SlideShare a Scribd company logo
Real Life Application of
Discrete Mathematics
Yash Bhattad
202251162
Rushikesh
Chaudhari
202251113
Manav Mehta
202252344
Team : Math GPT
Course Instructor : Swapnil Lokhande Sir
What do we really mean by
Discrete Mathematics ?
Discrete mathematics is a branch of
mathematics that deals with the
study of mathematical structures
that are discrete rather than
continuous, such as integers,
graphs, sets, and sequences.
Discrete Mathematics is
applicable in real life!
Whoa!
Discrete Mathematics is used in following topics:
1) Google Map/ Traffic Modeling
2) In computer programming
3) Computer Graphics
4) Image Processing
5) DNA Sequencing / Biometrics
6) Digital Electronics (Automatic Doors / Microprocessors / Fitness Trackers)
7) Game Theory
8) Railway Planning
9) Analog Clock
10) Voting Systems
11) Power Grids
12) Cyber Security/ Data encryption
COVID-19
01
Analysis of Spread
Graph theory and network analysis are
important tools for modeling the spread of
infectious diseases. Graph theory is the
study of graphs, which are mathematical
structures used to model relationships
between objects. Graphs can be used to
represent the spread of the virus by
mapping out the connections between
infected individuals.
The analysis of the graph can then be used
to identify patterns and trends in the
spread of the virus, which can be used to
develop strategies for controlling its
spread.
Predicting Spread
Discrete mathematics can also be used to
develop models for predicting the spread of the
virus. These models can be used to estimate the
rate of spread and the potential for a second
wave of infections. The models can also be used
to predict the impact of interventions, such as
social distancing, on the spread of the virus.
By using discrete mathematics to develop
models for predicting the spread of the virus,
public health officials can more effectively
manage the pandemic and develop
strategies for controlling its spread.
Contact Tracing
Algorithm
Discrete mathematics can be used to
model and analyze contact tracing
data to identify and track potential
contacts of an infected individual.
This can help to reduce the spread of
disease and identify high-risk areas.
Discrete mathematics can also be
used to develop algorithms for
contact tracing, such as those used in
mobile applications. These
algorithms can be used to identify
and alert individuals who may have
been exposed to a contagious
disease.
Contact Tracing Algorithm
Contact tracing algorithms may use a
variety of data sources to identify close
contacts, including GPS location data,
Bluetooth signals, and data from public
health agencies. Privacy concerns are
important, and contact tracing
algorithms aim to balance the need to
identify potential exposures with
protecting individual privacy.
Digital
Electronics
02
Introduction to Discrete
Math in Digital Electronics
It is used in the study of digital electronics,
which is the study of electronic circuits
that are composed of discrete
components. Digital electronics is used in
many aspects of modern technology,
including computers, cell phones, and
other electronic devices.
Digital electronics is based on the binary
system, which is a system of two values, 0
and 1. In this system, each digit is
represented by a single bit, which can be
either 0 or 1. This allows for the
representation of complex data in a simple
form.
Boolean Algebra
Boolean algebra is a fundamental
concept in digital electronics, and it is
used to manipulate and simplify logic
expressions used in digital circuit design.
Digital electronic circuits are built using
digital components like transistors,
diodes, and gates that operate based on
the principles of Boolean algebra.
The use of Boolean algebra in digital
electronics helps designers to ensure that
the circuits they create are accurate,
reliable, and efficient. It also allows for
easier testing and troubleshooting of
digital circuits.
Boolean algebra allows the
designer to manipulate these
binary signals and create more
complex logic functions using
logic gates such as AND, OR,
NOT, NAND, NOR, and XOR.
For example, the logical
expression "A AND B" can be
implemented using an AND
gate, which outputs a 1 only if
both A and B inputs are 1.
Boolean Algebra
Boolean Algebra
DNA
Sequencing
03
DNA SEQUENCING
The main goal of DNA sequencing is to decode the genetic information
contained within a DNA sequence, which is crucial for many fields of
research, including genetics, molecular biology, medicine, and forensic
science. Discrete mathematics plays a significant role in DNA sequencing,
which is the process of determining the precise order of nucleotides within
a DNA molecule.
Hamiltonian Path
Approach
Methods of approach of
DNA Sequencing based
upon Graph Theory
There are 2 different methods used for
Basic DNA Sequencing
Euler's Path
Approach
Hamiltonian Path Approach
First and foremost, A Hamiltonian path in a graph is a
path which visits each vertex in the graph exactly once.
In this method we will take all fragments as nodes of
the graph, and each node will connect if the ‘k-1’
rightmost nucleotide of the first note will overlap with
the ‘k-1’ leftmost nucleotide of the second node,
basically by connecting a suffix and a prefix that
overlap each other.
Let the Sample of DNA Reads be:
Here we have
a Hamiltonian
Cycle
Euler’s Path Approach
An Euler Path is a path that goes through every edge of
a graph exactly once.
In this approach we will use distinct prefix/suffix from
the reads as a node and each oligonucleotide becomes
an which has an initial endpoint ‘k-1’ from the
rightmost nucleotide of arc and its terminal end point
being ‘k-1’ of leftmost nucleotide.
Let's take the sample size of DNA reads as we have
taken for Hamiltonian Path Approach
Genome: ATGGCGTGCA
We obtain the same sequence of reads as before,
thus we will obtain the same sequenced genome
as before!
Google Maps
04
Google Maps uses discrete
mathematics application to
determine the shortest distance
between two locations( by Dijkstra's
algorithm explain in later slides)
Google Maps uses set theory to
categorize different locations and
points of interest.By categorizing
locations into sets, such as
restaurants, hotels, and gas stations,
Google Maps can provide users with
customized search results based on
their preferences.
Google Maps uses probability to
predict traffic patterns and estimate
arrival times.
Dijkstra's algorithm
Dijkstra's algorithm is a way of finding the
shortest path between two points on a
map,it is also use in network routing, GPS
navigation systems, and social network
analysis.
It works by treating the map as a
network of connected points, and
assigning each point a "distance" value
that represents how far it is from the
starting point.
1. Create a graph with nodes and edges, where each edge has a
weight or cost.
2. a starting node and assign it a distance of 0. Assign a distance of
infinity to all other nodes in the graph.
3. Mark all nodes as unvisited and create an empty set to hold
visited nodes.
4. For the current node, calculate the tentative distance from the
starting node to each of its neighboring nodes. The tentative
distance is the sum of the current node's distance and the cost of
the edge between the current node and its neighbor.
This are the steps of Dijkstra’s algorithm :
5. Compare the tentative distance to each neighbor's current
distance. If the tentative distance is less than the current distance, update
the neighbor's distance with the new tentative distance.
6. Mark the current node as visited and remove it from the unvisited set.
7. If the destination node has been visited or if the smallest tentative
distance among the unvisited nodes is infinity, stop the algorithm.
8. Select the unvisited node with the smallest tentative distance as the
next current node,and go back to step 4.
9. Backtrack from the destination node to the starting node to find the
shortest path
Let’s take an example
1
1
3
4
5
4
4
2
2
3
3
0 ∞ ∞ ∞ ∞ ∞
0 1 2 3 4 5
Dist[ ] :
( dist , node )
(0,0)
0
2
1
0
1
2
3
4
5
4
4
2
2
3
3
0 4 4 7 ∞ ∞
0 1 2 3 4 5
Dist[ ] :
( dist , node )
(7,3)
(4,2)
(4,1)
(0,0)
From 0 to 2 we have 4 unit so (4,2).
If we get the shorter path than the current path we update our
distance so infinity becomes 4 at 1st node same happen with
node at 2 and 3. previousThis cycle continue till all points gets
their shortest distance.
1
3
4
4
2
2
3
3
0 4 4 7 5 8
0 1 2 3 4 5
Dist[ ] :
( dist , node )
(8,5)
(10,5)
(5,4)
(7,3)
(4,2)
(4,1)
(0,0)
0
1
2
4
5
So the shortest path between 0 to 5 is 0–2–4–5 which is 8 unit long.
Bibliography:
Discrete Mathematics in Life Science using probability
distribution:
math.berkeley.edu/~qchu/Notes/239.pdf
Explanation to Euler’s & Hamiltonian Path:
https://meenalpathak.wordpress.com/Euler'sTrail/Ha
miltonian'sPath
There are some other algorithm that may be better
than Dijkstra’s algorithm in some cases:
1) A* Algorithm :
https://en.wikipedia.org/wiki/A*_search_algorithm
2) Bellman-Ford Algorithm:
https://www.baeldung.com/cs/bellman-ford
3) Floyd-Warshall Algorithm :
https://brilliant.org/wiki/floyd-warshall-algorithm
Conclusion:
The Application of discrete mathematics is
widespread and can be found in various aspects of
our daily lives.Discrete mathematics also plays a
vital role in the development of artificial
intelligence and machine learning, which are
becoming increasingly important in our modern
world. Therefore, the importance of discrete
mathematics in real life cannot be overstated, and
its continued development will undoubtedly
contribute to the advancement of many fields and
improve our daily lives in numerous ways.
THANK YOU
THANK YOU

More Related Content

What's hot

Slides Chapter10.1 10.2
Slides Chapter10.1 10.2Slides Chapter10.1 10.2
Slides Chapter10.1 10.2
showslidedump
 
introduction to graph theory
introduction to graph theoryintroduction to graph theory
introduction to graph theory
Chuckie Balbuena
 

What's hot (20)

Application of matrix multiplication (cryptography) with solved problem
Application of matrix multiplication (cryptography) with solved problemApplication of matrix multiplication (cryptography) with solved problem
Application of matrix multiplication (cryptography) with solved problem
 
Intro & Applications of Discrete Math
Intro & Applications of Discrete MathIntro & Applications of Discrete Math
Intro & Applications of Discrete Math
 
Slides Chapter10.1 10.2
Slides Chapter10.1 10.2Slides Chapter10.1 10.2
Slides Chapter10.1 10.2
 
Applications of graph theory
                      Applications of graph theory                      Applications of graph theory
Applications of graph theory
 
Intro to Discrete Mathematics
Intro to Discrete MathematicsIntro to Discrete Mathematics
Intro to Discrete Mathematics
 
Optimal binary search tree dynamic programming
Optimal binary search tree   dynamic programmingOptimal binary search tree   dynamic programming
Optimal binary search tree dynamic programming
 
CMSC 56 | Lecture 15: Closures of Relations
CMSC 56 | Lecture 15: Closures of RelationsCMSC 56 | Lecture 15: Closures of Relations
CMSC 56 | Lecture 15: Closures of Relations
 
Eulers totient
Eulers totientEulers totient
Eulers totient
 
cryptography Application of linear algebra
cryptography Application of linear algebra cryptography Application of linear algebra
cryptography Application of linear algebra
 
Graph theory
Graph theory Graph theory
Graph theory
 
introduction to graph theory
introduction to graph theoryintroduction to graph theory
introduction to graph theory
 
Hamiltonian path
Hamiltonian pathHamiltonian path
Hamiltonian path
 
Dijkstra's Algorithm
Dijkstra's AlgorithmDijkstra's Algorithm
Dijkstra's Algorithm
 
Introduction to Algorithm
Introduction to AlgorithmIntroduction to Algorithm
Introduction to Algorithm
 
0/1 knapsack
0/1 knapsack0/1 knapsack
0/1 knapsack
 
Chapter 22 Finite Field
Chapter 22 Finite FieldChapter 22 Finite Field
Chapter 22 Finite Field
 
Hasse diagram
Hasse diagramHasse diagram
Hasse diagram
 
Real life application
Real life applicationReal life application
Real life application
 
Graph theory
Graph  theoryGraph  theory
Graph theory
 
Lattice lecture Final DM Updated2.ppt
Lattice lecture Final DM Updated2.pptLattice lecture Final DM Updated2.ppt
Lattice lecture Final DM Updated2.ppt
 

Similar to Discrete Mathematics in Real Life ppt.pdf

Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networks
IJECEIAES
 
An_Accelerated_Nearest_Neighbor_Search_Method_for_the_K-Means_Clustering_Algo...
An_Accelerated_Nearest_Neighbor_Search_Method_for_the_K-Means_Clustering_Algo...An_Accelerated_Nearest_Neighbor_Search_Method_for_the_K-Means_Clustering_Algo...
An_Accelerated_Nearest_Neighbor_Search_Method_for_the_K-Means_Clustering_Algo...
Adam Fausett
 
Comparison of fuzzy neural clustering based outlier detection techniques
Comparison of fuzzy   neural clustering based outlier detection techniquesComparison of fuzzy   neural clustering based outlier detection techniques
Comparison of fuzzy neural clustering based outlier detection techniques
IAEME Publication
 

Similar to Discrete Mathematics in Real Life ppt.pdf (20)

2512ijcsea02
2512ijcsea022512ijcsea02
2512ijcsea02
 
EVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKS
EVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKSEVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKS
EVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKS
 
Mine Blood Donors Information through Improved K-Means Clustering
Mine Blood Donors Information through Improved K-Means ClusteringMine Blood Donors Information through Improved K-Means Clustering
Mine Blood Donors Information through Improved K-Means Clustering
 
Detection of Outliers in Large Dataset using Distributed Approach
Detection of Outliers in Large Dataset using Distributed ApproachDetection of Outliers in Large Dataset using Distributed Approach
Detection of Outliers in Large Dataset using Distributed Approach
 
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
 
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
STUDY OF DISTANCE MEASUREMENT TECHNIQUES IN CONTEXT TO PREDICTION MODEL OF WE...
 
Study of Distance Measurement Techniques in Context to Prediction Model of We...
Study of Distance Measurement Techniques in Context to Prediction Model of We...Study of Distance Measurement Techniques in Context to Prediction Model of We...
Study of Distance Measurement Techniques in Context to Prediction Model of We...
 
EVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKS
EVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKSEVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKS
EVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKS
 
Fuzzy logic based authentication in cognitive radio networks
Fuzzy logic based authentication in cognitive radio networksFuzzy logic based authentication in cognitive radio networks
Fuzzy logic based authentication in cognitive radio networks
 
1104.0355
1104.03551104.0355
1104.0355
 
Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networks
 
A mathematical model of movement in virtual reality through thoughts
A mathematical model of movement in virtual reality through thoughts A mathematical model of movement in virtual reality through thoughts
A mathematical model of movement in virtual reality through thoughts
 
Time of arrival based localization in wireless sensor networks a non linear ...
Time of arrival based localization in wireless sensor networks  a non linear ...Time of arrival based localization in wireless sensor networks  a non linear ...
Time of arrival based localization in wireless sensor networks a non linear ...
 
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHODNONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
 
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHODNONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
 
Modified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNsModified Coverage Hole Detection Algorithm for Distributed WSNs
Modified Coverage Hole Detection Algorithm for Distributed WSNs
 
Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...
 
An_Accelerated_Nearest_Neighbor_Search_Method_for_the_K-Means_Clustering_Algo...
An_Accelerated_Nearest_Neighbor_Search_Method_for_the_K-Means_Clustering_Algo...An_Accelerated_Nearest_Neighbor_Search_Method_for_the_K-Means_Clustering_Algo...
An_Accelerated_Nearest_Neighbor_Search_Method_for_the_K-Means_Clustering_Algo...
 
A general multiobjective clustering approach based on multiple distance measures
A general multiobjective clustering approach based on multiple distance measuresA general multiobjective clustering approach based on multiple distance measures
A general multiobjective clustering approach based on multiple distance measures
 
Comparison of fuzzy neural clustering based outlier detection techniques
Comparison of fuzzy   neural clustering based outlier detection techniquesComparison of fuzzy   neural clustering based outlier detection techniques
Comparison of fuzzy neural clustering based outlier detection techniques
 

Recently uploaded

The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 

Recently uploaded (20)

How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 

Discrete Mathematics in Real Life ppt.pdf

  • 1. Real Life Application of Discrete Mathematics
  • 2. Yash Bhattad 202251162 Rushikesh Chaudhari 202251113 Manav Mehta 202252344 Team : Math GPT Course Instructor : Swapnil Lokhande Sir
  • 3. What do we really mean by Discrete Mathematics ? Discrete mathematics is a branch of mathematics that deals with the study of mathematical structures that are discrete rather than continuous, such as integers, graphs, sets, and sequences.
  • 5. Discrete Mathematics is used in following topics: 1) Google Map/ Traffic Modeling 2) In computer programming 3) Computer Graphics 4) Image Processing 5) DNA Sequencing / Biometrics 6) Digital Electronics (Automatic Doors / Microprocessors / Fitness Trackers) 7) Game Theory 8) Railway Planning 9) Analog Clock 10) Voting Systems 11) Power Grids 12) Cyber Security/ Data encryption
  • 7. Analysis of Spread Graph theory and network analysis are important tools for modeling the spread of infectious diseases. Graph theory is the study of graphs, which are mathematical structures used to model relationships between objects. Graphs can be used to represent the spread of the virus by mapping out the connections between infected individuals. The analysis of the graph can then be used to identify patterns and trends in the spread of the virus, which can be used to develop strategies for controlling its spread.
  • 8. Predicting Spread Discrete mathematics can also be used to develop models for predicting the spread of the virus. These models can be used to estimate the rate of spread and the potential for a second wave of infections. The models can also be used to predict the impact of interventions, such as social distancing, on the spread of the virus. By using discrete mathematics to develop models for predicting the spread of the virus, public health officials can more effectively manage the pandemic and develop strategies for controlling its spread.
  • 9. Contact Tracing Algorithm Discrete mathematics can be used to model and analyze contact tracing data to identify and track potential contacts of an infected individual. This can help to reduce the spread of disease and identify high-risk areas. Discrete mathematics can also be used to develop algorithms for contact tracing, such as those used in mobile applications. These algorithms can be used to identify and alert individuals who may have been exposed to a contagious disease.
  • 10. Contact Tracing Algorithm Contact tracing algorithms may use a variety of data sources to identify close contacts, including GPS location data, Bluetooth signals, and data from public health agencies. Privacy concerns are important, and contact tracing algorithms aim to balance the need to identify potential exposures with protecting individual privacy.
  • 12. Introduction to Discrete Math in Digital Electronics It is used in the study of digital electronics, which is the study of electronic circuits that are composed of discrete components. Digital electronics is used in many aspects of modern technology, including computers, cell phones, and other electronic devices. Digital electronics is based on the binary system, which is a system of two values, 0 and 1. In this system, each digit is represented by a single bit, which can be either 0 or 1. This allows for the representation of complex data in a simple form.
  • 13. Boolean Algebra Boolean algebra is a fundamental concept in digital electronics, and it is used to manipulate and simplify logic expressions used in digital circuit design. Digital electronic circuits are built using digital components like transistors, diodes, and gates that operate based on the principles of Boolean algebra. The use of Boolean algebra in digital electronics helps designers to ensure that the circuits they create are accurate, reliable, and efficient. It also allows for easier testing and troubleshooting of digital circuits.
  • 14. Boolean algebra allows the designer to manipulate these binary signals and create more complex logic functions using logic gates such as AND, OR, NOT, NAND, NOR, and XOR. For example, the logical expression "A AND B" can be implemented using an AND gate, which outputs a 1 only if both A and B inputs are 1.
  • 18. DNA SEQUENCING The main goal of DNA sequencing is to decode the genetic information contained within a DNA sequence, which is crucial for many fields of research, including genetics, molecular biology, medicine, and forensic science. Discrete mathematics plays a significant role in DNA sequencing, which is the process of determining the precise order of nucleotides within a DNA molecule.
  • 19. Hamiltonian Path Approach Methods of approach of DNA Sequencing based upon Graph Theory There are 2 different methods used for Basic DNA Sequencing Euler's Path Approach
  • 20. Hamiltonian Path Approach First and foremost, A Hamiltonian path in a graph is a path which visits each vertex in the graph exactly once. In this method we will take all fragments as nodes of the graph, and each node will connect if the ‘k-1’ rightmost nucleotide of the first note will overlap with the ‘k-1’ leftmost nucleotide of the second node, basically by connecting a suffix and a prefix that overlap each other. Let the Sample of DNA Reads be:
  • 21. Here we have a Hamiltonian Cycle
  • 22. Euler’s Path Approach An Euler Path is a path that goes through every edge of a graph exactly once. In this approach we will use distinct prefix/suffix from the reads as a node and each oligonucleotide becomes an which has an initial endpoint ‘k-1’ from the rightmost nucleotide of arc and its terminal end point being ‘k-1’ of leftmost nucleotide. Let's take the sample size of DNA reads as we have taken for Hamiltonian Path Approach
  • 23. Genome: ATGGCGTGCA We obtain the same sequence of reads as before, thus we will obtain the same sequenced genome as before!
  • 25. Google Maps uses discrete mathematics application to determine the shortest distance between two locations( by Dijkstra's algorithm explain in later slides) Google Maps uses set theory to categorize different locations and points of interest.By categorizing locations into sets, such as restaurants, hotels, and gas stations, Google Maps can provide users with customized search results based on their preferences. Google Maps uses probability to predict traffic patterns and estimate arrival times.
  • 26. Dijkstra's algorithm Dijkstra's algorithm is a way of finding the shortest path between two points on a map,it is also use in network routing, GPS navigation systems, and social network analysis. It works by treating the map as a network of connected points, and assigning each point a "distance" value that represents how far it is from the starting point.
  • 27. 1. Create a graph with nodes and edges, where each edge has a weight or cost. 2. a starting node and assign it a distance of 0. Assign a distance of infinity to all other nodes in the graph. 3. Mark all nodes as unvisited and create an empty set to hold visited nodes. 4. For the current node, calculate the tentative distance from the starting node to each of its neighboring nodes. The tentative distance is the sum of the current node's distance and the cost of the edge between the current node and its neighbor. This are the steps of Dijkstra’s algorithm :
  • 28. 5. Compare the tentative distance to each neighbor's current distance. If the tentative distance is less than the current distance, update the neighbor's distance with the new tentative distance. 6. Mark the current node as visited and remove it from the unvisited set. 7. If the destination node has been visited or if the smallest tentative distance among the unvisited nodes is infinity, stop the algorithm. 8. Select the unvisited node with the smallest tentative distance as the next current node,and go back to step 4. 9. Backtrack from the destination node to the starting node to find the shortest path Let’s take an example
  • 29. 1 1 3 4 5 4 4 2 2 3 3 0 ∞ ∞ ∞ ∞ ∞ 0 1 2 3 4 5 Dist[ ] : ( dist , node ) (0,0) 0 2
  • 30. 1 0 1 2 3 4 5 4 4 2 2 3 3 0 4 4 7 ∞ ∞ 0 1 2 3 4 5 Dist[ ] : ( dist , node ) (7,3) (4,2) (4,1) (0,0) From 0 to 2 we have 4 unit so (4,2). If we get the shorter path than the current path we update our distance so infinity becomes 4 at 1st node same happen with node at 2 and 3. previousThis cycle continue till all points gets their shortest distance.
  • 31. 1 3 4 4 2 2 3 3 0 4 4 7 5 8 0 1 2 3 4 5 Dist[ ] : ( dist , node ) (8,5) (10,5) (5,4) (7,3) (4,2) (4,1) (0,0) 0 1 2 4 5 So the shortest path between 0 to 5 is 0–2–4–5 which is 8 unit long.
  • 32. Bibliography: Discrete Mathematics in Life Science using probability distribution: math.berkeley.edu/~qchu/Notes/239.pdf Explanation to Euler’s & Hamiltonian Path: https://meenalpathak.wordpress.com/Euler'sTrail/Ha miltonian'sPath There are some other algorithm that may be better than Dijkstra’s algorithm in some cases: 1) A* Algorithm : https://en.wikipedia.org/wiki/A*_search_algorithm 2) Bellman-Ford Algorithm: https://www.baeldung.com/cs/bellman-ford 3) Floyd-Warshall Algorithm : https://brilliant.org/wiki/floyd-warshall-algorithm
  • 33. Conclusion: The Application of discrete mathematics is widespread and can be found in various aspects of our daily lives.Discrete mathematics also plays a vital role in the development of artificial intelligence and machine learning, which are becoming increasingly important in our modern world. Therefore, the importance of discrete mathematics in real life cannot be overstated, and its continued development will undoubtedly contribute to the advancement of many fields and improve our daily lives in numerous ways.