SlideShare a Scribd company logo
1 of 11
Application of Matrices
Presented By:
Mohammedi Limdiwala
Matrix
▪ A matrix is a rectangular arrangement of ‘mn’ elements.
▪ It consists of rows and columns arrangements.
▪ It is a systematic arrangement of elements and may represent
vectorial or scalar quantity.
Some of the applications of Matrix
▪ Engineering forces on a bridge or truss
▪ Electronics
▪ Genetics (working out selection process)
▪ Probability (finding quantities in a chemical reaction)
▪ Chemistry
▪ Economics (study of stock market, etc)
▪ Encryption And decryption messages –
Cryptography
(here we will discuss Cryptography)
Encryption and Decryption (Cryptography)
▪ A cryptogram is a message written according to a secret code (the Greek word kryptos
means “hidden”).The following describes a method of using matrix multiplication to encode
and decode messages.
▪ Then convert the message to numbers and partition it into
encoded row matrices, each having entries
 In the following example we take an example to
encode the Message “MEET ME MONDAY”
Encoding Process
▪ Partitioning the message (including blank spaces, but ignoring punctuation) into groups of
three produces the following uncoded row matrices.
▪ To encode a message, choose an invertible matrix and multiply the uncoded row matrices
(on the right) by to obtain coded row matrices.This inverted matrix will act as a password.
▪ For example here.
Encoding Process
Encoding Process
▪ The sequence of coded row matrices is
▪ Finally, removing the matrix notation produces the following cryptogram
▪ For those who do not know the encoding matrix A, decoding the cryptogram is possible.
▪ But for an authorized receiver who knows the encoding matrix decoding is relatively simple.
The receiver just needs to multiply the coded row matrices by A-1
to retrieve the uncoded row
matrices. In other words, if
▪ is an uncoded 1×n matrix, then Y=XA is the corresponding encoded matrix.The receiver of
the encoded matrix can decode by Y multiplying on the right by A-1
.
Decoding Process
▪ Begin by using Gauss-Jordan elimination to find A-1
▪ Now, to decode the message, partition the message into groups of three to form the coded
row matrices
▪ To obtain the decoded row matrices, multiply each coded row matrix by A-1
Decoding Process
Decoding Process
▪ The sequence of decoded row matrices is
▪ and the message is
▪ And the authorized person can easily decode the encoded message using the inverse of the
matrix A, which was the password during encoding.
Application of Matrices

More Related Content

What's hot

Matrix and it's application
Matrix and it's application Matrix and it's application
Matrix and it's application MOHAMMAD AKASH
 
Linear Algebra Applications
Linear Algebra ApplicationsLinear Algebra Applications
Linear Algebra ApplicationsRamesh Shashank
 
Appilation of matrices in real life
Appilation of matrices in real lifeAppilation of matrices in real life
Appilation of matrices in real lifeStudent
 
Application of Matrices on Cryptography
Application of Matrices on CryptographyApplication of Matrices on Cryptography
Application of Matrices on CryptographyRam Gupta
 
Presentation on application of matrix
Presentation on application of matrixPresentation on application of matrix
Presentation on application of matrixPrerana Bhattarai
 
Applications of matrices in Real\Daily life
Applications of matrices in Real\Daily lifeApplications of matrices in Real\Daily life
Applications of matrices in Real\Daily lifeSami Ullah
 
Matrices in computer applications
Matrices in computer applicationsMatrices in computer applications
Matrices in computer applicationsRayyan777
 
Applications of matrices in real life
Applications of matrices in real lifeApplications of matrices in real life
Applications of matrices in real lifeSuhaibFaiz
 
Applications of Matrices in Engineering
Applications of Matrices in EngineeringApplications of Matrices in Engineering
Applications of Matrices in EngineeringAliHasan358
 
Application of Matrix
Application of MatrixApplication of Matrix
Application of MatrixRahman Hillol
 
Eigen values and eigen vectors
Eigen values and eigen vectorsEigen values and eigen vectors
Eigen values and eigen vectorstirath prajapati
 
Engineering mathematics presentation
Engineering mathematics presentationEngineering mathematics presentation
Engineering mathematics presentationAfzal Hossen
 
Matrix and its applications by mohammad imran
Matrix and its applications by mohammad imranMatrix and its applications by mohammad imran
Matrix and its applications by mohammad imranMohammad Imran
 
Matrix and its operation (addition, subtraction, multiplication)
Matrix and its operation (addition, subtraction, multiplication)Matrix and its operation (addition, subtraction, multiplication)
Matrix and its operation (addition, subtraction, multiplication)NirnayMukharjee
 
Presentation on inverse matrix
Presentation on inverse matrixPresentation on inverse matrix
Presentation on inverse matrixSyed Ahmed Zaki
 

What's hot (20)

Matrix and it's application
Matrix and it's application Matrix and it's application
Matrix and it's application
 
Linear Algebra Applications
Linear Algebra ApplicationsLinear Algebra Applications
Linear Algebra Applications
 
Appilation of matrices in real life
Appilation of matrices in real lifeAppilation of matrices in real life
Appilation of matrices in real life
 
Presentation on matrix
Presentation on matrixPresentation on matrix
Presentation on matrix
 
Application of Matrices on Cryptography
Application of Matrices on CryptographyApplication of Matrices on Cryptography
Application of Matrices on Cryptography
 
Presentation on application of matrix
Presentation on application of matrixPresentation on application of matrix
Presentation on application of matrix
 
Applications of matrices in Real\Daily life
Applications of matrices in Real\Daily lifeApplications of matrices in Real\Daily life
Applications of matrices in Real\Daily life
 
Matrices in computer applications
Matrices in computer applicationsMatrices in computer applications
Matrices in computer applications
 
Application of matrices in real life
Application of matrices in real lifeApplication of matrices in real life
Application of matrices in real life
 
Applications of matrices in real life
Applications of matrices in real lifeApplications of matrices in real life
Applications of matrices in real life
 
Applications of Matrix
Applications of MatrixApplications of Matrix
Applications of Matrix
 
Applications of Matrices in Engineering
Applications of Matrices in EngineeringApplications of Matrices in Engineering
Applications of Matrices in Engineering
 
Application of Matrix
Application of MatrixApplication of Matrix
Application of Matrix
 
Matrix in software engineering
Matrix in software engineeringMatrix in software engineering
Matrix in software engineering
 
Eigen values and eigen vectors
Eigen values and eigen vectorsEigen values and eigen vectors
Eigen values and eigen vectors
 
Matrix.
Matrix.Matrix.
Matrix.
 
Engineering mathematics presentation
Engineering mathematics presentationEngineering mathematics presentation
Engineering mathematics presentation
 
Matrix and its applications by mohammad imran
Matrix and its applications by mohammad imranMatrix and its applications by mohammad imran
Matrix and its applications by mohammad imran
 
Matrix and its operation (addition, subtraction, multiplication)
Matrix and its operation (addition, subtraction, multiplication)Matrix and its operation (addition, subtraction, multiplication)
Matrix and its operation (addition, subtraction, multiplication)
 
Presentation on inverse matrix
Presentation on inverse matrixPresentation on inverse matrix
Presentation on inverse matrix
 

Viewers also liked

presentation on matrix
 presentation on matrix presentation on matrix
presentation on matrixNikhi Jain
 
MATRICES
MATRICESMATRICES
MATRICESfaijmsk
 
APPLICATION OF LINEAR ALGEBRA IN ECONOMICS
APPLICATION OF LINEAR ALGEBRA IN ECONOMICSAPPLICATION OF LINEAR ALGEBRA IN ECONOMICS
APPLICATION OF LINEAR ALGEBRA IN ECONOMICSAmit Garg
 
Matrix Representation Of Graph
Matrix Representation Of GraphMatrix Representation Of Graph
Matrix Representation Of GraphAbhishek Pachisia
 
Kinematics of machines - Gear and Gear trains
Kinematics of machines - Gear and Gear trainsKinematics of machines - Gear and Gear trains
Kinematics of machines - Gear and Gear trainsMohammed Limdiwala
 
Power Screw and its application
Power Screw and its applicationPower Screw and its application
Power Screw and its applicationMohammed Limdiwala
 
Dielectrics and its applications
Dielectrics and its applicationsDielectrics and its applications
Dielectrics and its applicationsMohammed Limdiwala
 
Some Engg. Applications of Matrices and Partial Derivatives
Some Engg. Applications of Matrices and Partial DerivativesSome Engg. Applications of Matrices and Partial Derivatives
Some Engg. Applications of Matrices and Partial DerivativesSanjaySingh011996
 
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLINGCRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLINGJournal For Research
 
Matridex Dermal Filler presentationm to FACE Conference 2005 by Dr. Patrick T...
Matridex Dermal Filler presentationm to FACE Conference 2005 by Dr. Patrick T...Matridex Dermal Filler presentationm to FACE Conference 2005 by Dr. Patrick T...
Matridex Dermal Filler presentationm to FACE Conference 2005 by Dr. Patrick T...Dr. Patrick J. Treacy
 
Matrices and their applications
Matrices and their applicationsMatrices and their applications
Matrices and their applicationsZarghaam Abbas
 
Determinant of demand - ENGINEERING ECONOMICS & FINANCIAL ACCOUNTING - DR.K.B...
Determinant of demand - ENGINEERING ECONOMICS & FINANCIAL ACCOUNTING - DR.K.B...Determinant of demand - ENGINEERING ECONOMICS & FINANCIAL ACCOUNTING - DR.K.B...
Determinant of demand - ENGINEERING ECONOMICS & FINANCIAL ACCOUNTING - DR.K.B...Barani Dharan
 
Multiplication of matrices and its application in biology
Multiplication of matrices and its application in biologyMultiplication of matrices and its application in biology
Multiplication of matrices and its application in biologynayanika bhalla
 

Viewers also liked (20)

presentation on matrix
 presentation on matrix presentation on matrix
presentation on matrix
 
MATRICES
MATRICESMATRICES
MATRICES
 
APPLICATION OF LINEAR ALGEBRA IN ECONOMICS
APPLICATION OF LINEAR ALGEBRA IN ECONOMICSAPPLICATION OF LINEAR ALGEBRA IN ECONOMICS
APPLICATION OF LINEAR ALGEBRA IN ECONOMICS
 
Civil Engineers
Civil EngineersCivil Engineers
Civil Engineers
 
Matrix Representation Of Graph
Matrix Representation Of GraphMatrix Representation Of Graph
Matrix Representation Of Graph
 
Ecology and Ecosystem
Ecology and EcosystemEcology and Ecosystem
Ecology and Ecosystem
 
Kinematics of machines - Gear and Gear trains
Kinematics of machines - Gear and Gear trainsKinematics of machines - Gear and Gear trains
Kinematics of machines - Gear and Gear trains
 
Analysis of Mechanism
Analysis of MechanismAnalysis of Mechanism
Analysis of Mechanism
 
2nd law of thermodynamics
2nd law of thermodynamics2nd law of thermodynamics
2nd law of thermodynamics
 
Power Screw and its application
Power Screw and its applicationPower Screw and its application
Power Screw and its application
 
Introduction to Lathe Machine
Introduction to Lathe MachineIntroduction to Lathe Machine
Introduction to Lathe Machine
 
Dielectrics and its applications
Dielectrics and its applicationsDielectrics and its applications
Dielectrics and its applications
 
Pumps and types of pumps
Pumps and types of pumpsPumps and types of pumps
Pumps and types of pumps
 
Some Engg. Applications of Matrices and Partial Derivatives
Some Engg. Applications of Matrices and Partial DerivativesSome Engg. Applications of Matrices and Partial Derivatives
Some Engg. Applications of Matrices and Partial Derivatives
 
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLINGCRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
CRYPTOGRAPHY USING ELLIPTIC CURVE WITH MATRIX SCRAMBLING
 
Lucia muñoz cake
Lucia muñoz cakeLucia muñoz cake
Lucia muñoz cake
 
Matridex Dermal Filler presentationm to FACE Conference 2005 by Dr. Patrick T...
Matridex Dermal Filler presentationm to FACE Conference 2005 by Dr. Patrick T...Matridex Dermal Filler presentationm to FACE Conference 2005 by Dr. Patrick T...
Matridex Dermal Filler presentationm to FACE Conference 2005 by Dr. Patrick T...
 
Matrices and their applications
Matrices and their applicationsMatrices and their applications
Matrices and their applications
 
Determinant of demand - ENGINEERING ECONOMICS & FINANCIAL ACCOUNTING - DR.K.B...
Determinant of demand - ENGINEERING ECONOMICS & FINANCIAL ACCOUNTING - DR.K.B...Determinant of demand - ENGINEERING ECONOMICS & FINANCIAL ACCOUNTING - DR.K.B...
Determinant of demand - ENGINEERING ECONOMICS & FINANCIAL ACCOUNTING - DR.K.B...
 
Multiplication of matrices and its application in biology
Multiplication of matrices and its application in biologyMultiplication of matrices and its application in biology
Multiplication of matrices and its application in biology
 

Similar to Application of Matrices

140050119047vcla-151014091158-lva1-app6892 (1).pptx
140050119047vcla-151014091158-lva1-app6892 (1).pptx140050119047vcla-151014091158-lva1-app6892 (1).pptx
140050119047vcla-151014091158-lva1-app6892 (1).pptxRaviBala14
 
matrix -cryptography 1.pptx
matrix -cryptography 1.pptxmatrix -cryptography 1.pptx
matrix -cryptography 1.pptxSaivaniMothuku
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystemSamdish Arora
 
International journal of computer science and innovation vol 2015-n2-paper5
International journal of computer science and innovation  vol 2015-n2-paper5International journal of computer science and innovation  vol 2015-n2-paper5
International journal of computer science and innovation vol 2015-n2-paper5sophiabelthome
 
Matrix Algebra : Mathematics for Business
Matrix Algebra : Mathematics for BusinessMatrix Algebra : Mathematics for Business
Matrix Algebra : Mathematics for BusinessKhan Tanjeel Ahmed
 
Applications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipherApplications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipherAashirwad Kashyap
 
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...ijtsrd
 
Broadcasting and low exponent rsa attack
Broadcasting and low exponent rsa attackBroadcasting and low exponent rsa attack
Broadcasting and low exponent rsa attackAnkita Kapratwar
 
Evaluation of programs codes using machine learning
Evaluation of programs codes using machine learningEvaluation of programs codes using machine learning
Evaluation of programs codes using machine learningVivek Maskara
 
VCE Unit 01 (2).pptx
VCE Unit 01 (2).pptxVCE Unit 01 (2).pptx
VCE Unit 01 (2).pptxskilljiolms
 
Post quantum cryptography - thesis
Post quantum cryptography - thesisPost quantum cryptography - thesis
Post quantum cryptography - thesisSamy Shehata
 
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberSimple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberTarek Gaber
 
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.CSCJournals
 
Application of matrix multiplication (cryptography) with solved problem
Application of matrix multiplication (cryptography) with solved problemApplication of matrix multiplication (cryptography) with solved problem
Application of matrix multiplication (cryptography) with solved problemMuhammad Waqas
 
Defeating RSA Multiply-Always and Message Blinding Countermeasures
Defeating RSA Multiply-Always and Message Blinding CountermeasuresDefeating RSA Multiply-Always and Message Blinding Countermeasures
Defeating RSA Multiply-Always and Message Blinding CountermeasuresRiscure
 
Security using colors and armstrong numbers by sravanthi (lollypop)
Security using colors and armstrong numbers by sravanthi (lollypop)Security using colors and armstrong numbers by sravanthi (lollypop)
Security using colors and armstrong numbers by sravanthi (lollypop)Ashok Reddy
 
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...decentralizeeverything
 

Similar to Application of Matrices (20)

140050119047vcla-151014091158-lva1-app6892 (1).pptx
140050119047vcla-151014091158-lva1-app6892 (1).pptx140050119047vcla-151014091158-lva1-app6892 (1).pptx
140050119047vcla-151014091158-lva1-app6892 (1).pptx
 
matrix -cryptography 1.pptx
matrix -cryptography 1.pptxmatrix -cryptography 1.pptx
matrix -cryptography 1.pptx
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
 
International journal of computer science and innovation vol 2015-n2-paper5
International journal of computer science and innovation  vol 2015-n2-paper5International journal of computer science and innovation  vol 2015-n2-paper5
International journal of computer science and innovation vol 2015-n2-paper5
 
Matrix Algebra : Mathematics for Business
Matrix Algebra : Mathematics for BusinessMatrix Algebra : Mathematics for Business
Matrix Algebra : Mathematics for Business
 
Applications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipherApplications of-linear-algebra-hill-cipher
Applications of-linear-algebra-hill-cipher
 
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...
 
Broadcasting and low exponent rsa attack
Broadcasting and low exponent rsa attackBroadcasting and low exponent rsa attack
Broadcasting and low exponent rsa attack
 
LDPC Encoding
LDPC EncodingLDPC Encoding
LDPC Encoding
 
Encoding(sc)
Encoding(sc)Encoding(sc)
Encoding(sc)
 
Evaluation of programs codes using machine learning
Evaluation of programs codes using machine learningEvaluation of programs codes using machine learning
Evaluation of programs codes using machine learning
 
VCE Unit 01 (2).pptx
VCE Unit 01 (2).pptxVCE Unit 01 (2).pptx
VCE Unit 01 (2).pptx
 
Post quantum cryptography - thesis
Post quantum cryptography - thesisPost quantum cryptography - thesis
Post quantum cryptography - thesis
 
Encoding survey
Encoding surveyEncoding survey
Encoding survey
 
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberSimple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
 
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
 
Application of matrix multiplication (cryptography) with solved problem
Application of matrix multiplication (cryptography) with solved problemApplication of matrix multiplication (cryptography) with solved problem
Application of matrix multiplication (cryptography) with solved problem
 
Defeating RSA Multiply-Always and Message Blinding Countermeasures
Defeating RSA Multiply-Always and Message Blinding CountermeasuresDefeating RSA Multiply-Always and Message Blinding Countermeasures
Defeating RSA Multiply-Always and Message Blinding Countermeasures
 
Security using colors and armstrong numbers by sravanthi (lollypop)
Security using colors and armstrong numbers by sravanthi (lollypop)Security using colors and armstrong numbers by sravanthi (lollypop)
Security using colors and armstrong numbers by sravanthi (lollypop)
 
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...
 

Recently uploaded

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 

Recently uploaded (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

Application of Matrices

  • 1. Application of Matrices Presented By: Mohammedi Limdiwala
  • 2. Matrix ▪ A matrix is a rectangular arrangement of ‘mn’ elements. ▪ It consists of rows and columns arrangements. ▪ It is a systematic arrangement of elements and may represent vectorial or scalar quantity.
  • 3. Some of the applications of Matrix ▪ Engineering forces on a bridge or truss ▪ Electronics ▪ Genetics (working out selection process) ▪ Probability (finding quantities in a chemical reaction) ▪ Chemistry ▪ Economics (study of stock market, etc) ▪ Encryption And decryption messages – Cryptography (here we will discuss Cryptography)
  • 4. Encryption and Decryption (Cryptography) ▪ A cryptogram is a message written according to a secret code (the Greek word kryptos means “hidden”).The following describes a method of using matrix multiplication to encode and decode messages. ▪ Then convert the message to numbers and partition it into encoded row matrices, each having entries  In the following example we take an example to encode the Message “MEET ME MONDAY”
  • 5. Encoding Process ▪ Partitioning the message (including blank spaces, but ignoring punctuation) into groups of three produces the following uncoded row matrices. ▪ To encode a message, choose an invertible matrix and multiply the uncoded row matrices (on the right) by to obtain coded row matrices.This inverted matrix will act as a password. ▪ For example here.
  • 7. Encoding Process ▪ The sequence of coded row matrices is ▪ Finally, removing the matrix notation produces the following cryptogram ▪ For those who do not know the encoding matrix A, decoding the cryptogram is possible. ▪ But for an authorized receiver who knows the encoding matrix decoding is relatively simple. The receiver just needs to multiply the coded row matrices by A-1 to retrieve the uncoded row matrices. In other words, if ▪ is an uncoded 1×n matrix, then Y=XA is the corresponding encoded matrix.The receiver of the encoded matrix can decode by Y multiplying on the right by A-1 .
  • 8. Decoding Process ▪ Begin by using Gauss-Jordan elimination to find A-1 ▪ Now, to decode the message, partition the message into groups of three to form the coded row matrices ▪ To obtain the decoded row matrices, multiply each coded row matrix by A-1
  • 10. Decoding Process ▪ The sequence of decoded row matrices is ▪ and the message is ▪ And the authorized person can easily decode the encoded message using the inverse of the matrix A, which was the password during encoding.