithmetic behind
Elliptic Curve Cryptography: Arithmetic behindElliptic Curve Cryptography: Arithmetic behind
Elliptic Curve Cryptography: Arithmetic behind
 
Applications of Linear Algebra
Applications of Linear AlgebraApplications of Linear Algebra
Applications of Linear Algebra
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
Basics of Soft Computing
Basics of Soft  Computing Basics of Soft  Computing
Basics of Soft Computing
 
Cryptography
CryptographyCryptography
Cryptography
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Number theory and cryptography
Number theory and cryptographyNumber theory and cryptography
Number theory and cryptography
 
Pseudo Random Number Generators
Pseudo Random Number GeneratorsPseudo Random Number Generators
Pseudo Random Number Generators
 
Diagonalization of Matrices
Diagonalization of MatricesDiagonalization of Matrices
Diagonalization of Matrices
 
USE OF MATRIX IN ROBOTICS
USE OF MATRIX IN ROBOTICSUSE OF MATRIX IN ROBOTICS
USE OF MATRIX IN ROBOTICS
 
Eigen values and eigenvectors
Eigen values and eigenvectorsEigen values and eigenvectors
Eigen values and eigenvectors
 
ML - Multiple Linear Regression
ML - Multiple Linear RegressionML - Multiple Linear Regression
ML - Multiple Linear Regression
 
B.tech Final year Cryptography Project
B.tech Final year Cryptography ProjectB.tech Final year Cryptography Project
B.tech Final year Cryptography Project
 
Cayley Hamilton Theorem
Cayley Hamilton Theorem Cayley Hamilton Theorem
Cayley Hamilton Theorem
 

Similar to Applications of linear algebra in field of it

Application of discrete mathematics in IT
Application of discrete mathematics in ITApplication of discrete mathematics in IT
Application of discrete mathematics in ITShahidAbbas52
 
Matlab for Electrical Engineers
Matlab for Electrical EngineersMatlab for Electrical Engineers
Matlab for Electrical EngineersManish Joshi
 
Handwritten Digit Recognition Using CNN
Handwritten Digit Recognition Using CNNHandwritten Digit Recognition Using CNN
Handwritten Digit Recognition Using CNNIRJET Journal
 
Role of Mathematics in Computer Science.pptx
Role of Mathematics in Computer Science.pptxRole of Mathematics in Computer Science.pptx
Role of Mathematics in Computer Science.pptxAshishPandey502
 
Intro & Applications of Discrete Math
Intro & Applications of Discrete MathIntro & Applications of Discrete Math
Intro & Applications of Discrete MathBilal Khan
 
An Efficient Hardware Implementation of Canny Edge Detection Algorithm
An Efficient Hardware Implementation of Canny Edge Detection AlgorithmAn Efficient Hardware Implementation of Canny Edge Detection Algorithm
An Efficient Hardware Implementation of Canny Edge Detection Algorithmijtsrd
 
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...IRJET Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Application's of Numerical Math in CSE
Application's of Numerical Math in CSEApplication's of Numerical Math in CSE
Application's of Numerical Math in CSEsanjana mun
 
Building a performing Machine Learning model from A to Z
Building a performing Machine Learning model from A to ZBuilding a performing Machine Learning model from A to Z
Building a performing Machine Learning model from A to ZCharles Vestur
 
HandwrittenDigitRecognitionusing.pdf
HandwrittenDigitRecognitionusing.pdfHandwrittenDigitRecognitionusing.pdf
HandwrittenDigitRecognitionusing.pdfShubhamTripathi290909
 
AIML-for-Network-Operations.pptx
AIML-for-Network-Operations.pptxAIML-for-Network-Operations.pptx
AIML-for-Network-Operations.pptxssuser818de4
 
Generating LaTeX Code for Handwritten Mathematical Equations using Convolutio...
Generating LaTeX Code for Handwritten Mathematical Equations using Convolutio...Generating LaTeX Code for Handwritten Mathematical Equations using Convolutio...
Generating LaTeX Code for Handwritten Mathematical Equations using Convolutio...IRJET Journal
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmIDES Editor
 
IRJET- Offline Transcription using AI
IRJET-  	  Offline Transcription using AIIRJET-  	  Offline Transcription using AI
IRJET- Offline Transcription using AIIRJET Journal
 
Digital image processing - What is digital image processign
Digital image processing - What is digital image processignDigital image processing - What is digital image processign
Digital image processing - What is digital image processignE2MATRIX
 

Similar to Applications of linear algebra in field of it (20)

Application of discrete mathematics in IT
Application of discrete mathematics in ITApplication of discrete mathematics in IT
Application of discrete mathematics in IT
 
IT-UG-New-Syllabus.pdf
IT-UG-New-Syllabus.pdfIT-UG-New-Syllabus.pdf
IT-UG-New-Syllabus.pdf
 
Matlab for Electrical Engineers
Matlab for Electrical EngineersMatlab for Electrical Engineers
Matlab for Electrical Engineers
 
Handwritten Digit Recognition Using CNN
Handwritten Digit Recognition Using CNNHandwritten Digit Recognition Using CNN
Handwritten Digit Recognition Using CNN
 
Role of Mathematics in Computer Science.pptx
Role of Mathematics in Computer Science.pptxRole of Mathematics in Computer Science.pptx
Role of Mathematics in Computer Science.pptx
 
Intro & Applications of Discrete Math
Intro & Applications of Discrete MathIntro & Applications of Discrete Math
Intro & Applications of Discrete Math
 
An Efficient Hardware Implementation of Canny Edge Detection Algorithm
An Efficient Hardware Implementation of Canny Edge Detection AlgorithmAn Efficient Hardware Implementation of Canny Edge Detection Algorithm
An Efficient Hardware Implementation of Canny Edge Detection Algorithm
 
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
IRJET- Recognition of Handwritten Characters based on Deep Learning with Tens...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Application's of Numerical Math in CSE
Application's of Numerical Math in CSEApplication's of Numerical Math in CSE
Application's of Numerical Math in CSE
 
Building a performing Machine Learning model from A to Z
Building a performing Machine Learning model from A to ZBuilding a performing Machine Learning model from A to Z
Building a performing Machine Learning model from A to Z
 
HandwrittenDigitRecognitionusing.pdf
HandwrittenDigitRecognitionusing.pdfHandwrittenDigitRecognitionusing.pdf
HandwrittenDigitRecognitionusing.pdf
 
AIML-for-Network-Operations.pptx
AIML-for-Network-Operations.pptxAIML-for-Network-Operations.pptx
AIML-for-Network-Operations.pptx
 
DM.pptx
DM.pptxDM.pptx
DM.pptx
 
Generating LaTeX Code for Handwritten Mathematical Equations using Convolutio...
Generating LaTeX Code for Handwritten Mathematical Equations using Convolutio...Generating LaTeX Code for Handwritten Mathematical Equations using Convolutio...
Generating LaTeX Code for Handwritten Mathematical Equations using Convolutio...
 
Image Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher AlgorithmImage Encryption Using Advanced Hill Cipher Algorithm
Image Encryption Using Advanced Hill Cipher Algorithm
 
IRJET- Offline Transcription using AI
IRJET-  	  Offline Transcription using AIIRJET-  	  Offline Transcription using AI
IRJET- Offline Transcription using AI
 
Matlab.ppt
Matlab.pptMatlab.ppt
Matlab.ppt
 
OverheadsDay1.ppt
OverheadsDay1.pptOverheadsDay1.ppt
OverheadsDay1.ppt
 
Digital image processing - What is digital image processign
Digital image processing - What is digital image processignDigital image processing - What is digital image processign
Digital image processing - What is digital image processign
 

More from university of Gujrat, pakistan

More from university of Gujrat, pakistan (20)

Change management
Change management Change management
Change management
 
Latest Trends in Digital Marketing
Latest Trends in Digital MarketingLatest Trends in Digital Marketing
Latest Trends in Digital Marketing
 
Dark web (2)
Dark web (2)Dark web (2)
Dark web (2)
 
Code of ethics and professional conduct (1)
Code of ethics and professional conduct (1)Code of ethics and professional conduct (1)
Code of ethics and professional conduct (1)
 
Certification accreditation and licensure (1)
Certification accreditation and licensure (1)Certification accreditation and licensure (1)
Certification accreditation and licensure (1)
 
biggest technology trends
biggest technology trendsbiggest technology trends
biggest technology trends
 
Freedom of information (1)
Freedom of information (1)Freedom of information (1)
Freedom of information (1)
 
Individual cognition ppt (1)
Individual cognition ppt (1)Individual cognition ppt (1)
Individual cognition ppt (1)
 
Top 10 highest (1)
Top 10 highest (1)Top 10 highest (1)
Top 10 highest (1)
 
creativity and imagination
creativity and imagination creativity and imagination
creativity and imagination
 
Brainstorming 078 (1)
Brainstorming 078 (1)Brainstorming 078 (1)
Brainstorming 078 (1)
 
speeh-artificial intelligemce
speeh-artificial intelligemce speeh-artificial intelligemce
speeh-artificial intelligemce
 
Pp dealing with problem complexity (1)
Pp dealing with problem complexity (1)Pp dealing with problem complexity (1)
Pp dealing with problem complexity (1)
 
Motivation
MotivationMotivation
Motivation
 
Vision of artificial intelligence (1)
Vision of artificial intelligence (1)Vision of artificial intelligence (1)
Vision of artificial intelligence (1)
 
Entrepreneurship (1)
Entrepreneurship (1)Entrepreneurship (1)
Entrepreneurship (1)
 
Role of professional societies
Role of professional societiesRole of professional societies
Role of professional societies
 
Dealing with culticultural environment (1)
Dealing with culticultural environment (1)Dealing with culticultural environment (1)
Dealing with culticultural environment (1)
 
Dealing with problem complexity (1)
Dealing with problem complexity (1)Dealing with problem complexity (1)
Dealing with problem complexity (1)
 
cyber security and cyber crime
cyber security and cyber crime cyber security and cyber crime
cyber security and cyber crime
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

Applications of linear algebra in field of it

  • 1. ASSIGNMENT # 1 Submitted to: Mam Hina Qurashi Submitted by: Rabia Zafar 17581556-045 Section ‘A’ BS IT 4th semester
  • 2.
  • 3. Applications of linear algebra in field of IT Linear algebra: Linear algebra provides concepts that are crucial to many areas of computer science, including graphics, image processing, cryptography, machine learning, computer vision, optimization, graph algorithms, quantum computation, computational biology, information retrieval and web search. Algebra is used in computerscience in many ways: Boolean algebra for evaluating code paths, error correcting codes, processor optimization, relational database design/optimization, and so forth. 1. Internet search 2. Network model 3. Machine learning 4. Graphs 5. Bioinformatics 6. Scientific computing 7. Data mining 8. Computer vision 9. Cryptography 10. Matrix computations 11. Parallel computing Matrix computations: Matrix computations are used in computer programming in many ways: graphics, state-space modeling, arithmetic, ad hoc business logic, and so forth. Linear algebra as a sub-discipline is often taught in one of two ways: from a computationalaspect of things, which focuses on matrices, their properties, and operations on matrices; or, algebraically, where linear mappings are treated as algebraic structures, and one studies, for instance, the group theoretic relations that arise.In either case, you will not need to try too hard to find situations where knowledge of either theoretical linear algebra or matrix mathematics will be necessary. Graphs:
  • 4. Graph is very important part of computerscience. Graph theory is the study of graphs which are mathematical structures used to model pairwise relations between objects. A graph in this context is made up of vectors, nodes, or points which are connected by edges, arcs, or lines. Linear algebra is very important for solution of graphs in field of IT. Machine learning: The concepts of Linear Algebra are crucial for understanding thetheory behind Machine Learning, especiallyfor Deep Learning. Theygive you better intuition for how algorithms really work under the hood, which enables you to make betterdecisions. Soif you really want to be a professionalin this field, you cannot escape mastering some of its concepts. This post will give you an introduction to the most important concepts of Linear Algebra that are used in Machine Learning. Network model: For designing network models, linear algebra is also very helpful. We required n no of hosts in a large network, n(n � 1)=2 (undirected) paths between them, Want latency and packet loss rates for each path, Use info to choose servers, route around faults. We make these models with the help of linear algebra easily. Cryptography: Encryption and decryption require the use of some secret information, usually refers to as a key. Example: let the message be, “PREPARE TO NEGOTIATE” WE ASSIGNA NUMBER FOR EACH LETTER OF ALPHABET. Scientific computing: Scientific computing is the science of solving problems with computers. The problems themselves usually arise from other disciplines such as mathematics, engineering, biology, physics, chemistryand other natural sciences. As a consequence, scientific computing is interdisciplinary by nature. Linear algebra help us to solve these type of problems. END